From patchwork Fri Jun 11 22:20:40 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Heiko_St=C3=BCbner?= X-Patchwork-Id: 1491165 Return-Path: X-Original-To: incoming-imx@patchwork.ozlabs.org Delivered-To: patchwork-incoming-imx@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.infradead.org (client-ip=2607:7c80:54:e::133; helo=bombadil.infradead.org; envelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org; receiver=) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; secure) header.d=lists.infradead.org header.i=@lists.infradead.org header.a=rsa-sha256 header.s=bombadil.20210309 header.b=Zrz1F7Fd; dkim-atps=neutral Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4G1wNG5qw7z9sT6 for ; Sat, 12 Jun 2021 08:23:26 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=jYcTxivqdOYqsueP4AOgwwyYUkWuXF9UFn/ewsVRpaM=; b=Zrz1F7FdeYSpsw PLRrYxTTN7PJ7klh7RseSM5PukHZ6yfmk82DncX8ky1BGHN3iytG8x8gxfGHyurVTzp47tm4H/LuS sH+XHW4UelOjdl0fvAGmOE82sHvxrq44/xM4QcOp3Ru7FqnpnzNbEwAc4Dv3xYweJ1wcufAg0oBkp v2E1N36qnRkc78nS6Ivpfxnq2Kk7d9qatYagXqiOf4GYJPiV5pbSsAdZ0NPPpP19zXVSeOQR2Qdo1 zaTCxJAPV/V34PwZpRoUBX3UkSb6vLVz8Mqnw6Q0ut17TnLOsIfPrJce9++MjQWn6Cp+X3jb73Bxy CmHk/EUQdjukbvE4m+bg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1lrpWE-007IVa-Hr; Fri, 11 Jun 2021 22:20:50 +0000 Received: from gloria.sntech.de ([185.11.138.130]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1lrpW6-007IUy-DC; Fri, 11 Jun 2021 22:20:47 +0000 Received: from ip5f5aa64a.dynamic.kabel-deutschland.de ([95.90.166.74] helo=diego.localnet) by gloria.sntech.de with esmtpsa (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1lrpW5-0004pq-89; Sat, 12 Jun 2021 00:20:41 +0200 From: Heiko =?iso-8859-1?q?St=FCbner?= To: arm@kernel.org Cc: soc@kernel.org, linux-rockchip@lists.infradead.org, linux-arm-kernel@lists.infradead.org Subject: [GIT PULL] Rockchip dts fixes for 5.13 Date: Sat, 12 Jun 2021 00:20:40 +0200 Message-ID: <3405741.0S5aU1g85B@diego> MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210611_152042_482017_9F11388C X-CRM114-Status: GOOD ( 11.61 ) X-Spam-Score: 0.0 (/) X-Spam-Report: Spam detection software, running on the system "bombadil.infradead.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hi Arnd, Kevin, Olof, please find below a patch that unbreaks the PCIe on rk3399 that broke in 5.13. As the tag messages states, there are more changes pending that handle the backward compatiblity but will go through the [...] Content analysis details: (0.0 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- 0.0 SPF_NONE SPF: sender does not publish an SPF Record 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org Hi Arnd, Kevin, Olof, please find below a patch that unbreaks the PCIe on rk3399 that broke in 5.13. As the tag messages states, there are more changes pending that handle the backward compatiblity but will go through the PCI subsystem. Please pull, thanks Heiko The following changes since commit 6efb943b8616ec53a5e444193dccf1af9ad627b5: Linux 5.13-rc1 (2021-05-09 14:17:44 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/mmind/linux-rockchip.git tags/v5.13-rockchip-dtsfixes1 for you to fetch changes up to 8efe01b4386ab38a36b99cfdc1dc02c38a8898c3: arm64: dts: rockchip: Update RK3399 PCI host bridge window to 32-bit address memory (2021-06-11 23:44:00 +0200) ---------------------------------------------------------------- Fix PCIe address ranges that are affected by recent PCI changes. There are 3 additional patches pending that handle the backward compatiblity inside the PCI subsystem, but the address ranges should be fixed anyway. ---------------------------------------------------------------- Punit Agrawal (1): arm64: dts: rockchip: Update RK3399 PCI host bridge window to 32-bit address memory arch/arm64/boot/dts/rockchip/rk3399.dtsi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)