From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id A5252C3DA5D for ; Sun, 21 Jul 2024 09:00:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=6AzEJdyPU+e3uAcJ2iB+3rlfpbSGnFXeyPgQnwd5UX0=; b=L/L9pFamAs3XMokh+WOBG3Xqjl KDcCJdk5dl+NdIk1r7UVWE/uuV2p48PFGMs9V66kMEqtlok3FJJhDQwncbHYV38iFK8f07g3Osp2L hfaq4Aeyveo16DjK2JJJ7xf16W+Cw1y3HQ+edIjSksQzNlsmkhWsKRmLHn/tbycnSGV+6+7vIMDz8 zluQAQo57yUO/1F7F2iFSn9Yk4+Bn3q0brUk12GdBbooiMF1JnelcGydGvjOqHBzoR+e/GYUPP4Mf TGgVn3qM1rKbG1sIT47ZpkxeG6jwGjHhlgp087DlkW0wuoAOpanDNh8SRKXN2EoSU5RT8XUR+3ifB Juvapklw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1sVSQv-00000006WEu-1nSD; Sun, 21 Jul 2024 09:00:45 +0000 Received: from sin.source.kernel.org ([145.40.73.55]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1sVSQY-00000006W8p-2z7y for linux-arm-kernel@lists.infradead.org; Sun, 21 Jul 2024 09:00:24 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sin.source.kernel.org (Postfix) with ESMTP id AD4C0CE095C; Sun, 21 Jul 2024 09:00:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3E49EC4AF0B; Sun, 21 Jul 2024 09:00:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1721552420; bh=73l4iQPCGsyJcwGiCLPqOY8gYX9SmoGLU4LSJfc1aHg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=MFYYNtYu5KZjR+7mt6MYwkPW9xQEQ0QSZqvi/v6xwY6I0nxXDCRm4y5ET91U9AtYq eDt7YvEgjBBTDy/rqpEGusz1Sfe9vP0mO8LVJ7TbLyNzrd0rpNqzqyYjnAbkErk8/5 npvywz09WghPFGl+XBNN45jZSN5Xm3Y60Sqw9LVT2da6q1s+vlhr+gPYU0axQvrOoG ahndPeHAlAiFR3Y2ZZmTU9LhwAy54cx0OyrqumhL7sU/KfltmteD22pd9GknKn7Ini ekA1f29zT+UAM73D5oodDS2wdZz5VbOS5/1vXhP3QXrcNeAgmtEuaYLP/lrIEm9YtJ pzroHGbCj6VTA== Date: Sun, 21 Jul 2024 10:00:14 +0100 From: Simon Horman To: Ayush Singh Cc: jkridner@beagleboard.org, robertcnelson@beagleboard.org, "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Rob Herring , Krzysztof Kozlowski , Conor Dooley , Nishanth Menon , Vignesh Raghavendra , Tero Kristo , Johan Hovold , Alex Elder , Greg Kroah-Hartman , greybus-dev@lists.linaro.org, netdev@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH 1/3] dt-bindings: net: ti,cc1352p7: Add boot-gpio Message-ID: <20240721090014.GC715661@kernel.org> References: <20240719-beagleplay_fw_upgrade-v1-0-8664d4513252@beagleboard.org> <20240719-beagleplay_fw_upgrade-v1-1-8664d4513252@beagleboard.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240719-beagleplay_fw_upgrade-v1-1-8664d4513252@beagleboard.org> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240721_020022_954192_D659DCB6 X-CRM114-Status: GOOD ( 15.90 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Fri, Jul 19, 2024 at 03:15:10PM +0530, Ayush Singh wrote: > boot-gpio (along with reset-gpio) is used to enable bootloader backdoor > for flashing new firmware. > > The pin and pin level to enabel bootloader backdoor is configed using nit: enable Flagged by checkpatch.pl --codespell > the following CCFG variables in cc1352p7: > - SET_CCFG_BL_CONFIG_BL_PIN_NO > - SET_CCFG_BL_CONFIG_BL_LEVEL > > Signed-off-by: Ayush Singh > --- > Documentation/devicetree/bindings/net/ti,cc1352p7.yaml | 4 ++++ > 1 file changed, 4 insertions(+) > > diff --git a/Documentation/devicetree/bindings/net/ti,cc1352p7.yaml b/Documentation/devicetree/bindings/net/ti,cc1352p7.yaml > index 3dde10de4630..a3511bb59b05 100644 > --- a/Documentation/devicetree/bindings/net/ti,cc1352p7.yaml > +++ b/Documentation/devicetree/bindings/net/ti,cc1352p7.yaml > @@ -29,6 +29,9 @@ properties: > reset-gpios: > maxItems: 1 > > + boot-gpios: > + maxItems: 1 > + > vdds-supply: true > > required: > @@ -46,6 +49,7 @@ examples: > clocks = <&sclk_hf 0>, <&sclk_lf 25>; > clock-names = "sclk_hf", "sclk_lf"; > reset-gpios = <&pio 35 GPIO_ACTIVE_LOW>; > + boot-gpios = <&pio 36 GPIO_ACTIVE_LOW>; > vdds-supply = <&vdds>; > }; > }; > > -- > 2.45.2 > >