From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 4F5F5C77B70 for ; Fri, 14 Apr 2023 08:01:21 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id 7BBBD85FD2; Fri, 14 Apr 2023 09:59:25 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=quarantine dis=none) header.from=ti.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=ti.com header.i=@ti.com header.b="PIL+F25m"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 0108A85EF5; Fri, 14 Apr 2023 09:58:08 +0200 (CEST) Received: from fllv0015.ext.ti.com (fllv0015.ext.ti.com [198.47.19.141]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 2780185F06 for ; Fri, 14 Apr 2023 09:57:41 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=quarantine dis=none) header.from=ti.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=nm@ti.com Received: from fllv0035.itg.ti.com ([10.64.41.0]) by fllv0015.ext.ti.com (8.15.2/8.15.2) with ESMTP id 33E7vUKU117703; Fri, 14 Apr 2023 02:57:30 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1681459050; bh=OPdcEFa0cEZJFfQxBx8ak4dLu8TwW+dAm7LoE0aLNOU=; h=From:To:CC:Subject:Date:In-Reply-To:References; b=PIL+F25mZ2lkEebV/2656/Z1y8e/xFyzWrCelVN+YwqiyGSKHyc57VBxbsUuW74QA 7Fy0J3hfZedw2A1pzNesCAeOEYqbYAaSoM3TGdcT2oHFhBbb/xyBmydPxjseUg9OBm cPm9UryGI3PuFl/Xmc1hHwX+PBC+DlCiP3/tBD14= Received: from DFLE114.ent.ti.com (dfle114.ent.ti.com [10.64.6.35]) by fllv0035.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 33E7vUYu048098 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 14 Apr 2023 02:57:30 -0500 Received: from DFLE109.ent.ti.com (10.64.6.30) by DFLE114.ent.ti.com (10.64.6.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.16; Fri, 14 Apr 2023 02:57:30 -0500 Received: from lelv0326.itg.ti.com (10.180.67.84) by DFLE109.ent.ti.com (10.64.6.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.16 via Frontend Transport; Fri, 14 Apr 2023 02:57:29 -0500 Received: from localhost (ileaxei01-snat.itg.ti.com [10.180.69.5]) by lelv0326.itg.ti.com (8.15.2/8.15.2) with ESMTP id 33E7vUVb013964; Fri, 14 Apr 2023 02:57:30 -0500 From: Nishanth Menon To: Simon Glass , Roger Quadros , Nishanth Menon , Vignesh Raghavendra , Tom Rini CC: Neil Armstrong , Anand Gadiyar , Georgi Vlaev , , "Neha Malcom Francis" , Nikhil M Jain Subject: [PATCH 13/23] arm: dts: k3-am642-evm: Move the mdio pinmux down to evm.dts Date: Fri, 14 Apr 2023 02:57:16 -0500 Message-ID: <20230414075726.387461-14-nm@ti.com> X-Mailer: git-send-email 2.40.0 In-Reply-To: <20230414075726.387461-1-nm@ti.com> References: <20230414075726.387461-1-nm@ti.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.8 at phobos.denx.de X-Virus-Status: Clean Since networking is needed even for u-boot, lets move the MDIO pinmux hack down to evm.dts. Until MDIO is converted to DM model, it won't be possible to probe for pinmux from the MDIO node. To work around this, hack the board dts to set the default mux option to include MDIO. This hack is a limitation for now till we get u-boot MDIO driver into DM model. Signed-off-by: Nishanth Menon --- arch/arm/dts/k3-am642-evm-u-boot.dtsi | 4 ---- arch/arm/dts/k3-am642-evm.dts | 3 ++- 2 files changed, 2 insertions(+), 5 deletions(-) diff --git a/arch/arm/dts/k3-am642-evm-u-boot.dtsi b/arch/arm/dts/k3-am642-evm-u-boot.dtsi index 64857b09099d..c8fd08885366 100644 --- a/arch/arm/dts/k3-am642-evm-u-boot.dtsi +++ b/arch/arm/dts/k3-am642-evm-u-boot.dtsi @@ -113,10 +113,6 @@ <0x0 0x43000200 0x0 0x8>; reg-names = "cpsw_nuss", "mac_efuse"; /delete-property/ ranges; - pinctrl-0 = <&mdio1_pins_default /* HACK: as MDIO driver is not DM enabled */ - &rgmii1_pins_default - &rgmii2_pins_default>; - cpsw-phy-sel@04044 { compatible = "ti,am64-phy-gmii-sel"; reg = <0x0 0x43004044 0x0 0x8>; diff --git a/arch/arm/dts/k3-am642-evm.dts b/arch/arm/dts/k3-am642-evm.dts index 39feea78a084..ed3a6f1341b0 100644 --- a/arch/arm/dts/k3-am642-evm.dts +++ b/arch/arm/dts/k3-am642-evm.dts @@ -425,7 +425,8 @@ &cpsw3g { pinctrl-names = "default"; - pinctrl-0 = <&rgmii1_pins_default + pinctrl-0 = <&mdio1_pins_default /* HACK: as MDIO driver is not DM enabled */ + &rgmii1_pins_default &rgmii2_pins_default>; }; -- 2.40.0