From nobody Tue Feb 10 01:34:42 2026 Received: from mail-pf1-f196.google.com (mail-pf1-f196.google.com [209.85.210.196]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 894ED2AEE4 for ; Fri, 30 Jan 2026 08:20:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.196 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769761239; cv=none; b=HITkHkWJ9F+36yOAFS6yl37f1cx2BGSDep1sk6aocoL9GRdMCwSa5eESfLFlcfNhOpPy3y2YKq3ZLrHfEriAtXjIOW2DqpGT+4DUw91C5QeVXXIuqJfHFmyyF+NL+c8MwOj0ihY687ll0t0azk/XF1Ab7OGz3JNaLrACj7etLrk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1769761239; c=relaxed/simple; bh=e4DAb0AqZOq3AWW4s/35NURRVqdT9q3pcfBbOpjvHRI=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=AFGRTmFyl5+pjgwlRJacetI93NNe/E+RaIs0NbxhH3SYIL3mz3S22erbEX2nJw8aTw7mLt8qGmwXDdWcVguBEeLuct3KP2f7RoqGxLXaq1s4oi+L3p273j9BPaaMvcqvc5wXCkjMJ2jXeIn1lG7tt6s0S9G7fuZEbAFBO3RCYtg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=XuhojvYA; arc=none smtp.client-ip=209.85.210.196 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="XuhojvYA" Received: by mail-pf1-f196.google.com with SMTP id d2e1a72fcca58-81e8b1bdf0cso1153953b3a.3 for ; Fri, 30 Jan 2026 00:20:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769761237; x=1770366037; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=Xti7XG40UH6O6PxwKMMYsKnB+u1Uo2o6K+zvBRm+Q+0=; b=XuhojvYAnclQVMi6P1iLuXmTEGycLeO8+opUn4E6hWD23rTU2b/2Kg4UQBgM63GNke EWJOYecvVrOu8ZzkvTtZugVWGQLAo+muA9PlT5wpwiMSYVHXnBFV2H9YQ8Ce35Bst8Xz wGUfEoYLoBP9ThJ4MUPF8b+ih2ET9BNYH0OqfKYfRdzmXxNWLiyZ+315eHpsKVEDFa3N TL4nhqUHdd70hyezD1IN0wxI9cbBN8AQF8WMc2y1aoEK4xmRivi6IDx4m+aJ7pGhVv9L V3BvTl+qTBd3DnNrcnOljkfQ06i0zNtuoa1J+0nYEJC2LbI+MpFaMHd5+6OgFg8S/g0e cFrQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769761237; x=1770366037; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Xti7XG40UH6O6PxwKMMYsKnB+u1Uo2o6K+zvBRm+Q+0=; b=OWMlakWkvaw420QWwAjDbH8V5eVrpFL4oqWnx7IA3npuG/6Y9ff+coSnr0z4xcG6+f y4DiXFXhJQDY7SD54jf9c0OMqbW9bBt7zDyZhXUqMO5UrHTDu/70MJVK95WgFGja9HKO dA4zXVGFEUMA6vBYWda7VvTF97DKilFFfcRKrnFWh4FU+xfBGL8fjPTEU6kiA2lWwQqE HmmkSvrfhBW1XhJ7lQ66LCCK0END6/Lrn65s3sRdpMKgU/bdnZmLH5AiQT1hgavTMB07 WkHNgI77H7+gxj2tw50587yNomhFj4L4HDddiK+WNocR3Fvj3HZc4FlkqFb2tePFKTCd Ydug== X-Forwarded-Encrypted: i=1; AJvYcCVXHq0Yf3cpaEHdesIvg8MX9Xs1uzWX0rJ61e1e9+R/eIEhzZVhhD6A59cMcYcNUmA7TGtCszKwTbnUV+M=@vger.kernel.org X-Gm-Message-State: AOJu0YzjhidmBIUBeUcD8Xjb8QoymBpuPqNuTrefyA4J9gGEn8t0Knob S6p0Us1ns7KIhK21bb4EY1bmREy6ZCkhYjTB/mQkne8lB4mRhAedoCYo X-Gm-Gg: AZuq6aJQayrhCJhulpBmivA180+0zavt22V2tk/ignIM7ORCZ0onXFs0WlEsHxtjl5b sI9U7Eg5QHz6GgSp4NQdsvQFej31M1XVCroSSqYUiXzMPnmcM7HoOv1jhSNTq7hNGeWgJC+Zj36 32FpUp7RhByq2vH9klw5gl7fIDKPRVcRJsR47s+8WAfv18Sd6EvjZ+GA1EsR2/xnWOg9klgZ73h qjhhn+8l9FtiVh8FdPQpSZSOwgfTAxoDR8ue728IMdWCYnyF8P9saG2nAjZcpQIh3sfIn7YSJP9 VAd+SI8g+ixMNTMYRBwZTv1FeWcvaws+IJItptBltiPG1DQw6Vbr0T80RhLmNOA0Tgg25ouCHg2 DWDx4vYuAGiTDU8UdpZe9gbClFHszMblisfKvaNp3fXyBP8JXhpKqPurXb5BGTT8axyOOzNgTNw 3x57jrmkoRZUiaNcdRW8IaCl4jHAzRf+vfR45cJEurglHlgSOWzZg+OtqZ5ORXMxUs+ME5sxwU+ 7VL69SuJsCdPjz9EIqvAM9Tj4uhgXGBt8aMbUhNYZYC0booNBDtB3qMPfPmK+8pT5+W7hhJFsyE zl+m35+EPys/ X-Received: by 2002:a05:6a00:8015:b0:823:1570:1e81 with SMTP id d2e1a72fcca58-823aa931c1fmr2112930b3a.53.1769761236703; Fri, 30 Jan 2026 00:20:36 -0800 (PST) Received: from 2001-b400-e3e0-2a58-5bcf-a65d-c80e-2087.emome-ip6.hinet.net (2001-b400-e3e0-2a58-5bcf-a65d-c80e-2087.emome-ip6.hinet.net. [2001:b400:e3e0:2a58:5bcf:a65d:c80e:2087]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-82379bfc712sm7866018b3a.40.2026.01.30.00.20.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jan 2026 00:20:36 -0800 (PST) From: Kevin Tung Date: Fri, 30 Jan 2026 16:20:15 +0800 Subject: [PATCH v4 7/7] ARM: dts: aspeed: yosemite5: Add debug card bypass GPIO Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260130-yv5_revise_dts-v4-7-4d924455f3a7@gmail.com> References: <20260130-yv5_revise_dts-v4-0-4d924455f3a7@gmail.com> In-Reply-To: <20260130-yv5_revise_dts-v4-0-4d924455f3a7@gmail.com> To: Rob Herring , Krzysztof Kozlowski , Conor Dooley , Joel Stanley , Andrew Jeffery Cc: devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-aspeed@lists.ozlabs.org, linux-kernel@vger.kernel.org, Amithash Prasasd , Kevin Tung , Ken Chen , Leo Yang , Jackson Liu , Kevin Tung X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=ed25519-sha256; t=1769761212; l=1580; i=kevin.tung.openbmc@gmail.com; s=20250924; h=from:subject:message-id; bh=e4DAb0AqZOq3AWW4s/35NURRVqdT9q3pcfBbOpjvHRI=; b=yNNqOLbWXzjovfNGoeiqX69Gh4ImH0IhqpGS9SQJLT5J8mWHP8GLT7wzQeD3n0ODQnXvqfxFA zuNXkioHV+6B/q378yqFfgfHcbHvMvs1UeN6YOZWw4vWEQGt3bxi+b7 X-Developer-Key: i=kevin.tung.openbmc@gmail.com; a=ed25519; pk=PjAss0agA0hiuLfIBlA9j/qBmJaPCDP+jmQIUB6SE7g= On Yv5, the SCM CPLD bypass OCP debug card commands to the BMC. These commands share the same I2C bus used by the BMC to access the SCM CPLD for firmware updates, which can cause bus conflicts. To avoid this, the SCM CPLD provides a bypass control GPIO connected to GPIOO7. When asserted by the BMC, this GPIO isolates debug card commands and prevents conflicts during SCM CPLD access. Add the DEBUG_CARD_BYPASS GPIO to support this behavior. Signed-off-by: Kevin Tung --- arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts b/a= rch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts index 48f864b52d1a22b12f8a39ba9703a90349ed930d..61e78d5e712ff45e1a0691979b9= b36408404cd2d 100644 --- a/arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts +++ b/arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts @@ -166,7 +166,8 @@ &gpio0 { "led-postcode-3","led-postcode-4","led-postcode-5", "led-postcode-6","led-postcode-7", /*O0-O7*/ "RUN_POWER_PG","PWR_BRAKE","CHASSIS_AC_LOSS","BSM_PRSNT_N", - "PSU_SMB_ALERT","FM_TPM_PRSNT_0_N","PSU_FW_UPDATING_N","", + "PSU_SMB_ALERT","FM_TPM_PRSNT_0_N", + "PSU_FW_UPDATING_N","DEBUG_CARD_BYPASS", /*P0-P7*/ "PWR_BTN_BMC_N","IPEX_CABLE_PRSNT","ID_RST_BTN_BMC_N", "RST_BMC_RSTBTN_OUT_N","BMC_PWR_LED","RUN_POWER_EN","SHDN_FORCE","", /*Q0-Q7*/ "IRQ_PCH_TPM_SPI_LV3_N","USB_OC0_REAR_N","UART_MUX_SEL", --=20 2.52.0