From nobody Thu Apr 2 20:26:45 2026 Received: from mail-pl1-f194.google.com (mail-pl1-f194.google.com [209.85.214.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D6BEC3612F8 for ; Mon, 23 Feb 2026 11:18:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.194 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771845482; cv=none; b=kHo7bWuyQ5sPZH2ZJ53TVG3HUvdNgrMdfj00SaehnMg4ke1M7/Hxuf/PFzs0hDWMyPyfdyrJZkjLjlIr4swb5M2A+lUEvk2KI2VzQ5xoAouD4gtG24xyWkkUXoJqBc5Pah5PJtsE0oi7DUi4wP/bGWdwgTqgF/8hjIrW0L8X8Go= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771845482; c=relaxed/simple; bh=qeVbrH9h2lP2i/7VhrZSt6TtWWoZ4Z6EMuUxjGVFuDU=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=EDXzE/At/vJljUD1JVtp5F8J4UFuBjJMbACqqu35i2RnHi+HJ5TWZrcx6p2TyelYxqQ6ltuEz/zh3Uv6i0oIv07tB8yCStwOT2xpsWiHmHePj95hqqvuJxZB/1nHA2PcQ+h+6RKCVlGThjNwJ6wvCJA8V7ooMcJQx3dSvWbI0y0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=AnYtmzHS; arc=none smtp.client-ip=209.85.214.194 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="AnYtmzHS" Received: by mail-pl1-f194.google.com with SMTP id d9443c01a7336-2ab46931cf1so31585015ad.0 for ; Mon, 23 Feb 2026 03:18:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1771845480; x=1772450280; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=DDyXUHId1Z/nYWBwHmfSalP2sAsbJktA9TnrtpJPbyI=; b=AnYtmzHSrhexYLm0CHQndcWGV3uOgxOZYFPajJVUXxekbxCUcXWq4Ou1nwkqTarSqD AjvH2jRYcvzQqSw8aGsg4vtkC1MZkLW7f/t7s5GjucgrMZtvb4Bu6ZXr2JMp1sbmGLb6 t14zA/iLOpt226+UBIbH4hDLJ23kiEw7CfizdyikMiq6h/FRvmZYA8jdchQfa58dJMOH 3bBMu/irp0qH1lc70SCFDnDgNjn3pkrM70BtQ2VVLw+wFoMtJfS2ANF/KSk73oXXhB6S gyGKGy0fVoAaB0LZLrbpPnmMLfhk0T/yeM0fGs3QsSImT0dGUwTIJyzQ6qVSwNV/MrFR nUvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771845480; x=1772450280; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=DDyXUHId1Z/nYWBwHmfSalP2sAsbJktA9TnrtpJPbyI=; b=hZh1llNIkOgemigaRHRMIQvQCkGvSlqo0TSmiYfbzZPlezF7/VISQiWM0szNKl23z+ 3yGs4LFqYCj5LHjFWiojRqALShi9X6jETBFHqF6DdIoFw9f+bQEt2/USC3ppIbOe10M+ l3jqbgwJSHnoHa3qGcd3l5BYwt1wtjVzvFhVKHbjxoqKXDi9tB1z/CX2RfhmBm7yw6RH pirYksLuoavx2I5KH4kJTBmZr/uWsf7+PLmJfqFa72wcqOX1T1P2itQQ32PH6VqcqlZM yMJdYS85ElS4Tp1Z6WX1Tl3LgYT7ARW7+IGv3DuaOJrn0yPst3jmtbMHMS/+t8QADYhD c39Q== X-Forwarded-Encrypted: i=1; AJvYcCViLfcigSL1eEIVzdvbJbocXLKwbls7/mRROoEFp36YJg3mmqDCYwIvoCiyyaMtaqQXE02zSHA50ghPZKU=@vger.kernel.org X-Gm-Message-State: AOJu0YzenF8465XtcobfJUSiSdNALkMvX7HZyAtxkF6h35FIV0SXdSnr lxZvRZDNW8QuvUhPbwwYlCH8DiZqrVjVkYWTcvKEQUQ6gnYtQtvY+nBR X-Gm-Gg: ATEYQzy7me/QX9kmdPyA4BrKYcbA84cnlth3JNajtB6DGRAbWTHVHvd2Vsu8cNAhTae gX2skglHuXNpGwGRW0PNzRUOLeyMt3eeJb/jMzInjT5uFZAjVi2Rc/1oeZngWUoGz0+R6cI1hvR c/HhWD0DfQL73h+TeA/pWG8CjKP2qW8mT5Tt4+F1X2eEl5M6PaFJZJIwUse+Cp7ZSBRNPN+KglG 1qW05ofEwnN5B7F9YP611mrXFxbjlJPyUMOwAYTvCAvOwV9q9uUd2bhxtFY/EbN/pOHy6VJU2Ro +hOOHqmXIEtxuctpCSDCObg8VQdBCfc9fgU/TBfT6HXrBZ1o0cWYjmqrkagpfo8LXAqltDJTVln OHdv6RdaODy7umNndeKQJ7+VyfGPOYC8l6uQ39AC7ozezzXJxPsOndDr1bJT1KIlQPItwDJqr0e E0IOnTIHqbm6bAI6pYmMvUxelZuX3WthO1ZfEpz/Zv2ibLKxYbodmloWODvQarMCmjx1HZFUWz9 k0Bty9NWKTkauJmTsMYRrvEx11xDrdm/LZsrWsjq6IUFEjZIWUwBUgZoqHXIOBvWzscye4a4g+0 1gKldGaELtUSwtW4g5Fy3l1/BdmTMzU= X-Received: by 2002:a17:902:e851:b0:2aa:e238:e20c with SMTP id d9443c01a7336-2ad742acbf0mr72695315ad.19.1771845480316; Mon, 23 Feb 2026 03:18:00 -0800 (PST) Received: from 2001-b400-e3a6-b683-040b-c296-04cb-fbc3.emome-ip6.hinet.net (2001-b400-e3a6-b683-040b-c296-04cb-fbc3.emome-ip6.hinet.net. [2001:b400:e3a6:b683:40b:c296:4cb:fbc3]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2ad74d36911sm71799335ad.0.2026.02.23.03.17.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Feb 2026 03:18:00 -0800 (PST) From: Kevin Tung Date: Mon, 23 Feb 2026 19:17:39 +0800 Subject: [PATCH v5 7/8] ARM: dts: aspeed: yosemite5: Add debug card bypass GPIO Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260223-yv5_revise_dts-v5-7-fc913e902488@gmail.com> References: <20260223-yv5_revise_dts-v5-0-fc913e902488@gmail.com> In-Reply-To: <20260223-yv5_revise_dts-v5-0-fc913e902488@gmail.com> To: Rob Herring , Krzysztof Kozlowski , Conor Dooley , Joel Stanley , Andrew Jeffery Cc: devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-aspeed@lists.ozlabs.org, linux-kernel@vger.kernel.org, Amithash Prasasd , Kevin Tung , Ken Chen , Leo Yang , Jackson Liu , Daniel Hsu , Kevin Tung X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=ed25519-sha256; t=1771845456; l=1580; i=kevin.tung.openbmc@gmail.com; s=20250924; h=from:subject:message-id; bh=qeVbrH9h2lP2i/7VhrZSt6TtWWoZ4Z6EMuUxjGVFuDU=; b=mtYdAN+CZ0MwbFt5rxjjKWwOf6MvRuhPUHRoV3l41gXRNKMx2aSxbUh/32XmK+5CAo20PK5fo UkRZzzPDHZVB69NS1UQa42rokr1SCrzd+oEjqC0iUwPy13XEEn8Wneh X-Developer-Key: i=kevin.tung.openbmc@gmail.com; a=ed25519; pk=PjAss0agA0hiuLfIBlA9j/qBmJaPCDP+jmQIUB6SE7g= On Yv5, the SCM CPLD bypass OCP debug card commands to the BMC. These commands share the same I2C bus used by the BMC to access the SCM CPLD for firmware updates, which can cause bus conflicts. To avoid this, the SCM CPLD provides a bypass control GPIO connected to GPIOO7. When asserted by the BMC, this GPIO isolates debug card commands and prevents conflicts during SCM CPLD access. Add the DEBUG_CARD_BYPASS GPIO to support this behavior. Signed-off-by: Kevin Tung --- arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts b/a= rch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts index 30fb41fdaeb7a2276cdfe98654696a16cf1de5fc..f590ec6e00c48afe4ade1fb9801= 1780ac0570e7c 100644 --- a/arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts +++ b/arch/arm/boot/dts/aspeed/aspeed-bmc-facebook-yosemite5.dts @@ -166,7 +166,8 @@ &gpio0 { "led-postcode-3","led-postcode-4","led-postcode-5", "led-postcode-6","led-postcode-7", /*O0-O7*/ "RUN_POWER_PG","PWR_BRAKE","CHASSIS_AC_LOSS","BSM_PRSNT_N", - "PSU_SMB_ALERT","FM_TPM_PRSNT_0_N","PSU_FW_UPDATING_N","", + "PSU_SMB_ALERT","FM_TPM_PRSNT_0_N", + "PSU_FW_UPDATING_N","DEBUG_CARD_BYPASS", /*P0-P7*/ "PWR_BTN_BMC_N","IPEX_CABLE_PRSNT","ID_RST_BTN_BMC_N", "RST_BMC_RSTBTN_OUT_N","BMC_PWR_LED","RUN_POWER_EN","SHDN_FORCE","", /*Q0-Q7*/ "IRQ_PCH_TPM_SPI_LV3_N","USB_OC0_REAR_N","UART_MUX_SEL", --=20 2.53.0