Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3460982ybi; Mon, 27 May 2019 00:03:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqybH4AoH4S/DWqKKqhBppW6yQMj+0NjePQwqsooE6UaIUHQ5LxTQy3JsUW0voYDs6ntDqKB X-Received: by 2002:a63:231c:: with SMTP id j28mr28106159pgj.430.1558940581541; Mon, 27 May 2019 00:03:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558940581; cv=none; d=google.com; s=arc-20160816; b=vfWvVWlsFHrtuD9qWsekK4yM9ow6ykoSNea3pJHD/dBMgaSxwoJb9oxVXklz1p72xM kEikilZntilG/lgepbZEqcffGjAgL9UFdRoEdfv1INBbZO1J7zQzhP6uY96T2aIqQQF2 5fNFZXNIxZ+DpK9F0Bp9Ag9hqYZu+QlCy014EsdXKQK88KmTwc2joxRZIsw3I6FE9TaG T/sikfErzS4U7Mqvto4n1jCS3WA1rLtaJE4dM4q2GKHGMfexIS618XBkzv2uXMb0/Rof /ZmV68dWOm4+4PgxnOYeKMdLRTHyU9uINUTCfPm/AdLjiE2gd2dSDjAptA16pCSy4plm pnvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:to:from; bh=iHQfY+7QjmYG7I8L6IboEVhmfDM18dOTdyUaiOJkif4=; b=lL18JEGIEqWO+KXNNJjJAesETmlEARVx6sGGsjLaenRYklnsOzJNslQ2i9d1aLmy+J kmA/3WRB7TRlm8S5t+7YyRt23hngS44h7xXcnQ87FC0Zum6DcMioaK1UUqCVi/8ulX70 JsVAi2g9PlVX+0UYG0Bhm8NcODz7E8INuedI8/ZScdHLMCcDsGcyGykrsby+Wqc3zFBs eow1arlIzBOPfRTL1V3/1MTSatBgb72cIvqas6L95xxWiW5+HuU8h1lI//fBt/g39xGq cRNfaI73CI3s2ukyTMZI/zwAgHMsjscDIJxRQmVC/b50btvRgybtkRRJ6CmvFUEYXUDR ffNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d2si17263606pln.43.2019.05.27.00.02.46; Mon, 27 May 2019 00:03:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=nxp.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726202AbfE0HBk (ORCPT + 99 others); Mon, 27 May 2019 03:01:40 -0400 Received: from inva021.nxp.com ([92.121.34.21]:49954 "EHLO inva021.nxp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725973AbfE0HBk (ORCPT ); Mon, 27 May 2019 03:01:40 -0400 Received: from inva021.nxp.com (localhost [127.0.0.1]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 4A8D4200AE1; Mon, 27 May 2019 09:01:37 +0200 (CEST) Received: from invc005.ap-rdc01.nxp.com (invc005.ap-rdc01.nxp.com [165.114.16.14]) by inva021.eu-rdc02.nxp.com (Postfix) with ESMTP id 1041B200ACF; Mon, 27 May 2019 09:01:30 +0200 (CEST) Received: from localhost.localdomain (mega.ap.freescale.net [10.192.208.232]) by invc005.ap-rdc01.nxp.com (Postfix) with ESMTP id 590F1402FF; Mon, 27 May 2019 15:01:21 +0800 (SGT) From: Anson.Huang@nxp.com To: robh+dt@kernel.org, mark.rutland@arm.com, wim@linux-watchdog.org, linux@roeck-us.net, shawnguo@kernel.org, s.hauer@pengutronix.de, kernel@pengutronix.de, festevam@gmail.com, linux-imx@nxp.com, aisheng.dong@nxp.com, ulf.hansson@linaro.org, peng.fan@nxp.com, daniel.baluta@nxp.com, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-watchdog@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: [PATCH V4 RESEND 1/3] dt-bindings: watchdog: move i.MX system controller watchdog binding to SCU Date: Mon, 27 May 2019 15:03:15 +0800 Message-Id: <20190527070317.16904-1-Anson.Huang@nxp.com> X-Mailer: git-send-email 2.17.1 X-Virus-Scanned: ClamAV using ClamSMTP Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Anson Huang i.MX system controller watchdog depends on SCU driver to support interrupt function, so it needs to be subnode of SCU node in DT, binding doc should be moved to fsl,scu.txt as well. Signed-off-by: Anson Huang Reviewed-by: Rob Herring --- No changes, just rebase the patch to top of linux-next. --- .../devicetree/bindings/arm/freescale/fsl,scu.txt | 15 ++++++++++++++ .../bindings/watchdog/fsl-imx-sc-wdt.txt | 24 ---------------------- 2 files changed, 15 insertions(+), 24 deletions(-) delete mode 100644 Documentation/devicetree/bindings/watchdog/fsl-imx-sc-wdt.txt diff --git a/Documentation/devicetree/bindings/arm/freescale/fsl,scu.txt b/Documentation/devicetree/bindings/arm/freescale/fsl,scu.txt index f378922..a575e42 100644 --- a/Documentation/devicetree/bindings/arm/freescale/fsl,scu.txt +++ b/Documentation/devicetree/bindings/arm/freescale/fsl,scu.txt @@ -145,6 +145,16 @@ Optional Child nodes: - Data cells of ocotp: Detailed bindings are described in bindings/nvmem/nvmem.txt +Watchdog bindings based on SCU Message Protocol +------------------------------------------------------------ + +Required properties: +- compatible: should be: + "fsl,imx8qxp-sc-wdt" + followed by "fsl,imx-sc-wdt"; +Optional properties: +- timeout-sec: contains the watchdog timeout in seconds. + Example (imx8qxp): ------------- aliases { @@ -207,6 +217,11 @@ firmware { rtc: rtc { compatible = "fsl,imx8qxp-sc-rtc"; }; + + watchdog { + compatible = "fsl,imx8qxp-sc-wdt", "fsl,imx-sc-wdt"; + timeout-sec = <60>; + }; }; }; diff --git a/Documentation/devicetree/bindings/watchdog/fsl-imx-sc-wdt.txt b/Documentation/devicetree/bindings/watchdog/fsl-imx-sc-wdt.txt deleted file mode 100644 index 02b87e9..0000000 --- a/Documentation/devicetree/bindings/watchdog/fsl-imx-sc-wdt.txt +++ /dev/null @@ -1,24 +0,0 @@ -* Freescale i.MX System Controller Watchdog - -i.MX system controller watchdog is for i.MX SoCs with system controller inside, -the watchdog is managed by system controller, users can ONLY communicate with -system controller from secure mode for watchdog operations, so Linux i.MX system -controller watchdog driver will call ARM SMC API and trap into ARM-Trusted-Firmware -for watchdog operations, ARM-Trusted-Firmware is running at secure EL3 mode and -it will request system controller to execute the watchdog operation passed from -Linux kernel. - -Required properties: -- compatible: Should be : - "fsl,imx8qxp-sc-wdt" - followed by "fsl,imx-sc-wdt"; - -Optional properties: -- timeout-sec : Contains the watchdog timeout in seconds. - -Examples: - -watchdog { - compatible = "fsl,imx8qxp-sc-wdt", "fsl,imx-sc-wdt"; - timeout-sec = <60>; -}; -- 2.7.4