Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp55018rdb; Mon, 18 Sep 2023 08:08:38 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHKUfNFLB86CZr3w717PLrsZWTxnkgbG+s0TQwCjrI04fZIzl+7NCZN+p+sLL217rp9lwCJ X-Received: by 2002:a05:6300:8002:b0:159:e04f:e184 with SMTP id an2-20020a056300800200b00159e04fe184mr13326469pzc.7.1695049717827; Mon, 18 Sep 2023 08:08:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695049717; cv=none; d=google.com; s=arc-20160816; b=v/TAX4LgL2sb5xD/OaOPuy1LtNo1of73zTy1ucuN/hzlv3IdQz9TVrjbz9nSnYw4JJ KxOcMo1G8C1AUekzRc63hDrcIiHF3IDqOITwOPh41C4HEyUKGsPR/SNlBYtULabjk5oE VhxGVTLGTelZSBCRjscypm8/Q8jtvDGGGfan2d5mC+eySz8CbIkldLNS+anxyzwlVxNa c3w8dkq1A/qFULDP6re8B39zZRFMQF/EW5jUi252QzC2PpY5ZH76Q0TQaNNANPOOlAFi hfVEW0pqeZ0p7la0wnHEsqSlu9k+dolhsO+DQfam/56bitf1k8ln+32kXq52mi0SZq4L JA/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:to:from:date:dkim-signature; bh=WqheZWoOY1rVibPC5YOOEvA+J9NvoDtiDKbNopiU5HU=; fh=lqcUDBguSdRNqtVRNM6IC5SKyIOZsO9QA8dvqnJsPTk=; b=Y7rhiR1Pr43JJWS1deSbR6r6cxXyLoLbwkl+J5odcKFxezxtEyuYcyGrg8jNTl7Dss WlPvPr1kwujahK1c4eeGGJvAcOzOHyMpOXRbGo3mBe/qJWEOgj6s2UI/DR5FAsuvFFX+ /FeZZXxPHlppG5/Bv2XFILUvOC/T56A5KeeGVVuoC2Ws13tggPetiw8hiskDQN+ggIlb d+28hoevnJwolZlLq6OROLjIhcz/jp+zUsTiItWy0XuTwHCOmqH5LrQrMtzpPU2JWprw T48xyxDAinjuPieW4t4dnldyv1UmKo8b7R7VW+YNqGe28d8u7nrMVpBrdMC+UQWIInLL xl9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@lopingdog.com header.s=mail header.b=YoMqkn8o; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=lopingdog.com Return-Path: Received: from howler.vger.email (howler.vger.email. [23.128.96.34]) by mx.google.com with ESMTPS id k7-20020a635607000000b005774452aa3dsi2366747pgb.497.2023.09.18.08.08.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Sep 2023 08:08:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) client-ip=23.128.96.34; Authentication-Results: mx.google.com; dkim=pass header.i=@lopingdog.com header.s=mail header.b=YoMqkn8o; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=lopingdog.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 603B080622A7; Mon, 18 Sep 2023 00:10:26 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240125AbjIRHJv (ORCPT + 99 others); Mon, 18 Sep 2023 03:09:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240065AbjIRHJL (ORCPT ); Mon, 18 Sep 2023 03:09:11 -0400 Received: from core.lopingdog.com (core.lopingdog.com [162.55.228.84]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84871F3; Mon, 18 Sep 2023 00:08:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=lopingdog.com; s=mail; t=1695020329; bh=jeWrBC92z//V5paBXAzhpWHpsdsNIxZ42afnWQdTjhU=; h=Date:From:To:Subject:From; b=YoMqkn8oubSVPlfpVsecdU2nK7A8TQotBlwDqUmrumLrrKo2wR9rCGOa1QZjqvqPG BqD09i15Iu6BR5ju5nq9Pz6QFe6d18j0pIayC9nvoWFUGZjpB/UVUyY+rzBVysdwqJ fH/w0D1Ng4J7T0J8JgLi1HjUFA2qCf2AXZLhVEZ2ubpkQtZ2U3oypfghL1aH0OaX/4 UfRkeC6cOBwM6chS+WRfv/Hybknrd+HI1I+0hY+S53xUvOolRtWXjqaL/cT/Khjo7N 8YFDprVfWfPrZHN5pVZ2ax0MiwEawmwNduRCRO1DLxKLbJhsjBKAMjZU5cgZRU5jVq tEDhc8mKm5gmA== Received: from authenticated-user (core.lopingdog.com [162.55.228.84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by core.lopingdog.com (Postfix) with ESMTPSA id AD4E14402DB; Mon, 18 Sep 2023 01:58:47 -0500 (CDT) Date: Mon, 18 Sep 2023 01:58:46 -0500 From: Jay Monkman To: devicetree@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Piergiorgio Beruto , Arndt Schuebel Subject: [PATCH 0/4] net: Add NCN26010 driver Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Mon, 18 Sep 2023 00:10:26 -0700 (PDT) This series adds support for onsemi's NCN26010 10BASE-T1S Ethernet controller. This is a combined MAC/PHY that uses SPI to interface to a microcontroller. The patches include devicetree bindings for the NCN26000 PHY and the NCN26010, required changes to the NCN26000 PHY driver and the NCN26010 driver itself. Jay Monkman (4): dt-bindings: net: Add bindings for onsemi NCN26000 PHY dt-bindings: net: Add onsemi NCN26010 ethernet controller net: phy: Add GPIO and DT support to NCN26000 net/onsemi: Add NCN26010 driver .../devicetree/bindings/net/onnn,macphy.yaml | 94 + .../bindings/net/onnn,ncn26000.yaml | 177 ++ drivers/net/ethernet/Kconfig | 1 + drivers/net/ethernet/Makefile | 1 + drivers/net/ethernet/onsemi/Kconfig | 27 + drivers/net/ethernet/onsemi/Makefile | 9 + drivers/net/ethernet/onsemi/onsemi_macphy.h | 298 +++ .../net/ethernet/onsemi/onsemi_macphy_core.c | 2149 +++++++++++++++++ .../ethernet/onsemi/onsemi_macphy_ethtool.c | 179 ++ drivers/net/phy/ncn26000.c | 467 +++- 10 files changed, 3394 insertions(+), 8 deletions(-) create mode 100644 Documentation/devicetree/bindings/net/onnn,macphy.yaml create mode 100644 Documentation/devicetree/bindings/net/onnn,ncn26000.yaml create mode 100644 drivers/net/ethernet/onsemi/Kconfig create mode 100644 drivers/net/ethernet/onsemi/Makefile create mode 100644 drivers/net/ethernet/onsemi/onsemi_macphy.h create mode 100644 drivers/net/ethernet/onsemi/onsemi_macphy_core.c create mode 100644 drivers/net/ethernet/onsemi/onsemi_macphy_ethtool.c -- 2.40.1