From patchwork Sat May 19 15:55:47 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Krzysztof Kozlowski X-Patchwork-Id: 916874 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=linux-gpio-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=kernel.org header.i=@kernel.org header.b="nRst4DbC"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 40p8mF6LGFz9s4V for ; Sun, 20 May 2018 01:56:29 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752521AbeESP4T (ORCPT ); Sat, 19 May 2018 11:56:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:41946 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752414AbeESP4Q (ORCPT ); Sat, 19 May 2018 11:56:16 -0400 Received: from localhost.localdomain (adsl-84-226-183-37.adslplus.ch [84.226.183.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1BD1C2084B; Sat, 19 May 2018 15:56:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526745375; bh=2LCf2mW82ylL/S1LI8IB7g/vE4J11RwLGDLwRyH2vQc=; h=From:To:Cc:Subject:Date:From; b=nRst4DbCc8u6DK3dghyZ2RjDy8FoxPYN4SvDYv/K8IZqitAr9du2FLf8IQwbo+7Gk eJHhIWNVAdhhWaWb7TFpjJHJBjiHuiZbdXjghT8gOKSYtRTBBnaE/VhdxCbw2MNdk4 3XNhQ3G98JaDwaKBWgn3WMz5LqZnhmqKKjnVb9uw= From: Krzysztof Kozlowski To: Linus Walleij Cc: Krzysztof Kozlowski , Tomasz Figa , Sylwester Nawrocki , linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-gpio@vger.kernel.org Subject: [GIT PULL] pinctrl: samsung: Stuff for v4.18 Date: Sat, 19 May 2018 17:55:47 +0200 Message-Id: <20180519155547.6678-1-krzk@kernel.org> X-Mailer: git-send-email 2.14.1 MIME-Version: 1.0 Sender: linux-gpio-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-gpio@vger.kernel.org Hi Linus, Few patches for next cycle. Best regards, Krzysztof The following changes since commit 60cc43fc888428bb2f18f08997432d426a243338: Linux 4.17-rc1 (2018-04-15 18:24:20 -0700) are available in the git repository at: https://git.kernel.org/pub/scm/linux/kernel/git/pinctrl/samsung.git tags/samsung-pinctrl-4.18 for you to fetch changes up to 0ca0557e3727951bdc44ea47bc6135b37f90338c: pinctrl: samsung: Remove support for Exynos5440 (2018-05-02 19:08:55 +0200) ---------------------------------------------------------------- Samsung pinctrl drivers changes for v4.18 1. Driver expects specific order of GPIO interrupt banks. For S5Pv220 and Exynos5410 this order was not preserved so fix and document it. 2. Remove support for Exynos5440 (tree-wide, support is dropped because there are no real users of this platform, it also did not get testing since long time). ---------------------------------------------------------------- Krzysztof Kozlowski (1): pinctrl: samsung: Remove support for Exynos5440 Paweł Chmiel (2): pinctrl: samsung: Correct EINTG banks order pinctrl: samsung: Document required order of banks drivers/pinctrl/samsung/Kconfig | 10 +- drivers/pinctrl/samsung/Makefile | 1 - drivers/pinctrl/samsung/pinctrl-exynos-arm.c | 30 +- drivers/pinctrl/samsung/pinctrl-exynos-arm64.c | 20 + drivers/pinctrl/samsung/pinctrl-exynos5440.c | 1005 ------------------------ 5 files changed, 50 insertions(+), 1016 deletions(-) delete mode 100644 drivers/pinctrl/samsung/pinctrl-exynos5440.c --- To unsubscribe from this list: send the line "unsubscribe linux-gpio" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html