From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 17CE8C4CECE for ; Fri, 13 Mar 2020 13:40:35 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D60652074A for ; Fri, 13 Mar 2020 13:40:34 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=synopsys.com header.i=@synopsys.com header.b="HKqB0i/f" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726752AbgCMNkM (ORCPT ); Fri, 13 Mar 2020 09:40:12 -0400 Received: from smtprelay-out1.synopsys.com ([149.117.87.133]:59818 "EHLO smtprelay-out1.synopsys.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726637AbgCMNkL (ORCPT ); Fri, 13 Mar 2020 09:40:11 -0400 Received: from mailhost.synopsys.com (mdc-mailhost2.synopsys.com [10.225.0.210]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by smtprelay-out1.synopsys.com (Postfix) with ESMTPS id 133DDC0FAA; Fri, 13 Mar 2020 13:40:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=synopsys.com; s=mail; t=1584106810; bh=t1pm7fKD92tjH8JBeBYBSHbf42hldqejbJpvYI28CJQ=; h=From:To:Cc:Subject:Date:From; b=HKqB0i/fWg9Lt2naCYiuS0+CdVPXiMpTzPoy0NviRi3CdZlmOvoUi1PYf73UHxo2Z TxELNZ852GuTdjxmw25xp/RPOi1IunJHv+xcOJ88jcC/VGkZTrT7ldnQYk7e/8EHHn 8pAq43RL0l+o2xJYdWhcchKnhkp3Zzuge5mPOhuhcYQuCWte+3eS8I+AhTDl3KbkUJ UMNMP4uyQMBF4hmW/24D4vjyPo6/41fergIsknOnIAZKkciasoA+Vd5KYBm1MuHEm4 jiTL6FaFnnI5sd5wG7wp6ZqmgEujMPZX3BDYZSvrtOc01p6b58NtDZvdf4f8bl1mF+ axRfIjC3Eh8pw== Received: from de02dwia024.internal.synopsys.com (de02dwia024.internal.synopsys.com [10.225.19.81]) by mailhost.synopsys.com (Postfix) with ESMTP id 000C7A005C; Fri, 13 Mar 2020 13:40:07 +0000 (UTC) From: Jose Abreu To: netdev@vger.kernel.org Cc: Joao Pinto , Jose Abreu , Andrew Lunn , Florian Fainelli , Heiner Kallweit , Russell King , "David S. Miller" , linux-kernel@vger.kernel.org Subject: [PATCH net-next 0/4] net: phy: xpcs: Link errors improvements Date: Fri, 13 Mar 2020 14:39:39 +0100 Message-Id: X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org First set of improvements for XPCS that were developed after exhaustive tests of Link Down / Link Up transitions. As a side note, more fixes and improvements may come in the near future as we are adding XLGMII support at 25G, 40G, 50G and 100G speeds for both XPCS and stmmac drivers. Patch 1/4, prevents reading old values from RX/TX fault. Patch 2/4 and 3/4, signals the check link function for critical errors that can disturbe link normal operation and that need XPCS reset. Patch 4/4, resets the XPCS at probe so that we start from a well known state. --- Cc: Jose Abreu Cc: Andrew Lunn Cc: Florian Fainelli Cc: Heiner Kallweit Cc: Russell King Cc: "David S. Miller" Cc: netdev@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- Jose Abreu (4): net: phy: xpcs: Clear latched value of RX/TX fault net: phy: xpcs: Return error upon RX/TX fault net: phy: xpcs: Return error when 10GKR link errors are found net: phy: xpcs: Reset XPCS upon probe drivers/net/phy/mdio-xpcs.c | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-) -- 2.7.4