Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2920486ybx; Fri, 8 Nov 2019 11:17:09 -0800 (PST) X-Google-Smtp-Source: APXvYqz02juxBjfnAFHsoUC7ScjzwiZbwCyFBbzVpaL4/DGhaaoW2f094JHe2LhJQyokd/2vnIas X-Received: by 2002:aa7:d796:: with SMTP id s22mr11927909edq.31.1573240629783; Fri, 08 Nov 2019 11:17:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573240629; cv=none; d=google.com; s=arc-20160816; b=J6Q52nz2Ah4f6Ny2m8ajLE6/FUSDRjQ4bBl+EcxXcpgkCsOG0Nt3865VKIBMiYPF5z fZBh95LLCI5jcYdYPXAKwZmDq8txSlEt42BEUoIfz+8okNwjZTV0flNXxztiGlH+EgZ0 bb5KmbF38rbykmYFkZ4XFi81giiGKhAPLCWdbuSf6kQvAn/ugWC41YTGtS1ikGWuef0p zfACA8rNMPKpGE3ikQ8NZUZeDDUVMHWl94ebJvEHGEnqygoux9b+uAJVBfj6QnnX7+4Q GsE80zs6D5YeJLjMjtRo4miO8aE2V4G8zja2p7CBJpFg0ldxOM1xUikH2K7mb0oBzsRl WQzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=o2JkDkvRfilHqJ/RB1o6euRmazXxKBWou9qp9sF2Kvg=; b=QI2uDdZ0lya8qPu9omvIACGyNRPSLgnqhmHWMLoCrUP6FOPi7+0DifxzjBpeK5HYX3 IF9YTmls1TTHGtj68Q18nvbjfNZEkorfvopqvtHM3zuHW+uHPZjd7jwgPISBr7cmAbad mL9K/M/CEuK2D/k3FbENh9DmREJNhbv2QpjYTQsRXz1FiwNXXvUWfV9Mhtnx8aLIt1Ae EK07Z0c0u+IPx9H79FhOmAOtK6KgHivtuEXoQQhZ6dnMm6SNhrwjTlbyxQN6yp/eWCmx XPPfZOYc1QJDtKnWMi/DDGhruQEwsNyI9SAi7XnaD0fPUYQEIB8M33B9iWP/NTfXY/F2 t/cA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0FFnXYXF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d26si4236056ejr.361.2019.11.08.11.16.46; Fri, 08 Nov 2019 11:17:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0FFnXYXF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390769AbfKHTDa (ORCPT + 99 others); Fri, 8 Nov 2019 14:03:30 -0500 Received: from mail.kernel.org ([198.145.29.99]:33140 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732342AbfKHTD2 (ORCPT ); Fri, 8 Nov 2019 14:03:28 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7173B2087E; Fri, 8 Nov 2019 19:03:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573239807; bh=fSFSw5Ejlq/r2im359kXPiTa6jPTCvToQ8CMGigP3Ug=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0FFnXYXFShJGmhRbaJlNV64nfPq1PMpDY/xUmSOPRK4kBqDXHi8RwM4urwG5/6Ro9 rVpaKS0MrUvV+bJFSTdGvqF/xq1Bix6Zn4Q8NOLJCcSq/rY9E8bfjoEgbgTXFG4ZWY MorB6S8nKumValhLhUP9zLc6eyRQ514j+ZRuG9BA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Doug Berger , Florian Fainelli , "David S. Miller" Subject: [PATCH 4.19 67/79] net: bcmgenet: reset 40nm EPHY on energy detect Date: Fri, 8 Nov 2019 19:50:47 +0100 Message-Id: <20191108174823.043570964@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174745.495640141@linuxfoundation.org> References: <20191108174745.495640141@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Doug Berger [ Upstream commit 25382b991d252aed961cd434176240f9de6bb15f ] The EPHY integrated into the 40nm Set-Top Box devices can falsely detect energy when connected to a disabled peer interface. When the peer interface is enabled the EPHY will detect and report the link as active, but on occasion may get into a state where it is not able to exchange data with the connected GENET MAC. This issue has not been observed when the link parameters are auto-negotiated; however, it has been observed with a manually configured link. It has been empirically determined that issuing a soft reset to the EPHY when energy is detected prevents it from getting into this bad state. Fixes: 1c1008c793fa ("net: bcmgenet: add main driver file") Signed-off-by: Doug Berger Acked-by: Florian Fainelli Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/broadcom/genet/bcmgenet.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) --- a/drivers/net/ethernet/broadcom/genet/bcmgenet.c +++ b/drivers/net/ethernet/broadcom/genet/bcmgenet.c @@ -2020,6 +2020,8 @@ static void bcmgenet_link_intr_enable(st */ if (priv->internal_phy) { int0_enable |= UMAC_IRQ_LINK_EVENT; + if (GENET_IS_V1(priv) || GENET_IS_V2(priv) || GENET_IS_V3(priv)) + int0_enable |= UMAC_IRQ_PHY_DET_R; } else if (priv->ext_phy) { int0_enable |= UMAC_IRQ_LINK_EVENT; } else if (priv->phy_interface == PHY_INTERFACE_MODE_MOCA) { @@ -2618,9 +2620,14 @@ static void bcmgenet_irq_task(struct wor priv->irq0_stat = 0; spin_unlock_irq(&priv->lock); + if (status & UMAC_IRQ_PHY_DET_R && + priv->dev->phydev->autoneg != AUTONEG_ENABLE) + phy_init_hw(priv->dev->phydev); + /* Link UP/DOWN event */ if (status & UMAC_IRQ_LINK_EVENT) phy_mac_interrupt(priv->dev->phydev); + } /* bcmgenet_isr1: handle Rx and Tx priority queues */ @@ -2715,7 +2722,7 @@ static irqreturn_t bcmgenet_isr0(int irq } /* all other interested interrupts handled in bottom half */ - status &= UMAC_IRQ_LINK_EVENT; + status &= (UMAC_IRQ_LINK_EVENT | UMAC_IRQ_PHY_DET_R); if (status) { /* Save irq status for bottom-half processing. */ spin_lock_irqsave(&priv->lock, flags);