Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp816260lqb; Fri, 24 May 2024 14:27:52 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXkv/9wHgzFTJT1LfQIyEM9tpeIfkqBbHRzlaHjVyzAFAT/AKMIbhMmCXZ9n5uSf29CuSJltYv7XZlaSiIEJ3vNnGPruKc1TCP7tnAeHg== X-Google-Smtp-Source: AGHT+IEHHGBxpSFa08Jl/UCae54efUY9Y0YN61Qx//ZAx3UpUOJWOJ2mUpxHO49PMJqrxQ0frDBh X-Received: by 2002:a17:902:ecc7:b0:1e5:d0e3:b960 with SMTP id d9443c01a7336-1f4486bd79amr42913875ad.11.1716586072649; Fri, 24 May 2024 14:27:52 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716586072; cv=pass; d=google.com; s=arc-20160816; b=j0JspOcNV0A3qUVqjaHBVi/uxC4acxOdB2GSUKVTTK2F6VPYP/Km/Xsk3GQKDsTELa 3brI4JhHA2aWpHG4/MF31iY+u7Px8M+XMaB8QktTUlfKOoZKoWeC7Eah/Qe4le8Ia5Yd zrBQvRapc+zsmuQ2lUR84SasQCc1N86ZGu1z4xUqqDCsqFFhmjCEPYjKo7EebeUJpVlC suzYenlsj2Tlym9O63PL4pPKo+s4FOTrgupZnVRGkhwc++RHYl6PXnFzQpjWxVrx7m62 aDuUaXvSBDeFsjAkG+vq2SxVibPlEy3ihz6dg0+9oZKKBgEultuOkIaHUzLbSzl9Sn0q Mugw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=BBvkVB+4xDDjF7vawfQZr2UKRLImlEM7McAxqrR+4QQ=; fh=cQ89c+q/+FtxpgR/5pmNDIkAykDy+lg9Uy9Rvw+hw4M=; b=BsWTBtVaqDYB+Wu6mSm+ZUSmS7IY2ggOqge7ruDGQIzIf9vEiE0LMTzfCWNKzVHo4t wy+zdF5aA2tltWqJFRXNuPzkbPoLhXUcPh7MPjYJhl0z/1utgJjF4krn/lnnoOfrKfU8 5ekxHDsv6d8bvYIhDVS+KkS0W8ooRP6x7Pgnt1a16nfjs7p4hy8svmxqobw28i2lt6kd 7msIar5whlCYSsChdQ+5Pzq2GDjM2ERhjq6W6aKncNaDcdFDLaFMBkSSKSKu6BSbbOVn 3uH//qOV4/z8+1MAH6VuuP7TAakCn2Bjhkxrq8CRYw6jELy4c/znKauFPIW34Px00BkY tSqQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@lunn.ch header.s=20171124 header.b=pi03JtCu; arc=pass (i=1 spf=pass spfdomain=lunn.ch dkim=pass dkdomain=lunn.ch dmarc=pass fromdomain=lunn.ch); spf=pass (google.com: domain of linux-kernel+bounces-189147-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-189147-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=lunn.ch Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id d9443c01a7336-1f44c785cf7si19690735ad.66.2024.05.24.14.27.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 May 2024 14:27:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-189147-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@lunn.ch header.s=20171124 header.b=pi03JtCu; arc=pass (i=1 spf=pass spfdomain=lunn.ch dkim=pass dkdomain=lunn.ch dmarc=pass fromdomain=lunn.ch); spf=pass (google.com: domain of linux-kernel+bounces-189147-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-189147-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=lunn.ch Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 3DB1BB211C3 for ; Fri, 24 May 2024 21:27:49 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 16B9E86248; Fri, 24 May 2024 21:27:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=lunn.ch header.i=@lunn.ch header.b="pi03JtCu" Received: from vps0.lunn.ch (vps0.lunn.ch [156.67.10.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4E7EF745D6; Fri, 24 May 2024 21:27:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=156.67.10.101 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716586056; cv=none; b=V14xWwsRc5X3PERY5dYMCPyXVYeUvJn0A8PIXc1sFZLeZx0kGP8gcQimrSAL3H+X1xHlQfLbxZ2t/jRfDDJsIvPUhU12q+INOysW/3xXLJUk8+CqoGIxAAw9kJJVS/CdZ8zPO4LTG7yWvBF7cJ0tDbiHFbAbzUKaXPzfQk5oGFM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716586056; c=relaxed/simple; bh=rqtlw0z4hOj1gZm+shEm88N1id6NRVqqJzHHMUDNIlg=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=lbINSP6ufRj0vij0EVyMmH0g+9C+0XVQFRQ7q4Tyj1AvyWuuB9ELac7s7P8rjn72MaNOfEBqPKuDqNmCozN4+wwyN+swTyWHUbsEJHfOOBAjNypt7H7h3LfjqFnPd5xO+SPDhIpje3ZxX7hHzYV/Pkfuqi4M6Z8KssGFrsMhN1I= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=lunn.ch; spf=pass smtp.mailfrom=lunn.ch; dkim=pass (1024-bit key) header.d=lunn.ch header.i=@lunn.ch header.b=pi03JtCu; arc=none smtp.client-ip=156.67.10.101 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=lunn.ch Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=lunn.ch DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lunn.ch; s=20171124; h=In-Reply-To:Content-Transfer-Encoding:Content-Disposition: Content-Type:MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:From: Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Content-Disposition: In-Reply-To:References; bh=BBvkVB+4xDDjF7vawfQZr2UKRLImlEM7McAxqrR+4QQ=; b=pi 03JtCuK+O664Zt74745BE9SG+BZi4cuw8JbVhwXN5fVoN2mFcTIkFBz/C9XUXbj9v0JqHQPz+UTvR r0FaRjRoXNCGlerdDue5/I+KXlU5jnDOHYgp5BZcaCBXPl9NF7DNiqzZ49uGkxFyyxtOVVnolj3pX l1uzrZxsjZBptVg=; Received: from andrew by vps0.lunn.ch with local (Exim 4.94.2) (envelope-from ) id 1sAcRY-00Fyk0-R3; Fri, 24 May 2024 23:27:16 +0200 Date: Fri, 24 May 2024 23:27:16 +0200 From: Andrew Lunn To: Selvamani Rajagopal Cc: "Parthiban.Veerasooran@microchip.com" , "davem@davemloft.net" , "edumazet@google.com" , "kuba@kernel.org" , "pabeni@redhat.com" , "horms@kernel.org" , "saeedm@nvidia.com" , "anthony.l.nguyen@intel.com" , "netdev@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "corbet@lwn.net" , "linux-doc@vger.kernel.org" , "robh+dt@kernel.org" , "krzysztof.kozlowski+dt@linaro.org" , "conor+dt@kernel.org" , "devicetree@vger.kernel.org" , "Horatiu.Vultur@microchip.com" , "ruanjinjie@huawei.com" , "Steen.Hegelund@microchip.com" , "vladimir.oltean@nxp.com" , "UNGLinuxDriver@microchip.com" , "Thorsten.Kummermehr@microchip.com" , Piergiorgio Beruto , "Nicolas.Ferre@microchip.com" , "benjamin.bigler@bernformulastudent.ch" Subject: Re: [PATCH net-next v4 00/12] Add support for OPEN Alliance 10BASE-T1x MACPHY Serial Interface Message-ID: <6e4c8336-2783-45dd-b907-6b31cf0dae6c@lunn.ch> References: <20240418125648.372526-1-Parthiban.Veerasooran@microchip.com> <5f73edc0-1a25-4d03-be21-5b1aa9e933b2@lunn.ch> <32160a96-c031-4e5a-bf32-fd5d4dee727e@lunn.ch> <2d9f523b-99b7-485d-a20a-80d071226ac9@microchip.com> <6ba7e1c8-5f89-4a0e-931f-3c117ccc7558@lunn.ch> <8b9f8c10-e6bf-47df-ad83-eaf2590d8625@microchip.com> <44cd0dc2-4b37-4e2f-be47-85f4c0e9f69c@lunn.ch> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: > In our MDIO functions, we do certain things based on PHY ID, also > our driver deal with vendor specific register, MMS 12 (refer Table 6 > in section 9.1 That is a bad design. Vendor specific PHY registers should be in MMS 4 which is MMD 31, where the PHY driver can access them. Table 6 says: "PHY – Vendor Specific" for MMS 4, so clearly that is where the standards committee expected PHY vendor registers to be. Anyway, does the PHY driver actually need to access MMS 12? Or can the MAC driver do it? That is the same question i asked Ramón about the Microchip part. We really should avoid layering violations as much as we can, and we should not have the framework make it easy to violate layering. We want all such horrible hacks hidden in the MAC driver which needs such horrible hacks because of bad design. Andrew