From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Date: Wed, 02 May 2018 20:41:53 +0000 Subject: Re: [PATCH 0/2] sh_eth: complain on access to unimplemented TSU registers Message-Id: <20180502.164153.940230623258227296.davem@davemloft.net> List-Id: References: <4a17ab65-4d9c-897e-c340-7d86e0296f2f@cogentembedded.com> In-Reply-To: <4a17ab65-4d9c-897e-c340-7d86e0296f2f@cogentembedded.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: sergei.shtylyov@cogentembedded.com Cc: netdev@vger.kernel.org, linux-renesas-soc@vger.kernel.org, linux-sh@vger.kernel.org From: Sergei Shtylyov Date: Wed, 2 May 2018 22:53:23 +0300 > Here's a set of 2 patches against DaveM's 'net-next.git' repo. The 1st patch > routes TSU_POST register accesses thru sh_eth_tsu_{read|write}() and the 2nd > added WARN_ON() unimplemented register to those functions. I'm going to deal with > TSU_ADR{H|L} registers in a later series... > > [1/2] sh_eth: use TSU register accessors for TSU_POST > [2/2] sh_eth: WARN_ON() access to unimplemented TSU register Series applied to net-next, thanks.