CC: [email protected]
CC: [email protected]
BCC: [email protected]
CC: Linux Memory Management List <[email protected]>
TO: Michael Walle <[email protected]>
CC: Jakub Kicinski <[email protected]>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 
master
head:   38a288f5941ef03752887ad86f2d85442358c99a
commit: 31d00ca4ce0e1abf5342854606bbe7d20e38c3f8 [7422/9759] net: phy: micrel: 
move the PHY timestamping check
:::::: branch date: 21 hours ago
:::::: commit date: 7 days ago
config: x86_64-randconfig-c007 
(https://download.01.org/0day-ci/archive/20220507/[email protected]/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 
5e004fb787698440a387750db7f8028e7cb14cfc)
reproduce (this is a W=1 build):
        wget 
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O 
~/bin/make.cross
        chmod +x ~/bin/make.cross
        # 
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=31d00ca4ce0e1abf5342854606bbe7d20e38c3f8
        git remote add linux-next 
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
        git fetch --no-tags linux-next master
        git checkout 31d00ca4ce0e1abf5342854606bbe7d20e38c3f8
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 
clang-analyzer 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <[email protected]>


clang-analyzer warnings: (new ones prefixed by >>)
   74 warnings generated.
   drivers/net/phy/icplus.c:107:3: warning: Value stored to 'err' is never read 
[clang-analyzer-deadcode.DeadStores]
                   err = mdiobus_read(phydev->mdio.bus, 30, 0);
                   ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/icplus.c:107:3: note: Value stored to 'err' is never read
                   err = mdiobus_read(phydev->mdio.bus, 30, 0);
                   ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/icplus.c:131:4: warning: Value stored to 'err' is never read 
[clang-analyzer-deadcode.DeadStores]
                           err = mdiobus_read(phydev->mdio.bus, i, MII_BMCR);
                           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/icplus.c:131:4: note: Value stored to 'err' is never read
                           err = mdiobus_read(phydev->mdio.bus, i, MII_BMCR);
                           ^     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   Suppressed 72 warnings (72 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   72 warnings generated.
   Suppressed 72 warnings (72 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   70 warnings generated.
   Suppressed 70 warnings (70 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   77 warnings generated.
   drivers/net/phy/micrel.c:1280:2: warning: Value stored to 'regval' is never 
read [clang-analyzer-deadcode.DeadStores]
           regval = phy_read(phydev, KSZ8873MLL_GLOBAL_CONTROL_4);
           ^        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:1280:2: note: Value stored to 'regval' is never read
           regval = phy_read(phydev, KSZ8873MLL_GLOBAL_CONTROL_4);
           ^        ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2222:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro 
'__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro 
'__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2222:3: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro 
'__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro 
'__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2530:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro 
'__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro 
'__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2530:3: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                   memset(&shhwtstamps, 0, sizeof(shhwtstamps));
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro 
'__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro 
'__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2576:3: warning: Call to function 'memset' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'memset_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro 
'__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro 
'__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2576:3: note: Call to function 'memset' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'memset_s' in case of C11
                   memset(shhwtstamps, 0, sizeof(*shhwtstamps));
                   ^
   include/linux/fortify-string.h:272:25: note: expanded from macro 'memset'
   #define memset(p, c, s) __fortify_memset_chk(p, c, s,                   \
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:265:2: note: expanded from macro 
'__fortify_memset_chk'
           __underlying_memset(p, c, __fortify_size);                      \
           ^~~~~~~~~~~~~~~~~~~
   include/linux/fortify-string.h:47:29: note: expanded from macro 
'__underlying_memset'
   #define __underlying_memset     __builtin_memset
                                   ^~~~~~~~~~~~~~~~
>> drivers/net/phy/micrel.c:2729:26: warning: Value stored to 'ptp_priv' during 
>> its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct kszphy_ptp_priv *ptp_priv = &priv->ptp_priv;
                                   ^~~~~~~~   ~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2729:26: note: Value stored to 'ptp_priv' during 
its initialization is never read
           struct kszphy_ptp_priv *ptp_priv = &priv->ptp_priv;
                                   ^~~~~~~~   ~~~~~~~~~~~~~~~
>> drivers/net/phy/micrel.c:2772:30: warning: Value stored to 'shared' during 
>> its initialization is never read [clang-analyzer-deadcode.DeadStores]
           struct lan8814_shared_priv *shared = phydev->shared->priv;
                                       ^~~~~~   ~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2772:30: note: Value stored to 'shared' during its 
initialization is never read
           struct lan8814_shared_priv *shared = phydev->shared->priv;
                                       ^~~~~~   ~~~~~~~~~~~~~~~~~~~~
   drivers/net/phy/micrel.c:2782:2: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(shared->ptp_clock_info.name, 30, "%s", phydev->drv->name);
           ^~~~~~~~
   drivers/net/phy/micrel.c:2782:2: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
           snprintf(shared->ptp_clock_info.name, 30, "%s", phydev->drv->name);
           ^~~~~~~~
   Suppressed 70 warnings (70 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use 
-system-headers to display errors from system headers as well.
   95 warnings generated.
   drivers/scsi/scsi_sysfs.c:139:8: warning: Call to function 'sscanf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sscanf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           res = sscanf(str, "%10s %10s %16s %c", s1, s2, s3, &junk);
                 ^~~~~~
   drivers/scsi/scsi_sysfs.c:139:8: note: Call to function 'sscanf' is insecure 
as it does not provide security checks introduced in the C11 standard. Replace 
with analogous functions that support length arguments or provides boundary 
checks such as 'sscanf_s' in case of C11
           res = sscanf(str, "%10s %10s %16s %c", s1, s2, s3, &junk);
                 ^~~~~~
   drivers/scsi/scsi_sysfs.c:231:9: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return snprintf(buf, 20, "%s\n", name);
                  ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:231:9: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
           return snprintf(buf, 20, "%s\n", name);
                  ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:244:9: warning: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   len = sprintf(buf, "%s", "Initiator");
                         ^~~~~~~
   drivers/scsi/scsi_sysfs.c:244:9: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
                   len = sprintf(buf, "%s", "Initiator");
                         ^~~~~~~
   drivers/scsi/scsi_sysfs.c:247:10: warning: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   len += sprintf(buf + len, "%s%s", len ? ", " : "", "Target");
                          ^~~~~~~
   drivers/scsi/scsi_sysfs.c:247:10: note: Call to function 'sprintf' is 
insecure as it does not provide bounding of the memory buffer or security 
checks introduced in the C11 standard. Replace with analogous functions that 
support length arguments or provides boundary checks such as 'sprintf_s' in 
case of C11
                   len += sprintf(buf + len, "%s%s", len ? ", " : "", "Target");
                          ^~~~~~~
   drivers/scsi/scsi_sysfs.c:249:9: warning: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           len += sprintf(buf + len, "\n");
                  ^~~~~~~
   drivers/scsi/scsi_sysfs.c:249:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           len += sprintf(buf + len, "\n");
                  ^~~~~~~
   drivers/scsi/scsi_sysfs.c:277:10: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return snprintf(buf, 20, "unknown\n");
                          ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:277:10: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
                   return snprintf(buf, 20, "unknown\n");
                          ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:327:10: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   return snprintf(buf, strlen("off") + 2, "off\n");
                          ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:327:10: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
                   return snprintf(buf, strlen("off") + 2, "off\n");
                          ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:328:9: warning: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           return sprintf(buf, "%u\n", shost->eh_deadline / HZ);
                  ^~~~~~~
   drivers/scsi/scsi_sysfs.c:328:9: note: Call to function 'sprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'sprintf_s' in case of C11
           return sprintf(buf, "%u\n", shost->eh_deadline / HZ);
                  ^~~~~~~
   drivers/scsi/scsi_sysfs.c:372:1: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   shost_rd_attr(unique_id, "%u\n");
   ^
   drivers/scsi/scsi_sysfs.c:177:45: note: expanded from macro 'shost_rd_attr'
   #define shost_rd_attr(field, format_string) \
                                               ^
   drivers/scsi/scsi_sysfs.c:174:2: note: expanded from macro '\shost_rd_attr2'
           shost_show_function(name, field, format_string)                 \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/scsi/scsi_sysfs.c:166:9: note: expanded from macro 
'shost_show_function'
           return snprintf (buf, 20, format_string, shost->field);         \
                  ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:372:1: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
   shost_rd_attr(unique_id, "%u\n");
   ^
   drivers/scsi/scsi_sysfs.c:177:45: note: expanded from macro 'shost_rd_attr'
   #define shost_rd_attr(field, format_string) \
                                               ^
   drivers/scsi/scsi_sysfs.c:174:2: note: expanded from macro '\shost_rd_attr2'
           shost_show_function(name, field, format_string)                 \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/scsi/scsi_sysfs.c:166:9: note: expanded from macro 
'shost_show_function'
           return snprintf (buf, 20, format_string, shost->field);         \
                  ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:373:1: warning: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11 
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   shost_rd_attr(cmd_per_lun, "%hd\n");
   ^
   drivers/scsi/scsi_sysfs.c:177:45: note: expanded from macro 'shost_rd_attr'
   #define shost_rd_attr(field, format_string) \
                                               ^
   drivers/scsi/scsi_sysfs.c:174:2: note: expanded from macro '\shost_rd_attr2'
           shost_show_function(name, field, format_string)                 \
           ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
   drivers/scsi/scsi_sysfs.c:166:9: note: expanded from macro 
'shost_show_function'
           return snprintf (buf, 20, format_string, shost->field);         \
                  ^~~~~~~~
   drivers/scsi/scsi_sysfs.c:373:1: note: Call to function 'snprintf' is 
insecure as it does not provide security checks introduced in the C11 standard. 
Replace with analogous functions that support length arguments or provides 
boundary checks such as 'snprintf_s' in case of C11
   shost_rd_attr(cmd_per_lun, "%hd\n");

vim +/ptp_priv +2729 drivers/net/phy/micrel.c

b3ec7248f1f4b9d Divya Koppera 2021-12-21  2725  
ece19502834d84e Divya Koppera 2022-03-04  2726  static void 
lan8814_ptp_init(struct phy_device *phydev)
ece19502834d84e Divya Koppera 2022-03-04  2727  {
ece19502834d84e Divya Koppera 2022-03-04  2728          struct kszphy_priv 
*priv = phydev->priv;
ece19502834d84e Divya Koppera 2022-03-04 @2729          struct kszphy_ptp_priv 
*ptp_priv = &priv->ptp_priv;
ece19502834d84e Divya Koppera 2022-03-04  2730          u32 temp;
ece19502834d84e Divya Koppera 2022-03-04  2731  
31d00ca4ce0e1ab Michael Walle 2022-04-27  2732          if 
(!IS_ENABLED(CONFIG_PTP_1588_CLOCK) ||
31d00ca4ce0e1ab Michael Walle 2022-04-27  2733              
!IS_ENABLED(CONFIG_NETWORK_PHY_TIMESTAMPING))
31d00ca4ce0e1ab Michael Walle 2022-04-27  2734                  return;
31d00ca4ce0e1ab Michael Walle 2022-04-27  2735  
ece19502834d84e Divya Koppera 2022-03-04  2736          
lanphy_write_page_reg(phydev, 5, TSU_HARD_RESET, TSU_HARD_RESET_);
ece19502834d84e Divya Koppera 2022-03-04  2737  
ece19502834d84e Divya Koppera 2022-03-04  2738          temp = 
lanphy_read_page_reg(phydev, 5, PTP_TX_MOD);
ece19502834d84e Divya Koppera 2022-03-04  2739          temp |= 
PTP_TX_MOD_BAD_UDPV4_CHKSUM_FORCE_FCS_DIS_;
ece19502834d84e Divya Koppera 2022-03-04  2740          
lanphy_write_page_reg(phydev, 5, PTP_TX_MOD, temp);
ece19502834d84e Divya Koppera 2022-03-04  2741  
ece19502834d84e Divya Koppera 2022-03-04  2742          temp = 
lanphy_read_page_reg(phydev, 5, PTP_RX_MOD);
ece19502834d84e Divya Koppera 2022-03-04  2743          temp |= 
PTP_RX_MOD_BAD_UDPV4_CHKSUM_FORCE_FCS_DIS_;
ece19502834d84e Divya Koppera 2022-03-04  2744          
lanphy_write_page_reg(phydev, 5, PTP_RX_MOD, temp);
ece19502834d84e Divya Koppera 2022-03-04  2745  
ece19502834d84e Divya Koppera 2022-03-04  2746          
lanphy_write_page_reg(phydev, 5, PTP_RX_PARSE_CONFIG, 0);
ece19502834d84e Divya Koppera 2022-03-04  2747          
lanphy_write_page_reg(phydev, 5, PTP_TX_PARSE_CONFIG, 0);
ece19502834d84e Divya Koppera 2022-03-04  2748  
ece19502834d84e Divya Koppera 2022-03-04  2749          /* Removing default 
registers configs related to L2 and IP */
ece19502834d84e Divya Koppera 2022-03-04  2750          
lanphy_write_page_reg(phydev, 5, PTP_TX_PARSE_L2_ADDR_EN, 0);
ece19502834d84e Divya Koppera 2022-03-04  2751          
lanphy_write_page_reg(phydev, 5, PTP_RX_PARSE_L2_ADDR_EN, 0);
ece19502834d84e Divya Koppera 2022-03-04  2752          
lanphy_write_page_reg(phydev, 5, PTP_TX_PARSE_IP_ADDR_EN, 0);
ece19502834d84e Divya Koppera 2022-03-04  2753          
lanphy_write_page_reg(phydev, 5, PTP_RX_PARSE_IP_ADDR_EN, 0);
ece19502834d84e Divya Koppera 2022-03-04  2754  
ece19502834d84e Divya Koppera 2022-03-04  2755          
skb_queue_head_init(&ptp_priv->tx_queue);
ece19502834d84e Divya Koppera 2022-03-04  2756          
skb_queue_head_init(&ptp_priv->rx_queue);
ece19502834d84e Divya Koppera 2022-03-04  2757          
INIT_LIST_HEAD(&ptp_priv->rx_ts_list);
ece19502834d84e Divya Koppera 2022-03-04  2758          
spin_lock_init(&ptp_priv->rx_ts_lock);
ece19502834d84e Divya Koppera 2022-03-04  2759  
ece19502834d84e Divya Koppera 2022-03-04  2760          ptp_priv->phydev = 
phydev;
ece19502834d84e Divya Koppera 2022-03-04  2761  
ece19502834d84e Divya Koppera 2022-03-04  2762          
ptp_priv->mii_ts.rxtstamp = lan8814_rxtstamp;
ece19502834d84e Divya Koppera 2022-03-04  2763          
ptp_priv->mii_ts.txtstamp = lan8814_txtstamp;
ece19502834d84e Divya Koppera 2022-03-04  2764          
ptp_priv->mii_ts.hwtstamp = lan8814_hwtstamp;
ece19502834d84e Divya Koppera 2022-03-04  2765          
ptp_priv->mii_ts.ts_info  = lan8814_ts_info;
ece19502834d84e Divya Koppera 2022-03-04  2766  
ece19502834d84e Divya Koppera 2022-03-04  2767          phydev->mii_ts = 
&ptp_priv->mii_ts;
ece19502834d84e Divya Koppera 2022-03-04  2768  }
ece19502834d84e Divya Koppera 2022-03-04  2769  
ece19502834d84e Divya Koppera 2022-03-04  2770  static int 
lan8814_ptp_probe_once(struct phy_device *phydev)
ece19502834d84e Divya Koppera 2022-03-04  2771  {
ece19502834d84e Divya Koppera 2022-03-04 @2772          struct 
lan8814_shared_priv *shared = phydev->shared->priv;
ece19502834d84e Divya Koppera 2022-03-04  2773  
31d00ca4ce0e1ab Michael Walle 2022-04-27  2774          if 
(!IS_ENABLED(CONFIG_PTP_1588_CLOCK) ||
31d00ca4ce0e1ab Michael Walle 2022-04-27  2775              
!IS_ENABLED(CONFIG_NETWORK_PHY_TIMESTAMPING))
31d00ca4ce0e1ab Michael Walle 2022-04-27  2776                  return 0;
31d00ca4ce0e1ab Michael Walle 2022-04-27  2777  
ece19502834d84e Divya Koppera 2022-03-04  2778          /* Initialise shared 
lock for clock*/
ece19502834d84e Divya Koppera 2022-03-04  2779          
mutex_init(&shared->shared_lock);
ece19502834d84e Divya Koppera 2022-03-04  2780  
ece19502834d84e Divya Koppera 2022-03-04  2781          
shared->ptp_clock_info.owner = THIS_MODULE;
ece19502834d84e Divya Koppera 2022-03-04  2782          
snprintf(shared->ptp_clock_info.name, 30, "%s", phydev->drv->name);
ece19502834d84e Divya Koppera 2022-03-04  2783          
shared->ptp_clock_info.max_adj = 31249999;
ece19502834d84e Divya Koppera 2022-03-04  2784          
shared->ptp_clock_info.n_alarm = 0;
ece19502834d84e Divya Koppera 2022-03-04  2785          
shared->ptp_clock_info.n_ext_ts = 0;
ece19502834d84e Divya Koppera 2022-03-04  2786          
shared->ptp_clock_info.n_pins = 0;
ece19502834d84e Divya Koppera 2022-03-04  2787          
shared->ptp_clock_info.pps = 0;
ece19502834d84e Divya Koppera 2022-03-04  2788          
shared->ptp_clock_info.pin_config = NULL;
ece19502834d84e Divya Koppera 2022-03-04  2789          
shared->ptp_clock_info.adjfine = lan8814_ptpci_adjfine;
ece19502834d84e Divya Koppera 2022-03-04  2790          
shared->ptp_clock_info.adjtime = lan8814_ptpci_adjtime;
ece19502834d84e Divya Koppera 2022-03-04  2791          
shared->ptp_clock_info.gettime64 = lan8814_ptpci_gettime64;
ece19502834d84e Divya Koppera 2022-03-04  2792          
shared->ptp_clock_info.settime64 = lan8814_ptpci_settime64;
ece19502834d84e Divya Koppera 2022-03-04  2793          
shared->ptp_clock_info.getcrosststamp = NULL;
ece19502834d84e Divya Koppera 2022-03-04  2794  
ece19502834d84e Divya Koppera 2022-03-04  2795          shared->ptp_clock = 
ptp_clock_register(&shared->ptp_clock_info,
ece19502834d84e Divya Koppera 2022-03-04  2796                                  
               &phydev->mdio.dev);
ece19502834d84e Divya Koppera 2022-03-04  2797          if 
(IS_ERR_OR_NULL(shared->ptp_clock)) {
ece19502834d84e Divya Koppera 2022-03-04  2798                  
phydev_err(phydev, "ptp_clock_register failed %lu\n",
ece19502834d84e Divya Koppera 2022-03-04  2799                             
PTR_ERR(shared->ptp_clock));
ece19502834d84e Divya Koppera 2022-03-04  2800                  return -EINVAL;
ece19502834d84e Divya Koppera 2022-03-04  2801          }
ece19502834d84e Divya Koppera 2022-03-04  2802  
ece19502834d84e Divya Koppera 2022-03-04  2803          phydev_dbg(phydev, 
"successfully registered ptp clock\n");
ece19502834d84e Divya Koppera 2022-03-04  2804  
ece19502834d84e Divya Koppera 2022-03-04  2805          shared->phydev = phydev;
ece19502834d84e Divya Koppera 2022-03-04  2806  
ece19502834d84e Divya Koppera 2022-03-04  2807          /* The EP.4 is shared 
between all the PHYs in the package and also it
ece19502834d84e Divya Koppera 2022-03-04  2808           * can be accessed by 
any of the PHYs
ece19502834d84e Divya Koppera 2022-03-04  2809           */
ece19502834d84e Divya Koppera 2022-03-04  2810          
lanphy_write_page_reg(phydev, 4, LTC_HARD_RESET, LTC_HARD_RESET_);
ece19502834d84e Divya Koppera 2022-03-04  2811          
lanphy_write_page_reg(phydev, 4, PTP_OPERATING_MODE,
ece19502834d84e Divya Koppera 2022-03-04  2812                                
PTP_OPERATING_MODE_STANDALONE_);
ece19502834d84e Divya Koppera 2022-03-04  2813  
ece19502834d84e Divya Koppera 2022-03-04  2814          return 0;
ece19502834d84e Divya Koppera 2022-03-04  2815  }
ece19502834d84e Divya Koppera 2022-03-04  2816  

:::::: The code at line 2729 was first introduced by commit
:::::: ece19502834d84ece2e056db28257ca2aa6e4d48 net: phy: micrel: 1588 support 
for LAN8814 phy

:::::: TO: Divya Koppera <[email protected]>
:::::: CC: David S. Miller <[email protected]>

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
_______________________________________________
kbuild mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to