Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1640325ybv; Fri, 21 Feb 2020 00:49:44 -0800 (PST) X-Google-Smtp-Source: APXvYqx37UV3O5f8GuA9mRFF4J2ZNAtwYEHcg1PZr70Br83/FNT/zgG6jf7IJEp1Ce34UVBKvbGL X-Received: by 2002:aca:4996:: with SMTP id w144mr1022963oia.111.1582274983939; Fri, 21 Feb 2020 00:49:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582274983; cv=none; d=google.com; s=arc-20160816; b=EsdUQv/gQiFwvh/wH0jU7OE+o0xDTEyTWuA1hnDpTolZx8G5cS8Izv6SXhb88bjLaz z+l15Wu+Z9VD2LgTrBChQGA3j5sbFrM9920wlo0cBsLoBUQ+mj02QZgngSLvup26RShn 9ERFfojQEKxkKq1ps9S80wpHBe5+4cX5LFgdi7yjTthsO/mhXQ7ZbjzXFxf2OaHPuDvB /9U221bqINm07NMTRFx2CfdPSGk2vBH60PS8PeSj8deYvdy96X1u08xFVEL1kNB/90/i 7p7ZF7eDRokDfxaZYeMh5eFZ4NsIJc7BaK9BMQY6SnVXGd4cLNwu46d4hk+8geV36KYO AmEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0c64tYGG/73K2VcYBAnC1xoOd6iyelCPtPMLGAs6TlA=; b=PG59OOrozo7/xJcDoDa1udElMIzgsGxS+HaFQZ4NJNsNVdw1607ZMINWw+X4oEjj+6 slIYZwm9SFv5FHv7rZofs+9/9s9ftF87vQa9BG4Yr64O7GSOzqJ44UeeeeUIe44A2HV9 GiZLLpGJE0BMgnZowL5f6FMAlJWjNaJCMEkFNe5SsBH9y0r2Nb85d8OC4bbbmxzaz1if 8XkHQjm0NaLArr+kUXP1u4iadjl1IwJD1pSoC1xg5jHlgUDJbH3SbBCz0OBdJyWDhB69 nf4bBcPZ21etPU2tAGsnHNj5bYb4D2aTrQuVKrlMMQSWu2Z9jYulrYPNslvITQ8u1lbV wsjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GXpG1ZcE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d20si1140093otq.157.2020.02.21.00.49.31; Fri, 21 Feb 2020 00:49:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GXpG1ZcE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728406AbgBUHpb (ORCPT + 99 others); Fri, 21 Feb 2020 02:45:31 -0500 Received: from mail.kernel.org ([198.145.29.99]:40654 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728398AbgBUHpa (ORCPT ); Fri, 21 Feb 2020 02:45:30 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5817924672; Fri, 21 Feb 2020 07:45:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271129; bh=fP4BNmy6YTGQ/kUrF8MftGazkbu/Bi3doDRYRXabpSA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GXpG1ZcEJSAvgvCwedBTrvzkKdXYSLumQztoXUTFKKU42vjyROeTOBISAP3aK8QAX VNjaqmCQZmtVKGTM35xEjMI3wL8Gvd4WpEEf1RWxcyXG8nn5ICbDitPT2oluNLgqW1 wGuIDLotkbgpF0htw5Yt6LiyCGoSIpX1cXB7JPcQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vladimir Oltean , Richard Cochran , "David S. Miller" , Sasha Levin Subject: [PATCH 5.5 033/399] gianfar: Fix TX timestamping with a stacked DSA driver Date: Fri, 21 Feb 2020 08:35:58 +0100 Message-Id: <20200221072405.596677008@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vladimir Oltean [ Upstream commit c26a2c2ddc0115eb088873f5c309cf46b982f522 ] The driver wrongly assumes that it is the only entity that can set the SKBTX_IN_PROGRESS bit of the current skb. Therefore, in the gfar_clean_tx_ring function, where the TX timestamp is collected if necessary, the aforementioned bit is used to discriminate whether or not the TX timestamp should be delivered to the socket's error queue. But a stacked driver such as a DSA switch can also set the SKBTX_IN_PROGRESS bit, which is actually exactly what it should do in order to denote that the hardware timestamping process is undergoing. Therefore, gianfar would misinterpret the "in progress" bit as being its own, and deliver a second skb clone in the socket's error queue, completely throwing off a PTP process which is not expecting to receive it, _even though_ TX timestamping is not enabled for gianfar. There have been discussions [0] as to whether non-MAC drivers need or not to set SKBTX_IN_PROGRESS at all (whose purpose is to avoid sending 2 timestamps, a sw and a hw one, to applications which only expect one). But as of this patch, there are at least 2 PTP drivers that would break in conjunction with gianfar: the sja1105 DSA switch and the felix switch, by way of its ocelot core driver. So regardless of that conclusion, fix the gianfar driver to not do stuff based on flags set by others and not intended for it. [0]: https://www.spinics.net/lists/netdev/msg619699.html Fixes: f0ee7acfcdd4 ("gianfar: Add hardware TX timestamping support") Signed-off-by: Vladimir Oltean Acked-by: Richard Cochran Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/freescale/gianfar.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/net/ethernet/freescale/gianfar.c b/drivers/net/ethernet/freescale/gianfar.c index 72868a28b621d..7d08bf6370ae1 100644 --- a/drivers/net/ethernet/freescale/gianfar.c +++ b/drivers/net/ethernet/freescale/gianfar.c @@ -2205,13 +2205,17 @@ static void gfar_clean_tx_ring(struct gfar_priv_tx_q *tx_queue) skb_dirtytx = tx_queue->skb_dirtytx; while ((skb = tx_queue->tx_skbuff[skb_dirtytx])) { + bool do_tstamp; + + do_tstamp = (skb_shinfo(skb)->tx_flags & SKBTX_HW_TSTAMP) && + priv->hwts_tx_en; frags = skb_shinfo(skb)->nr_frags; /* When time stamping, one additional TxBD must be freed. * Also, we need to dma_unmap_single() the TxPAL. */ - if (unlikely(skb_shinfo(skb)->tx_flags & SKBTX_IN_PROGRESS)) + if (unlikely(do_tstamp)) nr_txbds = frags + 2; else nr_txbds = frags + 1; @@ -2225,7 +2229,7 @@ static void gfar_clean_tx_ring(struct gfar_priv_tx_q *tx_queue) (lstatus & BD_LENGTH_MASK)) break; - if (unlikely(skb_shinfo(skb)->tx_flags & SKBTX_IN_PROGRESS)) { + if (unlikely(do_tstamp)) { next = next_txbd(bdp, base, tx_ring_size); buflen = be16_to_cpu(next->length) + GMAC_FCB_LEN + GMAC_TXPAL_LEN; @@ -2235,7 +2239,7 @@ static void gfar_clean_tx_ring(struct gfar_priv_tx_q *tx_queue) dma_unmap_single(priv->dev, be32_to_cpu(bdp->bufPtr), buflen, DMA_TO_DEVICE); - if (unlikely(skb_shinfo(skb)->tx_flags & SKBTX_IN_PROGRESS)) { + if (unlikely(do_tstamp)) { struct skb_shared_hwtstamps shhwtstamps; u64 *ns = (u64 *)(((uintptr_t)skb->data + 0x10) & ~0x7UL); -- 2.20.1