Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1001121rwb; Thu, 8 Dec 2022 05:45:38 -0800 (PST) X-Google-Smtp-Source: AA0mqf4ynB7EIQYjdcZ7Pk5XwFt7zdWJolfERvmbZiH4T9RvdbOXhiPrxqD4tTqgwDwIkDzCR2Wc X-Received: by 2002:aa7:8487:0:b0:56c:3bb4:28a8 with SMTP id u7-20020aa78487000000b0056c3bb428a8mr77748814pfn.83.1670507137814; Thu, 08 Dec 2022 05:45:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670507137; cv=none; d=google.com; s=arc-20160816; b=coubAIWzgajhFJ4+k3PTX04ft8COHQ3bxLikNCtd5gYuoE74ysftLO6N0YREK3sHh0 QHqRn+6z+MXPCexF4lQiZIkgjDhfukvRGJDqZN82rXnhHJj36RQI6Le5SJ/UHR2DnatG 1yrR1ofiBKMNF/J06DK51ectFDmVq2poudMqGkdd8vVvvD19t3tIrhx7PgL6wKvU3zJp eF9DeXIMbSg7B2NMKKa20K8WuWgFsoh3CDZ0fx6AxOZlXqvjmOJJn+YXvIUSijBP69gM +ZnA6jCjqj6ENUoNqXkFAo3/3uI4Bw8SYm/N4IOrVyVNvuRwSP3YVBlu3lbspN6ppsuh l2wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:message-id:user-agent :references:in-reply-to:subject:cc:to:from:date:mime-version :dkim-signature; bh=4jyB2wbtKBgBT+c2Zs8ZvHK0RuGesrjKBEIPBovb0co=; b=yLbTQRSP53ZjplfMTziZ7HHJCZOrmiWe6OO3ddXNvwzM8X6zJXitXBkmdXtVrv5+mt cHyuZdw95BImkYo9giz1lxyXAbm0rVc2FOCAAKwfqZibGE4qi0hzrnCQEZ1oS0vvd9wh Qma4Nrwt07xA3gn7Y5DUs16wgWog86K+oCrj7/dRhGDMxsPPOMFOEyRVpY5JEaMR0XWL uug0UzLO4kcWOLYf7c/dDxfvwfvnjtYXiMioyE6zV+C+ug8gdFnrnFkcIPfotw0cIpoI wShU3F3XjA/EOv6rrbM2s6Si2JvePQ08C/gG1vG85WbP8adfLdsPrBOrWIppdqx3ruJ4 tyng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2022082101 header.b=C0550CKp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=walle.cc Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h9-20020a631209000000b0046040a8be4esi19824279pgl.754.2022.12.08.05.45.26; Thu, 08 Dec 2022 05:45:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2022082101 header.b=C0550CKp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=walle.cc Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230087AbiLHNSx (ORCPT + 72 others); Thu, 8 Dec 2022 08:18:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41218 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230259AbiLHNS3 (ORCPT ); Thu, 8 Dec 2022 08:18:29 -0500 Received: from mail.3ffe.de (0001.3ffe.de [159.69.201.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 50CE393A69; Thu, 8 Dec 2022 05:18:27 -0800 (PST) Received: from 3ffe.de (0001.3ffe.de [IPv6:2a01:4f8:c0c:9d57::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.3ffe.de (Postfix) with ESMTPSA id AC88C11C; Thu, 8 Dec 2022 14:18:25 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2022082101; t=1670505505; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4jyB2wbtKBgBT+c2Zs8ZvHK0RuGesrjKBEIPBovb0co=; b=C0550CKpyUhVSWbZs32ahL901dbjw729wBYSHBTSNA5Ygxq/TRNuznw75ZflLFW5I3RZ55 UOj5iRtS+eZRm0qu+JP4iwE+deD1fhAINcBhsS5GV6k5HFjVFxuqdZla72JZEGL2/cAAJz dPUw2FbETOsabkIFcgojFzWHpdresswxNK2PS3UuwwFtBrXSlEwSzRRPcRiXCy4JXH47lG NbTLPj/wql16sK980EfdP1YJCqDetbFkvH8WQYQXvxvIdkig1OPu0J/16IRaOMjvba+ZHj b4ptPSZAOYHd8pzyVN/VhDbNJv6SdaTKU2m8GQbpKcO3+Gub8oODn+9iIu7qFA== MIME-Version: 1.0 Date: Thu, 08 Dec 2022 14:18:25 +0100 From: Michael Walle To: Horatiu Vultur Cc: Steen.Hegelund@microchip.com, UNGLinuxDriver@microchip.com, daniel.machon@microchip.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, lars.povlsen@microchip.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, olteanv@gmail.com, pabeni@redhat.com, richardcochran@gmail.com Subject: Re: [PATCH net-next v3 4/4] net: lan966x: Add ptp trap rules In-Reply-To: <20221208130444.xshazhpg4e2utvjs@soft-dev3-1> References: <20221203104348.1749811-5-horatiu.vultur@microchip.com> <20221208092511.4122746-1-michael@walle.cc> <20221208130444.xshazhpg4e2utvjs@soft-dev3-1> User-Agent: Roundcube Webmail/1.4.13 Message-ID: X-Sender: michael@walle.cc Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Horatiu, Am 2022-12-08 14:04, schrieb Horatiu Vultur: >> > > Currently lan966x, doesn't allow to run PTP over interfaces that are >> > > part of the bridge. The reason is when the lan966x was receiving a >> > > PTP frame (regardless if L2/IPv4/IPv6) the HW it would flood this >> > > frame. >> > > Now that it is possible to add VCAP rules to the HW, such to trap >> > > these >> > > frames to the CPU, it is possible to run PTP also over interfaces that >> > > are part of the bridge. >> > >> > This gives me: >> > >> > # /etc/init.d/S65ptp4l start >> > Starting linuxptp daemon: OK >> > [ 44.136870] vcap_val_rule:1678: keyset was not updated: -22 >> > [ 44.140196] vcap_val_rule:1678: keyset was not updated: -22 >> > # >> > >> > # ptp4l -v >> > 3.1.1 >> > # uname -a >> > Linux buildroot 6.1.0-rc8-next-20221208+ #924 SMP Thu Dec 8 10:08:58 >> > CET 2022 armv7l GNU/Linux >> > >> > I don't know whats going on, but I'm happy to help with debugging with >> > some >> > guidance. >> >> Oh, and linuxptp is running on eth0, no bridges are set up. linuxptp >> is started with "/usr/sbin/ptp4l -f /etc/linuxptp.cfg" >> >> # cat /etc/linuxptp.cfg >> # LinuxPTP configuration file for synchronizing the system clock to >> # a remote PTP master in slave-only mode. >> # >> # By default synchronize time in slave-only mode using UDP and >> hardware >> time >> # stamps on eth0. If the difference to master is >1.0 second correct >> by >> # stepping the clock instead of adjusting the frequency. >> # >> # If you change the configuration don't forget to update the phc2sys >> # parameters accordingly in linuxptp-system-clock.service (systemd) >> # or the linuxptp SysV init script. >> >> [global] >> slaveOnly 1 >> delay_mechanism Auto >> network_transport UDPv4 >> time_stamping hardware >> step_threshold 1.0 >> >> [eth0] > > Thanks for trying this! Actually I was just booting my board which happens to have linuxptp started by default. And the error messages were new. But I'm not so sure anymore if PTP was really working. I'm still puzzled by reading your commit message. Was it already working for interfaces which aren't part of a bridge and this commit will make it work even for interfaces which are part of a bridge? > The issue is because you have not enabled the TCAM lookups per > port. They can be enabled using this commands: > > tc qdisc add dev eth0 clsact This gives me the following error, might be a missing kconfig option: # tc qdisc add dev eth0 clsact RTNETLINK answers: Operation not supported > tc filter add dev eth0 ingress prio 5 handle 5 matchall skip_sw action > goto chain 8000000 > > This will enable the lookup and then you should be able to start again > the ptp4l. Sorry for not mention this, at least I should have written > it > somewhere that this is required. > > I was not sure if lan966x should or not enable tcam lookups > automatically when a ptp trap action is added. I am open to suggestion > here. IMHO, from a user point of view this should just work. For a user there is no connection between running linuxptp and some filtering stuff with 'tc'. Also, if the answer to my question above is yes, and ptp should have worked on eth0 before, this is a regression then. -michael