Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp12983939rwl; Wed, 4 Jan 2023 01:37:33 -0800 (PST) X-Google-Smtp-Source: AMrXdXuVz9tq4miw3iBTHLK3MV4KEBG8SP9qcNf0uEp7jRev5RZ4ggEEAO6Bc0FOWHhrepceIA/y X-Received: by 2002:a05:6a20:659d:b0:b0:275d:3036 with SMTP id p29-20020a056a20659d00b000b0275d3036mr57165473pzh.24.1672825053143; Wed, 04 Jan 2023 01:37:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672825053; cv=none; d=google.com; s=arc-20160816; b=OP+1NETJIXf598sRX4VU2u3whRhv5tNp9Q8K6gDiCsPwXzofq1EKdySPL7hGm7z4Hh UQd5u+sct65F1xoQIcNcXTN5JrUVvxzepUqYXlSdMZY/lT/uHUEeOD8G6jMg8FieLAnB 86qANBo2l7R0G6Igbb4824Wa/tC67Vi1/HGQ0jRIkz+dpYhyUeFV7f3xRltwl0lJ/RYA P6CZRa9dSwUHiTTdqyDn+JlApZUATKV7fXZRq5P5KSmFs22ARg+ELjfNeQyCANWU6O/R 7qys769EehE/OFXCfss0aq/tmUX0tQ0zJLP1yL/WKfBbSTUDzhX9NtfF1Bq4tmTzAFD0 1ISw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Guv9i3IBMAcyy6vGd2Rh2K7r9Sr+srDgZmP+tXa6fOo=; b=kEHAgt5rf/C99YE97T7sUr/PDI+4/n6In4Q09XuIIEgHsXWbTx2GCqJR1Xz2nu4BMU 4URDBhxarrZNjRqaDFkU4mVHCnmvp+JX4BamJ/uzAUOaimJ0yxs/nL7ZTM29rkVNR68e hN92xuLC6z5L5SHxa2Hvl+QVvEks6Bxyc/TlfGOKUgIVBwsW9t2StS0DBXTsvN68ipvY gFYWOn4on6tQbZFl21yCXWbSyycy5kfjHz0S/IdalV82l4EObzB39JYmlxDkWKU1rVTm Bn0F7i9NmJ36msDfe40HIhdyDQ21cE/crsY9EOvJ9qK/ofJ/RaZzjUYCZN8TDJvoWqJg qeOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b=qAGnfVwh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i69-20020a638748000000b00478fd9c4cafsi34129293pge.784.2023.01.04.01.37.25; Wed, 04 Jan 2023 01:37:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b=qAGnfVwh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234283AbjADIqT (ORCPT + 57 others); Wed, 4 Jan 2023 03:46:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44686 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234371AbjADIpw (ORCPT ); Wed, 4 Jan 2023 03:45:52 -0500 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 855671B9E9; Wed, 4 Jan 2023 00:45:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1672821928; x=1704357928; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=TBiocUlMd4lgD3UieKC9lMwBVyukIc3JWqKRD/9Iuek=; b=qAGnfVwhtvHN5KC07/1gtb12B5+ogSubJy3fi5XKYtiN55ZdZ8m+120j di6DMuz6uM1erV026EYMUT0IXDddl97H5eegojgxBjWvd/ixhlKdoAHuW ivL8b5WZExntGdo5A17CkCHQOwA8zJswKVBvP1P5UR1Dsn5SJTULHXD4O 4d+FvSecdPbJxhhhefKLTke2gIkrWBlQQpJTc+UojQwbh0482Oa0Ej87X gRFWNp1Qbbe4WftMonzIoyfzgsMe5oa0c1e9y75B6fH87PMCO/nRJbwOf k+YhLxq5tiYwLZ8/FQ9cFjEvyMKTls6s/wLXZdmrTBtZJqMXYnwBBGt5r A==; X-IronPort-AV: E=Sophos;i="5.96,299,1665471600"; d="scan'208";a="130719920" Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa6.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 04 Jan 2023 01:45:27 -0700 Received: from chn-vm-ex02.mchp-main.com (10.10.85.144) by chn-vm-ex04.mchp-main.com (10.10.85.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Wed, 4 Jan 2023 01:45:25 -0700 Received: from CHE-LT-I17769U.microchip.com (10.10.115.15) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server id 15.1.2507.16 via Frontend Transport; Wed, 4 Jan 2023 01:45:19 -0700 From: Arun Ramadoss To: , CC: , , , , , , , , , , , , , Subject: [Patch net-next v7 06/13] net: ptp: add helper for one-step P2P clocks Date: Wed, 4 Jan 2023 14:13:09 +0530 Message-ID: <20230104084316.4281-7-arun.ramadoss@microchip.com> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20230104084316.4281-1-arun.ramadoss@microchip.com> References: <20230104084316.4281-1-arun.ramadoss@microchip.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christian Eggers For P2P delay measurement, the ingress time stamp of the PDelay_Req is required for the correction field of the PDelay_Resp. The application echoes back the correction field of the PDelay_Req when sending the PDelay_Resp. Some hardware (like the ZHAW InES PTP time stamping IP core) subtracts the ingress timestamp autonomously from the correction field, so that the hardware only needs to add the egress timestamp on tx. Other hardware (like the Microchip KSZ9563) reports the ingress time stamp via an interrupt and requires that the software provides this time stamp via tail-tag on tx. In order to avoid introducing a further application interface for this, the driver can simply emulate the behavior of the InES device and subtract the ingress time stamp in software from the correction field. On egress, the correction field can either be kept as it is (and the time stamp field in the tail-tag is set to zero) or move the value from the correction field back to the tail-tag. Changing the correction field requires updating the UDP checksum (if UDP is used as transport). Signed-off-by: Christian Eggers Co-developed-by: Arun Ramadoss Signed-off-by: Arun Ramadoss --- v1 -> v2 - Fixed compilation issue when PTP_CLASSIFY not selected in menuconfig as reported by kernel test robot --- include/linux/ptp_classify.h | 71 ++++++++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) diff --git a/include/linux/ptp_classify.h b/include/linux/ptp_classify.h index 2b6ea36ad162..6e5869c2504c 100644 --- a/include/linux/ptp_classify.h +++ b/include/linux/ptp_classify.h @@ -10,8 +10,12 @@ #ifndef _PTP_CLASSIFY_H_ #define _PTP_CLASSIFY_H_ +#include #include +#include #include +#include +#include #define PTP_CLASS_NONE 0x00 /* not a PTP event message */ #define PTP_CLASS_V1 0x01 /* protocol version 1 */ @@ -129,6 +133,67 @@ static inline u8 ptp_get_msgtype(const struct ptp_header *hdr, return msgtype; } +/** + * ptp_check_diff8 - Computes new checksum (when altering a 64-bit field) + * @old: old field value + * @new: new field value + * @oldsum: previous checksum + * + * This function can be used to calculate a new checksum when only a single + * field is changed. Similar as ip_vs_check_diff*() in ip_vs.h. + * + * Return: Updated checksum + */ +static inline __wsum ptp_check_diff8(__be64 old, __be64 new, __wsum oldsum) +{ + __be64 diff[2] = { ~old, new }; + + return csum_partial(diff, sizeof(diff), oldsum); +} + +/** + * ptp_header_update_correction - Update PTP header's correction field + * @skb: packet buffer + * @type: type of the packet (see ptp_classify_raw()) + * @hdr: ptp header + * @correction: new correction value + * + * This updates the correction field of a PTP header and updates the UDP + * checksum (if UDP is used as transport). It is needed for hardware capable of + * one-step P2P that does not already modify the correction field of Pdelay_Req + * event messages on ingress. + */ +static inline +void ptp_header_update_correction(struct sk_buff *skb, unsigned int type, + struct ptp_header *hdr, s64 correction) +{ + __be64 correction_old; + struct udphdr *uhdr; + + /* previous correction value is required for checksum update. */ + memcpy(&correction_old, &hdr->correction, sizeof(correction_old)); + + /* write new correction value */ + put_unaligned_be64((u64)correction, &hdr->correction); + + switch (type & PTP_CLASS_PMASK) { + case PTP_CLASS_IPV4: + case PTP_CLASS_IPV6: + /* locate udp header */ + uhdr = (struct udphdr *)((char *)hdr - sizeof(struct udphdr)); + break; + default: + return; + } + + /* update checksum */ + uhdr->check = csum_fold(ptp_check_diff8(correction_old, + hdr->correction, + ~csum_unfold(uhdr->check))); + if (!uhdr->check) + uhdr->check = CSUM_MANGLED_0; +} + /** * ptp_msg_is_sync - Evaluates whether the given skb is a PTP Sync message * @skb: packet buffer @@ -166,5 +231,11 @@ static inline bool ptp_msg_is_sync(struct sk_buff *skb, unsigned int type) { return false; } + +static inline +void ptp_header_update_correction(struct sk_buff *skb, unsigned int type, + struct ptp_header *hdr, s64 correction) +{ +} #endif #endif /* _PTP_CLASSIFY_H_ */ -- 2.36.1