Commit 01d0e110 authored by Paolo Abeni's avatar Paolo Abeni

Merge branch 'net-lan966x-enable-ptp-on-bridge-interfaces'

Horatiu Vultur says:

====================
net: lan966x: Enable PTP on bridge interfaces

Before it was not allowed to run ptp on ports that are part of a bridge
because in case of transparent clock the HW will still forward the frames
so there would be duplicate frames.
Now that there is VCAP support, it is possible to add entries in the VCAP
to trap frames to the CPU and the CPU will forward these frames.
The first part of the patch series, extends the VCAP support to be able to
modify and get the rule, while the last patch uses the VCAP to trap the ptp
frames.
====================

Link: https://lore.kernel.org/r/20221203104348.1749811-1-horatiu.vultur@microchip.comSigned-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
parents c9f8d736 72df3489
...@@ -443,11 +443,22 @@ static int lan966x_port_ioctl(struct net_device *dev, struct ifreq *ifr, ...@@ -443,11 +443,22 @@ static int lan966x_port_ioctl(struct net_device *dev, struct ifreq *ifr,
int cmd) int cmd)
{ {
struct lan966x_port *port = netdev_priv(dev); struct lan966x_port *port = netdev_priv(dev);
int err;
if (cmd == SIOCSHWTSTAMP) {
err = lan966x_ptp_setup_traps(port, ifr);
if (err)
return err;
}
if (!phy_has_hwtstamp(dev->phydev) && port->lan966x->ptp) { if (!phy_has_hwtstamp(dev->phydev) && port->lan966x->ptp) {
switch (cmd) { switch (cmd) {
case SIOCSHWTSTAMP: case SIOCSHWTSTAMP:
return lan966x_ptp_hwtstamp_set(port, ifr); err = lan966x_ptp_hwtstamp_set(port, ifr);
if (err)
lan966x_ptp_del_traps(port);
return err;
case SIOCGHWTSTAMP: case SIOCGHWTSTAMP:
return lan966x_ptp_hwtstamp_get(port, ifr); return lan966x_ptp_hwtstamp_get(port, ifr);
} }
...@@ -456,7 +467,11 @@ static int lan966x_port_ioctl(struct net_device *dev, struct ifreq *ifr, ...@@ -456,7 +467,11 @@ static int lan966x_port_ioctl(struct net_device *dev, struct ifreq *ifr,
if (!dev->phydev) if (!dev->phydev)
return -ENODEV; return -ENODEV;
return phy_mii_ioctl(dev->phydev, ifr, cmd); err = phy_mii_ioctl(dev->phydev, ifr, cmd);
if (err && cmd == SIOCSHWTSTAMP)
lan966x_ptp_del_traps(port);
return err;
} }
static const struct net_device_ops lan966x_port_netdev_ops = { static const struct net_device_ops lan966x_port_netdev_ops = {
......
...@@ -88,6 +88,10 @@ ...@@ -88,6 +88,10 @@
#define SE_IDX_QUEUE 0 /* 0-79 : Queue scheduler elements */ #define SE_IDX_QUEUE 0 /* 0-79 : Queue scheduler elements */
#define SE_IDX_PORT 80 /* 80-89 : Port schedular elements */ #define SE_IDX_PORT 80 /* 80-89 : Port schedular elements */
#define LAN966X_VCAP_CID_IS2_L0 VCAP_CID_INGRESS_STAGE2_L0 /* IS2 lookup 0 */
#define LAN966X_VCAP_CID_IS2_L1 VCAP_CID_INGRESS_STAGE2_L1 /* IS2 lookup 1 */
#define LAN966X_VCAP_CID_IS2_MAX (VCAP_CID_INGRESS_STAGE2_L2 - 1) /* IS2 Max */
/* MAC table entry types. /* MAC table entry types.
* ENTRYTYPE_NORMAL is subject to aging. * ENTRYTYPE_NORMAL is subject to aging.
* ENTRYTYPE_LOCKED is not subject to aging. * ENTRYTYPE_LOCKED is not subject to aging.
...@@ -116,6 +120,14 @@ enum lan966x_fdma_action { ...@@ -116,6 +120,14 @@ enum lan966x_fdma_action {
FDMA_REDIRECT, FDMA_REDIRECT,
}; };
/* Controls how PORT_MASK is applied */
enum LAN966X_PORT_MASK_MODE {
LAN966X_PMM_NO_ACTION,
LAN966X_PMM_REPLACE,
LAN966X_PMM_FORWARDING,
LAN966X_PMM_REDIRECT,
};
struct lan966x_port; struct lan966x_port;
struct lan966x_db { struct lan966x_db {
...@@ -473,6 +485,8 @@ irqreturn_t lan966x_ptp_irq_handler(int irq, void *args); ...@@ -473,6 +485,8 @@ irqreturn_t lan966x_ptp_irq_handler(int irq, void *args);
irqreturn_t lan966x_ptp_ext_irq_handler(int irq, void *args); irqreturn_t lan966x_ptp_ext_irq_handler(int irq, void *args);
u32 lan966x_ptp_get_period_ps(void); u32 lan966x_ptp_get_period_ps(void);
int lan966x_ptp_gettime64(struct ptp_clock_info *ptp, struct timespec64 *ts); int lan966x_ptp_gettime64(struct ptp_clock_info *ptp, struct timespec64 *ts);
int lan966x_ptp_setup_traps(struct lan966x_port *port, struct ifreq *ifr);
int lan966x_ptp_del_traps(struct lan966x_port *port);
int lan966x_fdma_xmit(struct sk_buff *skb, __be32 *ifh, struct net_device *dev); int lan966x_fdma_xmit(struct sk_buff *skb, __be32 *ifh, struct net_device *dev);
int lan966x_fdma_xmit_xdpf(struct lan966x_port *port, int lan966x_fdma_xmit_xdpf(struct lan966x_port *port,
......
...@@ -3,6 +3,8 @@ ...@@ -3,6 +3,8 @@
#include <linux/ptp_classify.h> #include <linux/ptp_classify.h>
#include "lan966x_main.h" #include "lan966x_main.h"
#include "vcap_api.h"
#include "vcap_api_client.h"
#define LAN966X_MAX_PTP_ID 512 #define LAN966X_MAX_PTP_ID 512
...@@ -18,6 +20,17 @@ ...@@ -18,6 +20,17 @@
#define TOD_ACC_PIN 0x7 #define TOD_ACC_PIN 0x7
/* This represents the base rule ID for the PTP rules that are added in the
* VCAP to trap frames to CPU. This number needs to be bigger than the maximum
* number of entries that can exist in the VCAP.
*/
#define LAN966X_VCAP_PTP_RULE_ID 1000000
#define LAN966X_VCAP_L2_PTP_TRAP (LAN966X_VCAP_PTP_RULE_ID + 0)
#define LAN966X_VCAP_IPV4_EV_PTP_TRAP (LAN966X_VCAP_PTP_RULE_ID + 1)
#define LAN966X_VCAP_IPV4_GEN_PTP_TRAP (LAN966X_VCAP_PTP_RULE_ID + 2)
#define LAN966X_VCAP_IPV6_EV_PTP_TRAP (LAN966X_VCAP_PTP_RULE_ID + 3)
#define LAN966X_VCAP_IPV6_GEN_PTP_TRAP (LAN966X_VCAP_PTP_RULE_ID + 4)
enum { enum {
PTP_PIN_ACTION_IDLE = 0, PTP_PIN_ACTION_IDLE = 0,
PTP_PIN_ACTION_LOAD, PTP_PIN_ACTION_LOAD,
...@@ -35,19 +48,228 @@ static u64 lan966x_ptp_get_nominal_value(void) ...@@ -35,19 +48,228 @@ static u64 lan966x_ptp_get_nominal_value(void)
return 0x304d4873ecade305; return 0x304d4873ecade305;
} }
static int lan966x_ptp_add_trap(struct lan966x_port *port,
int (*add_ptp_key)(struct vcap_rule *vrule,
struct lan966x_port*),
u32 rule_id,
u16 proto)
{
struct lan966x *lan966x = port->lan966x;
struct vcap_rule *vrule;
int err;
vrule = vcap_get_rule(lan966x->vcap_ctrl, rule_id);
if (vrule) {
u32 value, mask;
/* Just modify the ingress port mask and exit */
vcap_rule_get_key_u32(vrule, VCAP_KF_IF_IGR_PORT_MASK,
&value, &mask);
mask &= ~BIT(port->chip_port);
vcap_rule_mod_key_u32(vrule, VCAP_KF_IF_IGR_PORT_MASK,
value, mask);
err = vcap_mod_rule(vrule);
goto free_rule;
}
vrule = vcap_alloc_rule(lan966x->vcap_ctrl, port->dev,
LAN966X_VCAP_CID_IS2_L0,
VCAP_USER_PTP, 0, rule_id);
if (!vrule)
return -ENOMEM;
if (IS_ERR(vrule))
return PTR_ERR(vrule);
err = add_ptp_key(vrule, port);
if (err)
goto free_rule;
err = vcap_set_rule_set_actionset(vrule, VCAP_AFS_BASE_TYPE);
err |= vcap_rule_add_action_bit(vrule, VCAP_AF_CPU_COPY_ENA, VCAP_BIT_1);
err |= vcap_rule_add_action_u32(vrule, VCAP_AF_MASK_MODE, LAN966X_PMM_REPLACE);
err |= vcap_val_rule(vrule, proto);
if (err)
goto free_rule;
err = vcap_add_rule(vrule);
free_rule:
/* Free the local copy of the rule */
vcap_free_rule(vrule);
return err;
}
static int lan966x_ptp_del_trap(struct lan966x_port *port,
u32 rule_id)
{
struct lan966x *lan966x = port->lan966x;
struct vcap_rule *vrule;
u32 value, mask;
int err;
vrule = vcap_get_rule(lan966x->vcap_ctrl, rule_id);
if (!vrule)
return -EEXIST;
vcap_rule_get_key_u32(vrule, VCAP_KF_IF_IGR_PORT_MASK, &value, &mask);
mask |= BIT(port->chip_port);
/* No other port requires this trap, so it is safe to remove it */
if (mask == GENMASK(lan966x->num_phys_ports, 0)) {
err = vcap_del_rule(lan966x->vcap_ctrl, port->dev, rule_id);
goto free_rule;
}
vcap_rule_mod_key_u32(vrule, VCAP_KF_IF_IGR_PORT_MASK, value, mask);
err = vcap_mod_rule(vrule);
free_rule:
vcap_free_rule(vrule);
return err;
}
static int lan966x_ptp_add_l2_key(struct vcap_rule *vrule,
struct lan966x_port *port)
{
return vcap_rule_add_key_u32(vrule, VCAP_KF_ETYPE, ETH_P_1588, ~0);
}
static int lan966x_ptp_add_ip_event_key(struct vcap_rule *vrule,
struct lan966x_port *port)
{
return vcap_rule_add_key_u32(vrule, VCAP_KF_L4_DPORT, PTP_EV_PORT, ~0) ||
vcap_rule_add_key_bit(vrule, VCAP_KF_TCP_IS, VCAP_BIT_0);
}
static int lan966x_ptp_add_ip_general_key(struct vcap_rule *vrule,
struct lan966x_port *port)
{
return vcap_rule_add_key_u32(vrule, VCAP_KF_L4_DPORT, PTP_GEN_PORT, ~0) ||
vcap_rule_add_key_bit(vrule, VCAP_KF_TCP_IS, VCAP_BIT_0);
}
static int lan966x_ptp_add_l2_rule(struct lan966x_port *port)
{
return lan966x_ptp_add_trap(port, lan966x_ptp_add_l2_key,
LAN966X_VCAP_L2_PTP_TRAP, ETH_P_ALL);
}
static int lan966x_ptp_add_ipv4_rules(struct lan966x_port *port)
{
int err;
err = lan966x_ptp_add_trap(port, lan966x_ptp_add_ip_event_key,
LAN966X_VCAP_IPV4_EV_PTP_TRAP, ETH_P_IP);
if (err)
return err;
err = lan966x_ptp_add_trap(port, lan966x_ptp_add_ip_general_key,
LAN966X_VCAP_IPV4_GEN_PTP_TRAP, ETH_P_IP);
if (err)
lan966x_ptp_del_trap(port, LAN966X_VCAP_IPV4_EV_PTP_TRAP);
return err;
}
static int lan966x_ptp_add_ipv6_rules(struct lan966x_port *port)
{
int err;
err = lan966x_ptp_add_trap(port, lan966x_ptp_add_ip_event_key,
LAN966X_VCAP_IPV6_EV_PTP_TRAP, ETH_P_IPV6);
if (err)
return err;
err = lan966x_ptp_add_trap(port, lan966x_ptp_add_ip_general_key,
LAN966X_VCAP_IPV6_GEN_PTP_TRAP, ETH_P_IPV6);
if (err)
lan966x_ptp_del_trap(port, LAN966X_VCAP_IPV6_EV_PTP_TRAP);
return err;
}
static int lan966x_ptp_del_l2_rule(struct lan966x_port *port)
{
return lan966x_ptp_del_trap(port, LAN966X_VCAP_L2_PTP_TRAP);
}
static int lan966x_ptp_del_ipv4_rules(struct lan966x_port *port)
{
int err;
err = lan966x_ptp_del_trap(port, LAN966X_VCAP_IPV4_EV_PTP_TRAP);
err |= lan966x_ptp_del_trap(port, LAN966X_VCAP_IPV4_GEN_PTP_TRAP);
return err;
}
static int lan966x_ptp_del_ipv6_rules(struct lan966x_port *port)
{
int err;
err = lan966x_ptp_del_trap(port, LAN966X_VCAP_IPV6_EV_PTP_TRAP);
err |= lan966x_ptp_del_trap(port, LAN966X_VCAP_IPV6_GEN_PTP_TRAP);
return err;
}
static int lan966x_ptp_add_traps(struct lan966x_port *port)
{
int err;
err = lan966x_ptp_add_l2_rule(port);
if (err)
goto err_l2;
err = lan966x_ptp_add_ipv4_rules(port);
if (err)
goto err_ipv4;
err = lan966x_ptp_add_ipv6_rules(port);
if (err)
goto err_ipv6;
return err;
err_ipv6:
lan966x_ptp_del_ipv4_rules(port);
err_ipv4:
lan966x_ptp_del_l2_rule(port);
err_l2:
return err;
}
int lan966x_ptp_del_traps(struct lan966x_port *port)
{
int err;
err = lan966x_ptp_del_l2_rule(port);
err |= lan966x_ptp_del_ipv4_rules(port);
err |= lan966x_ptp_del_ipv6_rules(port);
return err;
}
int lan966x_ptp_setup_traps(struct lan966x_port *port, struct ifreq *ifr)
{
struct hwtstamp_config cfg;
if (copy_from_user(&cfg, ifr->ifr_data, sizeof(cfg)))
return -EFAULT;
if (cfg.rx_filter == HWTSTAMP_FILTER_NONE)
return lan966x_ptp_del_traps(port);
else
return lan966x_ptp_add_traps(port);
}
int lan966x_ptp_hwtstamp_set(struct lan966x_port *port, struct ifreq *ifr) int lan966x_ptp_hwtstamp_set(struct lan966x_port *port, struct ifreq *ifr)
{ {
struct lan966x *lan966x = port->lan966x; struct lan966x *lan966x = port->lan966x;
struct hwtstamp_config cfg; struct hwtstamp_config cfg;
struct lan966x_phc *phc; struct lan966x_phc *phc;
/* For now don't allow to run ptp on ports that are part of a bridge,
* because in case of transparent clock the HW will still forward the
* frames, so there would be duplicate frames
*/
if (lan966x->bridge_mask & BIT(port->chip_port))
return -EINVAL;
if (copy_from_user(&cfg, ifr->ifr_data, sizeof(cfg))) if (copy_from_user(&cfg, ifr->ifr_data, sizeof(cfg)))
return -EFAULT; return -EFAULT;
......
...@@ -4,14 +4,6 @@ ...@@ -4,14 +4,6 @@
#include "vcap_api.h" #include "vcap_api.h"
#include "vcap_api_client.h" #include "vcap_api_client.h"
/* Controls how PORT_MASK is applied */
enum LAN966X_PORT_MASK_MODE {
LAN966X_PMM_NO_ACTION,
LAN966X_PMM_REPLACE,
LAN966X_PMM_FORWARDING,
LAN966X_PMM_REDIRECT,
};
struct lan966x_tc_flower_parse_usage { struct lan966x_tc_flower_parse_usage {
struct flow_cls_offload *f; struct flow_cls_offload *f;
struct flow_rule *frule; struct flow_rule *frule;
......
...@@ -5,10 +5,6 @@ ...@@ -5,10 +5,6 @@
#include "vcap_api.h" #include "vcap_api.h"
#include "vcap_api_client.h" #include "vcap_api_client.h"
#define LAN966X_VCAP_CID_IS2_L0 VCAP_CID_INGRESS_STAGE2_L0 /* IS2 lookup 0 */
#define LAN966X_VCAP_CID_IS2_L1 VCAP_CID_INGRESS_STAGE2_L1 /* IS2 lookup 1 */
#define LAN966X_VCAP_CID_IS2_MAX (VCAP_CID_INGRESS_STAGE2_L2 - 1) /* IS2 Max */
#define STREAMSIZE (64 * 4) #define STREAMSIZE (64 * 4)
#define LAN966X_IS2_LOOKUPS 2 #define LAN966X_IS2_LOOKUPS 2
...@@ -219,9 +215,12 @@ static void lan966x_vcap_add_default_fields(struct net_device *dev, ...@@ -219,9 +215,12 @@ static void lan966x_vcap_add_default_fields(struct net_device *dev,
struct vcap_rule *rule) struct vcap_rule *rule)
{ {
struct lan966x_port *port = netdev_priv(dev); struct lan966x_port *port = netdev_priv(dev);
u32 value, mask;
vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK, 0, if (vcap_rule_get_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK,
~BIT(port->chip_port)); &value, &mask))
vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK, 0,
~BIT(port->chip_port));
if (lan966x_vcap_is_first_chain(rule)) if (lan966x_vcap_is_first_chain(rule))
vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
......
...@@ -170,6 +170,10 @@ int vcap_add_rule(struct vcap_rule *rule); ...@@ -170,6 +170,10 @@ int vcap_add_rule(struct vcap_rule *rule);
int vcap_del_rule(struct vcap_control *vctrl, struct net_device *ndev, u32 id); int vcap_del_rule(struct vcap_control *vctrl, struct net_device *ndev, u32 id);
/* Make a full copy of an existing rule with a new rule id */ /* Make a full copy of an existing rule with a new rule id */
struct vcap_rule *vcap_copy_rule(struct vcap_rule *rule); struct vcap_rule *vcap_copy_rule(struct vcap_rule *rule);
/* Get rule from a VCAP instance */
struct vcap_rule *vcap_get_rule(struct vcap_control *vctrl, u32 id);
/* Update existing rule */
int vcap_mod_rule(struct vcap_rule *rule);
/* Update the keyset for the rule */ /* Update the keyset for the rule */
int vcap_set_rule_set_keyset(struct vcap_rule *rule, int vcap_set_rule_set_keyset(struct vcap_rule *rule,
...@@ -254,4 +258,8 @@ int vcap_rule_mod_action_u32(struct vcap_rule *rule, ...@@ -254,4 +258,8 @@ int vcap_rule_mod_action_u32(struct vcap_rule *rule,
enum vcap_action_field action, enum vcap_action_field action,
u32 value); u32 value);
/* Get a 32 bit key field value and mask from the rule */
int vcap_rule_get_key_u32(struct vcap_rule *rule, enum vcap_key_field key,
u32 *value, u32 *mask);
#endif /* __VCAP_API_CLIENT__ */ #endif /* __VCAP_API_CLIENT__ */
...@@ -96,4 +96,18 @@ const char *vcap_actionset_name(struct vcap_control *vctrl, ...@@ -96,4 +96,18 @@ const char *vcap_actionset_name(struct vcap_control *vctrl,
const char *vcap_actionfield_name(struct vcap_control *vctrl, const char *vcap_actionfield_name(struct vcap_control *vctrl,
enum vcap_action_field action); enum vcap_action_field action);
/* Read key data from a VCAP address and discover if there are any rule keysets
* here
*/
int vcap_addr_keysets(struct vcap_control *vctrl, struct net_device *ndev,
struct vcap_admin *admin, int addr,
struct vcap_keyset_list *kslist);
/* Verify that the typegroup information, subword count, keyset and type id
* are in sync and correct, return the list of matchin keysets
*/
int vcap_find_keystream_keysets(struct vcap_control *vctrl, enum vcap_type vt,
u32 *keystream, u32 *mskstream, bool mask,
int sw_max, struct vcap_keyset_list *kslist);
#endif /* __VCAP_API_PRIVATE__ */ #endif /* __VCAP_API_PRIVATE__ */
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment