Message ID | 20230106085317.1720282-1-steen.hegelund@microchip.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4e01:0:0:0:0:0 with SMTP id p1csp718668wrt; Fri, 6 Jan 2023 00:54:34 -0800 (PST) X-Google-Smtp-Source: AMrXdXvTWZHl9nZ4sc1DHtIZNylBTAZ99oOjiCcPyNQd7pev5xEfM52bJWB/vSSzHAQty8Esvgnr X-Received: by 2002:a17:907:a485:b0:7c1:709d:fa49 with SMTP id vp5-20020a170907a48500b007c1709dfa49mr59209270ejc.18.1672995274799; Fri, 06 Jan 2023 00:54:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672995274; cv=none; d=google.com; s=arc-20160816; b=AmN1OdUrD0KLswnSzdNhqYHDt7Ut/Txf6QhL3MlsnYOx9vSH49Y9RpRV1XFEo3G6tA uo1rjexTfsh+eZDvkUKEkwotpcdhjQXMB7M1fnDAdlnNSx3QyUSm2ml8auN4Zz0UFMAs MLR634dlzbDs+MEXcfKz0ixre+pbUHV2454m1/kKu/ZJEvET1stbvbFbXImM3lAqKrxV +5qtVkUdcCooUpmOl7ZGjZt9A9/RFi2gzuDigAmAE9o5t8AO0OBAJNwYC6DMLUOMhBmc Q9nD7hOor3BdNmmxYvpV38PVwCgTo6x4cTuyVLrrSNp4R3aGPSMNwBBz1sF5XAaRTLC/ tVxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=aoMetypWoAz6lNl/E6ZNgj9Zpty5+s1eJkrUdMwmgsA=; b=OUA/iTwgln924V5cBuijZFtH/nXKlZRSpT0t93zG0eUaazWd2eWdrF/71wKv20ne1a LEj1CSp65D/khWcrtVsoBNMkTFgCDNauyBaf8e7bVE/H1N7IQp9SMTKlMk1bXFi5ubB/ scO52EMWGkav/3WowI7BR1FFD5q+d8N8bcp/yFV4Z1LMHWBrtG12vov6RK4gWSyud0J9 Co6QthPo5nmU8GD+vBJBMTegAw26DU/Q8kJw9oRgDD7i/pkSGTNF7bUkvlYvxh7EZFDV kbMc9OEPn91+wIz7hpisMlwtg1E1remEKpzWvtWKljubL6TcVN2GrlL2JDirqFuXeec1 YdkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b=Y3zWSA5Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qq18-20020a17090720d200b007c0fa609b09si615996ejb.771.2023.01.06.00.54.10; Fri, 06 Jan 2023 00:54:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@microchip.com header.s=mchp header.b=Y3zWSA5Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=microchip.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230062AbjAFIxm (ORCPT <rfc822;tmhikaru@gmail.com> + 99 others); Fri, 6 Jan 2023 03:53:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58248 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229737AbjAFIxe (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 6 Jan 2023 03:53:34 -0500 Received: from esa.microchip.iphmx.com (esa.microchip.iphmx.com [68.232.154.123]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7F4A8669A5; Fri, 6 Jan 2023 00:53:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=microchip.com; i=@microchip.com; q=dns/txt; s=mchp; t=1672995210; x=1704531210; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=MmxryeLxcxvGAqL6Nh+RI2p670mn6TUZTzuDuWcR2Io=; b=Y3zWSA5ZOzFWl68UFbi3q7bZ3t1BE93RIqk/DJu9qlONHSjGcGd2Y9TB bH/XMAlnrkO+tyMZb3qdELd1MRCCjSBvf+E0Nazwmq4IN7Vlw+jzL/Aqg emt3Uzf2e1Wr4p8vnB3uFkZepiolIEk5R9QeuRPdhMg/GkZzEIEgMLfKm lZkuP7L4sMVqwMg2c5pj1+4z+08LptK6klhzGPtGzbdUcA6EIqpjbJOFl 97mV4ZsfNSVWLqM0skTXX1IlUiZ3hMsk22/c/8IeSFlxkeWmWDY0bc1Dx 63qy42SNSRxOAw4NZCiUl5e3RYlvsYm/qIA+5IZG3Oh9R18RZ7uMNOXKQ w==; X-IronPort-AV: E=Sophos;i="5.96,304,1665471600"; d="scan'208";a="131114169" Received: from unknown (HELO email.microchip.com) ([170.129.1.10]) by esa6.microchip.iphmx.com with ESMTP/TLS/AES256-SHA256; 06 Jan 2023 01:53:29 -0700 Received: from chn-vm-ex02.mchp-main.com (10.10.85.144) by chn-vm-ex04.mchp-main.com (10.10.85.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Fri, 6 Jan 2023 01:53:27 -0700 Received: from den-dk-m31857.microchip.com (10.10.115.15) by chn-vm-ex02.mchp-main.com (10.10.85.144) with Microsoft SMTP Server id 15.1.2507.16 via Frontend Transport; Fri, 6 Jan 2023 01:53:24 -0700 From: Steen Hegelund <steen.hegelund@microchip.com> To: "David S . Miller" <davem@davemloft.net>, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com> CC: Steen Hegelund <steen.hegelund@microchip.com>, <UNGLinuxDriver@microchip.com>, Randy Dunlap <rdunlap@infradead.org>, "Casper Andersson" <casper.casan@gmail.com>, Russell King <rmk+kernel@armlinux.org.uk>, Wan Jiabing <wanjiabing@vivo.com>, "Nathan Huckleberry" <nhuck@google.com>, <linux-kernel@vger.kernel.org>, <netdev@vger.kernel.org>, <linux-arm-kernel@lists.infradead.org>, "Steen Hegelund" <Steen.Hegelund@microchip.com>, Daniel Machon <daniel.machon@microchip.com>, Horatiu Vultur <horatiu.vultur@microchip.com>, Lars Povlsen <lars.povlsen@microchip.com>, Dan Carpenter <error27@gmail.com>, Michael Walle <michael@walle.cc> Subject: [PATCH net-next v2 0/8] Add support for two classes of VCAP rules Date: Fri, 6 Jan 2023 09:53:09 +0100 Message-ID: <20230106085317.1720282-1-steen.hegelund@microchip.com> X-Mailer: git-send-email 2.39.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1754262693391684561?= X-GMAIL-MSGID: =?utf-8?q?1754262693391684561?= |
Series |
Add support for two classes of VCAP rules
|
|
Message
Steen Hegelund
Jan. 6, 2023, 8:53 a.m. UTC
This adds support for two classes of VCAP rules: - Permanent rules (added e.g. for PTP support) - TC user rules (added by the TC userspace tool) For this to work the VCAP Loopups must be enabled from boot, so that the "internal" clients like PTP can add rules that are always active. When the TC tool add a flower filter the VCAP rule corresponding to this filter will be disabled (kept in memory) until a TC matchall filter creates a link from chain 0 to the chain (lookup) where the flower filter was added. When the flower filter is enabled it will be written to the appropriate VCAP lookup and become active in HW. Likewise the flower filter will be disabled if there is no link from chain 0 to the chain of the filter (lookup), and when that happens the corresponding VCAP rule will be read from the VCAP instance and stored in memory until it is deleted or enabled again. Version History: ================ v2 Adding a missing goto exit in vcap_add_rule (Dan Carpenter). Added missing checks for error returns in vcap_enable_rule. v1 Initial version Steen Hegelund (8): net: microchip: vcap api: Erase VCAP cache before encoding rule net: microchip: sparx5: Reset VCAP counter for new rules net: microchip: vcap api: Always enable VCAP lookups net: microchip: vcap api: Convert multi-word keys/actions when encoding net: microchip: vcap api: Use src and dst chain id to chain VCAP lookups net: microchip: vcap api: Check chains when adding a tc flower filter net: microchip: vcap api: Add a storage state to a VCAP rule net: microchip: vcap api: Enable/Disable rules via chains in VCAP HW .../ethernet/microchip/lan966x/lan966x_goto.c | 10 +- .../ethernet/microchip/lan966x/lan966x_main.h | 3 +- .../microchip/lan966x/lan966x_tc_flower.c | 30 +- .../microchip/lan966x/lan966x_tc_matchall.c | 16 +- .../microchip/lan966x/lan966x_vcap_impl.c | 24 +- .../microchip/sparx5/sparx5_tc_flower.c | 28 +- .../microchip/sparx5/sparx5_tc_matchall.c | 16 +- .../microchip/sparx5/sparx5_vcap_debugfs.c | 2 +- .../microchip/sparx5/sparx5_vcap_impl.c | 29 +- .../net/ethernet/microchip/vcap/vcap_api.c | 762 +++++++++++++----- .../net/ethernet/microchip/vcap/vcap_api.h | 5 - .../ethernet/microchip/vcap/vcap_api_client.h | 8 +- .../microchip/vcap/vcap_api_debugfs.c | 57 +- .../microchip/vcap/vcap_api_debugfs_kunit.c | 10 +- .../ethernet/microchip/vcap/vcap_api_kunit.c | 32 +- .../microchip/vcap/vcap_api_private.h | 12 +- 16 files changed, 694 insertions(+), 350 deletions(-)
Comments
On Fri, Jan 06, 2023 at 09:53:09AM +0100, Steen Hegelund wrote: > Version History: > ================ > v2 Adding a missing goto exit in vcap_add_rule (Dan Carpenter). Thanks! regards, dan carpenter
Hi Steen, thanks for adding me on CC :) I was just about to reply on your v1. Am 2023-01-06 09:53, schrieb Steen Hegelund: > This adds support for two classes of VCAP rules: > > - Permanent rules (added e.g. for PTP support) > - TC user rules (added by the TC userspace tool) > > For this to work the VCAP Loopups must be enabled from boot, so that > the > "internal" clients like PTP can add rules that are always active. > > When the TC tool add a flower filter the VCAP rule corresponding to > this > filter will be disabled (kept in memory) until a TC matchall filter > creates > a link from chain 0 to the chain (lookup) where the flower filter was > added. > > When the flower filter is enabled it will be written to the appropriate > VCAP lookup and become active in HW. > > Likewise the flower filter will be disabled if there is no link from > chain > 0 to the chain of the filter (lookup), and when that happens the > corresponding VCAP rule will be read from the VCAP instance and stored > in > memory until it is deleted or enabled again. I've just done a very quick smoke test and looked at my lan9668 board that the following error isn't printed anymore. No functional testing. vcap_val_rule:1678: keyset was not updated: -22 And it is indeed gone. But I have a few questions regarding how these patches are applied. They were first sent for net, but now due to a remark that they are too invasive they are targeted at net-next. But they have a Fixes: tag. Won't they be eventually backported to later kernels in any case? What's the difference between net and net-next then? Also patches 3-8 (the one with the fixes tags) don't apply without patch 1-2 (which don't have fixes tags). IMHO they should be reordered. Wouldn't it make more sense, to fix the regression via net (and a Fixes: tag) and then make that stuff work without tc? Maybe the fix is just reverting the commits. -michael
Hi Michael, On Fri, 2023-01-06 at 10:07 +0100, Michael Walle wrote: > EXTERNAL EMAIL: Do not click links or open attachments unless you know the > content is safe > > Hi Steen, > > thanks for adding me on CC :) I was just about to reply on your v1. > > Am 2023-01-06 09:53, schrieb Steen Hegelund: > > This adds support for two classes of VCAP rules: > > > > - Permanent rules (added e.g. for PTP support) > > - TC user rules (added by the TC userspace tool) > > > > For this to work the VCAP Loopups must be enabled from boot, so that > > the > > "internal" clients like PTP can add rules that are always active. > > > > When the TC tool add a flower filter the VCAP rule corresponding to > > this > > filter will be disabled (kept in memory) until a TC matchall filter > > creates > > a link from chain 0 to the chain (lookup) where the flower filter was > > added. > > > > When the flower filter is enabled it will be written to the appropriate > > VCAP lookup and become active in HW. > > > > Likewise the flower filter will be disabled if there is no link from > > chain > > 0 to the chain of the filter (lookup), and when that happens the > > corresponding VCAP rule will be read from the VCAP instance and stored > > in > > memory until it is deleted or enabled again. > > I've just done a very quick smoke test and looked at my lan9668 board > that the following error isn't printed anymore. No functional testing. > vcap_val_rule:1678: keyset was not updated: -22 Good to hear. > > And it is indeed gone. But I have a few questions regarding how these > patches are applied. They were first sent for net, but now due to > a remark that they are too invasive they are targeted at net-next. > But they have a Fixes: tag. Won't they be eventually backported to > later kernels in any case? What's the difference between net and > net-next then? I am not sure I can answer that. > > Also patches 3-8 (the one with the fixes tags) don't apply without > patch 1-2 (which don't have fixes tags). IMHO they should be > reordered. Right. > > Wouldn't it make more sense, to fix the regression via net (and > a Fixes: tag) and then make that stuff work without tc? Maybe > the fix is just reverting the commits. I have discussed this again with Horatiu and I have the following suggestion of how to proceed: 1) Create a small LAN966x specific patch for net (see below for the two possible variants). 2) Continue with a net-next V3 without any 'Fixes' tags on top of the patch in (1) when it becomes available in net-next. The LAN966x patch for net (with a Fixes tag) could contain either: a) No check on enabled lookup Removal of the check for enabled lookups: - if (!ANA_VCAP_S2_CFG_ENA_GET(val)) - return -ENOENT; This will remove the error that you have seen, but will still require a matchall rule to enable the PTP rules. This is compatible with the TC framework. b) Always enable lookups Enable the lookups at startup. Remove the lookup enable check as above. This will make the PTP rules (and any other rules) work even without the matchall rule to enable them. It its not ideal, but solves the problem that you have been experiencing without the 'TC magic' The V3 in net-next will provide the full solution. I expect that you might prefer the b) version. > > -michael BR Steen
Hi, >> Wouldn't it make more sense, to fix the regression via net (and >> a Fixes: tag) and then make that stuff work without tc? Maybe >> the fix is just reverting the commits. > > I have discussed this again with Horatiu and I have the following > suggestion of > how to proceed: > > 1) Create a small LAN966x specific patch for net (see below for the two > possible > variants). > > 2) Continue with a net-next V3 without any 'Fixes' tags on top of the > patch in > (1) when it becomes available in net-next. Sounds good. [coming back to this after writing the response below, so see there for more context] When do the patches from net become available in net-next? Only after a merge window? If so, depending on the solution for (1) you'd have two "in-between" kernel versions (v6.2 and v6.3). > The LAN966x patch for net (with a Fixes tag) could contain either: > > a) No check on enabled lookup > > Removal of the check for enabled lookups: > > - if (!ANA_VCAP_S2_CFG_ENA_GET(val)) > - return -ENOENT; > > This will remove the error that you have seen, but will still > require a > matchall rule to enable the PTP rules. This is compatible with the > TC > framework. > > b) Always enable lookups > > Enable the lookups at startup. > Remove the lookup enable check as above. > > This will make the PTP rules (and any other rules) work even without > the > matchall rule to enable them. It its not ideal, but solves the > problem that > you have been experiencing without the 'TC magic' > > The V3 in net-next will provide the full solution. > > I expect that you might prefer the b) version. I *assume* linuxptp would have worked in my case (no bridge interface) before Horatiu patches. As mentioned before, I haven't really tested it. Does that mean with a) the error is gone and linuxptp is working as before? If so, I'm also fine with a). Honestly, now that there is a good solution in future kernels, I don't care toooo much about that one particular kernel. Other users might disagree though ;) I just want to point out that right now you have some kind of in-between kernel with 6.2: <=6.1 linuxptp working (but not on bridged ports) 6.2 linuxptp working only with tc magic 6.3 linuxptp working Therefore, I've raised the question if it's also viable to just revert the former changes for 6.2. The you'd have a clean transition. -michael
Hi Michael, On Fri, 2023-01-06 at 11:46 +0100, Michael Walle wrote: > EXTERNAL EMAIL: Do not click links or open attachments unless you know the > content is safe > > Hi, > > > > Wouldn't it make more sense, to fix the regression via net (and > > > a Fixes: tag) and then make that stuff work without tc? Maybe > > > the fix is just reverting the commits. > > > > I have discussed this again with Horatiu and I have the following > > suggestion of > > how to proceed: > > > > 1) Create a small LAN966x specific patch for net (see below for the two > > possible > > variants). > > > > 2) Continue with a net-next V3 without any 'Fixes' tags on top of the > > patch in > > (1) when it becomes available in net-next. > > Sounds good. > > [coming back to this after writing the response below, so see there > for more context] > When do the patches from net become available in net-next? Only after a > merge window? If so, depending on the solution for (1) you'd have two > "in-between" kernel versions (v6.2 and v6.3). According to our own experience the changes in net are usually merged into net- next the following Thursday: so not too much delay, before we can continue. > > > The LAN966x patch for net (with a Fixes tag) could contain either: > > > > a) No check on enabled lookup > > > > Removal of the check for enabled lookups: > > > > - if (!ANA_VCAP_S2_CFG_ENA_GET(val)) > > - return -ENOENT; > > > > This will remove the error that you have seen, but will still > > require a > > matchall rule to enable the PTP rules. This is compatible with the > > TC > > framework. > > > > b) Always enable lookups > > > > Enable the lookups at startup. > > Remove the lookup enable check as above. > > > > This will make the PTP rules (and any other rules) work even without > > the > > matchall rule to enable them. It its not ideal, but solves the > > problem that > > you have been experiencing without the 'TC magic' > > > > The V3 in net-next will provide the full solution. > > > > I expect that you might prefer the b) version. > > I *assume* linuxptp would have worked in my case (no bridge interface) > before Horatiu patches. As mentioned before, I haven't really tested it. > Does that mean with a) the error is gone and linuxptp is working as > before? If so, I'm also fine with a). Yes this is the result: So I also suggest to go for solution a). This will still allow LinuxPTP to work (without the error that you have seen), but the bridged interface PTP support must be enabled with a TC matchall rule. > > Honestly, now that there is a good solution in future kernels, I > don't care toooo much about that one particular kernel. Other > users might disagree though ;) > > I just want to point out that right now you have some kind of > in-between kernel with 6.2: > > <=6.1 linuxptp working (but not on bridged ports) > 6.2 linuxptp working only with tc magic > 6.3 linuxptp working So with the LAN966x patch the second line would change to: 6.2 linuxptp working. PTP on bridged interfaces: needs TC matchall rule > > Therefore, I've raised the question if it's also viable to just > revert the former changes for 6.2. The you'd have a clean > transition. > > -michael TLDR Summary: 1) LAN966x patch for net to ensure PTP is working without errors 2) A V3 net-next VCAP series with the improvements for enabled/disable/permanent rules (both LAN966x and Sparx5) I will move forward with this. BR Steen
Hi Steen, >> > > Wouldn't it make more sense, to fix the regression via net (and >> > > a Fixes: tag) and then make that stuff work without tc? Maybe >> > > the fix is just reverting the commits. >> > >> > I have discussed this again with Horatiu and I have the following >> > suggestion of >> > how to proceed: >> > >> > 1) Create a small LAN966x specific patch for net (see below for the two >> > possible >> > variants). >> > >> > 2) Continue with a net-next V3 without any 'Fixes' tags on top of the >> > patch in >> > (1) when it becomes available in net-next. >> >> Sounds good. >> >> [coming back to this after writing the response below, so see there >> for more context] >> When do the patches from net become available in net-next? Only after >> a >> merge window? If so, depending on the solution for (1) you'd have two >> "in-between" kernel versions (v6.2 and v6.3). > > According to our own experience the changes in net are usually merged > into net- > next the following Thursday: so not too much delay, before we can > continue. TIL :) >> > The LAN966x patch for net (with a Fixes tag) could contain either: >> > >> > a) No check on enabled lookup >> > >> > Removal of the check for enabled lookups: >> > >> > - if (!ANA_VCAP_S2_CFG_ENA_GET(val)) >> > - return -ENOENT; >> > >> > This will remove the error that you have seen, but will still >> > require a >> > matchall rule to enable the PTP rules. This is compatible with the >> > TC >> > framework. >> > >> > b) Always enable lookups >> > >> > Enable the lookups at startup. >> > Remove the lookup enable check as above. >> > >> > This will make the PTP rules (and any other rules) work even without >> > the >> > matchall rule to enable them. It its not ideal, but solves the >> > problem that >> > you have been experiencing without the 'TC magic' >> > >> > The V3 in net-next will provide the full solution. >> > >> > I expect that you might prefer the b) version. >> >> I *assume* linuxptp would have worked in my case (no bridge interface) >> before Horatiu patches. As mentioned before, I haven't really tested >> it. >> Does that mean with a) the error is gone and linuxptp is working as >> before? If so, I'm also fine with a). > > Yes this is the result: So I also suggest to go for solution a). > > This will still allow LinuxPTP to work (without the error that you have > seen), > but the bridged interface PTP support must be enabled with a TC > matchall rule. > >> >> Honestly, now that there is a good solution in future kernels, I >> don't care toooo much about that one particular kernel. Other >> users might disagree though ;) >> >> I just want to point out that right now you have some kind of >> in-between kernel with 6.2: >> >> <=6.1 linuxptp working (but not on bridged ports) >> 6.2 linuxptp working only with tc magic >> 6.3 linuxptp working > > So with the LAN966x patch the second line would change to: > > 6.2 linuxptp working. PTP on bridged interfaces: needs TC matchall > rule > >> >> Therefore, I've raised the question if it's also viable to just >> revert the former changes for 6.2. The you'd have a clean >> transition. >> >> -michael > > TLDR Summary: > > 1) LAN966x patch for net to ensure PTP is working without errors > 2) A V3 net-next VCAP series with the improvements for > enabled/disable/permanent > rules (both LAN966x and Sparx5) > > I will move forward with this. Sounds perfect, thanks! -michael