lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sun, 07 Jun 2015 15:31:04 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	B38611@...escale.com
Cc:	richardcochran@...il.com, netdev@...r.kernel.org,
	B20596@...escale.com
Subject: Re: [PATCH net-next 1/1] net: fec: ptp: correct the ENET_ATCOR
 value

From: Fugang Duan <B38611@...escale.com>
Date: Fri, 5 Jun 2015 17:22:08 +0800

> From: Fugang Duan <b38611@...escale.com>
> 
> The current driver adjust freq formula is:
> fe * diff = ppb * pc
> Note:
>   fe: ENET ref clock frequency in Hz
>   diff = inc_corr - inc: difference between default increment and correction increment
>   ppb: parts per billion adjustment from base
>   pc: correction period (in number of fe clock cycles)
> 
> The correction increment will be used after N cycles of regular increments,
> not every N cycles (with N being the correction period). For example, set ENET_ATCOR=4,
> INC=8, INC_CORR=9, there will be 4 increments of 8 (ENET_ATINC[INC]) , followed by 1
> increment of 9 (ENET_ATINC[INC_CORR]).
> 
> So, the correct formula is:
> 	fe * diff = ppb * (pc + 1)
> 
> For ENET_ATCOR, a value 0 disables the correction counter and no corrections occur.
> So base on the origin formula, set pc = pc > 1 ? pc - 1 : pc.
> 
> Signed-off-by: Fugang Duan <B38611@...escale.com>
> Signed-off-by: Frank Li <Frank.Li@...escale.com>

Applied, thank you.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ