get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/29517/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 29517,
    "url": "http://patches.dpdk.org/api/patches/29517/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/20171003094019.562-2-akhil.goyal@nxp.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20171003094019.562-2-akhil.goyal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20171003094019.562-2-akhil.goyal@nxp.com",
    "date": "2017-10-03T09:40:16",
    "name": "[dpdk-dev,v3,1/4] bus/dpaa: scan for DPAA Crypto devices",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "470d3a2b83dc6b29f22533c5b0260b27adfc3bba",
    "submitter": {
        "id": 517,
        "url": "http://patches.dpdk.org/api/people/517/?format=api",
        "name": "Akhil Goyal",
        "email": "akhil.goyal@nxp.com"
    },
    "delegate": {
        "id": 22,
        "url": "http://patches.dpdk.org/api/users/22/?format=api",
        "username": "pdelarag",
        "first_name": "Pablo",
        "last_name": "de Lara Guarch",
        "email": "pablo.de.lara.guarch@intel.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/20171003094019.562-2-akhil.goyal@nxp.com/mbox/",
    "series": [],
    "comments": "http://patches.dpdk.org/api/patches/29517/comments/",
    "check": "success",
    "checks": "http://patches.dpdk.org/api/patches/29517/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 35E291B31C;\n\tTue,  3 Oct 2017 11:43:00 +0200 (CEST)",
            "from NAM01-SN1-obe.outbound.protection.outlook.com\n\t(mail-sn1nam01on0082.outbound.protection.outlook.com [104.47.32.82])\n\tby dpdk.org (Postfix) with ESMTP id 037DC1B319\n\tfor <dev@dpdk.org>; Tue,  3 Oct 2017 11:42:57 +0200 (CEST)",
            "from MWHPR03CA0059.namprd03.prod.outlook.com (10.174.173.176) by\n\tDM5PR03MB2699.namprd03.prod.outlook.com (10.168.197.137) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id\n\t15.20.77.7; Tue, 3 Oct 2017 09:42:56 +0000",
            "from BL2FFO11OLC009.protection.gbl (2a01:111:f400:7c09::182) by\n\tMWHPR03CA0059.outlook.office365.com (2603:10b6:301:3b::48) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.56.11 via\n\tFrontend Transport; Tue, 3 Oct 2017 09:42:56 +0000",
            "from az84smr01.freescale.net (192.88.158.2) by\n\tBL2FFO11OLC009.mail.protection.outlook.com (10.173.160.145) with\n\tMicrosoft\n\tSMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id\n\t15.20.77.10 via Frontend Transport; Tue, 3 Oct 2017 09:42:55 +0000",
            "from netperf2.ap.freescale.net ([10.232.133.164])\n\tby az84smr01.freescale.net (8.14.3/8.14.0) with ESMTP id\n\tv939gliH010009; Tue, 3 Oct 2017 02:42:52 -0700"
        ],
        "Authentication-Results": "spf=fail (sender IP is 192.88.158.2)\n\tsmtp.mailfrom=nxp.com; NXP1.onmicrosoft.com;\n\tdkim=none (message not signed)\n\theader.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none\n\theader.from=nxp.com;",
        "Received-SPF": "Fail (protection.outlook.com: domain of nxp.com does not\n\tdesignate 192.88.158.2 as permitted sender)\n\treceiver=protection.outlook.com; \n\tclient-ip=192.88.158.2; helo=az84smr01.freescale.net;",
        "From": "<akhil.goyal@nxp.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<declan.doherty@intel.com>, <pablo.de.lara.guarch@intel.com>,\n\t<hemant.agrawal@nxp.com>, <john.mcnamara@intel.com>",
        "Date": "Tue, 3 Oct 2017 15:10:16 +0530",
        "Message-ID": "<20171003094019.562-2-akhil.goyal@nxp.com>",
        "X-Mailer": "git-send-email 2.9.3",
        "In-Reply-To": "<20171003094019.562-1-akhil.goyal@nxp.com>",
        "References": "<20170824000117.32186-1-akhil.goyal@nxp.com>\n\t<20171003094019.562-1-akhil.goyal@nxp.com>",
        "X-EOPAttributedMessage": "0",
        "X-Matching-Connectors": "131514973756843122;\n\t(91ab9b29-cfa4-454e-5278-08d120cd25b8); ()",
        "X-Forefront-Antispam-Report": "CIP:192.88.158.2; IPV:NLI; CTRY:US; EFV:NLI;\n\tSFV:NSPM;\n\tSFS:(10009020)(6009001)(336005)(376002)(39380400002)(346002)(39860400002)(2980300002)(1109001)(1110001)(339900001)(199003)(189002)(86362001)(77096006)(97736004)(189998001)(85426001)(54906003)(16586007)(2876002)(36756003)(4326008)(316002)(8656003)(2906002)(104016004)(5003940100001)(76176999)(105606002)(47776003)(1076002)(106466001)(53936002)(69596002)(5660300001)(50226002)(86152003)(2351001)(6916009)(50986999)(2950100002)(356003)(8936002)(305945005)(48376002)(81166006)(8676002)(81156014)(6666003)(498600001)(68736007)(50466002)(33646002);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR03MB2699;\n\tH:az84smr01.freescale.net; FPR:; \n\tSPF:Fail; PTR:InfoDomainNonexistent; A:1; MX:1; LANG:en; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; BL2FFO11OLC009;\n\t1:pMh9Ywi6Mr3dUoIool4fDBfqVlt4DmIm2jl1X8zTqIEe8V+gw97A5UkYf3dWDLcipFlPtacB5XSYw5rweJ/XuYV3N84T/synT/4JNU3u1+dKJxvlhlX53uwWU/Sb7zag",
            "1; DM5PR03MB2699;\n\t3:/ei3z3DBs1Wywy9q6kH88cRkzjnLAZrkD1yMPpyaRz2+BcSrI0VxE4SUnbHDOJVWnNU8rny933H7osKuHzySHuzJRBiGK4ehPlvVHdvWk4RDM9pYI1eBmzj7Ak7n5L5oM++JSbUBwNtyHuh+7IuLksNFe93pmbA9QAsaz3dDyiqel2Wvx0ve4AuCgXjWfClnmEaRczXcagA2t3pmm4DiuiX4w/MwS7iF9WfqTp04xUQfzEi0uKdbKH7Mvt3VPV8QiFYi3B8SsN/hMlcmJPusLA0Q1Q7nb2WnmMwA3zhGbl229SorZ86PiJBdhi//epljxQNT+eTciom5AeGbeSsnOOgy5CboBZd+IaxQ3jaDR6M=;\n\t25:LXIWs57+6lLbg4TeSxEqBe1KCHsAoL0fZ/X8JXKCRRp0OPCPN8IUxtZdh/U3cZI2GnaQMsl05PN0tjIsva4GoM5RVh8v8RVwy/UoWfQpokMgBCAeZaInGE0wpTCx6SIXK2EgcCdT9fRyhTOGsrEGiQEpofU1CmeIWF+PrV4Z3mLRT1NYmR9OV2072XaXnjsMJafLbxfdfoUgdQW4lJTtBwcSO0k9yqzQzQEwVcfRpqUttupyCwMmNhfKo01Dwa5xDGndgn/B2xdQUcJoGkEv8Y/JrjrbaOgRL1RuHLSwWfTtMTFrMHL6unlBf2aElUzmoQpa9c3yvsVdBws34fxAUA==",
            "1; DM5PR03MB2699;\n\t31:z81w5ozJGjWqz5yyIfcM+HgdpbTO2m2O7fLn8+XaD0qp2/FdnAmUztL6YEztKg3fkQTQDN2zEDamnsrI4IqIesKgePTt2xFIo30fcY6OJ4zZknaor8F8O8PPJSRrQXrZCTDKUNwvb06LdXBuKUJDc/bhCC3nAugrk3HIWz+WDyvgYkHllbFEgyDhs0bZQXtA7v7gunqGZyORLgxnlWTxVAd/R4Wmb56Dk1WV6J2h6VU=;\n\t4:+gF4zdPhUzgcbqAi/GDPZut5VDhqGIUEFg7ZrHKrKZuzHWEeXGfnFM6vHgvToGncyLcujOcWZI9W8KKwnrg1WEkPWKDEk72F0+fj62MEpYcA8rjgXfeb7Z+lGlHIiA9kuivKV3kP0Ns6E7yqDZiyQX+XxyxBDoDZI8dNODdIU/KB+7EnrHEJ61+XBeJYCVB9ZAFLQlR6C4L1jz+0cOTdsGTvhJAoFpm9/qkMYu+VNwFYWuBRIvniIGudBbglipuz+EaxwqxbU/4l3ASqSurw2O5WmYS2MByLJE5VlEaItk4=",
            "=?us-ascii?Q?1; DM5PR03MB2699;\n\t23:gbUQX4zedkoIIyxUaMSu2hdftoAvd2X/u1YZSj932?=\n\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",
            "1; DM5PR03MB2699;\n\t6:W1dC1SOxUizQQpfIOyXNxEj/tjZpJRaPy6h5PXPhtQbFbQo9iRwtSwFyD/ml2apfjXVklVv+icQgK887K+BHmg2nffPAltDJR1+c45cnDJe1tKHzCt49Hl59cRbaXD8TOzBI0gqvuF7nZWQiUFbcjA0iRKwB/9SPm9iI1xWRlMR45yDrfVD4c8gP97Qw8YjzRbv/1BvdODwluz6DLTwDHpiw+c66gYhnAVMm/aze6ymyfxVZYNaKSnrXXx7cvcJIBI3Gbumvt5RH8eIdUe/FLK4Qhrsph64e9NpCl25TQqmSsSWL5JgT+2+Y0IGJ7S0+ps1iIdOCdp3WTSJkuNdWAQ==;\n\t5:jpS2bzMNz4i3W/k3c7/rot77lRLvrzPYKCf+LgvG84lCP9bQX5vm4ob+lK/rC3LwpJIQL3F3iUmvhr6p8OSGXtddzEKXAJQFWGA7RMjUNBXJiT13TPOzCnPCc8kxOGz5WAMZNxv189gjrVknc8Y/ug==;\n\t24:+DC/+zq18vlRdll0iD7hWAfWenMqxtpd/oxaVWGTpQ8MV/KLj9v4e3tFP/YMd8daNoCJpojSb7j76ZH+FouSdvRl108a/L75+czl81XlE3I=;\n\t7:tlYiowz6vHdnkIoaAnmaVASaegS0etgisz+V040HHhZvuAe2qI6+rvLSa9aFKkM7uz01zmBbYJ6zRp07A+c4FuIBCWHLP8CqM0gsISlkoOUea/BqxI5srDPXH4ltVrjgP8ZWRS0tBfXr08TYnOe/cLqoRM1GUdd2kkAGvldZI1AhcjKtTCRE1f4Dw24YRxu/AwjnJFPsdMHBRT8bNAV2v06sOe51CM8RH00hA8SYdEE="
        ],
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "0066db25-0bb3-48e4-e472-08d50a431fe2",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(22001)(2017052603199)(201703131430075)(201703131517081);\n\tSRVR:DM5PR03MB2699; ",
        "X-MS-TrafficTypeDiagnostic": "DM5PR03MB2699:",
        "X-Exchange-Antispam-Report-Test": "UriScan:(185117386973197);",
        "X-Microsoft-Antispam-PRVS": "<DM5PR03MB2699790B35737DE05407D362E6720@DM5PR03MB2699.namprd03.prod.outlook.com>",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(8121501046)(5005006)(93006095)(93001095)(100000703101)(100105400095)(3002001)(10201501046)(6055026)(6096035)(20161123561025)(20161123563025)(20161123556025)(20161123565025)(20161123559100)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:DM5PR03MB2699; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:DM5PR03MB2699; ",
        "X-Forefront-PRVS": "044968D9E1",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "03 Oct 2017 09:42:55.4659\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Id": "5afe0b00-7697-4969-b663-5eab37d5f47e",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;\n\tIp=[192.88.158.2]; \n\tHelo=[az84smr01.freescale.net]",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DM5PR03MB2699",
        "Subject": "[dpdk-dev] [PATCH v3 1/4] bus/dpaa: scan for DPAA Crypto devices",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<http://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<http://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Akhil Goyal <akhil.goyal@nxp.com>\n\nSigned-off-by: Shreyansh Jain <shreyansh.jain@nxp.com>\nSigned-off-by: Akhil Goyal <akhil.goyal@nxp.com>\n---\n config/defconfig_arm64-dpaa-linuxapp-gcc |  3 ++\n drivers/bus/dpaa/dpaa_bus.c              | 52 ++++++++++++++++++++++++++++++++\n 2 files changed, 55 insertions(+)",
    "diff": "diff --git a/config/defconfig_arm64-dpaa-linuxapp-gcc b/config/defconfig_arm64-dpaa-linuxapp-gcc\nindex f59834c..7887fd0 100644\n--- a/config/defconfig_arm64-dpaa-linuxapp-gcc\n+++ b/config/defconfig_arm64-dpaa-linuxapp-gcc\n@@ -57,3 +57,6 @@ CONFIG_RTE_MBUF_DEFAULT_MEMPOOL_OPS=\"dpaa\"\n \n # Compile software NXP DPAA PMD\n CONFIG_RTE_LIBRTE_DPAA_PMD=y\n+\n+# DPAA CAAM driver instances\n+CONFIG_RTE_LIBRTE_DPAA_MAX_CRYPTODEV=4\ndiff --git a/drivers/bus/dpaa/dpaa_bus.c b/drivers/bus/dpaa/dpaa_bus.c\nindex 7ae5bfa..2c594d8 100644\n--- a/drivers/bus/dpaa/dpaa_bus.c\n+++ b/drivers/bus/dpaa/dpaa_bus.c\n@@ -93,6 +93,22 @@ dpaa_remove_from_device_list(struct rte_dpaa_device *dev)\n \tTAILQ_INSERT_TAIL(&rte_dpaa_bus.device_list, dev, next);\n }\n \n+/*\n+ * Reads the SEC device from DTS\n+ * Returns -1 if SEC devices not available, 0 otherwise\n+ */\n+static inline int\n+dpaa_sec_available(void)\n+{\n+\tconst struct device_node *caam_node;\n+\n+\tfor_each_compatible_node(caam_node, NULL, \"fsl,sec-v4.0\") {\n+\t\treturn 0;\n+\t}\n+\n+\treturn -1;\n+}\n+\n static void dpaa_clean_device_list(void);\n \n static int\n@@ -134,6 +150,42 @@ dpaa_create_device_list(void)\n \n \trte_dpaa_bus.device_count = i;\n \n+\t/* Unlike case of ETH, RTE_LIBRTE_DPAA_MAX_CRYPTODEV SEC devices are\n+\t * constantly created only if \"sec\" property is found in the device\n+\t * tree. Logically there is no limit for number of devices (QI\n+\t * interfaces) that can be created.\n+\t */\n+\n+\tif (dpaa_sec_available()) {\n+\t\tDPAA_BUS_LOG(INFO, \"DPAA SEC devices are not available\");\n+\t\treturn 0;\n+\t}\n+\n+\t/* Creating SEC Devices */\n+\tfor (i = 0; i < RTE_LIBRTE_DPAA_MAX_CRYPTODEV; i++) {\n+\t\tdev = calloc(1, sizeof(struct rte_dpaa_device));\n+\t\tif (!dev) {\n+\t\t\tDPAA_BUS_LOG(ERR, \"Failed to allocate SEC devices\");\n+\t\t\tret = -1;\n+\t\t\tgoto cleanup;\n+\t\t}\n+\n+\t\tdev->device_type = FSL_DPAA_CRYPTO;\n+\t\tdev->id.dev_id = rte_dpaa_bus.device_count + i;\n+\n+\t\t/* Even though RTE_CRYPTODEV_NAME_MAX_LEN is valid length of\n+\t\t * crypto PMD, using RTE_ETH_NAME_MAX_LEN as that is the size\n+\t\t * allocated for dev->name/\n+\t\t */\n+\t\tmemset(dev->name, 0, RTE_ETH_NAME_MAX_LEN);\n+\t\tsprintf(dev->name, \"dpaa-sec%d\", i);\n+\t\tDPAA_BUS_LOG(DEBUG, \"Device added: %s\", dev->name);\n+\n+\t\tdpaa_add_to_device_list(dev);\n+\t}\n+\n+\trte_dpaa_bus.device_count += i;\n+\n \treturn 0;\n \n cleanup:\n",
    "prefixes": [
        "dpdk-dev",
        "v3",
        "1/4"
    ]
}