get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/54604/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 54604,
    "url": "http://patches.dpdk.org/api/patches/54604/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1560152324-20538-25-git-send-email-arybchenko@solarflare.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1560152324-20538-25-git-send-email-arybchenko@solarflare.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1560152324-20538-25-git-send-email-arybchenko@solarflare.com",
    "date": "2019-06-10T07:38:39",
    "name": "[24/29] net/sfc/base: support proxy auth operations for SR-IOV",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "9779d6c1bbab3d8b0661743e2e13036c127ba90e",
    "submitter": {
        "id": 607,
        "url": "http://patches.dpdk.org/api/people/607/?format=api",
        "name": "Andrew Rybchenko",
        "email": "arybchenko@solarflare.com"
    },
    "delegate": {
        "id": 319,
        "url": "http://patches.dpdk.org/api/users/319/?format=api",
        "username": "fyigit",
        "first_name": "Ferruh",
        "last_name": "Yigit",
        "email": "ferruh.yigit@amd.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1560152324-20538-25-git-send-email-arybchenko@solarflare.com/mbox/",
    "series": [
        {
            "id": 4965,
            "url": "http://patches.dpdk.org/api/series/4965/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=4965",
            "date": "2019-06-10T07:38:19",
            "name": "net/sfc/base: update base driver",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/4965/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/54604/comments/",
    "check": "fail",
    "checks": "http://patches.dpdk.org/api/patches/54604/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 6CF741BF30;\n\tMon, 10 Jun 2019 09:39:35 +0200 (CEST)",
            "from dispatch1-us1.ppe-hosted.com (dispatch1-us1.ppe-hosted.com\n\t[67.231.154.164]) by dpdk.org (Postfix) with ESMTP id C45DD1BE95\n\tfor <dev@dpdk.org>; Mon, 10 Jun 2019 09:38:58 +0200 (CEST)",
            "from webmail.solarflare.com (webmail.solarflare.com\n\t[12.187.104.26])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby mx1-us1.ppe-hosted.com (PPE Hosted ESMTP Server) with ESMTPS id\n\tB803B140058\n\tfor <dev@dpdk.org>; Mon, 10 Jun 2019 07:38:57 +0000 (UTC)",
            "from ocex03.SolarFlarecom.com (10.20.40.36) by\n\tocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server\n\t(TLS) id 15.0.1395.4; Mon, 10 Jun 2019 00:38:51 -0700",
            "from opal.uk.solarflarecom.com (10.17.10.1) by\n\tocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server\n\t(TLS) id\n\t15.0.1395.4 via Frontend Transport; Mon, 10 Jun 2019 00:38:51 -0700",
            "from ukv-loginhost.uk.solarflarecom.com\n\t(ukv-loginhost.uk.solarflarecom.com [10.17.10.39])\n\tby opal.uk.solarflarecom.com (8.13.8/8.13.8) with ESMTP id\n\tx5A7co8M008857; Mon, 10 Jun 2019 08:38:50 +0100",
            "from ukv-loginhost.uk.solarflarecom.com (localhost [127.0.0.1])\n\tby ukv-loginhost.uk.solarflarecom.com (Postfix) with ESMTP id\n\t32C101616E0; Mon, 10 Jun 2019 08:38:50 +0100 (BST)"
        ],
        "X-Virus-Scanned": "Proofpoint Essentials engine",
        "From": "Andrew Rybchenko <arybchenko@solarflare.com>",
        "To": "<dev@dpdk.org>",
        "CC": "Gautam Dawar <gdawar@solarflare.com>",
        "Date": "Mon, 10 Jun 2019 08:38:39 +0100",
        "Message-ID": "<1560152324-20538-25-git-send-email-arybchenko@solarflare.com>",
        "X-Mailer": "git-send-email 1.8.3.1",
        "In-Reply-To": "<1560152324-20538-1-git-send-email-arybchenko@solarflare.com>",
        "References": "<1560152324-20538-1-git-send-email-arybchenko@solarflare.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-TM-AS-Product-Ver": "SMEX-12.5.0.1300-8.5.1010-24664.003",
        "X-TM-AS-Result": "No-6.618000-4.000000-10",
        "X-TMASE-MatchedRID": "1xKVu9NF+0dC1rL4Z/gBwRwu4QM/6Cpy3FYvKmZiVnMUvn93ewYigtnb\n\t38rNj4w/i3TM4HSbYDGMR1/DYo1wVJcLewwAa76fpyEWs4H2RqdfDPWWGf5j9PdG7cmuMnEod4w\n\txwvsFfbB4FTWzKCjc1VwjktmKA1nq9IKRKjO372G7B1QwzOcQD4VQ55H8w+7mBph69XjMbdmAec\n\tOigRAlta3aC25avUuac8vcp0oWEzzZ/Fz35/VDYWWnA2xO92UpLPSJu5jov2bmTInKzpSFScAGp\n\tPrzIdGXfqtteAej7BzxlrqZqxkTxEIS3s8VForcboe6sMfg+k82nLo2hN48IVSOymiJfTYXu2Hg\n\tmoVy+kr8vssEMbB5T4a45IY4RHuvr+l6zr/Tkx+wmuJu9uyFD47P8sslRxoexidCDTHOK7d4pqO\n\t87q5acKURXacok+dh1w74g/9nwGHilP6531h7+ilJ2c6NlEA97CU4ZmhBVXTg91xayX4L86yw+t\n\tx39zb366WDjufowJPNKcBEANQ7gZF6FgU4brgox5sgyUhLCNvuo8ooMQqOsgQsw9A3PIlLBjEnK\n\tR+6jgDPa0BTqnLA1IAy6p60ZV62fJ5/bZ6npdg7AFczfjr/7C9Ak778NyF6CjtjdrKNwnJfkern\n\t3TeFTxakD8FJE/usy8UL/dQnx1g=",
        "X-TM-AS-User-Approved-Sender": "No",
        "X-TM-AS-User-Blocked-Sender": "No",
        "X-TMASE-Result": "10--6.618000-4.000000",
        "X-TMASE-Version": "SMEX-12.5.0.1300-8.5.1010-24664.003",
        "X-MDID": "1560152338-CxaNpPCMRdTz",
        "Subject": "[dpdk-dev] [PATCH 24/29] net/sfc/base: support proxy auth\n\toperations for SR-IOV",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gautam Dawar <gdawar@solarflare.com>\n\nVMware expects that certain kind of configurations made on the VFs are\nauthorized by the ESXi before these are applied e.g. assigning a MAC\naddress to the VF, setting MTU etc. Firmware supports a feature called\nMCDI proxy which will be used to implement this authorization check.\nThe proxy auth module is governed by EFSYS_OPT_MCDI_PROXY_AUTH switch.\nThis patch adds the framework for proxy auth module along with the APIs\nrequired for SR-IOV initialization.\n\nSigned-off-by: Gautam Dawar <gdawar@solarflare.com>\nSigned-off-by: Andrew Rybchenko <arybchenko@solarflare.com>\n---\n drivers/net/sfc/Makefile          |   2 +\n drivers/net/sfc/base/ef10_impl.h  |  34 +++++\n drivers/net/sfc/base/ef10_proxy.c | 255 ++++++++++++++++++++++++++++++++++++++\n drivers/net/sfc/base/efx.h        |  32 +++++\n drivers/net/sfc/base/efx_impl.h   |  22 ++++\n drivers/net/sfc/base/efx_proxy.c  | 200 ++++++++++++++++++++++++++++++\n drivers/net/sfc/base/meson.build  |   2 +\n drivers/net/sfc/efsys.h           |   2 +\n 8 files changed, 549 insertions(+)\n create mode 100644 drivers/net/sfc/base/ef10_proxy.c\n create mode 100644 drivers/net/sfc/base/efx_proxy.c",
    "diff": "diff --git a/drivers/net/sfc/Makefile b/drivers/net/sfc/Makefile\nindex 7149afd..7dd660d 100644\n--- a/drivers/net/sfc/Makefile\n+++ b/drivers/net/sfc/Makefile\n@@ -101,6 +101,7 @@ SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_nic.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_nvram.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_phy.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_port.c\n+SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_proxy.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_rx.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_sram.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += efx_tunnel.c\n@@ -124,6 +125,7 @@ SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_mcdi.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_nic.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_nvram.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_phy.c\n+SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_proxy.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_rx.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_tx.c\n SRCS-$(CONFIG_RTE_LIBRTE_SFC_EFX_PMD) += ef10_vpd.c\ndiff --git a/drivers/net/sfc/base/ef10_impl.h b/drivers/net/sfc/base/ef10_impl.h\nindex e261487..4b719c9 100644\n--- a/drivers/net/sfc/base/ef10_impl.h\n+++ b/drivers/net/sfc/base/ef10_impl.h\n@@ -1344,6 +1344,40 @@ extern\t__checkReturn\t__success(return != B_FALSE)\tboolean_t\n \n #endif  /* EFSYS_OPT_EVB */\n \n+#if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER\n+extern\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_init(\n+\t__in\t\tefx_nic_t *enp);\n+\n+extern\t\t\tvoid\n+ef10_proxy_auth_fini(\n+\t__in\t\tefx_nic_t *enp);\n+\n+extern\t__checkReturn\t\tefx_rc_t\n+ef10_proxy_auth_mc_config(\n+\t__in\t\t\tefx_nic_t *enp,\n+\t__in\t\t\tefsys_mem_t *request_bufferp,\n+\t__in\t\t\tefsys_mem_t *response_bufferp,\n+\t__in\t\t\tefsys_mem_t *status_bufferp,\n+\t__in\t\t\tuint32_t block_cnt,\n+\t__in_ecount(op_count)\tuint32_t *op_listp,\n+\t__in\t\t\tsize_t op_count);\n+\n+extern\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_disable(\n+\t__in\t\tefx_nic_t *enp);\n+\n+extern\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t fn_group,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask);\n+\n+#endif  /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n+\n #if EFSYS_OPT_RX_PACKED_STREAM\n \n /* Data space per credit in packed stream mode */\ndiff --git a/drivers/net/sfc/base/ef10_proxy.c b/drivers/net/sfc/base/ef10_proxy.c\nnew file mode 100644\nindex 0000000..6b1afcc\n--- /dev/null\n+++ b/drivers/net/sfc/base/ef10_proxy.c\n@@ -0,0 +1,255 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ *\n+ * Copyright (c) 2018-2019 Solarflare Communications Inc.\n+ * All rights reserved.\n+ */\n+\n+#include \"efx.h\"\n+#include \"efx_impl.h\"\n+\n+#if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER\n+\n+\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_init(\n+\t__in\t\tefx_nic_t *enp)\n+{\n+\tEFSYS_ASSERT(enp->en_family == EFX_FAMILY_HUNTINGTON ||\n+\t\tenp->en_family == EFX_FAMILY_MEDFORD ||\n+\t\tenp->en_family == EFX_FAMILY_MEDFORD2);\n+\n+\treturn (0);\n+}\n+\n+\t\t\tvoid\n+ef10_proxy_auth_fini(\n+\t__in\t\tefx_nic_t *enp)\n+{\n+\tEFSYS_ASSERT(enp->en_family == EFX_FAMILY_HUNTINGTON ||\n+\t\tenp->en_family == EFX_FAMILY_MEDFORD ||\n+\t\tenp->en_family == EFX_FAMILY_MEDFORD2);\n+}\n+\n+static\t__checkReturn\tefx_rc_t\n+efx_mcdi_proxy_configure(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tboolean_t disable_proxy,\n+\t__in\t\tuint64_t req_buffer_addr,\n+\t__in\t\tuint64_t resp_buffer_addr,\n+\t__in\t\tuint64_t stat_buffer_addr,\n+\t__in\t\tsize_t req_size,\n+\t__in\t\tsize_t resp_size,\n+\t__in\t\tuint32_t block_cnt,\n+\t__in\t\tuint8_t *op_maskp,\n+\t__in\t\tsize_t op_mask_size)\n+{\n+\tEFX_MCDI_DECLARE_BUF(payload, MC_CMD_PROXY_CONFIGURE_EXT_IN_LEN,\n+\t\tMC_CMD_PROXY_CONFIGURE_OUT_LEN);\n+\tefx_mcdi_req_t req;\n+\tefx_rc_t rc;\n+\n+\treq.emr_cmd = MC_CMD_PROXY_CONFIGURE;\n+\treq.emr_in_buf = payload;\n+\treq.emr_in_length = MC_CMD_PROXY_CONFIGURE_EXT_IN_LEN;\n+\treq.emr_out_buf = payload;\n+\treq.emr_out_length = MC_CMD_PROXY_CONFIGURE_OUT_LEN;\n+\n+\tif (!disable_proxy) {\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_FLAGS, 1);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_REQUEST_BUFF_ADDR_LO,\n+\t\t\treq_buffer_addr & 0xffffffff);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_REQUEST_BUFF_ADDR_HI,\n+\t\t\treq_buffer_addr >> 32);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_REPLY_BUFF_ADDR_LO,\n+\t\t\tresp_buffer_addr & 0xffffffff);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_REPLY_BUFF_ADDR_HI,\n+\t\t\tresp_buffer_addr >> 32);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_STATUS_BUFF_ADDR_LO,\n+\t\t\tstat_buffer_addr & 0xffffffff);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_STATUS_BUFF_ADDR_HI,\n+\t\t\tstat_buffer_addr >> 32);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_REQUEST_BLOCK_SIZE,\n+\t\t\treq_size);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_REPLY_BLOCK_SIZE,\n+\t\t\tresp_size);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_STATUS_BLOCK_SIZE,\n+\t\t\tMC_PROXY_STATUS_BUFFER_LEN);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_IN_NUM_BLOCKS,\n+\t\t\tblock_cnt);\n+\t\tmemcpy(MCDI_IN2(req, efx_byte_t,\n+\t\t\t\tPROXY_CONFIGURE_IN_ALLOWED_MCDI_MASK),\n+\t\t\top_maskp, op_mask_size);\n+\t\tMCDI_IN_SET_DWORD(req, PROXY_CONFIGURE_EXT_IN_RESERVED,\n+\t\t\tEFX_PROXY_CONFIGURE_MAGIC);\n+\t}\n+\n+\tefx_mcdi_execute(enp, &req);\n+\n+\tif (req.emr_rc != 0) {\n+\t\trc = req.emr_rc;\n+\t\tgoto fail1;\n+\t}\n+\n+\treturn (0);\n+\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+static\t__checkReturn\tefx_rc_t\n+efx_mcdi_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t fn_group,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask)\n+{\n+\tEFX_MCDI_DECLARE_BUF(payload, MC_CMD_PRIVILEGE_MODIFY_IN_LEN,\n+\t\tMC_CMD_PRIVILEGE_MODIFY_OUT_LEN);\n+\tefx_mcdi_req_t req;\n+\tefx_rc_t rc;\n+\n+\treq.emr_cmd = MC_CMD_PRIVILEGE_MODIFY;\n+\treq.emr_in_buf = payload;\n+\treq.emr_in_length = MC_CMD_PRIVILEGE_MODIFY_IN_LEN;\n+\treq.emr_out_buf = payload;\n+\treq.emr_out_length = MC_CMD_PRIVILEGE_MODIFY_OUT_LEN;\n+\n+\tEFSYS_ASSERT(fn_group <= MC_CMD_PRIVILEGE_MODIFY_IN_ONE);\n+\n+\tMCDI_IN_SET_DWORD(req, PRIVILEGE_MODIFY_IN_FN_GROUP, fn_group);\n+\n+\tif ((fn_group == MC_CMD_PRIVILEGE_MODIFY_IN_ONE) ||\n+\t    (fn_group == MC_CMD_PRIVILEGE_MODIFY_IN_VFS_OF_PF)) {\n+\t\tMCDI_IN_POPULATE_DWORD_2(req,\n+\t\t    PRIVILEGE_MODIFY_IN_FUNCTION,\n+\t\t    PRIVILEGE_MODIFY_IN_FUNCTION_PF, pf_index,\n+\t\t    PRIVILEGE_MODIFY_IN_FUNCTION_VF, vf_index);\n+\t}\n+\n+\tMCDI_IN_SET_DWORD(req, PRIVILEGE_MODIFY_IN_ADD_MASK,\n+\t\tadd_privileges_mask);\n+\tMCDI_IN_SET_DWORD(req, PRIVILEGE_MODIFY_IN_REMOVE_MASK,\n+\t\tremove_privileges_mask);\n+\n+\tefx_mcdi_execute(enp, &req);\n+\n+\tif (req.emr_rc != 0) {\n+\t\trc = req.emr_rc;\n+\t\tgoto fail1;\n+\t}\n+\n+\treturn (0);\n+\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+static\t__checkReturn\t\t\tefx_rc_t\n+efx_proxy_auth_fill_op_mask(\n+\t__in_ecount(op_count)\t\tuint32_t *op_listp,\n+\t__in\t\t\t\tsize_t op_count,\n+\t__out_ecount(op_mask_size)\tuint32_t *op_maskp,\n+\t__in\t\t\t\tsize_t op_mask_size)\n+{\n+\tefx_rc_t rc;\n+\tuint32_t op;\n+\n+\tif ((op_listp == NULL) || (op_maskp == NULL)) {\n+\t\trc = EINVAL;\n+\t\tgoto fail1;\n+\t}\n+\n+\twhile (op_count--) {\n+\t\top = *op_listp++;\n+\t\tif (op > op_mask_size * 32) {\n+\t\t\trc = EINVAL;\n+\t\t\tgoto fail2;\n+\t\t}\n+\t\top_maskp[op / 32] |= 1u << (op & 31);\n+\t}\n+\n+\treturn (0);\n+\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+\t__checkReturn\t\tefx_rc_t\n+ef10_proxy_auth_mc_config(\n+\t__in\t\t\tefx_nic_t *enp,\n+\t__in_ecount(block_cnt)\tefsys_mem_t *request_bufferp,\n+\t__in_ecount(block_cnt)\tefsys_mem_t *response_bufferp,\n+\t__in_ecount(block_cnt)\tefsys_mem_t *status_bufferp,\n+\t__in\t\t\tuint32_t block_cnt,\n+\t__in_ecount(op_count)\tuint32_t *op_listp,\n+\t__in\t\t\tsize_t op_count)\n+{\n+#define\tPROXY_OPS_MASK_SIZE\t\t\t\t\t\t\\\n+\t(EFX_DIV_ROUND_UP(\t\t\t\t\t\t\\\n+\t    MC_CMD_PROXY_CONFIGURE_IN_ALLOWED_MCDI_MASK_LEN,\t\t\\\n+\t    sizeof (uint32_t)))\n+\n+\tefx_rc_t rc;\n+\tuint32_t op_mask[PROXY_OPS_MASK_SIZE] = {0};\n+\n+\t/* Prepare the operation mask from operation list array */\n+\tif ((rc = efx_proxy_auth_fill_op_mask(op_listp, op_count,\n+\t\t\top_mask, PROXY_OPS_MASK_SIZE) != 0))\n+\t\tgoto fail1;\n+\n+\tif ((rc = efx_mcdi_proxy_configure(enp, B_FALSE,\n+\t\t\tEFSYS_MEM_ADDR(request_bufferp),\n+\t\t\tEFSYS_MEM_ADDR(response_bufferp),\n+\t\t\tEFSYS_MEM_ADDR(status_bufferp),\n+\t\t\tEFSYS_MEM_SIZE(request_bufferp) / block_cnt,\n+\t\t\tEFSYS_MEM_SIZE(response_bufferp) / block_cnt,\n+\t\t\tblock_cnt, (uint8_t *)&op_mask,\n+\t\t\tsizeof (op_mask))) != 0)\n+\t\tgoto fail2;\n+\n+\treturn (0);\n+\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_disable(\n+\t__in\t\tefx_nic_t *enp)\n+{\n+\tefx_rc_t rc;\n+\n+\tif ((rc = efx_mcdi_proxy_configure(enp, B_TRUE,\n+\t\t\t0, 0, 0, 0, 0, 0, NULL, 0) != 0))\n+\t\tgoto fail1;\n+\n+\treturn (0);\n+\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t fn_group,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask)\n+{\n+\treturn (efx_mcdi_privilege_modify(enp, fn_group, pf_index, vf_index,\n+\t\t\tadd_privileges_mask, remove_privileges_mask));\n+}\n+#endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\ndiff --git a/drivers/net/sfc/base/efx.h b/drivers/net/sfc/base/efx.h\nindex 492c8c6..8a3eb17 100644\n--- a/drivers/net/sfc/base/efx.h\n+++ b/drivers/net/sfc/base/efx.h\n@@ -3419,6 +3419,38 @@ extern\t__checkReturn\t__success(return != B_FALSE)\tboolean_t\n \n #endif /* EFSYS_OPT_EVB */\n \n+#if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER\n+\n+typedef struct efx_proxy_auth_config_s {\n+\tefsys_mem_t\t*request_bufferp;\n+\tefsys_mem_t\t*response_bufferp;\n+\tefsys_mem_t\t*status_bufferp;\n+\tuint32_t\tblock_cnt;\n+\tuint32_t\t*op_listp;\n+\tsize_t\t\top_count;\n+\tuint32_t\thandled_privileges;\n+} efx_proxy_auth_config_t;\n+\n+extern\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_init(\n+\t__in\t\tefx_nic_t *enp);\n+\n+extern\t\t\tvoid\n+efx_proxy_auth_fini(\n+\t__in\t\tefx_nic_t *enp);\n+\n+extern\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_configure(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tefx_proxy_auth_config_t *configp);\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_destroy(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t handled_privileges);\n+\n+#endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n+\n #ifdef\t__cplusplus\n }\n #endif\ndiff --git a/drivers/net/sfc/base/efx_impl.h b/drivers/net/sfc/base/efx_impl.h\nindex 46d5389..6a8fee8 100644\n--- a/drivers/net/sfc/base/efx_impl.h\n+++ b/drivers/net/sfc/base/efx_impl.h\n@@ -59,6 +59,7 @@\n #define\tEFX_MOD_LIC\t\t0x00002000\n #define\tEFX_MOD_TUNNEL\t\t0x00004000\n #define\tEFX_MOD_EVB\t\t0x00008000\n+#define\tEFX_MOD_PROXY\t\t0x00010000\n \n #define\tEFX_RESET_PHY\t\t0x00000001\n #define\tEFX_RESET_RXQ_ERR\t0x00000002\n@@ -691,6 +692,24 @@ struct efx_vswitch_s {\n \n #endif /* EFSYS_OPT_EVB */\n \n+#if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER\n+\n+#define\tEFX_PROXY_CONFIGURE_MAGIC\t0xAB2015EF\n+\n+\n+typedef struct efx_proxy_ops_s {\n+\tefx_rc_t\t(*epo_init)(efx_nic_t *);\n+\tvoid\t\t(*epo_fini)(efx_nic_t *);\n+\tefx_rc_t\t(*epo_mc_config)(efx_nic_t *, efsys_mem_t *,\n+\t\t\t\t\tefsys_mem_t *, efsys_mem_t *,\n+\t\t\t\t\tuint32_t, uint32_t *, size_t);\n+\tefx_rc_t\t(*epo_disable)(efx_nic_t *);\n+\tefx_rc_t\t(*epo_privilege_modify)(efx_nic_t *, uint32_t, uint32_t,\n+\t\t\t\t\tuint32_t, uint32_t, uint32_t);\n+} efx_proxy_ops_t;\n+\n+#endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n+\n #define\tEFX_DRV_VER_MAX\t\t20\n \n typedef struct efx_drv_cfg_s {\n@@ -793,6 +812,9 @@ struct efx_nic_s {\n \tconst efx_evb_ops_t\t*en_eeop;\n \tstruct efx_vswitch_s    *en_vswitchp;\n #endif\t/* EFSYS_OPT_EVB */\n+#if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER\n+\tconst efx_proxy_ops_t\t*en_epop;\n+#endif\t/* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n };\n \n #define\tEFX_FAMILY_IS_EF10(_enp) \\\ndiff --git a/drivers/net/sfc/base/efx_proxy.c b/drivers/net/sfc/base/efx_proxy.c\nnew file mode 100644\nindex 0000000..6aadf07\n--- /dev/null\n+++ b/drivers/net/sfc/base/efx_proxy.c\n@@ -0,0 +1,200 @@\n+/* SPDX-License-Identifier: BSD-3-Clause\n+ *\n+ * Copyright (c) 2018-2019 Solarflare Communications Inc.\n+ * All rights reserved.\n+ */\n+\n+#include \"efx.h\"\n+#include \"efx_impl.h\"\n+\n+#if EFSYS_OPT_MCDI_PROXY_AUTH_SERVER\n+\n+#if EFSYS_OPT_SIENA\n+static const efx_proxy_ops_t\t__efx_proxy_dummy_ops = {\n+\tNULL,\t\t\t/* epo_init */\n+\tNULL,\t\t\t/* epo_fini */\n+\tNULL,\t\t\t/* epo_mc_config */\n+\tNULL,\t\t\t/* epo_disable */\n+\tNULL,\t\t\t/* epo_privilege_modify */\n+};\n+#endif /* EFSYS_OPT_SIENA */\n+\n+#if EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD || EFSYS_OPT_MEDFORD2\n+static const efx_proxy_ops_t\t\t\t__efx_proxy_ef10_ops = {\n+\tef10_proxy_auth_init,\t\t\t/* epo_init */\n+\tef10_proxy_auth_fini,\t\t\t/* epo_fini */\n+\tef10_proxy_auth_mc_config,\t\t/* epo_mc_config */\n+\tef10_proxy_auth_disable,\t\t/* epo_disable */\n+\tef10_proxy_auth_privilege_modify,\t/* epo_privilege_modify */\n+};\n+#endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD || EFSYS_OPT_MEDFORD2 */\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_init(\n+\t__in\t\tefx_nic_t *enp)\n+{\n+\tconst efx_proxy_ops_t *epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);\n+\tEFSYS_ASSERT3U(enp->en_mod_flags, &, EFX_MOD_PROBE);\n+\tEFSYS_ASSERT(!(enp->en_mod_flags & EFX_MOD_PROXY));\n+\n+\tswitch (enp->en_family) {\n+#if EFSYS_OPT_SIENA\n+\tcase EFX_FAMILY_SIENA:\n+\t\tepop = &__efx_proxy_dummy_ops;\n+\t\tbreak;\n+#endif /* EFSYS_OPT_SIENA */\n+\n+#if EFSYS_OPT_HUNTINGTON\n+\tcase EFX_FAMILY_HUNTINGTON:\n+\t\tepop = &__efx_proxy_ef10_ops;\n+\t\tbreak;\n+#endif /* EFSYS_OPT_HUNTINGTON */\n+\n+#if EFSYS_OPT_MEDFORD\n+\tcase EFX_FAMILY_MEDFORD:\n+\t\tepop = &__efx_proxy_ef10_ops;\n+\t\tbreak;\n+#endif /* EFSYS_OPT_MEDFORD */\n+\n+#if EFSYS_OPT_MEDFORD2\n+\tcase EFX_FAMILY_MEDFORD2:\n+\t\tepop = &__efx_proxy_ef10_ops;\n+\t\tbreak;\n+#endif /* EFSYS_OPT_MEDFORD2 */\n+\n+\tdefault:\n+\t\tEFSYS_ASSERT(0);\n+\t\trc = ENOTSUP;\n+\t\tgoto fail1;\n+\t}\n+\n+\tif (epop->epo_init == NULL) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail2;\n+\t}\n+\n+\tif ((rc = epop->epo_init(enp)) != 0)\n+\t\tgoto fail3;\n+\n+\tenp->en_epop = epop;\n+\tenp->en_mod_flags |= EFX_MOD_PROXY;\n+\treturn (0);\n+\n+fail3:\n+\tEFSYS_PROBE(fail3);\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\n+\treturn (rc);\n+}\n+\n+\t\t\tvoid\n+efx_proxy_auth_fini(\n+\t__in\t\tefx_nic_t *enp)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\n+\tEFSYS_ASSERT3U(enp->en_magic, ==, EFX_NIC_MAGIC);\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROBE);\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif ((epop != NULL) && (epop->epo_fini != NULL))\n+\t\tepop->epo_fini(enp);\n+\n+\tenp->en_epop = NULL;\n+\tenp->en_mod_flags &= ~EFX_MOD_PROXY;\n+}\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_configure(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tefx_proxy_auth_config_t *configp)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif ((configp == NULL) ||\n+\t    (configp->request_bufferp == NULL) ||\n+\t    (configp->response_bufferp == NULL) ||\n+\t    (configp->status_bufferp == NULL) ||\n+\t    (configp->op_listp == NULL) ||\n+\t    (configp->block_cnt == 0)) {\n+\t\trc = EINVAL;\n+\t\tgoto fail1;\n+\t}\n+\n+\tif ((epop->epo_mc_config == NULL) ||\n+\t    (epop->epo_privilege_modify == NULL)) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail2;\n+\t}\n+\n+\trc = epop->epo_mc_config(enp, configp->request_bufferp,\n+\t\t\tconfigp->response_bufferp, configp->status_bufferp,\n+\t\t\tconfigp->block_cnt, configp->op_listp,\n+\t\t\tconfigp->op_count);\n+\tif (rc != 0)\n+\t\tgoto fail3;\n+\n+\trc = epop->epo_privilege_modify(enp, MC_CMD_PRIVILEGE_MODIFY_IN_ALL,\n+\t\t\t0, 0, 0, configp->handled_privileges);\n+\tif (rc != 0)\n+\t\tgoto fail4;\n+\n+\treturn (0);\n+\n+fail4:\n+\tEFSYS_PROBE(fail4);\n+fail3:\n+\tEFSYS_PROBE(fail3);\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_destroy(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t handled_privileges)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif ((epop->epo_disable == NULL) ||\n+\t    (epop->epo_privilege_modify == NULL)) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail1;\n+\t}\n+\n+\trc = epop->epo_privilege_modify(enp, MC_CMD_PRIVILEGE_MODIFY_IN_ALL,\n+\t\t0, 0, handled_privileges, 0);\n+\tif (rc != 0)\n+\t\tgoto fail2;\n+\n+\trc = epop->epo_disable(enp);\n+\tif (rc != 0)\n+\t\tgoto fail3;\n+\n+\treturn (0);\n+\n+fail3:\n+\tEFSYS_PROBE(fail3);\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+#endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\ndiff --git a/drivers/net/sfc/base/meson.build b/drivers/net/sfc/base/meson.build\nindex 6fa7948..6c80305 100644\n--- a/drivers/net/sfc/base/meson.build\n+++ b/drivers/net/sfc/base/meson.build\n@@ -20,6 +20,7 @@ sources = [\n \t'efx_nvram.c',\n \t'efx_phy.c',\n \t'efx_port.c',\n+\t'efx_proxy.c',\n \t'efx_rx.c',\n \t'efx_sram.c',\n \t'efx_tunnel.c',\n@@ -43,6 +44,7 @@ sources = [\n \t'ef10_nic.c',\n \t'ef10_nvram.c',\n \t'ef10_phy.c',\n+\t'ef10_proxy.c',\n \t'ef10_rx.c',\n \t'ef10_tx.c',\n \t'ef10_vpd.c',\ndiff --git a/drivers/net/sfc/efsys.h b/drivers/net/sfc/efsys.h\nindex 24f3769..762c6ee 100644\n--- a/drivers/net/sfc/efsys.h\n+++ b/drivers/net/sfc/efsys.h\n@@ -168,6 +168,8 @@\n \n #define EFSYS_OPT_EVB 0\n \n+#define EFSYS_OPT_MCDI_PROXY_AUTH_SERVER 0\n+\n /* ID */\n \n typedef struct __efsys_identifier_s efsys_identifier_t;\n",
    "prefixes": [
        "24/29"
    ]
}