get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/54608/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 54608,
    "url": "http://patches.dpdk.org/api/patches/54608/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1560152324-20538-30-git-send-email-arybchenko@solarflare.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1560152324-20538-30-git-send-email-arybchenko@solarflare.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1560152324-20538-30-git-send-email-arybchenko@solarflare.com",
    "date": "2019-06-10T07:38:44",
    "name": "[29/29] net/sfc/base: add APIs for PTP privilege configuration",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "629b71b0bbe8f0a0f29d4630179e273f1997f2b6",
    "submitter": {
        "id": 607,
        "url": "http://patches.dpdk.org/api/people/607/?format=api",
        "name": "Andrew Rybchenko",
        "email": "arybchenko@solarflare.com"
    },
    "delegate": {
        "id": 319,
        "url": "http://patches.dpdk.org/api/users/319/?format=api",
        "username": "fyigit",
        "first_name": "Ferruh",
        "last_name": "Yigit",
        "email": "ferruh.yigit@amd.com"
    },
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1560152324-20538-30-git-send-email-arybchenko@solarflare.com/mbox/",
    "series": [
        {
            "id": 4965,
            "url": "http://patches.dpdk.org/api/series/4965/?format=api",
            "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=4965",
            "date": "2019-06-10T07:38:19",
            "name": "net/sfc/base: update base driver",
            "version": 1,
            "mbox": "http://patches.dpdk.org/series/4965/mbox/"
        }
    ],
    "comments": "http://patches.dpdk.org/api/patches/54608/comments/",
    "check": "fail",
    "checks": "http://patches.dpdk.org/api/patches/54608/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 83E8F1BF3F;\n\tMon, 10 Jun 2019 09:39:39 +0200 (CEST)",
            "from dispatch1-us1.ppe-hosted.com (dispatch1-us1.ppe-hosted.com\n\t[67.231.154.164]) by dpdk.org (Postfix) with ESMTP id 3C7001BE9B\n\tfor <dev@dpdk.org>; Mon, 10 Jun 2019 09:38:59 +0200 (CEST)",
            "from webmail.solarflare.com (webmail.solarflare.com\n\t[12.187.104.26])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby mx1-us1.ppe-hosted.com (PPE Hosted ESMTP Server) with ESMTPS id\n\t5BFCB140058\n\tfor <dev@dpdk.org>; Mon, 10 Jun 2019 07:38:58 +0000 (UTC)",
            "from ocex03.SolarFlarecom.com (10.20.40.36) by\n\tocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server\n\t(TLS) id 15.0.1395.4; Mon, 10 Jun 2019 00:38:52 -0700",
            "from opal.uk.solarflarecom.com (10.17.10.1) by\n\tocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server\n\t(TLS) id\n\t15.0.1395.4 via Frontend Transport; Mon, 10 Jun 2019 00:38:51 -0700",
            "from ukv-loginhost.uk.solarflarecom.com\n\t(ukv-loginhost.uk.solarflarecom.com [10.17.10.39])\n\tby opal.uk.solarflarecom.com (8.13.8/8.13.8) with ESMTP id\n\tx5A7cod4008879; Mon, 10 Jun 2019 08:38:50 +0100",
            "from ukv-loginhost.uk.solarflarecom.com (localhost [127.0.0.1])\n\tby ukv-loginhost.uk.solarflarecom.com (Postfix) with ESMTP id\n\t72CCA1627D7; Mon, 10 Jun 2019 08:38:50 +0100 (BST)"
        ],
        "X-Virus-Scanned": "Proofpoint Essentials engine",
        "From": "Andrew Rybchenko <arybchenko@solarflare.com>",
        "To": "<dev@dpdk.org>",
        "CC": "Gautam Dawar <gdawar@solarflare.com>",
        "Date": "Mon, 10 Jun 2019 08:38:44 +0100",
        "Message-ID": "<1560152324-20538-30-git-send-email-arybchenko@solarflare.com>",
        "X-Mailer": "git-send-email 1.8.3.1",
        "In-Reply-To": "<1560152324-20538-1-git-send-email-arybchenko@solarflare.com>",
        "References": "<1560152324-20538-1-git-send-email-arybchenko@solarflare.com>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-TM-AS-Product-Ver": "SMEX-12.5.0.1300-8.5.1010-24664.003",
        "X-TM-AS-Result": "No-2.290500-4.000000-10",
        "X-TMASE-MatchedRID": "tAYJtAlxpuYIHyE1IfGi6Ydlc1JaOB1T3V4UShoTXacYMX/fk94vWzB9\n\tccde3hbU0ZiHYm0cDqWudjtJNc/3dqH2g9syPs88bBMSu4v05tNNejdAw/bX399RlPzeVuQQg6c\n\tH7aDJatYNSyXBXXm7SPquDPDlvbSBOjQXVMc52b3/V0SDC1Do0HLIy0Oi6dswU6K0SLmnabR5g7\n\tFdQG34vMM1QfdaUKwEJdw5r0zwEJsfE8yM4pjsDwtuKBGekqUpnH7sbImOEBQsnHWydaqG2eUjK\n\tqGXygcsjNg7iEFyQGHKCbqwExcqdWMlZB21s06kRE5DpMY+rMNFw1EJZ4YrgiCf8i9GPLzkKj9E\n\tOII9DpfkA8OrYHdwDGfYlY/yoV/0Up6EHOb2+c7kHZDO53QSwmA7bUFBqh2V",
        "X-TM-AS-User-Approved-Sender": "No",
        "X-TM-AS-User-Blocked-Sender": "No",
        "X-TMASE-Result": "10--2.290500-4.000000",
        "X-TMASE-Version": "SMEX-12.5.0.1300-8.5.1010-24664.003",
        "X-MDID": "1560152339-HdOb4dS1l0GX",
        "Subject": "[dpdk-dev] [PATCH 29/29] net/sfc/base: add APIs for PTP privilege\n\tconfiguration",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "From: Gautam Dawar <gdawar@solarflare.com>\n\nImplement the efx_proxy_auth_privilege_mask_get() to get a function's\nprivilege mask and efx_proxy_auth_privilege_modify() to add/remove\nprivileges for a function specified by PF and VF index.\n\nSigned-off-by: Gautam Dawar <gdawar@solarflare.com>\nSigned-off-by: Andrew Rybchenko <arybchenko@solarflare.com>\n---\n drivers/net/sfc/base/ef10_impl.h  |  7 +++++\n drivers/net/sfc/base/ef10_proxy.c | 11 +++++++\n drivers/net/sfc/base/efx.h        | 15 +++++++++\n drivers/net/sfc/base/efx_impl.h   |  2 ++\n drivers/net/sfc/base/efx_proxy.c  | 64 +++++++++++++++++++++++++++++++++++++++\n 5 files changed, 99 insertions(+)",
    "diff": "diff --git a/drivers/net/sfc/base/ef10_impl.h b/drivers/net/sfc/base/ef10_impl.h\nindex 09f97f8..3961801 100644\n--- a/drivers/net/sfc/base/ef10_impl.h\n+++ b/drivers/net/sfc/base/ef10_impl.h\n@@ -1411,6 +1411,13 @@ extern\t__checkReturn\t__success(return != B_FALSE)\tboolean_t\n \t__in\t\tefx_nic_t *enp,\n \t__inout\t\tefx_proxy_cmd_params_t *paramsp);\n \n+\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_get_privilege_mask(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp);\n+\n #endif  /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n \n #if EFSYS_OPT_RX_PACKED_STREAM\ndiff --git a/drivers/net/sfc/base/ef10_proxy.c b/drivers/net/sfc/base/ef10_proxy.c\nindex a3b73f4..059b2f5 100644\n--- a/drivers/net/sfc/base/ef10_proxy.c\n+++ b/drivers/net/sfc/base/ef10_proxy.c\n@@ -451,6 +451,17 @@\n }\n \n \t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_get_privilege_mask(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp)\n+{\n+\treturn (efx_mcdi_privilege_mask(enp, pf_index, vf_index, maskp));\n+}\n+\n+\n+\t__checkReturn\tefx_rc_t\n ef10_proxy_auth_exec_cmd(\n \t__in\t\tefx_nic_t *enp,\n \t__inout\t\tefx_proxy_cmd_params_t *paramsp)\ndiff --git a/drivers/net/sfc/base/efx.h b/drivers/net/sfc/base/efx.h\nindex a43ddd9..53c7b42 100644\n--- a/drivers/net/sfc/base/efx.h\n+++ b/drivers/net/sfc/base/efx.h\n@@ -3513,6 +3513,21 @@ extern\t__checkReturn\t__success(return != B_FALSE)\tboolean_t\n \t__in\t\tuint32_t mask,\n \t__in\t\tuint32_t value);\n \n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_mask_get(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp);\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask);\n+\n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n \n #ifdef\t__cplusplus\ndiff --git a/drivers/net/sfc/base/efx_impl.h b/drivers/net/sfc/base/efx_impl.h\nindex 3e8b26a..85d984f 100644\n--- a/drivers/net/sfc/base/efx_impl.h\n+++ b/drivers/net/sfc/base/efx_impl.h\n@@ -717,6 +717,8 @@ struct efx_vswitch_s {\n \tefx_rc_t\t(*epo_complete_request)(efx_nic_t *, uint32_t,\n \t\t\t\t\tuint32_t, uint32_t);\n \tefx_rc_t\t(*epo_exec_cmd)(efx_nic_t *, efx_proxy_cmd_params_t *);\n+\tefx_rc_t\t(*epo_get_privilege_mask)(efx_nic_t *, uint32_t,\n+\t\t\t\t\tuint32_t, uint32_t *);\n } efx_proxy_ops_t;\n \n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\ndiff --git a/drivers/net/sfc/base/efx_proxy.c b/drivers/net/sfc/base/efx_proxy.c\nindex b04e7dd..791105a 100644\n--- a/drivers/net/sfc/base/efx_proxy.c\n+++ b/drivers/net/sfc/base/efx_proxy.c\n@@ -19,6 +19,7 @@\n \tNULL,\t\t\t/* epo_set_privilege_mask */\n \tNULL,\t\t\t/* epo_complete_request */\n \tNULL,\t\t\t/* epo_exec_cmd */\n+\tNULL,\t\t\t/* epo_get_privilege_mask */\n };\n #endif /* EFSYS_OPT_SIENA */\n \n@@ -32,6 +33,7 @@\n \tef10_proxy_auth_set_privilege_mask,\t/* epo_set_privilege_mask */\n \tef10_proxy_auth_complete_request,\t/* epo_complete_request */\n \tef10_proxy_auth_exec_cmd,\t\t/* epo_exec_cmd */\n+\tef10_proxy_auth_get_privilege_mask,\t/* epo_get_privilege_mask */\n };\n #endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD || EFSYS_OPT_MEDFORD2 */\n \n@@ -296,5 +298,67 @@\n \treturn (rc);\n }\n \n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_mask_get(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif (epop->epo_get_privilege_mask == NULL) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail1;\n+\t}\n+\n+\trc = epop->epo_get_privilege_mask(enp, pf_index, vf_index, maskp);\n+\tif (rc != 0)\n+\t\tgoto fail2;\n+\n+\treturn (0);\n+\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif (epop->epo_privilege_modify == NULL) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail1;\n+\t}\n+\n+\trc = epop->epo_privilege_modify(enp, MC_CMD_PRIVILEGE_MODIFY_IN_ONE,\n+\t\t    pf_index, vf_index, add_privileges_mask,\n+\t\t    remove_privileges_mask);\n+\tif (rc != 0)\n+\t\tgoto fail2;\n+\n+\treturn (0);\n+\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n \n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n",
    "prefixes": [
        "29/29"
    ]
}