Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/54608/?format=api
http://patches.dpdk.org/api/patches/54608/?format=api", "web_url": "http://patches.dpdk.org/project/dpdk/patch/1560152324-20538-30-git-send-email-arybchenko@solarflare.com/", "project": { "id": 1, "url": "http://patches.dpdk.org/api/projects/1/?format=api", "name": "DPDK", "link_name": "dpdk", "list_id": "dev.dpdk.org", "list_email": "dev@dpdk.org", "web_url": "http://core.dpdk.org", "scm_url": "git://dpdk.org/dpdk", "webscm_url": "http://git.dpdk.org/dpdk", "list_archive_url": "https://inbox.dpdk.org/dev", "list_archive_url_format": "https://inbox.dpdk.org/dev/{}", "commit_url_format": "" }, "msgid": "<1560152324-20538-30-git-send-email-arybchenko@solarflare.com>", "list_archive_url": "https://inbox.dpdk.org/dev/1560152324-20538-30-git-send-email-arybchenko@solarflare.com", "date": "2019-06-10T07:38:44", "name": "[29/29] net/sfc/base: add APIs for PTP privilege configuration", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": true, "hash": "629b71b0bbe8f0a0f29d4630179e273f1997f2b6", "submitter": { "id": 607, "url": "http://patches.dpdk.org/api/people/607/?format=api", "name": "Andrew Rybchenko", "email": "arybchenko@solarflare.com" }, "delegate": { "id": 319, "url": "http://patches.dpdk.org/api/users/319/?format=api", "username": "fyigit", "first_name": "Ferruh", "last_name": "Yigit", "email": "ferruh.yigit@amd.com" }, "mbox": "http://patches.dpdk.org/project/dpdk/patch/1560152324-20538-30-git-send-email-arybchenko@solarflare.com/mbox/", "series": [ { "id": 4965, "url": "http://patches.dpdk.org/api/series/4965/?format=api", "web_url": "http://patches.dpdk.org/project/dpdk/list/?series=4965", "date": "2019-06-10T07:38:19", "name": "net/sfc/base: update base driver", "version": 1, "mbox": "http://patches.dpdk.org/series/4965/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/54608/comments/", "check": "fail", "checks": "http://patches.dpdk.org/api/patches/54608/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dev-bounces@dpdk.org>", "X-Original-To": "patchwork@dpdk.org", "Delivered-To": "patchwork@dpdk.org", "Received": [ "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 83E8F1BF3F;\n\tMon, 10 Jun 2019 09:39:39 +0200 (CEST)", "from dispatch1-us1.ppe-hosted.com (dispatch1-us1.ppe-hosted.com\n\t[67.231.154.164]) by dpdk.org (Postfix) with ESMTP id 3C7001BE9B\n\tfor <dev@dpdk.org>; Mon, 10 Jun 2019 09:38:59 +0200 (CEST)", "from webmail.solarflare.com (webmail.solarflare.com\n\t[12.187.104.26])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby mx1-us1.ppe-hosted.com (PPE Hosted ESMTP Server) with ESMTPS id\n\t5BFCB140058\n\tfor <dev@dpdk.org>; Mon, 10 Jun 2019 07:38:58 +0000 (UTC)", "from ocex03.SolarFlarecom.com (10.20.40.36) by\n\tocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server\n\t(TLS) id 15.0.1395.4; Mon, 10 Jun 2019 00:38:52 -0700", "from opal.uk.solarflarecom.com (10.17.10.1) by\n\tocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server\n\t(TLS) id\n\t15.0.1395.4 via Frontend Transport; Mon, 10 Jun 2019 00:38:51 -0700", "from ukv-loginhost.uk.solarflarecom.com\n\t(ukv-loginhost.uk.solarflarecom.com [10.17.10.39])\n\tby opal.uk.solarflarecom.com (8.13.8/8.13.8) with ESMTP id\n\tx5A7cod4008879; Mon, 10 Jun 2019 08:38:50 +0100", "from ukv-loginhost.uk.solarflarecom.com (localhost [127.0.0.1])\n\tby ukv-loginhost.uk.solarflarecom.com (Postfix) with ESMTP id\n\t72CCA1627D7; Mon, 10 Jun 2019 08:38:50 +0100 (BST)" ], "X-Virus-Scanned": "Proofpoint Essentials engine", "From": "Andrew Rybchenko <arybchenko@solarflare.com>", "To": "<dev@dpdk.org>", "CC": "Gautam Dawar <gdawar@solarflare.com>", "Date": "Mon, 10 Jun 2019 08:38:44 +0100", "Message-ID": "<1560152324-20538-30-git-send-email-arybchenko@solarflare.com>", "X-Mailer": "git-send-email 1.8.3.1", "In-Reply-To": "<1560152324-20538-1-git-send-email-arybchenko@solarflare.com>", "References": "<1560152324-20538-1-git-send-email-arybchenko@solarflare.com>", "MIME-Version": "1.0", "Content-Type": "text/plain", "X-TM-AS-Product-Ver": "SMEX-12.5.0.1300-8.5.1010-24664.003", "X-TM-AS-Result": "No-2.290500-4.000000-10", "X-TMASE-MatchedRID": "tAYJtAlxpuYIHyE1IfGi6Ydlc1JaOB1T3V4UShoTXacYMX/fk94vWzB9\n\tccde3hbU0ZiHYm0cDqWudjtJNc/3dqH2g9syPs88bBMSu4v05tNNejdAw/bX399RlPzeVuQQg6c\n\tH7aDJatYNSyXBXXm7SPquDPDlvbSBOjQXVMc52b3/V0SDC1Do0HLIy0Oi6dswU6K0SLmnabR5g7\n\tFdQG34vMM1QfdaUKwEJdw5r0zwEJsfE8yM4pjsDwtuKBGekqUpnH7sbImOEBQsnHWydaqG2eUjK\n\tqGXygcsjNg7iEFyQGHKCbqwExcqdWMlZB21s06kRE5DpMY+rMNFw1EJZ4YrgiCf8i9GPLzkKj9E\n\tOII9DpfkA8OrYHdwDGfYlY/yoV/0Up6EHOb2+c7kHZDO53QSwmA7bUFBqh2V", "X-TM-AS-User-Approved-Sender": "No", "X-TM-AS-User-Blocked-Sender": "No", "X-TMASE-Result": "10--2.290500-4.000000", "X-TMASE-Version": "SMEX-12.5.0.1300-8.5.1010-24664.003", "X-MDID": "1560152339-HdOb4dS1l0GX", "Subject": "[dpdk-dev] [PATCH 29/29] net/sfc/base: add APIs for PTP privilege\n\tconfiguration", "X-BeenThere": "dev@dpdk.org", "X-Mailman-Version": "2.1.15", "Precedence": "list", "List-Id": "DPDK patches and discussions <dev.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dev/>", "List-Post": "<mailto:dev@dpdk.org>", "List-Help": "<mailto:dev-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>", "Errors-To": "dev-bounces@dpdk.org", "Sender": "\"dev\" <dev-bounces@dpdk.org>" }, "content": "From: Gautam Dawar <gdawar@solarflare.com>\n\nImplement the efx_proxy_auth_privilege_mask_get() to get a function's\nprivilege mask and efx_proxy_auth_privilege_modify() to add/remove\nprivileges for a function specified by PF and VF index.\n\nSigned-off-by: Gautam Dawar <gdawar@solarflare.com>\nSigned-off-by: Andrew Rybchenko <arybchenko@solarflare.com>\n---\n drivers/net/sfc/base/ef10_impl.h | 7 +++++\n drivers/net/sfc/base/ef10_proxy.c | 11 +++++++\n drivers/net/sfc/base/efx.h | 15 +++++++++\n drivers/net/sfc/base/efx_impl.h | 2 ++\n drivers/net/sfc/base/efx_proxy.c | 64 +++++++++++++++++++++++++++++++++++++++\n 5 files changed, 99 insertions(+)", "diff": "diff --git a/drivers/net/sfc/base/ef10_impl.h b/drivers/net/sfc/base/ef10_impl.h\nindex 09f97f8..3961801 100644\n--- a/drivers/net/sfc/base/ef10_impl.h\n+++ b/drivers/net/sfc/base/ef10_impl.h\n@@ -1411,6 +1411,13 @@ extern\t__checkReturn\t__success(return != B_FALSE)\tboolean_t\n \t__in\t\tefx_nic_t *enp,\n \t__inout\t\tefx_proxy_cmd_params_t *paramsp);\n \n+\t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_get_privilege_mask(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp);\n+\n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n \n #if EFSYS_OPT_RX_PACKED_STREAM\ndiff --git a/drivers/net/sfc/base/ef10_proxy.c b/drivers/net/sfc/base/ef10_proxy.c\nindex a3b73f4..059b2f5 100644\n--- a/drivers/net/sfc/base/ef10_proxy.c\n+++ b/drivers/net/sfc/base/ef10_proxy.c\n@@ -451,6 +451,17 @@\n }\n \n \t__checkReturn\tefx_rc_t\n+ef10_proxy_auth_get_privilege_mask(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp)\n+{\n+\treturn (efx_mcdi_privilege_mask(enp, pf_index, vf_index, maskp));\n+}\n+\n+\n+\t__checkReturn\tefx_rc_t\n ef10_proxy_auth_exec_cmd(\n \t__in\t\tefx_nic_t *enp,\n \t__inout\t\tefx_proxy_cmd_params_t *paramsp)\ndiff --git a/drivers/net/sfc/base/efx.h b/drivers/net/sfc/base/efx.h\nindex a43ddd9..53c7b42 100644\n--- a/drivers/net/sfc/base/efx.h\n+++ b/drivers/net/sfc/base/efx.h\n@@ -3513,6 +3513,21 @@ extern\t__checkReturn\t__success(return != B_FALSE)\tboolean_t\n \t__in\t\tuint32_t mask,\n \t__in\t\tuint32_t value);\n \n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_mask_get(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp);\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask);\n+\n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n \n #ifdef\t__cplusplus\ndiff --git a/drivers/net/sfc/base/efx_impl.h b/drivers/net/sfc/base/efx_impl.h\nindex 3e8b26a..85d984f 100644\n--- a/drivers/net/sfc/base/efx_impl.h\n+++ b/drivers/net/sfc/base/efx_impl.h\n@@ -717,6 +717,8 @@ struct efx_vswitch_s {\n \tefx_rc_t\t(*epo_complete_request)(efx_nic_t *, uint32_t,\n \t\t\t\t\tuint32_t, uint32_t);\n \tefx_rc_t\t(*epo_exec_cmd)(efx_nic_t *, efx_proxy_cmd_params_t *);\n+\tefx_rc_t\t(*epo_get_privilege_mask)(efx_nic_t *, uint32_t,\n+\t\t\t\t\tuint32_t, uint32_t *);\n } efx_proxy_ops_t;\n \n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\ndiff --git a/drivers/net/sfc/base/efx_proxy.c b/drivers/net/sfc/base/efx_proxy.c\nindex b04e7dd..791105a 100644\n--- a/drivers/net/sfc/base/efx_proxy.c\n+++ b/drivers/net/sfc/base/efx_proxy.c\n@@ -19,6 +19,7 @@\n \tNULL,\t\t\t/* epo_set_privilege_mask */\n \tNULL,\t\t\t/* epo_complete_request */\n \tNULL,\t\t\t/* epo_exec_cmd */\n+\tNULL,\t\t\t/* epo_get_privilege_mask */\n };\n #endif /* EFSYS_OPT_SIENA */\n \n@@ -32,6 +33,7 @@\n \tef10_proxy_auth_set_privilege_mask,\t/* epo_set_privilege_mask */\n \tef10_proxy_auth_complete_request,\t/* epo_complete_request */\n \tef10_proxy_auth_exec_cmd,\t\t/* epo_exec_cmd */\n+\tef10_proxy_auth_get_privilege_mask,\t/* epo_get_privilege_mask */\n };\n #endif /* EFSYS_OPT_HUNTINGTON || EFSYS_OPT_MEDFORD || EFSYS_OPT_MEDFORD2 */\n \n@@ -296,5 +298,67 @@\n \treturn (rc);\n }\n \n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_mask_get(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__out\t\tuint32_t *maskp)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif (epop->epo_get_privilege_mask == NULL) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail1;\n+\t}\n+\n+\trc = epop->epo_get_privilege_mask(enp, pf_index, vf_index, maskp);\n+\tif (rc != 0)\n+\t\tgoto fail2;\n+\n+\treturn (0);\n+\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n+\n+\t__checkReturn\tefx_rc_t\n+efx_proxy_auth_privilege_modify(\n+\t__in\t\tefx_nic_t *enp,\n+\t__in\t\tuint32_t pf_index,\n+\t__in\t\tuint32_t vf_index,\n+\t__in\t\tuint32_t add_privileges_mask,\n+\t__in\t\tuint32_t remove_privileges_mask)\n+{\n+\tconst efx_proxy_ops_t *epop = enp->en_epop;\n+\tefx_rc_t rc;\n+\n+\tEFSYS_ASSERT(enp->en_mod_flags & EFX_MOD_PROXY);\n+\n+\tif (epop->epo_privilege_modify == NULL) {\n+\t\trc = ENOTSUP;\n+\t\tgoto fail1;\n+\t}\n+\n+\trc = epop->epo_privilege_modify(enp, MC_CMD_PRIVILEGE_MODIFY_IN_ONE,\n+\t\t pf_index, vf_index, add_privileges_mask,\n+\t\t remove_privileges_mask);\n+\tif (rc != 0)\n+\t\tgoto fail2;\n+\n+\treturn (0);\n+\n+fail2:\n+\tEFSYS_PROBE(fail2);\n+fail1:\n+\tEFSYS_PROBE1(fail1, efx_rc_t, rc);\n+\treturn (rc);\n+}\n \n #endif /* EFSYS_OPT_MCDI_PROXY_AUTH_SERVER */\n", "prefixes": [ "29/29" ] }{ "id": 54608, "url": "