get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/108374/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 108374,
    "url": "http://patchwork.dpdk.org/api/patches/108374/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/20220227154617.2946292-1-asafp@nvidia.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20220227154617.2946292-1-asafp@nvidia.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20220227154617.2946292-1-asafp@nvidia.com",
    "date": "2022-02-27T15:46:17",
    "name": "[1/1] doc: add steps to configure VF interface as trusted",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": true,
    "hash": "ae64579e389f01fa341ccf438a4c89c9cde48e7b",
    "submitter": {
        "id": 1892,
        "url": "http://patchwork.dpdk.org/api/people/1892/?format=api",
        "name": "Asaf Penso",
        "email": "asafp@nvidia.com"
    },
    "delegate": {
        "id": 3268,
        "url": "http://patchwork.dpdk.org/api/users/3268/?format=api",
        "username": "rasland",
        "first_name": "Raslan",
        "last_name": "Darawsheh",
        "email": "rasland@nvidia.com"
    },
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/20220227154617.2946292-1-asafp@nvidia.com/mbox/",
    "series": [
        {
            "id": 21910,
            "url": "http://patchwork.dpdk.org/api/series/21910/?format=api",
            "web_url": "http://patchwork.dpdk.org/project/dpdk/list/?series=21910",
            "date": "2022-02-27T15:46:17",
            "name": "[1/1] doc: add steps to configure VF interface as trusted",
            "version": 1,
            "mbox": "http://patchwork.dpdk.org/series/21910/mbox/"
        }
    ],
    "comments": "http://patchwork.dpdk.org/api/patches/108374/comments/",
    "check": "success",
    "checks": "http://patchwork.dpdk.org/api/patches/108374/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 4F008A00C3;\n\tSun, 27 Feb 2022 16:46:39 +0100 (CET)",
            "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 1280D4068A;\n\tSun, 27 Feb 2022 16:46:38 +0100 (CET)",
            "from NAM11-CO1-obe.outbound.protection.outlook.com\n (mail-co1nam11on2065.outbound.protection.outlook.com [40.107.220.65])\n by mails.dpdk.org (Postfix) with ESMTP id 2AF0940683\n for <dev@dpdk.org>; Sun, 27 Feb 2022 16:46:37 +0100 (CET)",
            "from MWHPR04CA0058.namprd04.prod.outlook.com (2603:10b6:300:6c::20)\n by DM6PR12MB4250.namprd12.prod.outlook.com (2603:10b6:5:21a::9) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.25; Sun, 27 Feb\n 2022 15:46:35 +0000",
            "from CO1NAM11FT066.eop-nam11.prod.protection.outlook.com\n (2603:10b6:300:6c:cafe::36) by MWHPR04CA0058.outlook.office365.com\n (2603:10b6:300:6c::20) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.22 via Frontend\n Transport; Sun, 27 Feb 2022 15:46:35 +0000",
            "from mail.nvidia.com (12.22.5.236) by\n CO1NAM11FT066.mail.protection.outlook.com (10.13.175.18) with Microsoft SMTP\n Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id\n 15.20.5017.22 via Frontend Transport; Sun, 27 Feb 2022 15:46:34 +0000",
            "from rnnvmail201.nvidia.com (10.129.68.8) by DRHQMAIL109.nvidia.com\n (10.27.9.19) with Microsoft SMTP Server (TLS) id 15.0.1497.18;\n Sun, 27 Feb 2022 15:46:34 +0000",
            "from nvidia.com (10.126.230.35) by rnnvmail201.nvidia.com\n (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.9; Sun, 27 Feb 2022\n 07:46:32 -0800"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;\n b=Pd6UcUOW8hxETHvtZKoDmBNVhhMrTRC6W2lxHwYsntduplFLydsVB3enPvEqD0pkVFGT90bqC8bfhUT5BTO8zc4G+PRhz665irTg8bfCR7FTbOHUSDMFEJdmEqWzhfuUfrw+6ewFAOyIj54D2Z2ySv1owBX+WFGd+XWejAlElnlhvyk+Iz7pKESSJCg11Yg+/GA7lXhLB6vRQWVq7oI3UrjFkeLsoCevafDvNWxUb/XX+DedIMCCCBVCi+WHEt5UGytlSePa9tKs29pSOki6mtTzIW8Cw/kWjoA8Z68q9vKyncir27TcYkYtqkWES5GkJKpdnldvq7+ZJVmlDARjRQ==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector9901;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=fpQUR3oBD5h8NMRKTvTQPCyknfWpcsPTtbBiwTEWKA8=;\n b=LRpnb3m3wX2T499wZsPewXDSklyresdBzFX5L5zp65CZiyYUAEp9xmvFCzVxWosevi/3qyObkBXPvkYNpq2ueBsI40nh1D+hS02k/mdaFNRuuUHpwu2D3d53KR7NAdQm1Uxdh9IPE577bwRKQynFPc3OvhIVjHzvh7LhgnpH+i3gu7yi5ndJwt+75hQT0AYvAV7Q9jirXFJoKtAELPP/7orlI8ct7DSWRZNu6TV+qIkDldBGeEOpqJxrqFH4t6acxJfUtUjdQjDmYLD2+MVL7MhuYN6fFs8HC/2H9ijx/9lzUkV2WQLyI7JZuREm8GUldKrBo71r4fJvVLm15ZSAGA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 12.22.5.236) smtp.rcpttodomain=monjalon.net smtp.mailfrom=nvidia.com;\n dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com;\n dkim=none (message not signed); arc=none",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com;\n s=selector2;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=fpQUR3oBD5h8NMRKTvTQPCyknfWpcsPTtbBiwTEWKA8=;\n b=MFgZDv/LPBvFcfPdAtSsiMkfPqENhmbrBj7f7AYB1oSOFrPx98YQbRQoI435ksKU6jm1cPQ1fzbG7+LMuCTKJ5DqhPBBGyJ7cSe+8F9xjf7tydBUb9AqfHvYmheaT+a9hQdR90Eq8GW4ZPaqnzgrWEnc2SzNhlkvuffWk1UOSczUzdYQH5PWa8miidhDydy0FQA/Qv1MywPKL0Fy1ijwBaHqouYZHfJ9lHBo9ECTp4Zx1empuqtupxBcD9B8rpc98gOgV3AXh/nMLKVRCd7FpkCt3566igC6++MWK4uSKle4G9K94i3Ww5IuOKYWJtucPRg0BrZtSwmWK3ZBfJ9QQw==",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 12.22.5.236)\n smtp.mailfrom=nvidia.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=nvidia.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of nvidia.com designates\n 12.22.5.236 as permitted sender) receiver=protection.outlook.com;\n client-ip=12.22.5.236; helo=mail.nvidia.com;",
        "From": "Asaf Penso <asafp@nvidia.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<thomas@monjalon.net>, <viacheslavo@nvidia.com>, <matan@nvidia.com>,\n <rasland@nvidia.com>",
        "Subject": "[PATCH 1/1] doc: add steps to configure VF interface as trusted",
        "Date": "Sun, 27 Feb 2022 17:46:17 +0200",
        "Message-ID": "<20220227154617.2946292-1-asafp@nvidia.com>",
        "X-Mailer": "git-send-email 2.18.2",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=\"UTF-8\"",
        "Content-Transfer-Encoding": "8bit",
        "X-Originating-IP": "[10.126.230.35]",
        "X-ClientProxiedBy": "rnnvmail201.nvidia.com (10.129.68.8) To\n rnnvmail201.nvidia.com (10.129.68.8)",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "a951ac72-c751-4aed-4636-08d9fa085567",
        "X-MS-TrafficTypeDiagnostic": "DM6PR12MB4250:EE_",
        "X-LD-Processed": "43083d15-7273-40c1-b7db-39efd9ccc17a,ExtAddr",
        "X-Microsoft-Antispam-PRVS": "\n <DM6PR12MB4250F093531880F88F118561CD009@DM6PR12MB4250.namprd12.prod.outlook.com>",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:12.22.5.236; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:CAL; SFV:NSPM; H:mail.nvidia.com; PTR:InfoNoRecords; CAT:NONE;\n SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(2616005)(36860700001)(107886003)(81166007)(1076003)(6666004)(7696005)(6286002)(316002)(6916009)(70206006)(8676002)(70586007)(55016003)(54906003)(83380400001)(508600001)(186003)(336012)(4326008)(36756003)(356005)(47076005)(82310400004)(86362001)(5660300002)(16526019)(8936002)(40460700003)(426003)(26005)(2906002)(36900700001);\n DIR:OUT; SFP:1101;",
        "X-OriginatorOrg": "Nvidia.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "27 Feb 2022 15:46:34.7899 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n a951ac72-c751-4aed-4636-08d9fa085567",
        "X-MS-Exchange-CrossTenant-Id": "43083d15-7273-40c1-b7db-39efd9ccc17a",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[12.22.5.236];\n Helo=[mail.nvidia.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n CO1NAM11FT066.eop-nam11.prod.protection.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DM6PR12MB4250",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org"
    },
    "content": "Trusted VF is needed to offload rules with rte_flow to a group\nthat is bigger than 0.\nThe configuration is done in two parts: driver and FW.\n\nThis patch adds the needed steps to configure a VF to be trusted.\n\nSigned-off-by: Asaf Penso <asafp@nvidia.com>\nReviewed-by: Raslan Darawsheh <rasland@nvidia.com>\n---\n doc/guides/nics/mlx5.rst | 50 ++++++++++++++++++++++++++++++++++++++++\n 1 file changed, 50 insertions(+)",
    "diff": "diff --git a/doc/guides/nics/mlx5.rst b/doc/guides/nics/mlx5.rst\nindex 0a92145796..6d08ae53cb 100644\n--- a/doc/guides/nics/mlx5.rst\n+++ b/doc/guides/nics/mlx5.rst\n@@ -1614,3 +1614,53 @@ both the meters in hierarchy on that flow.\n    add port meter policy 0 2 g_actions meter mtr_id M / end y_actions end r_actions drop / end\n    create port meter 0 N 2 2 yes 0xffff 1 0\n    flow create 0 ingress group 1 pattern eth / end actions meter mtr_id N / end\n+\n+How to configure a VF as trusted\n+--------------------------------\n+\n+This section demonstrates how to configure a virtual function (VF) interface as trusted.\n+Trusted VF is needed to offload rules with rte_flow to a group that is bigger than 0.\n+The configuration is done in two parts: driver and FW.\n+\n+The procedure below is an example of using a ConnectX-5 adapter card (pf0) with 2 VFs:\n+\n+#. Create 2 VFs on the PF pf0 when in Legacy SR-IOV mode::\n+\n+   $ echo 2 > /sys/class/net/pf0/device/mlx5_num_vfs\n+\n+#. Verify the VFs are created:\n+\n+   .. code-block:: console\n+\n+      $ lspci | grep Mellanox\n+      82:00.0 Ethernet controller: Mellanox Technologies MT27800 Family [ConnectX-5]\n+      82:00.1 Ethernet controller: Mellanox Technologies MT27800 Family [ConnectX-5]\n+      82:00.2 Ethernet controller: Mellanox Technologies MT27800 Family [ConnectX-5 Virtual Function]\n+      82:00.3 Ethernet controller: Mellanox Technologies MT27800 Family [ConnectX-5 Virtual Function]\n+\n+#. Unbind all VFs. For each VF PCIe, using the following command to unbind the driver::\n+\n+   $ echo \"0000:82:00.2\" >> /sys/bus/pci/drivers/mlx5_core/unbind\n+\n+#. Set the VFs to be trusted for the kernel by using one of the methods below:\n+      - Using sysfs file::\n+\n+        $ echo ON | tee /sys/class/net/pf0/device/sriov/0/trust\n+        $ echo ON | tee /sys/class/net/pf0/device/sriov/1/trust\n+\n+      - Using “ip link” command::\n+\n+        $ ip link set p0 vf 0 trust on\n+        $ ip link set p0 vf 1 trust on\n+\n+#. Configure all VFs using mlxreg::\n+\n+   $ mlxreg -d /dev/mst/mt4121_pciconf0 --reg_name VHCA_TRUST_LEVEL --yes --set \"all_vhca=0x1,trust_level=0x1\"\n+\n+   .. note::\n+\n+      Firmware version used must be >= xx.29.1016 and MFT >= 4.18\n+\n+#. For each VF PCIe, using the following command to bind the driver::\n+\n+   $ echo \"0000:82:00.2\" >> /sys/bus/pci/drivers/mlx5_core/bind\n\\ No newline at end of file\n",
    "prefixes": [
        "1/1"
    ]
}