From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C1B73C43331 for ; Thu, 5 Sep 2019 16:11:43 +0000 (UTC) Received: from dpdk.org (dpdk.org [92.243.14.124]) by mail.kernel.org (Postfix) with ESMTP id 3048720825 for ; Thu, 5 Sep 2019 16:11:44 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 3048720825 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=solarflare.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=dev-bounces@dpdk.org Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 0093F1C0D1; Thu, 5 Sep 2019 18:11:19 +0200 (CEST) Received: from dispatch1-us1.ppe-hosted.com (dispatch1-us1.ppe-hosted.com [67.231.154.164]) by dpdk.org (Postfix) with ESMTP id 63AF91BF15 for ; Thu, 5 Sep 2019 18:11:08 +0200 (CEST) X-Virus-Scanned: Proofpoint Essentials engine Received: from webmail.solarflare.com (webmail.solarflare.com [12.187.104.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by mx1-us4.ppe-hosted.com (PPE Hosted ESMTP Server) with ESMTPS id 5CC5D280053; Thu, 5 Sep 2019 16:11:07 +0000 (UTC) Received: from ocex03.SolarFlarecom.com (10.20.40.36) by ocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 5 Sep 2019 09:11:04 -0700 Received: from opal.uk.solarflarecom.com (10.17.10.1) by ocex03.SolarFlarecom.com (10.20.40.36) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Thu, 5 Sep 2019 09:11:04 -0700 Received: from ukv-loginhost.uk.solarflarecom.com (ukv-loginhost.uk.solarflarecom.com [10.17.10.39]) by opal.uk.solarflarecom.com (8.13.8/8.13.8) with ESMTP id x85GB3n8016146; Thu, 5 Sep 2019 17:11:03 +0100 Received: from ukv-loginhost.uk.solarflarecom.com (localhost [127.0.0.1]) by ukv-loginhost.uk.solarflarecom.com (Postfix) with ESMTP id 0F7071613D3; Thu, 5 Sep 2019 17:11:03 +0100 (BST) From: Andrew Rybchenko To: Thomas Monjalon , Ferruh Yigit CC: Date: Thu, 5 Sep 2019 17:10:43 +0100 Message-ID: <1567699852-31693-6-git-send-email-arybchenko@solarflare.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1567699852-31693-1-git-send-email-arybchenko@solarflare.com> References: <1567699852-31693-1-git-send-email-arybchenko@solarflare.com> MIME-Version: 1.0 Content-Type: text/plain X-TM-AS-Product-Ver: SMEX-12.5.0.1300-8.5.1010-24890.005 X-TM-AS-Result: No-0.014400-4.000000-10 X-TMASE-MatchedRID: HRm6PbbemxebX4K/DqV0NeIfK/Jd5eHmF81qHybtKI3HoLp1yJ83GOBw lzWEEXt2iguYsX+1nsZ2DSY8jnCpzqiOHwlYzcGcxi///JpaHQO2McZY43zJ4zE5FmPR2MmR1AP JYMpZ2b7/NpanhgvTJzxkTRNTP3S5W8T6xyvT3jk/ApMPW/xhXkyQ5fRSh2654uxAgOavdLl9aW vTi9VKSjBk64Y1DPkbYSeig+PVibOqPTUWVYFp2vgo8BKl9ae5L1eX+z9B1Qxa3t7REXGYi6PFj JEFr+olwXCBO/GKkVqOhzOa6g8KrdHS+wm3By+tz37nlg8C4i07SFdLRzge1cWO8b/auI9OvnLl OSSMLPK0btoBdVSXrzKfs02wyQw4F1Tj/waYz7zNKATP+EFg7oXXmHr+iJs1sqxYnjga4QY83Fq 7f38GK0XAdmaT51YyUOfq31Q4JR+UTGVAhB5EbQ== X-TM-AS-User-Approved-Sender: No X-TM-AS-User-Blocked-Sender: No X-TMASE-Result: 10-0.014400-4.000000 X-TMASE-Version: SMEX-12.5.0.1300-8.5.1010-24890.005 X-MDID: 1567699868-V6AzBDmfTRmc Subject: [dpdk-dev] [PATCH 05/13] ethdev: do nothing if promiscuous mode is applied again X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Since driver callbacks return status code now, there is no necessity to enable or disable promiscuous mode once again if it is already successfully enabled or disabled. Configuration restore at startup tries to ensure that configured promiscuous mode is applied and start will return error if it fails. Also it avoids theoretical cases when already configured promiscuous mode is applied once again and fails. In this cases it is unclear which value should be reported on get (configured or opposite). Signed-off-by: Andrew Rybchenko --- lib/librte_ethdev/rte_ethdev.c | 40 ++++++++++++++++++++-------------- 1 file changed, 24 insertions(+), 16 deletions(-) diff --git a/lib/librte_ethdev/rte_ethdev.c b/lib/librte_ethdev/rte_ethdev.c index 73521fe5b0..091e7184aa 100644 --- a/lib/librte_ethdev/rte_ethdev.c +++ b/lib/librte_ethdev/rte_ethdev.c @@ -1391,16 +1391,22 @@ rte_eth_dev_config_restore(struct rte_eth_dev *dev, rte_eth_dev_mac_restore(dev, dev_info); /* replay promiscuous configuration */ - if (rte_eth_promiscuous_get(port_id) == 1) { - ret = rte_eth_promiscuous_enable(port_id); + /* + * use callbacks directly since we don't need port_id check and + * would like to bypass the same value set + */ + if (rte_eth_promiscuous_get(port_id) == 1 && + *dev->dev_ops->promiscuous_enable != NULL) { + ret = (*dev->dev_ops->promiscuous_enable)(dev); if (ret != 0 && ret != -ENOTSUP) { RTE_ETHDEV_LOG(ERR, "Failed to enable promiscuous mode for device (port %u): %s\n", port_id, rte_strerror(-ret)); return ret; } - } else if (rte_eth_promiscuous_get(port_id) == 0) { - ret = rte_eth_promiscuous_disable(port_id); + } else if (rte_eth_promiscuous_get(port_id) == 0 && + *dev->dev_ops->promiscuous_disable != NULL) { + ret = (*dev->dev_ops->promiscuous_disable)(dev); if (ret != 0 && ret != -ENOTSUP) { RTE_ETHDEV_LOG(ERR, "Failed to disable promiscuous mode for device (port %u): %s\n", @@ -1892,16 +1898,17 @@ int rte_eth_promiscuous_enable(uint16_t port_id) { struct rte_eth_dev *dev; - uint8_t old_promiscuous; - int ret; + int ret = 0; RTE_ETH_VALID_PORTID_OR_ERR_RET(port_id, -ENODEV); dev = &rte_eth_devices[port_id]; RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->promiscuous_enable, -ENOTSUP); - old_promiscuous = dev->data->promiscuous; - ret = (*dev->dev_ops->promiscuous_enable)(dev); - dev->data->promiscuous = (ret == 0) ? 1 : old_promiscuous; + + if (dev->data->promiscuous == 0) { + ret = (*dev->dev_ops->promiscuous_enable)(dev); + dev->data->promiscuous = (ret == 0) ? 1 : 0; + } return ret; } @@ -1910,18 +1917,19 @@ int rte_eth_promiscuous_disable(uint16_t port_id) { struct rte_eth_dev *dev; - uint8_t old_promiscuous; - int ret; + int ret = 0; RTE_ETH_VALID_PORTID_OR_ERR_RET(port_id, -ENODEV); dev = &rte_eth_devices[port_id]; RTE_FUNC_PTR_OR_ERR_RET(*dev->dev_ops->promiscuous_disable, -ENOTSUP); - old_promiscuous = dev->data->promiscuous; - dev->data->promiscuous = 0; - ret = (*dev->dev_ops->promiscuous_disable)(dev); - if (ret != 0) - dev->data->promiscuous = old_promiscuous; + + if (dev->data->promiscuous == 1) { + dev->data->promiscuous = 0; + ret = (*dev->dev_ops->promiscuous_disable)(dev); + if (ret != 0) + dev->data->promiscuous = 1; + } return ret; } -- 2.17.1