Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp315910rwb; Fri, 12 Aug 2022 21:13:33 -0700 (PDT) X-Google-Smtp-Source: AA6agR4EGfnewXWP2rLUZ/ppvtRLpHAFx84s8OQt90JsJIaVkurtuI9Bxiz1gzEFgtTmVmpQDP7A X-Received: by 2002:a17:902:c149:b0:170:9c83:a319 with SMTP id 9-20020a170902c14900b001709c83a319mr7124057plj.107.1660364013203; Fri, 12 Aug 2022 21:13:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660364013; cv=none; d=google.com; s=arc-20160816; b=RG+dcpcO85TgsLp04GK1zgT2sdTpe54OHkpKtTNLmPBF0TuhDoFZ2LWMu7AGo1qhCW 7I818q+pk9Y0o7JSRnQuw6qZ0jTXrUdC+ZOClqz8kzmxFA+675GjCH/OUj1HAqSQ4tVa NTHOIsjs6OCZLibW0EH6dq9e7IBYmZcVOXgHBXCDuyK6zjHjQntZlwunZ4vBOdSt1xcQ mYsuL1uCd6/r7J1WZLICgNMKMRTV9e8lhBk/SozihEGSTOFd+HY2vYuD5Nai0RFJFmcW E8FAGgtpudFodVoxdDj58ryZITSx0+onqrFAthQMx5tu6lJNwxMmHo5rJ1XTUsk5dXNl YNEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:date:from:dkim-signature; bh=wSz2jLwt8XGZiBsTeXMm2hepCeFx2oOvn4Pac4I1m2M=; b=HdGHAeb1N9gs3Imgxk+CFD0uG+WqE/0sGlxuQ/15PRVJb26ORpbp6bAdij95Bece1X eYwMiRn/airxZ98hSm6/Wr/klg7w80IecCscUoZdeULXrPp4pmFB7I7eKufR2z4+qRkt VnsLrJCJBx7HmoJo/QYI+BsjPhoheVsjCpFKXa8CNh1N1UbKRxmhEdSz+puY3aKFVWYB uviThcNcrr+bgqX6x01p7Cq/HPIUwL9VZL4YAJjvZoUnmfP5LmrUaPshKi1c16X18bUQ FgM8CcP53b1rQFpu3FK8oGrJtmh+57opIhwz4t7C1LvBjvz+FmLv7f3ThbGC9+0+wV8O 1FIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kudzu-us.20210112.gappssmtp.com header.s=20210112 header.b=VRp8Vv4S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l13-20020a65448d000000b0041995260687si4158060pgq.667.2022.08.12.21.13.04; Fri, 12 Aug 2022 21:13:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kudzu-us.20210112.gappssmtp.com header.s=20210112 header.b=VRp8Vv4S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233635AbiHMDqE (ORCPT + 99 others); Fri, 12 Aug 2022 23:46:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56174 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229760AbiHMDqB (ORCPT ); Fri, 12 Aug 2022 23:46:01 -0400 Received: from mail-qt1-x836.google.com (mail-qt1-x836.google.com [IPv6:2607:f8b0:4864:20::836]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F2941EC77 for ; Fri, 12 Aug 2022 20:46:00 -0700 (PDT) Received: by mail-qt1-x836.google.com with SMTP id h21so2145366qta.3 for ; Fri, 12 Aug 2022 20:46:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kudzu-us.20210112.gappssmtp.com; s=20210112; h=content-disposition:mime-version:message-id:subject:cc:to:date:from :from:to:cc; bh=wSz2jLwt8XGZiBsTeXMm2hepCeFx2oOvn4Pac4I1m2M=; b=VRp8Vv4SQsePAIYL8QWq4sigSUk09jY8sCa0snfh1NGNPMb+HJQwrNlk3cY7SCOxyK ji6zYb06uM6L0YLoXGch/UpPgXNmmJ1+r2+QSWn1UV2JyZn6OBxskc4zjgZClMjHpgGk sxdlJzYku5/AdLyMVskDPqYaQ8drvHJg96G8u0jzJV76/TQIUFaTE2myRrf0plyNdo3u D9p63OO0cTOzG+147/6h+VsRM+eyJSuyPSab3u7oxmmeESFPRmNaSTtwowZ0xLhfQLn5 MBwiB+Q9zNINq3Y+bkM2V1iekbUM7lIUp1VApSriDxzfCpi4OHhxIeyeMNpwl+QWtHh3 BABw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-disposition:mime-version:message-id:subject:cc:to:date:from :x-gm-message-state:from:to:cc; bh=wSz2jLwt8XGZiBsTeXMm2hepCeFx2oOvn4Pac4I1m2M=; b=JeQkh2N0W1sSc8178Xg7erzxyVAi45PMbiqL3jYaHH2VT0BzvyNvIsXapA/ncuBPrF k3YKZD+r9zi8iJUc3LQyMrMJsVv02mJeqQgyNOwtb+TgsL55FKyqUKrbYsubNRdBtRH+ btepejueCLG8Ej5+n1GjQEcCvIeaabBvAIvXkyPq3hkTRw+Ou3HlMx67Ls1enKio6Znc ZS8jZVFGawQBcXAjRCWg2DzrDknyZBRLzYnBY3mUmvS+EuiuZU6W6gZcxkhxZsnjSAq9 liJ0CSWxD1V6Lbmyl0rr8W8d15p+KLArNyWcd2GO2f0B2sW/GKv7D3uPqpj0MbsdKJHV MSLw== X-Gm-Message-State: ACgBeo29uJ93NyCRr/lrON0az5NBkQ6BLe+2INUmvRmr1VMqOu6kHnS5 lYvlnTFXeRiTHJpOmfI4jlTHCbPy0FLBpflGzjg= X-Received: by 2002:a05:622a:24b:b0:343:4f6c:7bee with SMTP id c11-20020a05622a024b00b003434f6c7beemr6208191qtx.637.1660362359612; Fri, 12 Aug 2022 20:45:59 -0700 (PDT) Received: from localhost ([2605:a601:a608:5600::59]) by smtp.gmail.com with ESMTPSA id f4-20020a05620a280400b006b905e003a4sm3186732qkp.135.2022.08.12.20.45.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 12 Aug 2022 20:45:59 -0700 (PDT) From: Jon Mason X-Google-Original-From: Jon Mason Date: Fri, 12 Aug 2022 23:45:58 -0400 To: torvalds@linux-foundation.org Cc: linux-kernel@vger.kernel.org, ntb@lists.linux.dev Subject: [GIT PULL] NTB patches for v5.20 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Linus, Here are a number of patches for v5.20. Included in them is PCI Endpoint NTB, which received a number of fixes while in linux-next, as well as a number of other bug fixes. Please consider pulling them. Thanks, Jon The following changes since commit 3d7cb6b04c3f3115719235cc6866b10326de34cd: Linux 5.19 (2022-07-31 14:03:01 -0700) are available in the Git repository at: https://github.com/jonmason/ntb tags/ntb-5.20 for you to fetch changes up to e4fe2a2fc423cb51bfd36c14f95f3ca1d279ca92: MAINTAINERS: add PCI Endpoint NTB drivers to NTB files (2022-08-12 16:00:59 -0400) ---------------------------------------------------------------- Fix of heap data and clang warnings, support for a new Intel NTB device, and NTB EndPoint Function (EPF) support and the various fixes from that being in -next for Linux v5.20 ---------------------------------------------------------------- Bagas Sanjaya (2): Documentation: PCI: Use code-block block for scratchpad registers diagram Documentation: PCI: extend subheading underline for "lspci output" section Colin Ian King (1): NTB: EPF: set pointer addr to null using NULL rather than 0 Dan Carpenter (3): NTB: ntb_tool: uninitialized heap data in tool_fn_write() NTB: EPF: Fix error code in epf_ntb_bind() NTB: EPF: Tidy up some bounds checks Dave Jiang (1): ntb: intel: add GNR support for Intel PCIe gen5 NTB Frank Li (4): PCI: designware-ep: Allow pci_epc_set_bar() update inbound map address NTB: epf: Allow more flexibility in the memory BAR map method PCI: endpoint: Support NTB transfer between RC and EP Documentation: PCI: Add specification for the PCI vNTB function device Jon Mason (1): MAINTAINERS: add PCI Endpoint NTB drivers to NTB files Justin Stitt (1): ntb: idt: fix clang -Wformat warnings Ren Zhijie (1): PCI: endpoint: Fix Kconfig dependency Tom Rix (1): PCI: endpoint: pci-epf-vntb: reduce several globals to statics Yang Yingliang (1): PCI: endpoint: pci-epf-vntb: fix error handle in epf_ntb_mw_bar_init() Documentation/PCI/endpoint/index.rst | 2 + Documentation/PCI/endpoint/pci-vntb-function.rst | 129 ++ Documentation/PCI/endpoint/pci-vntb-howto.rst | 167 +++ MAINTAINERS | 1 + drivers/ntb/hw/epf/ntb_hw_epf.c | 48 +- drivers/ntb/hw/idt/ntb_hw_idt.c | 6 +- drivers/ntb/hw/intel/ntb_hw_gen1.c | 12 +- drivers/ntb/hw/intel/ntb_hw_gen4.c | 2 +- drivers/ntb/hw/intel/ntb_hw_intel.h | 7 + drivers/ntb/test/ntb_tool.c | 8 +- drivers/pci/controller/dwc/pcie-designware-ep.c | 10 +- drivers/pci/endpoint/functions/Kconfig | 12 + drivers/pci/endpoint/functions/Makefile | 1 + drivers/pci/endpoint/functions/pci-epf-vntb.c | 1442 ++++++++++++++++++++++ 14 files changed, 1822 insertions(+), 25 deletions(-) create mode 100644 Documentation/PCI/endpoint/pci-vntb-function.rst create mode 100644 Documentation/PCI/endpoint/pci-vntb-howto.rst create mode 100644 drivers/pci/endpoint/functions/pci-epf-vntb.c