Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id CFF53C636CD for ; Fri, 10 Feb 2023 06:03:37 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230394AbjBJGDd (ORCPT ); Fri, 10 Feb 2023 01:03:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38792 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229869AbjBJGDb (ORCPT ); Fri, 10 Feb 2023 01:03:31 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0C45074315; Thu, 9 Feb 2023 22:03:29 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 8F93BB82315; Fri, 10 Feb 2023 06:03:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A5E34C433EF; Fri, 10 Feb 2023 06:03:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1676009007; bh=hvP52EYukgAZMIySUS+RB61bPYiZH+yvISqtT2LvyrA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YY3Jdv+VPFC7FfD45hMm6voAS3OaivLbCO//owFseGavJPlujZlZVDCgjxOGzWlOi mA56wyqykmSJmCtXAJLPaODfpD9xKqem5uLUfUwSP1w/oFRvIqpg6I5pl44eUH2M0j 0RfZTO2cCbD0L2TA5/S8pyRBfXalKqXARDCoE7GG6Sd3aQ4b6FzJpGUJ8F3KmLnEnq yeYB6FiiCVffO6bOgaFi5m4xLcRdCbvpr9DK/zhhC3+xKvr6eHvSn67ZSxF4yDnJrb 0YjcfbT9ZRobzYxWl49lzY9ULAH/yaByIgvzwCayf7It4jdcoPP86+7yh0kaBOdUUo o/M29jPWR99Iw== Date: Fri, 10 Feb 2023 11:33:22 +0530 From: Vinod Koul To: Lizhi Hou Cc: dmaengine@vger.kernel.org, linux-kernel@vger.kernel.org, max.zhen@amd.com, sonal.santan@amd.com, larry.liu@amd.com, brian.xu@amd.com, tumic@gpxsee.org Subject: Re: [PATCH V12 XDMA 0/2] xilinx XDMA driver Message-ID: References: <1674145926-29449-1-git-send-email-lizhi.hou@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1674145926-29449-1-git-send-email-lizhi.hou@amd.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 19-01-23, 08:32, Lizhi Hou wrote: > Hello, > > This V12 of patch series is to provide the platform driver to support the > Xilinx XDMA subsystem. The XDMA subsystem is used in conjunction with the > PCI Express IP block to provide high performance data transfer between host > memory and the card's DMA subsystem. It also provides up to 16 user > interrupt wires to user logic that generate interrupts to the host. > > +-------+ +-------+ +-----------+ > PCIe | | | | | | > Tx/Rx | | | | AXI | | > <=======> | PCIE | <===> | XDMA | <====>| User Logic| > | | | | | | > +-------+ +-------+ +-----------+ > > The XDMA has been used for Xilinx Alveo PCIe devices. > And it is also integrated into Versal ACAP DMA and Bridge Subsystem. > https://www.xilinx.com/products/boards-and-kits/alveo.html > https://docs.xilinx.com/r/en-US/pg344-pcie-dma-versal/Introduction-to-the-DMA-and-Bridge-Subsystems > > The device driver for any FPGA based PCIe device which leverages XDMA can > call the standard dmaengine APIs to discover and use the XDMA subsystem > without duplicating the XDMA driver code in its own driver. Applied, thanks ALso, please dont resend the code every few days, that serves no purpose. It will be reviewed in the queue! -- ~Vinod