Show a cover letter.

GET /api/covers/2197138/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2197138,
    "url": "http://patchwork.ozlabs.org/api/covers/2197138/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linux-pci/cover/20260217080601.3808847-1-den@valinux.co.jp/",
    "project": {
        "id": 28,
        "url": "http://patchwork.ozlabs.org/api/projects/28/?format=api",
        "name": "Linux PCI development",
        "link_name": "linux-pci",
        "list_id": "linux-pci.vger.kernel.org",
        "list_email": "linux-pci@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260217080601.3808847-1-den@valinux.co.jp>",
    "list_archive_url": null,
    "date": "2026-02-17T08:05:52",
    "name": "[v8,0/9] PCI: endpoint: pci-ep-msi: Add embedded doorbell fallback",
    "submitter": {
        "id": 91573,
        "url": "http://patchwork.ozlabs.org/api/people/91573/?format=api",
        "name": "Koichiro Den",
        "email": "den@valinux.co.jp"
    },
    "mbox": "http://patchwork.ozlabs.org/project/linux-pci/cover/20260217080601.3808847-1-den@valinux.co.jp/mbox/",
    "series": [
        {
            "id": 492390,
            "url": "http://patchwork.ozlabs.org/api/series/492390/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=492390",
            "date": "2026-02-17T08:05:52",
            "name": "PCI: endpoint: pci-ep-msi: Add embedded doorbell fallback",
            "version": 8,
            "mbox": "http://patchwork.ozlabs.org/series/492390/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2197138/comments/",
    "headers": {
        "Return-Path": "\n <linux-pci+bounces-47425-incoming=patchwork.ozlabs.org@vger.kernel.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linux-pci@vger.kernel.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=valinux.co.jp header.i=@valinux.co.jp\n header.a=rsa-sha256 header.s=selector1 header.b=etRGdEsq;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c09:e001:a7::12fc:5321; helo=sto.lore.kernel.org;\n envelope-from=linux-pci+bounces-47425-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)",
            "smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=valinux.co.jp header.i=@valinux.co.jp\n header.b=\"etRGdEsq\"",
            "smtp.subspace.kernel.org;\n arc=fail smtp.client-ip=52.101.229.81",
            "smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=valinux.co.jp",
            "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=valinux.co.jp",
            "dkim=none (message not signed)\n header.d=none;dmarc=none action=none header.from=valinux.co.jp;"
        ],
        "Received": [
            "from sto.lore.kernel.org (sto.lore.kernel.org\n [IPv6:2600:3c09:e001:a7::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fFXK556ZGz1xpl\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 17 Feb 2026 19:06:17 +1100 (AEDT)",
            "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 4F2A530058FE\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 17 Feb 2026 08:06:15 +0000 (UTC)",
            "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 9AA6C2DB795;\n\tTue, 17 Feb 2026 08:06:13 +0000 (UTC)",
            "from TY3P286CU002.outbound.protection.outlook.com\n (mail-japaneastazon11020081.outbound.protection.outlook.com [52.101.229.81])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id C35402DA74C;\n\tTue, 17 Feb 2026 08:06:10 +0000 (UTC)",
            "from TY7P286MB7722.JPNP286.PROD.OUTLOOK.COM (2603:1096:405:38f::10)\n by OS7P286MB7132.JPNP286.PROD.OUTLOOK.COM (2603:1096:604:42f::6) with\n Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9611.16; Tue, 17 Feb\n 2026 08:06:07 +0000",
            "from TY7P286MB7722.JPNP286.PROD.OUTLOOK.COM\n ([fe80::2305:327c:28ec:9b32]) by TY7P286MB7722.JPNP286.PROD.OUTLOOK.COM\n ([fe80::2305:327c:28ec:9b32%5]) with mapi id 15.20.9611.013; Tue, 17 Feb 2026\n 08:06:07 +0000"
        ],
        "ARC-Seal": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1771315573; cv=fail;\n b=OXOF4LCbmup9ELy9QFB+g1ty93o92gFgRpEKO7M4Pvb7DRK4yzaWRjfEOav7Q6IfS3+ftlGK7bYpyI4a5UZR1OYqfFXsHoY/Hf8cu2TuHDQt1A4yxVYBZOW5KkCPR/NtsYSVUOAqHstiecIh7wWBZITTClLorrohPStoRZgtl2I=",
            "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=RMqaTcapTwwAJOTwJUUoAXaZkomDz1EKHMN03qvv/PNF6JuEA3zD/ZcK/7+M5GogyEwbtsY4cHDvjfqVwH5ngV+I2z1YKww8zwoBFWQlopgAnoDAgIxImMRNyKH6zBV60n48vPSwG7OIe0i7qz0DL8L4s+0JawDToPORxkMYEPkFr2bw1USHmo5rY4cu3//qiEXVUIjSKRJ0yqQl6j2jx71C3l6cU24QX0TtbsqHFUctSdspT653ioOyOoziS6Uk45sCCTTxv6+skev71jP5iSQWSXZueARfy5D13OU91iKvKbYdATB6K7zDbG80lQWbsAKTraVWPbJyyos2cmnLRA=="
        ],
        "ARC-Message-Signature": [
            "i=2; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1771315573; c=relaxed/simple;\n\tbh=npNLrhZZhDEpt6U44Dj36mqFUIvZXvaJ9rckyng2isY=;\n\th=From:To:Cc:Subject:Date:Message-ID:Content-Type:MIME-Version;\n b=gvYD56MWJmAg7rWDBRaQfssMDD1bSTik1w4I0Bq8yqNz+IdVRbdm5dBe67YZ82E5Q4TYH7D7TD9TCKE3iqWAq+M4ijqfgKSphEYatawsVT9sWFySYA8csyeHiITkBDeudOA//BJKA0s+yv7puY93NDgH1XIbT3ilsxpLfWYo8po=",
            "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=frS66RaTiuw9CWICCg69JaLUv896JQfpx/e3U/sEPws=;\n b=Lzqwns1Frll1jd6LxSugxP1A27mJgL+81aPMDdwxBWTPLPtRT2lWhtps5iXL/Yi4CqiP05yvjPPat2XxFuW/nd4p3emwC4hCFXZBvCK17RzZt9x9xE7VA/beVi9+BcTS0DPDOZUw5yIFSJy3afO4D9gLxKezCKynAGM+oPVON4U1/TE8lFDkzCe6NNSXy7BKofKDgQ2rIY7dLiZmBemKh4xRzvP2AFDJkKJaNCaYnXJW9fAJDV8gFERSmkYTWIQ+bHCWkElel4sb/ZOagsgVAGoe7Zt1QSS8YRxh30PcU1O0STXMsjh5x/+E6oSMh3Ds/D9uZCM3fk9N3OjGkmmUgw=="
        ],
        "ARC-Authentication-Results": [
            "i=2; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=valinux.co.jp;\n spf=pass smtp.mailfrom=valinux.co.jp;\n dkim=pass (1024-bit key) header.d=valinux.co.jp header.i=@valinux.co.jp\n header.b=etRGdEsq; arc=fail smtp.client-ip=52.101.229.81",
            "i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=valinux.co.jp; dmarc=pass action=none\n header.from=valinux.co.jp; dkim=pass header.d=valinux.co.jp; arc=none"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=valinux.co.jp;\n s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=frS66RaTiuw9CWICCg69JaLUv896JQfpx/e3U/sEPws=;\n b=etRGdEsqympbwMCXUvL+W/qseQqHK2KT2p+p/x3sl48p/ZV6AhE9lrudmhI4WL4+TltAq2R9lF9YEUb++EKraJhAP5t85DPAq5i4UdbuVis1MdJAK+lHCchmb4XrxFApqf2F112nDgvft9QCPVzttBjTCp6aU6m9wq0pEDhpIFg=",
        "From": "Koichiro Den <den@valinux.co.jp>",
        "To": "jingoohan1@gmail.com,\n\tmani@kernel.org,\n\tlpieralisi@kernel.org,\n\tkwilczynski@kernel.org,\n\trobh@kernel.org,\n\tbhelgaas@google.com,\n\theiko@sntech.de,\n\tkishon@kernel.org,\n\tjdmason@kudzu.us,\n\tdave.jiang@intel.com,\n\tallenbh@gmail.com,\n\tcassel@kernel.org,\n\tshawn.lin@rock-chips.com,\n\tFrank.Li@nxp.com",
        "Cc": "linux-pci@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org,\n\tlinux-arm-kernel@lists.infradead.org,\n\tlinux-rockchip@lists.infradead.org,\n\tntb@lists.linux.dev",
        "Subject": "[PATCH v8 0/9] PCI: endpoint: pci-ep-msi: Add embedded doorbell\n fallback",
        "Date": "Tue, 17 Feb 2026 17:05:52 +0900",
        "Message-ID": "<20260217080601.3808847-1-den@valinux.co.jp>",
        "X-Mailer": "git-send-email 2.51.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-ClientProxiedBy": "TY4P301CA0029.JPNP301.PROD.OUTLOOK.COM\n (2603:1096:405:2be::12) To TY7P286MB7722.JPNP286.PROD.OUTLOOK.COM\n (2603:1096:405:38f::10)",
        "Precedence": "bulk",
        "X-Mailing-List": "linux-pci@vger.kernel.org",
        "List-Id": "<linux-pci.vger.kernel.org>",
        "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>",
        "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>",
        "MIME-Version": "1.0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "TY7P286MB7722:EE_|OS7P286MB7132:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "33a47462-c772-44d8-0d3f-08de6dfb6791",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "\n\tBCL:0;ARA:13230040|366016|376014|1800799024|7416014|10070799003|921020;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "\n\tCIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:TY7P286MB7722.JPNP286.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024)(7416014)(10070799003)(921020);DIR:OUT;SFP:1102;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n 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",
        "X-OriginatorOrg": "valinux.co.jp",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 33a47462-c772-44d8-0d3f-08de6dfb6791",
        "X-MS-Exchange-CrossTenant-AuthSource": "TY7P286MB7722.JPNP286.PROD.OUTLOOK.COM",
        "X-MS-Exchange-CrossTenant-AuthAs": "Internal",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "17 Feb 2026 08:06:07.6073\n (UTC)",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted",
        "X-MS-Exchange-CrossTenant-Id": "7a57bee8-f73d-4c5f-a4f7-d72c91c8c111",
        "X-MS-Exchange-CrossTenant-MailboxType": "HOSTED",
        "X-MS-Exchange-CrossTenant-UserPrincipalName": "\n caFebBFoE3rpMxoUgV7xWQQBY4VFdh7/BRZhTOu6xh48m1NiJSQH/sbTc8MRphIVve2eDGpPj9HzkLWxXJSuDg==",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "OS7P286MB7132"
    },
    "content": "Hi,\n\nSome endpoint platforms cannot use a GIC ITS-backed MSI domain for\nEP-side doorbells. In those cases, endpoint function (EPF) drivers\ncannot provide a doorbell to the root complex (RC), and features such as\nvNTB may fall back to polling with significantly higher latency.\n\nThis series adds an alternate doorbell backend based on the DesignWare\nPCIe controller's integrated eDMA interrupt-emulation feature. The RC\nrings the doorbell by doing a single 32-bit MMIO write to an eDMA\ndoorbell location exposed in a BAR window. The EP side receives a Linux\nIRQ that EPF drivers can use as a doorbell interrupt, without relying on\nMSI message writes reaching the ITS.\n\nTo support this, the series:\n\n  - Adds an EPC auxiliary resource query API so EPF drivers can discover\n    controller-integrated resources (DMA MMIO, doorbell MMIO, and DMA LL\n    memory).\n  - Updates DesignWare EP controllers to report integrated eDMA\n    resources via the new API.\n  - Updates dw-edma to provide a dedicated virtual IRQ for interrupt\n    emulation and to perform the core-specific deassert sequence.\n  - Describes an RK3588 BAR4 reserved subregion so EPF drivers can reuse\n    a platform-owned fixed BAR mapping for the doorbell target.\n  - Updates pci-epf-test and pci-epf-vntb to reuse a pre-exposed\n    BAR/offset and to honor per-doorbell IRQ flags.\n\n\nDependencies\n------------\n\nThe following two split-out series are prerequisite for this series:\n\n  (1). [PATCH v2 0/4] PCI: endpoint: Doorbell-related fixes\n       https://lore.kernel.org/linux-pci/20260217063856.3759713-1-den@valinux.co.jp/\n  (2). [PATCH 0/2] dmaengine: dw-edma: Interrupt-emulation doorbell support\n       https://lore.kernel.org/dmaengine/20260215152216.3393561-1-den@valinux.co.jp/\n\n\nTested on\n---------\n\nI re-tested the v8 embedded (DMA) doorbell fallback path (via pci-epf-test)\non R-Car Spider boards:\n\n  $ ./pci_endpoint_test -t DOORBELL_TEST\n  TAP version 13\n  1..1\n  # Starting 1 tests from 1 test cases.\n  #  RUN           pcie_ep_doorbell.DOORBELL_TEST ...\n  #            OK  pcie_ep_doorbell.DOORBELL_TEST\n  ok 1 pcie_ep_doorbell.DOORBELL_TEST\n  # PASSED: 1 / 1 tests passed.\n  # Totals: pass:1 fail:0 xfail:0 xpass:0 skip:0 error:0\n\nwith the following message observed on the EP side:\n\n  [   51.332944] pci_epf_vntb pci_epf_vntb.0: Can't find MSI domain for EPC\n  [   51.333507] pci_epf_vntb pci_epf_vntb.0: Using embedded (DMA) doorbell fallback\n\n(Note: for the test to pass on R-Car Spider, one of the following was required:\n - echo 1048576 > functions/pci_epf_test/func1/pci_epf_test.0/bar2_size\n - apply https://lore.kernel.org/linux-pci/20260210160315.2272930-1-den@valinux.co.jp/)\n\n\nPerformance test: vNTB ping latency\n-----------------------------------\n\nSetup:\n  - configfs (R-Car Spider in EP mode):\n\n      cd /sys/kernel/config/pci_ep/\n      mkdir functions/pci_epf_vntb/func1\n      echo 0x1912 >   functions/pci_epf_vntb/func1/vendorid\n      echo 0x0030 >   functions/pci_epf_vntb/func1/deviceid\n      echo 32 >       functions/pci_epf_vntb/func1/msi_interrupts\n      echo 4 >        functions/pci_epf_vntb/func1/pci_epf_vntb.0/db_count\n      echo 128 >      functions/pci_epf_vntb/func1/pci_epf_vntb.0/spad_count\n      echo 1 >        functions/pci_epf_vntb/func1/pci_epf_vntb.0/num_mws\n      echo 0x100000 > functions/pci_epf_vntb/func1/pci_epf_vntb.0/mw1\n      echo 0x1912 >   functions/pci_epf_vntb/func1/pci_epf_vntb.0/vntb_vid\n      echo 0x0030 >   functions/pci_epf_vntb/func1/pci_epf_vntb.0/vntb_pid\n      echo 0x10 >     functions/pci_epf_vntb/func1/pci_epf_vntb.0/vbus_number\n      echo 0 >        functions/pci_epf_vntb/func1/pci_epf_vntb.0/ctrl_bar\n      echo 4 >        functions/pci_epf_vntb/func1/pci_epf_vntb.0/db_bar [*]\n      echo 2 >        functions/pci_epf_vntb/func1/pci_epf_vntb.0/mw1_bar\n      ln -s controllers/e65d0000.pcie-ep functions/pci_epf_vntb/func1/primary/\n      echo 1 > controllers/e65d0000.pcie-ep/start\n\n      [*]: On R-Car Spider, a hack is currently needed to use BAR4 for\n\t   the doorbell. I'll consider posting a patch for that\n\t   separately.\n\n  - ensure ntb_transport/ntb_netdev are loaded on both sides\n\nResults:\n\n  - Without this series (pci.git main)\n\n    $ ping -c 10 10.0.0.11\n    PING 10.0.0.11 (10.0.0.11) 56(84) bytes of data.\n    64 bytes from 10.0.0.11: icmp_seq=1 ttl=64 time=6.04 ms\n    64 bytes from 10.0.0.11: icmp_seq=2 ttl=64 time=12.6 ms\n    64 bytes from 10.0.0.11: icmp_seq=3 ttl=64 time=7.40 ms\n    64 bytes from 10.0.0.11: icmp_seq=4 ttl=64 time=5.38 ms\n    64 bytes from 10.0.0.11: icmp_seq=5 ttl=64 time=11.4 ms\n    64 bytes from 10.0.0.11: icmp_seq=6 ttl=64 time=9.42 ms\n    64 bytes from 10.0.0.11: icmp_seq=7 ttl=64 time=3.36 ms\n    64 bytes from 10.0.0.11: icmp_seq=8 ttl=64 time=9.48 ms\n    64 bytes from 10.0.0.11: icmp_seq=9 ttl=64 time=4.24 ms\n    64 bytes from 10.0.0.11: icmp_seq=10 ttl=64 time=10.4 ms\n\n  - With this series (on top of pci.git main + Dependency (1) and (2))\n\n    $ ping -c 10 10.0.0.11\n    PING 10.0.0.11 (10.0.0.11) 56(84) bytes of data.\n    64 bytes from 10.0.0.11: icmp_seq=1 ttl=64 time=0.935 ms\n    64 bytes from 10.0.0.11: icmp_seq=2 ttl=64 time=0.805 ms\n    64 bytes from 10.0.0.11: icmp_seq=3 ttl=64 time=0.833 ms\n    64 bytes from 10.0.0.11: icmp_seq=4 ttl=64 time=0.886 ms\n    64 bytes from 10.0.0.11: icmp_seq=5 ttl=64 time=0.861 ms\n    64 bytes from 10.0.0.11: icmp_seq=6 ttl=64 time=0.929 ms\n    64 bytes from 10.0.0.11: icmp_seq=7 ttl=64 time=0.970 ms\n    64 bytes from 10.0.0.11: icmp_seq=8 ttl=64 time=0.946 ms\n    64 bytes from 10.0.0.11: icmp_seq=9 ttl=64 time=0.975 ms\n    64 bytes from 10.0.0.11: icmp_seq=10 ttl=64 time=0.881 ms\n\n---\n\nChangelog\n---------\n\n* v7->v8 changes:\n  - Deduplicate request_irq()/free_irq() calls based on virq (shared\n    IRQ) rather than doorbell type, as suggested during review of v7\n    Patch #7.\n  - Clean up the pci_epf_alloc_doorbell() error path, as suggested\n    during review of v7 Patch #9.\n  - Use range_end_overflows_t() instead of an open-coded overflow check,\n    following discussion during review of v7 Patch #5.\n  - Add a write-data field to the DOORBELL_MMIO aux-resource metadata\n    and plumb it through to the embedded doorbell backend (DesignWare\n    uses data=0).\n\n* v6->v7 changes:\n  - Split out preparatory patches to keep the series below 10 patches.\n  - Add support for platforms where the eDMA register block is fixed\n    within a reserved BAR window (e.g. RK3588 BAR4) and must be reused\n    as-is.\n  - Introduce a dedicated virtual IRQ and irq_chip (using\n    handle_level_irq) for interrupt-emulation doorbells instead of\n    reusing per-channel IRQs. This avoids delivery via different IRQs on\n    platforms with chip->nr_irqs > 1.\n\n* v5->v6 changes:\n  - Fix a double-free in v5 Patch 8/8 caused by mixing __free(kfree) with\n    an explicit kfree(). This is a functional bug (detectable by KASAN),\n    hence the respin solely for this fix. Sorry for the noise. No other\n    changes.\n\n* v4->v5 changes:\n  - Change the series subject now that the series has evolved into a\n    consumer-driven set focused on the embedded doorbell fallback and its\n    in-tree users (epf-test and epf-vntb).\n  - Drop [PATCH v4 01/09] (dw-edma per-channel interrupt routing control)\n    from this series for now, so the series focuses on what's needed by the\n    current consumer (i.e. the doorbell fallback implementation).\n  - Replace the v4 embedded-doorbell \"test variant + host/kselftest\n    plumbing\" with a generic embedded-doorbell fallback in\n    pci_epf_alloc_doorbell(), including exposing required IRQ request flags\n    to EPF drivers.\n  - Two preparatory fix patches (Patch 6/8 and 7/8) to clean up error\n    handling and state management ahead of Patch 8/8.\n  - Rename *_get_remote_resource() to *_get_aux_resources() and adjust\n    relevant variable namings and kernel docs. Discussion may continue.\n  - Rework dw-edma per-channel metadata exposure to cache the needed info\n    in dw_edma_chip (IRQ number + emulation doorbell offset) and consume it\n    from the DesignWare EPC auxiliary resource provider without calling back\n    to dw-edma.\n\n* v3->v4 changes:\n  - Drop dma_slave_caps.hw_id and the dmaengine selfirq callback\n    registration API. Instead, add a dw-edma specific dw_edma_chan_info()\n    helper and extend the EPC remote resource metadata accordingly.\n  - Add explicit acking for eDMA interrupt emulation and adjust the\n    dw-edma IRQ path for embedded-doorbell usage.\n  - Replace the previous EPC API smoke test with an embedded doorbell\n    test variant (pci-epf-test + pci_endpoint_test/selftests).\n  - Rebase onto pci.git controller/dwc commit 43d324eeb08c.\n\n* v2->v3 changes:\n  - Replace DWC-specific helpers with a generic EPC remote resource query API.\n  - Add pci-epf-test smoke test and host/kselftest support for the new API.\n  - Drop the dw-edma-specific notify-only channel and polling approach\n    ([PATCH v2 4/7] and [PATCH v2 5/7]), and rework notification handling\n    around a generic dmaengine_(un)register_selfirq() API implemented\n    by dw-edma.\n\n* v1->v2 changes:\n  - Combine the two previously posted series into a single set (per Frank's\n    suggestion). Order dmaengine/dw-edma patches first so hw_id support\n    lands before the PCI LL-region helper, which assumes\n    dma_slave_caps.hw_id availability.\n\nv6: https://lore.kernel.org/all/20260209125316.2132589-1-den@valinux.co.jp/\nv5: https://lore.kernel.org/all/20260209062952.2049053-1-den@valinux.co.jp/\nv4: https://lore.kernel.org/all/20260206172646.1556847-1-den@valinux.co.jp/\nv3: https://lore.kernel.org/all/20260204145440.950609-1-den@valinux.co.jp/\nv2: https://lore.kernel.org/all/20260127033420.3460579-1-den@valinux.co.jp/\nv1: https://lore.kernel.org/dmaengine/20260126073652.3293564-1-den@valinux.co.jp/\n    +\n    https://lore.kernel.org/linux-pci/20260126071550.3233631-1-den@valinux.co.jp/\n\n\nThanks for reviewing.\n\nMany thanks to Frank and Niklas for the continued review and\nconstructive feedback throughout the development of this series.\n\n\nKoichiro Den (9):\n  PCI: endpoint: Describe reserved subregions within BARs\n  PCI: dw-rockchip: Describe RK3588 BAR4 DMA ctrl window\n  PCI: endpoint: Add auxiliary resource query API\n  PCI: dwc: Record integrated eDMA register window\n  PCI: dwc: ep: Expose integrated eDMA resources via EPC aux-resource\n    API\n  PCI: endpoint: pci-ep-msi: Refactor doorbell allocation for new\n    backends\n  PCI: endpoint: pci-epf-vntb: Reuse pre-exposed doorbells and IRQ flags\n  PCI: endpoint: pci-epf-test: Reuse pre-exposed doorbell targets\n  PCI: endpoint: pci-ep-msi: Add embedded eDMA doorbell fallback\n\n .../pci/controller/dwc/pcie-designware-ep.c   | 151 ++++++++++++++++++\n drivers/pci/controller/dwc/pcie-designware.c  |   4 +\n drivers/pci/controller/dwc/pcie-designware.h  |   2 +\n drivers/pci/controller/dwc/pcie-dw-rockchip.c |  15 +-\n drivers/pci/endpoint/functions/pci-epf-test.c |  87 ++++++----\n drivers/pci/endpoint/functions/pci-epf-vntb.c |  61 ++++++-\n drivers/pci/endpoint/pci-ep-msi.c             | 146 +++++++++++++++--\n drivers/pci/endpoint/pci-epc-core.c           |  41 +++++\n include/linux/pci-epc.h                       |  80 ++++++++++\n include/linux/pci-epf.h                       |  23 ++-\n 10 files changed, 562 insertions(+), 48 deletions(-)"
}