From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 0BF86EE01FF for ; Tue, 30 Dec 2025 14:22:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=chSnqSUp8KI1DKT9O8z6Y4/fVwo+F8Wj5az48TaTZHw=; b=TcnP8jC2lWDh1Yap7yIEX78EAJ IEpIFr8A7wMWVPUydluttiF7Hj632bRtpfokIvajDZu342PT1VqmGP7lAHBdnmWes8pDG5FDyFipw uKI83wlZp/wV420Vcy9CqG1074NyP6kseVIyDX5JvGb2m30JMHPqvkuQU890OmXcfR6j2yITGoO0q UPTuWWjcCkxL766KDWSfHjB9fDQcuQtAnEE92kV+ZHCX3uDZii9zLXOewCrq09oxuwmLXVSCu2Gdw fx/GoxBzqvvRC02+B+9KLMjgJ6rXZKxahDrRhNYWeFfwfx9MKrp4NOqK90WnnsNROGfU22y7kA72k qN+UoOrA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1vaacZ-00000004vqA-0sd8; Tue, 30 Dec 2025 14:22:47 +0000 Received: from tor.source.kernel.org ([172.105.4.254]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1vaacX-00000004vpz-1PdB; Tue, 30 Dec 2025 14:22:45 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by tor.source.kernel.org (Postfix) with ESMTP id AC6066000A; Tue, 30 Dec 2025 14:22:44 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A4B1AC4CEFB; Tue, 30 Dec 2025 14:22:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1767104564; bh=aDLjB01UK3jf7Dq8YDojKtYOpc32gM+BspVDOEkyfFc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=eHrY1i2KVVVwolDMtjU8QxJXXRcPMFsEsjLrzfH5PpSSJdKoey6Pl7NHAYgnZg0he v2QjvTLKdiqY1rO2BMhRl80FNLNwdLDPkCvs+7coSSC86jcbDv0QXUCEm/paKc/sdN 3BsLGwVimdUKUnl0utu5kxHwp/EP0Mc3A6b8K4G1VNblsW8WEHmZUdFzwiZzWUWiuR qa6G05nmL710k0W6Szg4gvQzyvRAk+l8dZhLp2WVczc+22aNadPoOxCNLIBJTdpkbs b1JU79mz96+JD+buCqYxsS1n4+U4B+8PQVNdvxT6rMIC3rOxDw7zmfk/BEPcb3QHAt MIVmN2kW848JA== Date: Tue, 30 Dec 2025 15:22:39 +0100 From: Niklas Cassel To: Qiang Yu Cc: Jingoo Han , Manivannan Sadhasivam , Lorenzo Pieralisi , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , Rob Herring , Bjorn Helgaas , Heiko Stuebner , linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-rockchip@lists.infradead.org Subject: Re: [PATCH] PCI: dwc: Remove duplicate dw_pcie_ep_hide_ext_capability() function Message-ID: References: <20251224-remove_dw_pcie_ep_hide_ext_capability-v1-1-4302c9cdc316@oss.qualcomm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20251224-remove_dw_pcie_ep_hide_ext_capability-v1-1-4302c9cdc316@oss.qualcomm.com> X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hello Qiang Yu, On Wed, Dec 24, 2025 at 02:10:46AM -0800, Qiang Yu wrote: > Remove dw_pcie_ep_hide_ext_capability() and replace its usage with > dw_pcie_remove_ext_capability(). Both functions serve the same purpose > of hiding PCIe extended capabilities, but dw_pcie_remove_ext_capability() > provides a cleaner API that doesn't require the caller to specify the > previous capability ID. > > Compile-tested only. Runtime testing on RK3588 hardware would be > appreciated. This patch does not appy on top of pci/controller/dwc Anyway, I applied it manually, and tested, thus: Tested-by: Niklas Cassel