From patchwork Tue Nov 21 12:34:25 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Ilpo_J=C3=A4rvinen?= X-Patchwork-Id: 13462987 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="FzTt21z0" Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E46E9138; Tue, 21 Nov 2023 04:34:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700570082; x=1732106082; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=JOor8boF+dUQadwIIvn/dAw0I268VWJyO3494Evc3UY=; b=FzTt21z0tuDU1uaqST+7f90cpxtDrql+nHHx+BIXKW4rJMc+a2W31op0 KfCoYMO5xKBIcXWv32kaKlIB7zyEmIMsFRJoJSZ4Js/0/A1YiuZfpv+Vs q5MKQF6dZB9LX4amkF02pYE2mcLlv7GfqW7bBMH9GevD7UagDjerf8rvs VLxH3kiwa4cad25i++OgkNJ/sx89luks5pxemmt0RqY5ApU5TV6MknKAA oFg4VY2aM/WNQNK3ktwXmmx2Kno/aawot1rsbQm9CV7xsYM0eYLSj9w1U ZvU7m4NKl+kYpQqRcQdqQ++lcQaBLNh9ynOzIiCH8maMsc0v+m8h6yw/p Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10900"; a="371165813" X-IronPort-AV: E=Sophos;i="6.04,215,1695711600"; d="scan'208";a="371165813" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Nov 2023 04:34:41 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10900"; a="760095975" X-IronPort-AV: E=Sophos;i="6.04,215,1695711600"; d="scan'208";a="760095975" Received: from wpastern-mobl1.ger.corp.intel.com (HELO localhost) ([10.252.57.17]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Nov 2023 04:34:36 -0800 From: =?utf-8?q?Ilpo_J=C3=A4rvinen?= To: "David S. Miller" , Eric Dumazet , intel-wired-lan@lists.osuosl.org, Jakub Kicinski , Jesse Brandeburg , Jonathan Cameron , netdev@vger.kernel.org, Paolo Abeni , Tony Nguyen Cc: linux-kernel@vger.kernel.org, =?utf-8?q?Ilpo_J=C3=A4rvinen?= Subject: [PATCH v4 0/3] net/ethernet/intel: PCI cleanups Date: Tue, 21 Nov 2023 14:34:25 +0200 Message-Id: <20231121123428.20907-1-ilpo.jarvinen@linux.intel.com> X-Mailer: git-send-email 2.30.2 Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Resending these PCI related cleanups for Intel Ethernet drivers. No other changes except removing the accepted patches in v4. These can go through the usual driver tree as there are no PCI tree related dependencies. v4: - Removed accepted patches Ilpo Järvinen (3): igb: Use FIELD_GET() to extract Link Width e1000e: Use PCI_EXP_LNKSTA_NLW & FIELD_GET() instead of custom defines/code e1000e: Use pcie_capability_read_word() for reading LNKSTA drivers/net/ethernet/intel/e1000e/defines.h | 3 --- drivers/net/ethernet/intel/e1000e/mac.c | 18 ++++++++---------- drivers/net/ethernet/intel/igb/e1000_mac.c | 6 +++--- 3 files changed, 11 insertions(+), 16 deletions(-)