lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 19 Jan 2015 22:18:18 -0500
From:	Paul Gortmaker <paul.gortmaker@...driver.com>
To:	<linux-kernel@...r.kernel.org>
CC:	"H. Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...hat.com>,
	Thomas Gleixner <tglx@...utronix.de>, <x86@...nel.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Paul Gortmaker <paul.gortmaker@...driver.com>
Subject: [PATCH 0/3] x86: drop EISA support from x86_32 builds

When we deleted MCA bus support close to three years ago, Linus ack'd
it and said "Maybe we could some day remove EISA support too.." [1]

For the older arch who are frozen in time (from a hardware perspective)
they might not be ready/willing to drop EISA support yet.  However that
does not mean that we can't start dropping on a per arch basis for where
it really makes sense to do so.  Quoting from the 3rd patch here:

   The Kconfig text says it all, with "The EISA bus saw limited use
   between 1988 and 1995 when it was made obsolete by the PCI bus."

   That means typically 486/586 CPUs in the 33-166MHz range, and
   8-64MB of installed RAM in typical EISA machines of that era.
   With the additional cost, they were also typically rare, and not
   getting widescale deployment.

   Given that it is 20 years on since its demise, and the above specs
   might seem just barely acceptable for a wireless router today, lets
   stop forcing everyone to build EISA infrastructure and assoc. drivers
   during their routine build coverage testing for no value whatsoever.

   We'd already removed some obsolete 10Mbit EISA network drivers in
   commit bca94cffabf5c9f2399da34eab00bd534bf3735b ("drivers/net: delete
   8390 based EISA drivers") over two years ago for the same reason.

   If we don't immediately expire EISA completely, we can at least limit
   its impact and support/testing overhead to the arch like alpha and
   parisc that are essentially frozen in time from a hardware perspective.

In doing this, we see that we essentially had two EISA/ELCR (Edge/Level
Control Register) functions, and so we rename the remaining one to not
have EISA mentioned in its name (since it really is not EISA specific).

We also dip into the EISA code itself, since there was a Kconfig option
in there that was specific to a single 486 VESA local bus hardware
configuration that won't be found outside of the x86 architecture.

Finally, we clobber all x86 specific blocks of code that were within the
CONFIG_EISA ifdef, and drop the x86 Kconfig block that pulled it into
the x86_32 builds to complete the process.

Overall, we shed some lines of code, and exposure to some Kconfig
variations, which is a small win, even if might be a hopeless battle.

Paul.

[1] https://lkml.org/lkml/2012/5/17/278

---

Paul Gortmaker (3):
  x86: renane eisa_set_level_irq to elcr_set_level_irq
  x86: delete EISA_VLB_PRIMING Kconfig option and code
  x86: drop support for 1995 era EISA based platforms

 Documentation/eisa.txt         |  4 ++--
 arch/x86/Kconfig               | 18 --------------
 arch/x86/include/asm/hw_irq.h  |  3 +--
 arch/x86/include/asm/mpspec.h  |  4 ----
 arch/x86/kernel/acpi/boot.c    |  8 +------
 arch/x86/kernel/apic/io_apic.c | 54 ------------------------------------------
 arch/x86/kernel/mpparse.c      | 11 +--------
 arch/x86/kernel/traps.c        | 13 ----------
 arch/x86/pci/irq.c             | 13 +++++-----
 drivers/acpi/pci_irq.c         |  2 +-
 drivers/eisa/Kconfig           | 10 --------
 drivers/eisa/eisa-bus.c        | 10 --------
 drivers/eisa/virtual_root.c    |  2 +-
 13 files changed, 14 insertions(+), 138 deletions(-)

-- 
2.2.1

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ