lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BN9PR11MB5276DF6EF5910917DDB0EEAF8C3E2@BN9PR11MB5276.namprd11.prod.outlook.com>
Date: Tue, 2 Apr 2024 02:45:50 +0000
From: "Tian, Kevin" <kevin.tian@...el.com>
To: Bjorn Helgaas <helgaas@...nel.org>, "linux-pci@...r.kernel.org"
	<linux-pci@...r.kernel.org>
CC: Thomas Gleixner <tglx@...utronix.de>, Marc Zyngier <maz@...nel.org>,
	"Chatre, Reinette" <reinette.chatre@...el.com>, Jason Gunthorpe
	<jgg@...dia.com>, Alex Williamson <alex.williamson@...hat.com>, "Jiang, Dave"
	<dave.jiang@...el.com>, Megha Dey <megha.dey@...el.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Bjorn Helgaas
	<bhelgaas@...gle.com>
Subject: RE: [PATCH 0/3] PCI/MSI: Remove IMS (Interrupt Message Store) support
 for now

> From: Bjorn Helgaas <helgaas@...nel.org>
> Sent: Tuesday, April 2, 2024 7:23 AM
> 
> From: Bjorn Helgaas <bhelgaas@...gle.com>
> 
> IMS (Interrupt Message Store) support appeared in v6.2, but there are no
> users yet.
> 
> Remove it for now.  We can add it back when a user comes along.
> 
> Bjorn Helgaas (3):
>   Revert "PCI/MSI: Provide stubs for IMS functions"
>   Revert "PCI/MSI: Provide pci_ims_alloc/free_irq()"
>   Revert "PCI/MSI: Provide IMS (Interrupt Message Store) support"
> 

What about the other IMS related commits which are also dead
code after above are reverted?

fa5745aca1dc ("iommu/amd: Enable PCI/IMS")
810531a1af53 ("iommu/vt-d: Enable PCI/IMS")
6e24c8877329 ("x86/apic/msi: Enable PCI/IMS")
e23d4192bf9b ("genirq/msi: Provide constants for PCI/IMS support")

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ