ANPlYe u2gCG5RuIWHG71Cxc/Bb44Yr9mReWQ3GuGTjbk1hT21xdur0Roz/RaETW9d6RU+G/k4dYRlSwbt I2CxJ43Qrm0YOeAlJ+vlixrElAkSsfvGtNmLICTm5Igg01+818q/6so9RP+XWFVv/djmg2K2BSN YLbb0KWIuwduunyJUUsZ7FR25uR09hgHNPErj45O7JI//+Efw91BUR0DLga1f2r5rLH8p4nsgHo /SF4nAHAuHjrxnvxpV4D6h6hJeQKaQ== X-Authority-Analysis: v=2.4 cv=OrVCCi/t c=1 sm=1 tr=0 ts=68fa1af6 cx=c_pps a=5BHTudwdYE3Te8bg5FgnPg==:117 a=5BHTudwdYE3Te8bg5FgnPg==:17 a=IkcTkHD0fZMA:10 a=x6icFKpwvdMA:10 a=VkNPw1HP01LnGYTKEx00:22 a=gcFOmungAAAA:8 a=qqEwj5KqF7NCsJNSzEoA:9 a=QEXdDO2ut3YA:10 a=mpxIG-sAcrd3FiiRqSpR:22 X-Proofpoint-GUID: ZS59xAkg2jI98acFrqAwdktVvCgHaCbU X-Proofpoint-ORIG-GUID: ZS59xAkg2jI98acFrqAwdktVvCgHaCbU X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-10-22_08,2025-10-22_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 adultscore=0 priorityscore=1501 spamscore=0 phishscore=0 clxscore=1015 bulkscore=0 malwarescore=0 lowpriorityscore=0 suspectscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.19.0-2510020000 definitions=main-2510180022 X-DKIM: signer='ibm.com' status='pass' reason='' DKIMCheck: Server passes DKIM test, 0 Spam score X-Spam-Score: 0.5 (/) X-Spam-Report: Spam detection software, running on the system "witcher.mxrouting.net", has performed the tests listed below against this email. Information: https://mxroutedocs.com/directadmin/spamfilters/ --- Content analysis details: (0.5 points) --- pts rule name description ---- ---------------------- ----------------------------------------- 1.5 HEADER_FROM_DIFFERENT_DOMAINS From and EnvelopeFrom 2nd level mail domains are different 0.0 RCVD_IN_DNSWL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to DNSWL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#DnsBlocklists-dnsbl-block for more information. [139.178.88.99 listed in list.dnswl.org] -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -1.0 MAILING_LIST_MULTI Multiple indicators imply a widely-seen list manager SpamTally: Final spam score: 5 On Thu, 2025-10-23 at 14:00 +0200, Heiko Carstens wrote: > On Thu, Oct 23, 2025 at 01:18:54PM +0200, Niklas Schnelle wrote: > > On Thu, 2025-10-23 at 09:40 +0200, Heiko Carstens wrote: > > > On Wed, Oct 22, 2025 at 09:47:26AM -0700, Farhan Ali wrote: > > > > Commit c1e18c17bda6 ("s390/pci: add zpci_set_irq()/zpci_clear_irq()= "), > > > > introduced the zpci_set_irq() and zpci_clear_irq(), to be used whil= e > > > > resetting a zPCI device. > ... > > > The above sounds like this fixes a regression. Is there a reason why > > > there are no Fixes and stable tags? > >=20 > > It doesn't have a fixes tag because at the moment the problem is > > theoretical because no driver uses plain pci_restore_state() in > > recovery. Farhan is working on patches where this would be used in > > vfio-pci / PCI pass-through scenarios though. > >=20 > > The existing drivers re-use their shutdown and initialization routines > > to restore state and end up calling arch_teardown_msi_irqs() and > > arch_setup_msi_irqs() so it works out ok there.=C2=A0 > >=20 > > That said, I agree this could and probably should carry a fixes tag > > since the logic is kind of broken even if it doesn't break anything at > > the moment. >=20 > Can then somebody :) provide a tag, please? I'll add it when applying; > no need for a new version. Of course :) Cc: stable@vger.kernnel.org Fixes: c1e18c17bda6 ("s390/pci: add zpci_set_irq()/zpci_clear_irq()") From - Thu Oct 23 12:14:57 2025 X-Mozilla-Status: 0001 X-MozilR","name":"Read","input":{"file_path":"/home/josie/development/irc-now/crates/txt/src/auth_guard.rs","limit":100},"caller":{"type":"direct"}}],"stop_reason":null,"stop_sequence":null,"usage":{"input_tokens":0,"cache_creation_input_tokens":162,"cache_read_input_tokens":101501,"cache_creation":{"ephemeral_5m_input_tokens":162,"ephemeral_1h_input_tokens":0},"output_tokens":18,"service_tier":"standard","inference_geo":"not_available"},"context_management":null},"requestId":"req_011CYottqXsjHEfNfWEN3HwS","uuid":"baca3cda-ba61-46ff-94fe-312ec7e611d9"},"type":"agent_progress","prompt":"","agentId":"a73d061fa9ef458c5"},"toolUseID":"agent_msg_01Emt5MUzSFNqHC8AettHT6Q","parentToolUseID":"toolu_01VC26HR1fnhpdEFw9Rt2GPt","uuid":"ddb53be6-0b34-4370-9d9f-ec065108ff90","timestamp":"2026-03-07T14:42:04.829Z"} {"parentUuid":"ddb53be6-0b34-4370-9d9f-ec065108ff90","isSidechain":false,"userType":"external","cwd":"/home/josie/development/irc-now/notes","sessionId":"68961eda-ee75-4467-9276-905f887f8f6c","version":"2.1.70","gitBranch":"master","slug":"declarative-doodling-mist","type":"progress","data":{"message":{"type":"user","message":{"role":"user","content":[{"tool_use_id":"toolu_01T9LCBvtgjorb8G8L8WZkSR","type":"tool_result","content":" 1→use axum::{\n 2→ extract::FromRequestParts,\n 3→ http::request::Parts,\n 4→ response::Redirect,\n 5→};\n 6→use tower_sessions::Session;\n 7→\n 8→use irc_now_common::auth::UserClaims;\n 9→\n 10→pub struct AuthUser(pub UserClaims);\n 11→\n 12→impl FromRequestParts for AuthUser {\n 13→ type Rejection = Redirect;\n 14→\n 15→ async fn from_request_parts(\n 16→ parts: &mut Parts,\n 17→ state: &crate::state::AppState,\n 18→ ) -> Result {\n 19→ let session = Session::from_request_parts(parts, state)\n 20→ .await\n 21→ .map_err(|_| Redirect::temporary(\"/auth/login\"))?;\n 22→\n 23→ let claims: Option = match session.get(\"user\").await {\n 24→ Ok(c) => c,\n 25→ Err(e) => {\n 26→ tracing::warn!(\"session deserialization failed: {e}\");\n 27→ None\n 28→ }\n 29→ };\n 30→\n 31→ match claims {\n 32→ Some(c) => Ok(AuthUser(c)),\n 33→ None => Err(Redirect::temporary(\"/auth/login\")),\n 34→ }\n 35→ }\n 36→}\n 37→\n 38→pub struct OptionalAuth(pub Option);\n 39→\n 40→impl FromRequestParts for OptionalAuth {\n 41→ type Rejection = std::convert::Infallible;\n 42→\n 43→ async fn from_request_parts(\n 44→ parts: &mut Parts,\n 45→ state: &crate::state::AppState,\n 46→ ) -> Result {\n 47→ let session = Session::from_request_parts(parts, state).await.ok();\n 48→ let claims = match session {\n 49→ Some(s) => match s.get(\"user\").await {\n 50→ Ok(c) => c,\n 51→ Err(e) => {\n 52→ tracing::warn!(\"session deserialization failed: {e}\");\n 53→ None\n 54→ }\n 55→ },\n 56→ None => None,\n 57→ };\n 58→ Ok(OptionalAuth(claims))\n 59→ }\n 60→}\n 61→"}]},"uuid":"014e7da1-ca85-47c6-bf59-803e5615f3a5","timestamp":"2026-03-07T14:42:44.823Z"},"type":"agent_progress","prompt":"","agentId":"a73d061fa9ef458c5"},"toolUseID":"agent_msg_01Emt5MUzSFNqHC8AettHT6Q","parentToolUseID":"toolu_01VC26HR1fnhpdEFw9Rt2GPt","uuid":"c6fa0ea8-56c2-4113-bed7-dd52cbe829cc","timestamp":"2026-03-07T14:42:44.879Z"} {"parentUuid":"c6fa0ea8-56c2-4113-bed7-dd52cbe829cc","isSidechain":false,"userType":"external","cwd":"/home/josie/development/irc-now/notes","sessionId":"68961eda-ee75-4467-9276-905f887f8f6