14 Dec, 2012

1 commit

  • Pull Xen updates from Konrad Rzeszutek Wilk:
    - Add necessary infrastructure to make balloon driver work under ARM.
    - Add /dev/xen/privcmd interfaces to work with ARM and PVH.
    - Improve Xen PCIBack wild-card parsing.
    - Add Xen ACPI PAD (Processor Aggregator) support - so can offline/
    online sockets depending on the power consumption.
    - PVHVM + kexec = use an E820_RESV region for the shared region so we
    don't overwrite said region during kexec reboot.
    - Cleanups, compile fixes.

    Fix up some trivial conflicts due to the balloon driver now working on
    ARM, and there were changes next to the previous work-arounds that are
    now gone.

    * tag 'stable/for-linus-3.8-rc0-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen:
    xen/PVonHVM: fix compile warning in init_hvm_pv_info
    xen: arm: implement remap interfaces needed for privcmd mappings.
    xen: correctly use xen_pfn_t in remap_domain_mfn_range.
    xen: arm: enable balloon driver
    xen: balloon: allow PVMMU interfaces to be compiled out
    xen: privcmd: support autotranslated physmap guests.
    xen: add pages parameter to xen_remap_domain_mfn_range
    xen/acpi: Move the xen_running_on_version_or_later function.
    xen/xenbus: Remove duplicate inclusion of asm/xen/hypervisor.h
    xen/acpi: Fix compile error by missing decleration for xen_domain.
    xen/acpi: revert pad config check in xen_check_mwait
    xen/acpi: ACPI PAD driver
    xen-pciback: reject out of range inputs
    xen-pciback: simplify and tighten parsing of device IDs
    xen PVonHVM: use E820_Reserved area for shared_info

    Linus Torvalds
     

29 Nov, 2012

1 commit


30 Oct, 2012

1 commit


20 Oct, 2012

2 commits


12 Oct, 2012

1 commit

  • The commit 254d1a3f02ebc10ccc6e4903394d8d3f484f715e, titled
    "xen/pv-on-hvm kexec: shutdown watches from old kernel" assumes that the
    XenBus backend can deal with reading of values from:
    "control/platform-feature-xs_reset_watches":

    ... a patch for xenstored is required so that it
    accepts the XS_RESET_WATCHES request from a client (see changeset
    23839:42a45baf037d in xen-unstable.hg). Without the patch for xenstored
    the registration of watches will fail and some features of a PVonHVM
    guest are not available. The guest is still able to boot, but repeated
    kexec boots will fail."

    Sadly this is not true when using a Xen 3.4 hypervisor and booting a PVHVM
    guest. We end up hanging at:

    err = xenbus_scanf(XBT_NIL, "control",
    "platform-feature-xs_reset_watches", "%d", &supported);

    This can easily be seen with guests hanging at xenbus_init:

    NX (Execute Disable) protection: active
    SMBIOS 2.4 present.
    DMI: Xen HVM domU, BIOS 3.4.0 05/13/2011
    Hypervisor detected: Xen HVM
    Xen version 3.4.
    Xen Platform PCI: I/O protocol version 1
    ... snip ..
    calling xenbus_init+0x0/0x27e @ 1

    Reverting the commit or using the attached patch fixes the issue. This fix
    checks whether the hypervisor is older than 4.0 and if so does not try to
    perform the read.

    Fixes-Oracle-Bug: 14708233
    CC: stable@vger.kernel.org
    Acked-by: Olaf Hering
    [v2: Added a comment in the source code]
    Signed-off-by: Konrad Rzeszutek Wilk

    Konrad Rzeszutek Wilk
     

21 Sep, 2012

1 commit

  • Since Xen-4.2, hvm domains may have portions of their memory paged out. When a
    foreign domain (such as dom0) attempts to map these frames, the map will
    initially fail. The hypervisor returns a suitable errno, and kicks an
    asynchronous page-in operation carried out by a helper. The foreign domain is
    expected to retry the mapping operation until it eventually succeeds. The
    foreign domain is not put to sleep because itself could be the one running the
    pager assist (typical scenario for dom0).

    This patch adds support for this mechanism for backend drivers using grant
    mapping and copying operations. Specifically, this covers the blkback and
    gntdev drivers (which map foreign grants), and the netback driver (which copies
    foreign grants).

    * Add a retry method for grants that fail with GNTST_eagain (i.e. because the
    target foreign frame is paged out).
    * Insert hooks with appropriate wrappers in the aforementioned drivers.

    The retry loop is only invoked if the grant operation status is GNTST_eagain.
    It guarantees to leave a new status code different from GNTST_eagain. Any other
    status code results in identical code execution as before.

    The retry loop performs 256 attempts with increasing time intervals through a
    32 second period. It uses msleep to yield while waiting for the next retry.

    V2 after feedback from David Vrabel:
    * Explicit MAX_DELAY instead of wrap-around delay into zero
    * Abstract GNTST_eagain check into core grant table code for netback module.

    V3 after feedback from Ian Campbell:
    * Add placeholder in array of grant table error descriptions for unrelated
    error code we jump over.
    * Eliminate single map and retry macro in favor of a generic batch flavor.
    * Some renaming.
    * Bury most implementation in grant_table.c, cleaner interface.

    V4 rebased on top of sync of Xen grant table interface headers.

    Signed-off-by: Andres Lagar-Cavilla
    Acked-by: Ian Campbell
    [v5: Fixed whitespace issues]
    Signed-off-by: Konrad Rzeszutek Wilk

    Andres Lagar-Cavilla
     

17 Sep, 2012

1 commit

  • bind_evtchn_to_irqhandler can legitimately return 0 (irq 0): it is not
    an error.

    If Linux is running as an HVM domain and is running as Dom0, use
    xenstored_local_init to initialize the xenstore page and event channel.

    Changes in v4:
    - do not xs_reset_watches on dom0.

    Changes in v2:
    - refactor xenbus_init.

    Signed-off-by: Stefano Stabellini
    [v5: Fixed case switch indentations]
    Signed-off-by: Konrad Rzeszutek Wilk

    Stefano Stabellini
     

12 Sep, 2012

1 commit

  • …/tip into stable/for-linus-3.7

    * 'x86/platform' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: (9690 commits)
    x86: Document x86_init.paging.pagetable_init()
    x86: xen: Cleanup and remove x86_init.paging.pagetable_setup_done()
    x86: Move paging_init() call to x86_init.paging.pagetable_init()
    x86: Rename pagetable_setup_start() to pagetable_init()
    x86: Remove base argument from x86_init.paging.pagetable_setup_start
    Linux 3.6-rc5
    HID: tpkbd: work even if the new Lenovo Keyboard driver is not configured
    Remove user-triggerable BUG from mpol_to_str
    xen/pciback: Fix proper FLR steps.
    uml: fix compile error in deliver_alarm()
    dj: memory scribble in logi_dj
    Fix order of arguments to compat_put_time[spec|val]
    xen: Use correct masking in xen_swiotlb_alloc_coherent.
    xen: fix logical error in tlb flushing
    xen/p2m: Fix one-off error in checking the P2M tree directory.
    powerpc: Don't use __put_user() in patch_instruction
    powerpc: Make sure IPI handlers see data written by IPI senders
    powerpc: Restore correct DSCR in context switch
    powerpc: Fix DSCR inheritance in copy_thread()
    powerpc: Keep thread.dscr and thread.dscr_inherit in sync
    ...

    Konrad Rzeszutek Wilk
     

22 Aug, 2012

2 commits


20 Jul, 2012

1 commit

  • Add xs_reset_watches function to shutdown watches from old kernel after
    kexec boot. The old kernel does not unregister all watches in the
    shutdown path. They are still active, the double registration can not
    be detected by the new kernel. When the watches fire, unexpected events
    will arrive and the xenwatch thread will crash (jumps to NULL). An
    orderly reboot of a hvm guest will destroy the entire guest with all its
    resources (including the watches) before it is rebuilt from scratch, so
    the missing unregister is not an issue in that case.

    With this change the xenstored is instructed to wipe all active watches
    for the guest. However, a patch for xenstored is required so that it
    accepts the XS_RESET_WATCHES request from a client (see changeset
    23839:42a45baf037d in xen-unstable.hg). Without the patch for xenstored
    the registration of watches will fail and some features of a PVonHVM
    guest are not available. The guest is still able to boot, but repeated
    kexec boots will fail.

    Signed-off-by: Olaf Hering
    Signed-off-by: Konrad Rzeszutek Wilk

    Olaf Hering
     

25 May, 2012

1 commit

  • Pull Xen updates from Konrad Rzeszutek Wilk:
    "Features:
    * Extend the APIC ops implementation and add IRQ_WORKER vector
    support so that 'perf' can work properly.
    * Fix self-ballooning code, and balloon logic when booting as initial
    domain.
    * Move array printing code to generic debugfs
    * Support XenBus domains.
    * Lazily free grants when a domain is dead/non-existent.
    * In M2P code use batching calls
    Bug-fixes:
    * Fix NULL dereference in allocation failure path (hvc_xen)
    * Fix unbinding of IRQ_WORKER vector during vCPU hot-unplug
    * Fix HVM guest resume - we would leak an PIRQ value instead of
    reusing the existing one."

    Fix up add-add onflicts in arch/x86/xen/enlighten.c due to addition of
    apic ipi interface next to the new apic_id functions.

    * tag 'stable/for-linus-3.5-rc0-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen:
    xen: do not map the same GSI twice in PVHVM guests.
    hvc_xen: NULL dereference on allocation failure
    xen: Add selfballoning memory reservation tunable.
    xenbus: Add support for xenbus backend in stub domain
    xen/smp: unbind irqworkX when unplugging vCPUs.
    xen: enter/exit lazy_mmu_mode around m2p_override calls
    xen/acpi/sleep: Enable ACPI sleep via the __acpi_os_prepare_sleep
    xen: implement IRQ_WORK_VECTOR handler
    xen: implement apic ipi interface
    xen/setup: update VA mapping when releasing memory during setup
    xen/setup: Combine the two hypercall functions - since they are quite similar.
    xen/setup: Populate freed MFNs from non-RAM E820 entries and gaps to E820 RAM
    xen/setup: Only print "Freeing XXX-YYY pfn range: Z pages freed" if Z > 0
    xen/gnttab: add deferred freeing logic
    debugfs: Add support to print u32 array in debugfs
    xen/p2m: An early bootup variant of set_phys_to_machine
    xen/p2m: Collapse early_alloc_p2m_middle redundant checks.
    xen/p2m: Allow alloc_p2m_middle to call reserve_brk depending on argument
    xen/p2m: Move code around to allow for better re-usage.

    Linus Torvalds
     

21 May, 2012

1 commit


20 Apr, 2012

1 commit

  • A rather annoying and common case is when booting a PVonHVM guest
    and exposing the PV KBD and PV VFB - as broken toolstacks don't
    always initialize the backends correctly.

    Normally The HVM guest is using the VGA driver and the emulated
    keyboard for this (though upstream version of QEMU implements
    PV KBD, but still uses a VGA driver). We provide a very basic
    two-stage wait mechanism - where we wait for 30 seconds for all
    devices, and then for 270 for all them except the two mentioned.

    That allows us to wait for the essential devices, like network
    or disk for the full 6 minutes.

    To trigger this, put this in your guest config:

    vfb = [ 'vnc=1, vnclisten=0.0.0.0 ,vncunused=1']

    instead of this:
    vnc=1
    vnclisten="0.0.0.0"

    CC: stable@kernel.org
    Acked-by: Stefano Stabellini
    [v3: Split delay in non-essential (30 seconds) and essential
    devices per Ian and Stefano suggestion]
    [v4: Added comments per Stefano suggestion]
    Signed-off-by: Konrad Rzeszutek Wilk

    Konrad Rzeszutek Wilk
     

23 Mar, 2012

1 commit

  • Pull xen updates from Konrad Rzeszutek Wilk:
    "which has three neat features:

    - PV multiconsole support, so that there can be hvc1, hvc2, etc; This
    can be used in HVM and in PV mode.

    - P-state and C-state power management driver that uploads said power
    management data to the hypervisor. It also inhibits cpufreq
    scaling drivers to load so that only the hypervisor can make power
    management decisions - fixing a weird perf bug.

    There is one thing in the Kconfig that you won't like: "default y
    if (X86_ACPI_CPUFREQ = y || X86_POWERNOW_K8 = y)" (note, that it
    all depends on CONFIG_XEN which depends on CONFIG_PARAVIRT which by
    default is off). I've a fix to convert that boolean expression
    into "default m" which I am going to post after the cpufreq git
    pull - as the two patches to make this work depend on a fix in Dave
    Jones's tree.

    - Function Level Reset (FLR) support in the Xen PCI backend.

    Fixes:

    - Kconfig dependencies for Xen PV keyboard and video
    - Compile warnings and constify fixes
    - Change over to use percpu_xxx instead of this_cpu_xxx"

    Fix up trivial conflicts in drivers/tty/hvc/hvc_xen.c due to changes to
    a removed commit.

    * tag 'stable/for-linus-3.4-tag' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen:
    xen kconfig: relax INPUT_XEN_KBDDEV_FRONTEND deps
    xen/acpi-processor: C and P-state driver that uploads said data to hypervisor.
    xen: constify all instances of "struct attribute_group"
    xen/xenbus: ignore console/0
    hvc_xen: introduce HVC_XEN_FRONTEND
    hvc_xen: implement multiconsole support
    hvc_xen: support PV on HVM consoles
    xenbus: don't free other end details too early
    xen/enlighten: Expose MWAIT and MWAIT_LEAF if hypervisor OKs it.
    xen/setup/pm/acpi: Remove the call to boot_option_idle_override.
    xenbus: address compiler warnings
    xen: use this_cpu_xxx replace percpu_xxx funcs
    xen/pciback: Support pci_reset_function, aka FLR or D3 support.
    pci: Introduce __pci_reset_function_locked to be used when holding device_lock.
    xen: Utilize the restore_msi_irqs hook.

    Linus Torvalds
     

14 Mar, 2012

2 commits

  • Unfortunately xend creates a bogus console/0 frotend/backend entry pair
    on xenstore that console backends cannot properly cope with.
    Any guest behavior that is not completely ignoring console/0 is going
    to either cause problems with xenconsoled or qemu.
    Returning 0 or -ENODEV from xencons_probe is not enough because it is
    going to cause the frontend state to become 4 or 6 respectively.
    The best possible thing we can do here is just ignore the entry from
    xenbus_probe_frontend.

    Signed-off-by: Stefano Stabellini
    Signed-off-by: Konrad Rzeszutek Wilk

    Stefano Stabellini
     
  • The individual drivers' remove functions could legitimately attempt to
    access this information (for logging messages if nothing else). Note
    that I did not in fact observe a problem anywhere, but I came across
    this while looking into the reasons for what turned out to need the
    fix at https://lkml.org/lkml/2012/3/5/336 to vsprintf().

    Signed-off-by: Jan Beulich
    Signed-off-by: Konrad Rzeszutek Wilk

    Jan Beulich
     

27 Feb, 2012

1 commit


04 Feb, 2012

1 commit


11 Jan, 2012

1 commit

  • * 'stable/for-linus-3.3' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen: (37 commits)
    xen/pciback: Expand the warning message to include domain id.
    xen/pciback: Fix "device has been assigned to X domain!" warning
    xen/pciback: Move the PCI_DEV_FLAGS_ASSIGNED ops to the "[un|]bind"
    xen/xenbus: don't reimplement kvasprintf via a fixed size buffer
    xenbus: maximum buffer size is XENSTORE_PAYLOAD_MAX
    xen/xenbus: Reject replies with payload > XENSTORE_PAYLOAD_MAX.
    Xen: consolidate and simplify struct xenbus_driver instantiation
    xen-gntalloc: introduce missing kfree
    xen/xenbus: Fix compile error - missing header for xen_initial_domain()
    xen/netback: Enable netback on HVM guests
    xen/grant-table: Support mappings required by blkback
    xenbus: Use grant-table wrapper functions
    xenbus: Support HVM backends
    xen/xenbus-frontend: Fix compile error with randconfig
    xen/xenbus-frontend: Make error message more clear
    xen/privcmd: Remove unused support for arch specific privcmp mmap
    xen: Add xenbus_backend device
    xen: Add xenbus device driver
    xen: Add privcmd device driver
    xen/gntalloc: fix reference counts on multi-page mappings
    ...

    Linus Torvalds
     

05 Jan, 2012

4 commits

  • Signed-off-by: Ian Campbell
    Cc: Haogang Chen
    Acked-by: Jan Beulich
    Signed-off-by: Konrad Rzeszutek Wilk

    Ian Campbell
     
  • Use this now that it is defined even though it happens to be == PAGE_SIZE.

    The code which takes requests from userspace already validates against the size
    of this buffer so no further checks are required to ensure that userspace
    requests comply with the protocol in this respect.

    Signed-off-by: Ian Campbell
    Cc: Haogang Chen
    Signed-off-by: Konrad Rzeszutek Wilk

    Ian Campbell
     
  • Haogang Chen found out that:

    There is a potential integer overflow in process_msg() that could result
    in cross-domain attack.

    body = kmalloc(msg->hdr.len + 1, GFP_NOIO | __GFP_HIGH);

    When a malicious guest passes 0xffffffff in msg->hdr.len, the subsequent
    call to xb_read() would write to a zero-length buffer.

    The other end of this connection is always the xenstore backend daemon
    so there is no guest (malicious or otherwise) which can do this. The
    xenstore daemon is a trusted component in the system.

    However this seem like a reasonable robustness improvement so we should
    have it.

    And Ian when read the API docs found that:
    The payload length (len field of the header) is limited to 4096
    (XENSTORE_PAYLOAD_MAX) in both directions. If a client exceeds the
    limit, its xenstored connection will be immediately killed by
    xenstored, which is usually catastrophic from the client's point of
    view. Clients (particularly domains, which cannot just reconnect)
    should avoid this.

    so this patch checks against that instead.

    This also avoids a potential integer overflow pointed out by Haogang Chen.

    Signed-off-by: Ian Campbell
    Cc: Haogang Chen
    CC: stable@kernel.org
    Signed-off-by: Konrad Rzeszutek Wilk

    Ian Campbell
     
  • The 'name', 'owner', and 'mod_name' members are redundant with the
    identically named fields in the 'driver' sub-structure. Rather than
    switching each instance to specify these fields explicitly, introduce
    a macro to simplify this.

    Eliminate further redundancy by allowing the drvname argument to
    DEFINE_XENBUS_DRIVER() to be blank (in which case the first entry from
    the ID table will be used for .driver.name).

    Also eliminate the questionable xenbus_register_{back,front}end()
    wrappers - their sole remaining purpose was the checking of the
    'owner' field, proper setting of which shouldn't be an issue anymore
    when the macro gets used.

    v2: Restore DRV_NAME for the driver name in xen-pciback.

    Signed-off-by: Jan Beulich
    Cc: Jens Axboe
    Cc: Dmitry Torokhov
    Cc: Florian Tobias Schandinat
    Cc: Ian Campbell
    Cc: David S. Miller
    Signed-off-by: Konrad Rzeszutek Wilk

    Jan Beulich
     

22 Dec, 2011

1 commit


21 Dec, 2011

3 commits

  • For xenbus_{map,unmap}_ring to work on HVM, the grant table operations
    must be set up using the gnttab_set_{map,unmap}_op functions instead of
    directly populating the fields of gnttab_map_grant_ref. These functions
    simply populate the structure on paravirtualized Xen; however, on HVM
    they must call __pa() on vaddr when populating op->host_addr because the
    hypervisor cannot directly interpret guest-virtual addresses.

    Signed-off-by: Daniel De Graaf
    [v1: Fixed cleanpatch error]
    Signed-off-by: Konrad Rzeszutek Wilk

    Daniel De Graaf
     
  • Add HVM implementations of xenbus_(map,unmap)_ring_v(alloc,free) so
    that ring mappings can be done without using GNTMAP_contains_pte which
    is not supported on HVM. This also removes the need to use vmlist_lock
    on PV by tracking the allocated xenbus rings.

    Signed-off-by: Daniel De Graaf
    [v1: Fix compile error when XENBUS_FRONTEND is defined as module]
    Signed-off-by: Konrad Rzeszutek Wilk

    Daniel De Graaf
     
  • * commit 'v3.2-rc3': (412 commits)
    Linux 3.2-rc3
    virtio-pci: make reset operation safer
    virtio-mmio: Correct the name of the guest features selector
    virtio: add HAS_IOMEM dependency to MMIO platform bus driver
    eCryptfs: Extend array bounds for all filename chars
    eCryptfs: Flush file in vma close
    eCryptfs: Prevent file create race condition
    regulator: TPS65910: Fix VDD1/2 voltage selector count
    i2c: Make i2cdev_notifier_call static
    i2c: Delete ANY_I2C_BUS
    i2c: Fix device name for 10-bit slave address
    i2c-algo-bit: Generate correct i2c address sequence for 10-bit target
    drm: integer overflow in drm_mode_dirtyfb_ioctl()
    Revert "of/irq: of_irq_find_parent: check for parent equal to child"
    drivers/gpu/vga/vgaarb.c: add missing kfree
    drm/radeon/kms/atom: unify i2c gpio table handling
    drm/radeon/kms: fix up gpio i2c mask bits for r4xx for real
    ttm: Don't return the bo reserved on error path
    mount_subtree() pointless use-after-free
    iio: fix a leak due to improper use of anon_inode_getfd()
    ...

    Konrad Rzeszutek Wilk
     

20 Dec, 2011

1 commit


19 Dec, 2011

1 commit


17 Dec, 2011

3 commits


17 Nov, 2011

1 commit

  • When mapping a foreign page with xenbus_map_ring_valloc() with the
    GNTTABOP_map_grant_ref hypercall, set the GNTMAP_contains_pte flag and
    pass a pointer to the PTE (in init_mm).

    After the page is mapped, the usual fault mechanism can be used to
    update additional MMs. This allows the vmalloc_sync_all() to be
    removed from alloc_vm_area().

    Signed-off-by: David Vrabel
    Acked-by: Andrew Morton
    [v1: Squashed fix by Michal for no-mmu case]
    Signed-off-by: Konrad Rzeszutek Wilk
    Signed-off-by: Michal Simek

    David Vrabel
     

07 Nov, 2011

3 commits

  • * 'stable/cleanups-3.2' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen:
    xen: use static initializers in xen-balloon.c
    Xen: fix braces and tabs coding style issue in xenbus_probe.c
    Xen: fix braces coding style issue in xenbus_probe.h
    Xen: fix whitespaces,tabs coding style issue in drivers/xen/pci.c
    Xen: fix braces coding style issue in gntdev.c and grant-table.c
    Xen: fix whitespaces,tabs coding style issue in drivers/xen/events.c
    Xen: fix whitespaces,tabs coding style issue in drivers/xen/balloon.c

    Fix up trivial whitespace-conflicts in
    drivers/xen/{balloon.c,pci.c,xenbus/xenbus_probe.c}

    Linus Torvalds
     
  • * 'modsplit-Oct31_2011' of git://git.kernel.org/pub/scm/linux/kernel/git/paulg/linux: (230 commits)
    Revert "tracing: Include module.h in define_trace.h"
    irq: don't put module.h into irq.h for tracking irqgen modules.
    bluetooth: macroize two small inlines to avoid module.h
    ip_vs.h: fix implicit use of module_get/module_put from module.h
    nf_conntrack.h: fix up fallout from implicit moduleparam.h presence
    include: replace linux/module.h with "struct module" wherever possible
    include: convert various register fcns to macros to avoid include chaining
    crypto.h: remove unused crypto_tfm_alg_modname() inline
    uwb.h: fix implicit use of asm/page.h for PAGE_SIZE
    pm_runtime.h: explicitly requires notifier.h
    linux/dmaengine.h: fix implicit use of bitmap.h and asm/page.h
    miscdevice.h: fix up implicit use of lists and types
    stop_machine.h: fix implicit use of smp.h for smp_processor_id
    of: fix implicit use of errno.h in include/linux/of.h
    of_platform.h: delete needless include
    acpi: remove module.h include from platform/aclinux.h
    miscdevice.h: delete unnecessary inclusion of module.h
    device_cgroup.h: delete needless include
    net: sch_generic remove redundant use of
    net: inet_timewait_sock doesnt need
    ...

    Fix up trivial conflicts (other header files, and removal of the ab3550 mfd driver) in
    - drivers/media/dvb/frontends/dibx000_common.c
    - drivers/media/video/{mt9m111.c,ov6650.c}
    - drivers/mfd/ab3550-core.c
    - include/linux/dmaengine.h

    Linus Torvalds
     
  • * 'stable/vmalloc-3.2' of git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen:
    net: xen-netback: use API provided by xenbus module to map rings
    block: xen-blkback: use API provided by xenbus module to map rings
    xen: use generic functions instead of xen_{alloc, free}_vm_area()

    Linus Torvalds
     

01 Nov, 2011

2 commits