* [PATCH RESEND] dm9601: don't do usb transfers of data on stack
@ 2008-07-11 11:37 Peter Korsgaard
[not found] ` <87mykoircs.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>
0 siblings, 1 reply; 9+ messages in thread
From: Peter Korsgaard @ 2008-07-11 11:37 UTC (permalink / raw)
To: jeff-o2qLIJkoznsdnm+yROfE0A, netdev-u79uwXL29TY76Z2rM5mHXA,
linux-usb-u79uwXL29TY76Z2rM5mHXA
dm_{read,write}_shared_word() were doing USB transfers of data on stack,
which isn't allowed. Fix it by using the usbnet->data area like in
dm9601_set_multicast().
Signed-off-by: Peter Korsgaard <jacmet-OfajU3CKLf1/SzgSGea1oA@public.gmane.org>
---
Resending since no feedback (27/06).
drivers/net/usb/dm9601.c | 14 ++++++++++++--
1 files changed, 12 insertions(+), 2 deletions(-)
diff --git a/drivers/net/usb/dm9601.c b/drivers/net/usb/dm9601.c
index f7319d3..1a5e649 100644
--- a/drivers/net/usb/dm9601.c
+++ b/drivers/net/usb/dm9601.c
@@ -158,6 +158,10 @@ static void dm_write_reg_async(struct usbnet *dev, u8 reg, u8 value)
static int dm_read_shared_word(struct usbnet *dev, int phy, u8 reg, __le16 *value)
{
int ret, i;
+ /* USB transfers of data on stack is not allowed - We use
+ the 20 byte dev->data for value to avoid allocating memory.
+ Notice that dm9601_set_multicast() uses the lower 8 bytes */
+ void *data = &dev->data[4];
mutex_lock(&dev->phy_mutex);
@@ -184,7 +188,8 @@ static int dm_read_shared_word(struct usbnet *dev, int phy, u8 reg, __le16 *valu
}
dm_write_reg(dev, DM_SHARED_CTRL, 0x0);
- ret = dm_read(dev, DM_SHARED_DATA, 2, value);
+ ret = dm_read(dev, DM_SHARED_DATA, 2, data);
+ memcpy(value, data, 2);
devdbg(dev, "read shared %d 0x%02x returned 0x%04x, %d",
phy, reg, *value, ret);
@@ -197,10 +202,15 @@ static int dm_read_shared_word(struct usbnet *dev, int phy, u8 reg, __le16 *valu
static int dm_write_shared_word(struct usbnet *dev, int phy, u8 reg, __le16 value)
{
int ret, i;
+ /* USB transfers of data on stack is not allowed - We use
+ the 20 byte dev->data for value to avoid allocating memory.
+ Notice that dm9601_set_multicast() uses the lower 8 bytes */
+ void *data = &dev->data[4];
mutex_lock(&dev->phy_mutex);
- ret = dm_write(dev, DM_SHARED_DATA, 2, &value);
+ memcpy(data, &value, sizeof(value));
+ ret = dm_write(dev, DM_SHARED_DATA, 2, data);
if (ret < 0)
goto out;
--
1.5.5.1
--
Bye, Peter Korsgaard
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply related [flat|nested] 9+ messages in thread[parent not found: <87mykoircs.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>]
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack [not found] ` <87mykoircs.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org> @ 2008-07-11 12:00 ` Oliver Neukum [not found] ` <200807111400.38312.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> 0 siblings, 1 reply; 9+ messages in thread From: Oliver Neukum @ 2008-07-11 12:00 UTC (permalink / raw) To: Peter Korsgaard Cc: jeff-o2qLIJkoznsdnm+yROfE0A, netdev-u79uwXL29TY76Z2rM5mHXA, linux-usb-u79uwXL29TY76Z2rM5mHXA Am Freitag 11 Juli 2008 13:37:39 schrieb Peter Korsgaard: > dm_{read,write}_shared_word() were doing USB transfers of data on stack, > which isn't allowed. Fix it by using the usbnet->data area like in > dm9601_set_multicast(). You cannot do this. You've identified the bug correctly, but the fix is incorrect. Doing DMA on non coherent architectures means that any cacheline the buffer shares must not be touched while DMA may be running. If you embed the buffer into struct usbnet, how could you meet the guarantee? Regards Oliver -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 9+ messages in thread
[parent not found: <200807111400.38312.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org>]
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack [not found] ` <200807111400.38312.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> @ 2008-07-11 12:17 ` Peter Korsgaard 2008-07-11 12:22 ` Oliver Neukum 0 siblings, 1 reply; 9+ messages in thread From: Peter Korsgaard @ 2008-07-11 12:17 UTC (permalink / raw) To: Oliver Neukum Cc: jeff-o2qLIJkoznsdnm+yROfE0A, netdev-u79uwXL29TY76Z2rM5mHXA, linux-usb-u79uwXL29TY76Z2rM5mHXA >>>>> "Oliver" == Oliver Neukum <oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> writes: >> dm_{read,write}_shared_word() were doing USB transfers of data on stack, >> which isn't allowed. Fix it by using the usbnet->data area like in >> dm9601_set_multicast(). Oliver> You cannot do this. You've identified the bug correctly, but Oliver> the fix is incorrect. Doing DMA on non coherent architectures Oliver> means that any cacheline the buffer shares must not be Oliver> touched while DMA may be running. If you embed the buffer Oliver> into struct usbnet, how could you meet the guarantee? Ahh. So kmalloc() / kfree() around the usb_control_msg isn dm_read / dm_write is the way to go? -- Bye, Peter Korsgaard -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack 2008-07-11 12:17 ` Peter Korsgaard @ 2008-07-11 12:22 ` Oliver Neukum [not found] ` <200807111422.56406.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> 2008-07-11 12:57 ` Peter Korsgaard 0 siblings, 2 replies; 9+ messages in thread From: Oliver Neukum @ 2008-07-11 12:22 UTC (permalink / raw) To: Peter Korsgaard; +Cc: jeff, netdev, linux-usb Am Freitag 11 Juli 2008 14:17:58 schrieb Peter Korsgaard: > >>>>> "Oliver" == Oliver Neukum <oliver@neukum.org> writes: > > >> dm_{read,write}_shared_word() were doing USB transfers of data on stack, > >> which isn't allowed. Fix it by using the usbnet->data area like in > >> dm9601_set_multicast(). > > Oliver> You cannot do this. You've identified the bug correctly, but > Oliver> the fix is incorrect. Doing DMA on non coherent architectures > Oliver> means that any cacheline the buffer shares must not be > Oliver> touched while DMA may be running. If you embed the buffer > Oliver> into struct usbnet, how could you meet the guarantee? > > Ahh. So kmalloc() / kfree() around the usb_control_msg isn dm_read / > dm_write is the way to go? The buffer should be allocated with kmalloc. That doesn't mean it has to be allocated each time the function is called. If several drivers do this, the best fix is to modify struct usbnet so that it contains only a pointer to the buffer, not the buffer itself and modify drivers accordingly. Regards Oliver ^ permalink raw reply [flat|nested] 9+ messages in thread
[parent not found: <200807111422.56406.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org>]
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack [not found] ` <200807111422.56406.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> @ 2008-07-11 12:55 ` Peter Korsgaard 0 siblings, 0 replies; 9+ messages in thread From: Peter Korsgaard @ 2008-07-11 12:55 UTC (permalink / raw) To: Oliver Neukum Cc: jeff-o2qLIJkoznsdnm+yROfE0A, netdev-u79uwXL29TY76Z2rM5mHXA, linux-usb-u79uwXL29TY76Z2rM5mHXA >>>>> "Oliver" == Oliver Neukum <oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> writes: Hi, >> Ahh. So kmalloc() / kfree() around the usb_control_msg isn dm_read / >> dm_write is the way to go? Oliver> The buffer should be allocated with kmalloc. That doesn't Oliver> mean it has to be allocated each time the function is Oliver> called. If several drivers do this, the best fix is to modify Oliver> struct usbnet so that it contains only a pointer to the Oliver> buffer, not the buffer itself and modify drivers accordingly. Ok, but this is just for a few config registers - Nothing in the fast path, so I'll keep it simple. -- Bye, Peter Korsgaard -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack 2008-07-11 12:22 ` Oliver Neukum [not found] ` <200807111422.56406.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org> @ 2008-07-11 12:57 ` Peter Korsgaard [not found] ` <87mykoefy4.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org> 1 sibling, 1 reply; 9+ messages in thread From: Peter Korsgaard @ 2008-07-11 12:57 UTC (permalink / raw) To: Oliver Neukum, jeff; +Cc: netdev, linux-usb dm_{read,write}() were doing USB transfers of data on stack, which isn't allowed. Fix it by kmalloc'ing a temporary buffer. Clean up the error handling for short transfers while we're at it. Signed-off-by: Peter Korsgaard <jacmet@sunsite.dk> --- drivers/net/usb/dm9601.c | 52 +++++++++++++++++++++++++++++++++++++-------- 1 files changed, 42 insertions(+), 10 deletions(-) diff --git a/drivers/net/usb/dm9601.c b/drivers/net/usb/dm9601.c index f7319d3..78df2be 100644 --- a/drivers/net/usb/dm9601.c +++ b/drivers/net/usb/dm9601.c @@ -55,12 +55,28 @@ static int dm_read(struct usbnet *dev, u8 reg, u16 length, void *data) { + void *buf; + int err = -ENOMEM; + devdbg(dev, "dm_read() reg=0x%02x length=%d", reg, length); - return usb_control_msg(dev->udev, - usb_rcvctrlpipe(dev->udev, 0), - DM_READ_REGS, - USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, - 0, reg, data, length, USB_CTRL_SET_TIMEOUT); + + buf = kmalloc(length, GFP_KERNEL); + if (!buf) + goto out; + + err = usb_control_msg(dev->udev, + usb_rcvctrlpipe(dev->udev, 0), + DM_READ_REGS, + USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, + 0, reg, buf, length, USB_CTRL_SET_TIMEOUT); + if (err == length) + memcpy(data, buf, length); + else if (err >= 0) + err = -EINVAL; + kfree(buf); + + out: + return err; } static int dm_read_reg(struct usbnet *dev, u8 reg, u8 *value) @@ -70,12 +86,28 @@ static int dm_read_reg(struct usbnet *dev, u8 reg, u8 *value) static int dm_write(struct usbnet *dev, u8 reg, u16 length, void *data) { + void *buf = NULL; + int err = -ENOMEM; + devdbg(dev, "dm_write() reg=0x%02x, length=%d", reg, length); - return usb_control_msg(dev->udev, - usb_sndctrlpipe(dev->udev, 0), - DM_WRITE_REGS, - USB_DIR_OUT | USB_TYPE_VENDOR |USB_RECIP_DEVICE, - 0, reg, data, length, USB_CTRL_SET_TIMEOUT); + + if (data) { + buf = kmalloc(length, GFP_KERNEL); + if (!buf) + goto out; + memcpy(buf, data, length); + } + + err = usb_control_msg(dev->udev, + usb_sndctrlpipe(dev->udev, 0), + DM_WRITE_REGS, + USB_DIR_OUT | USB_TYPE_VENDOR |USB_RECIP_DEVICE, + 0, reg, buf, length, USB_CTRL_SET_TIMEOUT); + kfree(buf); + if (err >= 0 && err < length) + err = -EINVAL; + out: + return err; } static int dm_write_reg(struct usbnet *dev, u8 reg, u8 value) -- 1.5.6.2 -- Bye, Peter Korsgaard ^ permalink raw reply related [flat|nested] 9+ messages in thread
[parent not found: <87mykoefy4.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>]
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack [not found] ` <87mykoefy4.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org> @ 2008-07-11 22:02 ` David Brownell [not found] ` <200807111502.20507.david-b-yBeKhBN/0LDR7s880joybQ@public.gmane.org> 0 siblings, 1 reply; 9+ messages in thread From: David Brownell @ 2008-07-11 22:02 UTC (permalink / raw) To: Peter Korsgaard, jeff-o2qLIJkoznsdnm+yROfE0A Cc: Oliver Neukum, netdev-u79uwXL29TY76Z2rM5mHXA, linux-usb-u79uwXL29TY76Z2rM5mHXA On Friday 11 July 2008, Peter Korsgaard wrote: > dm_{read,write}() were doing USB transfers of data on stack, which isn't > allowed. Fix it by kmalloc'ing a temporary buffer. > Clean up the error handling for short transfers while we're at it. > > Signed-off-by: Peter Korsgaard <jacmet-OfajU3CKLf1/SzgSGea1oA@public.gmane.org> Acked-by: David Brownell <dbrownell-Rn4VEauK+AKRv+LV9MX5uipxlwaOVQ5f@public.gmane.org> > --- > drivers/net/usb/dm9601.c | 52 +++++++++++++++++++++++++++++++++++++-------- > 1 files changed, 42 insertions(+), 10 deletions(-) > > diff --git a/drivers/net/usb/dm9601.c b/drivers/net/usb/dm9601.c > index f7319d3..78df2be 100644 > --- a/drivers/net/usb/dm9601.c > +++ b/drivers/net/usb/dm9601.c > @@ -55,12 +55,28 @@ > > static int dm_read(struct usbnet *dev, u8 reg, u16 length, void *data) > { > + void *buf; > + int err = -ENOMEM; > + > devdbg(dev, "dm_read() reg=0x%02x length=%d", reg, length); > - return usb_control_msg(dev->udev, > - usb_rcvctrlpipe(dev->udev, 0), > - DM_READ_REGS, > - USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, > - 0, reg, data, length, USB_CTRL_SET_TIMEOUT); > + > + buf = kmalloc(length, GFP_KERNEL); > + if (!buf) > + goto out; > + > + err = usb_control_msg(dev->udev, > + usb_rcvctrlpipe(dev->udev, 0), > + DM_READ_REGS, > + USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, > + 0, reg, buf, length, USB_CTRL_SET_TIMEOUT); > + if (err == length) > + memcpy(data, buf, length); > + else if (err >= 0) > + err = -EINVAL; > + kfree(buf); > + > + out: > + return err; > } > > static int dm_read_reg(struct usbnet *dev, u8 reg, u8 *value) > @@ -70,12 +86,28 @@ static int dm_read_reg(struct usbnet *dev, u8 reg, u8 *value) > > static int dm_write(struct usbnet *dev, u8 reg, u16 length, void *data) > { > + void *buf = NULL; > + int err = -ENOMEM; > + > devdbg(dev, "dm_write() reg=0x%02x, length=%d", reg, length); > - return usb_control_msg(dev->udev, > - usb_sndctrlpipe(dev->udev, 0), > - DM_WRITE_REGS, > - USB_DIR_OUT | USB_TYPE_VENDOR |USB_RECIP_DEVICE, > - 0, reg, data, length, USB_CTRL_SET_TIMEOUT); > + > + if (data) { > + buf = kmalloc(length, GFP_KERNEL); > + if (!buf) > + goto out; > + memcpy(buf, data, length); > + } > + > + err = usb_control_msg(dev->udev, > + usb_sndctrlpipe(dev->udev, 0), > + DM_WRITE_REGS, > + USB_DIR_OUT | USB_TYPE_VENDOR |USB_RECIP_DEVICE, > + 0, reg, buf, length, USB_CTRL_SET_TIMEOUT); > + kfree(buf); > + if (err >= 0 && err < length) > + err = -EINVAL; > + out: > + return err; > } > > static int dm_write_reg(struct usbnet *dev, u8 reg, u8 value) > -- > 1.5.6.2 > > > -- > Bye, Peter Korsgaard > -- > To unsubscribe from this list: send the line "unsubscribe linux-usb" in > the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 9+ messages in thread
[parent not found: <200807111502.20507.david-b-yBeKhBN/0LDR7s880joybQ@public.gmane.org>]
* [PATCH RESEND] dm9601: don't do usb transfers of data on stack [not found] ` <200807111502.20507.david-b-yBeKhBN/0LDR7s880joybQ@public.gmane.org> @ 2008-07-14 7:07 ` Peter Korsgaard [not found] ` <87wsjp9c5n.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org> 0 siblings, 1 reply; 9+ messages in thread From: Peter Korsgaard @ 2008-07-14 7:07 UTC (permalink / raw) To: jeff-o2qLIJkoznsdnm+yROfE0A, netdev-u79uwXL29TY76Z2rM5mHXA Cc: David Brownell, Oliver Neukum, linux-usb-u79uwXL29TY76Z2rM5mHXA dm_{read,write}() were doing USB transfers of data on stack, which isn't allowed. Fix it by kmalloc'ing a temporary buffer. Clean up the error handling for short transfers while we're at it. Signed-off-by: Peter Korsgaard <jacmet-OfajU3CKLf1/SzgSGea1oA@public.gmane.org> Acked-by: David Brownell <dbrownell-Rn4VEauK+AKRv+LV9MX5uipxlwaOVQ5f@public.gmane.org> --- Jeff, please enqueue for 2.6.27. drivers/net/usb/dm9601.c | 52 +++++++++++++++++++++++++++++++++++++-------- 1 files changed, 42 insertions(+), 10 deletions(-) diff --git a/drivers/net/usb/dm9601.c b/drivers/net/usb/dm9601.c index f7319d3..78df2be 100644 --- a/drivers/net/usb/dm9601.c +++ b/drivers/net/usb/dm9601.c @@ -55,12 +55,28 @@ static int dm_read(struct usbnet *dev, u8 reg, u16 length, void *data) { + void *buf; + int err = -ENOMEM; + devdbg(dev, "dm_read() reg=0x%02x length=%d", reg, length); - return usb_control_msg(dev->udev, - usb_rcvctrlpipe(dev->udev, 0), - DM_READ_REGS, - USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, - 0, reg, data, length, USB_CTRL_SET_TIMEOUT); + + buf = kmalloc(length, GFP_KERNEL); + if (!buf) + goto out; + + err = usb_control_msg(dev->udev, + usb_rcvctrlpipe(dev->udev, 0), + DM_READ_REGS, + USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, + 0, reg, buf, length, USB_CTRL_SET_TIMEOUT); + if (err == length) + memcpy(data, buf, length); + else if (err >= 0) + err = -EINVAL; + kfree(buf); + + out: + return err; } static int dm_read_reg(struct usbnet *dev, u8 reg, u8 *value) @@ -70,12 +86,28 @@ static int dm_read_reg(struct usbnet *dev, u8 reg, u8 *value) static int dm_write(struct usbnet *dev, u8 reg, u16 length, void *data) { + void *buf = NULL; + int err = -ENOMEM; + devdbg(dev, "dm_write() reg=0x%02x, length=%d", reg, length); - return usb_control_msg(dev->udev, - usb_sndctrlpipe(dev->udev, 0), - DM_WRITE_REGS, - USB_DIR_OUT | USB_TYPE_VENDOR |USB_RECIP_DEVICE, - 0, reg, data, length, USB_CTRL_SET_TIMEOUT); + + if (data) { + buf = kmalloc(length, GFP_KERNEL); + if (!buf) + goto out; + memcpy(buf, data, length); + } + + err = usb_control_msg(dev->udev, + usb_sndctrlpipe(dev->udev, 0), + DM_WRITE_REGS, + USB_DIR_OUT | USB_TYPE_VENDOR |USB_RECIP_DEVICE, + 0, reg, buf, length, USB_CTRL_SET_TIMEOUT); + kfree(buf); + if (err >= 0 && err < length) + err = -EINVAL; + out: + return err; } static int dm_write_reg(struct usbnet *dev, u8 reg, u8 value) -- 1.5.6.2 -- Bye, Peter Korsgaard -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply related [flat|nested] 9+ messages in thread
[parent not found: <87wsjp9c5n.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>]
* Re: [PATCH RESEND] dm9601: don't do usb transfers of data on stack [not found] ` <87wsjp9c5n.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org> @ 2008-07-30 8:48 ` Jeff Garzik 0 siblings, 0 replies; 9+ messages in thread From: Jeff Garzik @ 2008-07-30 8:48 UTC (permalink / raw) To: Peter Korsgaard Cc: netdev-u79uwXL29TY76Z2rM5mHXA, David Brownell, Oliver Neukum, linux-usb-u79uwXL29TY76Z2rM5mHXA Peter Korsgaard wrote: > dm_{read,write}() were doing USB transfers of data on stack, which isn't > allowed. Fix it by kmalloc'ing a temporary buffer. > Clean up the error handling for short transfers while we're at it. > > Signed-off-by: Peter Korsgaard <jacmet-OfajU3CKLf1/SzgSGea1oA@public.gmane.org> > Acked-by: David Brownell <dbrownell-Rn4VEauK+AKRv+LV9MX5uipxlwaOVQ5f@public.gmane.org> > --- > > Jeff, please enqueue for 2.6.27. applied -- To unsubscribe from this list: send the line "unsubscribe linux-usb" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2008-07-30 8:48 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-07-11 11:37 [PATCH RESEND] dm9601: don't do usb transfers of data on stack Peter Korsgaard
[not found] ` <87mykoircs.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>
2008-07-11 12:00 ` Oliver Neukum
[not found] ` <200807111400.38312.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org>
2008-07-11 12:17 ` Peter Korsgaard
2008-07-11 12:22 ` Oliver Neukum
[not found] ` <200807111422.56406.oliver-GvhC2dPhHPQdnm+yROfE0A@public.gmane.org>
2008-07-11 12:55 ` Peter Korsgaard
2008-07-11 12:57 ` Peter Korsgaard
[not found] ` <87mykoefy4.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>
2008-07-11 22:02 ` David Brownell
[not found] ` <200807111502.20507.david-b-yBeKhBN/0LDR7s880joybQ@public.gmane.org>
2008-07-14 7:07 ` Peter Korsgaard
[not found] ` <87wsjp9c5n.fsf-uXGAPMMVk8amE9MCos8gUmSdvHPH+/yF@public.gmane.org>
2008-07-30 8:48 ` Jeff Garzik
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).