Add a function that will enable changing the MAC address
of an ibmveth interface while it is still running.
Signed-off-by: Thomas Falcon tlfal...@linux.vnet.ibm.com
---
v2:
If h_change_logical_lan_mac fails, dev-dev_addr will not be changed.
drivers/net/ethernet/ibm/ibmveth.c | 25
We currently use the device tree update code in the kernel after resuming
from a suspend operation to re-sync the kernels view of the device tree with
that of the hypervisor. The code as it stands is not endian safe as it relies
on parsing buffers returned by RTAS calls that thusly contains data
This patchset simplifies the usage of rtas_ibm_suspend_me() by removing an
extraneous function parameter, fixes device tree updating on little endian
platforms, and adds a mechanism for informing drmgr that the kernel is cabable
of
performing the whole migration including device tree update
During suspend/migration operation we must wait for the VASI state reported
by the hypervisor to become Suspending prior to making the ibm,suspend-me
RTAS call. Calling routines to rtas_ibm_supend_me() pass a vasi_state variable
that exposes the VASI state to the caller. This is unnecessary as the
Traditionally after a migration operation drmgr has coordinated the device tree
update with the kernel in userspace via the ugly /proc/ppc64/ofdt interface.
This
can be better done fully in the kernel where support already exists. Currently,
drmgr makes a faux ibm,suspend-me RTAS call which we
Hi Kees,
On Fri, 27 Feb 2015 16:52:29 -0800 Kees Cook keesc...@chromium.org wrote:
diff --git a/arch/arm/include/asm/seccomp.h b/arch/arm/include/asm/seccomp.h
index 52b156b341f5..66ca6a30bf5c 100644
--- a/arch/arm/include/asm/seccomp.h
+++ b/arch/arm/include/asm/seccomp.h
@@ -1,11 +1 @@
On Fri, Feb 27, 2015 at 5:36 PM, Stephen Rothwell s...@canb.auug.org.au wrote:
Hi Kees,
On Fri, 27 Feb 2015 16:52:29 -0800 Kees Cook keesc...@chromium.org wrote:
diff --git a/arch/arm/include/asm/seccomp.h b/arch/arm/include/asm/seccomp.h
index 52b156b341f5..66ca6a30bf5c 100644
---
On Jan 20, 2015, at 6:03 AM, Igal.Liberman igal.liber...@freescale.com wrote:
From: Igal Liberman igal.liber...@freescale.com
Really should have some commit text
Signed-off-by: Igal Liberman igal.liber...@freescale.com
This patch is based on https://patchwork.ozlabs.org/patch/430966/
It appears the discussion wrapped up on this, favorably. Is there
anything else I need to do to get this merged?
Regards,
PC
On 02/20/2015 11:18 PM, Paul E. McKenney wrote:
On Fri, Feb 20, 2015 at 11:13:33AM -0600, Paul Clarke wrote:
implement arch_irq_work_has_interrupt() for powerpc
On 2/20/2015 6:21 PM, Martin Hicks wrote:
This is properly defined in the md5 header file.
---
Signed-off-by tag is missing.
___
Linuxppc-dev mailing list
Linuxppc-dev@lists.ozlabs.org
https://lists.ozlabs.org/listinfo/linuxppc-dev
On 27/02/2015 02:05, Scott Wood wrote:
Obviously leaving it in a buggy state is not what we want -- but I lean
towards a short term fix of putting depends on !PREEMPT_RT on the
in-kernel MPIC emulation (which is itself just an optimization -- you
can still use KVM without it). This way
From: Shruti Kanetkar kanetkar.shr...@gmail.com
Signed-off-by: Andy Fleming aflem...@gmail.com
Signed-off-by: Shaohui Xie shaohui@freescale.com
Signed-off-by: Shruti Kanetkar kanetkar.shr...@gmail.com
Signed-off-by: Emil Medve emilian.me...@freescale.com
---
v5: Remove 'Change-Id'
v4:
On 2/20/2015 7:00 PM, Martin Hicks wrote:
The newer talitos hardware has support for AES in XTS mode.
Signed-off-by: Martin Hicks m...@bork.org
---
checkpatch complains about formatting, please check.
drivers/crypto/talitos.c | 33 +
From: Kumar Gala ga...@kernel.crashing.org
Signed-off-by: Kumar Gala ga...@kernel.crashing.org
Signed-off-by: Geoff Thorpe geoff.tho...@freescale.com
Signed-off-by: Hai-Ying Wang haiying.w...@freescale.com
Signed-off-by: Chunhe Lan chunhe@freescale.com
Signed-off-by: Poonam Aggrwal
From: Andy Fleming aflem...@gmail.com
Signed-off-by: Andy Fleming aflem...@gmail.com
Signed-off-by: Shaohui Xie shaohui@freescale.com
Signed-off-by: Shruti Kanetkar kanetkar.shr...@gmail.com
Signed-off-by: Emil Medve emilian.me...@freescale.com
---
v5: Remove 'Change-Id'
v4: Add
From: Kumar Gala ga...@kernel.crashing.org
Signed-off-by: Kumar Gala ga...@kernel.crashing.org
Signed-off-by: Geoff Thorpe geoff.tho...@freescale.com
Signed-off-by: Hai-Ying Wang haiying.w...@freescale.com
Signed-off-by: Chunhe Lan chunhe@freescale.com
Signed-off-by: Poonam Aggrwal
On Fri, 2015-02-27 at 09:28 +0200, Purcareata Bogdan wrote:
Ping?
What is the ping for ?
Ben.
On 18.02.2015 10:16, Bogdan Purcareata wrote:
Add the missing pieces in order to enable SECCOMP_FILTER on PowerPC
architectures, and enable this support.
Testing has been pursued using
Some of the kvm_hv exits are due to hcalls. So, this patch adds necessary
support to display the number of hcalls grouped according to their type
(H_IPI, H_CONFER, etc) with perf kvm stat report --event=syscall.
The patch defines the reasons in kvm_trace_symbol_hcall. It adds
perf kvm stat record/report which can be used to analyze KVM related statistics
isn't enabled on powerpc. This patchset enables perf kvm stat on powerpc.
The first patch enables perf kvm stat record and report to report kvm exits.
record enables recording of the tracepoints:
From: Srikar Dronamraju sri...@linux.vnet.ibm.com
perf kvm stat record/report isn't supported on powerpc.
This patch enables perf to record kvm events (kvm_hv:kvm_guest_entry and exit)
and to display the stats related to the events.
When perf kvm stat record -a is invoked, the kvm_hv related
Change 'Kenrel' to 'Kernel'
Signed-off-by: Yannick Guerrini yguerr...@tomshardware.fr
---
arch/powerpc/include/asm/smu.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/powerpc/include/asm/smu.h b/arch/powerpc/include/asm/smu.h
index 6e909f3..37d2da6 100644
---
Most architectures don't need to do anything special for the strict
seccomp syscall entries. Remove the redundant headers and reduce the
others.
Signed-off-by: Kees Cook keesc...@chromium.org
---
arch/arm/include/asm/seccomp.h | 12 +---
arch/microblaze/include/asm/seccomp.h |
On Fri, Jan 30, 2015 at 03:39:23PM +0100, Markus Stockhausen wrote:
This is the assembler code for SHA256 implementation with
the SIMD SPE instruction set. Although being only a 32 bit
architecture GPRs are extended to 64 bit presenting two
32 bit values. With the enhanced instruction set we
From: Yanjiang Jin yanjiang@windriver.com
kmem_cache_create()-kmem_cache_create_memcg()-kstrdup() allocates new space
and copy name's content, so it is safe to free name memory after
calling kmem_cache_create(). Else kmemleak would report the below warning:
unreferenced object
From: Thomas Falcon tlfal...@linux.vnet.ibm.com
Date: Wed, 25 Feb 2015 18:34:24 -0600
Add a function that will enable changing the MAC address
of an ibmveth interface while it is still running.
Signed-off-by: Thomas Falcon tlfal...@linux.vnet.ibm.com
---
drivers/net/ethernet/ibm/ibmveth.c
25 matches
Mail list logo