- 31 Oct, 2019 3 commits
-
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: ar71xx Runtime-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Petr Štetiar authored
New Docker based buildslaves install just bare minimum of packages, thus not having bsdmainutils package installed which provides `hexdump` utility, leading to the following build breakage on buildbots: ubinize-image.sh: 12: /builder/scripts/ubinize-image.sh: hexdump: not found So this patch simply replaces `hexdump` with `od` utility provided by coreutils package, which should be likely available. Co-authored-by:
Yousong Zhou <yszhou4tech@gmail.com> Signed-off-by:
Petr Štetiar <ynezz@true.cz> (cherry picked from commit c6d41c32)
-
- 30 Oct, 2019 5 commits
-
-
Yousong Zhou authored
The kconfig symbol is an invisible one since its introduction. It is not supposed to be enabled on its own. Resolves FS#1821 Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com> (cherry picked from commit 4bf9bec3)
-
Koen Vandeputte authored
Discovered during layerscape compile-testing Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Altered patches: - 804-crypto-support-layerscape.patch Compile-tested on: ar71xx Runtime-tested on: ar71xx Compiling target layerscape before this patch shows that it's broken. Fixing it is out-of-scope for bumping the kernel and will be done in a later patch. The altered patch is a sample change which leaves the target exactly as it was before this bump. Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Daniel F. Dickinson authored
Even with squashfs brcm2708 requires ROOTFS_PART_SIZE because the overlay exists as a loopback device on the space not used by squashfs in the root partition. Also for ext4 (the other fs option) ROOTFS_PART_SIZE is required, so use feature flag rootfs-part to enable it. Fixes FS#2166 Signed-off-by:
Daniel F. Dickinson <cshored@thecshore.com> (cherry picked from commit 3bb44f42 ) Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
- 24 Oct, 2019 3 commits
-
-
Yousong Zhou authored
Package content changed with the previous two cherry-picks dff0b210 kernel: netfilter: Add nf_tproxy_ipv{4,6} and nf_socket_ipv{4,6} a2fe698a kernel: Added required dependencies for socket match. Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
Oldřich Jedlička authored
This applies to kernel 4.10 and newer. See https://github.com/torvalds/linux/commit/8db4c5be88f62ffd7a552f70687a10c614dc697b The above commit added to kernel 4.10 added new dependency for building the NETFILTER_XT_MATCH_SOCKET (xt_socket.ko) module. The NF_SOCKET_IPVx options (both of them) need to be enabled in order to build the NETFILTER_XT_MATCH_SOCKET module. Without the change the module is not built. Signed-off-by:
Oldřich Jedlička <oldium.pro@gmail.com> (cherry picked from commit 66e875a0 ) (required for fixing FS#2531) Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
Hauke Mehrtens authored
The nf_socket.ko module was split in commit 8db4c5be88f ("netfilter: move socket lookup infrastructure to nf_socket_ipv{4,6}.c") into a common, n IPv4 and an IPv6 part. The nf_tproxy.ko module was split in commit 45ca4e0cf27 ("netfilter: Libify xt_TPROXY") into a common, an IPv4 and an IPv6 part. Signed-off-by:
Hauke Mehrtens <hauke@hauke-m.de> (cherry picked from commit 89806545 ) (required for fixing FS#2531) Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
- 19 Oct, 2019 3 commits
-
-
DENG Qingfang authored
Fixed CVEs: CVE-2017-16808 CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16301 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 CVE-2019-15167 Signed-off-by:
DENG Qingfang <dengqf6@mail2.sysu.edu.cn> (cherry picked from commit 394273c0)
-
DENG Qingfang authored
Fixed CVEs: CVE-2018-16301 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 Signed-off-by:
DENG Qingfang <dengqf6@mail2.sysu.edu.cn> (cherry picked from commit 44f11353)
-
Syrone Wong authored
001-Fix-compiler_state_t.ai-usage-when-INET6-is-not-defi.patch dropped due to upstream 002-Add-missing-compiler_state_t-parameter.patch dropped due to upstream 202-protocol_api.patch dropped due to implemented upstream by another way upstream commit: https://github.com/the-tcpdump-group/libpcap/commit/55c690f6f834b4762697d7a134de439c9096c921 and renamed via: https://github.com/the-tcpdump-group/libpcap/commit/697b1f7e9b1d6f5a5be04f821d7c5dc62458bb3b ead is the only user who use the protocol api, we have to use the new api since libpcap 1.9.0 Signed-off-by:
Syrone Wong <wong.syrone@gmail.com>
-
- 15 Oct, 2019 1 commit
-
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
- 08 Oct, 2019 4 commits
-
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: ar71xx Runtime-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx, imx6 Compile-tested on: cns3xxx, imx6 Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Altered patches: - 403-mtd_fix_cfi_cmdset_0002_status_check.patch Compile-tested on: ar71xx Compile-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
- 28 Sep, 2019 1 commit
-
-
Christian Lamparter authored
This patch removes a typo (extra "0") so that the 'cpu-alert6' step is triggered once the system reaches 85°C. Note: Unless the WNDR4700 is placed in an hot oven, the hardware-monitor will never reach this value. Signed-off-by:
Christian Lamparter <chunkeey@gmail.com>
-
- 26 Sep, 2019 1 commit
-
-
Rafał Miłecki authored
$(board_name) was providing content on "boardtype" (and optionally "boardnum") NVRAM values. That function requires & expects more specific and detailed model name extracted from the /proc/cpuinfo. Fixes: f12a3263 ("treewide: use the generic board_name function") Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
- 24 Sep, 2019 2 commits
-
-
Koen Vandeputte authored
Refreshed all patches. Fixes: - CVE-2019-14814 - CVE-2019-14815 - CVE-2019-14816 - CVE-2019-14821 Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Fixes: - CVE-2019-14814 - CVE-2019-14815 - CVE-2019-14816 - CVE-2019-14821 Compile-tested on: ar71xx Runtime-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
- 21 Sep, 2019 4 commits
-
-
Hauke Mehrtens authored
This fixes * CVE-2019-16275 AP mode PMF disconnection protection bypass https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt Signed-off-by:
Hauke Mehrtens <hauke@hauke-m.de> (cherry picked from commit a6981604)
-
Hauke Mehrtens authored
Fixes this security problem: * SAE/EAP-pwd side-channel attack update https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt Signed-off-by:
Hauke Mehrtens <hauke@hauke-m.de> (cherry picked from commit 7bed9bf1)
-
Magnus Kroken authored
Remove 300-bn_mul.h-Use-optimized-MULADDC-code-only-on-ARM-6.patch, the issue has been fixed upstream. Signed-off-by:
Magnus Kroken <mkroken@gmail.com> (cherry picked from commit 49d96ffc)
-
Josef Schlehofer authored
Signed-off-by:
Josef Schlehofer <josef.schlehofer@nic.cz> (cherry picked from commit a2f54f6d)
-
- 20 Sep, 2019 4 commits
-
-
Eneas U de Queiroz authored
This version fixes 3 low-severity vulnerabilities: - CVE-2019-1547: ECDSA remote timing attack - CVE-2019-1549: Fork Protection - CVE-2019-1563: Padding Oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey Patches were refreshed, and Eneas U de Queiroz added as maintainer. Signed-off-by:
Eneas U de Queiroz <cotequeiroz@gmail.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Fixes: - CVE-2019-15030 Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Fixes: - CVE-2019-15030 Compile-tested on: ar71xx Runtime-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
- 16 Sep, 2019 1 commit
-
-
Rafał Miłecki authored
This makes brcmfmac use the same wiphy after PCIe reset to help user space handle corner cases (e.g. firmware crash). Signed-off-by:
Rafał Miłecki <rafal@milecki.pl> (cherry picked from commit f39f4b2f)
-
- 13 Sep, 2019 4 commits
-
-
Koen Vandeputte authored
If both interrupts are set in the current implementation only the 1st will be handled and the 2nd will be skipped due to the "if else" condition. Fix this by using the same approach as done for QCA955x just below it. Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
If both interrupts are set in the current implementation only the 1st will be handled and the 2nd will be skipped due to the "if else" condition. Fix this by using the same approach as done for QCA955x just below it. Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: cns3xxx Runtime-tested on: cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: ar71xx Runtime-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
- 12 Sep, 2019 1 commit
-
-
Yousong Zhou authored
Including "sys/stat.h" from newer glibc will cause __u64 from linux uapi header to be included, causing compilation failure for u-boot tools USE_HOSTCC Remove typedef for __u64 in include/compiler.h to fix the issue. It should be safe because as of u-boot-2018.03, no ref to __u64 is found under u-boot tools/ directory Error message snippet follows HOSTCC tools/mkenvimage.o In file included from /usr/include/asm-generic/types.h:7, from /usr/include/asm/types.h:5, from /usr/include/linux/types.h:5, from /usr/include/linux/stat.h:5, from /usr/include/bits/statx.h:30, from /usr/include/sys/stat.h:446, from tools/mkenvimage.c:21: /usr/include/asm-generic/int-ll64.h:31:42: error: conflicting types for '__u64' 31 | __extension__ typedef unsigned long long __u64; | ^~~~~ In file included from <command-line>: ././include/compiler.h:69:18: note: previous declaration of '__u64' was here 69 | typedef uint64_t __u64; | ^~~~~ make[5]: *** [scripts/Makefile.host:116: tools/mkenvimage.o] Error 1 Ref: https://forum.openwrt.org/t/compile-error-19-07/44423 Ref: https://bugzilla.redhat.com/show_bug.cgi?id=1699194 Signed-off-by:
Yousong Zhou <yszhou4tech@gmail.com>
-
- 11 Sep, 2019 2 commits
-
-
Koen Vandeputte authored
Refreshed all patches. Remove upstreamed: - 0032-usb-host-fotg2-restart-hcd-after-port-reset.patch Compile-tested on: cns3xxx, imx6 Runtime-tested on: cns3xxx, imx6 Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Refreshed all patches. Compile-tested on: ar71xx Runtime-tested on: ar71xx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
- 09 Sep, 2019 1 commit
-
-
Adrian Schmutzler authored
In 555ca422 ("ramips: fix D-Link DIR-615 H1 switch port mapping"), port setup for dir-615-h1 was changed without removing the old one. This was working as the new one was triggered earlier than the old one. (In the meantine, changed sorting during ramips rename patches actually inversed that order.) Anyway, just remove the wrong case now. Signed-off-by:
Adrian Schmutzler <freifunk@adrianschmutzler.de> (cherry picked from commit e35e4a99)
-