Hauke Mehrtens [Thu, 3 Mar 2016 22:28:12 +0000 (22:28 +0000)]
CC: kernel: update kernel 3.18 to version 3.18.27
Changelog:
* https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.24
* https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.25
* https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.26
* https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.27
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
SVN-Revision: 48896
John Crispin [Thu, 3 Mar 2016 20:16:23 +0000 (20:16 +0000)]
ramips: EX2700: remove unused kernel modules
Remove the kmod-mt76 package from the EX2700 profile to free up
around 100 KiB of space on the root filesystem.
This patch applies to both trunk and Chaos Calmer.
Signed-off-by: Joseph C. Lehner <joseph.c.lehner@gmail.com>
SVN-Revision: 48887
Felix Fietkau [Wed, 2 Mar 2016 14:57:49 +0000 (14:57 +0000)]
mac80211: add a number of pending fixes
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48883
SVN-Revision: 48884
Felix Fietkau [Wed, 2 Mar 2016 13:06:57 +0000 (13:06 +0000)]
mac80211/hostapd: rework 802.11w driver support selection, do not hardcode drivers in hostapd makefile
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r46903
SVN-Revision: 48878
Jo-Philipp Wich [Wed, 2 Mar 2016 10:01:48 +0000 (10:01 +0000)]
CC: cyassl: disable Intel ASM for now
With ASM support enabled, CyaSSL fails to build on all x86 subtargets.
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
Backport of r48876
SVN-Revision: 48877
Jo-Philipp Wich [Wed, 2 Mar 2016 09:51:47 +0000 (09:51 +0000)]
curl: bump pkg revision
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
SVN-Revision: 48875
Hauke Mehrtens [Tue, 1 Mar 2016 22:50:29 +0000 (22:50 +0000)]
CC: cyassl: update to wolfssl version 3.8.0 to fix security problems
Backport of:
r46167: cyassl: version bump to 3.4.6
r46168: cyassl: update to wolfssl 3.6.0
r46551: cyassl: the upstream package in version 4.6.0 changed
r47791: cyassl: update to wolfSSL version 3.7.0
This version and version 3.6.8 are fixing the following security problems:
* CVE-2015-7744
* CVE-2015-6925
r48616: cyassl: update to wolfssl version 3.8.0
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
SVN-Revision: 48873
Hauke Mehrtens [Tue, 1 Mar 2016 22:42:51 +0000 (22:42 +0000)]
CC: curl: fix CVE-2016-0755
This fixes the following security problem:
CVE-2016-0755: NTLM credentials not-checked for proxy connection re-use
http://curl.haxx.se/docs/adv_20160127B.html
backport of r48614.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
SVN-Revision: 48872
Hauke Mehrtens [Tue, 1 Mar 2016 22:11:12 +0000 (22:11 +0000)]
CC: bcm53xx: make patches apply again
Commit r48849 changed the drivers/mtd/spi-nor/spi-nor.c file and broke
this patch in bcm53xx.
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
SVN-Revision: 48871
Felix Fietkau [Tue, 1 Mar 2016 21:32:22 +0000 (21:32 +0000)]
iw: update to version 4.3, sync with trunk r47782
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48870
Jo-Philipp Wich [Tue, 1 Mar 2016 15:18:24 +0000 (15:18 +0000)]
CC: openssl: update to 1.0.2g (8 CVEs)
CVE-2016-0704
s2_srvr.c overwrite the wrong bytes in the master-key when applying
Bleichenbacher protection for export cipher suites. This provides a
Bleichenbacher oracle, and could potentially allow more efficient variants of
the DROWN attack.
CVE-2016-0703
s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers.
If clear-key bytes are present for these ciphers, they *displace* encrypted-key
bytes. This leads to an efficient divide-and-conquer key recovery attack: if
an eavesdropper has intercepted an SSLv2 handshake, they can use the server as
an oracle to determine the SSLv2 master-key, using only 16 connections to the
server and negligible computation. More importantly, this leads to a more
efficient version of DROWN that is effective against non-export ciphersuites,
and requires no significant computation.
CVE-2016-0702
A side-channel attack was found which makes use of cache-bank conflicts on
the Intel Sandy-Bridge microarchitecture which could lead to the recovery of
RSA keys. The ability to exploit this issue is limited as it relies on an
attacker who has control of code in a thread running on the same hyper-
threaded core as the victim thread which is performing decryptions.
CVE-2016-0799
The internal |fmtstr| function used in processing a "%s" format string in
the BIO_*printf functions could overflow while calculating the length of a
string and cause an OOB read when printing very long strings. Additionally
the internal |doapr_outch| function can attempt to write to an OOB memory
location (at an offset from the NULL pointer) in the event of a memory
allocation failure. In 1.0.2 and below this could be caused where the size
of a buffer to be allocated is greater than INT_MAX. E.g. this could be in
processing a very long "%s" format string. Memory leaks can also occur.
The first issue may mask the second issue dependent on compiler behaviour.
These problems could enable attacks where large amounts of untrusted data is
passed to the BIO_*printf functions. If applications use these functions in
this way then they could be vulnerable. OpenSSL itself uses these functions
when printing out human-readable dumps of ASN.1 data. Therefore applications
that print this data could be vulnerable if the data is from untrusted sources.
OpenSSL command line applications could also be vulnerable where they print out
ASN.1 data, or if untrusted data is passed as command line arguments. Libssl is
not considered directly vulnerable. Additionally certificates etc received via
remote connections via libssl are also unlikely to be able to trigger these
issues because of message size limits enforced within libssl.
CVE-2016-0797
In the BN_hex2bn function the number of hex digits is calculated using an int
value |i|. Later |bn_expand| is called with a value of |i * 4|. For large
values of |i| this can result in |bn_expand| not allocating any memory because
|i * 4| is negative. This can leave the internal BIGNUM data field as NULL
leading to a subsequent NULL ptr deref. For very large values of |i|, the
calculation |i * 4| could be a positive value smaller than |i|. In this case
memory is allocated to the internal BIGNUM data field, but it is insufficiently
sized leading to heap corruption. A similar issue exists in BN_dec2bn. This
could have security consequences if BN_hex2bn/BN_dec2bn is ever called by user
applications with very large untrusted hex/dec data. This is anticipated to be
a rare occurrence. All OpenSSL internal usage of these functions use data that
is not expected to be untrusted, e.g. config file data or application command
line arguments. If user developed applications generate config file data based
on untrusted data then it is possible that this could also lead to security
consequences. This is also anticipated to be rare.
CVE-2016-0798
The SRP user database lookup method SRP_VBASE_get_by_user had confusing memory
management semantics; the returned pointer was sometimes newly allocated, and
sometimes owned by the callee. The calling code has no way of distinguishing
these two cases. Specifically, SRP servers that configure a secret seed to hide
valid login information are vulnerable to a memory leak: an attacker connecting
with an invalid username can cause a memory leak of around 300 bytes per
connection. Servers that do not configure SRP, or configure SRP but do not
configure a seed are not vulnerable. In Apache, the seed directive is known as
SSLSRPUnknownUserSeed. To mitigate the memory leak, the seed handling in
SRP_VBASE_get_by_user is now disabled even if the user has configured a seed.
Applications are advised to migrate to SRP_VBASE_get1_by_user. However, note
that OpenSSL makes no strong guarantees about the indistinguishability of valid
and invalid logins. In particular, computations are currently not carried out
in constant time.
CVE-2016-0705
A double free bug was discovered when OpenSSL parses malformed DSA private keys
and could lead to a DoS attack or memory corruption for applications that
receive DSA private keys from untrusted sources. This scenario is considered
rare.
CVE-2016-0800
A cross-protocol attack was discovered that could lead to decryption of TLS
sessions by using a server supporting SSLv2 and EXPORT cipher suites as a
Bleichenbacher RSA padding oracle. Note that traffic between clients and non-
vulnerable servers can be decrypted provided another server supporting SSLv2
and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP)
shares the RSA keys of the non-vulnerable server. This vulnerability is known
as DROWN (CVE-2016-0800). Recovering one session key requires the attacker to
perform approximately 2^50 computation, as well as thousands of connections to
the affected server. A more efficient variant of the DROWN attack exists
against unpatched OpenSSL servers using versions that predate 1.0.2a, 1.0.1m,
1.0.0r and 0.9.8zf released on 19/Mar/2015 (see CVE-2016-0703 below). Users can
avoid this issue by disabling the SSLv2 protocol in all their SSL/TLS servers,
if they've not done so already. Disabling all SSLv2 ciphers is also sufficient,
provided the patches for CVE-2015-3197 (fixed in OpenSSL 1.0.1r and 1.0.2f)
have been deployed. Servers that have not disabled the SSLv2 protocol, and are
not patched for CVE-2015-3197 are vulnerable to DROWN even if all SSLv2
ciphers are nominally disabled, because malicious clients can force the use of
SSLv2 with EXPORT ciphers. OpenSSL 1.0.2g and 1.0.1s deploy the following
mitigation against DROWN: SSLv2 is now by default disabled at build-time.
Builds that are not configured with "enable-ssl2" will not support SSLv2.
Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the
version-flexible SSLv23_method() will need to explicitly call either of:
SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2); or SSL_clear_options(ssl,
SSL_OP_NO_SSLv2); as appropriate. Even if either of those is used, or the
application explicitly uses the version-specific SSLv2_method() or its client
or server variants, SSLv2 ciphers vulnerable to exhaustive search key recovery
have been removed. Specifically, the SSLv2 40-bit EXPORT ciphers, and SSLv2
56-bit DES are no longer available. In addition, weak ciphers in SSLv3 and up
are now disabled in default builds of OpenSSL. Builds that are not configured
with "enable-weak-ssl-ciphers" will not provide any "EXPORT" or "LOW" strength
ciphers.
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
Backport of r48868.
SVN-Revision: 48869
John Crispin [Tue, 1 Mar 2016 08:53:27 +0000 (08:53 +0000)]
CC: toolchain: use latest glibc 2.21 revision
Fixes "CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer
overflow"
Signed-off-by: Michael Marley <michael@michaelmarley.com>
SVN-Revision: 48864
John Crispin [Tue, 1 Mar 2016 08:15:04 +0000 (08:15 +0000)]
kernel: add Realtek USB to Ethernet modules
https://forum.openwrt.org/viewtopic.php?pid=279394
Signed-off-by: Dirk Neukirchen <dirkneukirchen@web.de>
Backport of r46031
SVN-Revision: 48863
John Crispin [Tue, 1 Mar 2016 08:15:04 +0000 (08:15 +0000)]
base-files: add /etc/profile.d support
OpenWrt should support an optional /etc/profile.d directory like
most other Linux distributions. This allows packages to install
their own scripts into /etc/profile.d/ directory.
The file suffix should make clear, that these scripts
are (sourced) shell-snippets. If the user needs e.g. php or lua,
one must make sure that the interpreter is called.
The reverse failsafe test makes sure, that the effective returncode is 0.
A typcal usecase is the inclusion of private helpers,
special variables or aliases, which at the moment needs
patching the sourcecode and is not well maintainable.
Now the builder can simply add there files.
v1 initial work of Hendrik Lüth <hendrik@linux-nerds.de>
v2 changes regarding RFC (e.g. thomas.langer@lantiq.com)
v3 changes regarding RFC (e.g. mschiffer@universe-factory.net)
v4 keep it simple and mimic OpenWrt style
Signed-off-by: Bastian Bittorf <bittorf@bluebottle.com>
Backport of r46965
SVN-Revision: 48862
John Crispin [Tue, 1 Mar 2016 08:15:03 +0000 (08:15 +0000)]
x86/generic: enable pata_atiixp driver
This enables booting from devices that use an ATI PATA controller for
the boot device, such as the embedded CF cards in Fujitsu-Siemens Futro
thin-clients.
Signed-off-by: Felix Kaechele <heffer@fedoraproject.org>
Backport of r47304
SVN-Revision: 48861
John Crispin [Tue, 1 Mar 2016 08:15:02 +0000 (08:15 +0000)]
ar71xx: add support for TP-LINK TL-WR941ND v6 (international version)
The international version is completely different from the already
supported Chinese version. The WLAN of the QCA956x SoC used by this router
has been fixed in r46948.
This patch looks like it changes a lot in
700-MIPS-ath79-openwrt-machines.patch; that is not the case. Unfortunately,
quilt decided to completely reorganize the Kconfig patch even though only
a single section has been added.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r47420
SVN-Revision: 48860
John Crispin [Tue, 1 Mar 2016 08:14:59 +0000 (08:14 +0000)]
ar71xx: rename firmware for Chinese version of TL-WR941ND v6
It seems there are two *different* versions on TL-WR941ND v6: Chinese
and European one. Currently supported by OpenWrt is Chinese one. Rename
firmware to make it clear.
For details see:
http://wiki.openwrt.org/toh/tp-link/tl-wr941nd
https://forum.openwrt.org/viewtopic.php?id=59295
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r47107
SVN-Revision: 48859
John Crispin [Tue, 1 Mar 2016 08:14:59 +0000 (08:14 +0000)]
mac80211: set mcast-rate for mesh point interfaces
In order to set the multicast rate for mesh point interfaces the "mesh join"
was made explicit and moved to mac80211_setup_vif(), similar to how it is
done for IBSS interfaces.
Previously, the mesh join was made implicit in case authentication (i.e.
$key) was not used when creating the interface in mac80211_prepare_vif(),
while using authentication would create the interface first, then join
later in mac80211_setup_vif() by starting authsae.
Signed-off-by: Nils Schneider <nils@nilsschneider.net>
Backport of r47408
SVN-Revision: 48858
John Crispin [Tue, 1 Mar 2016 08:14:58 +0000 (08:14 +0000)]
ar71xx: compex wpj531 register usb support
Signed-off-by: Christian Mehlis <christian@m3hlis.de>
Backport of r46283
SVN-Revision: 48857
John Crispin [Tue, 1 Mar 2016 08:14:57 +0000 (08:14 +0000)]
ar71xx: compex wpj531 fix setting mac address on ethernet
Signed-off-by: Christian Mehlis <christian@m3hlis.de>
Backport of r46282
SVN-Revision: 48856
John Crispin [Tue, 1 Mar 2016 08:14:56 +0000 (08:14 +0000)]
ar71xx: compex wpj531 fix ethernet registration
In
fb6f62e97733312053ab593fcf68eea47a21169e several settings
are set on the ethernet device, but they are not working.
Fix Ethernet by setting the right values.
Signed-off-by: Christian Mehlis <christian@m3hlis.de>
Backport of r46281
SVN-Revision: 48855
John Crispin [Tue, 1 Mar 2016 08:14:55 +0000 (08:14 +0000)]
ar71xx: rework patch for qca953x/956x
Patch cherry-picked from the following location:
https://www.codeaurora.org/cgit/quic/qsdk/oss/system/openwrt/commit/?h=release/coconut_ioe4531_2.0&id=
5c357bf6c763e4140dddcc9a3bc5f005525a9c0e
Changelist,
- add more register defines
- add EHCI support
- fix GPIO pin count to 18
- fix chained irq disabled
- fix GMAC0/GMAC1 initial
- fix WMAC irq number to 47
- merge the changes of dev-eth.c from the patch to file.
Signed-off-by: Miaoqing Pan <miaoqing@codeaurora.org>
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46207
SVN-Revision: 48854
John Crispin [Tue, 1 Mar 2016 08:14:53 +0000 (08:14 +0000)]
ar71xx: fix ethernet initialization on QCA953x-based boards (TP-Link TL-WR841N/ND v9, Compex WPJ531)
The initialization routines for these boards were relying on some (wrong)
defaults for the QCA953x ethernet. Make these defaults explicit to prevent
breaking them when the QCA953x defaults are fixed.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46206
SVN-Revision: 48853
John Crispin [Tue, 1 Mar 2016 08:14:52 +0000 (08:14 +0000)]
ar71xx/lzma-loader: fix O32 ABI conformance
According to the calling convention of the o32 ABI the caller
function must reserve stack space for $a0-$a3 registers in case
the callee needs to save its arguments.
The assembly code of the loader does not reserve stack space for
these registers thus when the 'loader_main' function needs to save
its arguments, those will be stored in the 'workspace' area instead
of the stack.
Because the workspace area is also used by other part of the code, the
saved register values gets overwritten and this often leads to failed
kernel boots.
Fix the code to reserve stack space for the registers to avoid this
error.
Signed-off-by: Gabor Juhos <juhosg@openwrt.org>
Backport of r48279
SVN-Revision: 48852
John Crispin [Tue, 1 Mar 2016 08:14:51 +0000 (08:14 +0000)]
kernel/gpio_keys: load module on pre-init
fix rescue mode on wdr4900
Signed-off-by: Alexander Couzens <lynxis@fe80.eu>
Backport of r48793
SVN-Revision: 48851
John Crispin [Tue, 1 Mar 2016 08:14:50 +0000 (08:14 +0000)]
brcm2708-gpu-fw: move pkg build dir to kernel build dir to fix rebuild bugs after cleaning the kernel tree
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48732
SVN-Revision: 48850
John Crispin [Tue, 1 Mar 2016 08:14:49 +0000 (08:14 +0000)]
kernel: disable software protection bits for macronix flash chips at init
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport r47626
SVN-Revision: 48849
John Crispin [Tue, 1 Mar 2016 08:14:48 +0000 (08:14 +0000)]
firmware-utils: mkfwimage: fix firmware_max_length for XM layout
The new u-boot version bundled with the 5.6.x firmwares from Ubiquiti gets
confused by the smaller rootfs partition size; this can lead to various
issues:
1. We've gotten reports that flashing from the 5.6.x stock firmware to
OpenWrt will brick devices; I wasn't able to reproduce this myself
2. Flashing from 5.5.x stock firmware to OpenWrt and back to stock (via
TFTP recovery), following by an update to 5.6.x via web interface can
yield a bricked device with the following properties:
- It can't be booted without entering commands over a serial console, as
u-boot supplies the wrong MTD layout
- The web interface won't accept any image with the original flash
layout, so stock firmware upgrades are impossible
- As the TFTP recovery doesn't update u-boot, returning to the old
u-boot from firmware 5.5.x is impossible
To recover from 2., creating an OpenWrt image which doesn't set u-boot as
read-only and flashing a backup of the old u-boot from there is the only
way known to me. (Fixing the mtdparts variable in u-boot-env from OpenWrt
might also work; settings this from u-boot over serial didn't have
any permanent effect.)
Fix all of this by setting the correct flash layout also used by the stock
firmware. Flashing has been tested from both firmware 5.5.x and 5.6.x. The
fixed layout also matches the mtdparts defined by OpenWrt.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r48829
SVN-Revision: 48848
John Crispin [Tue, 1 Mar 2016 08:14:47 +0000 (08:14 +0000)]
ar71xx, firmware-utils: split ubdev01 flash layout from XM
The ubdev01 profile defines its own MTDPARTS with smaller firmware
partition, so give it its own UBNT_BOARD in mkfwimage.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r48828
SVN-Revision: 48847
John Crispin [Tue, 1 Mar 2016 08:14:47 +0000 (08:14 +0000)]
firmware-utils: mkfwimage: add -Wall, fix obvious bugs causing compile warnings
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r48827
SVN-Revision: 48846
John Crispin [Tue, 1 Mar 2016 08:14:46 +0000 (08:14 +0000)]
OpenSSL: Added source/old to PKG_SOURCE_URL
OpenSSL moves old versions of the library from
http://www.openssl.org/source/ to
http://www.openssl.org/source/old/$version/ breaking the old links.
That behavior breaks the OpenWRT-build every time OpenSSL releases
a new version.
This patch adds http://www.openssl.org/source/old/$version/ to the
PKG_SOURCE_URL of OpenSSL to avoid breaking the build whenever
OpenSSL releases a new version.
Signed-off-by: Kevin Kirsch <ranlvor@starletp9.de>
Reviewed-by: Alexander Dahl <post@lespocky.de>
Backport of r47860
SVN-Revision: 48845
John Crispin [Tue, 1 Mar 2016 08:14:45 +0000 (08:14 +0000)]
ar71xx: fix AR71XX_MODEL on TP-Link TL-WR703N
The hwid check was wrong, causing the AR71XX_MODEL value to end with a
space (as $hwver was unset).
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r47553
SVN-Revision: 48844
John Crispin [Tue, 1 Mar 2016 08:14:44 +0000 (08:14 +0000)]
ar71xx: add support for the TP-LINK TL-WR1043ND v3
The hardware of the v3 is identical to the v2.
Based-on-patch-by: Andreas Ziegler <github@andreas-ziegler.de>
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r47406
SVN-Revision: 48843
John Crispin [Tue, 1 Mar 2016 08:14:43 +0000 (08:14 +0000)]
tools/firmware-utils: tplink-safeloader: add version 1.1 support to CPE210/220/510/520
The hardware is identical to version 1.0, add the new models to the support
list.
Also remove the empty line at the end of the support list, the current
stock images don't have it either.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r47212
SVN-Revision: 48842
John Crispin [Tue, 1 Mar 2016 08:14:43 +0000 (08:14 +0000)]
tools/firmware-utils: tplink-safeloader: fix support-list format, clean up vendor information
The first 4 bytes of the support list and the vendor information are
supposed to contain the length of these fields.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r47211
SVN-Revision: 48841
John Crispin [Tue, 1 Mar 2016 08:14:42 +0000 (08:14 +0000)]
tools/firmware-utils: tplink-safeloader: clean up code
There is no reason for the internal functions not to be static.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r47210
SVN-Revision: 48840
John Crispin [Tue, 1 Mar 2016 08:14:41 +0000 (08:14 +0000)]
odhcp6c: minor fixes
Better synchronize RA & DHCPv6 events
Accumulate some events to avoid flooding
Restart softwires for address and prefix changes
Signed-off-by: Steven Barth <steven@midlink.org>
Backport of r46518
SVN-Revision: 48839
John Crispin [Tue, 1 Mar 2016 08:14:40 +0000 (08:14 +0000)]
base-files: default_postinst: propagate the real postinst return code
Using the postinst script for sanity checks and expecting opkg to fail
if the postinst didn't return 0 was possible in Barrier Breaker, propagate
the real postinst return code through default_postinst to restore this
behaviour.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46653
SVN-Revision: 48838
John Crispin [Tue, 1 Mar 2016 08:14:39 +0000 (08:14 +0000)]
odhcp6c: add option "sourcefilter" to disable source filter
Signed-off-by: Steven Barth <steven@midlink.org>
Backport of r46408
SVN-Revision: 48837
John Crispin [Tue, 1 Mar 2016 08:14:38 +0000 (08:14 +0000)]
sunxi: respect CONFIG_TARGET_IMAGES_GZIP
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46608
SVN-Revision: 48836
John Crispin [Tue, 1 Mar 2016 08:14:37 +0000 (08:14 +0000)]
sunxi: fix uboot install location
Install uboot files to KERNEL_BUILD_DIR instead of BIN_DIR to fix
ImageBuilder. Similar fixes are necessary for many (all?) other uboot
targets.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46605
SVN-Revision: 48835
John Crispin [Tue, 1 Mar 2016 08:14:36 +0000 (08:14 +0000)]
sunxi: don't copy DTS files to BIN_DIR
The DTS files aren't useful (other targets don't copy them either) and
clutter BIN_DIR with files unrelated to the chosen profile.
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46604
SVN-Revision: 48834
John Crispin [Tue, 1 Mar 2016 08:14:35 +0000 (08:14 +0000)]
ar71xx: add support for TL-WR741ND v5
This device is identical to the TL-WR740N v5, it even uses the same HWID (which
wasn't the case for older TL-WR741ND revisions).
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
Backport of r46238
SVN-Revision: 48833
John Crispin [Tue, 1 Mar 2016 08:14:35 +0000 (08:14 +0000)]
ar71xx: add support for tp-link wr740n v5.0 (EU)
TP-Link ships wr740n v5.0 to Romania (so probably everywhere except
China) with 4 MB flash and 32 MB memory (confirmed by their local
support). This patch adds support for the v5.0 clone of v4, i just
tested it on my own v5.0 router and it works.
Signed-off-by: Daniel Petre <daniel.petre@posteo.net>
Backport of r46115
SVN-Revision: 48832
John Crispin [Tue, 1 Mar 2016 08:14:34 +0000 (08:14 +0000)]
kernel: take bcm47xx_nvram.h from kernel and not backports
compat-wireless/backports now contains a bcm47xx_nvram.h file to
backport some of the functions in it which are used by the bcmfmac
driver. This file just checks for the kernel versions and provide an
empty implementations on older kernel versions. This is OK on most
systems, but on bcm47xx / bcm53xx systems we want to call the real
functions here. This commit removes the file from backports in our
build process like we do it with the bcma and ssb header files. Instead
we add a recent version into our kernel so all code uses only one
header file. On bcm47xx / bcm53xx the real implementations of this code
will be used.
Reported-by: Hante Meuleman <meuleman@broadcom.com>
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
[Backport of r47467. The recent mac80211 backport was missing this patch,
breaking the build of the brcmfmac module]
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
SVN-Revision: 48831
Felix Fietkau [Mon, 29 Feb 2016 20:02:36 +0000 (20:02 +0000)]
ar71xx: backport ath10k firmware loading from trunk (as of r48711)
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48825
Felix Fietkau [Mon, 29 Feb 2016 20:02:35 +0000 (20:02 +0000)]
build: download.mk: bugfix download.pl argument call order
Change wrong download.pl argument call order.
See download.pl argument list.
Signed-off-by: Florian Eckert <Eckert.Florian@googlemail.com>
Backport of r48427
SVN-Revision: 48824
Felix Fietkau [Mon, 29 Feb 2016 20:02:34 +0000 (20:02 +0000)]
build: add support for choosing a different url filename part than the output file
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r47591
SVN-Revision: 48823
Felix Fietkau [Mon, 29 Feb 2016 17:19:04 +0000 (17:19 +0000)]
mac80211: backport from trunk r48782 + required kernel patches and mt76, mwlwifi
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48822
Felix Fietkau [Mon, 29 Feb 2016 17:18:57 +0000 (17:18 +0000)]
ath10k-firmware: remove dependency on kmod-ath10k so that it can be selected instead
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48821
Felix Fietkau [Mon, 29 Feb 2016 17:18:56 +0000 (17:18 +0000)]
b43legacy-firmware: add from r48184
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48820
Felix Fietkau [Mon, 29 Feb 2016 17:18:55 +0000 (17:18 +0000)]
ath10k-firmware: add from trunk r47984
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48819
Felix Fietkau [Mon, 29 Feb 2016 17:18:54 +0000 (17:18 +0000)]
linux-firmware: sync with trunk r48750
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48818
Felix Fietkau [Mon, 29 Feb 2016 16:06:20 +0000 (16:06 +0000)]
build: do not deselect CONFIG_USE_SSTRIP if CONFIG_DEBUG is enabled
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48504
SVN-Revision: 48817
Felix Fietkau [Mon, 29 Feb 2016 16:06:19 +0000 (16:06 +0000)]
scripts/config: fix handling of CONFDEFAULT on oldconfig
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r47372
SVN-Revision: 48816
Felix Fietkau [Mon, 29 Feb 2016 15:53:25 +0000 (15:53 +0000)]
ar71xx: reset ethernet tx ring on fast reset to prevent packet loss / irq issues
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48753
SVN-Revision: 48815
John Crispin [Fri, 26 Feb 2016 07:46:18 +0000 (07:46 +0000)]
ramips: Backport support for Netgear EX2700
This patch adds support for the Netgear EX2700 in Chaos Calmer and
builds approriate -sysupgrade and -factory images.
Signed-off-by: Joseph C. Lehner <joseph.c.lehner@gmail.com>
SVN-Revision: 48792
John Crispin [Fri, 26 Feb 2016 07:46:14 +0000 (07:46 +0000)]
brcm2708: Fix sysupgrade support for Raspberry Pi
Backport patch for implementing sysupgrade support on brcm2708 target was
incomplete, since it was missing the default packages (r47604).
Add those packages in order to fully support sysupgrade.
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
SVN-Revision: 48791
Rafał Miłecki [Fri, 26 Feb 2016 07:10:16 +0000 (07:10 +0000)]
kernel: support bgmac on BCM47094
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48564 and r48756
SVN-Revision: 48790
Rafał Miłecki [Fri, 26 Feb 2016 07:10:09 +0000 (07:10 +0000)]
kernel: backport trivial bcma patches from 4.6 for BCM47094
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
SVN-Revision: 48789
Rafał Miłecki [Fri, 26 Feb 2016 07:09:57 +0000 (07:09 +0000)]
kernel: backport bcma init patch from 4.5
This simply replaces init fix with a final version and puts it in a
generic dir. This will allow backporting some trivial changes from 4.6.
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
SVN-Revision: 48788
John Crispin [Fri, 19 Feb 2016 16:39:12 +0000 (16:39 +0000)]
ralink: fix mt7628 ehci support
the u2_phy init was missing
Backport of r48747
Signed-off-by: John Crispin <blogic@openwrt.org>
SVN-Revision: 48749
John Crispin [Fri, 19 Feb 2016 16:39:06 +0000 (16:39 +0000)]
ralink: fix alsa mic in support
Signed-off-by: John Crispin <blogic@openwrt.org>
SVN-Revision: 48748
Luka Perkov [Wed, 17 Feb 2016 17:51:46 +0000 (17:51 +0000)]
mvebu: add SolidRun ClearFog A1 support
Signed-off-by: Andrej Vlasic <andrej.vlasic@sartura.hr>
SVN-Revision: 48737
John Crispin [Mon, 8 Feb 2016 09:22:12 +0000 (09:22 +0000)]
malta: add harddisk support
Is it possible to backport commit r46269 (
3c298f89-4303-0410-b956-
a3cf2f4a3e73) to CC 15.05 in order to provide harddisk support.
Backporting tested (info available at: https://forum.openwrt.org/viewtopic.php?id=62389).
Thnx in advance!
Here is the original patch from trunk:
>From
76bfcd46bd55263947461e40bd02047922755c72 Mon Sep 17 00:00:00 2001
From: blogic <blogic@
3c298f89-4303-0410-b956-
a3cf2f4a3e73>
Date: Wed, 8 Jul 2015 14:25:36 +0000
Subject: [PATCH] malta: add harddisk support
works with:
qemu-system-mipsel -M malta \
-hda openwrt-malta-le-root.ext4 \
-kernel openwrt-malta-le-vmlinux.elf \
-nographic -append "root=/dev/sda console=ttyS0"
Signed-off-by: Dirk Neukirchen <dirkneukirchen@web.de>
SVN-Revision: 48666
Rafał Miłecki [Fri, 5 Feb 2016 13:41:24 +0000 (13:41 +0000)]
bcm53xx: add Netgear R8500 GPIOs
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48633
SVN-Revision: 48634
Rafał Miłecki [Thu, 4 Feb 2016 09:23:48 +0000 (09:23 +0000)]
bcm53xx: start working on Netgear R8500
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48625
SVN-Revision: 48629
Rafał Miłecki [Thu, 4 Feb 2016 09:23:18 +0000 (09:23 +0000)]
bcm53xx: support Netgear R8500 in sysupgrade
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48572
SVN-Revision: 48628
Rafał Miłecki [Thu, 4 Feb 2016 09:23:05 +0000 (09:23 +0000)]
bcm53xx: use proper CPU port in b53 for Netgear R8500
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48571
SVN-Revision: 48627
Felix Fietkau [Thu, 28 Jan 2016 18:26:18 +0000 (18:26 +0000)]
openssl: update to 1.0.2f (fixes CVE-2016-0701, CVE-2015-3197)
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48531
SVN-Revision: 48532
John Crispin [Thu, 21 Jan 2016 14:17:54 +0000 (14:17 +0000)]
ramips: HiLink HLK-RM04 image name typo (RM02 -> RM04)
The image name for the HiLink HLK-RM04 module has a typo and should read "RM04" rather than "RM02"
Backport of r48355
Signed-off-by: John Clark <inindev@gmail.com>
SVN-Revision: 48430
Felix Fietkau [Wed, 20 Jan 2016 20:27:08 +0000 (20:27 +0000)]
kernel: fix module load issue in the dma-buf debloat patch
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48409
SVN-Revision: 48411
Rafał Miłecki [Wed, 20 Jan 2016 19:32:04 +0000 (19:32 +0000)]
mac80211: fix brcmfmac picking wrong channel when using 80 MHz
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
SVN-Revision: 48404
Felix Fietkau [Wed, 20 Jan 2016 10:32:18 +0000 (10:32 +0000)]
kernel: modularize dma shared buffer code to eliminate kernel bloat
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48371
SVN-Revision: 48392
Felix Fietkau [Tue, 19 Jan 2016 21:09:59 +0000 (21:09 +0000)]
kernel: fix keyring reference leak (CVE-2016-0728)
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48372
SVN-Revision: 48373
Felix Fietkau [Tue, 19 Jan 2016 15:15:11 +0000 (15:15 +0000)]
kernel: disable AFS support by default
This pulls in CONFIG_KEYS, which bloats up the kernel size and is thus
very undesirable. It also currently exposes the kernel to a local root
vulnerability
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48364
SVN-Revision: 48365
Felix Fietkau [Fri, 15 Jan 2016 12:59:30 +0000 (12:59 +0000)]
ar71xx: fix ethernet MAC reset on DMA hang
Fully reset the chip like on a full up/down, but without the PHY
statemachine restart.
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48228
SVN-Revision: 48246
Felix Fietkau [Fri, 15 Jan 2016 12:59:26 +0000 (12:59 +0000)]
ar71xx: extend ethernet DMA stuck check to all ar724x (and newer) chips
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48227
SVN-Revision: 48245
Jo-Philipp Wich [Thu, 14 Jan 2016 14:27:23 +0000 (14:27 +0000)]
CC: base-files: use the correct path in case of modified preinit options
If the user sets any preinit options in .config, the wrong path may get
applied due to wrong default value in image-config.in and due to Makefile
writing also the unchanged options into 00_preinit.conf
Modify the default path in image-config.in to match the current default
path set by r47080. Also modify the fall-back default in Makefile.
Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
Backport of r47590
SVN-Revision: 48238
Jo-Philipp Wich [Thu, 14 Jan 2016 14:27:20 +0000 (14:27 +0000)]
CC: base-files: sanitize and unify $PATH
Previously init and hotplug paths were different from console.
Signed-off-by: Steven Barth <steven@midlink.org>
Backport of r47080
SVN-Revision: 48237
Jo-Philipp Wich [Thu, 14 Jan 2016 13:06:36 +0000 (13:06 +0000)]
CC: procd: align early init PATH with rest of OpenWrt
Backport upstream Git commit
45cb04fd85d788a37367a5385e5e90dd98a0a991 to CC.
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
SVN-Revision: 48236
Imre Kaloz [Tue, 12 Jan 2016 14:29:19 +0000 (14:29 +0000)]
mac80211: resync regulatory db with master-2015-12-14
backport of [48219]
Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
SVN-Revision: 48220
Jo-Philipp Wich [Tue, 12 Jan 2016 09:27:30 +0000 (09:27 +0000)]
CC: sdk: add base repository fallback
When the build system cannot infer its own repository url then let it fall
back to http://git.openwrt.org/ for the base feed.
The path to openwrt.git is guessed from the VERSION_NUMBER variable:
"unknown" or "r12345" -> http://git.openwrt.org/openwrt.git
"15.05.1" -> http://git.openwrt.org/15.05/openwrt.git
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
Backport of r48212
SVN-Revision: 48213
Jo-Philipp Wich [Tue, 12 Jan 2016 07:54:25 +0000 (07:54 +0000)]
CC: gettext-full: make autopoint and gettextize reloctable
The autopoint and gettextize host utilities contain hardcoded staging dir
paths which need to be overridden for the SDK environment.
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
Backport of r48208
SVN-Revision: 48211
Jo-Philipp Wich [Tue, 12 Jan 2016 07:54:22 +0000 (07:54 +0000)]
CC: gettext-full: activate format-security checks
This patch was taken from upstream libcroco
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Backport of r47585
SVN-Revision: 48210
Jo-Philipp Wich [Tue, 12 Jan 2016 07:54:18 +0000 (07:54 +0000)]
CC: gettext-full: update to version 0.19.6
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
Backport of r47584
SVN-Revision: 48209
Rafał Miłecki [Mon, 11 Jan 2016 22:08:35 +0000 (22:08 +0000)]
hostapd: fix disassociation with FullMAC drivers and multi-BSS
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48202
SVN-Revision: 48205
Jo-Philipp Wich [Mon, 11 Jan 2016 08:43:50 +0000 (08:43 +0000)]
CC: build: add a variable pointing to the main openwrt git repositories (useful if we want to support using a mirror later)
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48117
SVN-Revision: 48197
Felix Fietkau [Sun, 10 Jan 2016 18:04:56 +0000 (18:04 +0000)]
fstools: fix off-by-one error in the version number
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r48193
SVN-Revision: 48194
Felix Fietkau [Sun, 10 Jan 2016 17:37:20 +0000 (17:37 +0000)]
fstools: sync with trunk r48191
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
SVN-Revision: 48192
Felix Fietkau [Sun, 10 Jan 2016 17:04:09 +0000 (17:04 +0000)]
hostapd: fix post v2.4 security issues
- WPS: Fix HTTP chunked transfer encoding parser (CVE-2015-4141)
- EAP-pwd peer: Fix payload length validation for Commit and Confirm
(CVE-2015-4143)
- EAP-pwd server: Fix payload length validation for Commit and Confirm
(CVE-2015-4143)
- EAP-pwd peer: Fix Total-Length parsing for fragment reassembly
(CVE-2015-4144, CVE-2015-4145)
- EAP-pwd server: Fix Total-Length parsing for fragment reassembly
(CVE-2015-4144, CVE-2015-4145)
- EAP-pwd peer: Fix asymmetric fragmentation behavior (CVE-2015-4146)
- NFC: Fix payload length validation in NDEF record parser (CVE-2015-8041)
- WNM: Ignore Key Data in WNM Sleep Mode Response frame if no PMF in use
(CVE-2015-5310)
- EAP-pwd peer: Fix last fragment length validation (CVE-2015-5315)
- EAP-pwd server: Fix last fragment length validation (CVE-2015-5314)
- EAP-pwd peer: Fix error path for unexpected Confirm message (CVE-2015-5316)
Signed-off-by: Stefan Lippers-Hollmann <s.l-h@gmx.de>
Backport of r48185
SVN-Revision: 48186
Rafał Miłecki [Sun, 10 Jan 2016 01:30:13 +0000 (01:30 +0000)]
mac80211: brcmfmac: add beamforming support
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
SVN-Revision: 48168
Rafał Miłecki [Sun, 10 Jan 2016 00:19:16 +0000 (00:19 +0000)]
mac80211: brcmfmac: support dumping stations
It allows user-space fetch associated STAs and e.g. iwinfo/luci display
them.
SVN-Revision: 48167
Rafał Miłecki [Sun, 10 Jan 2016 00:19:09 +0000 (00:19 +0000)]
mac80211: brcmfmac: fix getting/setting TX power
This patches also adds BCM4366 support which may be found on some new
routers based on BCM47094 or BCM4709C0. Unfortunately firmware is still
missing for this chipset.
SVN-Revision: 48166
Rafał Miłecki [Sun, 10 Jan 2016 00:18:39 +0000 (00:18 +0000)]
kernel: backport some bcma header file definitions from wireless-testing
Signed-off-by: Felix Fietkau <nbd@openwrt.org>
Backport of r47284
SVN-Revision: 48165
Rafał Miłecki [Sat, 9 Jan 2016 18:38:01 +0000 (18:38 +0000)]
mac80211: rename patches to use all prefixes
After last commit we got few unuset slots (prefixes). Use all available
numbers one by one to allow more backports.
This doesn't change a single patch (or order), only renames files.
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
SVN-Revision: 48164
Rafał Miłecki [Sat, 9 Jan 2016 18:37:55 +0000 (18:37 +0000)]
mac80211: group brcmfmac patches into sets as they were sent
It doesn't change any single patch (or order), it only renames files.
This creates some place for more backports, as we were already using
398 prefix which left only 1 slot.
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
SVN-Revision: 48163
Imre Kaloz [Fri, 8 Jan 2016 19:24:58 +0000 (19:24 +0000)]
mwlwifi: update to 10.3.0.16-
20160105 (adds DFS support)
backport of [48152]
Signed-off-by: Imre Kaloz <kaloz@openwrt.org>
SVN-Revision: 48153
Rafał Miłecki [Wed, 6 Jan 2016 16:10:40 +0000 (16:10 +0000)]
kernel: make bcm47xxpart work with TRX flashed at bad block(s)
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48061
SVN-Revision: 48140
Rafał Miłecki [Wed, 6 Jan 2016 16:10:13 +0000 (16:10 +0000)]
kernel: drop bcm47xxpart patch for Xiaomi
It was never tested, most likely not working (because of le32_to_cpu)
and not upstreamed.
Signed-off-by: Rafał Miłecki <zajec5@gmail.com>
Backport of r48060
SVN-Revision: 48139