diff options
author | Adrian Schmutzler <freifunk@adrianschmutzler.de> | 2020-08-31 13:17:54 +0200 |
---|---|---|
committer | Adrian Schmutzler <freifunk@adrianschmutzler.de> | 2020-09-02 16:29:22 +0200 |
commit | 48905af01d1deba913f98aeb5d6a4898237e94f5 (patch) | |
tree | 9eb91d9c11dc1885c07d4cdf2d5384026ad62362 /tools/upslug2 | |
parent | 66893063abf56b7d8c21eceed56e5d27859eaaea (diff) | |
download | upstream-48905af01d1deba913f98aeb5d6a4898237e94f5.tar.gz upstream-48905af01d1deba913f98aeb5d6a4898237e94f5.tar.bz2 upstream-48905af01d1deba913f98aeb5d6a4898237e94f5.zip |
tools: drop unused upslug2 and wrt350nv2-builder
These tools have been used by the orion target which has been
removed in Jan 2020 [1].
Both were specifically meant for the WRT350Nv2, which is not
supported anymore.
So, let's remove them as well.
[1] 89f2deb372b7 ("orion: remove unmaintained target")
Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
Diffstat (limited to 'tools/upslug2')
-rw-r--r-- | tools/upslug2/Makefile | 25 | ||||
-rw-r--r-- | tools/upslug2/patches/100-libpcap_fix.patch | 153 |
2 files changed, 0 insertions, 178 deletions
diff --git a/tools/upslug2/Makefile b/tools/upslug2/Makefile deleted file mode 100644 index f270c9fbe9..0000000000 --- a/tools/upslug2/Makefile +++ /dev/null @@ -1,25 +0,0 @@ -# -# Copyright (C) 2009-2012 OpenWrt.org -# -# This is free software, licensed under the GNU General Public License v2. -# See /LICENSE for more information. -# -include $(TOPDIR)/rules.mk - -PKG_NAME:=upslug2 - -PKG_SOURCE_PROTO:=git -PKG_SOURCE_URL:=https://github.com/fretb/upslug2 -PKG_SOURCE_DATE:=2016-05-16 -PKG_SOURCE_VERSION:=35f0b18c56368f69eef590e7d9fb688fbe624b10 -PKG_MIRROR_HASH:=646856532e5fad240b1697eb94726aafa6712294f608e24892983e6db95fb65f - -HOST_FIXUP:=autoreconf - -include $(INCLUDE_DIR)/host-build.mk - -ifneq ($(HOST_OS),Linux) - HOST_CONFIGURE_ARGS += --with-libpcap -endif - -$(eval $(call HostBuild)) diff --git a/tools/upslug2/patches/100-libpcap_fix.patch b/tools/upslug2/patches/100-libpcap_fix.patch deleted file mode 100644 index 1e14de4519..0000000000 --- a/tools/upslug2/patches/100-libpcap_fix.patch +++ /dev/null @@ -1,153 +0,0 @@ ---- a/pcap_wire.cc -+++ b/pcap_wire.cc -@@ -18,6 +18,7 @@ - - #include <sys/time.h> - #include <sys/select.h> -+#include <sys/poll.h> - - /* Ways of finding the hardware MAC on this machine... */ - /* This is the Linux only fallback. */ -@@ -130,20 +131,18 @@ namespace NSLU2Upgrade { - * non-static (real) Handler. - */ - void Handler(const struct pcap_pkthdr *packet_header, const u_char *packet) { -- /* This should only be called once... */ -- if (captured) -- throw std::logic_error("Handler called twice"); -- - /* Verify the protocol and originating address of the packet, then - * return this packet. - */ -+ if (captured) -+ return; - if (packet_header->caplen > 14 && (broadcast || - std::memcmp(packet+6, header, 6) == 0)) { -- /* Record the address and copy the data */ -- std::memcpy(source, packet+6, 6); - const size_t len(packet_header->caplen - 14); - if (len > captureSize) -- throw std::logic_error("packet too long"); -+ return; -+ /* Record the address and copy the data */ -+ std::memcpy(source, packet+6, 6); - std::memcpy(captureBuffer, packet+14, len); - captureSize = len; - captured = true; -@@ -156,7 +155,7 @@ namespace NSLU2Upgrade { - * packet and the buffer should be big enough. - */ - if (packet_header->caplen < packet_header->len) -- throw std::logic_error("truncated packet"); -+ return; - - /*IGNORE EVIL: known evil cast */ - reinterpret_cast<PCapWire*>(user)->Handler(packet_header, packet); -@@ -173,56 +172,24 @@ namespace NSLU2Upgrade { - virtual void Receive(void *buffer, size_t &size, unsigned long timeout) { - /* Now try to read packets until the timeout has been consumed. - */ -- struct timeval tvStart; -- if (timeout > 0 && gettimeofday(&tvStart, 0) != 0) -- throw OSError(errno, "gettimeofday(base)"); -+ int time_count; - - captureBuffer = buffer; - captureSize = size; - captured = false; -+ time_count = timeout / 2000; /* 2 ms intervals */ -+ time_count++; - do { - /*IGNORE EVIL: known evil cast */ -- int count(pcap_dispatch(pcap, 1, PCapHandler, -- reinterpret_cast<u_char*>(this))); -+ int count = pcap_dispatch(pcap, 1, PCapHandler, -+ reinterpret_cast<u_char*>(this)); - -- if (count > 0) { -- /* Were any packets handled? */ -- if (captured) { -- size = captureSize; -- return; -- } -- /* else try again. */ -- } else if (count == 0) { -- /* Nothing to handle - do the timeout, do this -- * by waiting a bit then trying again, the trick -- * to this is to work out how long to wait each -- * time, for the moment a 10ms delay is used. -- */ -- if (timeout == 0) -- break; -- -- struct timeval tvNow; -- if (gettimeofday(&tvNow, 0) != 0) -- throw OSError(errno, "gettimeofday(now)"); -- -- unsigned long t(tvNow.tv_sec - tvStart.tv_sec); -- t *= 1000000; -- t += tvNow.tv_usec; -- t -= tvStart.tv_usec; -- if (t > timeout) -- break; -- -- tvNow.tv_sec = 0; -- tvNow.tv_usec = timeout-t; -- if (tvNow.tv_usec > 10000) -- tvNow.tv_usec = 10000; -- -- /* Delay, may be interrupted - this should -- * be portable to the BSDs (since the -- * technique originates in BSD.) -- */ -- (void)select(0, 0, 0, 0, &tvNow); -- } else { -+ /* Were any packets handled? */ -+ if (captured) { -+ size = captureSize; -+ return; -+ } -+ if (count < 0) { - /* Error condition. */ - if (count == -1) { - if (errno != EINTR) -@@ -232,7 +199,8 @@ namespace NSLU2Upgrade { - } else - throw std::logic_error("pcap unexpected result"); - } -- } while (timeout != 0); -+ time_count--; -+ } while (time_count > 0); - - /* Here on timeout. */ - size = 0; -@@ -288,6 +256,7 @@ NSLU2Upgrade::Wire *NSLU2Upgrade::Wire:: - const unsigned char *mac, const unsigned char *address, int uid) { - /* This is used to store the error passed to throw. */ - static char PCapErrbuf[PCAP_ERRBUF_SIZE]; -+ struct bpf_program fp; - - /* Check the device name. If not given use 'DEFAULT_ETHERNET_IF'. */ - if (device == NULL) -@@ -301,20 +270,12 @@ NSLU2Upgrade::Wire *NSLU2Upgrade::Wire:: - * for other ethernet MACs. (Because the code above does not - * check that the destination matches the device in use). - */ -- pcap = pcap_open_live(device, 1540, false/*promiscuous*/, 1/*ms*/, PCapErrbuf); -+ pcap = pcap_open_live(device, 1540, false/*promiscuous*/, 2/*ms*/, PCapErrbuf); - - if (pcap == NULL) - throw WireError(errno, PCapErrbuf); - } - -- /* Always do a non-blocking read, because the 'timeout' above -- * doesn't work on Linux (return is immediate) and on OSX (and -- * maybe other BSDs) the interface tends to hang waiting for -- * the timeout to expire even after receiving a single packet. -- */ -- if (pcap_setnonblock(pcap, true, PCapErrbuf)) -- throw WireError(errno, PCapErrbuf); -- - try { - /* The MAC of the transmitting device is needed - without - * this the return packet won't go to the right place! |