aboutsummaryrefslogtreecommitdiffstats
path: root/package/kernel/linux/modules/netsupport.mk
Commit message (Collapse)AuthorAgeFilesLines
* netsupport: move out sch_cake from kmod-schedKevin Darbyshire-Bryant2019-07-091-1/+1
| | | | | | | | | | Fix file installation clash between kmod-sched & kmod-sched-cake as both try to install sch_cake.ko Remove cake from kmod-sched package as cake is supposed to be the optional qdisc. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* netsupport: move out mqprio from kmod-schedKonstantin Demin2019-07-081-1/+1
| | | | | | | | | | | | | Currently, there's unable to install "kmod-sched-mqprio" after "kmod-sched" (or vice versa), because "sch_mqprio.ko" is shipped in both packages. Fixes: f83522fa6361 ("linux: Add kmod-sched-mqprio") Fixes: 6af639e0bf78 ("linux: Add kmod-sched-act-vlan") Fixes: 72c7e2dc467c ("linux: Add kmod-sched-flower") Signed-off-by: Konstantin Demin <rockdrilla@gmail.com> [Add cls_flower and act_vlan] Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kmod-sched-cake: drop out of tree package, use kernel versionKevin Darbyshire-Bryant2019-07-081-0/+16
| | | | | | | | | | | | | | CAKE made it to kernel 4.19 and since OpenWrt now at kernel 4.19 we can drop the out of tree cake package in base repository. Add kmod-sched-cake to netsupport so package dependencies are still met. Similarly CAKE is retained as an optional qdisc module to avoid base scheduler package size implications. Backport upstream patches from k5.1 to address some small bugs and support fwmark usage. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* netsupport: add kmod-nshYousong Zhou2019-06-201-0/+17
| | | | | | This is required by kmod-openvswitch since linux 4.15. Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* netsupport: improve xfrm module supportAndré Valentin2019-06-161-2/+2
| | | | | | | -switch to module autoprobe -exclude 4.9 kernel Signed-off-by: André Valentin <avalentin@marcant.net>
* netsupport: add xfrmi interface supportAndré Valentin2019-06-091-0/+16
| | | | | | | | Add support for xfrm interfaces in kernel. XFRM interfaces are used by the IPsec stack for tunneling. XFRM interfaces are available since linux 4.19. Signed-off-by: André Valentin <avalentin@marcant.net>
* kernel: backport act_ctinfoKevin Darbyshire-Bryant2019-06-061-2/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ctinfo is a new tc filter action module. It is designed to restore information contained in firewall conntrack marks to other packet fields and is typically used on packet ingress paths. At present it has two independent sub-functions or operating modes, DSCP restoration mode & skb mark restoration mode. The DSCP restore mode: This mode copies DSCP values that have been placed in the firewall conntrack mark back into the IPv4/v6 diffserv fields of relevant packets. The DSCP restoration is intended for use and has been found useful for restoring ingress classifications based on egress classifications across links that bleach or otherwise change DSCP, typically home ISP Internet links. Restoring DSCP on ingress on the WAN link allows qdiscs such as but by no means limited to CAKE to shape inbound packets according to policies that are easier to set & mark on egress. Ingress classification is traditionally a challenging task since iptables rules haven't yet run and tc filter/eBPF programs are pre-NAT lookups, hence are unable to see internal IPv4 addresses as used on the typical home masquerading gateway. Thus marking the connection in some manner on egress for later restoration of classification on ingress is easier to implement. Parameters related to DSCP restore mode: dscpmask - a 32 bit mask of 6 contiguous bits and indicate bits of the conntrack mark field contain the DSCP value to be restored. statemask - a 32 bit mask of (usually) 1 bit length, outside the area specified by dscpmask. This represents a conditional operation flag whereby the DSCP is only restored if the flag is set. This is useful to implement a 'one shot' iptables based classification where the 'complicated' iptables rules are only run once to classify the connection on initial (egress) packet and subsequent packets are all marked/restored with the same DSCP. A mask of zero disables the conditional behaviour ie. the conntrack mark DSCP bits are always restored to the ip diffserv field (assuming the conntrack entry is found & the skb is an ipv4/ipv6 type) e.g. dscpmask 0xfc000000 statemask 0x01000000 |----0xFC----conntrack mark----000000---| | Bits 31-26 | bit 25 | bit24 |~~~ Bit 0| | DSCP | unused | flag |unused | |-----------------------0x01---000000---| | | | | ---| Conditional flag v only restore if set |-ip diffserv-| | 6 bits | |-------------| The skb mark restore mode (cpmark): This mode copies the firewall conntrack mark to the skb's mark field. It is completely the functional equivalent of the existing act_connmark action with the additional feature of being able to apply a mask to the restored value. Parameters related to skb mark restore mode: mask - a 32 bit mask applied to the firewall conntrack mark to mask out bits unwanted for restoration. This can be useful where the conntrack mark is being used for different purposes by different applications. If not specified and by default the whole mark field is copied (i.e. default mask of 0xffffffff) e.g. mask 0x00ffffff to mask out the top 8 bits being used by the aforementioned DSCP restore mode. |----0x00----conntrack mark----ffffff---| | Bits 31-24 | | | DSCP & flag| some value here | |---------------------------------------| | | v |------------skb mark-------------------| | | | | zeroed | | |---------------------------------------| Overall parameters: zone - conntrack zone control - action related control (reclassify | pipe | drop | continue | ok | goto chain <CHAIN_INDEX>) Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> Reviewed-by: Toke Høiland-Jørgensen <toke@redhat.com> Acked-by: Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Make suitable adjustments for backporting to 4.14 & 4.19 and add to SCHED_MODULES_FILTER Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* Revert "kernel: backport act_ctinfo"Kevin Darbyshire-Bryant2019-06-061-9/+1
| | | | | | | | | | This reverts commit 7c50182e0cdce0366715082872a2afbcf208bbf8. Produces build error: Package kmod-sched is missing dependencies for the following libraries: nf_conntrack.ko Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: backport act_ctinfoKevin Darbyshire-Bryant2019-06-061-1/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ctinfo is a new tc filter action module. It is designed to restore information contained in firewall conntrack marks to other packet fields and is typically used on packet ingress paths. At present it has two independent sub-functions or operating modes, DSCP restoration mode & skb mark restoration mode. The DSCP restore mode: This mode copies DSCP values that have been placed in the firewall conntrack mark back into the IPv4/v6 diffserv fields of relevant packets. The DSCP restoration is intended for use and has been found useful for restoring ingress classifications based on egress classifications across links that bleach or otherwise change DSCP, typically home ISP Internet links. Restoring DSCP on ingress on the WAN link allows qdiscs such as but by no means limited to CAKE to shape inbound packets according to policies that are easier to set & mark on egress. Ingress classification is traditionally a challenging task since iptables rules haven't yet run and tc filter/eBPF programs are pre-NAT lookups, hence are unable to see internal IPv4 addresses as used on the typical home masquerading gateway. Thus marking the connection in some manner on egress for later restoration of classification on ingress is easier to implement. Parameters related to DSCP restore mode: dscpmask - a 32 bit mask of 6 contiguous bits and indicate bits of the conntrack mark field contain the DSCP value to be restored. statemask - a 32 bit mask of (usually) 1 bit length, outside the area specified by dscpmask. This represents a conditional operation flag whereby the DSCP is only restored if the flag is set. This is useful to implement a 'one shot' iptables based classification where the 'complicated' iptables rules are only run once to classify the connection on initial (egress) packet and subsequent packets are all marked/restored with the same DSCP. A mask of zero disables the conditional behaviour ie. the conntrack mark DSCP bits are always restored to the ip diffserv field (assuming the conntrack entry is found & the skb is an ipv4/ipv6 type) e.g. dscpmask 0xfc000000 statemask 0x01000000 |----0xFC----conntrack mark----000000---| | Bits 31-26 | bit 25 | bit24 |~~~ Bit 0| | DSCP | unused | flag |unused | |-----------------------0x01---000000---| | | | | ---| Conditional flag v only restore if set |-ip diffserv-| | 6 bits | |-------------| The skb mark restore mode (cpmark): This mode copies the firewall conntrack mark to the skb's mark field. It is completely the functional equivalent of the existing act_connmark action with the additional feature of being able to apply a mask to the restored value. Parameters related to skb mark restore mode: mask - a 32 bit mask applied to the firewall conntrack mark to mask out bits unwanted for restoration. This can be useful where the conntrack mark is being used for different purposes by different applications. If not specified and by default the whole mark field is copied (i.e. default mask of 0xffffffff) e.g. mask 0x00ffffff to mask out the top 8 bits being used by the aforementioned DSCP restore mode. |----0x00----conntrack mark----ffffff---| | Bits 31-24 | | | DSCP & flag| some value here | |---------------------------------------| | | v |------------skb mark-------------------| | | | | zeroed | | |---------------------------------------| Overall parameters: zone - conntrack zone control - action related control (reclassify | pipe | drop | continue | ok | goto chain <CHAIN_INDEX>) Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> Reviewed-by: Toke Høiland-Jørgensen <toke@redhat.com> Acked-by: Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Make suitable adjustments for backporting to 4.14 & 4.19 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: Remove support for kernel 3.18Hauke Mehrtens2019-05-031-6/+3
| | | | | | | | | | No target is using kernel 3.18 anymore, remove all the generic support for kernel 3.18. The removed packages are depending on kernel 3.18 only and are not used on any recent kernel. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* linux: Add kmod-sched-act-vlanHauke Mehrtens2019-03-251-0/+16
| | | | | | This allows to configure rules to push or pop vlan headers. Signed-off-by: Hauke Mehrtens <hauke.mehrtens@intel.com>
* linux: Add kmod-sched-flowerHauke Mehrtens2019-03-251-0/+16
| | | | | | | This allows to classify packets based on a configurable combination of packet keys and masks. Signed-off-by: Hauke Mehrtens <hauke.mehrtens@intel.com>
* linux: Add kmod-sched-mqprioHauke Mehrtens2019-03-251-0/+16
| | | | | | This adds Multi-queue priority scheduler (MQPRIO). Signed-off-by: Hauke Mehrtens <hauke.mehrtens@intel.com>
* kernel/modules: add kmod-bpf-test packageTony Ambardar2019-02-111-0/+11
| | | | | | | | Add the test_bpf module that runs various test vectors against the BPF interpreter or BPF JIT compiler. The module must be manually loaded, as with the kmod-crypto-test module which serves a similar purpose. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: add kmod-sched-bpf packageTony Ambardar2019-02-111-1/+17
| | | | | | | Add cls_bpf and act_bpf modules for additional tc classifier and action support of cBPF and eBPF. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: add kmod-sched-ipset packageTony Ambardar2019-02-111-1/+16
| | | | | | | | Add em_ipset module to support tc filter classification by IP set. Build as a standalone package to help avoid pulling in rest of kmod-sched and isolate new dependency on kmod-ipt-ipset. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: kmod-sched: add some common, useful actionsTony Ambardar2019-02-111-1/+5
| | | | | | | | | | | | | Add act_pedit, act_csum, act_gact and act_simple modules for additional tc action support. Module act_simple helps with debug and logging, similar to iptables LOG target, while act_gact provides common generic actions. Modules act_pedit and act_csum support general packet mangling, and have been the subject of feature requests and forum discussions (e.g. DSCP), as well as being added to the Turris OS fork of OpenWrt ~2 years ago. Also select dependency kmod-lib-crc32c to support act_csum. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: kmod-sched-core: add missing dependency, useful moduleTony Ambardar2019-02-111-2/+4
| | | | | | | | | | | | | | | | All tc ematch modules, including those in kmod-sched-core and kmod-sched, use cls_basic as a core dependency. Relocate cls_basic from kmod-sched to kmod-sched-core to avoid requiring kmod-sched unnecessarily. This change is also backwards compatible since any past tc ematch users will have had to install both kmod-sched-core and kmod-sched anyway. Add the matchall kernel module cls_matchall introduced in kernel 4.8. The matchall classifier matches every packet and allows the user to apply actions on it. It is a simpler, more efficient replacement for the common but cryptic tc classifier idiom "u32 match u32 0 0". Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel: Make kmod-mpls depend on iptunnel in kernel 4.19Hauke Mehrtens2018-12-151-1/+1
| | | | | | This new dependency is needed with kernel 4.19. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: Remove dependencies on old kernelsRosen Penev2018-11-011-3/+3
| | | | | | Kernels 4.1 and 4.4 are not part of the tree anymore. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* kernel/modules: add kmod-fou6 packageDeng Qingfang2018-10-201-0/+21
| | | | | | IPv6 support for Foo-over-UDP tunnel Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
* kernel: add kmod-tcp-bbrKeith Wong2018-08-251-0/+31
| | | | | | | | | | | | This adds support for BBR (Bottleneck Bandwidth and RTT) TCP congestion control. Applications (e.g. webservers, VPN client/server) which initiate connections from router side can benefit from this. This provide an easier way for users to use BBR by selecting / installing kmod-tcp-bbr instead of altering kernel config and compiling firmware by themselves. Signed-off-by: Keith Wong <keithwky@gmail.com>
* kernel: kmod-geneve: kmod for Geneve tunnelingYousong Zhou2018-02-281-0/+23
| | | | | | This will be required for Open vSwitch geneve tunneling support Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* kernel: remove kmod-appletalkFelix Fietkau2018-02-221-22/+0
| | | | | | | This has been obsolete for many years now and has been implicated in a recent build failure Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kmod-sched: add sch_multiq to extra schedulersPhilip Prindeville2018-02-131-0/+1
| | | | | | | For hardware that supports multiple h/w output queues, add a compatible scheduler (NET_SCH_MULTIQ). Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* kernel: add kmod-fouFilip Moc2018-02-101-0/+22
| | | | | | | | | Once installed fou kernel module allows you to use FOU (Foo over UDP) and GUE (Generic UDP encapsulation) tunnel protocols. To get ip fou command working you also need to install ip-full. Signed-off-by: Filip Moc <lede@moc6.cz>
* kernel: kmod-rxrpc: handle renamed kernel moduleHauke Mehrtens2017-12-161-2/+3
| | | | | | | The kernel module was renamed with kernel 4.11, handle that in the package definition. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: deactivate some new network featuresHauke Mehrtens2017-12-161-2/+6
| | | | | | | | | | | This deactivates the following options which were introduced between kernel 4.9 and 4.14 in some kernel packages: CONFIG_INET_ESP_OFFLOAD CONFIG_INET6_ESP_OFFLOAD CONFIG_LWTUNNEL_BPF CONFIG_NET_9P_XEN Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: kmod-macsec module for 4.9Christian Lamparter2017-10-151-0/+15
| | | | | | | | | | | | | | | | | | | MACsec/IEEE 802.1AE is useful to secure communication to and from endpoints at Layer 2. Starting with 4.6, the linux kernel provides a universal macsec driver for authentication and encryption of traffic in a LAN, typically with GCM-AES-128, and optional replay protection. http://standards.ieee.org/getieee802/download/802.1AE-2006.pdf Note: LEDE can utilize MACsec with a static connectivity association key (static PSK) with the ip-full package installed. <http://man7.org/linux/man-pages/man8/ip-macsec.8.html> Signed-off-by: Christian Lamparter <chunkeey@gmail.com>
* kernel: kmod packaging for Intel 10G ethernet ixgbe driverPhilip Prindeville2017-03-291-0/+16
| | | | | | | A lot of Ivybridge and Haswell servers have the 82598/82599 Ethernet controllers. Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* kernel: fix kmod-rxrpc with kernel 4.9Hauke Mehrtens2017-02-121-2/+2
| | | | | | rxkad will be build into af-rxrpc now and is of type boolean. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: remove kmod packages for bridge, stp, llc and 8021qFelix Fietkau2017-02-091-66/+0
| | | | | | | Remove CONFIG_VLAN_8021Q overrides for two targets These features are built into the kernel image for all targets Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: update kmod-* packaging and dependencies for linux 4.9Felix Fietkau2017-01-271-1/+1
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kmod-sched-core: Add HTB and TBF traffic shapersToke Høiland-Jørgensen2017-01-271-3/+3
| | | | | | | | | | | | HTB and TBF are the basic traffic shapers used by sqm-scripts. Moving these into kmod-sched-core enables sqm-scripts to downgrade its dependency from kmod-sched to kmod-sched-core, potentially making it useful on devices with smaller flash sizes. This adds around 30k to the size of kmod-sched-core (20k for sch_htb.ko and 10k for sch_tbf.ko). Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
* kernel: have kmod-ipsec depend on kmod-crypto-echainivStijn Tintel2016-11-291-1/+4
| | | | | | | | | The ESP algorithms in CBC mode require echainiv, so have kmod-ipsec depend on kmod-crypto-echainiv. See upstream commit 32b6170ca59ccf07d0e394561e54b2cd9726038c. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* kernel: add nlmon kernel moduleHauke Mehrtens2016-09-161-0/+15
| | | | | | This driver allows to monitor netlink communication on the system. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: add fake users for udptunnel and iptunnel modulesDaniel Golle2016-08-221-3/+8
| | | | | | | | Without any in-tree users enabled the Kernel's build process doesn't actually build those modules. Enable some potential in-tree users during Kernel build, so out-of-tree modules can depend on them. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* kernel: add plan 9 fs packageMatteo Croce2016-08-111-0/+21
| | | | | | | 9pfs is used by kvm to share files between host and guest, add proper config option to enable it. Signed-off-by: Matteo Croce <matteo.croce@canonical.com>
* kernel: mark kmod-udptunnel as hiddden to replace the NET_UDP_TUNNEL kconfig ↵Felix Fietkau2016-08-041-0/+2
| | | | | | hack Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: remove esfq qdiscFelix Fietkau2016-08-041-13/+1
| | | | | | It has been obsolete for years now Signed-off-by: Felix Fietkau <nbd@nbd.name>
* modules: add missing module to ipsec descriptionDirk Neukirchen2016-06-061-0/+1
| | | | Signed-off-by: Dirk Neukirchen <dirkneukirchen@web.de>
* kernel: remove linux 4.3 supportFelix Fietkau2016-03-071-1/+1
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 48955
* kernel: MPLS did not exist prior to v4.4John Crispin2016-02-151-0/+1
| | | | | | Signed-off-by: John Crispin <blogic@openwrt.org> SVN-Revision: 48722
* linux/netsupport: Add support for MPLS protocolJohn Crispin2016-02-121-0/+22
| | | | | | | | | This adds support for MPLS protocol including usage of lightweight tunnels. Kernel size of vmlinuz.bin grows by ~8k. Signed-off-by: André Valentin <avalentin@marcant.net> SVN-Revision: 48710
* kernel/modules: add kmod-ip6-vtiJohn Crispin2016-02-121-0/+16
| | | | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> SVN-Revision: 48703
* kernel/modules: rename kmod-ipvti to kmod-ip-vtiJohn Crispin2016-02-121-3/+3
| | | | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> SVN-Revision: 48702
* kernel: disable AFS support by defaultFelix Fietkau2016-01-191-0/+1
| | | | | | | | | | This pulls in CONFIG_KEYS, which bloats up the kernel size and is thus very undesirable. It also currently exposes the kernel to a local root vulnerability Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 48364
* Configure IPv6 kernel options in config/Config-kernel.inFelix Fietkau2016-01-041-22/+0
| | | | | | | | | | | | | | | | | | | Revision 46834 changed IPv6 support from a module to builtin. But since the configuration of the IPv6 kernel options was left in package/kernel/linux/modules/netsupport.mk, this means that an empty kmod-ipv6 module was still being generated (not packaged). This patch moves the configuration of the IPv6 kernel options to config/Config-kernel.in to remove this last bit of the module. Note that CONFIG_IPV6_PRIVACY was dropped (enabled by default since Linux v3.13), so this option is no longer needed. See https://github.com/torvalds/linux/commit/5d9efa7ee99eed58388f186c13cf2e2a87e9ceb4 Signed-off-by: Arjen de Korte <arjen+openwrt@de-korte.org> SVN-Revision: 48132
* kernel: fix duplication of sch_netem in multiple packages (#21479)Felix Fietkau2016-01-011-1/+1
| | | | | | Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 48018
* kernel: kmod-udptunnel6 depends on IPv6Jo-Philipp Wich2015-11-161-0/+1
| | | | | | | | | Spotted a missing 'ip6_udp_tunnel.ko' build failure during a local build with all kmods enabled but globally disabled IPv6 support. Signed-off-by: Jo-Philipp Wich <jow@openwrt.org> SVN-Revision: 47487