aboutsummaryrefslogtreecommitdiffstats
path: root/package/kernel/linux/modules/netsupport.mk
Commit message (Collapse)AuthorAgeFilesLines
* kernel: fix kmod-wireguard package fieldsIlya Lipnitskiy2021-02-261-4/+2
| | | | | | | | | Use NETWORK_SUPPORT_MENU like all other modules in netsupport.mk. Drop SECTION and CATEGORY fields as they are set by default and to match other packages in netsupport.mk. Use better TITLE for kmod-wireguard (taken from upstream drivers/net/Kconfig). Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
* kernel: migrate wireguard into the kernel treeIlya Lipnitskiy2021-02-261-0/+30
| | | | | | | | | | On Linux 5.4, build WireGuard from backports. Linux 5.10 contains wireguard in-tree. Add in-kernel crypto libraries required by WireGuard along with arch-specific optimizations. Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
* kernel/modules: remove fake users from udptunnel{4,6}Rui Salvaterra2021-01-011-6/+2
| | | | | | | | | | Since we're now able to select CONFIG_NET_UDP_TUNNEL at will, drop the fake dependencies. This is a partial revert of commit d7e040f8bccec06b64c82963be6435101423dbf1 "kernel: add fake users for udptunnel and iptunnel modules". Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
* kmod-tcp-hybla: new module for hybla congestion control algorithmYousong Zhou2020-12-261-0/+18
| | | | | | | Just the module and no default sysctl conf file is provided Link: https://forum.openwrt.org/t/20-xx-tcp-hybla/83076 Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* kmod-tcp-bbr: use AutoProbeYousong Zhou2020-12-261-1/+1
| | | | Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* kmod-tcp-bbr: leave CONFIG_TCP_CONG_ADVANCED to target configYousong Zhou2020-12-261-3/+1
| | | | | | | Since generic has the option set to y and other targets now inherit that choice, there is no behaviour change Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* kernel: remove kmod-capiFelix Fietkau2020-11-131-20/+0
| | | | | | We don't package any driver that uses this module Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: remove obsolete kernel version switches for 4.14Adrian Schmutzler2020-09-021-3/+3
| | | | | | | | | | This removes switches dependent on kernel version 4.14 as well as several packages/modules selected only for that version. This also removes sched-cake-virtual, which is not required anymore now that we have only one variant of cake. Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
* kernel: replace "+@" IPV6 dependency by "+"Adrian Schmutzler2020-04-241-1/+1
| | | | | | | | | | The combination +@IPV6:kmod-ipsec6 is not valid, the +a:b syntax implies the @. Fix it. Fixes: 2e6b6f9fcaae ("kernel: add @IPv6 dependency to ipv6 modules") Reported-by: Oldřich Jedlička (@oldium) Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
* Revert "kmod-sched: add act_police"Kevin Darbyshire-Bryant2020-04-141-10/+0
| | | | | | | | | | | This reverts commit 1b973b54ea4d5d20dec5e71c48bff6a3e0bcb4ac. It turns out act_police is included in the kmod-sched package so this package turns out to be superfluous and causes file provision conflicts. Ooooops! Best revert it then. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kmod-sched: add act_policeKevin Darbyshire-Bryant2020-04-101-0/+10
| | | | | | | | | | | | | | | | | | "Whoop whoop, sound of da police" Add an ingress capable traffic policer module configurable with tc. From the man page: The police action allows to limit bandwidth of traffic matched by the filter it is attached to. Basically there are two different algorithms available to measure the packet rate: The first one uses an internal dual token bucket and is configured using the rate, burst, mtu, peakrate, overhead and linklayer parameters. The second one uses an in-kernel sampling mechanism. It can be fine-tuned using the estimator filter parameter. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: add @IPV6 dependency to ipv6 modulesEneas U de Queiroz2020-04-091-3/+3
| | | | | | | | | | | | | | IPv6 modules should all depend on @IPV6, to avoid circular dependencies problems, especially if they select a module that depends on IPV6 as well. In theory, if a package A depends on IPV6, any package doing 'select A' (DEPENDS+= A) should also depend on IPV6; otherwise selecting A will fail. Sometimes the build system is forgiving this, but eventually, and unexpectedly, it may blow up on some other commit. Alternatively one can conditionally add IPv6 dependencies only if CONFIG_IPV6 is selected: (DEPENDS+= +IPV6:package6). Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
* kmod: add netlink-diag packageRosen Penev2020-04-071-0/+15
| | | | | | This is used by the ss utility from iproute2. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* kmod-sched-cake: switch to in-tree cake for 4.19+Kevin Darbyshire-Bryant2020-04-011-1/+16
| | | | | | | | | | | | | | Use in tree version of cake for kernels 4.19+ and backport features from later kernel versions to 4.19. Unfortunately PROVIDES dependency handling produces bogus circular dependency warnings so whilst this package and kmod-sched-cake-oot should be able to PROVIDE kmod-sched-cake this doesn't work. Instead, remove the PROVIDES option and modify package sqm-scripts to depend on the correct module independently. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: mode_beet mode_transport mode_tunnel xfram modulesKoen Vandeputte2020-02-281-9/+6
| | | | | | | | This adds the new xfrm4_mode_beet, xfrm4_mode_transport, xfrm4_mode_tunnel and their IPv6 versions on kernel 5.4. These modules were newly added in kernel 5.2. Signed-off-by: Koen Vandeputte <koen.vandeputte@ncentric.com>
* kernel: use older kernel for explicitly setting dependenciesAdrian Schmutzler2020-01-261-1/+1
| | | | | | | | | | | | It is generally more desirable to use older kernel versions for dependencies, as this will require less changes when newer kernels are added (they will by default select the newer packages). Since we currently only have two kernels (4.14 and 4.19) in master, this patch applies this logic by converting all LINUX_4_19 symbols to their inverted LINUX_4_14 equivalents. Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
* kernel: remove obsolete kernel version switchesAdrian Schmutzler2020-01-121-15/+7
| | | | | | | | | After kernel 4.9 has been removed, this removes all (now obsolete) kernel version switches that deal with versions before 4.14. Package kmod-crypto-iv is empty now and thus removed entirely. Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
* kernel: move crypto-arc4 into a moduleFelix Fietkau2019-08-261-1/+1
| | | | | | It is no longer required by wireless drivers, so we can save some space here Signed-off-by: Felix Fietkau <nbd@nbd.name>
* Revert "kmod-sched-cake: drop out of tree package, use kernel version"Kevin Darbyshire-Bryant2019-07-291-16/+0
| | | | | | This reverts commit 5c094ff660fd8e750ed1c1f38719a45065e77348. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* Revert "netsupport: move out sch_cake from kmod-sched"Kevin Darbyshire-Bryant2019-07-291-1/+1
| | | | | | This reverts commit b31f9190c3c9736f0f2a9fc810eba5b6f43a6b05. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* netsupport: move out sch_cake from kmod-schedKevin Darbyshire-Bryant2019-07-091-1/+1
| | | | | | | | | | Fix file installation clash between kmod-sched & kmod-sched-cake as both try to install sch_cake.ko Remove cake from kmod-sched package as cake is supposed to be the optional qdisc. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* netsupport: move out mqprio from kmod-schedKonstantin Demin2019-07-081-1/+1
| | | | | | | | | | | | | Currently, there's unable to install "kmod-sched-mqprio" after "kmod-sched" (or vice versa), because "sch_mqprio.ko" is shipped in both packages. Fixes: f83522fa6361 ("linux: Add kmod-sched-mqprio") Fixes: 6af639e0bf78 ("linux: Add kmod-sched-act-vlan") Fixes: 72c7e2dc467c ("linux: Add kmod-sched-flower") Signed-off-by: Konstantin Demin <rockdrilla@gmail.com> [Add cls_flower and act_vlan] Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kmod-sched-cake: drop out of tree package, use kernel versionKevin Darbyshire-Bryant2019-07-081-0/+16
| | | | | | | | | | | | | | CAKE made it to kernel 4.19 and since OpenWrt now at kernel 4.19 we can drop the out of tree cake package in base repository. Add kmod-sched-cake to netsupport so package dependencies are still met. Similarly CAKE is retained as an optional qdisc module to avoid base scheduler package size implications. Backport upstream patches from k5.1 to address some small bugs and support fwmark usage. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* netsupport: add kmod-nshYousong Zhou2019-06-201-0/+17
| | | | | | This is required by kmod-openvswitch since linux 4.15. Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* netsupport: improve xfrm module supportAndré Valentin2019-06-161-2/+2
| | | | | | | -switch to module autoprobe -exclude 4.9 kernel Signed-off-by: André Valentin <avalentin@marcant.net>
* netsupport: add xfrmi interface supportAndré Valentin2019-06-091-0/+16
| | | | | | | | Add support for xfrm interfaces in kernel. XFRM interfaces are used by the IPsec stack for tunneling. XFRM interfaces are available since linux 4.19. Signed-off-by: André Valentin <avalentin@marcant.net>
* kernel: backport act_ctinfoKevin Darbyshire-Bryant2019-06-061-2/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ctinfo is a new tc filter action module. It is designed to restore information contained in firewall conntrack marks to other packet fields and is typically used on packet ingress paths. At present it has two independent sub-functions or operating modes, DSCP restoration mode & skb mark restoration mode. The DSCP restore mode: This mode copies DSCP values that have been placed in the firewall conntrack mark back into the IPv4/v6 diffserv fields of relevant packets. The DSCP restoration is intended for use and has been found useful for restoring ingress classifications based on egress classifications across links that bleach or otherwise change DSCP, typically home ISP Internet links. Restoring DSCP on ingress on the WAN link allows qdiscs such as but by no means limited to CAKE to shape inbound packets according to policies that are easier to set & mark on egress. Ingress classification is traditionally a challenging task since iptables rules haven't yet run and tc filter/eBPF programs are pre-NAT lookups, hence are unable to see internal IPv4 addresses as used on the typical home masquerading gateway. Thus marking the connection in some manner on egress for later restoration of classification on ingress is easier to implement. Parameters related to DSCP restore mode: dscpmask - a 32 bit mask of 6 contiguous bits and indicate bits of the conntrack mark field contain the DSCP value to be restored. statemask - a 32 bit mask of (usually) 1 bit length, outside the area specified by dscpmask. This represents a conditional operation flag whereby the DSCP is only restored if the flag is set. This is useful to implement a 'one shot' iptables based classification where the 'complicated' iptables rules are only run once to classify the connection on initial (egress) packet and subsequent packets are all marked/restored with the same DSCP. A mask of zero disables the conditional behaviour ie. the conntrack mark DSCP bits are always restored to the ip diffserv field (assuming the conntrack entry is found & the skb is an ipv4/ipv6 type) e.g. dscpmask 0xfc000000 statemask 0x01000000 |----0xFC----conntrack mark----000000---| | Bits 31-26 | bit 25 | bit24 |~~~ Bit 0| | DSCP | unused | flag |unused | |-----------------------0x01---000000---| | | | | ---| Conditional flag v only restore if set |-ip diffserv-| | 6 bits | |-------------| The skb mark restore mode (cpmark): This mode copies the firewall conntrack mark to the skb's mark field. It is completely the functional equivalent of the existing act_connmark action with the additional feature of being able to apply a mask to the restored value. Parameters related to skb mark restore mode: mask - a 32 bit mask applied to the firewall conntrack mark to mask out bits unwanted for restoration. This can be useful where the conntrack mark is being used for different purposes by different applications. If not specified and by default the whole mark field is copied (i.e. default mask of 0xffffffff) e.g. mask 0x00ffffff to mask out the top 8 bits being used by the aforementioned DSCP restore mode. |----0x00----conntrack mark----ffffff---| | Bits 31-24 | | | DSCP & flag| some value here | |---------------------------------------| | | v |------------skb mark-------------------| | | | | zeroed | | |---------------------------------------| Overall parameters: zone - conntrack zone control - action related control (reclassify | pipe | drop | continue | ok | goto chain <CHAIN_INDEX>) Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> Reviewed-by: Toke Høiland-Jørgensen <toke@redhat.com> Acked-by: Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Make suitable adjustments for backporting to 4.14 & 4.19 and add to SCHED_MODULES_FILTER Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* Revert "kernel: backport act_ctinfo"Kevin Darbyshire-Bryant2019-06-061-9/+1
| | | | | | | | | | This reverts commit 7c50182e0cdce0366715082872a2afbcf208bbf8. Produces build error: Package kmod-sched is missing dependencies for the following libraries: nf_conntrack.ko Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: backport act_ctinfoKevin Darbyshire-Bryant2019-06-061-1/+9
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ctinfo is a new tc filter action module. It is designed to restore information contained in firewall conntrack marks to other packet fields and is typically used on packet ingress paths. At present it has two independent sub-functions or operating modes, DSCP restoration mode & skb mark restoration mode. The DSCP restore mode: This mode copies DSCP values that have been placed in the firewall conntrack mark back into the IPv4/v6 diffserv fields of relevant packets. The DSCP restoration is intended for use and has been found useful for restoring ingress classifications based on egress classifications across links that bleach or otherwise change DSCP, typically home ISP Internet links. Restoring DSCP on ingress on the WAN link allows qdiscs such as but by no means limited to CAKE to shape inbound packets according to policies that are easier to set & mark on egress. Ingress classification is traditionally a challenging task since iptables rules haven't yet run and tc filter/eBPF programs are pre-NAT lookups, hence are unable to see internal IPv4 addresses as used on the typical home masquerading gateway. Thus marking the connection in some manner on egress for later restoration of classification on ingress is easier to implement. Parameters related to DSCP restore mode: dscpmask - a 32 bit mask of 6 contiguous bits and indicate bits of the conntrack mark field contain the DSCP value to be restored. statemask - a 32 bit mask of (usually) 1 bit length, outside the area specified by dscpmask. This represents a conditional operation flag whereby the DSCP is only restored if the flag is set. This is useful to implement a 'one shot' iptables based classification where the 'complicated' iptables rules are only run once to classify the connection on initial (egress) packet and subsequent packets are all marked/restored with the same DSCP. A mask of zero disables the conditional behaviour ie. the conntrack mark DSCP bits are always restored to the ip diffserv field (assuming the conntrack entry is found & the skb is an ipv4/ipv6 type) e.g. dscpmask 0xfc000000 statemask 0x01000000 |----0xFC----conntrack mark----000000---| | Bits 31-26 | bit 25 | bit24 |~~~ Bit 0| | DSCP | unused | flag |unused | |-----------------------0x01---000000---| | | | | ---| Conditional flag v only restore if set |-ip diffserv-| | 6 bits | |-------------| The skb mark restore mode (cpmark): This mode copies the firewall conntrack mark to the skb's mark field. It is completely the functional equivalent of the existing act_connmark action with the additional feature of being able to apply a mask to the restored value. Parameters related to skb mark restore mode: mask - a 32 bit mask applied to the firewall conntrack mark to mask out bits unwanted for restoration. This can be useful where the conntrack mark is being used for different purposes by different applications. If not specified and by default the whole mark field is copied (i.e. default mask of 0xffffffff) e.g. mask 0x00ffffff to mask out the top 8 bits being used by the aforementioned DSCP restore mode. |----0x00----conntrack mark----ffffff---| | Bits 31-24 | | | DSCP & flag| some value here | |---------------------------------------| | | v |------------skb mark-------------------| | | | | zeroed | | |---------------------------------------| Overall parameters: zone - conntrack zone control - action related control (reclassify | pipe | drop | continue | ok | goto chain <CHAIN_INDEX>) Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> Reviewed-by: Toke Høiland-Jørgensen <toke@redhat.com> Acked-by: Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net> Make suitable adjustments for backporting to 4.14 & 4.19 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: Remove support for kernel 3.18Hauke Mehrtens2019-05-031-6/+3
| | | | | | | | | | No target is using kernel 3.18 anymore, remove all the generic support for kernel 3.18. The removed packages are depending on kernel 3.18 only and are not used on any recent kernel. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* linux: Add kmod-sched-act-vlanHauke Mehrtens2019-03-251-0/+16
| | | | | | This allows to configure rules to push or pop vlan headers. Signed-off-by: Hauke Mehrtens <hauke.mehrtens@intel.com>
* linux: Add kmod-sched-flowerHauke Mehrtens2019-03-251-0/+16
| | | | | | | This allows to classify packets based on a configurable combination of packet keys and masks. Signed-off-by: Hauke Mehrtens <hauke.mehrtens@intel.com>
* linux: Add kmod-sched-mqprioHauke Mehrtens2019-03-251-0/+16
| | | | | | This adds Multi-queue priority scheduler (MQPRIO). Signed-off-by: Hauke Mehrtens <hauke.mehrtens@intel.com>
* kernel/modules: add kmod-bpf-test packageTony Ambardar2019-02-111-0/+11
| | | | | | | | Add the test_bpf module that runs various test vectors against the BPF interpreter or BPF JIT compiler. The module must be manually loaded, as with the kmod-crypto-test module which serves a similar purpose. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: add kmod-sched-bpf packageTony Ambardar2019-02-111-1/+17
| | | | | | | Add cls_bpf and act_bpf modules for additional tc classifier and action support of cBPF and eBPF. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: add kmod-sched-ipset packageTony Ambardar2019-02-111-1/+16
| | | | | | | | Add em_ipset module to support tc filter classification by IP set. Build as a standalone package to help avoid pulling in rest of kmod-sched and isolate new dependency on kmod-ipt-ipset. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: kmod-sched: add some common, useful actionsTony Ambardar2019-02-111-1/+5
| | | | | | | | | | | | | Add act_pedit, act_csum, act_gact and act_simple modules for additional tc action support. Module act_simple helps with debug and logging, similar to iptables LOG target, while act_gact provides common generic actions. Modules act_pedit and act_csum support general packet mangling, and have been the subject of feature requests and forum discussions (e.g. DSCP), as well as being added to the Turris OS fork of OpenWrt ~2 years ago. Also select dependency kmod-lib-crc32c to support act_csum. Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel/modules: kmod-sched-core: add missing dependency, useful moduleTony Ambardar2019-02-111-2/+4
| | | | | | | | | | | | | | | | All tc ematch modules, including those in kmod-sched-core and kmod-sched, use cls_basic as a core dependency. Relocate cls_basic from kmod-sched to kmod-sched-core to avoid requiring kmod-sched unnecessarily. This change is also backwards compatible since any past tc ematch users will have had to install both kmod-sched-core and kmod-sched anyway. Add the matchall kernel module cls_matchall introduced in kernel 4.8. The matchall classifier matches every packet and allows the user to apply actions on it. It is a simpler, more efficient replacement for the common but cryptic tc classifier idiom "u32 match u32 0 0". Signed-off-by: Tony Ambardar <itugrok@yahoo.com>
* kernel: Make kmod-mpls depend on iptunnel in kernel 4.19Hauke Mehrtens2018-12-151-1/+1
| | | | | | This new dependency is needed with kernel 4.19. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: Remove dependencies on old kernelsRosen Penev2018-11-011-3/+3
| | | | | | Kernels 4.1 and 4.4 are not part of the tree anymore. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* kernel/modules: add kmod-fou6 packageDeng Qingfang2018-10-201-0/+21
| | | | | | IPv6 support for Foo-over-UDP tunnel Signed-off-by: Deng Qingfang <dengqf6@mail2.sysu.edu.cn>
* kernel: add kmod-tcp-bbrKeith Wong2018-08-251-0/+31
| | | | | | | | | | | | This adds support for BBR (Bottleneck Bandwidth and RTT) TCP congestion control. Applications (e.g. webservers, VPN client/server) which initiate connections from router side can benefit from this. This provide an easier way for users to use BBR by selecting / installing kmod-tcp-bbr instead of altering kernel config and compiling firmware by themselves. Signed-off-by: Keith Wong <keithwky@gmail.com>
* kernel: kmod-geneve: kmod for Geneve tunnelingYousong Zhou2018-02-281-0/+23
| | | | | | This will be required for Open vSwitch geneve tunneling support Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* kernel: remove kmod-appletalkFelix Fietkau2018-02-221-22/+0
| | | | | | | This has been obsolete for many years now and has been implicated in a recent build failure Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kmod-sched: add sch_multiq to extra schedulersPhilip Prindeville2018-02-131-0/+1
| | | | | | | For hardware that supports multiple h/w output queues, add a compatible scheduler (NET_SCH_MULTIQ). Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
* kernel: add kmod-fouFilip Moc2018-02-101-0/+22
| | | | | | | | | Once installed fou kernel module allows you to use FOU (Foo over UDP) and GUE (Generic UDP encapsulation) tunnel protocols. To get ip fou command working you also need to install ip-full. Signed-off-by: Filip Moc <lede@moc6.cz>
* kernel: kmod-rxrpc: handle renamed kernel moduleHauke Mehrtens2017-12-161-2/+3
| | | | | | | The kernel module was renamed with kernel 4.11, handle that in the package definition. Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: deactivate some new network featuresHauke Mehrtens2017-12-161-2/+6
| | | | | | | | | | | This deactivates the following options which were introduced between kernel 4.9 and 4.14 in some kernel packages: CONFIG_INET_ESP_OFFLOAD CONFIG_INET6_ESP_OFFLOAD CONFIG_LWTUNNEL_BPF CONFIG_NET_9P_XEN Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: kmod-macsec module for 4.9Christian Lamparter2017-10-151-0/+15
| | | | | | | | | | | | | | | | | | | MACsec/IEEE 802.1AE is useful to secure communication to and from endpoints at Layer 2. Starting with 4.6, the linux kernel provides a universal macsec driver for authentication and encryption of traffic in a LAN, typically with GCM-AES-128, and optional replay protection. http://standards.ieee.org/getieee802/download/802.1AE-2006.pdf Note: LEDE can utilize MACsec with a static connectivity association key (static PSK) with the ip-full package installed. <http://man7.org/linux/man-pages/man8/ip-macsec.8.html> Signed-off-by: Christian Lamparter <chunkeey@gmail.com>
* kernel: kmod packaging for Intel 10G ethernet ixgbe driverPhilip Prindeville2017-03-291-0/+16
| | | | | | | A lot of Ivybridge and Haswell servers have the 82598/82599 Ethernet controllers. Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>