aboutsummaryrefslogtreecommitdiffstats
path: root/package
Commit message (Collapse)AuthorAgeFilesLines
* procd: update to latest git HEADJohn Crispin2017-03-011-3/+3
| | | | | | | | | | | 5f91241 procd: add cancel_timeout on rc scripts when a runtime_timeout is specified 961dc69 procd: stop service using SIGKILL if SIGTERM failed to do so Fixes FS#516. Signed-off-by: John Crispin <john@phrozen.org> (cherry picked from commit 946d1dfb87d41cf9ffb487522f6a84a5e87edafb) Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* procd: update to the latest versionFelix Fietkau2017-03-011-3/+3
| | | | | | | Fixes compatibility issues with glibc 2.25 Signed-off-by: Felix Fietkau <nbd@nbd.name> (cherry picked from commit 2ffb80bc9f829f81878b12a10b0a352d3f76c421)
* hostapd: fix feature indicationJo-Philipp Wich2017-03-011-2/+14
| | | | | | | | - Fix eap test to work with standalone hostapd builds - Fix 11n test to check the correct define - Add 11ac, 11r and 11w tests Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* relayd: fix making incomplete instance json dataYousong Zhou2017-02-262-7/+14
| | | | | | | | Defer procd_open_instance only after validity check passed. Fixes FS#541 Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* relayd: remove old start-stop-service related codeYousong Zhou2017-02-261-15/+0
| | | | Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* ppp: ppp6-up: add executable permission bitYousong Zhou2017-02-261-0/+0
| | | | Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* mac80211: hwsim: select DRIVER_11AC_SUPPORT and DRIVER_11W_SUPPORTYousong Zhou2017-02-261-1/+1
| | | | | | | | This is required for default wireless configuration of malta target to work out of the box again. Fixes "77ece30e: hostapd: Add ability to specify that that wireless driver supports 802.11ac" Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* openvpn: adding key_direction to append_params.Brandon Koepke2017-02-261-2/+2
| | | | | | | | key_direction shows up as an openvpn option in the user-interface but does not end up in the /var/etc/openvpn*.conf file. Adding it to the list here fixed the issue for me. Signed-off-by: Brandon Koepke <bdkoepke@fastmail.com> [Fixes FS#537] Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* ubus: update to the latest versionFelix Fietkau2017-02-251-3/+3
| | | | | | | | | | c09e4f0 ubusd: fix incomplete copy of shared buf during queue-ing 453b87f cli: add support for subscribing to objects 6eb3c96 cli: do not use default timeout for listen dfe3383 libubus: reset ctx->sock.error when doing ubus reconnect 34c6e81 cli: fix listen_timeout compile issue Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ubus: update to the latest versionFelix Fietkau2017-02-251-3/+3
| | | | | | | | | Adds the following fixes: 91acde6 libubus: do not modify uloop_cancelled 763b9b2 libubus: reset ctx->sock.eof to fix reconnect issues Signed-off-by: Felix Fietkau <nbd@nbd.name>
* libubox: Update to latest versionTed Hess2017-02-251-3/+3
| | | | | | 9d6305a utils: Change calloc_a() to return size_t aligned pointers Signed-off-by: Ted Hess <thess@kitschensync.net>
* libubox: update to the latest versionFelix Fietkau2017-02-251-3/+3
| | | | | | | | | | | | | | | Adds the following changes: de3f14b uloop: add uloop_cancelling function 3b6181b utils: fix build on Mac OS X 10.12 7f671b1 blobmsg: add support for double 0fe1374 utils: add helper functions useful for allocating a ring buffer 8fc1c30 libubox: replace strtok with _r version. 4a9f74f libubox: allow reading out the pid of uloop process in lua 372e1e6 uloop: remove useless epoll data assignment f9db1cb libubox: allow reading out the remaining time of a uloop timer in Lua Signed-off-by: Felix Fietkau <nbd@nbd.name>
* acx-mac80211: fix scan API error that could lead to a crashFelix Fietkau2017-02-241-0/+29
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* iw: sync nl80211.h with mac80211 packageFelix Fietkau2017-02-241-5/+289
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mac80211: sync with master branch as of 9edff13abd97Felix Fietkau2017-02-24214-12942/+1799
| | | | | | | | | | | | | | | | Includes the following changes: 9edff13abd mac80211: disable potentially harmful PS software retry for A-MPDU sessions 75216a76b0 mac80211: backport upstream fix for CSA in IBSS mode 368cc8ef47 mac80211: update brcmfmac backporting brcmf_err cleanups 66a63d25c4 mac80211: fix build on linux 3.18 9eacb9d7fc rt2x00: mt7620: lots of improvements fd94fa61a7 mac80211: brcmfmac: update Raspberry Pi patches for linux 4.9 649e766a64 mac80211: update to wireless-testing 2017-01-31 47540afa5d ath9k: add a warning to the tx99 config option b367eef21d mac80211: rt2x00: add support for external LNA on MT7620 9200e168f2 mac80211: move (& update) upstream accepted brcmfmac patches Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ath10k-ct: depend on kmod-hwmon-core, it gets used when CONFIG_THERMAL is setFelix Fietkau2017-02-241-1/+1
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ath10k-ct: fix kernel api compatibility issuesFelix Fietkau2017-02-242-0/+108
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ath10k-ct: Fix performance of 2x2 hardware running 3x3 firmware.Ben Greear2017-02-241-3/+3
| | | | | | | The driver had a bug when calculating the rateset. This resolves that and allows full VHT mcs rates on 2x2 hardware. Signed-off-by: Ben Greear <greearb@candelatech.com>
* mt76: split kmod packageJoseph C. Lehner2017-02-231-13/+49
| | | | | | | | | | | | | | | | This patch splits `kmod-mt76` into three separate packages: `kmod-mt76-core`, `kmod-mt76x2` and `kmod-mt7603`. By making `kmod-mt76` a metapackage containing these new packages, the previous behaviour of including all drivers and firmware is left unchanged, unless explicitly unselected in `DEVICE_PACKAGES`. This splitting is especially beneficial for devices with small flash chips, since the `kmod-mt76` package currently requires ~160K on squashfs (after compression). Signed-off-by: Joseph C. Lehner <joseph.c.lehner@gmail.com> Signed-off-by: Felix Fietkau <nbd@nbd.name> [cleanup]
* dnsmasq: Add upstream patch fixing SERVFAIL issues with multiple serversBaptiste Jonglez2017-02-201-0/+130
| | | | | | This fixes FS#391 for lede-17.01 Signed-off-by: Baptiste Jonglez <git@bitsofnetworks.org>
* Revert "px5g-standalone: provide px5g via PROVIDES"Stijn Tintel2017-02-201-1/+0
| | | | | | | | | | | | | This reverts commit cc66f819b4e778732a32f08f5dc39a2554682b73. This commit causes opkg to install px5g-standalone instead of px5g when installing luci-ssl. As luci-ssl depends on mbedtls, using px5g-standalone makes no sense. Next to that, it creates deprecated SHA1 certificates. Revert the commit to avoid pxg5-standalone to be installed by accident. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> (cherry picked from commit ca8aee0c570561fc59fb0d0e6b5eac418054c372)
* uboot-kirkwood: fix goflexhome/net bootcommandAlberto Bursi2017-02-191-1/+1
| | | | | | | | | | Goflexhome/net use uImage, and to boot an uImage the u-boot must use bootm command, not bootz. Fixes the "i cannot boot LEDE with this u-boot" issue that I found out myself with my goflexnet. Signed-off-by: Alberto Bursi <alberto.bursi@outlook.it>
* uhttpd: use sha256 when generating certificates with openssl (FS#512)Felix Fietkau2017-02-171-1/+1
| | | | | | Patch from attachment to FS#512 Signed-off-by: Felix Fietkau <nbd@nbd.name>
* dropbear: bump PKG_RELEASEStijn Tintel2017-02-171-1/+1
| | | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> (cherry picked from commit 27040dbf89fb45dd9b5cc663e23bb19afc294d29)
* dropbear: enable SHA256 HMACsJoseph C. Sible2017-02-171-3/+2
| | | | | | | | | The only HMACs currently available use MD5 and SHA1, both of which have known weaknesses. We already compile in the SHA256 code since we use Curve25519 by default, so there's no significant size penalty to enabling this. Signed-off-by: Joseph C. Sible <josephcsible@users.noreply.github.com> (cherry picked from commit 0bf85ef04806e0fd5a6f78ac9f6a32aabb1e7fdc)
* ugps: fix typoCezary Jackiewicz2017-02-162-2/+2
| | | | | | | | | | | | | | | | | | | | | | | Removing redundant spaces from the name of the option. Without fix: root@LEDE:~# opkg install ugps Installing ugps (2016-10-24-32a6b2b7-1) to root... Downloading http://downloads.lede-project.org/releases/17.01-SNAPSHOT/packages/mips_24kc/base/ugps_2016-10-24-32a6b2b7-1_mips_24kc.ipk Configuring ugps. uci: Parse error (invalid character in name field) at line 3, byte 23 uci: Parse error (invalid character in name field) at line 3, byte 23 sh: out of range root@LEDE:~# uci show gps uci: Parse error (invalid character in name field) at line 3, byte 23 With this fix: root@LEDE:~# uci show gps gps.@gps[0]=gps gps.@gps[0].tty='ttyACM0' gps.@gps[0].adjust_time='1' Signed-off-by: Cezary Jackiewicz <cezary@eko.one.pl>
* qos-scripts: fix module load commands (FS#438)Felix Fietkau2017-02-151-2/+1
| | | | | | | fq_codel is built-in, and xt_CONNMARK is provided by the xt_connmark module Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mdns: update and rename package to the umdnsRafał Miłecki2017-02-154-24/+24
| | | | | | | | | | | | | | This update includes numerous small fixes for: 1) Interfaces setup 2) Packets parsing 3) Sending replies Without this there were multiple problems with exchanging information between (u)mdns and other implementations (including (u)mdns as well). This also follows project rename to umdns which was required to avoid confusion with Apple's mdnsd from mDNSResponder project. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* build: add buildbot specific config option for setting defaultsFelix Fietkau2017-02-151-1/+1
| | | | | | | | | | This can be used to tweak the buildbot behavior without having to change buildbot's configuration. It will also allow us to add more aggressive clean steps (e.g. on toolchain changes), which would break developers' workflows if enable by default. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* package/uboot-envtools: add OpenMesh A40 supportSven Eckelmann2017-02-151-0/+1
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/om-watchdog: add OpenMesh A40 supportSven Eckelmann2017-02-151-0/+1
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/uboot-envtools: add OpenMesh a60 supportSven Eckelmann2017-02-151-0/+1
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/om-watchdog: add OpenMesh A60 supportSven Eckelmann2017-02-151-1/+2
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/uboot-envtools: add OpenMesh OM2Pv4/-HSv4 supportSven Eckelmann2017-02-151-1/+3
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/om-watchdog: add OpenMesh OM2Pv4/-HSv4 supportSven Eckelmann2017-02-151-0/+2
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* procd: fix default timeout for reload trigger actionsDenis Osvald2017-02-151-5/+2
| | | | | | | | | | | | | Default trigger action timeout was added to procd.sh in commit f88e3a4c0 (procd: add default timeout for reload trigger actions) However, the timeout value was not placed under the correct JSON-script array nesting level and thus did not apply. To fix this and make the timeout actually apply to the reload triggers, we place it in the correct scope, that is the per-trigger array. Fixes: f88e3a4c0abb60bb76a7678dd30dfdc8a808a2f1 Signed-off-by: Denis Osvald <denis.osvald@sartura.hr>
* ath9k: fix various issues in the airtime-fairness implementationFelix Fietkau2017-02-122-1/+108
| | | | | | | Effects of the bugs could include memory corruption, tx hangs, kernel crahes, possibly other things as well Signed-off-by: Felix Fietkau <nbd@nbd.name>
* odhcpd: update to git HEAD version (FS#396)Hans Dedecker2017-02-091-3/+3
| | | | | | | | | 8df4253 ndp: harden netlink event socket error handling b02f3e6 ndp: close proc file descriptor also during error handling 8a615ad npd: rework IPv6 relay logic (FS#396) 0129f79 config: restore interface defaults when cleaning interface Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcpd: update to git HEAD version (FS#388)Hans Dedecker2017-02-091-5/+5
| | | | | | | | 3317c86 dhcpv6-ia: apply lease delete based on assignment bound state df50429 odhcpd: properly handle netlink messages (FS#388) 83d72cf odhcpd: fix coding style Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* procd: update to latest git HEADJohn Crispin2017-02-081-3/+3
| | | | | | cdc3dab ujail: fix signal forwarding Signed-off-by: John Crispin <john@phrozen.org>
* brcmfmac: improve Raspberry Pi 3 stabilityÁlvaro Fernández Rojas2017-02-072-2/+25
| | | | | | | - Really disable power management (wrong config flags). - Disable internal roaming engine. Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
* tcpdump: update to version 4.9.0Hauke Mehrtens2017-02-064-81/+81
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes the following 41 security problems: + CVE-2016-7922: buffer overflow in print-ah.c:ah_print(). + CVE-2016-7923: buffer overflow in print-arp.c:arp_print(). + CVE-2016-7924: buffer overflow in print-atm.c:oam_print(). + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print(). + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print(). + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print(). + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print(). + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header(). + CVE-2016-7930: buffer overflow in print-llc.c:llc_print(). + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print(). + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum(). + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print(). + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print(). + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print(). + CVE-2016-7936: buffer overflow in print-udp.c:udp_print(). + CVE-2016-7937: buffer overflow in print-udp.c:vat_print(). + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame(). + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions. + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions. + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions. + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions. + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print(). + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print(). + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print(). + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print(). + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions. + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print(). + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print(). + CVE-2016-8575: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print(). + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print(). + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print(). + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print(). + CVE-2017-5341: buffer overflow in print-otv.c:otv_print(). + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). + CVE-2017-5482: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse(). + CVE-2017-5484: buffer overflow in print-atm.c:sig_print(). + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap(). + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print(). The size of the package is only incread very little: new size: 306430 tcpdump_4.9.0-1_mips_24kc.ipk 130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk old size: 302782 tcpdump_4.8.1-1_mips_24kc.ipk 129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* mac80211: brcmfmac: backport wowlan netdetect fixesRafał Miłecki2017-02-064-2/+149
| | | | | | | | | | | | | | I needed a moment to figure out relation between this patchset and the nl80211: fix validation of scheduled scan info for wowlan netdetect It appears nl80211 commit will go on top of brcmfmac changes so it's safe to backport these patches. One patch that was excluded is commit 2a2a5d1835b6 ("brcmfmac: add .update_connect_params() callback") as it depends on missing commit 088e8df82f91 ("cfg80211: Add support to update connection parameters"). Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport PSM watchdog improvementsRafał Miłecki2017-02-062-0/+96
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport minor code cleanupsRafał Miłecki2017-02-069-1/+363
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport 4.10 fixes & typo fixRafał Miłecki2017-02-063-0/+111
| | | | | | This includes memory leak fix in initialization path. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport scheduled scan cleanup and chip supportRafał Miłecki2017-02-0618-11/+2200
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport some old patches from 2016Rafał Miłecki2017-02-068-8/+332
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: rename brcmfmac patches to use higher prefixRafał Miłecki2017-02-063-0/+0
| | | | | | There are more patches to backport that should go before these. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: start hostapd with logging wpa_printf messages to syslogRafał Miłecki2017-02-051-1/+1
| | | | | | | Some debugging/error messages are printed using wpa_printf and this change allows finally reading them out of the syslog. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>