aboutsummaryrefslogtreecommitdiffstats
path: root/package
Commit message (Collapse)AuthorAgeFilesLines
...
* mac80211: sync with master branch as of 9edff13abd97Felix Fietkau2017-02-24214-12942/+1799
| | | | | | | | | | | | | | | | Includes the following changes: 9edff13abd mac80211: disable potentially harmful PS software retry for A-MPDU sessions 75216a76b0 mac80211: backport upstream fix for CSA in IBSS mode 368cc8ef47 mac80211: update brcmfmac backporting brcmf_err cleanups 66a63d25c4 mac80211: fix build on linux 3.18 9eacb9d7fc rt2x00: mt7620: lots of improvements fd94fa61a7 mac80211: brcmfmac: update Raspberry Pi patches for linux 4.9 649e766a64 mac80211: update to wireless-testing 2017-01-31 47540afa5d ath9k: add a warning to the tx99 config option b367eef21d mac80211: rt2x00: add support for external LNA on MT7620 9200e168f2 mac80211: move (& update) upstream accepted brcmfmac patches Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ath10k-ct: depend on kmod-hwmon-core, it gets used when CONFIG_THERMAL is setFelix Fietkau2017-02-241-1/+1
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ath10k-ct: fix kernel api compatibility issuesFelix Fietkau2017-02-242-0/+108
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* ath10k-ct: Fix performance of 2x2 hardware running 3x3 firmware.Ben Greear2017-02-241-3/+3
| | | | | | | The driver had a bug when calculating the rateset. This resolves that and allows full VHT mcs rates on 2x2 hardware. Signed-off-by: Ben Greear <greearb@candelatech.com>
* mt76: split kmod packageJoseph C. Lehner2017-02-231-13/+49
| | | | | | | | | | | | | | | | This patch splits `kmod-mt76` into three separate packages: `kmod-mt76-core`, `kmod-mt76x2` and `kmod-mt7603`. By making `kmod-mt76` a metapackage containing these new packages, the previous behaviour of including all drivers and firmware is left unchanged, unless explicitly unselected in `DEVICE_PACKAGES`. This splitting is especially beneficial for devices with small flash chips, since the `kmod-mt76` package currently requires ~160K on squashfs (after compression). Signed-off-by: Joseph C. Lehner <joseph.c.lehner@gmail.com> Signed-off-by: Felix Fietkau <nbd@nbd.name> [cleanup]
* dnsmasq: Add upstream patch fixing SERVFAIL issues with multiple serversBaptiste Jonglez2017-02-201-0/+130
| | | | | | This fixes FS#391 for lede-17.01 Signed-off-by: Baptiste Jonglez <git@bitsofnetworks.org>
* Revert "px5g-standalone: provide px5g via PROVIDES"Stijn Tintel2017-02-201-1/+0
| | | | | | | | | | | | | This reverts commit cc66f819b4e778732a32f08f5dc39a2554682b73. This commit causes opkg to install px5g-standalone instead of px5g when installing luci-ssl. As luci-ssl depends on mbedtls, using px5g-standalone makes no sense. Next to that, it creates deprecated SHA1 certificates. Revert the commit to avoid pxg5-standalone to be installed by accident. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> (cherry picked from commit ca8aee0c570561fc59fb0d0e6b5eac418054c372)
* uboot-kirkwood: fix goflexhome/net bootcommandAlberto Bursi2017-02-191-1/+1
| | | | | | | | | | Goflexhome/net use uImage, and to boot an uImage the u-boot must use bootm command, not bootz. Fixes the "i cannot boot LEDE with this u-boot" issue that I found out myself with my goflexnet. Signed-off-by: Alberto Bursi <alberto.bursi@outlook.it>
* uhttpd: use sha256 when generating certificates with openssl (FS#512)Felix Fietkau2017-02-171-1/+1
| | | | | | Patch from attachment to FS#512 Signed-off-by: Felix Fietkau <nbd@nbd.name>
* dropbear: bump PKG_RELEASEStijn Tintel2017-02-171-1/+1
| | | | | Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> (cherry picked from commit 27040dbf89fb45dd9b5cc663e23bb19afc294d29)
* dropbear: enable SHA256 HMACsJoseph C. Sible2017-02-171-3/+2
| | | | | | | | | The only HMACs currently available use MD5 and SHA1, both of which have known weaknesses. We already compile in the SHA256 code since we use Curve25519 by default, so there's no significant size penalty to enabling this. Signed-off-by: Joseph C. Sible <josephcsible@users.noreply.github.com> (cherry picked from commit 0bf85ef04806e0fd5a6f78ac9f6a32aabb1e7fdc)
* ugps: fix typoCezary Jackiewicz2017-02-162-2/+2
| | | | | | | | | | | | | | | | | | | | | | | Removing redundant spaces from the name of the option. Without fix: root@LEDE:~# opkg install ugps Installing ugps (2016-10-24-32a6b2b7-1) to root... Downloading http://downloads.lede-project.org/releases/17.01-SNAPSHOT/packages/mips_24kc/base/ugps_2016-10-24-32a6b2b7-1_mips_24kc.ipk Configuring ugps. uci: Parse error (invalid character in name field) at line 3, byte 23 uci: Parse error (invalid character in name field) at line 3, byte 23 sh: out of range root@LEDE:~# uci show gps uci: Parse error (invalid character in name field) at line 3, byte 23 With this fix: root@LEDE:~# uci show gps gps.@gps[0]=gps gps.@gps[0].tty='ttyACM0' gps.@gps[0].adjust_time='1' Signed-off-by: Cezary Jackiewicz <cezary@eko.one.pl>
* qos-scripts: fix module load commands (FS#438)Felix Fietkau2017-02-151-2/+1
| | | | | | | fq_codel is built-in, and xt_CONNMARK is provided by the xt_connmark module Signed-off-by: Felix Fietkau <nbd@nbd.name>
* mdns: update and rename package to the umdnsRafał Miłecki2017-02-154-24/+24
| | | | | | | | | | | | | | This update includes numerous small fixes for: 1) Interfaces setup 2) Packets parsing 3) Sending replies Without this there were multiple problems with exchanging information between (u)mdns and other implementations (including (u)mdns as well). This also follows project rename to umdns which was required to avoid confusion with Apple's mdnsd from mDNSResponder project. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* build: add buildbot specific config option for setting defaultsFelix Fietkau2017-02-151-1/+1
| | | | | | | | | | This can be used to tweak the buildbot behavior without having to change buildbot's configuration. It will also allow us to add more aggressive clean steps (e.g. on toolchain changes), which would break developers' workflows if enable by default. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* package/uboot-envtools: add OpenMesh A40 supportSven Eckelmann2017-02-151-0/+1
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/om-watchdog: add OpenMesh A40 supportSven Eckelmann2017-02-151-0/+1
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/uboot-envtools: add OpenMesh a60 supportSven Eckelmann2017-02-151-0/+1
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/om-watchdog: add OpenMesh A60 supportSven Eckelmann2017-02-151-1/+2
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/uboot-envtools: add OpenMesh OM2Pv4/-HSv4 supportSven Eckelmann2017-02-151-1/+3
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* package/om-watchdog: add OpenMesh OM2Pv4/-HSv4 supportSven Eckelmann2017-02-151-0/+2
| | | | Signed-off-by: Sven Eckelmann <sven.eckelmann@open-mesh.com>
* procd: fix default timeout for reload trigger actionsDenis Osvald2017-02-151-5/+2
| | | | | | | | | | | | | Default trigger action timeout was added to procd.sh in commit f88e3a4c0 (procd: add default timeout for reload trigger actions) However, the timeout value was not placed under the correct JSON-script array nesting level and thus did not apply. To fix this and make the timeout actually apply to the reload triggers, we place it in the correct scope, that is the per-trigger array. Fixes: f88e3a4c0abb60bb76a7678dd30dfdc8a808a2f1 Signed-off-by: Denis Osvald <denis.osvald@sartura.hr>
* ath9k: fix various issues in the airtime-fairness implementationFelix Fietkau2017-02-122-1/+108
| | | | | | | Effects of the bugs could include memory corruption, tx hangs, kernel crahes, possibly other things as well Signed-off-by: Felix Fietkau <nbd@nbd.name>
* odhcpd: update to git HEAD version (FS#396)Hans Dedecker2017-02-091-3/+3
| | | | | | | | | 8df4253 ndp: harden netlink event socket error handling b02f3e6 ndp: close proc file descriptor also during error handling 8a615ad npd: rework IPv6 relay logic (FS#396) 0129f79 config: restore interface defaults when cleaning interface Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcpd: update to git HEAD version (FS#388)Hans Dedecker2017-02-091-5/+5
| | | | | | | | 3317c86 dhcpv6-ia: apply lease delete based on assignment bound state df50429 odhcpd: properly handle netlink messages (FS#388) 83d72cf odhcpd: fix coding style Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* procd: update to latest git HEADJohn Crispin2017-02-081-3/+3
| | | | | | cdc3dab ujail: fix signal forwarding Signed-off-by: John Crispin <john@phrozen.org>
* brcmfmac: improve Raspberry Pi 3 stabilityÁlvaro Fernández Rojas2017-02-072-2/+25
| | | | | | | - Really disable power management (wrong config flags). - Disable internal roaming engine. Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
* tcpdump: update to version 4.9.0Hauke Mehrtens2017-02-064-81/+81
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes the following 41 security problems: + CVE-2016-7922: buffer overflow in print-ah.c:ah_print(). + CVE-2016-7923: buffer overflow in print-arp.c:arp_print(). + CVE-2016-7924: buffer overflow in print-atm.c:oam_print(). + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print(). + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print(). + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print(). + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print(). + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header(). + CVE-2016-7930: buffer overflow in print-llc.c:llc_print(). + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print(). + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum(). + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print(). + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print(). + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print(). + CVE-2016-7936: buffer overflow in print-udp.c:udp_print(). + CVE-2016-7937: buffer overflow in print-udp.c:vat_print(). + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame(). + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions. + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions. + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions. + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions. + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print(). + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print(). + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print(). + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print(). + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions. + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print(). + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print(). + CVE-2016-8575: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print(). + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print(). + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print(). + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print(). + CVE-2017-5341: buffer overflow in print-otv.c:otv_print(). + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). + CVE-2017-5482: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse(). + CVE-2017-5484: buffer overflow in print-atm.c:sig_print(). + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap(). + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print(). The size of the package is only incread very little: new size: 306430 tcpdump_4.9.0-1_mips_24kc.ipk 130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk old size: 302782 tcpdump_4.8.1-1_mips_24kc.ipk 129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* mac80211: brcmfmac: backport wowlan netdetect fixesRafał Miłecki2017-02-064-2/+149
| | | | | | | | | | | | | | I needed a moment to figure out relation between this patchset and the nl80211: fix validation of scheduled scan info for wowlan netdetect It appears nl80211 commit will go on top of brcmfmac changes so it's safe to backport these patches. One patch that was excluded is commit 2a2a5d1835b6 ("brcmfmac: add .update_connect_params() callback") as it depends on missing commit 088e8df82f91 ("cfg80211: Add support to update connection parameters"). Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport PSM watchdog improvementsRafał Miłecki2017-02-062-0/+96
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport minor code cleanupsRafał Miłecki2017-02-069-1/+363
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport 4.10 fixes & typo fixRafał Miłecki2017-02-063-0/+111
| | | | | | This includes memory leak fix in initialization path. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport scheduled scan cleanup and chip supportRafał Miłecki2017-02-0618-11/+2200
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: brcmfmac: backport some old patches from 2016Rafał Miłecki2017-02-068-8/+332
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: rename brcmfmac patches to use higher prefixRafał Miłecki2017-02-063-0/+0
| | | | | | There are more patches to backport that should go before these. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* mac80211: start hostapd with logging wpa_printf messages to syslogRafał Miłecki2017-02-051-1/+1
| | | | | | | Some debugging/error messages are printed using wpa_printf and this change allows finally reading them out of the syslog. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* hostapd: enable support for logging wpa_printf messages to syslogRafał Miłecki2017-02-052-0/+6
| | | | | | | This will allow starting hostapd with the new -s parameter and finally read all (error) messages from the syslog. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* hostapd: backport support for sending debug messages to the syslogRafał Miłecki2017-02-056-24/+169
| | | | | | | | | | | | | | | | | It wasn't possible to read hostapd wpa_printf messages unless running hostapd manually. It was because hostapd was printing them using vprintf and not directly to the syslog. We were trying to workaround this problem by redirecting STDIN_FILENO and STDOUT_FILENO but it was working only for the initialization phase. As soon as hostapd did os_daemonize our solution stopped working. Please note despite the subject this change doesn't affect debug level messages only but just everything printed by hostapd with wpa_printf including MSG_ERROR-s. This makes it even more important as reading error messages can be quite useful for debugging. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* ccache, samba36: fix samba.org addresses to use httpsHannu Nyman2017-02-022-5/+5
| | | | | | | | | | | | samba.org has started to enforce https and currently plain http downloads with curl/wget fail, so convert samba.org download links to use https. Modernise links at the same time. Also convert samba.org URL fields to have https. Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
* Fix dependency for hostapdWilco Baan Hofman2017-02-011-1/+1
| | | | Signed-off-by: Wilco Baan Hofman <wilco@baanhofman.nl>
* iproute2: cake: update cake supportKevin Darbyshire-Bryant2017-02-012-11/+24
| | | | | | | Updated cake's tc patch to match the official cake repository formatting. Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
* kmod-sched-cake: Bump to latest versionKevin Darbyshire-Bryant2017-02-011-4/+4
| | | | | | | | | wash, mpu & some memory optimisation have now made it to the official cake repository. Point LEDE to the official repository. Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
* libtool: don't clobber host libtool infrastructureJo-Philipp Wich2017-02-011-7/+7
| | | | | | | | | | | | | | | | The libtool target package stages its files into the host staging directory and moves the libltdl library parts from there into the target staging directory afterwards. By doing so, the package essentially renders the host libtool infrastructure unusable, leading to the below error in subsequent package builds: libtoolize: $pkgltdldir is not a directory: `.../hostpkg/share/libtool` Prevent this problem by using a dedicated libltdl install prefix in order to avoid overwriting and moving away preexisting files belonging to tools/libtool. Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* odhcp6c: use LEDE_GIT in package source urlHans Dedecker2017-02-011-1/+1
| | | | Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcp6c: update to git HEAD versionHans Dedecker2017-02-011-3/+3
| | | | | | | | | | c13b6a0 dhcpv6: fix white space error e9d80cc dhcpv6: trigger restart of DHCPv6 state machine when not receiving statefull options c7122ec update README 419fb63 dhcpv6: server unicast option support Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcpd: use LEDE_GIT in package source urlHans Dedecker2017-02-011-1/+1
| | | | Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcpd: update to git HEAD versionHans Dedecker2017-02-011-3/+3
| | | | | | | | c4f9ace odhcpd: decrease default log level to LOG_INFO a6eadd7 odhcpd: rework IPv6 interface address dump 44965f1 odhcpd: extra syslog tracing Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcpd: update to git HEAD versionHans Dedecker2017-02-011-3/+3
| | | | | | e447ff9 router: fix compile issue on 64 bit systems Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* odhcpd: update to git HEAD versionHans Dedecker2017-02-011-3/+3
| | | | | | | | | | | | 237f1f4 router: convert syslog lifetime traces into LOG_INFO prio da660c7 treewide: rework prio of syslog messages 0485580 ndp: code cleanup c5040fe router: add syslog debug tracing for trouble shooting df023ad treewide: use RELAYD_MAX_ADDRS as address array size c8ac572 ndp: don't scan netlink attributes in case of netlink route event Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* netifd: update to git HEAD versionHans Dedecker2017-02-011-3/+3
| | | | | | 650758b interface-ip: route proto config support (FS#170) Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>