| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
SVN-Revision: 27025
|
|
|
|
|
|
| |
introduce connection stability issues
SVN-Revision: 27024
|
|
|
|
| |
SVN-Revision: 27022
|
|
|
|
| |
SVN-Revision: 27021
|
|
|
|
|
|
|
|
|
|
|
| |
* Add missing config symbols
* Update package/kernel for 2.6.39
CONFIG_BT_L2CAP=y and CONFIG_BT_SCO=y are set to build them into the bluetooth module.
Thank you Jonas Gorski for the patch
SVN-Revision: 27010
|
|
|
|
| |
SVN-Revision: 27000
|
|
|
|
| |
SVN-Revision: 26999
|
|
|
|
| |
SVN-Revision: 26996
|
|
|
|
|
|
| |
Signed-off-by: Christoph König <christoph.koenig@ikt.uni-hannover.de>
SVN-Revision: 26995
|
|
|
|
|
|
| |
issues on wifi re-configuration
SVN-Revision: 26990
|
|
|
|
| |
SVN-Revision: 26986
|
|
|
|
|
|
|
|
| |
dependency to kmod-crypto-iv. chainiv.ko and eseqiv.ko from kmod-crypto-iv depend on crypto_blkcipher.ko from kmod-crypto-manager.
Signed-off-by: Lars Hjersted <lars@hjersted.com>
SVN-Revision: 26984
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
for dnsmasq.init allows to assign a hostname to a particular mac-address. It's useful to override the client supplied hostname, especially if the client does not supply a hostname at all.
It corresponds to the following example in dnsmasq.conf.example:
# Always set the name of the host with hardware address
# 11:22:33:44:55:66 to be "fred"
#dhcp-host=11:22:33:44:55:66,fred
Regards
Mathias
SVN-Revision: 26983
|
|
|
|
| |
SVN-Revision: 26977
|
|
|
|
| |
SVN-Revision: 26970
|
|
|
|
|
|
| |
operator precedence
SVN-Revision: 26968
|
|
|
|
|
|
| |
confusing
SVN-Revision: 26961
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
broadcom-wl driver bound to ssb device with ssb driver probe
have osh handle struct pdev pointer value initialized with
ssb_device pointer. Later on pdev is used with legacy pci
dma api as pci_dev thus causing oops sometimes.
The patch replaces legacy pci dma api and pass relevant
device struct pointer to avoid crashes.
Signed-off-by: George Kashperko <george@znau.edu.ua>
SVN-Revision: 26949
|
|
|
|
|
|
|
|
| |
It was causing an occasional kernel oops.
Signed-off-by: Nathan Hintz <nlhintz@hotmail.com>
SVN-Revision: 26948
|
|
|
|
| |
SVN-Revision: 26947
|
|
|
|
| |
SVN-Revision: 26934
|
|
|
|
| |
SVN-Revision: 26933
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
the attached patch makes ipcalc.sh accept IP/Netmask combinations in
CIDR notation. Before you could only do:
# sh ipcalc.sh 192.168.0.0 255.255.255.0 1 10
IP=192.168.0.0
NETMASK=255.255.255.0
BROADCAST=192.168.0.255
NETWORK=192.168.0.0
PREFIX=24
START=192.168.0.1
END=192.168.0.11
with this patch you can also execute it with:
sh ipcalc.sh 192.168.0.0/24 1 10
IP=192.168.0.0
NETMASK=255.255.255.0
BROADCAST=192.168.0.255
NETWORK=192.168.0.0
PREFIX=24
START=192.168.0.1
END=192.168.0.11
The patch is based on #1260 [1], i just changed one line to calculate
the START end END ips right. I wonder why that never got included. If
there is no reason not to do i would like to ask you to commit that
patch, because its a functionality i (and probably others) miss quite often.
Btw, i also fixed 4 useless tabs, that might look a bit strange in the
patch.
Regards, Manuel
SVN-Revision: 26930
|
|
|
|
|
|
| |
override (thx, KanjiMonster)
SVN-Revision: 26927
|
|
|
|
|
|
| |
requests in ad-hoc mode without creating too much spam
SVN-Revision: 26923
|
|
|
|
|
|
| |
Signed-off-by: Jan Willies <jan@willies.info>
SVN-Revision: 26920
|
|
|
|
|
|
| |
some instances
SVN-Revision: 26915
|
|
|
|
| |
SVN-Revision: 26913
|
|
|
|
| |
SVN-Revision: 26912
|
|
|
|
|
|
|
|
|
| |
Since the oldest kernel in trunk is 2.6.30 the modules always use the
newer names, so we can just use the _generic prefix directly.
Signed-off-by: Jonas Gorski <jonas.gorski+openwrt@gmail.com>
SVN-Revision: 26903
|
|
|
|
|
|
|
|
|
| |
There's only 2.6, so it doesn't make sense to mention modules that are
2.4 only or for modules that they are available only for 2.6.
Signed-off-by: Jonas Gorski <jonas.gorski+openwrt@gmail.com>
SVN-Revision: 26902
|
|
|
|
|
|
|
|
|
| |
With no 2.4 support in trunk, we can safely remove any 2.4 definitions for
kmods and merge the 2.6 definitions into the generic ones.
Signed-off-by: Jonas Gorski <jonas.gorski+openwrt@gmail.com>
SVN-Revision: 26901
|
|
|
|
|
|
|
|
|
| |
Since there's only 2.6 in trunk $(KMOD_SUFFIX) can be safely replaced with
ko for all mainline kernel modules.
Signed-off-by: Jonas Gorski <jonas.gorski+openwrt@gmail.com>
SVN-Revision: 26900
|
|
|
|
|
|
|
|
| |
stuff into its own file makes sense.
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
SVN-Revision: 26868
|
|
|
|
|
|
| |
space, so a default route of ::/0 is more correct. Thanks Dave Taht
SVN-Revision: 26857
|
|
|
|
|
|
| |
usb_modeswitch on boot and possibly others (#9352)
SVN-Revision: 26848
|
|
|
|
| |
SVN-Revision: 26841
|
|
|
|
| |
SVN-Revision: 26822
|
|
|
|
| |
SVN-Revision: 26819
|
|
|
|
| |
SVN-Revision: 26816
|
|
|
|
| |
SVN-Revision: 26815
|
|
|
|
|
|
|
|
| |
unprovided kernel crypto modules that are useful for IPSEC. This is an alternative to breaking these modules out into kmod-crypto-wq (crypto_wq.ko), kmod-crypto-rng (rng.ko and krng.ko), and kmod-crypto-iv (eseqiv.ko and chainiv.ko).
Signed-off-by: Lars Hjersted <lars@hjersted.com>
SVN-Revision: 26814
|
|
|
|
|
|
|
|
| |
kmod-ipsec. Also remove the extraneous kmod-crypto-core dependency to eliminate recursion.
Signed-off-by: Lars Hjersted <lars@hjersted.com>
SVN-Revision: 26813
|
|
|
|
|
|
|
|
|
|
|
|
| |
kmod-crypto-rng, and kmod-crypto-iv packages. These packages provide some missing kernel crypto modules which are required for IPSEC. The strongswan4, ipsec-tools, and possibly other IPSEC packages do not work properly without these modules.
NOTE: The KCONFIG associated with each of these modules gets selected
whenever CRYPTO_MANAGER (kmod-crypto-manager) is selected so these
modules are already being built.
Signed-off-by: Lars Hjersted <lars@hjersted.com>
SVN-Revision: 26812
|
|
|
|
|
|
| |
deadlocks
SVN-Revision: 26810
|
|
|
|
| |
SVN-Revision: 26809
|
|
|
|
| |
SVN-Revision: 26808
|
|
|
|
| |
SVN-Revision: 26807
|
|
|
|
| |
SVN-Revision: 26806
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
passthrough Two examples of potentially useful configurations (commented out, of course):
(a) map the ssh service running on the firewall to 22001 externally, without modifying the configuration of the daemon itself. this allows port 22 on the WAN side to then be port-forwarded to a
LAN-based machine if desired, or if not, simply obscures the port from external attack.
(b) allow IPsec/ESP and ISAKMP (UDP-based key exchange) to happen by default. useful for most modern VPN clients you might have on your WAN.
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
SVN-Revision: 26805
|