On 11/17/19 12:30 AM, m...@adrianschmutzler.de wrote:
> Hi,
>
> this actually additionally disables netgear-wnr3500l-v1-na without a comment
> about it.
>
> Best
>
> Adrian
Thank you Adrian for the review.
The linked forum post only mentions the wnr2000v2 and not the wnr3500l
which has 8MB of
On 11/17/19 12:32 AM, m...@adrianschmutzler.de wrote:
> Hi,
>
> this disables "Keenetic" and "Keenetic Start".
>
> As there are so many keenetic variants flying around, I'd consider it helpful
> to mention both in the commit message/title.
>
> Best
>
> Adrian
Thank you Adrian for the review.
On 11/17/19 12:29 AM, m...@adrianschmutzler.de wrote:
> Hi,
>
> Here you say WA850, but you disable WA860 ...
>
> Adrian
Thank you Adrian for the review.
The linked forum post only mentions the WA850 so I changed it to WA850.
Hauke
>
>> -Original Message-
>> From: openwrt-devel
On 11/28/19 7:11 PM, Adrian Schmutzler wrote:
> Hi Hauke,
>
>> The following are still on kernel 4.9:
>> * ar7
>> * ixp4xx
>> * orion
>
> There are patches (actually from you, May 2019) on the list which claim to
> bump ar7 and orion to 4.14:
>
>
Hi,
We had a discussion about adding kernel 5.4 support to OpenWrt master
here:
https://lists.infradead.org/pipermail/openwrt-devel/2019-October/019610.html
and Koen is working on it, as far as I know.
The final OpenWrt 19.07 release is getting closer and we initially
planned to do the next
Hi,
There are now quite some changes in the OpenWrt 19.07 branch compared to
the 19.07-rc1.
The builds are looking ok:
http://buildbot.openwrt.org/openwrt-19.07/images/grid
I looked through the responses to 19.07-rc1 in the forum and the bug
tracker and it looks mostly good.
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile | 6 +-
...fix-tx99-with-monitor-mode-interface.patch | 92 --
...upport-for-using-active-monitor-inte.patch | 96 ---
.../patches/ath/404-regd_no_assoc_hints.patch | 10 +-
...21
This updates mac80211 to backports based on kernel 5.4-rc8.
The delete patches were applied upstream.
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile | 8 +-
...21-ath10k_init_devices_synchronously.patch | 2 +-
...rolling-support-for-various-chipsets.patch
On 11/18/19 7:05 AM, Stefan Lippers-Hollmann wrote:
> From: Hauke Mehrtens
>
> The skb_get_hash_perturb() function now takes a siphash_key_t instead of
> an u32. This was changed in commit 55667441c84f ("net/flow_dissector:
> switch to siphash"). Use the correct t
The skb_get_hash_perturb() function now takes a siphash_key_t instead of
an u32. This was changed in commit 55667441c84f ("net/flow_dissector:
switch to siphash"). Use the correct type in the fq header file
depending on the kernel version.
Signed-off-by: Hauke Mehrtens
---
Koen
On 11/13/19 6:12 PM, Yousong Zhou wrote:
> Fixes FS#1472, FS#2353, FS#2426
>
> Fixes: b3f95490 ("kernel: generic: Add kernel 4.14 support")
> Signed-off-by: Yousong Zhou
Acked-by: Hauke Mehrtens
Thanks for fixing this problem, this should also go into 19.07 and 18
ckage will be called ath9k_pci_owl_loader.ko
> though.
>
> Signed-off-by: Christian Lamparter
Acked-by: Hauke Mehrtens
> ---
> package/kernel/linux/modules/wireless.mk | 21 --
> package/kernel/mac80211/ath.mk| 20 +-
> .../patches/ath/120-owl-loader
This backports a patch to build it work with python2 in addition to
python3.
Signed-off-by: Hauke Mehrtens
---
After this patch went into master I would like to backport all the
changes for wireless-regdb from master to OpenWrt 19.07.
There are already some changes to the regulatory rules
Security Advisory 2019-11-05-2 - LuCI CSRF vulnerability (CVE-2019-17367)
DESCRIPTION
A logic flaw in LuCI's HTTP routing component led to ineffective CSRF
token testing for various request endpoints, specifically ones using
the `arcombine()` dispatch action.
This allows 3rd party web pages
Security Advisory 2019-11-05-1 - LuCI stored XSS
DESCRIPTION
A vulnerability has been reported in LuCI which allows injection of
script code through maliciously crafted wireless network SSIDs.
When joining a wireless network by clicking Network -> Wireless -> Join,
the subsequent configuration
Security Advisory 2019-11-05-3 - ustream-ssl information disclosure
(CVE-2019-5101, CVE-2019-5102)
DESCRIPTION
An exploitable information leak vulnerability exists in the ustream-ssl
library of OpenWrt. When connecting to a remote server, the server's
SSL certificate is checked but no action is
This makes ath10k-ct use the version based on kernel 5.4 by default.
Signed-off-by: Hauke Mehrtens
---
This was only tested in AP mode on a IPQ4019 device so far.
package/kernel/ath10k-ct/Makefile | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/kernel/ath10k-ct
This version adds support for ath10k-ct based on kernel 5.4.
The patches are now also covering ath10k-ct based on kernel 5.4.
Signed-off-by: Hauke Mehrtens
---
package/kernel/ath10k-ct/Makefile | 6 +-
...rt-for-configuring-management-packet.patch | 4 +-
...ble-out-of-bound
ath10k-ct supports the combination to select ADHOC (IBSS) mode and
different beacon intervals together. mac80211 does not like this
combination, but Ben says this is ok, so remove this check.
Signed-off-by: Hauke Mehrtens
---
As an alternative we can also remove the beacon_int_min_gcd setting
On 11/7/19 2:31 PM, Florian Eckert wrote:
> The rpcd service is an important service, but if the service stops
> working for any reason, no one will ever respawn that service. With this
> commit, the procd service will monitor if the rpcd service
> is running. If the rpcd service has crashed, then
On 11/7/19 9:51 AM, Petr Štetiar wrote:
> Hauke Mehrtens [2019-11-07 00:26:23]:
>
> Hi,
>
>>> I didn't looked deeper, but GCC 6,7,8,9 on x86/64 reports following:
>>>
>>> list.c:626:21: error: variable ‘prev’ might be clobbered by ‘longjmp’ or
&g
Forward the OpenWrt TARGET_LDFLAGS to the linker of the fw_printenv tool.
In addition also use the more standard make invocation script.
With this change the fw_printenv tool is built with PIE and Full RELRO
support when activated globally in OpenWrt.
Signed-off-by: Hauke Mehrtens
---
package
On 11/5/19 1:27 AM, Petr Štetiar wrote:
> Hi,
>
> Hauke Mehrtens [2019-11-01 17:06:34]:
>
>> +ADD_DEFINITIONS(-Os -Wall -Werror -Wclobbered --std=gnu99 -g3 -I.
>> -DUCI_PREFIX="${CMAKE_INSTALL_PREFIX}")
>
> is there any reason to not use -Wextra
rg/cover/1190274/
> 2.
> https://git.openwrt.org/?p=openwrt/staging/ynezz.git;a=shortlog;h=refs/heads/upstream/19.07/hostapd-backports
>
> Eneas U de Queiroz (1):
> hostapd: adjust removed wolfssl options
>
> Hauke Mehrtens (6):
> hostapd: Update to version 2.8 (2019-04
On 11/6/19 12:05 PM, Petr Štetiar wrote:
> From: Hauke Mehrtens
>
> This also syncs the configuration files with the default configuration
> files, but no extra options are activated or deactivated.
>
> The mesh patches were partially merged into hostapd 2.8, the remain
On 11/6/19 12:46 PM, Petr Štetiar wrote:
> Daniel Golle [2019-11-06 12:15:47]:
>
> Hi,
>
>>> Signed-off-by: Hauke Mehrtens
>>> (cherry picked from commit 1d4df52c215874a5238ddef7bccf0139f7758c24)
>>
>> Looks like you forgot to `git add`, also in pat
On 11/4/19 4:29 AM, Yousong Zhou wrote:
> Hi Hauke
>
> On Sat, 2 Nov 2019 at 00:07, Hauke Mehrtens wrote:
>>
>> When we jump back to a save point in UCI_THROW() with longjmp all the
>> registers will be reset to the old values when we called UCI_TRAP_SAVE()
&
On 11/1/19 10:08 PM, Rosen Penev wrote:
> On Fri, Nov 1, 2019 at 1:55 PM Hauke Mehrtens wrote:
>>
>> This decreases the binary size when PIE ASLR is activated by 8% on MIPS BE.
> A small note on LTO:
>
> These packages do not generate libraries, but sometimes, LTO mes
This decreases the size of the mtd application by 25% on MIPS BE.
old:
20,597 /sbin/mtd
new:
16,421 /sbin/mtd
Signed-off-by: Hauke Mehrtens
---
package/system/mtd/Makefile | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/package/system/mtd/Makefile b/package/system/mtd
This decreases the binary size when PIE ASLR is activated by 8% on MIPS BE.
old:
202,020 /usr/sbin/dnsmasq
new:
185,676 /usr/sbin/dnsmasq
Signed-off-by: Hauke Mehrtens
---
package/network/services/dnsmasq/Makefile | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/package
This decreases the size of the swconfig application by 25% on MIPS BE.
old:
16,916 /sbin/swconfig
new:
12,565 /sbin/swconfig
Signed-off-by: Hauke Mehrtens
---
package/network/config/swconfig/Makefile | 3 +++
1 file changed, 3 insertions(+)
diff --git a/package/network/config/swconfig
This decreases the size of the usign application by 16% on MIPS BE.
old:
24,597 /usr/bin/usign
new:
20,501 /usr/bin/usign
Signed-off-by: Hauke Mehrtens
---
package/system/usign/Makefile | 3 +++
1 file changed, 3 insertions(+)
diff --git a/package/system/usign/Makefile b/package/system/usign
Warn when the number of allocated parameters for the jail argv does not
match the number of used parameters. This normally leads to a buffer
overflow.
Signed-off-by: Hauke Mehrtens
---
service/instance.c | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/service/instance.c
ujail: wire no_new_privs (-c) option")
Cc: Etienne CHAMPETIER
Signed-off-by: Hauke Mehrtens
---
service/instance.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/service/instance.c b/service/instance.c
index b4284e7..4bb2207 100644
--- a/service/instance.c
+++ b/service/instance.c
@@ -82
Unlock and close the stream in case some file operations in
uci_open_stream() fail.
Signed-off-by: Hauke Mehrtens
---
util.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/util.c b/util.c
index 12aec9b..8572e81 100644
--- a/util.c
+++ b/util.c
@@ -221,17 +221,21
problem in error paths like the one
reported in CVE-2019-15513.
Signed-off-by: Hauke Mehrtens
---
CMakeLists.txt | 2 +-
delta.c| 20 ++--
file.c | 11 ++-
list.c | 4 ++--
4 files changed, 19 insertions(+), 18 deletions(-)
diff --git
Hi,
At the prpl Summit 2019 I saw a slide with 4 CVEs which are filled
against OpenWrt and there was one listed I was not aware of at that
time, CVE-2019-15513.
According to the CVE details page it was filled against OpenWrt on
23.8.2019 and OpenWrt was not informed before or after this was
On 10/29/19 11:42 PM, David Bauer wrote:
> This enables PMKSA and opportunistic key caching by default for
> WPA2/WPA3-Personal, WPA3-Personal and OWE auth types.
> Otherwise, Apple devices won't connect to the WPA3 network.
>
> This should not degrade security, as there's no external
On 10/30/19 6:25 PM, Piotr Dymacz wrote:
> Hi Hauke, John,
>
> On 30.10.2019 16:54, Hauke Mehrtens wrote:
>> On 10/29/19 6:37 AM, John Crispin wrote:
>>> Hi,
>>> should we use v5.4 as our next kernel ?
>>> John
>>
>> I also agree to
On 10/30/19 5:29 PM, Adrian Schmutzler wrote:
> Hi,
>
>> -Original Message-
>> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org] On
>> Behalf Of Hauke Mehrtens
>> Sent: Mittwoch, 30. Oktober 2019 16:54
>> To: John Crispin ; OpenWrt
On 10/30/19 11:14 AM, daxiong wrote:
> Current modpost cannot reduce the module size.
>
> Use $(STRIP) command to replace the modpost patch,
> I think to be compatibility will be better.
>
> Signed-off-by: daxiong
Please base this against master, then we can backport it to 19.07.
Could you
On 10/29/19 6:37 AM, John Crispin wrote:
> Hi,
> should we use v5.4 as our next kernel ?
> John
I also agree to have kernel 5.4 as the next kernel, it will be finally
released in about 1 months and it is a long term kernel. If we are lucky
it will be supported for 6 years for Android.
What
On 10/28/19 10:14 AM, Daniel Engberg wrote:
> On 2019-10-27 18:44, Hauke Mehrtens wrote:
>> This is a follow up patch on this discussion on the mailing list:
>> https://patchwork.ozlabs.org/patch/1041647/
>>
>> This allows to activate PIE only for some packages where
On 10/28/19 11:01 PM, Rafał Miłecki wrote:
> Using OpenWrt with kernels 5.2+ results in broken network. Interfaces
> seem OK but I cannot ping my router anymore.
>
> This regression is caused by the upstream commit
>
> commit b424e432e770d6dd572765459d5b6a96a19c5286 (refs/bisect/bad)
> Author:
On 10/27/19 8:05 PM, Rosen Penev wrote:
> On Sun, Oct 27, 2019 at 10:46 AM Hauke Mehrtens wrote:
>>
>> This tristate choose allows to select to build only some applications
>> with PIE enabled. On MIPS binaries are getting about 30% bigger when PIE
>> is activat
get is now on Linux 4.19 only and these exceptions are not
needed any more.
Signed-off-by: Hauke Mehrtens
---
package/kernel/lantiq/ltq-adsl/Makefile | 1 -
package/kernel/lantiq/ltq-ifxos/Makefile | 1 -
package/kernel/lantiq/ltq-tapi/Makefile | 1 -
package/kernel/lantiq/ltq-vdsl-me
This is a follow up patch on this discussion on the mailing list:
https://patchwork.ozlabs.org/patch/1041647/
This allows to activate PIE only for some packages where we thing it is
necessary and not only globally for all of them.
Hauke Mehrtens (6):
buildsystem: Make PIE ASLR option tristate
-6b03f960-4_mips_24kc.ipk
Signed-off-by: Hauke Mehrtens
---
package/network/services/uhttpd/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/package/network/services/uhttpd/Makefile
b/package/network/services/uhttpd/Makefile
index 85b7be7607..a9a7ae769f 100644
--- a/package/network
should contain the none PIE applications, but the images for the normal
targets should use PIE. The shared packages should always use PIE when
it should be normally activated.
Signed-off-by: Hauke Mehrtens
---
I hope this !SDK option works. I haven't fully tested this.
I want to make sure
-2_mips_24kc.ipk
Signed-off-by: Hauke Mehrtens
---
package/network/services/dropbear/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/package/network/services/dropbear/Makefile
b/package/network/services/dropbear/Makefile
index 63204042f7..fae1c9587d 100644
--- a/package/network/services
-basic_2019-08-08-ca8c2bd2-1_mips_24kc.ipk
Signed-off-by: Hauke Mehrtens
---
package/network/services/hostapd/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/package/network/services/hostapd/Makefile
b/package/network/services/hostapd/Makefile
index 4f6420f503..2d383ac629 100644
--- a/package
-14_mips_24kc.ipk
Signed-off-by: Hauke Mehrtens
---
package/network/services/dnsmasq/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/package/network/services/dnsmasq/Makefile
b/package/network/services/dnsmasq/Makefile
index dc20ada292..5c114eb1c6 100644
--- a/package/network/services/dnsmasq
On 10/25/19 11:27 PM, Tim Harvey wrote:
> request_irq requires irq names to be static/allocated and not on the stack
It would be nice if this patch could also go to the mainline Linux
kernel, so we do not have to maintain it any more.
John already applied it to OpenWrt.
>
> Signed-off-by: Tim
these patches again, but I
would prefer if they are all in upstream hostapd.
Cc: Daniel Golle
Signed-off-by: Hauke Mehrtens
---
...ompletion-callback-to-complete-mesh-.patch | 124 --
...-frequency-as-pri-sec-channel-switch.patch | 26
...rnel-driver-DFS-handler
On 10/11/19 12:59 PM, Jo-Philipp Wich wrote:
> Hi Bjørn,
>
>> Or: Start discussing the release blockers here and now. Thanks.
>
> 1) Blocker: LuCI master needs to be backported to 19.07
>Time estimate: 2-3 weeks
>
> 2) Blocker: All relevant sub-components for WPA-3 + GUI support, such as
>
On 10/21/19 10:47 PM, David Bauer wrote:
> This commits adds packaging for the new RTW88 driver from Realtek.
> It supports the Realtek 8822BE/8822CE PCIe wireless chips.
>
> For operation, the complementary firmware has to be loaded.
>
> Signed-off-by: David Bauer
> ---
>
This patch fixes the build of gdb and strace on arm64 targets with
kernel 4.19.
Signed-off-by: Hauke Mehrtens
---
...angle-uapi-asm-ptrace.h-from-uapi-as.patch | 280 ++
1 file changed, 280 insertions(+)
create mode 100644
target/linux/generic/backport-4.19/210-arm64-sve
On 10/13/19 6:03 AM, Gerard Ryan wrote:
> This is primarily to satiate the usage by docker/libnetwork.
> Behaviour mirrors /tools/modprobe.c from https://git.kernel.org
>
> Signed-off-by: Gerard Ryan
> ---
> Compile tested: x86_x64, Hyper-V, OpenWrt Master
> Run tested: x86_x64, Hyper-V, OpenWrt
On 10/15/19 12:52 PM, daxiong wrote:
> Signed-off-by: daxiong
> ---
> toolchain/Config.in | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/toolchain/Config.in b/toolchain/Config.in
> index 95087b7..0d288aa 100644
> --- a/toolchain/Config.in
> +++ b/toolchain/Config.in
>
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile | 6 +++---
...roduce-ath_dynack_set_timeout-routin.patch | 19 +++
...perly-set-last-timeout-timestamp-in-.patch | 5 -
...-max-timeout-according-to-channel-wi.patch | 18
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile | 6 +-
...roduce-ath_dynack_set_timeout-routin.patch | 19 ++-
...perly-set-last-timeout-timestamp-in-.patch | 5 -
...-max-timeout-according-to-channel-wi.patch | 18 ++-
...-ackto-to-max-timeout
On 10/7/19 4:28 PM, Petr Štetiar wrote:
> In order to make the source code usable and testable separately out of
> buildroot.
>
> Signed-off-by: Petr Štetiar
Acked-by: Hauke Mehrtens
I Like this especially as this is pretty big.
> ---
>
> tl;dr this is just a fi
On 10/1/19 4:36 PM, Linus Walleij wrote:
> On Thu, Aug 15, 2019 at 10:27 AM Serge Vasilugin wrote:
>
>> By default rtl8366_smi use phy addr 0 at mii-bus to access switch registers.
>> This patch allow to set it explicitly in dts-file:
>>
>> rtl8367 {
>> compatible =
Hi Serge,
On 8/27/19 11:49 AM, Serge Vailugin wrote:
> By default rtl8366_smi use phy addr 0 at mii-bus to access switch
> registers.
> This patch allow to set it explicitly in dts-file:
>
> rtl8367 {
> compatible = "realtek,rtl8367b";
> phy_id = <29>; /* switch address at
:
34446 iw_5.0.1-1_mipsel_24kc.ipk
new:
35064 iw_5.3-1_mipsel_24kc.ipk
Signed-off-by: Hauke Mehrtens
---
package/network/utils/iw/Makefile | 9 +-
.../utils/iw/patches/001-nl80211_h_sync.patch | 370 +++---
.../utils/iw/patches/120-antenna_gain.patch | 2 +-
.../utils
On 9/19/19 4:18 AM, Eneas U de Queiroz wrote:
> WolfSSL added a wolfSSL_X509_check_host function to perform CN
> validation in v3.10.4, depending on the build-time configure options:
> --enable-nginx enables it for all supported versions;
> --enable-opensslextra, since v3.14.2.
>
> If the
On 9/2/19 11:27 PM, Rosen Penev wrote:
> On Mon, Sep 2, 2019 at 1:29 PM Hauke Mehrtens wrote:
>>
>> This fixes some resources leaks mostly in error patches.
>>
>> Coverity: #1330236, #1330237, #1330238
>> Signed-off-by: Hauke Mehrtens
>> ---
>> ma
This multiplication was done on 32 bit integers before, explicitly cast
them to 64 bit values before to make sure the multiplication is done on
64 bit numbers.
Coverity: #1412417, #1412410, #1412409, #1412411, #1412424, #1412407
Signed-off-by: Hauke Mehrtens
---
system.c | 18
This backports a fix from GCC master to fix a internal compiler
exception seen when compiling libjson-c with mips16 activated.
Fixes: FS#2455
Signed-off-by: Hauke Mehrtens
---
...uninitialised_use_in_mips_split_move.patch | 55 +++
1 file changed, 55 insertions(+)
create mode
On 9/16/19 7:09 PM, Martin Blumenstingl wrote:
> Hi Martin,
>
> On Mon, Sep 16, 2019 at 12:54 PM Martin Schiller wrote:
>>
>> Hi!
>>
>> I am searching for a possibility to disable Auto Negotiation of an
>> PEF7072 which is attached to MAC1 of the Lantiq xrx200 switch.
>>
>> The xrx200-net driver
Hi Sven,
On 9/16/19 8:10 PM, sven falempin wrote:
> Dear openWRT gurus,
>
> the patch :
> https://github.com/torvalds/linux/commit/b67fd72e84a88cae64cea8ab47ccdaab3bb3094d#diff-35454f3f0395271a0e34581e160bea5f
>
> Is missing from my build :
>
On 8/2/19 6:23 PM, Nick Schaf wrote:
>
>
>> Nick Schaf [2019-07-31 16:34:36]:
>>
>> Hi,
>>
>>> I've noticed the wpa_supplicant process on my mesh interfaces leaking
>>> memory to the point that the kernel kills the process. It was
>>> discovered in 18.06.2, but I've reproduced it with 18.06.4
Fixes this security problem:
* SAE/EAP-pwd side-channel attack update
https://w1.fi/security/2019-6/sae-eap-pwd-side-channel-attack-update.txt
Signed-off-by: Hauke Mehrtens
---
...-ECC-groups-with-a-prime-under-256-b.patch | 40
...itable-groups-based-on-REVmd-changes.patch | 54
This fixes:
CVE-2019-11555 "EAP-pwd message reassembly issue with unexpected fragment"
https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
This should not affect OpenWrt in the default settings as we do not use
EAP-pwd.
Signed-off-by: Hauk
Signed-off-by: Hauke Mehrtens
---
package/network/services/hostapd/Makefile | 6 +-
.../hostapd/files/hostapd-basic.config| 16 +-
.../hostapd/files/hostapd-full.config | 16 +-
.../hostapd/files/hostapd-mini.config | 16 +-
.../hostapd/files/wpa_supplicant
Instead of patching the workaround away, just use the config option.
Signed-off-by: Hauke Mehrtens
---
.../hostapd/files/wpa_supplicant-basic.config| 2 +-
.../hostapd/files/wpa_supplicant-full.config | 2 +-
.../hostapd/files/wpa_supplicant-mini.config | 2
Signed-off-by: Hauke Mehrtens
---
package/network/services/hostapd/Makefile | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/package/network/services/hostapd/Makefile
b/package/network/services/hostapd/Makefile
index a723af2c5f..4f6420f503 100644
--- a/package/network/services
All the content of this function is proceeded by IEEE8021X_EAPOL no code
accesses the ssid variable outside of this ifdef.
Signed-off-by: Hauke Mehrtens
---
.../hostapd/patches/110-no_eapol_fix.patch | 14 --
.../services/hostapd/patches/200-multicall.patch | 6
hostapd will not use the getrandom() syscall and as a fallback use
/dev/random, the syscall is supported since Linux 3.17 and in the musl,
glibc and uclibc version used by OpenWrt.
Signed-off-by: Hauke Mehrtens
---
package/network/services/hostapd/files/hostapd-basic.config | 2 +-
package
These two patches are fixing some problems which are fixed in hostapd
master, but not in version 2.8.
Signed-off-by: Hauke Mehrtens
---
...-in-storing-of-external_auth-SSID-BS.patch | 82 +++
...-Fix-ENGINE-support-with-OpenSSL-1.1.patch | 39 +
2 files changed, 121
This updates hostapd to version 2.9 release.
I tested AP mode and also mesh on 5GHz.
Hauke Mehrtens (7):
hostapd: Update to version 2.8
hostapd: backport some Fixes from upstream hostapd
hostapd: update to version 2.9
hostapd: use config option CONFIG_NO_LINUX_PACKET_SOCKET_WAR
hostapd
This updates hostapd to version 2.9 release.
I tested AP mode and also mesh on 5GHz.
Hauke Mehrtens (7):
hostapd: Update to version 2.8
hostapd: backport some Fixes from upstream hostapd
hostapd: update to version 2.9
hostapd: use config option CONFIG_NO_LINUX_PACKET_SOCKET_WAR
hostapd
Hi Enrico,
On 9/4/19 6:48 PM, Martin Blumenstingl wrote:
> Hi Enrico,
>
> On Wed, Sep 4, 2019 at 12:07 PM Enrico Mioso wrote:
>>
>> Hi there!
>>
>> So I am trying to get ethernet working on this AR10 device.
>> It has 3 GPHYs:
I did some fixes for the reset bits,, the rest is ok.
>>
>>
readlink() truncates and does not null terminate the string when more
bytes would be written than available. Just increase the char array by
one and assume that there is a problem when all bytes are needed.
Coverity: #1330087, #1329991
Signed-off-by: Hauke Mehrtens
---
libblkid-tiny/mkdev.c | 4
A pointer to search_buf is accessed by search_domain outside of the
if branch which defines search_buf. The compiler could already reuse
this memory.
Coverity: #1445747
Signed-off-by: Hauke Mehrtens
---
src/router.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/src
This fixes some resources leaks mostly in error patches.
Coverity: #1330236, #1330237, #1330238
Signed-off-by: Hauke Mehrtens
---
main.c | 12 ++--
1 file changed, 10 insertions(+), 2 deletions(-)
diff --git a/main.c b/main.c
index 3536443..ef47b28 100644
--- a/main.c
+++ b/main.c
This adds annotations for the format strings to the print functions and
fixes the newly found problems. One of them is a format security
problem.
Coverity: #1412532
Signed-off-by: Hauke Mehrtens
---
defaults.c | 2 +-
includes.c | 2 +-
redirects.c | 5 ++---
utils.h | 15
On 9/2/19 5:38 AM, Enrico Mioso wrote:
> Hello guys,
> Hello Hauke,
>
> Sorry for the amount of mails.
Did you had a look at this vendor device tree file:
On 9/2/19 6:26 AM, Enrico Mioso wrote:
> BTW, in vendor's cgu_init, seems the "enablement" part is commented out.
>
> static int __init cgu_init(void)
> {
> int ret;
> char ver_str[128] = {0};
>
> ret = register_chrdev(IFX_CGU_MAJOR, "ifx_cgu", _fops);
> if ( ret != 0 ) {
>
-by: Hauke Mehrtens
---
tools/mkimage/Makefile| 6 +-
.../patches/010-freebsd-ulong-fix.patch | 13 --
.../patches/020-include_compile_fix.patch | 10 -
.../030-allow-to-use-different-magic.patch| 18 +-
.../patches/050-image_h_portability.patch | 182
Signed-off-by: Hauke Mehrtens
---
package/boot/uboot-envtools/Makefile | 8
package/boot/uboot-envtools/patches/001-compile.patch | 6 +++---
2 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/package/boot/uboot-envtools/Makefile
b/package/boot/uboot
On 8/15/19 3:24 PM, Hauke Mehrtens wrote:
> Signed-off-by: Hauke Mehrtens
> ---
> package/kernel/mac80211/Makefile | 6 +++---
> .../350-ath9k_hw-reset-AHB-WMAC-interface-on-AR91xx.patch | 2 +-
> .../351-ath9k_hw-issue-external-reset-for-QCA9
The removed patches were applied upstream.
The type of the RT2X00_LIB_EEPROM config option was changed to bool,
because boolean is an invalid value and the new kconfig system
complained about this.
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile |8
This contains multiple fixes from the upstream kernel.
The removed patch was merged upstream.
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile | 6 +--
...w-reset-AHB-WMAC-interface-on-AR91xx.patch | 2 +-
..._hw-issue-external-reset-for-QCA955x.patch | 4
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile | 6 +++---
.../350-ath9k_hw-reset-AHB-WMAC-interface-on-AR91xx.patch | 2 +-
.../351-ath9k_hw-issue-external-reset-for-QCA955x.patch | 4 ++--
...rt-ath9k-interpret-requested-txpower-in-EIRP-dom.patch
This commit will activate CONFIG_IEEE80211W for all, but the mini
variant when at least one driver supports it. This will add ieee80211w
support for the mesh variant for example.
Fixes: FS#2397
Signed-off-by: Hauke Mehrtens
---
package/network/services/hostapd/Makefile | 8 ++--
1 file
fected
most, but I think we do not have to care and there were many years to
convert.
Acked-by: Hauke Mehrtens
Hauke
signature.asc
Description: OpenPGP digital signature
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.o
which would need
> scons, yet scons is build always as part of host tools, just in order to
> satisfy host build dependency of few packages in the packages feeds.
>
> Signed-off-by: Petr Štetiar
Acked-by: Hauke Mehrtens
> ---
> tools/Makefile
symlink) which leads to the build
> failure of wireless-regdb, so this patch makes it explicit which python
> should be used.
>
> Reported-by: Hauke Mehrtens
> Tested-by: Kevin Darbyshire-Bryant
> Signed-off-by: Petr Štetiar
Tested-by: Hauke Mehrtens
> ---
> packa
On 8/2/19 10:40 AM, Koen Vandeputte wrote:
>
> On 01.08.19 17:27, Koen Vandeputte wrote:
>> Hi All,
>>
>> I've been playing around the last few days stresstesting latest 19.07
>> on different targets (ar71xx, cns3xxx, imx6, ...) with extra kernel
>> debug features enabled.
>>
>> I'll post some
801 - 900 of 1807 matches
Mail list logo