Re: [PATCH] image.mk: fix dd memory exhaustion during padding of large images

2024-04-01 Thread Mirko Parthey via openwrt-devel
4 at 03:34:09PM +0200, Mirko Parthey wrote: > OpenWrt's busybox supports it. Please disregard this, support is required on the build host. --- End Message --- ___ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/mai

Re: [PATCH] image.mk: fix dd memory exhaustion during padding of large images

2024-04-01 Thread Mirko Parthey via openwrt-devel
The sender domain has a DMARC Reject/Quarantine policy which disallows sending mailing list messages using the original "From" header. To mitigate this problem, the original message has been wrapped automatically by the mailing list software.--- Begin Message --- On Mon, Apr 01, 2024 at

[PATCH] ramips: use lzma-loader on D-Link DIR-615 H1

2021-09-30 Thread Mirko Parthey
Fixes the boot loader LZMA decompression issue: LZMA ERROR 1 - must RESET board to recover Signed-off-by: Mirko Parthey --- Please consider backporting to openwrt-21.02, which is also affected. target/linux/ramips/image/rt305x.mk | 1 + 1 file changed, 1 insertion(+) diff --git a/target/linux

Re: FRAG Attacks (new vuln for wifi)

2021-05-13 Thread Mirko Parthey
On Thu, May 13, 2021 at 03:49:05PM +0200, Felix Fietkau wrote: > We're talking about the version of the kernel tree used to create the > ath10k-ct source, not the kernel version used by OpenWrt. OK, sorry for the noise. ___ openwrt-devel mailing list

Re: FRAG Attacks (new vuln for wifi)

2021-05-13 Thread Mirko Parthey
On Thu, May 13, 2021 at 05:57:01AM +0200, Felix Fietkau wrote: > >> > Regarding ath10k-ct, what kernel-versions of the ath10k-ct driver need > >> > to be patched? > >> > Is 4.19 the oldest that owrt will consume? > >> I think so. 4.19 is used by OpenWrt 19.07 and I don't think we'll update > >>

[OpenWrt-Devel] [PATCH] ramips: fix D-Link DIR-615 H1 switch port mapping

2019-01-29 Thread Mirko Parthey
Reuse a device-specific switch port mapping which also applies to the D-Link DIR-615 H1. Signed-off-by: Mirko Parthey --- target/linux/ramips/base-files/etc/board.d/02_network | 1 + 1 file changed, 1 insertion(+) diff --git a/target/linux/ramips/base-files/etc/board.d/02_network b/target

Re: [OpenWrt-Devel] [PATCH] iptables: increment PKG_RELEASE to force update

2018-06-19 Thread Mirko Parthey
On Wed, Jun 13, 2018 at 04:29:50PM +0200, Mirko Parthey wrote: > While support for the FLOWOFFLOAD target is available in the firmware > images, it is still missing in some of the binary packages on > downloads.openwrt.org, e.g. for the mipsel_mips32 architecture. > > Increm

[OpenWrt-Devel] [PATCH] iptables: increment PKG_RELEASE to force update

2018-06-13 Thread Mirko Parthey
to include the FLOWOFFLOAD target. Signed-off-by: Mirko Parthey --- If accepted, I would also suggest backporting this to openwrt-18.06. package/network/utils/iptables/Makefile | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/package/network/utils/iptables/Makefile b/package

[OpenWrt-Devel] [PATCH] mtd: mark as nonshared to fix FS#484

2018-05-31 Thread Mirko Parthey
The mtd tool is built with different configurations depending on the target. For example, brcm47xx adds the fixtrx subcommand, without which an image fails when booting the second time. Mark the mtd package as nonshared to really fix FS#484. Signed-off-by: Mirko Parthey --- package/system/mtd

[OpenWrt-Devel] [PATCH v2] brcm47xx: add switch port mapping to Asus WL-500W

2018-05-22 Thread Mirko Parthey
try, which describes the same mapping. Signed-off-by: Mirko Parthey <mirko.part...@web.de> --- This patch is an update to https://patchwork.ozlabs.org/patch/734831/ Changes since v1: * resubmit because patch was dropped from patchwork * update commit message to match similar patches *

Re: [OpenWrt-Devel] Archer VR200v GPL code

2015-05-04 Thread Mirko Parthey
On Mon, May 04, 2015 at 12:23:10PM +0200, Daniel Golle wrote: I cannot find the sourcecode on http://www.tp-link.de/support/gpl/ In the menu on the left, choose VDSL/ADSL. This leads to: http://www.tp-link.de/support/gpl/?categoryid=548

Re: [OpenWrt-Devel] (CVE-2014-2338) authentication bypass vulnerability in strongSwan needs patching

2014-07-06 Thread Mirko Parthey
Am Sonntag, 06.07.14, 00:00 +0200 schrieb Noel Kuntze: I am once again inquiring about this vulnerabity. The strongSwan version in the repository for the 12.09 version of OpenWRT is still not patched and Mr. Fietkau does not respond to any emails. I wrote him one on 2014-06-08 and one on