Skip to content
Snippets Groups Projects
  1. Feb 09, 2017
  2. Feb 08, 2017
    • Daniel Golle's avatar
      rt2x00: mt7620: lots of improvements · 9eacb9d7
      Daniel Golle authored
      This commit combines all the changes I've made on my staging tree
      into a single commit fixing many issues with our patch for MT7620.
      
      First of all, checkpatch.pl revealed numerous code style issues with
      the patch, so fix all the white-space and commets. Also use
      usleep_range instead of legacy timing and relax timing for VCO
      calibration just like the vendor driver does.
      
      Several line programming registers were commented out in the patch.
      Originally this came from the features present but disabled by default
      in the vendor's driver (RTMP_TEMPERATURE_CALIBRATION and
      ADJUST_POWER_CONSUMPTION_SUPPORT). Remove the dead code for now, it can
      easily be re-added if we actually intend to support those features.
      
      Move values from mt7620_freqconfig type into the existing rf_channel
      struct, this shouldn't be a new typedef and it is possible to use the
      existing struct because rf_channel got 4 32-bit fields, so two of the
      8-bit values from mt7620_freqconfig can easily be stored in the same
      32-bit field.
      
      Map values such that
      Rdiv -> rf1
      N    -> rf2
      K    -> rf3[0:7]
      D    -> rf3[8:15]
      Ksd  -> rf4
      
      This makes the channel switching logic already look a bit more like
      what we are used to in rt2x00... Probably many of the read-modify-write
      calls could still be replaced by macros intended for that.
      
      iq calibration seems to be identical to RT5592, so just enable it.
      Test shows that this improves things quite a lot, datarates went up
      by a couple of megabits when running iperf, signal quality seems jumpy
      in the first few seconds once a station connencts, the stabelizes on a
      value significantly better than what it was before.
      
      Add description to the patch and reference the original OpenWrt commit
      by which it was added.
      
      The patch now passes checkpatch.pl and can thus be discussed with the
      upstream authors of the rt2x00 driver.
      
      Funded-by: https://www.kickstarter.com/projects/1327597961/better-support-for-mt7620a-n-in-openwrt-lede/
      
      
      
      Signed-off-by: default avatarDaniel Golle <daniel@makrotopia.org>
      9eacb9d7
    • Álvaro Fernández Rojas's avatar
      brcm2708: bcm2708: fix build · 48b71a0b
      Álvaro Fernández Rojas authored
      
      buildbot fails to build without regmap, which I couldn't reproduce locally.
      Hopefully this fixes it.
      
      Signed-off-by: default avatarÁlvaro Fernández Rojas <noltari@gmail.com>
      48b71a0b
    • Felix Fietkau's avatar
      sdk: add missing change from r3328-f55c29e4 · 412cf4cc
      Felix Fietkau authored
      
      Signed-off-by: default avatarFelix Fietkau <nbd@nbd.name>
      412cf4cc
    • Hans Dedecker's avatar
      odhcp6c: update to GIT head version · b516b38f
      Hans Dedecker authored
      
      cfd986c odhcp6c: fix possible stack corruption when parsing proc if_inet6
      
      Signed-off-by: default avatarHans Dedecker <dedeckeh@gmail.com>
      b516b38f
    • Álvaro Fernández Rojas's avatar
      brcm2708: add more patches for linux 4.9 · ba9dbc3d
      Álvaro Fernández Rojas authored
      
      Also removes unneeded wireless patches
      
      Signed-off-by: default avatarÁlvaro Fernández Rojas <noltari@gmail.com>
      ba9dbc3d
  3. Feb 07, 2017
  4. Feb 06, 2017
    • Hauke Mehrtens's avatar
      tcpdump: update to version 4.9.0 · 985c90d1
      Hauke Mehrtens authored
      
      This fixes the following 41 security problems:
       + CVE-2016-7922: buffer overflow in print-ah.c:ah_print().
       + CVE-2016-7923: buffer overflow in print-arp.c:arp_print().
       + CVE-2016-7924: buffer overflow in print-atm.c:oam_print().
       + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print().
       + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print().
       + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print().
       + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print().
       + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header().
       + CVE-2016-7930: buffer overflow in print-llc.c:llc_print().
       + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print().
       + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum().
       + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print().
       + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print().
       + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print().
       + CVE-2016-7936: buffer overflow in print-udp.c:udp_print().
       + CVE-2016-7937: buffer overflow in print-udp.c:vat_print().
       + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame().
       + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions.
       + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions.
       + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions.
       + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions.
       + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print().
       + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print().
       + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print().
       + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions.
       + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print().
       + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a
            buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP,
            lightweight resolver protocol, PIM).
       + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print().
       + CVE-2016-8575: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print().
       + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print().
       + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print().
       + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print().
       + CVE-2017-5341: buffer overflow in print-otv.c:otv_print().
       + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH,
            OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in
            print-ether.c:ether_print().
       + CVE-2017-5482: buffer overflow in print-fr.c:q933_print().
       + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse().
       + CVE-2017-5484: buffer overflow in print-atm.c:sig_print().
       + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap().
       + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print().
      
      The size of the package is only incread very little:
      new size:
      306430 tcpdump_4.9.0-1_mips_24kc.ipk
      130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk
      
      old size:
      302782 tcpdump_4.8.1-1_mips_24kc.ipk
      129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk
      
      Signed-off-by: default avatarHauke Mehrtens <hauke@hauke-m.de>
      985c90d1
    • Álvaro Fernández Rojas's avatar
    • Álvaro Fernández Rojas's avatar
      brcm2708: update linux 4.4 patches to latest version · dab5a440
      Álvaro Fernández Rojas authored
      n
      As usual these patches were extracted and rebased from the raspberry pi repo:
      https://github.com/raspberrypi/linux/tree/rpi-4.4.y
      
      
      
      Signed-off-by: default avatarÁlvaro Fernández Rojas <noltari@gmail.com>
      dab5a440
Loading