- Feb 08, 2017
-
-
Hans Dedecker authored
cfd986c odhcp6c: fix possible stack corruption when parsing proc if_inet6 Signed-off-by:
Hans Dedecker <dedeckeh@gmail.com>
-
Álvaro Fernández Rojas authored
Also removes unneeded wireless patches Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
- Feb 07, 2017
-
-
Álvaro Fernández Rojas authored
64 bit support for Raspberry Pi 3 is experimental. However, bcm2709 subtarget should serve as a stable and compatible 32 bit support. Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
This adds support for Raspberry Pi 3 on the bcm2709 subtarget, in order to keep 32 bit image support when 64 bit support is added on bcm2710 subtarget. Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Images are now automatically gziped so remove custom image command Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Patches from Raspberry Pi repo: https://github.com/raspberrypi/linux/commits/rpi-4.9.y Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Rafał Miłecki authored
Initial idea was to use package with this PHY driver for devices that need it. Unfortunately this can't work as bgmac is built-in and PHY probing happens before loading modules - it results in PHY subsystem picking default (generic) PHY driver. There were two ways of solving this: 1) Making bcm53xx use bgmac as module xor 2) Built-in Broadcom PHY driver After some quick discussion it seems we can simply built-in the driver as increased kenel size is relatively small (1805 B). Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Our supported libcs are ABI compatible across version upgrades Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Etienne Haarsma authored
Update gdb to version 7.12.1. GDB 7.12.1 brings the following fixes and enhancements over GDB 7.12: * PR tdep/20682 (aarch64 regression: gdb.cp/nextoverthrow.exp) * PR server/20733 (Failed to build aarch64_be-linux-gnu GDBserver) * PR tdep/20953 (GDB crashes after "set architecture rl78") * PR tdep/20954 (GDB crashes if "set architecture rx") * PR tdep/20955 (GDB internal error in cris-tdep.c) * PR build/20712 (gdb 7.12+ doesn't build as C++ on Solaris) * PR breakpoint/20653 (string_to_explicit_location has some weird code) * PR build/20753 (MinGW compilation errors due to strcasecmp) * PR gdb/20977 (GDB exception handling is broken on i686-w64-mingw32) * PR python/21048 (backtrace is broken on i686) * PR sim/20808 (mips sim build fails due to undefined SD/CPU variables) * PR sim/20809 (mips sim build fails for r3900 cpus) * PR gdb/20939 (GDB aborts Signed-off-by:
Etienne Haarsma <bladeoner112@gmail.com>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Daniel Engberg authored
Use 2.27 as default which is the current relese. Makes it easier to get support and submit patches upstream if needed. Tested on ar71xx, mt7621, kirkwood (arm) Signed-off-by:
Daniel Engberg <daniel.engberg.lists@pyret.net>
-
Rafał Miłecki authored
These are patches queued for 4.11. It adds support for even more hw and removes some annoying WARN_ONCE. Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Rafał Miłecki authored
This adds support for more devices. Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Álvaro Fernández Rojas authored
- Really disable power management (wrong config flags). - Disable internal roaming engine. Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Rafał Miłecki authored
It's needed for macaddr_add. Fixes: 50efd403 ("bcm53xx: set WAN MAC address to don't share one with LAN interface") Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Koen Vandeputte authored
Add missing parentheses. Fixes kernel build issue when using this driver. Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Koen Vandeputte authored
Compiled & tested on cns3xxx Signed-off-by:
Koen Vandeputte <koen.vandeputte@ncentric.com>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Jo-Philipp Wich authored
After "73d923ed base-files: emit tagged switch configuration by default" some default network configurations are broken because the lan and wan ifnames are forcibly set to untagged netdevs. Adjust the offending set_interfaces_lan_wan() calls to use the proper tagged device names. Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
Jo-Philipp Wich authored
Add a patch to revert upstream commit 9aed02feae57bf7a40cb04ea0e3017cb7a998db4 which introduces syntax errors. Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
- Feb 06, 2017
-
-
Hauke Mehrtens authored
This fixes the following 41 security problems: + CVE-2016-7922: buffer overflow in print-ah.c:ah_print(). + CVE-2016-7923: buffer overflow in print-arp.c:arp_print(). + CVE-2016-7924: buffer overflow in print-atm.c:oam_print(). + CVE-2016-7925: buffer overflow in print-sl.c:sl_if_print(). + CVE-2016-7926: buffer overflow in print-ether.c:ethertype_print(). + CVE-2016-7927: buffer overflow in print-802_11.c:ieee802_11_radio_print(). + CVE-2016-7928: buffer overflow in print-ipcomp.c:ipcomp_print(). + CVE-2016-7929: buffer overflow in print-juniper.c:juniper_parse_header(). + CVE-2016-7930: buffer overflow in print-llc.c:llc_print(). + CVE-2016-7931: buffer overflow in print-mpls.c:mpls_print(). + CVE-2016-7932: buffer overflow in print-pim.c:pimv2_check_checksum(). + CVE-2016-7933: buffer overflow in print-ppp.c:ppp_hdlc_if_print(). + CVE-2016-7934: buffer overflow in print-udp.c:rtcp_print(). + CVE-2016-7935: buffer overflow in print-udp.c:rtp_print(). + CVE-2016-7936: buffer overflow in print-udp.c:udp_print(). + CVE-2016-7937: buffer overflow in print-udp.c:vat_print(). + CVE-2016-7938: integer overflow in print-zeromq.c:zmtp1_print_frame(). + CVE-2016-7939: buffer overflow in print-gre.c, multiple functions. + CVE-2016-7940: buffer overflow in print-stp.c, multiple functions. + CVE-2016-7973: buffer overflow in print-atalk.c, multiple functions. + CVE-2016-7974: buffer overflow in print-ip.c, multiple functions. + CVE-2016-7975: buffer overflow in print-tcp.c:tcp_print(). + CVE-2016-7983: buffer overflow in print-bootp.c:bootp_print(). + CVE-2016-7984: buffer overflow in print-tftp.c:tftp_print(). + CVE-2016-7985: buffer overflow in print-calm-fast.c:calm_fast_print(). + CVE-2016-7986: buffer overflow in print-geonet.c, multiple functions. + CVE-2016-7992: buffer overflow in print-cip.c:cip_if_print(). + CVE-2016-7993: a bug in util-print.c:relts_print() could cause a buffer overflow in multiple protocol parsers (DNS, DVMRP, HSRP, IGMP, lightweight resolver protocol, PIM). + CVE-2016-8574: buffer overflow in print-fr.c:frf15_print(). + CVE-2016-8575: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5202: buffer overflow in print-isoclns.c:clnp_print(). + CVE-2017-5203: buffer overflow in print-bootp.c:bootp_print(). + CVE-2017-5204: buffer overflow in print-ip6.c:ip6_print(). + CVE-2017-5205: buffer overflow in print-isakmp.c:ikev2_e_print(). + CVE-2017-5341: buffer overflow in print-otv.c:otv_print(). + CVE-2017-5342: a bug in multiple protocol parsers (Geneve, GRE, NSH, OTV, VXLAN and VXLAN GPE) could cause a buffer overflow in print-ether.c:ether_print(). + CVE-2017-5482: buffer overflow in print-fr.c:q933_print(). + CVE-2017-5483: buffer overflow in print-snmp.c:asn1_parse(). + CVE-2017-5484: buffer overflow in print-atm.c:sig_print(). + CVE-2017-5485: buffer overflow in addrtoname.c:lookup_nsap(). + CVE-2017-5486: buffer overflow in print-isoclns.c:clnp_print(). The size of the package is only incread very little: new size: 306430 tcpdump_4.9.0-1_mips_24kc.ipk 130324 tcpdump-mini_4.9.0-1_mips_24kc.ipk old size: 302782 tcpdump_4.8.1-1_mips_24kc.ipk 129033 tcpdump-mini_4.8.1-1_mips_24kc.ipk Signed-off-by:
Hauke Mehrtens <hauke@hauke-m.de>
-
Álvaro Fernández Rojas authored
Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Álvaro Fernández Rojas authored
n As usual these patches were extracted and rebased from the raspberry pi repo: https://github.com/raspberrypi/linux/tree/rpi-4.4.y Signed-off-by:
Álvaro Fernández Rojas <noltari@gmail.com>
-
Rafał Miłecki authored
Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Rafał Miłecki authored
Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Rafał Miłecki authored
It just makes code consistent. This trivial change may be a 17.01 candidate to provide simpler backporting experience. Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Rafał Miłecki authored
Signed-off-by:
Rafał Miłecki <rafal@milecki.pl>
-
Jo-Philipp Wich authored
This reverts commit dde5c729. The uClibc update was completely untested, does not build with Kernel 4.4 and did not adjust the configuration to predeclare new config symbols. Signed-off-by:
Jo-Philipp Wich <jo@mein.io>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-
Felix Fietkau authored
Signed-off-by:
Felix Fietkau <nbd@nbd.name>
-