1. 23 7月, 2022 4 次提交
  2. 22 7月, 2022 4 次提交
  3. 21 7月, 2022 5 次提交
    • W
      ramips: add support for Netgear WAX202 · c240fed2
      Wenli Looi 提交于
      Netgear WAX202 is an 802.11ax (Wi-Fi 6) router.
      
      Specifications:
      * SoC: MT7621A
      * RAM: 512 MiB NT5CC256M16ER-EK
      * Flash: NAND 128 MiB F59L1G81MB-25T
      * Wi-Fi:
        * MT7915D: 2.4/5 GHz (DBDC)
      * Ethernet: 4x 1GbE
        * Switch: SoC built-in
      * USB: None
      * UART: 115200 baud (labeled on board)
      
      Load addresses (same as ipTIME AX2004M):
      * stock
        * 0x80010000: FIT image
        * 0x81001000: kernel image -> entry
      * OpenWrt
        * 0x80010000: FIT image
        * 0x82000000: uncompressed kernel+relocate image
        * 0x80001000: relocated kernel image -> entry
      
      Installation:
      * Flash the factory image through the stock web interface, or TFTP to
        the bootloader. NMRP can be used to TFTP without opening the case.
      * Note that the bootloader accepts both encrypted and unencrypted
        images, while the stock web interface only accepts encrypted ones.
      
      Revert to stock firmware:
      * Flash the stock firmware to the bootloader using TFTP/NMRP.
      
      References in WAX202 GPL source:
      https://www.downloads.netgear.com/files/GPL/WAX202_V1.0.5.1_Source.rar
      
      * openwrt/target/linux/ramips/dts/mt7621-ax-nand-wax202.dts
        DTS file for this device.
      Signed-off-by: NWenli Looi <wlooi@ucalgary.ca>
      (cherry picked from commit 0f068e7c)
      c240fed2
    • W
      image: add support for Netgear encrypted image · d5858c6d
      Wenli Looi 提交于
      Netgear encrypted image is used in various devices including WAX202,
      WAX206, and EX6400v3. This image format also requires a dummy squashfs4
      image which is added here as well.
      
      References in WAX202 GPL source:
      https://www.downloads.netgear.com/files/GPL/WAX202_V1.0.5.1_Source.rar
      
      * openwrt/bootloader/u-boot-mt7621-2018.09-gitb178829-20200526/board/ralink/common/dual_image.c
        Bootloader code that verifies the presence of a squashfs4 image, thus
        a dummy image is added here.
      
      * openwrt/tools/imgencoder/src/gj_enc.c
        Contains code that generates the encrypted image. There is support for
        adding an RSA signature, but it does not look like the signature is
        verified by the stock firmware or bootloader.
      
      * openwrt/tools/imgencoder/src/imagekey.h
        Contains the encryption key and IV. It appears the same key/IV is used
        for other Netgear devices including WAX206 and EX6400v3.
      Signed-off-by: NWenli Looi <wlooi@ucalgary.ca>
      (cherry picked from commit efca76ff)
      d5858c6d
    • H
      wolfssl: Do not activate HW acceleration on armvirt by default · a1068f77
      Hauke Mehrtens 提交于
      The armvirt target is also used to run OpenWrt in lxc on other targets
      like a Raspberry Pi. If we set WOLFSSL_HAS_CPU_CRYPTO by default the
      wolfssl binray is only working when the CPU supports the hardware crypto
      extension.
      
      Some targets like the Raspberry Pi do not support the ARM CPU crypto
      extension, compile wolfssl without it by default. It is still possible
      to activate it in custom builds.
      Signed-off-by: NHauke Mehrtens <hauke@hauke-m.de>
      (cherry picked from commit d1b5d17d)
      a1068f77
    • J
      libpcap: fix PKG_CONFIG_DEPENDS for rpcapd · dbe19b10
      Jianhui Zhao 提交于
      This fix allows trigger a rerun of Build/Configure when
      rpcapd was selected.
      Signed-off-by: NJianhui Zhao <zhaojh329@gmail.com>
      (cherry picked from commit 6902af4f)
      dbe19b10
    • P
      wolfssl: WOLFSSL_HAS_WPAS requires WOLFSSL_HAS_DH · a12eb71c
      Pascal Ernster 提交于
      Without this, WOLFSSL_HAS_DH can be disabled even if WOLFSSL_HAS_WPAS is
      enabled, resulting in an "Anonymous suite requires DH" error when trying
      to compile wolfssl.
      Signed-off-by: NPascal Ernster <git@hardfalcon.net>
      Reviewed-by: NEneas U de Queiroz <cotequeiroz@gmail.com>
      (cherry picked from commit 21825af2)
      a12eb71c
  4. 20 7月, 2022 6 次提交
  5. 19 7月, 2022 4 次提交
  6. 18 7月, 2022 1 次提交
  7. 17 7月, 2022 4 次提交
    • J
      opkg: update to 2022-02-24 · a8001815
      Josef Schlehofer 提交于
      Changes:
      9c44557 opkg_remove: avoid remove pkg repeatly with option --force-removal-of-dependent-packages
      2edcfad libopkg: set 'const' attribute for argv
      
      This should fix the CI error in the packages repository, which happens with perl.
      Signed-off-by: NJosef Schlehofer <pepe.schlehofer@gmail.com>
      (cherry picked from commit e21fea92)
      a8001815
    • C
      firmware: intel-microcode: update to 20220510 · 47989008
      Christian Lamparter 提交于
      Debians' changelog by Henrique de Moraes Holschuh <hmh@debian.org>:
      
       * New upstream microcode datafile 20220419
        * Fixes errata APLI-11 in Atom E3900 series processors
        * Updated Microcodes:
          sig 0x000506ca, pf_mask 0x03, 2021-11-16, rev 0x0028, size 16384
      
       * New upstream microcode datafile 20220510
        * Fixes INTEL-SA-000617, CVE-2022-21151:
          Processor optimization removal or modification of security-critical
          code may allow an authenticated user to potentially enable information
          disclosure via local access (closes: #1010947)
        * Fixes several errata (functional issues) on Xeon Scalable, Atom C3000,
          Atom E3900
        * New Microcodes:
          sig 0x00090672, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
          sig 0x00090675, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
          sig 0x000906a3, pf_mask 0x80, 2022-03-24, rev 0x041c, size 212992
          sig 0x000906a4, pf_mask 0x80, 2022-03-24, rev 0x041c, size 212992
          sig 0x000b06f2, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
          sig 0x000b06f5, pf_mask 0x03, 2022-03-03, rev 0x001f, size 212992
        * Updated Microcodes:
          sig 0x00030679, pf_mask 0x0f, 2019-07-10, rev 0x090d, size 52224
          sig 0x000406e3, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 106496
          sig 0x00050653, pf_mask 0x97, 2021-11-13, rev 0x100015d, size 34816
          sig 0x00050654, pf_mask 0xb7, 2021-11-13, rev 0x2006d05, size 43008
          sig 0x00050656, pf_mask 0xbf, 2021-12-10, rev 0x4003302, size 37888
          sig 0x00050657, pf_mask 0xbf, 2021-12-10, rev 0x5003302, size 37888
          sig 0x0005065b, pf_mask 0xbf, 2021-11-19, rev 0x7002501, size 29696
          sig 0x000506c9, pf_mask 0x03, 2021-11-16, rev 0x0048, size 17408
          sig 0x000506e3, pf_mask 0x36, 2021-11-12, rev 0x00f0, size 109568
          sig 0x000506f1, pf_mask 0x01, 2021-12-02, rev 0x0038, size 11264
          sig 0x000606a6, pf_mask 0x87, 2022-03-30, rev 0xd000363, size 294912
          sig 0x000706a1, pf_mask 0x01, 2021-11-22, rev 0x003a, size 75776
          sig 0x000706a8, pf_mask 0x01, 2021-11-22, rev 0x001e, size 75776
          sig 0x000706e5, pf_mask 0x80, 2022-03-09, rev 0x00b0, size 112640
          sig 0x000806a1, pf_mask 0x10, 2022-03-26, rev 0x0031, size 34816
          sig 0x000806c1, pf_mask 0x80, 2022-02-01, rev 0x00a4, size 109568
          sig 0x000806c2, pf_mask 0xc2, 2021-12-07, rev 0x0026, size 97280
          sig 0x000806d1, pf_mask 0xc2, 2021-12-07, rev 0x003e, size 102400
          sig 0x000806e9, pf_mask 0x10, 2021-11-12, rev 0x00f0, size 105472
          sig 0x000806e9, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 105472
          sig 0x000806ea, pf_mask 0xc0, 2021-11-12, rev 0x00f0, size 105472
          sig 0x000806eb, pf_mask 0xd0, 2021-11-15, rev 0x00f0, size 105472
          sig 0x000806ec, pf_mask 0x94, 2021-11-17, rev 0x00f0, size 105472
          sig 0x00090661, pf_mask 0x01, 2022-02-03, rev 0x0016, size 20480
          sig 0x000906c0, pf_mask 0x01, 2022-02-19, rev 0x24000023, size 20480
          sig 0x000906e9, pf_mask 0x2a, 2021-11-12, rev 0x00f0, size 108544
          sig 0x000906ea, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 104448
          sig 0x000906eb, pf_mask 0x02, 2021-11-12, rev 0x00f0, size 105472
          sig 0x000906ec, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 104448
          sig 0x000906ed, pf_mask 0x22, 2021-11-16, rev 0x00f0, size 104448
          sig 0x000a0652, pf_mask 0x20, 2021-11-16, rev 0x00f0, size 96256
          sig 0x000a0653, pf_mask 0x22, 2021-11-15, rev 0x00f0, size 97280
          sig 0x000a0655, pf_mask 0x22, 2021-11-16, rev 0x00f0, size 96256
          sig 0x000a0660, pf_mask 0x80, 2021-11-15, rev 0x00f0, size 96256
          sig 0x000a0661, pf_mask 0x80, 2021-11-16, rev 0x00f0, size 96256
          sig 0x000a0671, pf_mask 0x02, 2022-03-09, rev 0x0053, size 103424
      Signed-off-by: NChristian Lamparter <chunkeey@gmail.com>
      (cherry picked from commit 2747a94f)
      47989008
    • D
      openssl: bump to 1.1.1q · c5ee4b78
      Dustin Lundquist 提交于
      Changes between 1.1.1p and 1.1.1q [5 Jul 2022]
      
        *) AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised
           implementation would not encrypt the entirety of the data under some
           circumstances.  This could reveal sixteen bytes of data that was
           preexisting in the memory that wasn't written.  In the special case of
           "in place" encryption, sixteen bytes of the plaintext would be revealed.
      
           Since OpenSSL does not support OCB based cipher suites for TLS and DTLS,
           they are both unaffected.
           (CVE-2022-2097)
           [Alex Chernyakhovsky, David Benjamin, Alejandro Sedeño]
      Signed-off-by: NDustin Lundquist <dustin@null-ptr.net>
      (cherry picked from commit 3899f68b)
      c5ee4b78
    • E
      wolfssl: bump to 5.4.0 · ade7c6db
      Eneas U de Queiroz 提交于
      This version fixes two vulnerabilities:
      -CVE-2022-34293[high]: Potential for DTLS DoS attack
      -[medium]: Ciphertext side channel attack on ECC and DH operations.
      
      The patch fixing x86 aesni build has been merged upstream.
      Signed-off-by: NEneas U de Queiroz <cotequeiroz@gmail.com>
      (cherry picked from commit 9710fe70)
      Signed-off-by: NChristian Marangi <ansuelsmth@gmail.com>
      ade7c6db
  8. 15 7月, 2022 6 次提交
    • T
      ath79: bsap18x0: pad rootfs image · 40953486
      Tomasz Maciej Nowak 提交于
      This image is supposed to be written with help of bootloader to the
      flash, but as it stands, it's not aligned to block size and RedBoot will
      happily create non-aligned partition size in FIS directory. This could
      lead to kernel to mark the partition as read-only, therefore pad the
      image to block erase size boundary.
      Signed-off-by: NTomasz Maciej Nowak <tmn505@gmail.com>
      (cherry picked from commit 9decd2a8)
      40953486
    • T
      ath79: ja76pf2: use nvmem cells to specify MAC addresses · 1be4cad6
      Tomasz Maciej Nowak 提交于
      The bootloader on this board hid the partition containig MAC addresses
      and prevented adding this space to FIS directory, therefore those had to
      be stored in RedBoot configuration as aliases to be able to assigne them
      to proper interfaces. Now that fixed partition size are used instead of
      redboot-fis parser, the partition containig MAC addresses could be
      specified, and with marking it as nvmem cell, we can assign them without
      userspace involvement.
      Signed-off-by: NTomasz Maciej Nowak <tmn505@gmail.com>
      (cherry picked from commit b52719b7)
      1be4cad6
    • T
      ath79: move image check for devices with RedBoot · 94530067
      Tomasz Maciej Nowak 提交于
      Don't comence the switch to RAMFS when the image format is wrong. This
      led to rebooting the device, which could lead to false impression that
      upgrade succeded.
      Being here, factor out the code responsible for upgrading RedBoot
      devices to separate file.
      Signed-off-by: NTomasz Maciej Nowak <tmn505@gmail.com>
      (cherry picked from commit 5897c52e)
      94530067
    • T
      ath79: switch some RedBoot based devices to OKLI loader · 8e09f9ff
      Tomasz Maciej Nowak 提交于
      After the kernel has switched version to 5.10, JA76PF2 and
      RouterStations lost the capability to sysupgrade the OpenWrt version.
      The cause is the lack of porting the patches responsible for partial
      flash erase block writing and these boards FIS directory and RedBoot
      config partitions share the same erase block. Because of that the FIS
      directory can't be updated to accommodate kernel/rootfs partition size
      changes. This could be remedied by bootloader update, but it is very
      intrusive and could potentially lead to non-trivial recovery procedure,
      if something went wrong. The less difficult option is to use OpenWrt
      kernel loader, which will let us use static partition sizes and employ
      mtd splitter to dynamically adjust kernel and rootfs partition sizes.
      On sysupgrade from ath79 19.07 or 21.02 image, which still let to modify
      FIS directory, the loader will be written to kernel partition, while the
      kernel+rootfs to rootfs partition.
      
      The caveats are:
      * image format changes, no possible upgrade from ar71xx target images
      * downgrade to any older OpenWrt version will require TFTP recovery or
        usage of bootloader command line interface
      
      To downgrade to 19.07 or 21.02, or to upgrade if one is already on
      OpenWrt with kernel 5.10, for RouterStations use TFTP recovery
      procedure. For JA76PF2 use instructions from this commit message:
      commit 0cc87b3b ("ath79: image: disable sysupgrade images for routerstations and ja76pf2"),
      replacing kernel image with loader (loader.bin suffix) and rootfs
      image with firmware (firmware.bin suffix).
      
      Fixes: b10d6044 ("kernel: add linux 5.10 support")
      Fixes: 15aa53d7 ("ath79: switch to Kernel 5.10")
      Signed-off-by: NTomasz Maciej Nowak <tmn505@gmail.com>
      (mkubntimage was moved to generic-ubnt.mk)
      Signed-off-by: NChristian Lamparter <chunkeey@gmail.com>
      (cherry picked from commit 5c142aad)
      8e09f9ff
    • R
      rockchip: reliably distribute net interrupts · 01b8cd32
      Ronny Kotzschmar 提交于
      On the NanoPI R4S it takes an average of 3..5 seconds for the network devices
      to appear in '/proc/interrupts'.
      Wait up to 10 seconds to ensure that the distribution of the interrupts
      really happens.
      Signed-off-by: NRonny Kotzschmar <ro.ok@me.com>
      (cherry picked from commit 9b00e979)
      01b8cd32
    • E
      wolfssl: re-enable AES-NI by default for x86_64 · 4fb05e45
      Eneas U de Queiroz 提交于
      Apply an upstream patch that removes unnecessary CFLAGs, avoiding
      generation of incompatible code.
      
      Commit 0bd53672 is reverted so the
      accelerated version builds by default on x86_64.
      Signed-off-by: NEneas U de Queiroz <cotequeiroz@gmail.com>
      (cherry picked from commit 639419ec)
      4fb05e45
  9. 13 7月, 2022 1 次提交
  10. 09 7月, 2022 5 次提交