Re: [PATCH] image.mk: fix dd memory exhaustion during padding of large images

2024-04-01 Thread Mirko Parthey via openwrt-devel
The sender domain has a DMARC Reject/Quarantine policy which disallows
sending mailing list messages using the original "From" header.

To mitigate this problem, the original message has been wrapped
automatically by the mailing list software.--- Begin Message ---
On Mon, Apr 01, 2024 at 03:34:09PM +0200, Mirko Parthey wrote:
> OpenWrt's busybox supports it.
Please disregard this, support is required on the build host.

--- End Message ---
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


Re: [PATCH] image.mk: fix dd memory exhaustion during padding of large images

2024-04-01 Thread Mirko Parthey via openwrt-devel
The sender domain has a DMARC Reject/Quarantine policy which disallows
sending mailing list messages using the original "From" header.

To mitigate this problem, the original message has been wrapped
automatically by the mailing list software.--- Begin Message ---
On Mon, Apr 01, 2024 at 10:25:11AM +, Petr Štetiar wrote:
> + bs=1048576 count=$(shell expr $(2) / 1048576) \

How about using dd iflag=count_bytes instead?
OpenWrt's busybox supports it.

--- End Message ---
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


[PATCH] ramips: use lzma-loader on D-Link DIR-615 H1

2021-09-30 Thread Mirko Parthey
Fixes the boot loader LZMA decompression issue:
LZMA ERROR 1 - must RESET board to recover

Signed-off-by: Mirko Parthey 
---
Please consider backporting to openwrt-21.02, which is also affected.

 target/linux/ramips/image/rt305x.mk | 1 +
 1 file changed, 1 insertion(+)

diff --git a/target/linux/ramips/image/rt305x.mk 
b/target/linux/ramips/image/rt305x.mk
index 6c339dc..e817c12 100644
--- a/target/linux/ramips/image/rt305x.mk
+++ b/target/linux/ramips/image/rt305x.mk
@@ -433,6 +433,7 @@ endef
 TARGET_DEVICES += dlink_dir-615-d

 define Device/dlink_dir-615-h1
+  $(Device/uimage-lzma-loader)
   SOC := rt3352
   BLOCKSIZE := 4k
   IMAGES += factory.bin
--
2.20.1


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


Re: FRAG Attacks (new vuln for wifi)

2021-05-13 Thread Mirko Parthey
On Thu, May 13, 2021 at 03:49:05PM +0200, Felix Fietkau wrote:
> We're talking about the version of the kernel tree used to create the
> ath10k-ct source, not the kernel version used by OpenWrt.

OK, sorry for the noise.

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


Re: FRAG Attacks (new vuln for wifi)

2021-05-13 Thread Mirko Parthey
On Thu, May 13, 2021 at 05:57:01AM +0200, Felix Fietkau wrote:
> >> > Regarding ath10k-ct, what kernel-versions of the ath10k-ct driver need 
> >> > to be patched?
> >> > Is 4.19 the oldest that owrt will consume?
> >> I think so. 4.19 is used by OpenWrt 19.07 and I don't think we'll update
> >> anything older than that.
> >
> > So, to summarise, the 4.19, 5.4 and 5.10 branch kernels are currently in 
> > use.
> I don't see where we're using the ath10k-ct 5.4 kernel at all. It should
> be just 4.19 and 5.10.

I am just commenting from the sideline, but I see other Kernel versions:

OpenWrt 19.07 = Kernel 4.14
OpenWrt 21.02 = Kernel 5.4
OpenWrt master = mostly still Kernel 5.4, but moving towards 5.10

https://downloads.openwrt.org/releases/19.07.7/targets/ipq40xx/generic/packages/kmod-ath10k-ct_4.14.221+2019-09-09-5e8cd86f-1_arm_cortex-a7_neon-vfpv4.ipk
https://downloads.openwrt.org/releases/21.02.0-rc1/targets/ipq40xx/generic/packages/kmod-ath10k-ct_5.4.111+2021-01-11-9fe1df7d-2_arm_cortex-a7_neon-vfpv4.ipk
https://downloads.openwrt.org/snapshots/targets/ipq40xx/generic/packages/kmod-ath10k-ct_5.4.117+2021-01-11-9fe1df7d-2_arm_cortex-a7_neon-vfpv4.ipk

Regards,
Mirko

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


[OpenWrt-Devel] [PATCH] ramips: fix D-Link DIR-615 H1 switch port mapping

2019-01-29 Thread Mirko Parthey
Reuse a device-specific switch port mapping which also applies to the
D-Link DIR-615 H1.

Signed-off-by: Mirko Parthey 
---
 target/linux/ramips/base-files/etc/board.d/02_network | 1 +
 1 file changed, 1 insertion(+)

diff --git a/target/linux/ramips/base-files/etc/board.d/02_network 
b/target/linux/ramips/base-files/etc/board.d/02_network
index 7493812..67f2b49 100755
--- a/target/linux/ramips/base-files/etc/board.d/02_network
+++ b/target/linux/ramips/base-files/etc/board.d/02_network
@@ -32,8 +32,9 @@ ramips_setup_interfaces()

case $board in
11acnas|\
d-team,newifi-d2|\
+   dir-615-h1|\
w2914nsv2|\
zbt-we2026)
ucidef_add_switch "switch0" \
"0:lan:4" "1:lan:3" "2:lan:2" "3:lan:1" "4:wan:5" 
"6@eth0"
--
2.1.4


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] [PATCH] iptables: increment PKG_RELEASE to force update

2018-06-19 Thread Mirko Parthey
On Wed, Jun 13, 2018 at 04:29:50PM +0200, Mirko Parthey wrote:
> While support for the FLOWOFFLOAD target is available in the firmware
> images, it is still missing in some of the binary packages on
> downloads.openwrt.org, e.g. for the mipsel_mips32 architecture.
> 
> Increment PKG_RELEASE to force an update of these packages.

Apparently this change did not solve the issue mentioned above.
I am sorry for this, and now reported it in Flyspray as FS#1597.

As to the change itself, I believe it is still worthwhile for 18.06 
since it is a followup to:

commit d073f650cdef24dce957099e55b660124fe2e0a4
Author: Felix Fietkau 
Date:   Fri Mar 23 12:53:44 2018 +0100

kernel: add support for enabling hardware flow offload via iptables

Thanks,
Mirko

___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/listinfo/openwrt-devel


[OpenWrt-Devel] [PATCH] iptables: increment PKG_RELEASE to force update

2018-06-13 Thread Mirko Parthey
While support for the FLOWOFFLOAD target is available in the firmware
images, it is still missing in some of the binary packages on
downloads.openwrt.org, e.g. for the mipsel_mips32 architecture.

Increment PKG_RELEASE to force an update of these packages.
Also adjust the package description to include the FLOWOFFLOAD target.

Signed-off-by: Mirko Parthey 
---
If accepted, I would also suggest backporting this to openwrt-18.06.

 package/network/utils/iptables/Makefile | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/package/network/utils/iptables/Makefile 
b/package/network/utils/iptables/Makefile
index d70dc11..44e24b2 100644
--- a/package/network/utils/iptables/Makefile
+++ b/package/network/utils/iptables/Makefile
@@ -10,7 +10,7 @@ include $(INCLUDE_DIR)/kernel.mk
 
 PKG_NAME:=iptables
 PKG_VERSION:=1.6.2
-PKG_RELEASE:=1
+PKG_RELEASE:=2
 
 PKG_SOURCE_PROTO:=git
 PKG_SOURCE_URL:=https://git.netfilter.org/iptables
@@ -88,6 +88,7 @@ IP firewall administration tool.
   - DNAT
   - DROP
   - REJECT
+  - FLOWOFFLOAD
   - LOG
   - MARK
   - MASQUERADE
-- 
2.1.4


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/listinfo/openwrt-devel


[OpenWrt-Devel] [PATCH] mtd: mark as nonshared to fix FS#484

2018-05-31 Thread Mirko Parthey
The mtd tool is built with different configurations depending on the
target. For example, brcm47xx adds the fixtrx subcommand, without which
an image fails when booting the second time.

Mark the mtd package as nonshared to really fix FS#484.

Signed-off-by: Mirko Parthey 
---
 package/system/mtd/Makefile | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/package/system/mtd/Makefile b/package/system/mtd/Makefile
index 01277d9..9ae03a7 100644
--- a/package/system/mtd/Makefile
+++ b/package/system/mtd/Makefile
@@ -17,6 +17,8 @@ STAMP_PREPARED := $(STAMP_PREPARED)_$(call 
confvar,CONFIG_MTD_REDBOOT_PARTS)
 PKG_LICENSE:=GPL-2.0+
 PKG_LICENSE_FILES:=
 
+PKG_FLAGS:=nonshared
+
 include $(INCLUDE_DIR)/package.mk
 
 define Package/mtd
-- 
2.1.4


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/listinfo/openwrt-devel


[OpenWrt-Devel] [PATCH v2] brcm47xx: add switch port mapping to Asus WL-500W

2018-05-22 Thread Mirko Parthey
Switch ports 0..3 are connected to external ports LAN{1..4} in sequence,
switch port 4 is not used, and switch port 5 is connected to the CPU.
The WAN port is attached to the CPU's second network interface; it has no
connection to the internal switch.

Reuse the "Dell TrueMobile 2300" entry, which describes the same mapping.

Signed-off-by: Mirko Parthey <mirko.part...@web.de>
---
This patch is an update to https://patchwork.ozlabs.org/patch/734831/

Changes since v1:
* resubmit because patch was dropped from patchwork
* update commit message to match similar patches
* rebase on master and test again

 target/linux/brcm47xx/base-files/etc/board.d/01_detect | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/target/linux/brcm47xx/base-files/etc/board.d/01_detect 
b/target/linux/brcm47xx/base-files/etc/board.d/01_detect
index 1860407..2373145 100755
--- a/target/linux/brcm47xx/base-files/etc/board.d/01_detect
+++ b/target/linux/brcm47xx/base-files/etc/board.d/01_detect
@@ -139,7 +139,6 @@ detect_by_model() {
;;
 
"Asus WL500G" | \
-   "Asus WL500W" | \
"Microsoft MN-700")
ucidef_set_interfaces_lan_wan "eth0" "eth1"
;;
@@ -159,6 +158,7 @@ detect_by_model() {
"0:wan" "1:lan" "2:lan" "3:lan" "4:lan" "5@eth0"
;;
 
+   "Asus WL500W" | \
"Dell TrueMobile 2300")
ucidef_set_interface_wan "eth1"
ucidef_add_switch "switch0" \
-- 
2.1.4


___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
http://lists.infradead.org/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] Archer VR200v GPL code

2015-05-04 Thread Mirko Parthey
On Mon, May 04, 2015 at 12:23:10PM +0200, Daniel Golle wrote:
 I cannot find the sourcecode on http://www.tp-link.de/support/gpl/

In the menu on the left, choose VDSL/ADSL.
This leads to:
http://www.tp-link.de/support/gpl/?categoryid=548
http://www.tp-link.de/resources/gpl/Archer-VR200v_GPL.tar.gz

Regards
Mirko
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel


Re: [OpenWrt-Devel] (CVE-2014-2338) authentication bypass vulnerability in strongSwan needs patching

2014-07-06 Thread Mirko Parthey
Am Sonntag, 06.07.14, 00:00 +0200 schrieb Noel Kuntze:
 I am once again inquiring about this vulnerabity.
 The strongSwan version in the repository for the 12.09 version of OpenWRT is 
 still not patched
 and Mr. Fietkau does not respond to any emails. I wrote him one on 2014-06-08 
 and one on 2014-07-02.
 
 Please update the packages.
 Lots of people are running vulnerable StrongSwan versions on publicly 
 reachable OpenWRT routers.

Felix Fietkau updated the strongSwan package in the 12.09 SVN branch
(r40518, 2014-04-15) shortly after updating it in trunk.
However, it appears that the release branch is not rebuilt automatically,
so the binary packages are outdated.
For OpenSSL, packages have been rebuilt manually, but that seems to be
the exception.

There has been mention on this mailing list of a Barrier Breaker release
being worked on, but I have no information if there will be another
release of Attitude Adjustment, which would then also come with updated
packages from the 12.09 branch.

Regards,
Mirko
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel