Removes a redundant patch with a fix already upstream. Build tested on
apm821xx (PPC).
Signed-off-by: Russell Senior
---
tools/patch/Makefile | 4 ++--
tools/patch/patches/001-fix-macos-vasnprintf.patch | 25 --
2 files changed, 2 insertions
To also prepare for following commits introducing more string value
change detection
Signed-off-by: Yousong Zhou
---
service/instance.c | 14 ++
1 file changed, 6 insertions(+), 8 deletions(-)
diff --git a/service/instance.c b/service/instance.c
index 12c2efe..c3f8b56 100644
--- a/s
We currently only call setgid() with user's primary group id for service
instance processes. In the case of a user belong to multiple groups,
it's natural to also explicitly initialize their supplementary group ids
Fixes FS#988
Signed-off-by: Yousong Zhou
---
service/instance.c | 13 ++
Instead of creating an ubifs file system with format version 5 by
default on empty UBI volumes use the older format 4 by default. This
will make it possible to mount these file systems also on older kernel
versions.
When a user wants to do a sysupgrade from kernel 4.14 to kernel 4.9 the
old kernel
This is needed to prevent copying it into kernel 4.14.
These device tree files are already integrated into kernel 4.14 and we
would like to use the upstream versions only.
Signed-off-by: Hauke Mehrtens
---
.../{files => files-4.4}/arch/arm/boot/dts/armada-385-linksys-rango.dts | 0
.../{files
This switches to kernel 4.14 by default.
Signed-off-by: Hauke Mehrtens
---
target/linux/mvebu/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/target/linux/mvebu/Makefile b/target/linux/mvebu/Makefile
index a07aa7cf2d..6f0c1925c2 100644
--- a/target/linux/mvebu/Makefi
This is in preparation for the 4.14 port, this is just coping all the
files to make it easier to see the differences between kernel 4.9 and
kernel 4.14.
Signed-off-by: Hauke Mehrtens
---
target/linux/mvebu/{config-4.9 => config-4.14}| 0
.../linux/mvebu/{patches-4.4 =
This add support for kernel 4.14 to the mvebu target. My main reason to
add kernel 4.14 support is to make it easier to also add support for the
Marvell Armada 3700LP ARM64 SoCs especially the ESPRESSObin board.
I tested this on my WRT1200AC board and got positive feedback form
multiple other
The name of the PCIe controller node in device tree changed between
kernel 4.9 and kernel 4.14. Migrate the configuration when an update
from kernel 4.9 to 4.14 or back is done to the new name to make
the existing wifi configuration compatible with the new names.
This replaces the "pcie-controller
Using PKG_SOURCE_DATE instead of PKG_VERSION will make the build system
generate the version based on the date and the git hash. This way the
tar file name changes when the git hash changes and this avoids problems
when someone forgets to change the version, but changes the git hash.
Signed-off-by
From: Chris Breuer
Changes since last merge into OpenWrt since 2017-12-14:
- Added debugfs file tx_hist.
- Added debugfs file fixed_rate.
- Added debugfs file ba_hist.
- Modified the way to establish BA stream.
- Added code to control BF type.
- Added functions to check/dump dhcp packet.
-
vfs_write() is not exported on kernel 4.14 any more and kernel_write()
should be used instead.
Signed-off-by: Hauke Mehrtens
---
.../mwlwifi/patches/001-remove-vfs_write.patch | 92 ++
1 file changed, 92 insertions(+)
create mode 100644 package/kernel/mwlwifi/patches/001
Make it easily possible to add a custom script in front of this hotplug
script which adds new devices. This is needed for the mvebu target in
which we want to migrate the old configuration before new devices are
getting detected.
Signed-off-by: Hauke Mehrtens
---
package/kernel/mac80211/Makefile
> On Feb 11, 2018, at 3:54 AM, Yousong Zhou wrote:
>
> On 9 February 2018 at 08:28, Philip Prindeville
> wrote:
>> From: Philip Prindeville
>>
>> Allowing password logins leaves you vulnerable to dictionary
>> attacks. We disable password-based authentication, limiting
>> authentication to
> On Feb 11, 2018, at 3:54 AM, Yousong Zhou wrote:
>
> On 9 February 2018 at 08:28, Philip Prindeville
> wrote:
>> From: Philip Prindeville
>>
>> Allowing password logins leaves you vulnerable to dictionary
>> attacks. We disable password-based authentication, limiting
>> authentication to
> On Feb 11, 2018, at 4:23 AM, Alberto Bursi wrote:
>
>
>
> On 02/11/2018 11:54 AM, Yousong Zhou wrote:
>> On 9 February 2018 at 08:28, Philip Prindeville
>> wrote:
>>> From: Philip Prindeville
>>>
>>> Allowing password logins leaves you vulnerable to dictionary
>>> attacks. We disable pa
Sent from my iPhone
> On Feb 11, 2018, at 4:11 AM, Torbjorn Jansson
> wrote:
>
>> On 2018-02-11 11:54, Yousong Zhou wrote:
>> On 9 February 2018 at 08:28, Philip Prindeville
>> wrote:
>>> From: Philip Prindeville
>>>
>>> Allowing password logins leaves you vulnerable to dictionary
>>> att
Hi
could you resend this with a description text ? I figured out what the
patch does but it would be nice to have it as part of the commit history.
same for the group id patch please ...
John
On 11/02/18 13:07, Yousong Zhou wrote:
Signed-off-by: Yousong Zhou
---
service/instance.c |
Fixes FS#988
Signed-off-by: Yousong Zhou
---
service/instance.c | 13 -
service/instance.h | 1 +
2 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/service/instance.c b/service/instance.c
index c3f8b56..76573f7 100644
--- a/service/instance.c
+++ b/service/instance.c
@@
Signed-off-by: Yousong Zhou
---
service/instance.c | 14 ++
1 file changed, 6 insertions(+), 8 deletions(-)
diff --git a/service/instance.c b/service/instance.c
index 12c2efe..c3f8b56 100644
--- a/service/instance.c
+++ b/service/instance.c
@@ -588,6 +588,11 @@ instance_restart(struc
On 02/11/2018 11:54 AM, Yousong Zhou wrote:
On 9 February 2018 at 08:28, Philip Prindeville
wrote:
From: Philip Prindeville
Allowing password logins leaves you vulnerable to dictionary
attacks. We disable password-based authentication, limiting
authentication to keys only which are more se
On 2018-02-11 11:54, Yousong Zhou wrote:
On 9 February 2018 at 08:28, Philip Prindeville
wrote:
From: Philip Prindeville
Allowing password logins leaves you vulnerable to dictionary
attacks. We disable password-based authentication, limiting
authentication to keys only which are more secure.
On 9 February 2018 at 08:28, Philip Prindeville
wrote:
> From: Philip Prindeville
>
> Allowing password logins leaves you vulnerable to dictionary
> attacks. We disable password-based authentication, limiting
> authentication to keys only which are more secure.
>
> Note: You'll need to pre-popul
23 matches
Mail list logo