These fix behavior with several devices where pcie0 is not connected.
Funny enough, these commits actually revert behavior to the original
driver.
Signed-off-by: Rosen Penev
---
target/linux/ramips/dts/mt7621.dtsi | 9 +-
...perly-power-off-dual-ported-pcie-phy.patch | 70
On Sun, Mar 29, 2020 at 6:13 PM Rosen Penev wrote:
>
> Required for installation of autoconf:
>
> make[5]: Entering directory `/openwrt/build_dir/host/autoconf-2.69'
> Making all in bin
> make[6]: Entering directory `/openwrt/build_dir/host/autoconf-2.69/bin'
> autom4te_perllibdir='..'/lib
On Fri, Apr 17, 2020 at 1:50 AM wrote:
>
> Hi,
>
> > -Original Message-
> > From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> > On Behalf Of Rosen Penev
> > Sent: Mittwoch, 15. April 2020 01:37
> > To: openwrt-devel@lists.openwrt.org
> > Subject: [OpenWrt-Devel]
This should make debugging build errors in scripts/config a bit easier.
Signed-off-by: Eneas U de Queiroz
diff --git a/include/toplevel.mk b/include/toplevel.mk
index 2965f75c7c..ad8e5b8f20 100644
--- a/include/toplevel.mk
+++ b/include/toplevel.mk
@@ -104,7 +104,8 @@ scripts/config/%onf:
From: Petr Štetiar
This applies 965f341aa9 ("build: fix host menu config targets using
ncurses") to the SDK top Makefile.
If there is a pkg-config in the staging dir, it will try to use it
instead of the host system's pkg-config; then it will fail to find the
ncurses package. Linux's default
This is primarily a maintenance release with bugfixes and improvements.
This release also fixes a security issue (CVE-2020-11810) which allows
disrupting service of a freshly connected client that has not yet
negotiated session keys. The vulnerability cannot be used to
inject or steal VPN traffic.
>From a least privileges perspective:
- chmod o-rwx /var/run/hostapd-phyX.conf
- chmod o-x uci # setfacl?
Compromise of a service running as a different user should not result in
disclosure of sensitive keys only necessary for different services.
Am Sun, 12 Apr 2020 14:33:03 -0700
schrieb openwrt-devel-requ...@lists.openwrt.org:
> Your membership in the mailing list openwrt-devel has been disabled
> due to excessive bounces The last bounce received from you was dated
> 12-Apr-2020. You will not get any more messages from this list until
On Fri, Apr 17, 2020 at 10:50:32AM +0200, m...@adrianschmutzler.de wrote:
> Hi,
>
> > -Original Message-
> > From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> > On Behalf Of Rosen Penev
> > Sent: Mittwoch, 15. April 2020 01:37
> > To: openwrt-devel@lists.openwrt.org
>
No. If you have physical access to the node and/or a valid login as Admin
then any form of PSK is vulnerable.
If you are concerned about PSK's being exposed then you have the option to
run 802.1x auth and issue issues tokens out of radius/IDM that is secured
elsewhere than on the AP itself.
On
Hi,
> -Original Message-
> From: openwrt-devel [mailto:openwrt-devel-boun...@lists.openwrt.org]
> On Behalf Of Rosen Penev
> Sent: Mittwoch, 15. April 2020 01:37
> To: openwrt-devel@lists.openwrt.org
> Subject: [OpenWrt-Devel] [PATCHv3] ubox: run init script through shellcheck
>
>
Hi,
the configuration files for hostapd (/var/run/hostapd-phyX.conf) are readable
for everyone. This means everyone can read the wifi passwords. If a non
privileged user calls 'uci show wireless', he will also get all wifi passwords.
This possible e.g. for user nobody and dnsmasq.
Is this a a
This patch adds supports for GL-MV1000.
Specification:
- SOC: Marvell Armada 88F3720 (1GHz)
- Flash: 16MB (W25Q128FWSIG)
- RAM: 1GB DDR4
- Ethernet: 3x GE (1 WAN + 2 LAN)
- EMMC: 8GB EMMC (KLM8G1GETF-B041)
- MicroSD: 1x microSD slot
- USB:
13 matches
Mail list logo