1. 24 11月, 2020 1 次提交
    • S
      kernel: mtd: parser: cmdline: Fix parsing of part-names with colons · 9f2a40c7
      Sven Eckelmann 提交于
      Some devices (especially QCA ones) are already using hardcoded partition
      names with colons in it. The OpenMesh A62 for example provides following
      mtd relevant information via cmdline:
      
        root=31:11 mtdparts=spi0.0:256k(0:SBL1),128k(0:MIBIB),384k(0:QSEE),64k(0:CDT),64k(0:DDRPARAMS),64k(0:APPSBLENV),512k(0:APPSBL),64k(0:ART),64k(custom),64k(0:KEYS),0x002b0000(kernel),0x00c80000(rootfs),15552k(inactive) rootfsname=rootfs rootwait
      
      The change to split only on the last colon between mtd-id and partitions
      will cause newpart to see following string for the first partition:
      
        KEYS),0x002b0000(kernel),0x00c80000(rootfs),15552k(inactive)
      
      Such a partition list cannot be parsed and thus the device fails to boot.
      
      Avoid this behavior by making sure that the start of the first part-name
      ("(") will also be the last byte the mtd-id split algorithm is using for
      its colon search.
      
      Fixes: 5d01d056 ("kernel: Update kernel 4.14 to version 4.14.202")
      Fixes: edda06c7 ("kernel: Update kernel 4.9 to version 4.9.240")
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      (backported from commit 223eec7e)
      9f2a40c7
  2. 18 11月, 2020 2 次提交
  3. 12 11月, 2020 2 次提交
  4. 11 11月, 2020 2 次提交
  5. 28 10月, 2020 1 次提交
  6. 20 10月, 2020 1 次提交
  7. 18 10月, 2020 3 次提交
  8. 17 10月, 2020 1 次提交
  9. 08 10月, 2020 1 次提交
  10. 28 9月, 2020 6 次提交
  11. 31 8月, 2020 2 次提交
  12. 27 8月, 2020 3 次提交
    • M
      mbedtls: update to 2.16.7 · fec2888a
      Magnus Kroken 提交于
      Mbed TLS 2.16.7 is a maintenance release of the Mbed TLS 2.16 branch,
      and provides bug fixes and minor enhancements. This release includes
      fixes for security issues and the most severe one is described in more
      detail in a security advisory:
      https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2020-07
      
      * Fix a side channel vulnerability in modular exponentiation that could
      reveal an RSA private key used in a secure enclave.
      * Fix side channel in mbedtls_ecp_check_pub_priv() and
      mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a private
      key that didn't include the uncompressed public key), as well as
      mbedtls_ecp_mul() / mbedtls_ecp_mul_restartable() when called with a NULL
      f_rng argument. An attacker with access to precise enough timing and
      memory access information (typically an untrusted operating system
      attacking a secure enclave) could fully recover the ECC private key.
      * Fix issue in Lucky 13 counter-measure that could make it ineffective when
      hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT
      macros).
      
      Due to Mbed TLS moving from ARMmbed to the Trusted Firmware project, some
      changes to the download URLs are required. For the time being, the
      ARMmbed/mbedtls Github repository is the canonical source for Mbed TLS.
      Signed-off-by: NMagnus Kroken <mkroken@gmail.com>
      [Use https://codeload.github.com and new tar.gz file]
      Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de
      (cherry picked from commit 201d6776)
      fec2888a
    • H
      kernel: Update kernel 4.9 to version 4.9.234 · 3ad44fcd
      Hauke Mehrtens 提交于
      Compile and runtime tested on lantiq/xrx200.
      Signed-off-by: NHauke Mehrtens <hauke@hauke-m.de>
      3ad44fcd
    • H
      kernel: Update kernel 4.14 to version 4.14.195 · b8336eba
      Hauke Mehrtens 提交于
      Compile and runtime tested on x86/64.
      Signed-off-by: NHauke Mehrtens <hauke@hauke-m.de>
      b8336eba
  13. 12 8月, 2020 1 次提交
  14. 11 8月, 2020 4 次提交
  15. 08 8月, 2020 2 次提交
  16. 03 8月, 2020 2 次提交
  17. 02 8月, 2020 2 次提交
  18. 26 7月, 2020 1 次提交
  19. 08 7月, 2020 1 次提交
  20. 06 7月, 2020 1 次提交
  21. 05 7月, 2020 1 次提交
    • S
      wireguard: bump to 1.0.20200611 · 8ae74cca
      Stijn Segers 提交于
      This bump fixes breakage introduced by kernel commit 8ab8786f78c3fc930f9abf6d6d85e95567de4e1f,
      which is part of the 4.14.181 kernel bump, and backported ip6_dst_lookup_flow to 4.14.
      This breaks the older WireGuard version currently in 19.07.
      
      For reference, the compilation error is the one below:
      
      build_dir/target-x86_64_musl/linux-x86_64/wireguard-linux-compat-1.0.20200506/src/compat/compat.h:104:42: error: 'const struct ipv6_stub' has no member named 'ipv6_dst_lookup'; did you mean 'ipv6_dst_lookup_flow'?
       #define ipv6_dst_lookup_flow(a, b, c, d) ipv6_dst_lookup(a, b, &dst, c) + (void *)0 ?: dst
      
      Changelogs below taken from the official release announcements.
      
      == Changes since v1.0.20200506 ==
      
        This release aligns with the changes I sent to DaveM for 5.7-rc7 and were
        pushed to net.git about 45 minutes ago.
      
        * qemu: use newer iproute2 for gcc-10
        * qemu: add -fcommon for compiling ping with gcc-10
      
        These enable the test suite to compile with gcc-10.
      
        * noise: read preshared key while taking lock
      
        Matt noticed a benign data race when porting the Linux code to OpenBSD.
      
        * queueing: preserve flow hash across packet scrubbing
        * noise: separate receive counter from send counter
      
        WireGuard now works with fq_codel, cake, and other qdiscs that make use of
        skb->hash. This should significantly improve latency spikes related to
        buffer bloat. Here's a before and after graph from some data Toke measured:
        https://data.zx2c4.com/removal-of-buffer-bloat-in-wireguard.png
      
        * compat: support RHEL 8 as 8.2, drop 8.1 support
        * compat: support CentOS 8 explicitly
        * compat: RHEL7 backported the skb hash renamings
      
        The usual RHEL churn.
      
        * compat: backport renamed/missing skb hash members
      
        The new support for fq_codel and friends meant more backporting work.
      
        * compat: ip6_dst_lookup_flow was backported to 4.14, 4.9, and 4.4
      
      == Changes since v1.0.20200611 ==
      
        * qemu: always use cbuild gcc rather than system gcc
        * qemu: remove -Werror in order to build ancient kernels better
        * qemu: patch kernels that rely on ancient make
        * qemu: force 2MB pages for binutils 2.31
        * qemu: use cbuild gcc for avx512 exclusion
        * qemu: add extra fill in idt handler for newer binutils
        * qemu: support fetching kernels for arbitrary URLs
        * qemu: patch in UTS_UBUNTU_RELEASE_ABI for Ubuntu detection
        * qemu: work around broken centos8 kernel
        * qemu: mark per_cpu_load_addr as static for gcc-10
      
        Our qemu test suite can now handle more kernels and more compilers. Scroll
        down to the bottom of https://www.wireguard.com/build-status/ to see the
        expanded array of kernels we now test against, including some distro kernels.
      
        * compat: widen breadth of integer constants
        * compat: widen breadth of memzero_explicit backport
        * compat: backport skb_scrub_packet to 3.11
        * compat: widen breadth of prandom_u32_max backport
        * compat: narrow the breadth of iptunnel_xmit backport
        * compat: backport iptunnel_xmit to 3.11
      
        With the expanded qemu test suite, it was possible to expand our list of
        mainline kernels, so the backport compat layer is now more precise.
      
        * compat: ubuntu appears to have backported ipv6_dst_lookup_flow
        * compat: bionic-hwe-5.0/disco kernel backported skb_reset_redirect and ipv6 flow
      
        Ubuntu kernels changed recently, so this ensures we can compile with the
        latest Ubuntu releases.
      
        * compat: remove stale suse support
      Signed-off-by: NStijn Segers <foss@volatilesystems.org>
      (cherry picked from commit 1fd1f5e8cff18f97675ce303b05d411136b99fb0)
      8ae74cca