summaryrefslogtreecommitdiff
path: root/target/linux/generic/patches-4.4
Commit message (Collapse)AuthorAgeFilesLines
* kernel: refresh patchesKoen Vandeputte2018-02-187-57/+18
| | | | Signed-off-by: Koen Vandeputte <koen.vandeputte@ncentric.com>
* kernel: backport raw-ip mode for newer QMI LTE modemsKoen Vandeputte2018-02-187-0/+701
| | | | | | | | | | | | | | Backport support for raw-ip mode including all known fixes afterwards. Newer LTE modems only tend to support this mode, which was only introduced in kernel 4.5. Also backport support for the Quectel EC2x LTE modem series which is a very popular device. No custom changes were needed in order to apply these patches. Signed-off-by: Koen Vandeputte <koen.vandeputte@ncentric.com>
* kernel: bump 4.4 to 4.4.112 for 17.01Kevin Darbyshire-Bryant2018-01-229-161/+15
| | | | | | | | | | | | | | | | | | | | | | Refresh patches. Remove upstreamed patches: target/linux/generic/patches-4.4/030-2-smsc75xx-use-skb_cow_head-to-deal-with-cloned-skbs.patch target/linux/generic/patches-4.4/030-3-cx82310_eth-use-skb_cow_head-to-deal-with-cloned-skb.patch target/linux/generic/patches-4.4/030-4-sr9700-use-skb_cow_head-to-deal-with-cloned-skbs.patch target/linux/generic/patches-4.4/030-5-lan78xx-use-skb_cow_head-to-deal-with-cloned-skbs.patch CVEs completely or partially addressed: CVE-2017-5715 CVE-2017-5753 CVE-2017-17741 CVE-2017-1000410 Compile-tested: ar71xx Archer C7 v2 Run-tested: ar71xx Archer C7 v2 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: bump 4.4 to 4.4.111 for 17.01Kevin Darbyshire-Bryant2018-01-172-3/+3
| | | | | | | | Refresh patches Tested-on: ar71xx Archer C7 v2 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: update kernel 4.4 to version 4.4.110Hauke Mehrtens2018-01-074-5/+5
| | | | | | This fixes: CVE-2017-5754 Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: bump 4.4 to 4.4.108 for 17.01Kevin Darbyshire-Bryant2017-12-301-1/+1
| | | | | | Refresh patches. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* kernel: bump 4.4 to 4.4.107Etienne Haarsma2017-12-234-18/+18
| | | | | | | | | | | | | Bump 4.4 to 4.4.107 and refreshed all patches. Made the following patch for Mediatek and Oxnas compatible with kernel 4.4.107: 0072-mtd-backport-v4.7-0day-patches-from-Boris.patch Compile-tested: ar71xx Run-tested: ar71xx Signed-off-by: Etienne Haarsma <bladeoner112@gmail.com> Reviewed-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk> Tested-by: Rosen Penev <rosenp@gmail.com>
* kernel: remove out of tree direct-io disable hackFelix Fietkau2017-12-131-80/+0
| | | | | | | | | Direct-IO support has to be enabled for the release build anyway, so this hack is not worth keeping Signed-off-by: Felix Fietkau <nbd@nbd.name> (backported from commit 0b7ed65cec8084bb98ae0e2758b7aca6c447cd4b) Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* kernel: bump 4.4 to 4.4.103 for 17.01Etienne Haarsma2017-12-122-5/+5
| | | | | | | | | | | | | Refreshed all patches. Removed upstream ramips patches: 0101-MIPS-ralink-Fix-MT7628-pinmux.patch 0102--MIPS-ralink-Fix-typo-in-mt7628-pinmux-function.patch Compile-tested: ar71xx Run-tested: ar71xx Signed-off-by: Etienne Haarsma <bladeoner112@gmail.com>
* kernel: bump 4.4 to 4.4.102Etienne Haarsma2017-11-269-17/+17
| | | | | | | | | | | | Refreshed all patches. Removed upstream ramips patch: 0063-set-CM_GCR_BASE_CMDEFTGT_MEM-according-to-datasheet.patch Compile-tested: ar71xx Run-tested: ar71xx Signed-off-by: Etienne Haarsma <bladeoner112@gmail.com> Tested-by: Stijn Segers <francesco.borromini@inventati.org>
* kernel: bump 4.4 to 4.4.92Stijn Tintel2017-10-162-6/+6
| | | | | | | | | | | Refresh patches. Fixes the following CVEs: - CVE-2017-1000252 - CVE-2017-12153 - CVE-2017-12154 Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* kernel: add fix for bgmac with B50212E B1 PHYRafał Miłecki2017-10-135-3/+98
| | | | | | | This PHY requires some extra programming to work reliably with all devices. Backport upstream fix for it. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* generic: drop 704-phy-no-genphy-soft-reset.patchFlorian Fainelli2017-09-301-11/+0
| | | | | | | | | | | | 4.4.80+ contains 71a165f6397df07a06ce643de5c2dbae29bd3cfb, 4.9.41+ contains 6c78197e4a69c19e61dfe904fdc661b2aee8ec20 which are all backports of upstream commit 0878fff1f42c18e448ab5b8b4f6a3eb32365b5b6 ("net: phy: Do not perform software reset for Generic PHY"). Our local patch is no longer needed, all this patch was doing was utilizing gen10g_soft_reset which does nothing either, so just keep the code unchanged. Signed-off-by: Florian Fainelli <f.fainelli@gmail.com>
* kernel: update 4.4 to 4.4.89Hauke Mehrtens2017-09-303-13/+13
| | | | Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: backport usbport LED trigger driver support for DTRafał Miłecki2017-08-211-0/+106
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: fix of_node handling in LEDs core codeRafał Miłecki2017-08-214-0/+316
| | | | | | | | | This backports fixes for setting of_node and making it possible to read extra info from DT. This was partially fixed by: [PATCH] leds: leds-gpio: Set of_node for created LED devices but it didn't work during initialization. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: update 4.4 to 4.4.83Kevin Darbyshire-Bryant2017-08-177-34/+16
| | | | | | | | | | | | | | | Refresh patches. Minor update 704-phy-no-genphy-soft-reset.patch which was partially accepted upstream. Compile-tested on ar71xx. Runtime-tested on ar71xx. Fixes the following vulnerabilities: - CVE-2017-7533 (4.4.80) - CVE-2017-1000111 (4.4.82) - CVE-2017-1000112 (4.4.82) Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
* kernel: update kernel 4.4 to version 4.4.79Hauke Mehrtens2017-07-2822-379/+47
| | | | Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: update kernel 4.4 to 4.4.74Stijn Tintel2017-06-276-23/+23
| | | | | | | | Refresh patches. Compile-tested on ar71xx, octeon. Runtime-tested on ar71xx, octeon. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* kernel: backport Broadcom thermal driversRafał Miłecki2017-06-225-0/+801
| | | | | | This includes driver for Northstar and for Raspberry Pi. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: update kernel 4.4 to 4.4.71Jo-Philipp Wich2017-06-072-3/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes the following security vulnerabilities: CVE-2017-8890 The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call. CVE-2017-9074 The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls. CVE-2017-9075 The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. CVE-2017-9076 The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. CVE-2017-9077 The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. CVE-2017-9242 The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls. Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890 Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074 Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075 Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076 Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077 Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242 Ref: https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.71 Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* kernel: update kernel 4.4 to 4.4.69Stijn Segers2017-05-2411-398/+26
| | | | | | | | | | | | | | | | | | | | | Bump the 17.01 tree kernel to 4.4.69. Trunk 4.4 and 17.01 4.4 have diverged, talked this through with jow, he was okay with a clean diff against 17.01 and not a backported trunk patch. The following patches were applied upstream: * 062-[1-6]-MIPS-* series * 042-0004-mtd-bcm47xxpart-fix-parsing-first-block Reintroduced lantiq/patches-4.4/0050-MIPS-Lantiq-Fix-cascaded-IRQ-setup, as it was incorrectly included upstream thus dropped from LEDE, but subsequently reverted upstream. Thanks to Kevin Darbyshire-Bryant for pointing me to it. Compile-tested on: ar71xx, ramips/mt7621, x86/64. Run-tested on: ar71xx, ramips/mt7621, x86/64. Signed-off-by: Stijn Segers <francesco.borromini@inventati.org>
* generic: keep module aliases inside .modinfoYousong Zhou2017-04-271-6/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It seems module aliases are actually essential info. E.g. other modules may call xt_request_find_match(NFPROTO_IPV{4,6}, "hashlimit", 1) and the kernel will request user mode modprobe helper for ipt_hashlimit and ip6t_hashlimit respectively which are aliases of xt_hashlimit.ko Compile-tested for armvirt, there is nearly no size impact. Before -rw-r--r-- 1 yousong yousong 304 Jan 10 17:37 config.seed -rw-r--r-- 1 yousong yousong 1634 Jan 11 11:07 lede-armvirt-default.manifest -rw-r--r-- 1 yousong yousong 1533647 Jan 11 11:07 lede-armvirt-default-rootfs.tar.gz -rw-r--r-- 1 yousong yousong 1802711 Jan 11 11:07 lede-armvirt-root.ext4.gz -rw-r--r-- 1 yousong yousong 1544597 Jan 11 11:07 lede-armvirt-rootfs.cpio.gz -rw-r--r-- 1 yousong yousong 1174984 Jan 11 11:07 lede-armvirt-root.squashfs.gz -rwxr-xr-x 1 yousong yousong 1654712 Jan 11 11:07 lede-armvirt-zImage -rwxr-xr-x 1 yousong yousong 2738296 Jan 11 11:07 lede-armvirt-zImage-initramfs drwxr-xr-x 2 yousong yousong 4096 Jan 10 17:35 packages -rw-r--r-- 1 yousong yousong 739 Jan 10 17:37 sha256sums After -rw-r--r-- 1 yousong yousong 304 Jan 10 17:37 config.seed -rw-r--r-- 1 yousong yousong 1634 Jan 11 11:10 lede-armvirt-default.manifest -rw-r--r-- 1 yousong yousong 1533646 Jan 11 11:10 lede-armvirt-default-rootfs.tar.gz -rw-r--r-- 1 yousong yousong 1802711 Jan 11 11:10 lede-armvirt-root.ext4.gz -rw-r--r-- 1 yousong yousong 1544593 Jan 11 11:10 lede-armvirt-rootfs.cpio.gz -rw-r--r-- 1 yousong yousong 1174984 Jan 11 11:10 lede-armvirt-root.squashfs.gz -rwxr-xr-x 1 yousong yousong 1654736 Jan 11 11:10 lede-armvirt-zImage -rwxr-xr-x 1 yousong yousong 2738144 Jan 11 11:10 lede-armvirt-zImage-initramfs drwxr-xr-x 2 yousong yousong 4096 Jan 10 17:35 packages -rw-r--r-- 1 yousong yousong 739 Jan 10 17:37 sha256sums Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
* kernel: use skb_cow_head() to deal with cloned skbsÁlvaro Fernández Rojas2017-04-237-0/+267
| | | | | | | | | | | We need to ensure there is enough headroom to push extra header, but we also need to check if we are allowed to change headers. skb_cow_head() is the proper helper to deal with this. Fixes Ethernet<->WiFi bridge for Raspberry Pi and probably other devices. Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
* kernel: Fix the incorrect i_nlink count after jffs2's RENAME_EXCHANGE ↵Jing Qiu2017-04-051-5/+28
| | | | | | | | | | | | | | | | | | | | | operations. The problem is caused by the incorrect handling of the parent inode's i_nlink count for the dentry to be RENAME_EXCHANGED. There are 3 cases to consider. Assume we want to RENAME_EXCHANGE struct dentry *a and struct dentry *b, and inode_a is pointed to by dentry_a, inode_b is pointed to by dentry_b: 1. If inode_a is a directory, but inode_b isn't, then we must decrease the i_nlink count of old_dir_i, and increase the i_nlink of new_dir_i. 2. If inode_a isn't a directory, but inode_b is a directory, then we must increase the i_nlink of old_dir_i, and decrease the i_nlink count of new_dir_i. 3. If the types of inode_a and inode_b are the same, we don't change the i_nlink for either old_dir_i or new_dir_i. Signed-off-by: Jing Qiu <aqiu0720@gmail.com> Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: update kernel 4.4 to 4.4.59Hauke Mehrtens2017-04-0214-45/+22
| | | | Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: update kernel 4.4 to 4.4.52Kevin Darbyshire-Bryant2017-03-031-8/+8
| | | | | | | | Bump kernel from 4.4.50 to 4.4.52 Refresh patches Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>
* kernel: move upstream accepted bcm47xxpart TRX cleanupsRafał Miłecki2017-02-222-3/+10
| | | | | | Use 0xx prefix for accepted patches. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: backport bcm47xxsflash support for reading 32 MiB flashesRafał Miłecki2017-02-222-0/+144
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: update kernel 4.4 to version 4.4.50Jo-Philipp Wich2017-02-205-26/+26
| | | | Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* kernel: fix crashes on MIPS when loading kernel modules under memory pressureFelix Fietkau2017-02-151-1/+4
| | | | | | | | | | | When memory is tight, modules may need to be loaded into vmalloc() space. The code then has to generate jump trampolines which enable relocations between vmalloc space and physical address space. The code had a bug that was freeing these trampolines even when the module was successfully loaded. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: MIPS: IRQ Stack: Fix erroneous jal to plat_irq_dispatchHauke Mehrtens2017-02-121-0/+35
| | | | | | | This backports the following fix to our mips IRQ stack patches: https://patchwork.linux-mips.org/patch/15110/ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
* kernel: update kernel 4.4 to version 4.4.47Stijn Tintel2017-02-061-5/+5
| | | | | | | | | | | | | | | Refresh patches for all targets that support kernel 4.4. Compile-tested on all targets that use kernel 4.4 and aren't marked broken, except arc770 and arch38 due to broken toolchain. Runtime-tested on ar71xx, octeon, ramips and x86/64. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> (cherry picked from commit d2c4041f0266cc93447998ddd67c7d6b6a4c2ee3) Conflicts: include/kernel-version.mk target/linux/ramips/patches-4.4/997-ralink-Introduce-fw_passed_dtb-to-arch-mips-ralink.patch
* Kernel: bump to 4.4.44Stijn Segers2017-02-061-5/+5
| | | | | | | | | | | | | | Bump kernel to 4.4.44. Compile-tested on ar71xx, ramips/mt7621 and x86/64. .44 has been run-tested on the 17.01 branch here on ar71xx and mt7621. Signed-off-by: Stijn Segers <francesco.borromini@inventati.org> (cherry picked from commit 20996edd68b8a0b139bdb36b3aafa29c037d4bda) Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be> Conflicts: target/linux/ar71xx/patches-4.4/920-usb-chipidea-AR933x-platform-support.patch target/linux/ar71xx/patches-4.4/930-chipidea-pullup.patch
* kernel: backport bgmac support for external PHYsRafał Miłecki2017-02-055-4/+540
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: use upstream accepted bgmac fix for BCM47186B0Rafał Miłecki2017-02-051-1/+4
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: rename bgmac patches to squeeze themRafał Miłecki2017-02-0526-0/+0
| | | | | | | This is a pure rename without any changes. It makes maintaining bgmac simpler and will hopefully make adding new kernel a bit easier. Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: fix BCM54612E PHY supportRafał Miłecki2017-02-011-4/+87
| | | | | | | This backports upstream commit 62e13097c46c ("net: phy: broadcom: rehook BCM54612E specific init") Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: update bcma to fix devm memory leaksRafał Miłecki2017-01-312-0/+131
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: backport support for BCM54210E PHYRafał Miłecki2017-01-282-27/+126
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: backport support for BCM54810 PHYRafał Miłecki2017-01-281-12/+164
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: backport support for BCM54612E PHYRafał Miłecki2017-01-281-0/+103
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: fix bcma serial console regressionRafał Miłecki2017-01-151-0/+92
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: backport MIPS changes introducing a separate IRQ stackFelix Fietkau2017-01-1510-8/+305
| | | | | | | | Prevents crashes when IRQs arrive when the current kernel stack context already contains deeply nested function calls, e.g. when stacking lots of network devices on top of each other Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: backport a MIPS SMP icache flush fixFelix Fietkau2017-01-111-0/+38
| | | | Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: update bcm47xxpart failsafe partition patchesRafał Miłecki2017-01-114-36/+48
| | | | | | V2 using helper function was sent for upstream kernel Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: remove gpiommc patches / driverFelix Fietkau2017-01-102-902/+0
| | | | | | | This code was marked as incompatible to Linux 4.4 well over a year ago and nobody cared, and now it's breaking builds. Signed-off-by: Felix Fietkau <nbd@nbd.name>
* kernel: add pending bcm47xxpart support for failsafe TRX partitionRafał Miłecki2017-01-104-50/+314
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: update spi-nor.h include fix with upstream accepted versionRafał Miłecki2017-01-101-2/+3
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
* kernel: rename bcm47xxpart patches to fit more of themRafał Miłecki2017-01-102-0/+0
| | | | Signed-off-by: Rafał Miłecki <rafal@milecki.pl>