Skip to content
Snippets Groups Projects
  1. Sep 18, 2020
    • Tony Ambardar's avatar
      bpftools: support NLS, fix ppc build and update to 5.8.9 · 5582fbd6
      Tony Ambardar authored
      
      With global NLS support enabled (CONFIG_BUILD_NLS), the linked libelf.so
      and libbfd.so libraries will depend on libintl.so. Import the nls.mk helper
      to set library prefixes and flags accordingly, and also conditionally add
      "-lintl" as link-time library.
      
      Fix a build error on ppc due to a EDEADLOCK redefinition in errno.h.
      
      Use upstream stable kernel 5.8.9, and fix overriding of feature detection
      to only allow/hide detected features. Also refresh existing patches.
      
      Fixes: 2f0d6720 ("bpftools: add utility and library packages supporting
      eBPF usage")
      
      Signed-off-by: default avatarTony Ambardar <itugrok@yahoo.com>
      5582fbd6
    • Tan Zien's avatar
      firmware: intel-microcode: update to 20200616 · e826e007
      Tan Zien authored
      
      intel-microcode (3.20200616.1)
      
        * New upstream microcode datafile 20200616
          + Downgraded microcodes (to a previously shipped revision):
            sig 0x000406e3, pf_mask 0xc0, 2019-10-03, rev 0x00d6, size 101376
            sig 0x000506e3, pf_mask 0x36, 2019-10-03, rev 0x00d6, size 101376
        * Works around hangs on boot on Skylake-U/Y and Skylake Xeon E3,
        * This update *removes* the SRBDS mitigations from the above processors
        * Note that Debian had already downgraded 0x406e3 in release 3.20200609.2
      
      intel-microcode (3.20200609.2)
      
        * REGRESSION FIX: 0x406e3: rollback to rev 0xd6 and document regression
          * Microcode rollbacks (closes: LP#1883002)
            sig 0x000406e3, pf_mask 0xc0, 2019-10-03, rev 0x00d6, size 101376
          * THIS REMOVES THE SECURITY FIXES FOR SKYLAKE-U/Y PROCESSORS
          * Avoid hangs on boot on (some?) Skylake-U/Y processors,
        * ucode-blacklist: blacklist models 0x8e and 0x9e from late-loading,
          just in case.  Note that Debian does not do late loading by itself.
          Refer to LP#1883002 for the report, 0x806ec hangs upon late load.
      
      intel-microcode (3.20200609.1)
      
        * SECURITY UPDATE
          * For most processors: SRBDS and/or VRDS, L1DCES mitigations depending
            on the processor model
          * For Skylake HEDT and Skylake Xeons with signature 0x50654: VRDS and
            L1DCES mitigations, plus mitigations described in the changelog entry
            for package release 3.20191112.1.
          * Expect some performance impact, the mitigations are enabled by
            default.  A Linux kernel update will be issued that allows one to
            selectively disable the mitigations.
        * New upstream microcode datafile 20200609
          * Implements mitigation for CVE-2020-0543 Special Register Buffer Data
            Sampling (SRBDS), INTEL-SA-00320, CROSSTalk
          * Implements mitigation for CVE-2020-0548 Vector Register Data Sampling
            (VRDS), INTEL-SA-00329
          * Implements mitigation for CVE-2020-0549 L1D Cache Eviction Sampling
            (L1DCES), INTEL-SA-00329
          * Known to fix the regression introduced in release 2019-11-12 (sig
            0x50564, rev. 0x2000065), which would cause several systems with
            Skylake Xeon, Skylake HEDT processors to hang while rebooting
          * Updated Microcodes:
            sig 0x000306c3, pf_mask 0x32, 2019-11-12, rev 0x0028, size 23552
            sig 0x000306d4, pf_mask 0xc0, 2019-11-12, rev 0x002f, size 19456
            sig 0x00040651, pf_mask 0x72, 2019-11-12, rev 0x0026, size 22528
            sig 0x00040661, pf_mask 0x32, 2019-11-12, rev 0x001c, size 25600
            sig 0x00040671, pf_mask 0x22, 2019-11-12, rev 0x0022, size 14336
            sig 0x000406e3, pf_mask 0xc0, 2020-04-27, rev 0x00dc, size 104448
            sig 0x00050653, pf_mask 0x97, 2020-04-24, rev 0x1000157, size 32768
            sig 0x00050654, pf_mask 0xb7, 2020-04-24, rev 0x2006906, size 34816
            sig 0x00050656, pf_mask 0xbf, 2020-04-23, rev 0x4002f01, size 52224
            sig 0x00050657, pf_mask 0xbf, 2020-04-23, rev 0x5002f01, size 52224
            sig 0x000506e3, pf_mask 0x36, 2020-04-27, rev 0x00dc, size 104448
            sig 0x000806e9, pf_mask 0x10, 2020-04-27, rev 0x00d6, size 103424
            sig 0x000806e9, pf_mask 0xc0, 2020-04-27, rev 0x00d6, size 103424
            sig 0x000806ea, pf_mask 0xc0, 2020-04-27, rev 0x00d6, size 103424
            sig 0x000806eb, pf_mask 0xd0, 2020-04-27, rev 0x00d6, size 103424
            sig 0x000806ec, pf_mask 0x94, 2020-04-23, rev 0x00d6, size 103424
            sig 0x000906e9, pf_mask 0x2a, 2020-04-23, rev 0x00d6, size 103424
            sig 0x000906ea, pf_mask 0x22, 2020-04-27, rev 0x00d6, size 102400
            sig 0x000906eb, pf_mask 0x02, 2020-04-23, rev 0x00d6, size 103424
            sig 0x000906ec, pf_mask 0x22, 2020-04-27, rev 0x00d6, size 102400
            sig 0x000906ed, pf_mask 0x22, 2020-04-23, rev 0x00d6, size 103424
        * Restores the microcode-level fixes that were reverted by release
          3.20191115.2 for sig 0x50654 (Skylake Xeon, Skylake HEDT)
      
      intel-microcode (3.20200520.1)
      
        * New upstream microcode datafile 20200520
          + Updated Microcodes:
            sig 0x000206d6, pf_mask 0x6d, 2020-03-04, rev 0x0621, size 18432
            sig 0x000206d7, pf_mask 0x6d, 2020-03-24, rev 0x071a, size 19456
      
      intel-microcode (3.20200508.1)
      
        * New upstream microcode datafile 20200508
          + Updated Microcodes:
            sig 0x000706e5, pf_mask 0x80, 2020-03-12, rev 0x0078, size 107520
          * Likely fixes several critical errata on IceLake-U/Y causing system
            hangs
      
      intel-microcode (3.20191115.2)
      
        * Microcode rollbacks (closes: #946515, LP#1854764):
          sig 0x00050654, pf_mask 0xb7, 2019-07-31, rev 0x2000064, size 33792
        * Avoids hangs on warm reboots (cold boots work fine) on HEDT and
          Xeon processors with signature 0x50654.
      
      intel-microcode (3.20191115.1)
      
        * New upstream microcode datafile 20191115
          + Updated Microcodes:
            sig 0x000406e3, pf_mask 0xc0, 2019-10-03, rev 0x00d6, size 101376
            sig 0x000506e3, pf_mask 0x36, 2019-10-03, rev 0x00d6, size 101376
            sig 0x000806e9, pf_mask 0x10, 2019-10-15, rev 0x00ca, size 100352
            sig 0x000806e9, pf_mask 0xc0, 2019-09-26, rev 0x00ca, size 100352
            sig 0x000806ea, pf_mask 0xc0, 2019-10-03, rev 0x00ca, size 100352
            sig 0x000806eb, pf_mask 0xd0, 2019-10-03, rev 0x00ca, size 100352
            sig 0x000806ec, pf_mask 0x94, 2019-10-03, rev 0x00ca, size 100352
            sig 0x000906e9, pf_mask 0x2a, 2019-10-03, rev 0x00ca, size 100352
            sig 0x000906ea, pf_mask 0x22, 2019-10-03, rev 0x00ca, size 99328
            sig 0x000906eb, pf_mask 0x02, 2019-10-03, rev 0x00ca, size 100352
            sig 0x000906ec, pf_mask 0x22, 2019-10-03, rev 0x00ca, size 99328
            sig 0x000906ed, pf_mask 0x22, 2019-10-03, rev 0x00ca, size 100352
            sig 0x000a0660, pf_mask 0x80, 2019-10-03, rev 0x00ca, size 91136
      
      intel-microcode (3.20191113.1)
      
        * New upstream microcode datafile 20191113
          + SECURITY UPDATE, refer to the 3.20191112.1 changelog entry for details
            Adds microcode update for CFL-S (Coffe Lake Desktop)
            INTEL-SA-00270, CVE-2019-11135, CVE-2019-0117
          + Updated Microcodes (previously removed):
            sig 0x000906ec, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328
      
      intel-microcode (3.20191112.1)
      
        * New upstream microcode datafile 20191112
          + SECURITY UPDATE
            - Implements MDS mitigation (TSX TAA), INTEL-SA-00270, CVE-2019-11135
            - Implements TA Indirect Sharing mitigation, and improves the
              MDS mitigation (VERW)
            - Fixes FIVR (Xeon Voltage Modulation) vulnerability, INTEL-SA-00271,
              CVE-2019-11139
            - Fixes SGX vulnerabilities and errata (including CVE-2019-0117)
          + CRITICAL ERRATA FIXES
            - Fixes Jcc conditional jump macro-fusion erratum (Skylake+, except
              Ice Lake), causes a 0-3% typical perforance hit (can be as bad
              as 10%).  But ensures the processor will actually jump where it
              should, so don't even *dream* of not applying this fix.
            - Fixes AVX SHUF* instruction implementation flaw erratum
          + Removed Microcodes:
            sig 0x000906ec, pf_mask 0x22, 2019-02-14, rev 0x00ae, size 98304
          + New Microcodes:
            sig 0x000406d8, pf_mask 0x01, 2019-09-16, rev 0x012d, size 84992
            sig 0x00050656, pf_mask 0xbf, 2019-09-05, rev 0x400002c, size 51200
            sig 0x00060663, pf_mask 0x80, 2018-04-17, rev 0x002a, size 87040
            sig 0x000706a8, pf_mask 0x01, 2019-08-29, rev 0x0016, size 74752
            sig 0x000706e5, pf_mask 0x80, 2019-09-05, rev 0x0046, size 102400
            sig 0x000a0660, pf_mask 0x80, 2019-08-27, rev 0x00c6, size 91136
          + Updated Microcodes:
            sig 0x000406e3, pf_mask 0xc0, 2019-08-14, rev 0x00d4, size 101376
            sig 0x00050654, pf_mask 0xb7, 2019-09-05, rev 0x2000065, size 34816
            sig 0x00050657, pf_mask 0xbf, 2019-09-05, rev 0x500002c, size 51200
            sig 0x000506e3, pf_mask 0x36, 2019-08-14, rev 0x00d4, size 101376
            sig 0x000706a1, pf_mask 0x01, 2019-08-28, rev 0x0032, size 73728
            sig 0x000806e9, pf_mask 0x10, 2019-08-14, rev 0x00c6, size 99328
            sig 0x000806e9, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 100352
            sig 0x000806ea, pf_mask 0xc0, 2019-08-14, rev 0x00c6, size 99328
            sig 0x000806eb, pf_mask 0xd0, 2019-08-14, rev 0x00c6, size 100352
            sig 0x000806ec, pf_mask 0x94, 2019-08-14, rev 0x00c6, size 100352
            sig 0x000906e9, pf_mask 0x2a, 2019-08-14, rev 0x00c6, size 100352
            sig 0x000906ea, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328
            sig 0x000906eb, pf_mask 0x02, 2019-08-14, rev 0x00c6, size 100352
            sig 0x000906ed, pf_mask 0x22, 2019-08-14, rev 0x00c6, size 99328
          + Updated Microcodes (previously removed):
            sig 0x00050653, pf_mask 0x97, 2019-09-09, rev 0x1000151, size 32768
      
      Signed-off-by: default avatarTan Zien <nabsdh9@gmail.com>
      e826e007
    • Tan Zien's avatar
      firmware: amd64-microcode: update to 20191218 · 182c7d95
      Tan Zien authored
      
      amd64-microcode (3.20191218.1)
      
        * New microcode update packages from AMD upstream:
          + Removed Microcode updates (known to cause issues):
            sig 0x00830f10, patch id 0x08301025, 2019-07-11
        * README: update for new release
      
      amd64-microcode (3.20191021.1)
      
        * New microcode update packages from AMD upstream:
          + New Microcodes:
            sig 0x00830f10, patch id 0x08301025, 2019-07-11
          + Updated Microcodes:
            sig 0x00800f12, patch id 0x08001250, 2019-04-16
            sig 0x00800f82, patch id 0x0800820d, 2019-04-16
      
      amd64-microcode (3.20181128.1)
      
        * New microcode update packages from AMD upstream:
          + New Microcodes:
            sig 0x00800f82, patch id 0x0800820b, 2018-06-20
      
      Signed-off-by: default avatarTan Zien <nabsdh9@gmail.com>
      182c7d95
    • Aleksander Jan Bajkowski's avatar
      kernel: drop kmod-bmp085, kmod-bmp085-i2c and kmod-bmp085-spi · b0aff40a
      Aleksander Jan Bajkowski authored
      CONFIG_BMP085* is replaced by CONFIG_BMP280 since 4.9[1] and this package is empty.
      OpenWRT also has kmod-iio-bmp280* package and we can drop old packages.
      
      1. [ misc: retire the old BMP085 driver ]
      (https://github.com/torvalds/linux/commit/832c8232dd7be4977ae9fb9c7cbc4decce19a8fc#diff-5000d544d790c669405eb2a6775e5981
      
      )
      
      Signed-off-by: default avatarAleksander Jan Bajkowski <A.Bajkowski@stud.elka.pw.edu.pl>
      b0aff40a
    • Tan Zien's avatar
      kernel: add module support Intel Ethernet Controller I225 Series · 4742ba41
      Tan Zien authored
      
      add kernel module igc support Intel Ethernet Controller I225 Series.
      
      Signed-off-by: default avatarTan Zien <nabsdh9@gmail.com>
      4742ba41
    • Yuan Tao's avatar
      tools/libressl: update to 3.2.1 · 649e098e
      Yuan Tao authored
      
      libressl update to 3.2.1
      Delete 001-dont-build-tests-man.patch
      Add configure args :
      --enable-static
      --disable-tests
      
      The patch (001-dont-build-tests-man.patch) no longer works with the current version.
      Follow the patch notes:
      Adding the --enable-static and --disable-tests parameters should replace the patch.
      
      Signed-off-by: default avatarYuan Tao <ty@wevs.org>
      649e098e
    • Felix Fietkau's avatar
      mt76: update to the latest version · e18534f9
      Felix Fietkau authored
      
      3b946a6dc588 mt76: dma: cache dma map address/len in struct mt76_queue_entry
      c4c8b6a20d3b mt76: mt7915: fix HE BSS info
      15391c1c947f mt76: fix tx hang on non-AQL frame limit
      72c8a81e64e8 mt76: mt7915: fix encap offload multicast traffic with 4-address mode
      69b3f868d14b mt76: mt7915: use napi_consume_skb to bulk-free tx skbs
      5f080033ec7d mt76: move txwi handling code to dma.c, since it is mmio specific
      b1f425686125 mt76: mt7915: fix VHT LDPC capability
      8f48855f5d14 mt76: mt7915: simplify mt7915_lmac_mapping
      cfaf40858718 mt76: mt7915: fix queue/tid mapping for airtime reporting
      115b62efac21 mt76: remove retry_q from struct mt76_txq and related code
      e22c65cdc585 mt76: mt7915: simplify checks for the 802.3 offload path
      bab866a01e4f mt76: mt7915: fix unexpected firmware mode
      0fc3c5eb61d0 mt76: dma: queue more rx frames internally before passing them to the stack
      130e5de09364 Revert "mt76: dma: queue more rx frames internally before passing them to the stack"
      e3af31409d41 update mt7915 firmware to the latest version
      e2b8a4ec9891 mt76: testmode: add a limit for queued tx_frames packets
      146488631f7b mt76: mt7615: Remove set but unused variable 'index'
      0b7d2b76288e mt76: mt7615: fix VHT LDPC capability
      848f4a6334a8 mt76: mt7622: fix fw hang on mt7622
      0a955d944bd0 mt76: mt7663s: do not use altx for ctl/mgmt traffic
      13b96411513b mt76: mt7663s: split mt7663s_tx_update_sched in mt7663s_tx_{pick,update}_quota
      d62ba15b1bbf mt76: mt7663s: introduce __mt7663s_xmit_queue routine
      fdf14d1b6aec mt76: move pad estimation out of mt76_skb_adjust_pad
      d048f8e87ba0 mt76: mt7663s: fix possible quota leak in mt7663s_refill_sched_quota
      979c0fdc5d27 mt76: mt7663s: introduce sdio tx aggregation
      56e77a3a3ade mt76: mt7663: check isr read return value in mt7663s_rx_work
      f96cffa03e57 mt76: mt7615: unlock dfs bands
      1ccd31bbe1f4 mt76: Use fallthrough pseudo-keyword
      448cd2d36ee2 mt76: mt76x0: Move tables used only by init.c to their own header file
      17ba3432f5af Revert "mt76: mt7615: unlock dfs bands"
      fee1f4a8e87f mt76: mt7915: fix possible memory leak in mt7915_mcu_add_beacon
      5b78e5292777 mt76: Fix unsigned expressions compared with zero
      ec84891a4d23 mt76: mt7915: convert to use le16_add_cpu()
      
      Signed-off-by: default avatarFelix Fietkau <nbd@nbd.name>
      e18534f9
    • Rafał Miłecki's avatar
      rpcd: update to the latest master · 14247c82
      Rafał Miłecki authored
      
      3fea655 rc: support init.d scripts with START=0
      
      Signed-off-by: default avatarRafał Miłecki <rafal@milecki.pl>
      14247c82
    • Rafał Miłecki's avatar
      uhttpd: update to the latest master · c57b907f
      Rafał Miłecki authored
      
      47c34bd ubus: add ACL support for "subscribe" request
      
      Signed-off-by: default avatarRafał Miłecki <rafal@milecki.pl>
      c57b907f
  2. Sep 17, 2020
  3. Sep 16, 2020
  4. Sep 15, 2020
Loading