On Sun, Aug 16, 2020 at 03:08:13PM -0700, Stephen Hemminger wrote:
> Rather than adding yet another feature to the bridge, could this hack be done
> by
> having a BPF hook? or netfilter module?
Hi Stephen,
Thanks for the constructive feedback and suggestions!
The netfilter approach sounds tempt
the specific host(s).
Link: https://issuetracker.google.com/issues/149630944
Link: https://github.com/freifunk-gluon/gluon/issues/1832
Signed-off-by: Linus Lüssing
---
A version of this patch rebased to Linux 4.14 is currently applied on a
400 nodes mesh network (Freifunk Vogtland).
I'm aware
On 25/05/2020 11:25, m...@adrianschmutzler.de wrote:
[...]
Despite, armv7 uses 64 MB ?
Hm, you're right. Not sure, I wouldn't increase the CMA buffer more as
needed though, as any unused CMA space is basically wasted, it can't be
used for caches etc right now.
But I can increase it to 64 MB
From: Linus Lüssing
16MB are not enough for ath10k to initialize three 4x4 AC Wave 2
PCIe cards
(168c:0046: Qualcomm Atheros QCA9984 802.11ac Wave 2 Wireless Network Adapter).
This leads to the following error when trying to initialize the third
one:
[ 16.742475] ath10k_pci 0002:01:00.0: pci
From: Linus Lüssing
This adds support for the Ka-Ro MB7 board with a TX6U-8033 module.
Specification, according to Linux DTS commit:
TX6U-8033:
ProcessorFreescale i.MX 6 Dual Lite, 800MHz
RAM 1GiB DDR3 SDRAM
ROM 4GiB eMMC
Power supply Single 3.1V to
From: Linus Lüssing
This adds support for the Ka-Ro MB7 board with a TX6U-8033 module.
Specification, according to Linux DTS commit:
TX6U-8033:
ProcessorFreescale i.MX 6 Dual Lite, 800MHz
RAM 1GiB DDR3 SDRAM
ROM 4GiB eMMC
Power supply Single 3.1V to
On Fri, Feb 03, 2017 at 09:35:30AM +0300, Stanislav V. Korsakov wrote:
> Please check this article http://netshe.ru/wirelessstack to understand
> layering of our modifications in Linux wireless stack.
"this module is a proprietary module broker"
Wow, that's a fancy name for it :D.
__
keeping redundant
databases (e.g. with the batman-adv translation table).
Signed-off-by: Linus Lüssing
---
device.c | 18 ++
device.h |6 ++
system-linux.c | 18 ++
3 files changed, 42 insertions(+)
diff --git a/device.c b/device.c
index
, as they can be indirectly
tuned via the given, exported four parameters, too.
Signed-off-by: Linus Lüssing
---
bridge.c | 32 ++
system-linux.c | 131 ++--
system.h | 16 +--
3 files changed, 163 insertions
On Thu, Mar 03, 2016 at 03:07:22PM -0600, Eric Schultz wrote:
> * prpl and its members, as funders, would set initial themes that all
> projects would be expected to fit into.
Could you clarify what you mean with "initial themes", maybe some
examples?
What would happen if the OpenWRT community we
On Tue, Jan 05, 2016 at 08:40:37PM +0100, Álvaro Fernández Rojas wrote:
> This add support for IGMP Snooping on atheros switches (enabled by default),
> which avoids flooding the network with multicast data.
>
> Tested on TL-WDR4300: disabling IGMP Snooping results in multicast flooding
> on each
On Tue, Oct 06, 2015 at 04:21:38PM +0200, Benjamin Henrion wrote:
> On Tue, Oct 6, 2015 at 3:49 PM, Linus Lüssing
> wrote:
> > On Tue, Oct 06, 2015 at 02:13:36AM +0200, Dave Taht wrote:
> >> Comment away!
> >
> > There are many good points made in this text.
>
On Tue, Oct 06, 2015 at 02:13:36AM +0200, Dave Taht wrote:
> Comment away!
There are many good points made in this text.
I like the Volkswagen example and the suggestion to require
opening up the firmware.
For the latter, had been thinking about that before briefly,
but kind of dismissed it earl
Hi Dmitry,
On Thu, Sep 10, 2015 at 04:00:39PM +0300, Dmitry Ivanov wrote:
> [...] Enabling this mode leads to broadcast frames such as ARP and DHCP
> being retransmitted back to AP in WDS configurations.
Could you eloborate a little more on this? For a normal
bridge-on-AP setting this should be f
ddress and use IPv6 in general.
Mac80211 unfortunately only prevents the echoes for us for multicast
frames. For the multicast frames cast to a unicast destination we'll
need to take care of excluding the originator ourselves.
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_t
On Mon, Aug 31, 2015 at 12:19:44PM +0200, Linus Lüssing wrote:
> I had somehow expected that mac80211 would exclude it. But looks like it
> doesn't.
Looks like mac80211 on an STA does that for frames with a
multicast destination (to prevent getting the own multicast
packets echo'
On Mon, Aug 31, 2015 at 11:29:45AM +0200, Steven Barth wrote:
>
>
>
> >Ok, I was able to easily reproduce the issue here. Looking at the
> >tcpdump the wifi client receives its own Neighbor Solicitation
> >again, reflected through the bridge-hairpin option.
>
> Why are we reflecting packets bac
PS: Out of curiousity, can someone with deeper knowledge into 802.11
tell me, when an STA sends a multicast packet to its master which
then rebroadcasts it at e.g. 1MBit/s, how does the originating STA
know that its a rebroadcast of its own frame and refrain from
forwarding it internally?
_
On Sun, Aug 30, 2015 at 03:49:50PM +0200, Linus Lüssing wrote:
> Hi Steven,
>
> Thanks for the feedback.
>
> On Sat, Aug 29, 2015 at 04:21:50PM +0200, Steven Barth wrote:
> > Let me know if you need more info.
>
> Could you make a tcpdump for ICMPv6 on the wifi of th
Hi Steven,
Thanks for the feedback.
On Sat, Aug 29, 2015 at 04:21:50PM +0200, Steven Barth wrote:
> Let me know if you need more info.
Could you make a tcpdump for ICMPv6 on the wifi of the client?
Please start it before connecting and let it run for about three
minutes after connecting to the w
A call to pskb_may_pull() might reallocate skb->data. Therefore we
should only assign the src-pointer after any potential reallocations.
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_to_unicast.patch | 45 +++-
1 file changed, 26 insertions(+),
utilizing AP-isolation and bridge-hairpinning
should have fixed this.
It is perfectly fine to apply multicast-to-unicast to IPv6 Neighbor
Solicitations, too (once that feature is configured correctly).
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_to_unicast.patch | 37
ght need a manual
configuration option like the "multicast_router" option.
Other scenarios where this can be useful are for instance:
* Segmentation of IGMP/MLD domains together with ebtables
* Dedicated bridge port for monitoring/debugging purposes
Signed-off-by: Linus Lüssing
---
d
enable or disable ap-isolation, for instance.
Signed-off-by: Linus Lüssing
---
device.c |9 +
device.h |3 +++
scripts/netifd-wireless.sh |1 +
system-linux.c | 13 +
wireless.c |4
5 files
irpin is kept disabled.
Signed-off-by: Linus Lüssing
---
device.h |1 +
scripts/netifd-wireless.sh | 15 +++
system-linux.c | 26 --
wireless.c | 12 +++-
wireless.h |1 +
5
Hi,
Here are a few patches to fix the issues the multicast-to-unicast
feature of the bridge has: IGMP/MLD report suppression could lead
to multicast packet loss. Also see ticket #17625 [0].
As previously discussed on this mailing list, AP-isolation together
with bridge-hairpinning is a way to mak
On Thu, Aug 06, 2015 at 11:09:02PM +0200, Felix Fietkau wrote:
> On 2015-08-06 22:10, Linus Lüssing wrote:
> > On Wed, Aug 05, 2015 at 01:38:28PM +0200, Felix Fietkau wrote:
> >> On 2015-08-05 01:00, Linus Lüssing wrote:
> >> > With this patch the multicast_to_unica
On Wed, Aug 05, 2015 at 01:38:28PM +0200, Felix Fietkau wrote:
> On 2015-08-05 01:00, Linus Lüssing wrote:
> > With this patch the multicast_to_unicast feature can be disabled for all
> > wireless interfaces via an according option on the uci bridge interface.
> >
> >
On Wed, Aug 05, 2015 at 01:28:23PM +0200, Felix Fietkau wrote:
> This patch turns on hairpin mode and assumes that the driver script
> checks the multicast_to_unicast flag.
> This is somewhat broken, since you only consider the hostapd.sh script,
> but there are other driver implementations out the
A call to pskb_may_pull() might reallocate skb->data. Therefore we
should only assign the src-pointer after any potential reallocations.
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_to_unicast.patch | 45 +++-
1 file changed, 26 insertions(+),
.
Signed-off-by: Linus Lüssing
---
package/network/services/hostapd/files/netifd.sh |9 +
1 file changed, 9 insertions(+)
diff --git a/package/network/services/hostapd/files/netifd.sh
b/package/network/services/hostapd/files/netifd.sh
index a3ffd93..b987a63 100644
--- a/package
utilizing AP-isolation and bridge-hairpinning
should have fixed this.
It is perfectly fine to apply multicast-to-unicast to IPv6 Neighbor
Solicitations, too (once that feature is configured correctly).
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_to_unicast.patch | 37
ght need a manual
configuration option like the "multicast_router" option.
Other scenarios where this can be useful are for instance:
* Segmentation of IGMP/MLD domains together with ebtables
* Dedicated bridge port for monitoring/debugging purposes
Signed-off-by: Linus Lüssing
---
d
enable or disable ap-isolation, for instance.
Signed-off-by: Linus Lüssing
---
device.c |9 +
device.h |3 +++
scripts/netifd-wireless.sh |1 +
system-linux.c | 13 +
wireless.c |4
5 files
irpin is kept disabled.
Signed-off-by: Linus Lüssing
---
device.h |1 +
system-linux.c | 26 --
wireless.c | 12 +++-
wireless.h |1 +
4 files changed, 33 insertions(+), 7 deletions(-)
diff --git a/device.h b/device.h
index ce135ba..37
Hi,
Here are a few patches to fix the issues the multicast-to-unicast
feature of the bridge has: IGMP/MLD report suppression could lead
to multicast packet loss. Also see ticket #17625 [0].
As previously discussed on this mailing list, AP-isolation together
with bridge-hairpinning is a way to mak
On Wed, Jul 08, 2015 at 02:31:03PM +0200, Felix Fietkau wrote:
> I really don't like the use of uci here. I think the information of
> whether ap_isolate needs to be enabled should be passed from netifd to
> this script in the json data.
Could you give me some pointers where in the netifd code tha
On Thu, Jun 18, 2015 at 05:22:58PM +0200, Linus Lüssing wrote:
> Hi,
>
> Here are a few patches to fix the issues the multicast-to-unicast
> feature of the bridge has: IGMP/MLD report suppression could lead
> to multicast packet loss.
> [...]
Any news / thought
On Sun, Jun 28, 2015 at 09:16:58PM +0300, N.Leiten wrote:
> As a result I got full 100Mbit/s on AR71XX platform and 70-80Mbit on
> Ralink. I think it is good performance improvement at this moment.
Interesting, thanks for sharing your results!
If these settings are generally diserable, maybe it m
utilizing AP-isolation and bridge-hairpinning
should have fixed this.
It is perfectly fine to apply multicast-to-unicast to IPv6 Neighbor
Solicitations, too (once that feature is configured correctly).
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_to_unicast.patch | 37
A call to pskb_may_pull() might reallocate skb->data. Therefore we
should only assign the src-pointer after any potential reallocations.
Signed-off-by: Linus Lüssing
---
.../645-bridge_multicast_to_unicast.patch | 45 +++-
.../645-bridge_multicast_to_unicast.pa
.
Signed-off-by: Linus Lüssing
---
package/network/services/hostapd/files/netifd.sh | 15 +++
1 file changed, 15 insertions(+)
diff --git a/package/network/services/hostapd/files/netifd.sh
b/package/network/services/hostapd/files/netifd.sh
index 23d2e7e..74b2d02 100644
--- a
ght need a manual
configuration option like the "multicast_router" option.
Other scenarios where this can be useful are for instance:
* Segmentation of IGMP/MLD domains together with ebtables
* Dedicated bridge port for monitoring/debugging purposes
Signed-off-by: Linus Lüssing
---
d
Hi,
Here are a few patches to fix the issues the multicast-to-unicast
feature of the bridge has: IGMP/MLD report suppression could lead
to multicast packet loss. Also see ticket #17625 [0].
As previously discussed on this mailing list, AP-isolation together
with bridge-hairpinning is a way to mak
irpin is kept disabled.
Signed-off-by: Linus Lüssing
---
device.c |9 +
device.h |4
system-linux.c | 31 +--
wireless.c | 12 +++-
wireless.h |1 +
5 files changed, 50 insertions(+), 7 deletions(-)
diff --
On Wed, Jun 03, 2015 at 07:25:32PM +0200, Steven Barth wrote:
>
>
>
> >Steven, could you elaborate a little more on the scenario and
> >explain why it is a must to shut up automatically when having a
> >local user-space querier? If people are able to manually install and
> >configure a complex m
On Wed, Jun 03, 2015 at 09:56:41AM +0200, Hans Dedecker wrote:
> On Wed, Jun 3, 2015 at 8:50 AM, Steven Barth wrote:
> > Thanks for the quick reply.
> >
> >
> > On 03.06.2015 08:26, Linus Lüssing wrote:
> >> For IPv6 and a non-zero IPv4 source address it
On Wed, Jun 03, 2015 at 07:47:49AM +0200, Steven Barth wrote:
> Do you by chance remember what was the behavior of the Linux kernel's
> intenral querier was.
>
> I mean does it use the usual L3-address of the bridge as source?
For IPv4 it uses 0.0.0.0 by default and there's an option to use
the I
On Fri, Oct 24, 2014 at 06:35:27PM +0200, Felix Fietkau wrote:
> I'd like to get back to suppressing forwarding IGMPv2/MLDv1 reports:
> I just learned that we can avoid changing mac80211 at all for this.
> If we disable forwarding between stations in mac80211 and enable hairpin
> mode on the bridge
-by: Linus Lüssing
---
bridge.c |6 ++
system-linux.c |5 +
system.h |1 +
3 files changed, 12 insertions(+)
diff --git a/bridge.c b/bridge.c
index fd553dc..9da5314 100644
--- a/bridge.c
+++ b/bridge.c
@@ -33,6 +33,7 @@ enum {
BRIDGE_ATTR_MAX_AGE
which is needed to make
the hash_max and multicast_router attributes configurable through
netifd.
Signed-off-by: Linus Lüssing
---
...51-01-bridge-fix-parsing-of-MLDv2-reports.patch | 58
...w-setting-hash_max-multicast_router-if-in.patch | 99
.../645
The WAN port should at least respond to IGMP and MLD queries as
otherwise a snooping bridge/switch might drop traffic.
RFC4890 recommends to leave IGMP and MLD unfiltered as they are always
link-scoped anyways.
Signed-off-by: Linus Lüssing
---
v2 of "[PATCH] firewall: Allow MLD input o
Hi Steven,
On Sun, May 03, 2015 at 04:43:24PM +0200, Steven Barth wrote:
> Hello Linus,
>
> thanks for the patch. I have two questions here.
>
> #1 Why should this be done for v6 but not for v4?
woops, sorry, had the IGMP part for v4 in my test setup but forgot
to add it to the patch. Going to
The WAN port should at least respond to MLD queries as otherwise
a snooping bridge/switch might drop traffic.
Signed-off-by: Linus Lüssing
---
package/network/config/firewall/files/firewall.config | 12
1 file changed, 12 insertions(+)
diff --git a/package/network/config
On Wed, Jan 14, 2015 at 12:12:33AM +0100, Linus Lüssing wrote:
> On Tue, Dec 30, 2014 at 04:10:56AM +0100, Linus Lüssing wrote:
> > The following patches unfortunately didn't hit the kernel stable
> > branches yet, therefore cherrypicking them for OpenWRT here:
> >
&
On Tue, Dec 30, 2014 at 04:10:56AM +0100, Linus Lüssing wrote:
> The following patches unfortunately didn't hit the kernel stable
> branches yet, therefore cherrypicking them for OpenWRT here:
>
> * bridge: fix netfilter/NF_BR_LOCAL_OUT for own, locally generated queries
>
anity check for general query destination
Signed-off-by: Linus Lüssing
---
.../patches-3.10/070-net_bridge_backports.patch| 193
.../644-bridge_optimize_netfilter_hooks.patch |6 +-
2 files changed, 162 insertions(+), 37 deletions(-)
diff --git a/target/linux/ge
cally generated queries
-> f0b4eeced (since 3.18)
If there's anything unclear, just let me know. Thanks :)!
Cheers, Linus
On Wed, Sep 10, 2014 at 03:33:41PM +0200, Linus Lüssing wrote:
> I just got a complaint about bridges, multicast and a
> 3.10 kernel again. Seems like nobody had a
On Fri, Oct 24, 2014 at 06:35:27PM +0200, Felix Fietkau wrote:
> On 2014-09-11 16:28, Linus Lüssing wrote:
> > On Wed, Sep 10, 2014 at 04:31:37PM +0200, Linus Lüssing wrote:
> >> Another approach would be
> >> to add a feature to mac80211 to disable the forwarding of
&
PS: Also found another, small potential bug in your unicasting
patch: The 'src = eth_hdr(skb)->h_source's you added can break because
after this assignment but before the usage of 'src' there are calls to
"pskb_may_pull(skb)". pskb_may_pull(skb) can reallocate the skb->data,
potentially leading to
On Thu, Sep 11, 2014 at 05:42:18PM +0200, Steven Barth wrote:
> Well it seems to be still somewhat used in embedded stuff, e.g. my
> 5-year old HP ethernet/802.11g printer/scanner/whatever still uses
> MLDv1 / IGMPv2 to do its MDNS / SSDP business.
Yeah, that's probably because IGMPv2/MLDv1 is way
On Thu, Sep 11, 2014 at 04:51:41PM +0200, Felix Fietkau wrote:
> On 2014-09-11 16:28, Linus Lüssing wrote:
> > On Wed, Sep 10, 2014 at 04:31:37PM +0200, Linus Lüssing wrote:
> >> Another approach would be
> >> to add a feature to mac80211 to disable the forwarding of
&
On Wed, Sep 10, 2014 at 04:31:37PM +0200, Linus Lüssing wrote:
> Another approach would be
> to add a feature to mac80211 to disable the forwarding of
> IGMPv2/MLDv1 reports to other STAs, only forwarding it on the own
> AP interface so that the bridge would see all reports.
Hrm,
On Wed, Sep 10, 2014 at 05:02:04PM +0200, Felix Fietkau wrote:
> I intentionally wanted to keep the implementation outside of mac80211,
> because there are other scenarios where this could be useful.
> I might have a dumb AP with no IGMP snooping capabilities connected to
> an Ethernet interface, a
On Wed, Sep 10, 2014 at 04:31:37PM +0200, Linus Lüssing wrote:
> One more thing/optimization I was thinking of is, instead
> of modifying the destination address of the frame whether the
> 802.11 receiver address could be modified. For instance by letting
> the bridge forward the des
On Wed, Sep 10, 2014 at 03:49:18PM +0200, Felix Fietkau wrote:
> On 2014-09-10 05:41, Linus Lüssing wrote:
> > Hi Felix,
> >
> > Matthias just told me about the work you have done on the bridge
> > code which can be found as 645-bridge_multicast_to_unicast.patch
&g
nt since 3.14)
7) bridge: multicast: enable snooping on general queries only
-> 20a599bec (present since 3.14)
Let me know what you'd think about that or if there's any trouble
applying them to older kernels.
Cheers, Linus
On Tue, Mar 25, 2014 at 02:06:07PM +0100, Linus Lüssing wrote:
Hi Felix,
Matthias just told me about the work you have done on the bridge
code which can be found as 645-bridge_multicast_to_unicast.patch
in the OpenWRT repositord.
I really like the idea of unicasting multicast packets to STAs.
Especially as that would fit nicely with the work done on
batman-a
If one or more directories of an env profile consist of a git submodule,
they will be checked out automatically now when switching to the according
profile with 'scripts/env switch'.
Signed-off-by: Linus Lüssing
---
scripts/env |1 +
1 files changed, 1 insertions(+), 0 deletion
On Mon, May 09, 2011 at 10:51:50PM +0200, John Crispin wrote:
> On 09/04/11 07:00, Linus Lüssing wrote:
>
> hi,
>
> you should simply symlink /etc/resolv.conf to /tmp/resolv.conf.auto in
> this case
>
> thx,
> John
Hi John,
Ah, yes, you're right, that'
With this commit the --address option of dnsmasq, directly returning ip
addresses for certain domains instead of querying the dns server, can be
configured in the dhcp uci configuration file. See the dnsmasq manpage
for further details of this option.
Signed-off-by: Linus Lüssing
---
package
For instance two word city names will result in weird certificates.
Therefore adding the missing quotations.
Signed-off-by: Linus Lüssing
---
package/uhttpd/files/uhttpd.init |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/package/uhttpd/files/uhttpd.init b/package
Don't wait for a [PATCH 2/2], it doesn't exist (my mistake in
git-format-patch handling).
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel
ards (the user needs to take care to not specify
non-list parameters in both uci and native config).
Signed-off-by: Linus Lüssing
---
net/tinc/Makefile |7 ++
net/tinc/files/tinc.config | 54 ++
net/tinc/files/tinc.init| 227 +++
Hi Manuel, hi list,
What do you think about maybe making it a little bit more uci-ish?
This should make it easier to integrate into LuCI later for instance.
And give the possibility to reconfigure things via the uci command line
tool and scripts, of course.
So, ehm, sorry for me throwing in this
query the upstream dns
server - possibly fetched via an additional, local dhcp client -
directly instead.
With this new uci configuration option it is possible to prohibit
dnsmasq to change /tmp/resolv.conf, leaving it as provided by the
udhcpd.
Signed-off-by: Linus Lüssing
---
* shortened the
With this commit the --address option of dnsmasq, directly returning ip
addresses for certain domains instead of querying the dns server, can be
configured in the dhcp uci configuration file. See the dnsmasq manpage
for further details of this option.
Signed-off-by: Linus Lüssing
---
package
In my opinion, that should be okay, but I'm also using IPv6
regularly. What would be the alternative, installing the bridge as
a kernel module instead of kernel built-in as it is currently done?
Hmm, if no one is screaming about any space issues and not wanting
to have IPv6 installed, I guess it s
PS: I'm not so happy with this long uci option name,
'resolvconfuntouched', but couldn't come up with anything better
yet. Something like 'upstreaminsteadoflocaldnsserver' would be
more descriptive but, well, even longer...
Suggestions (and feedback for this patch in general) welcome :).
__
query the upstream dns
server - possibly fetched via an additional, local dhcp client -
directly instead.
With this new uci configuration option it is possible to prohibit
dnsmasq to change /tmp/resolv.conf, leaving it as provided by the
udhcpd.
Signed-off-by: Linus Lüssing
---
package/dnsmasq
With this commit the --address option of dnsmasq, directly returning ip
addresses for certain domains instead of querying the dns server, can be
configured in the dhcp uci configuration file. See the dnsmasq manpage
for further details of this option.
Signed-off-by: Linus Lüssing
---
package
d-off-by: Linus Lüssing
---
package/base-files/files/lib/network/config.sh |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/package/base-files/files/lib/network/config.sh
b/package/base-files/files/lib/network/config.sh
index def1562..9489ccf 100755
--- a/package/base-
Hi Bastian,
Just for the record, had the same issue with madwifi a month ago.
In my case, there was even some rogue/broken other wifi device
which was sending probe requests every 5ms, resulting in a
congested medium due to my 4 devices in adhoc mode trying to
answer them all. A workaround for me
Signed-off-by: Linus Lüssing
---
net/tinc/Makefile |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/net/tinc/Makefile b/net/tinc/Makefile
index 290a8a1..efd6735 100644
--- a/net/tinc/Makefile
+++ b/net/tinc/Makefile
@@ -8,14 +8,14 @@
include $(TOPDIR)/rules.mk
Argh, screw this, don't know why I was thinking that such a folder
might be parsed by the OpenWRT build environment... Sorry for the
inconvenience.
signature.asc
Description: Digital signature
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.o
This patch includes a "patches" folder in the base directoy to
scripts/env's version control. Such a folder will be treated the
same way as the "files" folder.
Signed-off-by: Linus Lüssing
In
Yepp Felix, that one fixes ticket #5821 too, can't reproduce that
bug with this patch either. Thanks you two.
Cheers, Linus
signature.asc
Description: Digital signature
___
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwr
By the way, ifplugd compiles and runs fine for me, though the link
detection does not seem to fully work for my Dlink DIR-300
(atheros, ip175c switch chip) yet. The vlans are always shown as
"link beat detected", but I don't know what would have to be
patched for that (ip175c driver? swconfig? ifpl
This patch adds ifplugd - a 'Network Interface Plug Detection Daemon' - to
OpenWRT's repository. This lightweight daemon can execute scripts when a cable
is plugged in or pulled out.
Signed-off-by: Linus Lüssing
Index: packages/net/i
This patch fixes ticket #5821 for me (though I don't understand
why it does so). I've compiled the exact same firmware, except
one time with and one time without this patch - I'm not able to
reproduce the bug anymore with it.
Cheers, Linus
signature.asc
Description: Digital signature
___
The following patch adds IPv6 support to mini-snmpd in the packages repository.
It is then able to handle requests from IPv4 and IPv6 clients.
Signed-off-by: Linus Lüssing
Index: net/mini_snmpd/patches/104-ipv6-support.patch
91 matches
Mail list logo