mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-30 18:47:06 +00:00
b3f95490b9
This adds initial support for kernel 4.14 based on the patches for kernel 4.9. In the configuration I deactivated some of the new possible security features like: CONFIG_REFCOUNT_FULL CONFIG_SLAB_FREELIST_HARDENED CONFIG_SOFTLOCKUP_DETECTOR CONFIG_WARN_ALL_UNSEEDED_RANDOM And these overlay FS options are also deactivated: CONFIG_OVERLAY_FS_INDEX CONFIG_OVERLAY_FS_REDIRECT_DIR I activated this: CONFIG_FORTIFY_SOURCE CONFIG_POSIX_TIMERS CONFIG_SLAB_MERGE_DEFAULT CONFIG_WATCHDOG_HANDLE_BOOT_ENABLED I am not sure if I did the porting correct for the following patches: target/linux/generic/backport-4.14/020-backport_netfilter_rtcache.patch target/linux/generic/hack-4.14/220-gc_sections.patch target/linux/generic/hack-4.14/321-powerpc_crtsavres_prereq.patch target/linux/generic/pending-4.14/305-mips_module_reloc.patch target/linux/generic/pending-4.14/611-netfilter_match_bypass_default_table.patch target/linux/generic/pending-4.14/680-NET-skip-GRO-for-foreign-MAC-addresses.patch Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
39 lines
900 B
Diff
39 lines
900 B
Diff
From: John Crispin <john@phrozen.org>
|
|
Subject: hack: kernel: add generic image_cmdline hack to MIPS targets
|
|
|
|
lede-commit: d59f5b3a987a48508257a0ddbaeadc7909f9f976
|
|
Signed-off-by: Gabor Juhos <juhosg@openwrt.org>
|
|
---
|
|
arch/mips/Kconfig | 4 ++++
|
|
arch/mips/kernel/head.S | 6 ++++++
|
|
2 files changed, 10 insertions(+)
|
|
|
|
--- a/arch/mips/Kconfig
|
|
+++ b/arch/mips/Kconfig
|
|
@@ -1157,6 +1157,10 @@ config SYNC_R4K
|
|
config MIPS_MACHINE
|
|
def_bool n
|
|
|
|
+config IMAGE_CMDLINE_HACK
|
|
+ bool "OpenWrt specific image command line hack"
|
|
+ default n
|
|
+
|
|
config NO_IOPORT_MAP
|
|
def_bool n
|
|
|
|
--- a/arch/mips/kernel/head.S
|
|
+++ b/arch/mips/kernel/head.S
|
|
@@ -79,6 +79,12 @@ FEXPORT(__kernel_entry)
|
|
j kernel_entry
|
|
#endif
|
|
|
|
+#ifdef CONFIG_IMAGE_CMDLINE_HACK
|
|
+ .ascii "CMDLINE:"
|
|
+EXPORT(__image_cmdline)
|
|
+ .fill 0x400
|
|
+#endif /* CONFIG_IMAGE_CMDLINE_HACK */
|
|
+
|
|
__REF
|
|
|
|
NESTED(kernel_entry, 16, sp) # kernel entry point
|