<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/mkresin/package/boot, branch master</title>
<subtitle>Staging tree of Mathias Kresin</subtitle>
<id>https://git.openwrt.org/openwrt/staging/mkresin/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/mkresin/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/'/>
<updated>2022-04-30T22:42:30Z</updated>
<entry>
<title>uboot-mvebu: update to version v2022.04</title>
<updated>2022-04-30T22:42:30Z</updated>
<author>
<name>Josef Schlehofer</name>
</author>
<published>2022-04-28T11:34:35Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=4f51f1fc9b3597d24de442cfff253fddce478d17'/>
<id>urn:sha1:4f51f1fc9b3597d24de442cfff253fddce478d17</id>
<content type='text'>
Release announcement:
https://lore.kernel.org/u-boot/20220404143253.GQ14476@bill-the-cat/

Release notes between tags:
https://source.denx.de/u-boot/u-boot/-/compare/v2022.01...v2022.04?from_project_id=531

All patches were removed, since they are included in this release.

Run tested: Turris Omnia, mvebu/cortex-a9, OpenWrt daily snapshots

Signed-off-by: Josef Schlehofer &lt;pepe.schlehofer@gmail.com&gt;
</content>
</entry>
<entry>
<title>uboot-mvebu: remove enabled CONFIG_CMD_SETEXPR</title>
<updated>2022-04-30T22:42:30Z</updated>
<author>
<name>Josef Schlehofer</name>
</author>
<published>2022-04-28T13:50:20Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=69cef74c671cb7fa738a5a4c9a283c29f45326c7'/>
<id>urn:sha1:69cef74c671cb7fa738a5a4c9a283c29f45326c7</id>
<content type='text'>
We don't need to make sure that we want to have enabled
CONFIG_CMD_SETEXPR by default, since this is already done in U-boot [1].
This was actually needed only for clearfog board [2], which was added in
commit: da0005a6d08ae33d958a6d8a6c0c12dc07b5b2b8 ("uboot-mvebu: add
patch to enable setexpr for clearfog boards) and send to U-boot to fix
it properly. After a while, there was added support for Turris Omnia,
which uses setexpr as well [3], but for this board, there are no fixes
needed in U-boot and that's why we can remove this option here.

It is helpful with shell scripting. If some downstream distributions are
using it, they should correct it in defconfig for related boards.

[1] https://source.denx.de/u-boot/u-boot/-/blob/e95afa56753cebcd20a5114b6d121f281b789006/cmd/Kconfig#L1504

[2] https://github.com/openwrt/openwrt/blob/852126680e21edc71c0c66561ae5a6d7479dcc67/target/linux/mvebu/image/clearfog.bootscript#L7

[3] https://github.com/openwrt/openwrt/blob/852126680e21edc71c0c66561ae5a6d7479dcc67/target/linux/mvebu/image/turris-omnia.bootscript#L2

Signed-off-by: Josef Schlehofer &lt;pepe.schlehofer@gmail.com&gt;
</content>
</entry>
<entry>
<title>uboot-mvebu: add patch to enable setexpr for clearfog boards</title>
<updated>2022-04-30T22:42:30Z</updated>
<author>
<name>Josef Schlehofer</name>
</author>
<published>2022-04-29T15:52:29Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=b3c2072504867b8ca00dde37f531edf0cfbe3359'/>
<id>urn:sha1:b3c2072504867b8ca00dde37f531edf0cfbe3359</id>
<content type='text'>
Option CMD_SETEXPR is already default in U-boot [1], since this was
disabled since initial version for this board, there is send this
	patch to U-boot mailing list to enable it.

It is required to use in OpenWrt bootscript for these boards [2].

[1] https://source.denx.de/u-boot/u-boot/-/blob/e95afa56753cebcd20a5114b6d121f281b789006/cmd/Kconfig#L1504

[2] https://github.com/openwrt/openwrt/blob/852126680e21edc71c0c66561ae5a6d7479dcc67/target/linux/mvebu/image/clearfog.bootscript#L7

Signed-off-by: Josef Schlehofer &lt;pepe.schlehofer@gmail.com&gt;
</content>
</entry>
<entry>
<title>uboot-envtools: add WS-AP3825i config</title>
<updated>2022-04-25T22:57:22Z</updated>
<author>
<name>David Bauer</name>
</author>
<published>2022-04-24T22:04:09Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=fb7ff6b027d1c69e97e6d39e688a969c164065c8'/>
<id>urn:sha1:fb7ff6b027d1c69e97e6d39e688a969c164065c8</id>
<content type='text'>
Add configuration to use uboot-envtools with the Extreme Networks
WS-AP3825i.

Signed-off-by: David Bauer &lt;mail@david-bauer.net&gt;
</content>
</entry>
<entry>
<title>ramips: add support for YunCore AX820/HWAP-AX820</title>
<updated>2022-04-23T18:46:25Z</updated>
<author>
<name>Clemens Hopfer</name>
</author>
<published>2021-07-22T15:54:15Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=4891b865380e2b7f32acf0893df9c1ca9db8d4ea'/>
<id>urn:sha1:4891b865380e2b7f32acf0893df9c1ca9db8d4ea</id>
<content type='text'>
There are two versions which are identical apart from the enclosure:
  YunCore AX820: indoor ceiling mount AP with integrated antennas
  YunCore HWAP-AX820: outdoor enclosure with external (N) connectors

Hardware specs:
  SoC: MediaTek MT7621DAT
  Flash: 16 MiB SPI NOR
  RAM: 128MiB (DDR3, integrated)
  WiFi: MT7905DAN+MT7975DN 2.4/5GHz 2T2R 802.11ax
  Ethernet: 10/100/1000 Mbps x2 (WAN/PoE+LAN)
  LED: Status (green)
  Button: Reset
  Power: 802.11af/at PoE; DC 12V,1A
  Antennas: AX820(indoor): 4dBi internal; HWAP-AX820(outdoor): external

Flash instructions:
  The "OpenWRT support" version of the AX820 comes with a LEDE-based
  firmware with proprietary MTK drivers and a luci webinterface and
  ssh accessible under 192.168.1.1 on LAN; user root, no password.
  The sysupgrade.bin can be flashed using luci or sysupgrade via ssh,
  you will have to force the upgrade due to a different factory name.
  Remember: Do *not* preserve factory configuration!

MAC addresses as used by OEM firmware:
  use   address            source
  2g    44:D1:FA:*:0b      Factory 0x0004 (label)
  5g    46:D1:FA:*:0b      LAA of 2g
  lan   44:D1:FA:*:0c      Factory 0xe000
  wan   44:D1:FA:*:0d      Factory 0xe000 + 1
The wan MAC can also be found in 0xe006 but is not used by OEM dtb.

Due to different MAC handling in mt76 the LAA derived from lan is used
for 2g to prevent duplicate MACs when creating multiple interfaces.

Signed-off-by: Clemens Hopfer &lt;openwrt@wireloss.net&gt;
</content>
</entry>
<entry>
<title>uboot-mediatek: replace patch with accepted commit</title>
<updated>2022-04-20T14:22:45Z</updated>
<author>
<name>Daniel Golle</name>
</author>
<published>2022-04-20T14:10:07Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=079828fa54a81b9672c55f7f1d02bd2879a4944a'/>
<id>urn:sha1:079828fa54a81b9672c55f7f1d02bd2879a4944a</id>
<content type='text'>
Replace pending patch with version accepted upstream.
Other than in the first suggested version, the new property is now
called 'u-boot,bootconf' instead of 'bootconf'.

Signed-off-by: Daniel Golle &lt;daniel@makrotopia.org&gt;
</content>
</entry>
<entry>
<title>uboot-mediatek: remove '0x' prefix from pstore node</title>
<updated>2022-04-19T16:07:38Z</updated>
<author>
<name>Daniel Golle</name>
</author>
<published>2022-04-19T15:27:22Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=810b48e79389a54b9b332fa2834360602a9734f3'/>
<id>urn:sha1:810b48e79389a54b9b332fa2834360602a9734f3</id>
<content type='text'>
Remove '0x' prefix from pstore node in dts, just like it was done
for the device tree used by Linux on MT7622.
This change is done in preparation to update U-Boot to 2022.04.

Signed-off-by: Daniel Golle &lt;daniel@makrotopia.org&gt;
</content>
</entry>
<entry>
<title>realtek: add ZyXEL GS1900-24HP v1 support</title>
<updated>2022-04-16T15:26:56Z</updated>
<author>
<name>Martin Kennedy</name>
</author>
<published>2022-03-05T19:02:36Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=a5ac8ad0ba9df50bdd0dda1dc26cf36f83006893'/>
<id>urn:sha1:a5ac8ad0ba9df50bdd0dda1dc26cf36f83006893</id>
<content type='text'>
The ZyXEL GS1900-24HP v1 is a 24 port PoE switch with two SFP ports,
similar to the other GS1900 switches.

Specifications
--------------
* Device:    ZyXEL GS1900-24HP v1
* SoC:       Realtek RTL8382M 500 MHz MIPS 4KEc
* Flash:     16 MiB
* RAM:       Winbond W9751G8KB-25 64 MiB DDR2 SDRAM
* Ethernet:  24x 10/100/1000 Mbps, 2x SFP 100/1000 Mbps
* LEDs:
  * 1 PWR LED (green, not configurable)
  * 1 SYS LED (green, configurable)
  * 24 ethernet port link/activity LEDs (green, SoC controlled)
  * 24 ethernet port PoE status LEDs
  * 2 SFP status/activity LEDs (green, SoC controlled)
* Buttons:
  * 1 "RESET" button on front panel (soft reset)
  * 1 button ('SW1') behind right hex grate (hardwired power-off)
* PoE:
  * Management MCU: ST Micro ST32F100 Microcontroller
  * 6 BCM59111 PSE chips
  * 170W power budget
* Power:     120-240V AC C13
* UART:      Internal populated 10-pin header ('J5') providing RS232;
             connected to SoC UART through a TI or SIPEX 3232C for voltage
             level shifting.

* 'J5' RS232 Pinout (dot as pin 1):
  2) SoC RXD
  3) GND
  10) SoC TXD

Serial connection parameters: 115200 8N1.

Installation
------------

OEM upgrade method:

* Log in to OEM management web interface

* Navigate to Maintenance &gt; Firmware &gt; Management

* If "Active Image" has the first option selected, OpenWrt will need to be
  flashed to the "Active" partition. If the second option is selected,
  OpenWrt will need to be flashed to the "Backup" partition.

* Navigate to Maintenance &gt; Firmware &gt; Upload

* Upload the openwrt-realtek-rtl838x-zyxel_gs1900-24hp-v1-initramfs-kernel.bin
  file by your preferred method to the previously determined partition.
  When prompted, select to boot from the newly flashed image, and reboot
  the switch.

* Once OpenWrt has booted, scp the sysupgrade image to /tmp and flash it:

  &gt; sysupgrade /tmp/openwrt-realtek-rtl838x-zyxel_gs1900-24hp-v1-squashfs-sysupgrade.bin

U-Boot TFTP method:

* Configure your client with a static 192.168.1.x IP (e.g. 192.168.1.10).

* Set up a TFTP server on your client and make it serve the initramfs
  image.

* Connect serial, power up the switch, interrupt U-boot by hitting the
  space bar, and enable the network:

  &gt; rtk network on

* Since the GS1900-24HP v1 is a dual-partition device, you want to keep the
  OEM firmware on the backup partition for the time being. OpenWrt can
  only be installed in the first partition anyway (hardcoded in the
  DTS). To ensure we are set to boot from the first partition, issue the
  following commands:

  &gt; setsys bootpartition 0
  &gt; savesys

* Download the image onto the device and boot from it:

  &gt; tftpboot 0x81f00000 192.168.1.10:openwrt-realtek-rtl838x-zyxel_gs1900-24hp-v1-initramfs-kernel.bin
  &gt; bootm

* Once OpenWrt has booted, scp the sysupgrade image to /tmp and flash it:

  &gt; sysupgrade /tmp/openwrt-realtek-rtl838x-zyxel_gs1900-24hp-v1-squashfs-sysupgrade.bin

Signed-off-by: Martin Kennedy &lt;hurricos@gmail.com&gt;
[Add info on PoE hardware to commit message]
Signed-off-by: Sander Vanheule &lt;sander@svanheule.net&gt;
</content>
</entry>
<entry>
<title>ath79: add support for Sophos AP100/AP55 family</title>
<updated>2022-04-16T14:59:29Z</updated>
<author>
<name>Andrew Powers-Holmes</name>
</author>
<published>2021-09-03T13:53:57Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=6f1efb28983758116a8ecaf9c93e1d875bb70af7'/>
<id>urn:sha1:6f1efb28983758116a8ecaf9c93e1d875bb70af7</id>
<content type='text'>
The Sophos AP100, AP100C, AP55, and AP55C are dual-band 802.11ac access
points based on the Qualcomm QCA9558 SoC. They share PCB designs with
several devices that already have partial or full support, most notably the
Devolo DVL1750i/e.

The AP100 and AP100C are hardware-identical to the AP55 and AP55C, however
the 55 models' ART does not contain calibration data for their third chain
despite it being present on the PCB.

Specifications common to all models:
 - Qualcomm QCA9558 SoC @ 720 MHz (MIPS 74Kc Big-endian processor)
 - 128 MB RAM
 - 16 MB SPI flash
 - 1x 10/100/1000 Mbps Ethernet port, 802.3af PoE-in
 - Green and Red status LEDs sharing a single external light-pipe
 - Reset button on PCB[1]
 - Piezo beeper on PCB[2]
 - Serial UART header on PCB
 - Alternate power supply via 5.5x2.1mm DC jack @ 12 VDC

Unique to AP100 and AP100C:
 - 3T3R 2.4GHz 802.11b/g/n via SoC WMAC
 - 3T3R 5.8GHz 802.11a/n/ac via QCA9880 (PCI Express)

AP55 and AP55C:
 - 2T2R 2.4GHz 802.11b/g/n via SoC WMAC
 - 2T2R 5.8GHz 802.11a/n/ac via QCA9880 (PCI Express)

AP100 and AP55:
 - External RJ45 serial console port[3]
 - USB 2.0 Type A port, power controlled via GPIO 11

Flashing instructions:

This firmware can be flashed either via a compatible Sophos SG or XG
firewall appliance, which does not require disassembling the device, or via
the U-Boot console available on the internal UART header.

To flash via XG appliance:
 - Register on Sophos' website for a no-cost Home Use XG firewall license
 - Download and install the XG software on a compatible PC or virtual
   machine, complete initial appliance setup, and enable SSH console access
 - Connect the target AP device to the XG appliance's LAN interface
 - Approve the AP from the XG Web UI and wait until it shows as Active
   (this can take 3-5 minutes)
 - Connect to the XG appliance over SSH and access the Advanced Console
   (Menu option 5, then menu option 3)
 - Run `sudo awetool` and select the menu option to connect to an AP via
   SSH. When prompted to enable SSH on the target AP, select Yes.
 - Wait 2-3 minutes, then select the AP from the awetool menu again. This
   will connect you to a root shell on the target AP.
 - Copy the firmware to /tmp/openwrt.bin on the target AP via SCP/TFTP/etc
 - Run `mtd -r write /tmp/openwrt.bin astaro_image`
 - When complete, the access point will reboot to OpenWRT.

To flash via U-Boot serial console:
 - Configure a TFTP server on your PC, and set IP address 192.168.99.8 with
   netmask 255.255.255.0
 - Copy the firmware .bin to the TFTP server and rename to 'uImage_AP100C'
 - Open the target AP's enclosure and locate the 4-pin 3.3V UART header [4]
 - Connect the AP ethernet to your PC's ethernet port
 - Connect a terminal to the UART at 115200 8/N/1 as usual
 - Power on the AP and press a key to cancel autoboot when prompted
 - Run the following commands at the U-Boot console:
    - `tftpboot`
    - `cp.b $fileaddr 0x9f070000 $filesize`
    - `boot`
 - The access point will boot to OpenWRT.

MAC addresses as verified by OEM firmware:

use   address     source
LAN   label       config 0x201a (label)
2g    label + 1   art 0x1002    (also found at config 0x2004)
5g    label + 9   art 0x5006

Increments confirmed across three AP55C, two AP55, and one AP100C.

These changes have been tested to function on both current master and
21.02.0 without any obvious issues.

[1] Button is present but does not alter state of any GPIO on SoC
[2] Buzzer and driver circuitry is present on PCB but is not connected to
    any GPIO. Shorting an unpopulated resistor next to the driver circuitry
    should connect the buzzer to GPIO 4, but this is unconfirmed.
[3] This external RJ45 serial port is disabled in the OEM firmware, but
    works in OpenWRT without additional configuration, at least on my
    three test units.
[4] On AP100/AP55 models the UART header is accessible after removing
    the device's top cover. On AP100C/AP55C models, the PCB must be removed
    for access; three screws secure it to the case.
    Pin 1 is marked on the silkscreen. Pins from 1-4 are 3.3V, GND, TX, RX

Signed-off-by: Andrew Powers-Holmes &lt;andrew@omnom.net&gt;
</content>
</entry>
<entry>
<title>ramips: add support for BOLT! Arion</title>
<updated>2022-04-16T12:02:11Z</updated>
<author>
<name>Abdul Aziz Amar</name>
</author>
<published>2022-03-14T09:26:23Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/mkresin/commit/?id=78c3534645958c123aa82cec9926a34eed5dd5dd'/>
<id>urn:sha1:78c3534645958c123aa82cec9926a34eed5dd5dd</id>
<content type='text'>
This device is from now-defunct BOLT! ISP in Indonesia.
The original firmware is based on mediatek SDK running linux 2.6 or 3.x in later revision.

Specifications:

- SoC:      MediaTek MT7621
- Flash:    32 MiB NOR SPI
- RAM:      128 MiB DDR3
- Ethernet: 2x 10/100/1000 Mbps (switched, LAN + WAN)
- WIFI0:    MT7603E 2.4GHz 802.11b/g/n
- WIFI1:    MT7612E 5GHz 802.11ac
- Antennas: 2x internal, non-detachable
- LEDs:     Programmable LEDs: 5 blue LEDs (wlan, tel, sig1-3) and 2 red LEDs (wlan and sig1)
            Non-programmable "Power"  LED
- Buttons:  Reset and WPS

Instalation:
Install from TFTP

Set your PC IP to 10.10.10.3 and gateway to 10.10.10.123
Press "1" when turning on the router, and type the initramfs file name

You also need to solder pin header or cable to J4 or neighboring test points (T19-T21)
Pinouts from top to bottom: GND, TX, RX, VCC (3.3v)
Baudrate: 57600n8

There's also an additional gigabit transformer and RTL8211FD managed by the LTE module on the backside of the PCB.

Signed-off-by: Abdul Aziz Amar &lt;abdulaziz.amar@gmail.com&gt;
</content>
</entry>
</feed>
