<feed xmlns='http://www.w3.org/2005/Atom'>
<title>staging/noltari/package, branch master</title>
<subtitle>Staging tree of Alvaro Fernandez Rojas</subtitle>
<id>https://git.openwrt.org/openwrt/staging/noltari/atom?h=master</id>
<link rel='self' href='https://git.openwrt.org/openwrt/staging/noltari/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/'/>
<updated>2023-03-09T09:27:15Z</updated>
<entry>
<title>kernel: modules: add missing kmod-ptp for lan743x</title>
<updated>2023-03-09T09:27:15Z</updated>
<author>
<name>Chuanhong Guo</name>
</author>
<published>2023-03-09T09:24:43Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=f30757b94e6f0b0a547b4932eb97e550f0bffe3d'/>
<id>urn:sha1:f30757b94e6f0b0a547b4932eb97e550f0bffe3d</id>
<content type='text'>
Fixes: 3e9005546a ("kernel: modules: package Microchip LAN743x PCIe gigE driver")
Signed-off-by: Chuanhong Guo &lt;gch981213@gmail.com&gt;
</content>
</entry>
<entry>
<title>kernel: modules: package Microchip LAN743x PCIe gigE driver</title>
<updated>2023-03-08T22:57:13Z</updated>
<author>
<name>Tim Harvey</name>
</author>
<published>2023-03-07T21:41:13Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=3e9005546a05f474d14723556d037685fc68d18a'/>
<id>urn:sha1:3e9005546a05f474d14723556d037685fc68d18a</id>
<content type='text'>
Package the Microchip LAN743x PCIe gigE driver

Signed-off-by: Tim Harvey &lt;tharvey@gateworks.com&gt;
</content>
</entry>
<entry>
<title>ramips: add support for SNR-CPE-ME2-SFP</title>
<updated>2023-03-08T22:44:59Z</updated>
<author>
<name>Aleksey Nasibulin</name>
</author>
<published>2023-03-06T10:49:33Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=d45659a571645f98674845e5efd07f447de337ed'/>
<id>urn:sha1:d45659a571645f98674845e5efd07f447de337ed</id>
<content type='text'>
SNR-CPE-ME2-SFP is a wireless router with SFP cage manufactured by SNR/NAG company.

Specification:
- SoC: MediaTek MT7621A
- CPU: 880MHz
- Flash: 16 MB (GD25Q127CSIG)
- RAM:  256 MB
- WLAN: 2.4 GHz, 5 GHz (MediaTek MT7615DN)
- Ethernet: 4x 10/100/1000 Mbps
- SFP cage (using RTL8211FS-CG)
- USB 3.0 port
- Power: 12 VDC, 2 A

Flash instruction via TFTP:
1. Boot SNR-CPE-ME2 to recovery mode
  (press reset button and power on device, hold button for ~10 seconds)
2. Send firmware via TFTP client:
 TFTP Server address: 192.168.1.1
 TFTP Client address: 192.168.1.131
3. Wait ~120 seconds to complete flashing
4. Do sysupgrade using web-interface

MAC Addresses(stock)
--------------------
+----------+------------------+-------------------+
| use      | address          | example           |
+----------+------------------+-------------------+
| Device   | label            | 6A:C4:DD:xx:xx:28 |
| Ethernet | + 1              | 6A:C4:DD:xx:xx:29 |
| 2g       | + 2              | 6A:C4:DD:xx:xx:2A |
| 5g       | + 3              | 6A:C4:DD:xx:xx:2B |
+----------+------------------+-------------------+

Notes:
- Reading sfp eeprom is not supported [1] (driver issue). Stock image has the same situation.

References:
1. https://forum.openwrt.org/t/mt7621-and-reading-sfp-eeprom/152249

Signed-off-by: Aleksey Nasibulin &lt;alealexpro100@ya.ru&gt;
</content>
</entry>
<entry>
<title>qosify: update to the latest version</title>
<updated>2023-03-07T20:53:37Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2023-03-07T20:53:00Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=9d8374cadcbdf46ea5552778950af35b3df5d655'/>
<id>urn:sha1:9d8374cadcbdf46ea5552778950af35b3df5d655</id>
<content type='text'>
ca4509cf84d2 bpf: switch to using bpf_skb_utils.h
d064439009d0 qosify-bpf: skip unnecessary flow lookups
9c625ae96f2d map: fix deleting port based rules
9a47ea4b683d map: fix return code check for bpf_map_get_next_key calls

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>mpc85xx: add support for Watchguard Firebox T10</title>
<updated>2023-03-07T13:05:02Z</updated>
<author>
<name>David Bauer</name>
</author>
<published>2023-02-18T01:06:54Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=35f6d795134e9b089c4e763a7f58cba7d4e15e42'/>
<id>urn:sha1:35f6d795134e9b089c4e763a7f58cba7d4e15e42</id>
<content type='text'>
Hardware
--------
SoC:    Freescale P1010
RAM:    512MB
FLASH:  1 MB SPI-NOR
        512 MB NAND
ETH:    3x Gigabite Ethernet (Atheros AR8033)
SERIAL: Cisco RJ-45 (115200 8N1)
RTC:    Battery-Backed RTC (I2C)

Installation
------------

1. Patch U-Boot by dumping the content of the SPI-Flash using a SPI
   programmer. The SHA1 hash for the U-Boot password is currently
   unknown.

   A tool for patching U-Boot is available at
   https://github.com/blocktrron/t10-uboot-patcher/

   You can also patch the unknown password yourself. The SHA1 hash is
   E597301A1D89FF3F6D318DBF4DBA0A5ABC5ECBEA

2. Interrupt the bootmenu by pressing CTRL+C. A password prompt appears.
   The patched password is '1234' (without quotation marks)

3. Download the OpenWrt initramfs image. Copy it to a TFTP server
   reachable at 10.0.1.13/24 and rename it to uImage.

4. Connect the TFTP server to ethernet port 0 of the Watchguard T10.

5. Download and boot the initramfs image by entering "tftpboot; bootm;"
   in U-Boot.

6. After OpenWrt booted, create a UBI volume on the old data partition.
   The "ubi" mtd partition should be mtd7, check this using

   $ cat /proc/mtd

   Create a UBI partition by executing

   $ ubiformat /dev/mtd7 -y

7. Increase the loadable kernel-size of U-Boot by executing

   $ fw_setenv SysAKernSize 800000

8. Transfer the OpenWrt sysupgrade image to the Watchguard T10 using
   scp. Install the image by using sysupgrade:

   $ sysupgrade -n &lt;path-to-sysupgrade&gt;

   Note: The LAN ports of the T10 are 1 &amp; 2 while 0 is WAN. You might
   have to change the ethernet-port.

9. OpenWrt should now boot from the internal NAND. Enjoy.

Signed-off-by: David Bauer &lt;mail@david-bauer.net&gt;
</content>
</entry>
<entry>
<title>hostapd: enable radius server support</title>
<updated>2023-03-07T09:24:05Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2023-03-07T09:23:38Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=635d177ac95e0ba21fc0b4f26dcc9c7bcd516cca'/>
<id>urn:sha1:635d177ac95e0ba21fc0b4f26dcc9c7bcd516cca</id>
<content type='text'>
This is useful in combination with the built-in eap server support

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>hostapd: add missing return code for the bss_mgmt_enable ubus method</title>
<updated>2023-03-07T09:24:05Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2023-03-07T09:23:17Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=cf992ca862f271936f61367236378378f0d91b6d'/>
<id>urn:sha1:cf992ca862f271936f61367236378378f0d91b6d</id>
<content type='text'>
Fixes bogus errors on ubus calls

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>hostapd: add support for defining multiple acct/auth servers</title>
<updated>2023-03-07T09:24:05Z</updated>
<author>
<name>Felix Fietkau</name>
</author>
<published>2023-03-02T11:49:10Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=d10e1b4a71bff8411d734444cc8c9aa0b0ba57a4'/>
<id>urn:sha1:d10e1b4a71bff8411d734444cc8c9aa0b0ba57a4</id>
<content type='text'>
This allows adding backup servers, in case the primary ones fail.
Assume that port and shared secret are going to be the same.

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
</content>
</entry>
<entry>
<title>openssl: fix variable reference in conffiles</title>
<updated>2023-03-06T21:11:36Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-03-06T14:58:56Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=c75cd5f6028da6ceb1fb3438da93e2305cd720b1'/>
<id>urn:sha1:c75cd5f6028da6ceb1fb3438da93e2305cd720b1</id>
<content type='text'>
Fix the trivial abscence of $() when assigning engine config files to
the main libopenssl-config package even if the corresponding engines
were not built into the main library.

This is mostly cosmetic, since scripts/ipkg-build tests the file's
presence before it is actually included in the package's conffiles.

Fixes: 30b0351039 "openssl: configure engine packages during install"
Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
<entry>
<title>openssl: fix sysupgrade failure with devcrypto</title>
<updated>2023-03-06T21:09:13Z</updated>
<author>
<name>Eneas U de Queiroz</name>
</author>
<published>2023-03-06T14:58:56Z</published>
<link rel='alternate' type='text/html' href='https://git.openwrt.org/openwrt/staging/noltari/commit/?id=387c2df15cbd7bfa3917209541e1cd94ddc885d0'/>
<id>urn:sha1:387c2df15cbd7bfa3917209541e1cd94ddc885d0</id>
<content type='text'>
The bump to 3.0.8 inadvertently removed patches that are needed here,
but were not adopted upstream.  The most important one changes the
default value of the DIGESTS setting from ALL to NONE.  The absence of
this patch causes a sysupgrade failure while the engine is in use with
digests enabled.  When this happens, the system fails to boot with a
kernel panic.

Also, explicitly set DIGESTS to NONE in the provided config file, and
change the default ciphers setting to disable ECB, which has been
recommended for a long time and may cause trouble with some apps.

The config file change by itself is not enough because the config file
may be preserved during sysupgrade.

For people affected by this bug:

You can either:
1. remove, the libopenssl-devcrypto package
2. disable the engine in /etc/config/openssl;
3. change /etc/ssl/engines.cnf.d/devcrypto.cnf to set DIGESTS=NONE;
4. update libopenssl-devcrypto to &gt;=3.0.8-3

However, after doing any of the above, **you must reboot the device
before running sysupgrade** to ensure no running application is using
the engine.  Running `/etc/init.d/openssl restart` is not enough.

Fixes: 7e7e76afca "openssl: bump to 3.0.8"
Signed-off-by: Eneas U de Queiroz &lt;cotequeiroz@gmail.com&gt;
</content>
</entry>
</feed>
