firmware/src/packages/fff/fff-network/mips
Adrian Schmutzler a79bdf7594 ath79: implement both versions of ubnt,bullet-m
The Bullet M (XM) was sold with two different SoCs, AR7241 and
AR7240, which cannot be served by one DTS. This implements both
versions as done in OpenWrt.

Note that those variants may not be distinguished from the outside.
The AR7241 version appears to be the more recent and more abundant
version.

Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
Reviewed-by: Fabian Bläse <fabian@blaese.de>
2021-06-08 20:15:30 +02:00
..
network.glinet,gl-ar150 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.mode fff-network: Group network files by arch, not by target 2020-06-18 12:47:05 +02:00
network.tplink,archer-c7-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c7-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c25-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe510-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-mr3020-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa850re-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa860re-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wa901nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3500-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3600-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4300-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4310-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr710n-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr740n-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr741-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr741nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v7 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v8 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v9 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v10 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v11 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr841-v12 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr842n-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043n-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,bullet-m-ar7240 ath79: implement both versions of ubnt,bullet-m 2021-06-08 20:15:30 +02:00
network.ubnt,bullet-m-ar7241 ath79: implement both versions of ubnt,bullet-m 2021-06-08 20:15:30 +02:00
network.ubnt,nanostation-loco-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-loco-m-xw treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,picostation-m treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifi treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifiac-mesh treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00