tesf23
November 14, 2023, 3:29am
963
I'm also testing using the mmcblk0p28 as overlay instead of the original mmcblk0p20 so we can install larger plugins and also using docker(It gives 3GB total usable space), it works great so far, is there a way I can set mmcblk0p28 as default overlay but still using mmcblk0p20 as firmware when building firmware?
Here is my steps:
1. Format mmcblk0p28 to ext4.
2. Mount mmcblk0p28 as /mnt/data.
3. cp -r /overlay/* /mnt/data
4. Add mmcblk0p28 as mount as overlay.
5. Reboot
a_guy
November 14, 2023, 3:43am
964
tesf23
November 14, 2023, 3:05pm
965
Perfect, that's what exactly I'm looking for thanks. What do you think of this approach? For the docker version release.
a_guy
November 14, 2023, 3:22pm
966
I think the default openwrt is to not use extroot.
But may be we could use that 3gb data partition right during install instead of regular one? @robimarko what's the recommended approach here for using extra available space on mmc?
Kaxi
November 14, 2023, 3:43pm
967
I tried.and after I set up,I lost 5G sigal, and my book jump to 2.4G,here is the log:
Tue Nov 14 23:39:06 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Nov 14 23:39:14 2023 authpriv.info dropbear[11954]: Exit (root) from <192.168.2.114:51137>: Keepalive timeout
Tue Nov 14 23:39:29 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:39:31 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:39:31 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 1)
Tue Nov 14 23:39:31 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:39:31 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:39:31 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:39:31 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 2 names
Tue Nov 14 23:39:31 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Nov 14 23:39:31 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:39:42 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:39:42 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:39:42 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:39:42 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:39:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:39:42 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:39:46 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:39:50 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:39:52 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:39:52 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 1)
Tue Nov 14 23:39:52 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:39:52 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:39:52 2023 daemon.info hostapd: phy0-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:39:52 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:39:52 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:39:52 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:39:52 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:40:03 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: disconnected due to excessive missing ACKs
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:40:03 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:40:03 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:40:04 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:06 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:40:06 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:40:08 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:12 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e8:f4:08:03:88:bf
Tue Nov 14 23:40:14 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: authenticated
Tue Nov 14 23:40:14 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf IEEE 802.11: associated (aid 3)
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy0-ap0: Prune association for e8:f4:08:03:88:bf
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-SMPS-MODE-CHANGED e8:f4:08:03:88:bf off
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e8:f4:08:03:88:bf auth_alg=open
Tue Nov 14 23:40:14 2023 daemon.info hostapd: phy1-ap0: STA e8:f4:08:03:88:bf WPA: pairwise key handshake completed (RSN)
Tue Nov 14 23:40:14 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e8:f4:08:03:88:bf
Tue Nov 14 23:40:15 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 4 names
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 4 names
Tue Nov 14 23:40:15 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Nov 14 23:40:16 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.2.114 e8:f4:08:03:88:bf
Tue Nov 14 23:40:16 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.2.114 e8:f4:08:03:88:bf Kaxi-T480s
Tue Nov 14 23:40:18 2023 daemon.warn odhcpd[3112]: No default route present, overriding ra_lifetime!
slh
November 14, 2023, 11:15pm
968
The first question would be (as I can't find it in this thread easily)), how much space do you have at your disposal easily/ normally, without resorting to extroot?
If you have something like ~8 MB for the kernel and >=30 MB for rootfs+overlay, then why bother and complicate things, just leave it as untapped space for the user to play with (e.g. blockd and pure data partition)? extroot adds extra complexity and pain during upgrades, if there is no strong need for adding the space for a normal OpenWrt installation, it's better to defer it (there's always the option to add this later, either for those users who need it or in future OpenWrt patches/ versions, if and when the need arises). Not doing it now doesn't make this harder or impossible for the future, but it makes it easier to get your device support merged now.
a_guy
November 14, 2023, 11:57pm
969
Here is the list. We have 20mb and 150mb respectively
root@OpenWrt:/# losetup -o 10788864 /dev/loop0 /dev/mmcblk0p20
[ 112.237225] loop0: detected capacity change from 0 to 286428
and
root@OpenWrt:/# mount /dev/loop0
mount: can't find /dev/loop0 in /etc/fstab
fstab is empty
root@OpenWrt:/# cat etc/fstab
# <file system> <mount point> <type> <options> <dump> <pass>
and this is the partitions on mmc as parted sees them. It sees that GPT is not using all available space ( that's what it complains about at boot time, i think)
Using /dev/mmcblk…
Based on your criteria we should not even bother, I guess.
slh
November 15, 2023, 12:04am
970
That would be my advice, yes.
On my nbg6817 (ipq8065) with eMMC, I have 2*(4+64) MB (dual-firmware) - with 3.2 GB (ext4) untapped; not great, but not a reason to jump through hoops either.
1 Like
a_guy
November 15, 2023, 3:43am
971
New rebased non-nss version:
The main difference is new BDF for 6G radio (courtesy of @Ansuel ) with new default limit of 22dBm (used to be just 10dBm). This should improve the range. Feel free to test and report your findings
https://transfer.sh/OG3nqahLeI/openwrt-qualcommax-ipq807x-verizon_cr1000a-initramfs-uImage.itb
https://transfer.sh/UWtih5Jq6a/openwrt-qualcommax-ipq807x-verizon_cr1000a-squashfs-sysupgrade.bin
wsctomy
November 15, 2023, 8:57am
972
Wifi issue is observed too , but issue with intel ax wifi card only , when using iphone and realtek wifi card , everything ok
When using intel wifi cards , wifi become not stable, and keep disconnect and losing package
Need to checking
no such issue with non-nss firmware
Kaxi
November 15, 2023, 9:19am
973
Yes,my notebook is intel AX210,and anthoer is ax201.They work well with non-nss firmware.I didnt check my phones,put the foucus on notebooks.My phone is Huawei Mate50 and iPhone13,they work well with non-nss firmware too.
a_guy
November 15, 2023, 1:46pm
974
I guess those nss questions are better be asked in an existing NSS firmware thread. Could be a common issue with a known solution...
tesf23
November 15, 2023, 3:03pm
975
Nice work! Going to update your code and compile another NSS firmware.
a_guy
November 15, 2023, 5:28pm
976
Try to switch off different parameters in Intel driver and see if it helps. From logs here I see only that it disconnects silently...
wsctomy
November 16, 2023, 4:11am
977
tried with different parameters, with wpa3 protocal/wpa2 aes/ unencrypted wifi, it finally not disconnecting, but it only works with download only , with very poor upload.
Tried reset wifi, as well as turning off ipv6, no hope
when test with iphone, it does have 700dl/ 500ul , still some issue with nss driver and intel wifi card
wifi disconnects again..
After I used it for half an hour.
Thu Nov 16 15:00:02 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 96:df:d9:10:8a:5c auth_alg=sae
Thu Nov 16 15:00:02 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:00:02 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:02 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:07 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:09 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:09 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: disassociated
Thu Nov 16 15:00:10 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Nov 16 15:00:22 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: authenticated
Thu Nov 16 15:00:22 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: associated (aid 2)
Thu Nov 16 15:00:22 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 96:df:d9:10:8a:5c auth_alg=open
Thu Nov 16 15:00:22 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:00:22 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:22 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:27 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:00:31 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 96:df:d9:10:8a:5c
Thu Nov 16 15:00:31 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: disassociated
Thu Nov 16 15:00:32 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Nov 16 15:01:16 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: authenticated
Thu Nov 16 15:01:16 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c IEEE 802.11: associated (aid 2)
Thu Nov 16 15:01:16 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 96:df:d9:10:8a:5c auth_alg=open
Thu Nov 16 15:01:16 2023 daemon.info hostapd: phy0-ap0: STA 96:df:d9:10:8a:5c WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:01:16 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 96:df:d9:10:8a:5c
Thu Nov 16 15:01:16 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:01:16 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:01:21 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:01:25 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:03:36 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:07:54 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:12:13 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:19:33 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d8:80:83:20:77:01
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: disassociated
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-N_SS-CHANGED d8:80:83:20:77:01 1
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: authenticated
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: associated (aid 1)
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d8:80:83:20:77:01 auth_alg=open
Thu Nov 16 15:24:50 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:24:50 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d8:80:83:20:77:01
Thu Nov 16 15:24:50 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:24:54 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:24:58 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:25:45 2023 daemon.notice netifd: lan (9286): udhcpc: sending renew to server 192.168.100.1
Thu Nov 16 15:25:46 2023 daemon.notice netifd: lan (9286): udhcpc: lease of 192.168.100.4 obtained from 192.168.100.1, lease time 7200
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d8:80:83:20:77:01
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: disassociated
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: STA-OPMODE-N_SS-CHANGED d8:80:83:20:77:01 1
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: authenticated
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 IEEE 802.11: associated (aid 1)
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d8:80:83:20:77:01 auth_alg=open
Thu Nov 16 15:25:54 2023 daemon.info hostapd: phy0-ap0: STA d8:80:83:20:77:01 WPA: pairwise key handshake completed (RSN)
Thu Nov 16 15:25:54 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d8:80:83:20:77:01
Thu Nov 16 15:25:54 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:25:58 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:26:02 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
Thu Nov 16 15:26:04 2023 daemon.warn odhcpd[2220]: No default route present, overriding ra_lifetime!
tesf23
November 19, 2023, 6:39pm
980
Try disable software offloading under firewall and packet steering under the global network options.
I been using this NSS version for a week, overall it's been very stable and faster. I haven't test it under bridge mode yet.
@a_guy I have found that for NSS version you need disable software offloading and packet steering, otherwise you will get random ssl error. Everything else looks fine to me.
1 Like
p1Kk
November 21, 2023, 8:46am
981
How did you configure it? Could u share your config? I have a format error...
a_guy
November 22, 2023, 1:20am
982
Configure what? After flashing its configuring openwrt as usual.
p1Kk
November 22, 2023, 1:36am
983