Compiling your own NSS image for OnHub routers with ACwifidude

Is the kmod-mac80211 package critical here? I compiled @ACwifidude EXACTLY as instructed and it created three separate sysupgrade images and I got no errors in the complete process on my third try doing it from scratch each time. Two of them don't include the package and just one of them does.

Image 1: openwrt-ipq806x-chromium-asus_onhub-squashfs-sysupgrade.bin
Image 2: ASUS-ONHUB-20240115-Stable2305NSS-ath10k-sysupgrade.bin
Image 3: ASUS-ONHUB-20240115-Stable2305NSS-sysupgrade.bin

Of those, only image 3 has the kmod-mac80211 listed in the manifest. My first attempt with image 1 flashed and operated, but all three radios were non-functional. I'm thinking perhaps it was intentionally setup to only use wired for speed and the radios are unsupported on purpose?

The compile process also created factory images too, but at the moment I'm interested in the sysupgrade. If that package is needed in the others, can I add it? Is it missing for a reason?

Your binary is working fine. I'm trying how to learn to do this myself and it's all new knowledge for me. When I build the image and go through the Makemenu process, I'm just having problems figuring what's supposed to be ticked in the build process. I'm just praying I don't brick the thing because it's a real difficult process to start from zero which is what you have to do with the OnHubs if you screw it up.

I'm looking to create a lean image with just WireGuard and OpenVPN and the Luci apps to configure them. I've disabled adblock and ddns because adblock prevents the commercial streaming services from working and my PiVPN server is handling DDNS. I needed one more cipher for OpenVPN: CHACHA20-POLY1305 to be enabled.

I'm still compiling @Kong source code too. That one takes my slow workstation a couple of days to complete. I'm on my second try there. That @Kong guy has been writing router code for as long as I can remember and it's completely different kind of source code than @ACwifidude

Learning by trial and error like this risks catastrophe, but I'm diving in and lots of users here are throwing me the life preservers I need. Just getting the correct .config file to compile the source myself is all I need. I think I've actually got the build process down - it just takes a LOT of time.

From the latest attempt, here's what image 1 shows up as on the overview:

If you want to build an Asus OnHub image with ath10k (non-CT) only, you need to replace the top section of your diffconfig file with the following snippet. Make sure to remove all other lines with "ath10k" in your diffconfig file prior to pasting:

CONFIG_TARGET_ipq806x=y
CONFIG_TARGET_ipq806x_chromium=y
CONFIG_TARGET_ipq806x_chromium_DEVICE_asus_onhub=y
CONFIG_TARGET_DEVICE_PACKAGES_ipq806x_chromium_DEVICE_asus_onhub="-kmod-ath10k-ct -ath10k-firmware-qca988x-ct kmod-ath10
k ath10k-firmware-qca988x"

# Ath10k (non-CT)
CONFIG_PACKAGE_kmod-ath10k=y
CONFIG_PACKAGE_ath10k-board-qca988x=y
CONFIG_PACKAGE_ath10k-firmware-qca988x=y
# CONFIG_PACKAGE_kmod-ath10k-ct is not set
# CONFIG_PACKAGE_ath10k-firmware-qca988x-ct is not set

And make sure your diffconfig has the following NSS lines. Note the presence of the last line: "CONFIG_PACKAGE_MAC80211_NSS_SUPPORT=y"

CONFIG_PACKAGE_kmod-nss-ifb=y
CONFIG_PACKAGE_kmod-qca-nss-drv=y
CONFIG_PACKAGE_kmod-qca-nss-drv-pptp=y
CONFIG_PACKAGE_kmod-qca-nss-drv-igs=y
CONFIG_PACKAGE_kmod-qca-nss-drv-l2tpv2=y
CONFIG_PACKAGE_kmod-qca-nss-drv-pppoe=y
CONFIG_PACKAGE_kmod-qca-nss-drv-qdisc=y
CONFIG_PACKAGE_kmod-qca-nss-drv-tunipip6=y
CONFIG_PACKAGE_kmod-qca-nss-ecm-standard=y
CONFIG_PACKAGE_kmod-qca-nss-gmac=y
CONFIG_PACKAGE_kmod-qca-nss-drv-netlink=y
CONFIG_PACKAGE_MAC80211_NSS_SUPPORT=y
1 Like

That might be all I need to get this working. Thanks for the life preserver!

Do you know what the difference is between the CT and non-CT drivers? @ACwifidude speed tests did the best WITH the CT drivers, but most of the discussion in the OnHub topics advises not to use the CT drivers with OnHub routers.

Wireguard is installed, but I'm not sure how to configure it without the Luci interface? Would any of the packages here work? Or are they not compatible with the NSS stuff?

It all depends on people's environment. Some clients may work better with ath10k than ath10k-ct and vice versa. For the QCA WIFI chip in R7800, its official ath10k firmware (non-CT) is several years old while the official QCA ath10k firmware for other QCA WIFI chips used in cheaper IPQ806x-based devices (like onHub) are like 6+ years old or something like that. That may explain why the ath10k firmware seems to be the more preferred choice for people with R7800, as it seems to give better throughput (at least for me).

Anyway, you just have to try to run builds with ath10k and ath10k-ct and settle on which may work better with your WIFI clients.

And if you want to compare WIFI throughput between NSS and non-NSS images, make sure you they both run the same ath10k driver/firmware (both with either ath10k or ath10k-CT). Otherwise, it would be a frivolous comparison of apples and oranges.

That one takes my slow workstation a couple of days to complete.

This is because I also compile ~1000 packages so users can install them via opkg.

I just ran a complete build with clean, it takes 22min on my machine, but the sources where already in download dir.

In LUCI, go to Network -> Interfaces, and add a new interface with the protocol type "Wireguard VPN".

I thought of that, but "Wireguard VPN " isn't an option so something is missing.

I think your code is fantastic. My Linux workstation is an old laptop with a 2 CPU core Atom processor. I just start the process and check later. I certainly can remember your code on DD-WRT and Tomato too. I'm not worthy.

kmod-wireguard
luci-proto-wireguard
wireguard-tools

The kmod-wireguard is there already. I think an NSS version? Do the others work with the NSS version we're using here or do they have to be built in when compiling to work?

I clearly showed 3 packages.

Yes, I know. I'm just wondering if the wireguard packages have to be specialized for use with the NSS kernel. One of the three: kmod-wireguard was included in the image I built, but the other two have to be installed. Just wondering if the other two have to be special versions to work.

I told you in some other threads that this NSS support for IPQ806x is mainly used to accelerate routing/nat only. It has nothing to do with any crypto or VPN etc.

1 Like

You need the protocol.

A reminder.

1 Like

I was just confused because I thought you could not install packages on these special builds and that you had to compile the packages when you create the image for them to work.

Installing kernel modification “kmod” packages tends to be problematic on a live router with custom firmware due to the kernel incompatibility when installing. As long as you have the supported kmods installed you can install the other (not kmod) packages on top.

1 Like

That’s clear enough to me. Everything’s working and lots of people are helping me. Lots of others will be able to take advantage of your source code. The process makes sense to me now and probably to many others.

1 Like

On my FIFTH try, I've successfully compiled @Kong version of a community build for the Asus and TP-Link OnHub routers. Erased everything and started from scratch. Trying to remember all the errors and mistakes I'd encountered the first four times.

rm -rf openwrt

Next the ncurses development library was missing from my compiler and triggered an error, so...

sudo apt install libncurses5-dev

The first command is cloning the correct repository:

git clone -b openwrt-23.05-nss-qsdk11 https://github.com/ricsc/openwrt.git

Next, change into the newly created openwrt subdirectory

cd openwrt

Next, download the .config file

wget http://desipro.de/openwrt/23.05/ipq806x-nss/config.buildinfo -O ~/openwrt/.config

Update the feeds:

./scripts/feeds update -a

Install the feeds:

./scripts/feeds install -a

After I did this command, there were several errors about packages having dependencies of files that didn't exist.

At this point, I did the next step:

make V=s menuconfig

To launch the text-based configuration menu to select your target system, profile, devices, and images.

Screenshot_20240609_002155

This is where you have to change Subtarget to Google Chromium and then select Target Devices, in this case, I selected the ASUS and TP-Link OnHub routers. Save and exit.

At this point, I added an extra step to make sure I wasn't missing anything needed to compile as the installing the feeds step complained about.

make download

This step will pre-fetch all source code for all dependencies, this enables you compile with more CPU cores.

I ran another.

make menuconfig

And made sure everything was correct.

Then, we're ready to compile

make  V=s -j $(nproc) world

Then... the compile begins and it might take a while depending on the speed of your system.

Thanks for everyone's help. I think I got it.

The results:

1 Like

Unfortunately, the saga continues...

Although I successfully compiled @kong source code, the NSS drivers were not selected by default in the imported .config - the finished image didn't include them. I obviously have to do something more than selecting the target system, profile, devices, and images to make an image for the OnHub routers. Since the NSS drivers were the point of compiling this code, my attempts are still a complete failure.

Here's the manifest:

6in4 - 28
6rd - 12
6to4 - 13
arptables-legacy - 0.0.5-1
arptables-nft - 1.8.8-2
ath10k-board-qca9887 - 20230804-1
ath10k-board-qca9888 - 20230804-1
ath10k-board-qca988x - 20230804-1
ath10k-board-qca9984 - 20230804-1
ath10k-board-qca99x0 - 20230804-1
ath10k-firmware-qca9887 - 20230804-1
ath10k-firmware-qca9888 - 20230804-1
ath10k-firmware-qca988x - 20230804-1
ath10k-firmware-qca9984 - 20230804-1
ath10k-firmware-qca99x0 - 20230804-1
base-files - 1555-r23921-3e987a0b6e
blkid - 2.39-2
block-mount - 2023-02-28-bfe882d5-1
blockd - 2023-02-28-bfe882d5-1
busybox - 1.36.1-1
ca-bundle - 20230311-1
chat - 2.4.9.git-2021-01-04-4
comgt - 0.32-35
dnsmasq-full - 2.90-2
dropbear - 2022.82-6
ebtables-legacy - 2018-06-27-48cff25d-1
ebtables-nft - 1.8.8-2
ethtool - 6.3-1
f2fs-tools - 1.16.0-1
f2fsck - 1.16.0-1
firewall4 - 2023-09-01-598d9fbb-1
fstools - 2023-02-28-bfe882d5-1
fwtool - 2019-11-12-8f7fe925-1
getrandom - 2022-08-13-4c7b720b-2
gre - 13
hostapd-common - 2023-09-08-e5ccbfc6-6
hostapd-openssl - 2023-09-08-e5ccbfc6-6
hostapd-utils - 2023-09-08-e5ccbfc6-6
ip-full - 6.3.0-1
ip-tiny - 6.3.0-1
ip6tables-nft - 1.8.8-2
ip6tables-zz-legacy - 1.8.8-2
ipset - 7.17-1
iptables-mod-conntrack-extra - 1.8.8-2
iptables-mod-extra - 1.8.8-2
iptables-mod-ipopt - 1.8.8-2
iptables-mod-iprange - 1.8.8-2
iptables-mod-physdev - 1.8.8-2
iptables-nft - 1.8.8-2
iptables-zz-legacy - 1.8.8-2
iw-full - 5.19-1
iwcap - 1
iwinfo - 2023-07-01-ca79f641-1
jansson4 - 2.14-3
jshn - 2023-05-23-75a3b870-1
jsonfilter - 2024-01-23-594cfa86-1
kernel - 5.15.158-1-94fa6b648bf29991b52f49065639cd56
kmod-arptables - 5.15.158-1
kmod-asn1-decoder - 5.15.158-1
kmod-ata-ahci - 5.15.158-1
kmod-ata-ahci-platform - 5.15.158-1
kmod-ata-core - 5.15.158-1
kmod-ath - 5.15.158+6.1.24-4
kmod-ath10k - 5.15.158+6.1.24-4
kmod-ath9k - 5.15.158+6.1.24-4
kmod-ath9k-common - 5.15.158+6.1.24-4
kmod-bonding - 5.15.158-1
kmod-br-netfilter - 5.15.158-1
kmod-cfg80211 - 5.15.158+6.1.24-4
kmod-crypto-acompress - 5.15.158-1
kmod-crypto-aead - 5.15.158-1
kmod-crypto-arc4 - 5.15.158-1
kmod-crypto-authenc - 5.15.158-1
kmod-crypto-cbc - 5.15.158-1
kmod-crypto-ccm - 5.15.158-1
kmod-crypto-cmac - 5.15.158-1
kmod-crypto-crc32 - 5.15.158-1
kmod-crypto-crc32c - 5.15.158-1
kmod-crypto-ctr - 5.15.158-1
kmod-crypto-cts - 5.15.158-1
kmod-crypto-deflate - 5.15.158-1
kmod-crypto-des - 5.15.158-1
kmod-crypto-ecb - 5.15.158-1
kmod-crypto-ecdh - 5.15.158-1
kmod-crypto-echainiv - 5.15.158-1
kmod-crypto-gcm - 5.15.158-1
kmod-crypto-gf128 - 5.15.158-1
kmod-crypto-ghash - 5.15.158-1
kmod-crypto-hash - 5.15.158-1
kmod-crypto-hmac - 5.15.158-1
kmod-crypto-kpp - 5.15.158-1
kmod-crypto-lib-chacha20 - 5.15.158-1
kmod-crypto-lib-chacha20poly1305 - 5.15.158-1
kmod-crypto-lib-curve25519 - 5.15.158-1
kmod-crypto-lib-poly1305 - 5.15.158-1
kmod-crypto-manager - 5.15.158-1
kmod-crypto-md4 - 5.15.158-1
kmod-crypto-md5 - 5.15.158-1
kmod-crypto-null - 5.15.158-1
kmod-crypto-rng - 5.15.158-1
kmod-crypto-seqiv - 5.15.158-1
kmod-crypto-sha1 - 5.15.158-1
kmod-crypto-sha256 - 5.15.158-1
kmod-crypto-sha512 - 5.15.158-1
kmod-crypto-user - 5.15.158-1
kmod-ebtables - 5.15.158-1
kmod-fs-autofs4 - 5.15.158-1
kmod-fs-exfat - 5.15.158-1
kmod-fs-exportfs - 5.15.158-1
kmod-fs-ext4 - 5.15.158-1
kmod-fs-f2fs - 5.15.158-1
kmod-fs-nfs-common - 5.15.158-1
kmod-fs-vfat - 5.15.158-1
kmod-gpio-button-hotplug - 5.15.158-3
kmod-gre - 5.15.158-1
kmod-gre6 - 5.15.158-1
kmod-hwmon-core - 5.15.158-1
kmod-ifb - 5.15.158-1
kmod-input-core - 5.15.158-1
kmod-ip6-tunnel - 5.15.158-1
kmod-ip6tables - 5.15.158-1
kmod-ipt-conntrack - 5.15.158-1
kmod-ipt-conntrack-extra - 5.15.158-1
kmod-ipt-core - 5.15.158-1
kmod-ipt-extra - 5.15.158-1
kmod-ipt-ipopt - 5.15.158-1
kmod-ipt-iprange - 5.15.158-1
kmod-ipt-ipset - 5.15.158-1
kmod-ipt-nat - 5.15.158-1
kmod-ipt-physdev - 5.15.158-1
kmod-ipt-raw - 5.15.158-1
kmod-iptunnel - 5.15.158-1
kmod-iptunnel4 - 5.15.158-1
kmod-iptunnel6 - 5.15.158-1
kmod-l2tp - 5.15.158-1
kmod-leds-gpio - 5.15.158-1
kmod-lib-crc-ccitt - 5.15.158-1
kmod-lib-crc16 - 5.15.158-1
kmod-lib-crc32c - 5.15.158-1
kmod-lib-textsearch - 5.15.158-1
kmod-lib-zlib-deflate - 5.15.158-1
kmod-lib-zlib-inflate - 5.15.158-1
kmod-mac80211 - 5.15.158+6.1.24-4
kmod-mii - 5.15.158-1
kmod-nf-conncount - 5.15.158-1
kmod-nf-conntrack - 5.15.158-1
kmod-nf-conntrack-netlink - 5.15.158-1
kmod-nf-conntrack6 - 5.15.158-1
kmod-nf-flow - 5.15.158-1
kmod-nf-ipt - 5.15.158-1
kmod-nf-ipt6 - 5.15.158-1
kmod-nf-log - 5.15.158-1
kmod-nf-log6 - 5.15.158-1
kmod-nf-nat - 5.15.158-1
kmod-nf-nathelper-extra - 5.15.158-1
kmod-nf-reject - 5.15.158-1
kmod-nf-reject6 - 5.15.158-1
kmod-nfnetlink - 5.15.158-1
kmod-nft-arp - 5.15.158-1
kmod-nft-bridge - 5.15.158-1
kmod-nft-compat - 5.15.158-1
kmod-nft-core - 5.15.158-1
kmod-nft-fib - 5.15.158-1
kmod-nft-nat - 5.15.158-1
kmod-nft-netdev - 5.15.158-1
kmod-nft-offload - 5.15.158-1
kmod-nls-base - 5.15.158-1
kmod-nls-cp437 - 5.15.158-1
kmod-nls-iso8859-1 - 5.15.158-1
kmod-nls-utf8 - 5.15.158-1
kmod-oid-registry - 5.15.158-1
kmod-phy-qcom-ipq806x-usb - 5.15.158-1
kmod-ppp - 5.15.158-1
kmod-pppoe - 5.15.158-1
kmod-pppox - 5.15.158-1
kmod-pptp - 5.15.158-1
kmod-pstore - 5.15.158-1
kmod-ramoops - 5.15.158-1
kmod-random-core - 5.15.158-1
kmod-reed-solomon - 5.15.158-1
kmod-sched-cake - 5.15.158-1
kmod-sched-connmark - 5.15.158-1
kmod-sched-core - 5.15.158-1
kmod-scsi-core - 5.15.158-1
kmod-sit - 5.15.158-1
kmod-slhc - 5.15.158-1
kmod-thermal - 5.15.158-1
kmod-tun - 5.15.158-1
kmod-udptunnel4 - 5.15.158-1
kmod-udptunnel6 - 5.15.158-1
kmod-usb-core - 5.15.158-1
kmod-usb-dwc3 - 5.15.158-1
kmod-usb-dwc3-qcom - 5.15.158-1
kmod-usb-ehci - 5.15.158-1
kmod-usb-ledtrig-usbport - 5.15.158-1
kmod-usb-net - 5.15.158-1
kmod-usb-net-qmi-wwan - 5.15.158-1
kmod-usb-ohci - 5.15.158-1
kmod-usb-storage - 5.15.158-1
kmod-usb-storage-extras - 5.15.158-1
kmod-usb-storage-uas - 5.15.158-1
kmod-usb-wdm - 5.15.158-1
kmod-usb-xhci-hcd - 5.15.158-1
kmod-usb2 - 5.15.158-1
kmod-usb3 - 5.15.158-1
kmod-wireguard - 5.15.158-1
libatomic1 - 12.3.0-4
libblkid1 - 2.39-2
libblobmsg-json20230523 - 2023-05-23-75a3b870-1
libbpf1 - 1.2.2-1
libbz2-1.0 - 1.0.8-1
libc - 1.2.4-4
libcap - 2.69-1
libelf1 - 0.189-1
libevent2-7 - 2.1.12-1
libevent2-core7 - 2.1.12-1
libevent2-pthreads7 - 2.1.12-1
libf2fs6 - 1.16.0-1
libgcc1 - 12.3.0-4
libgmp10 - 6.2.1-1
libip4tc2 - 1.8.8-2
libip6tc2 - 1.8.8-2
libipset13 - 7.17-1
libiptext-nft0 - 1.8.8-2
libiptext0 - 1.8.8-2
libiptext6-0 - 1.8.8-2
libiwinfo-data - 2023-07-01-ca79f641-1
libiwinfo-lua - 2023-07-01-ca79f641-1
libiwinfo20230701 - 2023-07-01-ca79f641-1
libjson-c5 - 0.16-3
libjson-script20230523 - 2023-05-23-75a3b870-1
libltdl7 - 2.4.7-1
liblua5.1.5 - 5.1.5-11
libmbedtls12 - 2.28.7-2
libmnl0 - 1.0.5-1
libmount1 - 2.39-2
libncurses6 - 6.4-2
libnetfilter-conntrack3 - 1.0.9-2
libnettle8 - 3.9.1-1
libnfnetlink0 - 1.0.2-1
libnftnl11 - 1.2.6-1
libnl-cli200 - 3.7.0-1
libnl-core200 - 3.7.0-1
libnl-genl200 - 3.7.0-1
libnl-nf200 - 3.7.0-1
libnl-route200 - 3.7.0-1
libnl-tiny1 - 2023-07-27-bc92a280-1
libnl200 - 3.7.0-1
libopenssl-conf - 3.0.13-1
libopenssl-legacy - 3.0.13-1
libopenssl3 - 3.0.13-1
libpcap1 - 1.10.4-1
libpcre2 - 10.42-1
libpopt0 - 1.19-1
libpthread - 1.2.4-4
libreadline8 - 8.2-1
librt - 1.2.4-4
libsmartcols1 - 2.39-2
libstdcpp6 - 12.3.0-4
libsysfs2 - 2.1.0-4
libubox20230523 - 2023-05-23-75a3b870-1
libubus-lua - 2023-06-05-f787c97b-1
libubus20230605 - 2023-06-05-f787c97b-1
libuci-lua - 2023-08-10-5781664d-1
libuci20130104 - 2023-08-10-5781664d-1
libuclient20201210 - 2023-04-13-007d9454-1
libucode20230711 - 2023-11-07-a6e75e02-1
libustream-openssl20201210 - 2023-02-25-498f6e26-1
libuuid1 - 2.39-2
libwolfssl5.6.4.4edc9f28 - 5.6.4-stable-1
libxtables12 - 1.8.8-2
logd - 2022-08-13-4c7b720b-2
lua - 5.1.5-11
mkf2fs - 1.16.0-1
mount-utils - 2.39-2
mtd - 26
netifd - 2024-01-04-c18cc79d-2
nftables-json - 1.0.8-1
odhcp6c - 2023-05-12-bcd28363-20
odhcpd - 2023-10-24-d8118f6e-1
openssl-util - 3.0.13-1
openwrt-keyring - 2022-03-25-62471e69-2
opkg - 2022-02-24-d038e5b6-2
ppp - 2.4.9.git-2021-01-04-4
ppp-mod-pppoe - 2.4.9.git-2021-01-04-4
procd - 2023-06-25-2db83655-2
procd-seccomp - 2023-06-25-2db83655-2
resolveip - 2
rpcd - 2023-07-01-c07ab2f9-1
rpcd-mod-file - 2023-07-01-c07ab2f9-1
rpcd-mod-iwinfo - 2023-07-01-c07ab2f9-1
rpcd-mod-ucode - 2023-07-01-c07ab2f9-1
strace - 6.3-1
swconfig - 12
sysfsutils - 2.1.0-4
tc-mod-iptables - 6.3.0-1
tc-tiny - 6.3.0-1
tcpdump - 4.99.4-1
terminfo - 6.4-2
uboot-envtools - 2023.04-1
ubox - 2022-08-13-4c7b720b-2
ubus - 2023-06-05-f787c97b-1
ubusd - 2023-06-05-f787c97b-1
uci - 2023-08-10-5781664d-1
uclient-fetch - 2023-04-13-007d9454-1
ucode - 2023-11-07-a6e75e02-1
ucode-mod-fs - 2023-11-07-a6e75e02-1
ucode-mod-math - 2023-11-07-a6e75e02-1
ucode-mod-nl80211 - 2023-11-07-a6e75e02-1
ucode-mod-rtnl - 2023-11-07-a6e75e02-1
ucode-mod-ubus - 2023-11-07-a6e75e02-1
ucode-mod-uci - 2023-11-07-a6e75e02-1
ucode-mod-uloop - 2023-11-07-a6e75e02-1
uhttpd - 2023-06-25-34a8a74d-2
uhttpd-mod-ubus - 2023-06-25-34a8a74d-2
uqmi - 2022-10-20-c8c9f105-1
urandom-seed - 3
urngd - 2023-11-01-44365eb1-1
usign - 2020-05-23-f1f65026-1
wireguard-tools - 1.0.20210914-2
wireless-regdb - 2024.05.08-1
wireless-tools - 29-6
wpa-cli - 2023-09-08-e5ccbfc6-6
wpa-supplicant-mesh-openssl - 2023-09-08-e5ccbfc6-6
wwan - 2019-04-29-6
xtables-legacy - 1.8.8-2
xtables-nft - 1.8.8-2
zlib - 1.2.13-1

I'm thinking that I have to screw with manually editing the .config file with nano.

nano ~/openwrt/.config

The help I need now is editing this correctly to include the correct NSS support for the OnHubs. I'd also like to include OpenVPN support to the build which isn't there either. WireGuard seems to be already be there.

Attn: @kong @ACwifidude @RuralRoots @vochong @egc

Anything you want to include in the final image must be specifically added in the .config file.

For NSS

CONFIG_NSS_DRV_BRIDGE_ENABLE=y
CONFIG_NSS_DRV_CRYPTO_ENABLE=y
CONFIG_NSS_DRV_GRE_ENABLE=y
CONFIG_NSS_DRV_GRE_REDIR_ENABLE=y
CONFIG_NSS_DRV_IGS_ENABLE=y
CONFIG_NSS_DRV_IPSEC_ENABLE=y
CONFIG_NSS_DRV_IPV6_ENABLE=y
CONFIG_NSS_DRV_L2TP_ENABLE=y
CONFIG_NSS_DRV_PPE_ENABLE=y
CONFIG_NSS_DRV_PPPOE_ENABLE=y
CONFIG_NSS_DRV_PPTP_ENABLE=y
CONFIG_NSS_DRV_SHAPER_ENABLE=y
CONFIG_NSS_DRV_TSTAMP_ENABLE=y
CONFIG_NSS_DRV_TUN6RD_ENABLE=y
CONFIG_NSS_DRV_TUNIPIP6_ENABLE=y
CONFIG_NSS_DRV_VIRT_IF_ENABLE=y
CONFIG_NSS_DRV_WIFI_ENABLE=y
CONFIG_PACKAGE_MAC80211_NSS_SUPPORT=y
CONFIG_PACKAGE_kmod-nss-ifb=y
CONFIG_PACKAGE_kmod-qca-nss-drv=y
CONFIG_PACKAGE_kmod-qca-nss-drv-igs=y
CONFIG_PACKAGE_kmod-qca-nss-drv-l2tpv2=y
CONFIG_PACKAGE_kmod-qca-nss-drv-netlink=y
CONFIG_PACKAGE_kmod-qca-nss-drv-pppoe=y
CONFIG_PACKAGE_kmod-qca-nss-drv-qdisc=y
CONFIG_PACKAGE_kmod-qca-nss-drv-tunipip6=y
CONFIG_PACKAGE_kmod-qca-nss-ecm-standard=y
CONFIG_PACKAGE_kmod-qca-nss-gmac=y

For OpenVPN

CONFIG_PACKAGE_luci-app-openvpn=y
CONFIG_PACKAGE_openvpn-openssl=y
CONFIG_OPENVPN_openssl_ENABLE_LZO=y
CONFIG_OPENVPN_openssl_ENABLE_LZ4=y
CONFIG_OPENVPN_openssl_ENABLE_FRAGMENT=y
CONFIG_OPENVPN_openssl_ENABLE_MULTIHOME=y
CONFIG_OPENVPN_openssl_ENABLE_PORT_SHARE=y
CONFIG_OPENVPN_openssl_ENABLE_DEF_AUTH=y
CONFIG_OPENVPN_openssl_ENABLE_PF=y
CONFIG_OPENVPN_openssl_ENABLE_SMALL=y
1 Like