IPQ807X NSS Build

What's the difference between bpf, full, and tiny versions? Which do you recommend?

IDK - just built all to satisfy everybody.
For example provided tc-tiny is enough.

2 Likes

Does anybody has luci-app-nlbwmon running well on this build (https://openwrt.admincomps.ru/nss/20230907/openwrt-qualcommax-ipq807x-xiaomi_ax3600-squashfs-sysupgrade.bin)?

I need a possibility to see which client is producing so much internet traffic, but luci-app-nlbwmon don't show any data. All empty.

1 Like

I'm not sure if this is the case, but I have seen routers not being able to monitor traffic when hardware offloading was enabled.

I had problems while surfing with devices connected via LAN. I often noticed that images on web pages did not load completely. File transfers were often interrupted. There was packet loss. It was always like this for connections from LAN -> WAN. Wifi was without problems. On the internal network there were no disconnections.

I had installed https://openwrt.admincomps.ru/nss/20230907/, also made an update to 20230920. Same issue.

Logfile

Wed Sep 20 17:49:07 2023 kern.info kernel: [93872.213693] nss-dp 3a001400.dp3 lan1: PHY Link is down
Wed Sep 20 17:49:07 2023 kern.info kernel: [93872.214282] br-lan: port 1(lan1) entered disabled state
Wed Sep 20 17:49:07 2023 daemon.notice netifd: Network device 'lan1' link is down
Wed Sep 20 17:49:24 2023 kern.info kernel: [93889.621787] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
Wed Sep 20 17:49:24 2023 kern.info kernel: [93889.621914] br-lan: port 1(lan1) entered blocking state
Wed Sep 20 17:49:24 2023 kern.info kernel: [93889.626565] br-lan: port 1(lan1) entered listening state
Wed Sep 20 17:49:24 2023 daemon.notice netifd: Network device 'lan1' link is up
Wed Sep 20 17:49:33 2023 kern.info kernel: [93898.069695] br-lan: port 1(lan1) entered learning state
Wed Sep 20 17:49:41 2023 kern.info kernel: [93906.261736] br-lan: port 1(lan1) entered forwarding state
Wed Sep 20 17:49:41 2023 kern.info kernel: [93906.261788] br-lan: topology change detected, propagating
Wed Sep 20 17:49:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee
Wed Sep 20 17:49:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee
Wed Sep 20 17:49:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee
Wed Sep 20 17:49:42 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee nebra-6F9EEE
Wed Sep 20 17:49:43 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 6 names
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 8 names
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 6 names
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 8 names
Wed Sep 20 17:49:45 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Sep 20 17:49:46 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3
Wed Sep 20 17:49:46 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3
Wed Sep 20 17:49:46 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3
Wed Sep 20 17:49:46 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3 nebra-6FA0C3
Wed Sep 20 17:49:47 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 17:49:53 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 17:49:53 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 17:53:05 2023 kern.info kernel: [94110.806548] nss-dp 3a001400.dp3 lan1: PHY Link is down
Wed Sep 20 17:53:05 2023 kern.info kernel: [94110.806895] br-lan: port 1(lan1) entered disabled state
Wed Sep 20 17:53:05 2023 daemon.notice netifd: Network device 'lan1' link is down
Wed Sep 20 17:53:27 2023 kern.info kernel: [94132.311655] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
Wed Sep 20 17:53:27 2023 kern.info kernel: [94132.311780] br-lan: port 1(lan1) entered blocking state
Wed Sep 20 17:53:27 2023 kern.info kernel: [94132.316447] br-lan: port 1(lan1) entered listening state
Wed Sep 20 17:53:27 2023 daemon.notice netifd: Network device 'lan1' link is up
Wed Sep 20 17:53:35 2023 kern.info kernel: [94140.758530] br-lan: port 1(lan1) entered learning state
Wed Sep 20 17:53:44 2023 kern.info kernel: [94148.950565] br-lan: port 1(lan1) entered forwarding state
Wed Sep 20 17:53:44 2023 kern.info kernel: [94148.950617] br-lan: topology change detected, propagating
Wed Sep 20 17:53:44 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.110 20:7b:d2:a2:b5:6e
Wed Sep 20 17:53:44 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.110 20:7b:d2:a2:b5:6e DESKTOP-CIMQNLR
Wed Sep 20 17:53:46 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Sep 20 17:53:46 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 6 names
Wed Sep 20 17:53:46 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 6 names
Wed Sep 20 17:53:46 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Sep 20 17:53:47 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Sep 20 17:53:47 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 6 names
Wed Sep 20 17:53:47 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 8 names
Wed Sep 20 17:53:47 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Sep 20 17:53:49 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 17:53:53 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee
Wed Sep 20 17:53:53 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee
Wed Sep 20 17:53:53 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee
Wed Sep 20 17:53:53 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.187 e4:5f:01:6f:9e:ee nebra-6F9EEE
Wed Sep 20 17:53:55 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 17:53:57 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3
Wed Sep 20 17:53:57 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3
Wed Sep 20 17:53:57 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3
Wed Sep 20 17:53:57 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.142 e4:5f:01:6f:a0:c3 nebra-6FA0C3
Wed Sep 20 17:54:09 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 17:54:54 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 17:54:54 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 17:55:09 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 17:55:32 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.41 60:23:a4:5c:2c:7b
Wed Sep 20 17:55:32 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.41 60:23:a4:5c:2c:7b yi-hack-v4
Wed Sep 20 17:59:55 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 17:59:55 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 18:03:27 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:04:08 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.100 02:9f:23:df:c4:9d
Wed Sep 20 18:04:08 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.100 02:9f:23:df:c4:9d homeassistant
Wed Sep 20 18:04:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 18:04:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 18:08:43 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:09:57 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 18:09:57 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 18:12:11 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:12:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 7c:49:eb:88:db:d9
Wed Sep 20 18:12:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.226 7c:49:eb:88:db:d9
Wed Sep 20 18:12:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.226 7c:49:eb:88:db:d9
Wed Sep 20 18:12:56 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.226 7c:49:eb:88:db:d9 lumi-gateway-v3_miio94266886
Wed Sep 20 18:14:58 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 18:14:58 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 18:17:25 2023 daemon.notice hostapd: phy1-ap0: STA-OPMODE-N_SS-CHANGED 5c:3a:45:db:8a:23 2
Wed Sep 20 18:17:25 2023 daemon.info hostapd: phy1-ap0: STA 5c:3a:45:db:8a:23 IEEE 802.11: associated (aid 1)
Wed Sep 20 18:17:25 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 5c:3a:45:db:8a:23 auth_alg=sae
Wed Sep 20 18:17:25 2023 daemon.info hostapd: phy1-ap0: STA 5c:3a:45:db:8a:23 RADIUS: starting accounting session 410E1B5E02344070
Wed Sep 20 18:17:25 2023 daemon.info hostapd: phy1-ap0: STA 5c:3a:45:db:8a:23 WPA: pairwise key handshake completed (RSN)
Wed Sep 20 18:17:25 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 5c:3a:45:db:8a:23
Wed Sep 20 18:17:25 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.231 5c:3a:45:db:8a:23
Wed Sep 20 18:17:25 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.231 5c:3a:45:db:8a:23 DESKTOP-CIMQNLR
Wed Sep 20 18:17:25 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:17:25 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:17:26 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:17:29 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:17:33 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:18:02 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:18:02 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:18:02 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:18:06 2023 daemon.info hostapd: phy1-ap0: STA 08:12:a5:a7:9b:c8 IEEE 802.11: authenticated
Wed Sep 20 18:18:06 2023 daemon.info hostapd: phy1-ap0: STA 08:12:a5:a7:9b:c8 IEEE 802.11: associated (aid 3)
Wed Sep 20 18:18:06 2023 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 08:12:a5:a7:9b:c8 auth_alg=open
Wed Sep 20 18:18:06 2023 daemon.info hostapd: phy1-ap0: STA 08:12:a5:a7:9b:c8 RADIUS: starting accounting session 6D90453F86A2C656
Wed Sep 20 18:18:06 2023 daemon.info hostapd: phy1-ap0: STA 08:12:a5:a7:9b:c8 WPA: pairwise key handshake completed (RSN)
Wed Sep 20 18:18:06 2023 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 08:12:a5:a7:9b:c8
Wed Sep 20 18:18:07 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 08:12:a5:a7:9b:c8
Wed Sep 20 18:18:07 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.155 08:12:a5:a7:9b:c8
Wed Sep 20 18:18:07 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.155 08:12:a5:a7:9b:c8
Wed Sep 20 18:18:07 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.155 08:12:a5:a7:9b:c8
Wed Sep 20 18:18:08 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:18:08 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:19:13 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:19:13 2023 daemon.warn dnsmasq[8395]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:19:42 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:19:43 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:19:59 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 18:19:59 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 18:20:02 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:20:03 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:21:31 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:23:38 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.110 20:7b:d2:a2:b5:6e
Wed Sep 20 18:23:38 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.110 20:7b:d2:a2:b5:6e DESKTOP-CIMQNLR
Wed Sep 20 18:23:38 2023 daemon.err hostapd: ndisc_snoop: Adding ip neigh failed: -7
Wed Sep 20 18:23:38 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:23:39 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Wed Sep 20 18:23:39 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 6 names
Wed Sep 20 18:23:39 2023 daemon.info dnsmasq[1]: read /tmp/hosts/odhcpd - 6 names
Wed Sep 20 18:23:39 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Wed Sep 20 18:23:42 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:23:46 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:23:59 2023 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 5c:3a:45:db:8a:23
Wed Sep 20 18:23:59 2023 daemon.info hostapd: phy1-ap0: STA 5c:3a:45:db:8a:23 IEEE 802.11: disassociated
Wed Sep 20 18:24:00 2023 daemon.info hostapd: phy1-ap0: STA 5c:3a:45:db:8a:23 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Sep 20 18:24:35 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:25:00 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan.1) 5c:c3:36:24:52:3f
Wed Sep 20 18:25:00 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan.1) 192.168.21.40 5c:c3:36:24:52:3f
Wed Sep 20 18:25:46 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:25:46 2023 daemon.warn dnsmasq[8452]: possible DNS-rebind attack detected: dns.msftncsi.com
Wed Sep 20 18:26:35 2023 daemon.warn odhcpd[2508]: A default route is present but there is no public prefix on lan thus we don't announce a default route by overriding ra_lifetime!
Wed Sep 20 18:26:54 2023 daemon.notice hostapd: phy1-ap0: AP-STA-POLL-OK 08:12:a5:a7:9b:c8
Wed Sep 20 18:27:01 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan.1) 192.168.21.101 9e:5d:5b:cc:37:50
Wed Sep 20 18:27:01 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan.1) 192.168.21.101 9e:5d:5b:cc:37:50 Pixel-7-Pro

Kernel Log

0x10000000
[   10.608820] ath: EEPROM regdomain: 0x0
[   10.608830] ath: EEPROM indicates default country code should be used
[   10.608833] ath: doing EEPROM country->regdmn map search
[   10.608837] ath: country maps to regdmn code: 0x3a
[   10.608841] ath: Country alpha2 being used: US
[   10.608844] ath: Regpair used: 0x3a
[   10.624548] ath11k c000000.wifi: ipq8074 hw2.0
[   10.624588] ath11k c000000.wifi: FW memory mode: 1
[   10.628259] remoteproc remoteproc0: powering up cd00000.q6v5_wcss
[   10.636921] remoteproc remoteproc0: Booting fw image IPQ8074/q6_fw.mdt, size 668
[   11.511531] remoteproc remoteproc0: remote processor cd00000.q6v5_wcss is now up
[   11.536737] batman_adv: B.A.T.M.A.N. advanced 2023.2-openwrt-2 (compatibility version 15) loaded
[   11.538962] kmodloader: done loading kernel modules from /etc/modules.d/*
[   11.555784] ath11k c000000.wifi: qmi ignore invalid mem req type 3
[   11.563207] ath11k c000000.wifi: chip_id 0x0 chip_family 0x0 board_id 0xff soc_id 0xffffffff
[   11.563248] ath11k c000000.wifi: fw_version 0x290104a5 fw_build_timestamp 2023-08-02 20:32 fw_build_id WLAN.HK.2.9.0.1-01890-QCAHKSWPL_SILICONZ-1
[   11.769372] ath11k c000000.wifi: htt event 48 not handled
[   13.798797] ECM init
[   13.798904] ECM database jhash random seed: 0x566b5ece
[   13.813007] ECM init complete
[   15.078473] br-lan: port 1(lan1) entered blocking state
[   15.078520] br-lan: port 1(lan1) entered disabled state
[   15.083176] device lan1 entered promiscuous mode
[   15.091738] nss_vlan_mgr_create_instance[714]:br-lan: 28 is not valid physical port
[   15.097738] nss_vlan_mgr_create_instance[714]:br-lan: 28 is not valid physical port
[   15.110393] br-lan: port 2(lan2) entered blocking state
[   15.110458] br-lan: port 2(lan2) entered disabled state
[   15.115484] device lan2 entered promiscuous mode
[   15.128121] br-lan: port 3(lan3) entered blocking state
[   15.128187] br-lan: port 3(lan3) entered disabled state
[   15.132798] device lan3 entered promiscuous mode
[   15.487665] 8021q: adding VLAN 0 to HW filter on device bat0
[   15.488468] nss_vlan_mgr_create_instance[714]:bat0: -1 is not valid physical port
[   15.497218] br-lan: port 4(bat0.1) entered blocking state
[   15.499992] br-lan: port 4(bat0.1) entered disabled state
[   15.505681] device bat0.1 entered promiscuous mode
[   15.510725] device bat0 entered promiscuous mode
[   15.515722] br-lan: port 4(bat0.1) entered blocking state
[   15.520047] br-lan: port 4(bat0.1) entered listening state
[   15.527447] nss_vlan_mgr_create_instance[714]:bat0: -1 is not valid physical port
[   15.532690] br-lan: port 5(bat0.2) entered blocking state
[   15.538336] br-lan: port 5(bat0.2) entered disabled state
[   15.544625] device bat0.2 entered promiscuous mode
[   15.549395] br-lan: port 5(bat0.2) entered blocking state
[   15.553762] br-lan: port 5(bat0.2) entered listening state
[   15.592844] ath: EEPROM regdomain: 0x824f
[   15.592998] ath: EEPROM indicates we should expect a country code
[   15.596004] ath: doing EEPROM country->regdmn map search
[   15.602649] ath: country maps to regdmn code: 0x10
[   15.607457] ath: Country alpha2 being used: PA
[   15.612188] ath: Regpair used: 0x10
[   15.616581] ath: regdomain 0x824f dynamically updated by user
[   17.320155] ath11k c000000.wifi phy1-ap0: renamed from wlan1
[   17.359443] br-lan: port 6(phy1-ap0) entered blocking state
[   17.359492] br-lan: port 6(phy1-ap0) entered disabled state
[   17.364557] device phy1-ap0 entered promiscuous mode
[   17.393706] br-lan: port 6(phy1-ap0) entered blocking state
[   17.393761] br-lan: port 6(phy1-ap0) entered listening state
[   17.398745] br-lan: port 6(phy1-ap0) entered disabled state
[   17.888112] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap0: link becomes ready
[   17.888404] br-lan: port 6(phy1-ap0) entered blocking state
[   17.893607] br-lan: port 6(phy1-ap0) entered listening state
[   18.047675] ath11k c000000.wifi phy2-ap0: renamed from wlan2
[   18.070221] br-lan: port 7(phy2-ap0) entered blocking state
[   18.070273] br-lan: port 7(phy2-ap0) entered disabled state
[   18.075628] device phy2-ap0 entered promiscuous mode
[   18.081677] br-lan: port 7(phy2-ap0) entered blocking state
[   18.085435] br-lan: port 7(phy2-ap0) entered listening state
[   18.144704] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
[   18.145706] br-lan: port 1(lan1) entered blocking state
[   18.149493] br-lan: port 1(lan1) entered listening state
[   18.208522] nss-dp 3a001800.dp5 lan3: PHY Link up speed: 1000
[   18.208975] br-lan: port 3(lan3) entered blocking state
[   18.213297] br-lan: port 3(lan3) entered listening state
[   18.286071] IPv6: ADDRCONF(NETDEV_CHANGE): phy2-ap0: link becomes ready
[   18.309922] br-lan: port 8(phy2-ap1) entered blocking state
[   18.309978] br-lan: port 8(phy2-ap1) entered disabled state
[   18.314957] device phy2-ap1 entered promiscuous mode
[   18.322005] br-lan: port 8(phy2-ap1) entered blocking state
[   18.325106] br-lan: port 8(phy2-ap1) entered listening state
[   18.400439] br-lan: port 8(phy2-ap1) entered disabled state
[   18.401071] IPv6: ADDRCONF(NETDEV_CHANGE): phy2-ap1: link becomes ready
[   18.405256] nss-dp 3a001200.dp2 wan: PHY Link up speed: 1000
[   18.405533] br-lan: port 8(phy2-ap1) entered blocking state
[   18.417354] br-lan: port 8(phy2-ap1) entered listening state
[   18.423811] IPv6: ADDRCONF(NETDEV_CHANGE): wan: link becomes ready
[   18.457757] br-lan: port 9(phy2-ap2) entered blocking state
[   18.457809] br-lan: port 9(phy2-ap2) entered disabled state
[   18.463069] device phy2-ap2 entered promiscuous mode
[   18.471718] br-lan: port 9(phy2-ap2) entered blocking state
[   18.472941] br-lan: port 9(phy2-ap2) entered listening state
[   18.509961] IPv6: ADDRCONF(NETDEV_CHANGE): phy2-ap2: link becomes ready
[   19.233147] nss-dp 3a001600.dp4 lan2: PHY Link up speed: 1000
[   19.233327] br-lan: port 2(lan2) entered blocking state
[   19.237945] br-lan: port 2(lan2) entered listening state
[   20.836116] IPv6: ADDRCONF(NETDEV_CHANGE): m-11s-0: link becomes ready
[   20.867694] batman_adv: bat0: Adding interface: m-11s-0
[   20.867754] batman_adv: bat0: Interface activated: m-11s-0
[   24.032889] br-lan: port 5(bat0.2) entered learning state
[   24.033060] br-lan: port 4(bat0.1) entered learning state
[   26.079888] br-lan: port 6(phy1-ap0) entered learning state
[   26.591888] br-lan: port 9(phy2-ap2) entered learning state
[   26.592055] br-lan: port 7(phy2-ap0) entered learning state
[   26.596371] br-lan: port 8(phy2-ap1) entered learning state
[   26.601910] br-lan: port 3(lan3) entered learning state
[   26.607452] br-lan: port 1(lan1) entered learning state
[   27.615889] br-lan: port 2(lan2) entered learning state
[   32.223762] br-lan: port 4(bat0.1) entered forwarding state
[   32.223817] br-lan: topology change detected, propagating
[   32.228272] br-lan: port 5(bat0.2) entered forwarding state
[   32.233713] br-lan: topology change detected, propagating
[   32.239419] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan.1: link becomes ready
[   32.244965] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan.2: link becomes ready
[   33.247818] l11: disabling
[   34.271737] br-lan: port 6(phy1-ap0) entered forwarding state
[   34.271799] br-lan: topology change detected, propagating
[   34.783729] br-lan: port 1(lan1) entered forwarding state

I also use same firmware but no see any issue with lan, playing game and my nas work well using lan, no issue.
Check your lan cable and connector if need replace the rj45 conector

No, the hardware is fine. I have since tried RC3 and Snapshot out of desperation. There the problem with the LAN does not appear. Fortunately, luci-app-nlbwmon also works there. But they have problems with not working wlan (https://github.com/openwrt/openwrt/issues/13492), which I could get to run by a customization in the source code, but mesh still does not work here. So I have to try it again in a few days, or switch back again. I can't compile myself and have to rely on ready-made firmware packages and hope that they work (which Snapshot and RC3 annoyingly don't).

If it works for you, then something must be wrong in my config. Can you see anything in my posted log files that indicates an error?

I not advance tech guy, so sry can't help more.

Okay, thanks anyway.

Hi boys,

I am back to the jungle with new version based in kernel 6.1 with the code of @bitthief and some tweaks.

Changelog:

  • Rebased my repos over the repo of @bitthief
  • Downgrade the ath11k-firmware to 1385

Notes:

  • By default, the radio0 (IoT) is off and the radio 1 y 2 is on.
  • The default country code for the wireless is US for avoid issues with the 160 MHZ because not having a specified country code

Sources:

BUILDED: https://github.com/AgustinLorenzo/openwrt/releases/tag/ipq807x-2023-09-21-2109

Sorry for the long wait.

Regards, Agustin

3 Likes

Hi boys (again),

Regarding the SSL failures caused by NSS, at least in my connection that uses PPPoE, if on the interface (pppoe-wan) I force an MTU of 1480 (just like MiWiFi does by default) the failure disappears.

Can you try it and tell me?

Regards, Agustin

1 Like

Does this build have traffic shaping like sqm or tc-* packages? Thank you.

Why do I get an error when I use your repository?


How to download the missing nss_cryptoapi.h file?

Has anyone tried the latest build? I am getting proxy errors and DHCP is not working.

Did you try here: https://github.com/AgustinLorenzo/nss-packages

No, it does not.

Have you tried dimfish's tc-* packages did it work?

Hi @juliank

This is a known issue, put IP in your interface wired or wireless: 192.168.1.100, enter with SSH client to 192.168.1.1 and put this:

uci set dhcp.lan.ignore=0
uci commit
service dnsmasq restart

and the issue with the DHCP is fixed

I don't know what is causing DHCP to be deactivated by default, even appearing in LUCI as active but if you look at UCI it appears deactivated

Regards, Agustin

1 Like

No, I have not tried it because of reasons.

Hi boys,

I am releasing a new version of the build based in the code of @bitthief and some tweaks.

Changelog:

  • Updated kernel and NSS code to 6.1.54
  • Updated ath11k-firmware to 1890

Notes:

Sources:

BUILDED: https://github.com/AgustinLorenzo/openwrt/releases/tag/ipq807x-2023-09-23-1933

Regards, Agustin

2 Likes