Kong pro firmware for IPQ806x (R7500, R7800, EA8500, ...)

@KONG

Hello, I am currently using the "R7800-20240115-Stable2305NSS-sysupgrade.bin" from ACwifidude. Unfortunately, he has not yet released a new build for 23.05.3 and he will probably change his main router - probably the motivation for new builds is now missing.

Can I upgrade to "23.05/ipq806x-nss/kong-ipq806x-generic-netgear_r7800-squashfs-sysupgrade.bin" without any problems? Or do I have to pay attention to anything?

I have nothing special, a few firewall rules, OpenVPN server, DDNS alias, separate guest WLAN and Internet via PPPOE dial-up.

Greetings Nico

You can just upgrade, the core is absolutely identical. The only difference is, that I ship my dark theme and a different set of included apps. Openvpn,DDNS,PPPOE is among the included apps, thus you don't even have to use opkg to install anything after flashing.

1 Like

Hello, I like to install the openclash plugin, but the dependencies of your plugin( Index of /openwrt/repo/nss23/targets/ipq806x/generic/packages (desipro.de) kmod-inet-diag and kmod-nft-tproxy, ruby, ruby-yaml are not there, and the installation of the official ( [Index of /releases/23.05-SNAPSHOT/targets/ipq806x/generic/packages/ (openwrt.org)](https://downloads.openwrt.org/releases/23.05-SNAPSHOT/targets/ipq806x/generic/packages)prompt kernel is different
,I hope the big guy will update the plugin library.

@KONG Installed your latest (non-nss) stadard build on R7800 (8th of April) - classic sysupgrade, keeping settings. I had nothing special configured (guest lan which redirects to wireguard via pbr) so standard config, done from scratch begining of this year.

All fine - but I am getting below spam in SYSTEM log (kernel log looks fine):

It just continues every minute or so. Not sure if previously it was the same - cannot remember. I am upgrading regurarly and don't remember seeing this in Jan/Feb.

Thanks for looking into this - your firmware is literally stellar.

Karol

Why don't you just disable igmpproxy? In case you don't use it of course.

I actually already thought about removing it from the build adding it as installable pkg.
Anyone here actually using it?

Thank you sir! It helped, no more log spam!

I run as vanilla configuration of Kong build as possible (nothing installed, nothing disabled or removed) for few years now - speaking of which, owing big deal to Kong!. This is to mitigate any problems and - because I am not-technical in this space, more of a newbie.

This was also feedback of a Kong (non-nss) build - not to spam System log output as this behaviour is present by default and I think it has happened just recently. So my config:

System-->Startup-->Disable (and reboot afterwards)

  • igmpproxy
  • openvpn
  • ddns

I used to have openvpn and ddns disabled but any new flash enables them back. Not sure what else is safe to disable and/or even uninstall. In my case, not planning VPN server or OpenVPN, thus they are disabled as well.

Karol

I honestly didn't know what it was (quick google showed usage for IP TV) - so if it's not required by any other critical components remove it please. If it provides super useful feature than keep it and just fix the log spam. Thanks for your firmware @KONG!

I have seen you've updated NSS branch twice in last two days, any update to the non-nss one or not really required? I am still in doubt of going cutting edge to NSS branch on this router - so rather keep things as stable as.

Another question - which WiFi6/7 router do you think will replace R7800 in its legendary status? Sadly (or luckily?) I can only purchase router you will support :wink:

I can strongly recommend NSS build.

No change in the last two nss builds except adding new packages. Thus no need to update.

My favorite would be the qnap, but it is expensive. The Armor G5 I use for testing was 60€ on ebay:-) The qnap has no fan and has more leds, easy to add a 3.5 jack for serial connection.

I have noticed that there no packages for nlbwmon in the NSS build. Has it been replaced with something else?

‘Promiscuous mode’ worked fine on 23877-7b51801c68 but doesn't seem to work on recent versions.

1 Like

I just ran tcpdump -i br-lan, it works for me:

[69271.172762] device br-lan entered promiscuous mode
[69273.363342] device br-lan left promiscuous mode

For the last few builds I’ve been having 2.4ghz problems but wasn’
t with enough time to explore. I’ve updated to the latest build two days ago and now most of my IoT devices are getting dropped and log shows lots of IEEE 802.11: did not acknowledge authentication response . I’ve restored default settings, loaded my backup with vanilla wireless settings but still having errors. Any clues on how to fix this?

I solved it by enabling: Network>Wireless>edit> "Allow legacy 802.11b rates"

1 Like

I installed the aforementioned NSS build from KONG's nss dir (KONG 23 r0+23920-af78dfb207 / LuCI openwrt-23.05 branch git-24.086.45142-09d5a38)

Does it support NSS-accelerated QoS, like ACWifiDude's build? If so, how do I configure it?

1 Like

I'm on the latest Kong firmware, is there a setup I have to do to achive the best speed for wifi?

My 5g signal is a bit weak, so I bough an RE300 extender but the speeds are very different. Any advice?

Unfortunately didn't work. I've also disabled disassociating on low ack, still not working. It seems to improve the disconnection interval after reboot, but after some hours it's back to every other minute.

On a fresh install with default settings it works okay for 1 day, then starts again.

This is what my log shows:

Fri Jun  7 17:54:41 2024 daemon.info hostapd: phy1-ap0: STA ec:fa:bc:7c:72:8e WPA: pairwise key handshake completed (RSN)
Fri Jun  7 17:54:41 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ec:fa:bc:7c:72:8e
Fri Jun  7 17:54:42 2024 daemon.info dnsmasq-dhcp[11052]: DHCPDISCOVER(br-lan) ec:fa:bc:7c:72:8e
Fri Jun  7 17:54:42 2024 daemon.info dnsmasq-dhcp[11052]: DHCPOFFER(br-lan) 192.168.1.210 ec:fa:bc:7c:72:8e
Fri Jun  7 17:54:46 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ec:fa:bc:7c:72:8e
Fri Jun  7 17:54:46 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED c8:2b:96:04:bd:1a
Fri Jun  7 17:54:47 2024 daemon.notice hostapd: phy1-ap0: STA ec:fa:bc:7c:72:8e IEEE 802.11: did not acknowledge authentication response
Fri Jun  7 17:54:47 2024 daemon.info hostapd: phy1-ap0: STA c8:2b:96:04:bd:1a IEEE 802.11: authenticated
Fri Jun  7 17:54:47 2024 daemon.info hostapd: phy1-ap0: STA c8:2b:96:04:bd:1a IEEE 802.11: associated (aid 7)
Fri Jun  7 17:54:56 2024 daemon.info hostapd: phy1-ap0: STA c8:2b:96:04:bd:1a IEEE 802.11: deauthenticated due to local deauth request
Fri Jun  7 17:55:12 2024 daemon.info hostapd: phy1-ap0: STA ec:fa:bc:7c:72:8e IEEE 802.11: authenticated
Fri Jun  7 17:55:12 2024 daemon.info hostapd: phy1-ap0: STA ec:fa:bc:7c:72:8e IEEE 802.11: associated (aid 4)
Fri Jun  7 17:55:21 2024 daemon.info hostapd: phy1-ap0: STA ec:fa:bc:7c:72:8e IEEE 802.11: deauthenticated due to local deauth request
Fri Jun  7 17:55:23 2024 daemon.info hostapd: phy1-ap0: STA c8:2b:96:04:bd:1a IEEE 802.11: authenticated

The problem is with 7 clients (IR Hubs, ESP32 and Samsung Washer and Refrigerator)

Edit: before May 27th everything was working fine, and restoring settings from dates before that doesn't seem to make things any better. I've checked here and I've updated on May 9th to the current KONG version at that time

Edit2: Just found out that system clock was losing sync from NTP servers/browser sync. I've resynced and got the following kernel error:

[   66.024137] br-lan: port 3(phy0-ap0) entered forwarding state
[  676.957838] ath10k_pci 0001:01:00.0: failed to flush transmit queue (skip 0 ar-state 1): 0
[  797.598971] ath10k_pci 0001:01:00.0: failed to flush transmit queue (skip 0 ar-state 1): 0
[ 1140.077592] ath10k_pci 0001:01:00.0: failed to flush transmit queue (skip 0 ar-state 1): 0
[ 1311.187312] rcu: INFO: rcu_sched detected stalls on CPUs/tasks:
[ 1311.187349] rcu: 	0-...!: (0 ticks this GP) idle=478/0/0x0 softirq=33440/33440 fqs=0  (false positive?)
[ 1311.192042] 	(detected by 1, t=2102 jiffies, g=53989, q=477)
[ 1311.201413] Sending NMI from CPU 1 to CPUs 0:
[ 1311.207319] NMI backtrace for cpu 0
[ 1311.207325] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.158 #0
[ 1311.207331] Hardware name: Generic DT based system
[ 1311.207333] PC is at arch_cpu_idle+0x38/0x3c
[ 1311.207347] LR is at arch_cpu_idle+0x34/0x3c
[ 1311.207353] pc : [<c03071dc>]    lr : [<c03071d8>]    psr: 60000013
[ 1311.207357] sp : c0d01f60  ip : de80400c  fp : c0d04f98
[ 1311.207359] r10: c0d04f08  r9 : ffffe000  r8 : 00000000
[ 1311.207362] r7 : 00000000  r6 : c0d00000  r5 : c0d04f68  r4 : 00000000
[ 1311.207365] r3 : c0316a00  r2 : 00000001  r1 : 00000000  r0 : 00bf6530
[ 1311.207368] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment none
[ 1311.207373] Control: 10c5787d  Table: 45e8c06a  DAC: 00000051
[ 1311.207376] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.158 #0
[ 1311.207380] Hardware name: Generic DT based system
[ 1311.207387] [<c030ddd8>] (unwind_backtrace) from [<c0309d28>] (show_stack+0x10/0x14)
[ 1311.207400] [<c0309d28>] (show_stack) from [<c05eb0a4>] (dump_stack_lvl+0x40/0x4c)
[ 1311.207415] [<c05eb0a4>] (dump_stack_lvl) from [<c05f295c>] (nmi_cpu_backtrace+0xc4/0x110)
[ 1311.207427] [<c05f295c>] (nmi_cpu_backtrace) from [<c030c698>] (do_handle_IPI+0x5c/0x12c)
[ 1311.207437] [<c030c698>] (do_handle_IPI) from [<c030c780>] (ipi_handler+0x18/0x20)
[ 1311.207445] [<c030c780>] (ipi_handler) from [<c0370df0>] (handle_percpu_devid_irq+0x78/0x13c)
[ 1311.207457] [<c0370df0>] (handle_percpu_devid_irq) from [<c036afe4>] (handle_domain_irq+0x5c/0x78)
[ 1311.207471] [<c036afe4>] (handle_domain_irq) from [<c03012e4>] (gic_handle_irq+0x7c/0x90)
[ 1311.207482] [<c03012e4>] (gic_handle_irq) from [<c0300b7c>] (__irq_svc+0x5c/0x78)
[ 1311.207491] Exception stack(0xc0d01f10 to 0xc0d01f58)
[ 1311.207496] 1f00:                                     00bf6530 00000000 00000001 c0316a00
[ 1311.207500] 1f20: 00000000 c0d04f68 c0d00000 00000000 00000000 ffffe000 c0d04f08 c0d04f98
[ 1311.207504] 1f40: de80400c c0d01f60 c03071d8 c03071dc 60000013 ffffffff
[ 1311.207507] [<c0300b7c>] (__irq_svc) from [<c03071dc>] (arch_cpu_idle+0x38/0x3c)
[ 1311.207517] [<c03071dc>] (arch_cpu_idle) from [<c034f3e0>] (do_idle+0x23c/0x29c)
[ 1311.207534] [<c034f3e0>] (do_idle) from [<c034f744>] (cpu_startup_entry+0x18/0x1c)
[ 1311.207545] [<c034f744>] (cpu_startup_entry) from [<c0c011a0>] (start_kernel+0x6b4/0x6c4)
[ 1311.208316] rcu: rcu_sched kthread timer wakeup didn't happen for 2103 jiffies! g53989 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402
[ 1311.418521] rcu: 	Possible timer handling issue on cpu=0 timer-softirq=23471

This has been around for some months:
Hidden rcu stalls, outright resets

I've dropped to 22.03 ath10k-ct NSS but still having log errors and those clients dropping. Any suggestions for a stable build for a R7800? I've been quite behind all the discussion.

Sat Jun  8 00:08:49 2024 kern.info kernel: [  417.720116] ath10k_pci 0001:01:00.0: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0  arvif->paused: 0x0