OpenWrt 19.07.0 first release candidate

TP-Link Archer C7 V2 -

Wireless lights on router off.

Static IP's all marked as expired.

1 Like

19.07.0-rc1: Swap doesn't work on D-Link DIR-620 D1 (ramips/rt305x)

Awesome update.

Question––is it now "safe" to run opkg upgrade, or at least upgrade all these packages in LuCI?

I would not assume that it is safe to run opkg upgrade -- AFAIK, the system still doesn't have compatibility checks that would notify/prevent/upgrade-dependencies, so things may still break.

My general advice is to only perform your upgrades by means of flashing a new build (release, snapshot, etc.). If there is a new feature or bug fix that you must have sooner than it would otherwise be included in an official build, it is probably best to ensure you have a good backup and then run the upgrade only for the specific package(s) in question. If something breaks, you can always reset to defaults and restore your backup.

1 Like

i need none of the new features but look forward to flashing it anyway once its finalized

Please add this patch to make work extroot on Zyxel Armor Z2 (NBG6817).
It perfect work for me on the current master now.

There is a theme about it.

1 Like

Well... possibly add something similar.... generified.... handling UBIFS only in release would be premature IMHO.

1 Like

Now it work corrects except mounting extroot.

System on boot searching fstab file in wrong place on this router: /etc/config/fstab instead of /tmp/overlay/upper/etc/config/fsab and doesn't find. For this reason extroot doesn't automatic mount at boot.

I can connect by ssh after boot and mount it by hand, but not as /overlay.

This patch solve auto mount problem.

It would be great to add it at least to the master (now it perfect working on master) and after that back port it to the current release.

why no more squashfs for 'tiny' branch, only initramfs ?

Hey!

Any ETA when all packages will be made available for installation ? I have tried to install a couple of packages for my Linksys WRT3200ACM but i am getting the below error message:

Collected errors:

I have tried to run opkg update but that did not work, it looks like a lot of packages are missing. The "Advance Reboot" is also missing from the package source.

Thank you!

Update Never mind, everything is working fine now :smile:

BT HumeHub5a upgrade from 18.06.5 to 19.07.0-rc1.

Success, it looks like I needed to add option proto 'none' to my definition of the VDSL-to-ethernet bridge and/or change the modem firmeware to a more modern version. But after doing both the upgrade seems to work just fine.

On Netgear R7800 it seems that AC 160Mhz still doesn't work, but this time I wasn't able to get wireless working again by switching back from 160Mhz mode. Had to factory reset.

No AC wifi by default on Archer C7 as reported here

Upgraded my R7800 using the sysupgrade file. Works perfectly. All devices are connecting. WPA3 support is working on a Pixel 3 and iPhone 8. I cannot connect my Linux laptop via WPA-3 though. WPA-2 works.

I don't see any benefits from the switch from ath10k to the "-CT" out-of-tree driver... Should I?

While slightly beyond topic, desktop linux (depending on the wireless card/ driver; not all support IEEE 802.11w, which is mandatory for WPA3) should be the easiest to configure as WPA3/ SAE client.

ctrl_interface=/run/wpa_supplicant
ctrl_interface_group=netdev
pmf=2

network={
        priority=50
        ssid="yourssid"
        id_str="some identifier"
        key_mgmt=SAE
        proto=WPA2
        pairwise=CCMP
        group=CCMP
        ieee80211w=2
        psk="secret01"
}

should work, provided you have a recent wpa_supplicant (>=v2.7, better >=v2.8) installed and are running a kernel >=v3.8.

Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.

Reference:

Otherwise built okay and tested on an ipq8064 system.

1 Like

FYI, from the original post Any outstanding issues reported at https://bugs.openwrt.org/

Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.

OpenWrt is actually using Debian 9 as a base for the images used by the build bots (used for building all the images and packages) and there's python2 and python3 installed as well. It works, no issue visible.

1 Like

I upgraded yesterday from 19.07-SNAPSHOT and experienced errors today on my Archer C7 v2 router and access point (2 devices). They are configured to use Band Steering and fast roaming between all 4 Wi-Fis (router 2.4G & 5G and AP 2.4G & 5G)

I removed wpad-basic and installed hostapd-openssl and wpa-supplicant-openssl.

Here are some errors I found in System Log:

router
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 3 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5540 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5550 cf2=0
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5620 chan=124 sec_chan=1
Mon Nov 11 14:25:23 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.186254] device wlan0 left promiscuous mode
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.191501] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:23 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:25:24 2019 kern.warn kernel: [75176.377944] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.394810] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.401254] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.409433] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:25:25 2019 kern.warn kernel: [75176.472893] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.487625] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.497606] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.503033] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.508737] device wlan0 entered promiscuous mode
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5620 chan=124 sec_chan=1, width=0, seg0=126, seg1=0, cac_time=60s
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: DFS-CAC-COMPLETED success=1 freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:26:29 2019 daemon.err hostapd: Using interface wlan0 with hwaddr SATINIZED_MAC and ssid "Olivenbaum"
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.719063] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.725810] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.731223] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 11 14:26:29 2019 daemon.notice netifd: Network device 'wlan0' link is up
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: interface state DFS->ENABLED
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: AP-ENABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5660 chan=132 sec_chan=1
Mon Nov 11 14:27:49 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:27:49 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.697934] device wlan0 left promiscuous mode
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.702763] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.887321] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.904169] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.910532] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.918704] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.982970] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.997679] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.007510] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.012998] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.018664] device wlan0 entered promiscuous mode
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5660 chan=132 sec_chan=1, width=0, seg0=134, seg1=0, cac_time=60s
Mon Nov 11 14:28:09 2019 daemon.err uhttpd[1253]: luci: accepted login on / for root from 10.8.0.1
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPREQUEST(br-lan) 10.1.2.69 SATINIZED_MAC
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPACK(br-lan) 10.1.2.69 SATINIZED_MAC SATINIZED_HOSTNAME
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
AP
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:24:52 2019 daemon.notice hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: did not acknowledge authentication response
Mon Nov 11 14:24:54 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:07 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:15 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:17 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:21 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:25 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:38 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:48 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:04 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:25 2019 daemon.err uhttpd[1220]: luci: accepted login on / for root from 10.8.0.1

any further questions and comments are welcome.

Is the AP also detecting radar? I see radar was detected on channels 104 and 124. If there really is radar there, don't use channels in that area of the band for your initial configuration.

In ath10k when you're running a STA and an AP on the same radio you must explicitly set the channel to the one that the STA is connecting to, or the AP will not come up. This becomes a big problem when DFS forces a new channel.

Everything is in AP mode. The AP is connected via LAN to the router.

root@router:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11a'
wireless.radio0.path='pci0000:01/0000:01:00.0'
wireless.radio0.htmode='VHT40'
wireless.radio0.country='DE'
wireless.radio0.legacy_rates='0'
wireless.radio0.distance='15'
wireless.radio0.channel='108'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.key='SATINIZED'
wireless.default_radio0.ssid='Olivenbaum'
wireless.default_radio0.ieee80211r='1'
wireless.default_radio0.nasid='SATINIZED'
wireless.default_radio0.mobility_domain='SATINIZED'
wireless.default_radio0.ft_over_ds='1'
wireless.default_radio0.ft_psk_generate_local='1'
wireless.default_radio0.r1_key_holder='SATINIZED'
wireless.default_radio0.pmk_r1_push='1'
wireless.default_radio0.ieee80211w='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.hwmode='11g'
wireless.radio1.path='platform/qca955x_wmac'
wireless.radio1.channel='8'
wireless.radio1.htmode='HT40'
wireless.radio1.country='DE'
wireless.radio1.legacy_rates='0'
wireless.radio1.distance='auto'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.encryption='psk2+ccmp'
wireless.default_radio1.key='SATINIZED'
wireless.default_radio1.ssid='Olivenbaum'
wireless.default_radio1.ieee80211r='1'
wireless.default_radio1.nasid='SATINIZED'
wireless.default_radio1.mobility_domain='SATINIZED'
wireless.default_radio1.ft_over_ds='1'
wireless.default_radio1.ft_psk_generate_local='1'
wireless.default_radio1.r1_key_holder='SATINIZED'
wireless.default_radio1.pmk_r1_push='1'
wireless.default_radio1.ieee80211w='1'
root@AP:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11a'
wireless.radio0.path='pci0000:01/0000:01:00.0'
wireless.radio0.htmode='VHT40'
wireless.radio0.country='DE'
wireless.radio0.legacy_rates='0'
wireless.radio0.distance='15'
wireless.radio0.channel='128'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.key='SATINIZED'
wireless.default_radio0.ieee80211r='1'
wireless.default_radio0.mobility_domain='SATINIZED'
wireless.default_radio0.ft_over_ds='1'
wireless.default_radio0.ft_psk_generate_local='1'
wireless.default_radio0.pmk_r1_push='1'
wireless.default_radio0.ssid='Olivenbaum'
wireless.default_radio0.nasid='SATINIZED'
wireless.default_radio0.r1_key_holder='SATINIZED'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.ieee80211w='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.hwmode='11g'
wireless.radio1.path='platform/qca955x_wmac'
wireless.radio1.channel='3'
wireless.radio1.htmode='HT40'
wireless.radio1.country='DE'
wireless.radio1.legacy_rates='0'
wireless.radio1.distance='auto'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.ssid='Olivenbaum'
wireless.default_radio1.key='SATINIZED'
wireless.default_radio1.ieee80211r='1'
wireless.default_radio1.nasid='SATINIZED'
wireless.default_radio1.mobility_domain='SATINIZED'
wireless.default_radio1.ft_over_ds='1'
wireless.default_radio1.ft_psk_generate_local='1'
wireless.default_radio1.r1_key_holder='SATINIZED'
wireless.default_radio1.pmk_r1_push='1'
wireless.default_radio1.encryption='psk2+ccmp'
wireless.default_radio1.ieee80211w='1'

I switched to non DFS channels for now but they are more crowded. :frowning:

Is there something wrong with my configuration?