OpenWrt 19.07.0 first release candidate

FYI, from the original post Any outstanding issues reported at https://bugs.openwrt.org/

Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.

OpenWrt is actually using Debian 9 as a base for the images used by the build bots (used for building all the images and packages) and there's python2 and python3 installed as well. It works, no issue visible.

1 Like

I upgraded yesterday from 19.07-SNAPSHOT and experienced errors today on my Archer C7 v2 router and access point (2 devices). They are configured to use Band Steering and fast roaming between all 4 Wi-Fis (router 2.4G & 5G and AP 2.4G & 5G)

I removed wpad-basic and installed hostapd-openssl and wpa-supplicant-openssl.

Here are some errors I found in System Log:

router
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 3 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5540 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5550 cf2=0
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5620 chan=124 sec_chan=1
Mon Nov 11 14:25:23 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.186254] device wlan0 left promiscuous mode
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.191501] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:23 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:25:24 2019 kern.warn kernel: [75176.377944] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.394810] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.401254] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.409433] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:25:25 2019 kern.warn kernel: [75176.472893] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.487625] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.497606] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.503033] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.508737] device wlan0 entered promiscuous mode
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5620 chan=124 sec_chan=1, width=0, seg0=126, seg1=0, cac_time=60s
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: DFS-CAC-COMPLETED success=1 freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:26:29 2019 daemon.err hostapd: Using interface wlan0 with hwaddr SATINIZED_MAC and ssid "Olivenbaum"
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.719063] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.725810] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.731223] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 11 14:26:29 2019 daemon.notice netifd: Network device 'wlan0' link is up
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: interface state DFS->ENABLED
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: AP-ENABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5660 chan=132 sec_chan=1
Mon Nov 11 14:27:49 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:27:49 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.697934] device wlan0 left promiscuous mode
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.702763] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.887321] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.904169] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.910532] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.918704] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.982970] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.997679] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.007510] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.012998] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.018664] device wlan0 entered promiscuous mode
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5660 chan=132 sec_chan=1, width=0, seg0=134, seg1=0, cac_time=60s
Mon Nov 11 14:28:09 2019 daemon.err uhttpd[1253]: luci: accepted login on / for root from 10.8.0.1
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPREQUEST(br-lan) 10.1.2.69 SATINIZED_MAC
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPACK(br-lan) 10.1.2.69 SATINIZED_MAC SATINIZED_HOSTNAME
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
AP
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:24:52 2019 daemon.notice hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: did not acknowledge authentication response
Mon Nov 11 14:24:54 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:07 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:15 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:17 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:21 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:25 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:38 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:48 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:04 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:25 2019 daemon.err uhttpd[1220]: luci: accepted login on / for root from 10.8.0.1

any further questions and comments are welcome.

Is the AP also detecting radar? I see radar was detected on channels 104 and 124. If there really is radar there, don't use channels in that area of the band for your initial configuration.

In ath10k when you're running a STA and an AP on the same radio you must explicitly set the channel to the one that the STA is connecting to, or the AP will not come up. This becomes a big problem when DFS forces a new channel.

Everything is in AP mode. The AP is connected via LAN to the router.

root@router:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11a'
wireless.radio0.path='pci0000:01/0000:01:00.0'
wireless.radio0.htmode='VHT40'
wireless.radio0.country='DE'
wireless.radio0.legacy_rates='0'
wireless.radio0.distance='15'
wireless.radio0.channel='108'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.key='SATINIZED'
wireless.default_radio0.ssid='Olivenbaum'
wireless.default_radio0.ieee80211r='1'
wireless.default_radio0.nasid='SATINIZED'
wireless.default_radio0.mobility_domain='SATINIZED'
wireless.default_radio0.ft_over_ds='1'
wireless.default_radio0.ft_psk_generate_local='1'
wireless.default_radio0.r1_key_holder='SATINIZED'
wireless.default_radio0.pmk_r1_push='1'
wireless.default_radio0.ieee80211w='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.hwmode='11g'
wireless.radio1.path='platform/qca955x_wmac'
wireless.radio1.channel='8'
wireless.radio1.htmode='HT40'
wireless.radio1.country='DE'
wireless.radio1.legacy_rates='0'
wireless.radio1.distance='auto'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.encryption='psk2+ccmp'
wireless.default_radio1.key='SATINIZED'
wireless.default_radio1.ssid='Olivenbaum'
wireless.default_radio1.ieee80211r='1'
wireless.default_radio1.nasid='SATINIZED'
wireless.default_radio1.mobility_domain='SATINIZED'
wireless.default_radio1.ft_over_ds='1'
wireless.default_radio1.ft_psk_generate_local='1'
wireless.default_radio1.r1_key_holder='SATINIZED'
wireless.default_radio1.pmk_r1_push='1'
wireless.default_radio1.ieee80211w='1'
root@AP:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11a'
wireless.radio0.path='pci0000:01/0000:01:00.0'
wireless.radio0.htmode='VHT40'
wireless.radio0.country='DE'
wireless.radio0.legacy_rates='0'
wireless.radio0.distance='15'
wireless.radio0.channel='128'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.key='SATINIZED'
wireless.default_radio0.ieee80211r='1'
wireless.default_radio0.mobility_domain='SATINIZED'
wireless.default_radio0.ft_over_ds='1'
wireless.default_radio0.ft_psk_generate_local='1'
wireless.default_radio0.pmk_r1_push='1'
wireless.default_radio0.ssid='Olivenbaum'
wireless.default_radio0.nasid='SATINIZED'
wireless.default_radio0.r1_key_holder='SATINIZED'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.ieee80211w='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.hwmode='11g'
wireless.radio1.path='platform/qca955x_wmac'
wireless.radio1.channel='3'
wireless.radio1.htmode='HT40'
wireless.radio1.country='DE'
wireless.radio1.legacy_rates='0'
wireless.radio1.distance='auto'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.ssid='Olivenbaum'
wireless.default_radio1.key='SATINIZED'
wireless.default_radio1.ieee80211r='1'
wireless.default_radio1.nasid='SATINIZED'
wireless.default_radio1.mobility_domain='SATINIZED'
wireless.default_radio1.ft_over_ds='1'
wireless.default_radio1.ft_psk_generate_local='1'
wireless.default_radio1.r1_key_holder='SATINIZED'
wireless.default_radio1.pmk_r1_push='1'
wireless.default_radio1.encryption='psk2+ccmp'
wireless.default_radio1.ieee80211w='1'

I switched to non DFS channels for now but they are more crowded. :frowning:

Is there something wrong with my configuration?

Congrats team and thanks for your hard work! But shouldn't you call it 19.12 at this point? :smiley:

Kernel 4.14 seems a bit dated now, why not bump to 4.19 it's been stable and fast running on mvebu WRT32X.

On R7800 I'm only seeing 15mbps on speedtest.net when connected over 5Ghz WiFi. Wired connection tests over 100mbps. Is anyone else seeing this?

1 Like

so this is 3rd reported issue about ath10k 5GHz speed. show your printscreen of luci wireless overview

Good call. It appears bitrate is 24 Mbits. Edit: That seems unrelated to the problem. Let me know how to collect good information about the problem.

I think that decision has to do with the fact that the 4.14 kernel is supported until 01.2024, where as 4.19 is only supported until 12.2020. see
I.e. Long Term Support

1 Like

4.19 has been “default” on master since right after the branch. A few remaining 4.14 targets are moving over. It can be non-trivial to change kernel versions.

From what I have read on the mailing list, “20.01” will likely be on 4.19, though I haven’t seen a formal decision.

Do not overestimate the validity of those pre-announced EOL dates, those are just the time spans 'guaranteed' in advance. All of those dates for past LTS kernels have been extended at least once, closer to their originally declared expiration. While no one has formally committed to that yet, it's very likely that v4.19[0] will be LTS supported beyond the final/ effective expiration of the v4.14 LTS kernel.

--
[0] Debian 10 'Buster' is shipping with kernel v4.19 and will be supported at least until ~2022, with the LTS efforts probably extending that until 2024. Ben Hutchings as part of the debian-kernel team has taken over maintenance for previous LTS kernels from Greg Kroah-Hartman before - and kept them officially under LTS maintenance on kernel.org for the (extended) durations of Debian's release cycles; it's very likely that he will take over v4.19 as well.

3 Likes

Oh my bad...
For some reason I thought that a few targets that were already on 4.19 were moved back to 4.14 to have a "unified" kernel, and I was trying to make sense of that...
Sorry for the confusion.

I occasionally get this error on the overview screen and can only fix it with a reboot.

1 Like

BT HomeHub 5A in the UK with Plusnet / BT (same). No issues other than DHCP lease times are miss reported i.e. reported as expired even when active (sometimes)

AdBlock and Stubby installed with no issues. Wireless works with no issues.

Shout out to the OpenWrt developers for their hard work. LuCI renders very nicely in Chrome and seams to be a bit quicker. Thanks.

1 Like

The issue with my laptop was a bug in NetworkManager. The 1.20.6 release fixes it and I can connect with WPA3.

I am not seeing any performance problems with 19.07 on my R7800. Getting the same speed I was getting on 18.06.4.

What Linux distribution do you use?

Distribution: Fedora 31

TL-WR1043N v5 previously running 18.06.5 (ar71xx target), now running 19.07.0-rc1 (ath79 target).
Although a simple setup as an Access Point ONLY, no problems were noted with either!

Release Notes specify:

Sysupgrade from ar71xx to ath79 and vice versa is not officially supported, a full manual reinstall is recommended to switch targets for devices supported by both ar71xx and ath79

Question: Once Flashed, how does one determine which which target (ar71xx or ath79) was previously been installed, so that future Sysupgrades remain within the same target (ar71xx or ath79)???

the most simple way to determine is check dmesg:
ath79 will have only cpu clock print: [ 0.000000] CPU clock: 535.000 MHz
while ar71xx will have cpu/ddr/ahb/ref

1 Like

@LHoust Log in through SSH and do

root@OpenWrt:~# grep OPENWRT_BOARD /etc/os-release
OPENWRT_BOARD="ramips/mt7621"

In your case, it should show ath79/generic.

1 Like