OpenWrt 19.07.0 first release candidate

BT HumeHub5a upgrade from 18.06.5 to 19.07.0-rc1.

Success, it looks like I needed to add option proto 'none' to my definition of the VDSL-to-ethernet bridge and/or change the modem firmeware to a more modern version. But after doing both the upgrade seems to work just fine.

On Netgear R7800 it seems that AC 160Mhz still doesn't work, but this time I wasn't able to get wireless working again by switching back from 160Mhz mode. Had to factory reset.

No AC wifi by default on Archer C7 as reported here

Upgraded my R7800 using the sysupgrade file. Works perfectly. All devices are connecting. WPA3 support is working on a Pixel 3 and iPhone 8. I cannot connect my Linux laptop via WPA-3 though. WPA-2 works.

I don't see any benefits from the switch from ath10k to the "-CT" out-of-tree driver... Should I?

While slightly beyond topic, desktop linux (depending on the wireless card/ driver; not all support IEEE 802.11w, which is mandatory for WPA3) should be the easiest to configure as WPA3/ SAE client.

ctrl_interface=/run/wpa_supplicant
ctrl_interface_group=netdev
pmf=2

network={
        priority=50
        ssid="yourssid"
        id_str="some identifier"
        key_mgmt=SAE
        proto=WPA2
        pairwise=CCMP
        group=CCMP
        ieee80211w=2
        psk="secret01"
}

should work, provided you have a recent wpa_supplicant (>=v2.7, better >=v2.8) installed and are running a kernel >=v3.8.

Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.

Reference:

Otherwise built okay and tested on an ipq8064 system.

1 Like

FYI, from the original post Any outstanding issues reported at https://bugs.openwrt.org/

Building on any system that defaults python 2 is going to fail. That means Debian 9 (oldstable), and pretty much every linux installed before last year.

OpenWrt is actually using Debian 9 as a base for the images used by the build bots (used for building all the images and packages) and there's python2 and python3 installed as well. It works, no issue visible.

1 Like

I upgraded yesterday from 19.07-SNAPSHOT and experienced errors today on my Archer C7 v2 router and access point (2 devices). They are configured to use Band Steering and fast roaming between all 4 Wi-Fis (router 2.4G & 5G and AP 2.4G & 5G)

I removed wpad-basic and installed hostapd-openssl and wpa-supplicant-openssl.

Here are some errors I found in System Log:

router
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 3 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:25:21 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5540 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5550 cf2=0
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5620 chan=124 sec_chan=1
Mon Nov 11 14:25:23 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.186254] device wlan0 left promiscuous mode
Mon Nov 11 14:25:23 2019 kern.info kernel: [75175.191501] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:23 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:25:23 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:25:24 2019 kern.warn kernel: [75176.377944] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.394810] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.401254] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:25:24 2019 kern.info kernel: [75176.409433] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:25:25 2019 kern.warn kernel: [75176.472893] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.487625] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.497606] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.503033] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:25:25 2019 kern.info kernel: [75176.508737] device wlan0 entered promiscuous mode
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:25:25 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5620 chan=124 sec_chan=1, width=0, seg0=126, seg1=0, cac_time=60s
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: DFS-CAC-COMPLETED success=1 freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:26:29 2019 daemon.err hostapd: Using interface wlan0 with hwaddr SATINIZED_MAC and ssid "Olivenbaum"
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.719063] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.725810] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:26:29 2019 kern.info kernel: [75240.731223] br-lan: port 2(wlan0) entered forwarding state
Mon Nov 11 14:26:29 2019 daemon.notice netifd: Network device 'wlan0' link is up
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: interface state DFS->ENABLED
Mon Nov 11 14:26:29 2019 daemon.notice hostapd: wlan0: AP-ENABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: DFS-NEW-CHANNEL freq=5660 chan=132 sec_chan=1
Mon Nov 11 14:27:49 2019 daemon.warn hostapd: DFS failed to schedule CSA (-22) - trying fallback
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: AP-DISABLED
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon Nov 11 14:27:49 2019 daemon.notice netifd: Network device 'wlan0' link is down
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.697934] device wlan0 left promiscuous mode
Mon Nov 11 14:27:49 2019 kern.info kernel: [75320.702763] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:49 2019 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.887321] ath10k_pci 0000:01:00.0: 10.1 wmi init: vdevs: 16  peers: 127  tid: 256
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.904169] ath10k_pci 0000:01:00.0: wmi print 'P 128 V 8 T 410'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.910532] ath10k_pci 0000:01:00.0: wmi print 'msdu-desc: 1424  sw-crypt: 0 ct-sta: 0'
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.918704] ath10k_pci 0000:01:00.0: wmi print 'alloc rem: 20904 iram: 26072'
Mon Nov 11 14:27:50 2019 kern.warn kernel: [75321.982970] ath10k_pci 0000:01:00.0: pdev param 0 not supported by firmware
Mon Nov 11 14:27:50 2019 kern.info kernel: [75321.997679] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.007510] br-lan: port 2(wlan0) entered blocking state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.012998] br-lan: port 2(wlan0) entered disabled state
Mon Nov 11 14:27:50 2019 kern.info kernel: [75322.018664] device wlan0 entered promiscuous mode
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5620 ht_enabled=1 chan_offset=1 chan_width=2 cf1=5630 cf2=0
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Mon Nov 11 14:27:50 2019 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5660 chan=132 sec_chan=1, width=0, seg0=134, seg1=0, cac_time=60s
Mon Nov 11 14:28:09 2019 daemon.err uhttpd[1253]: luci: accepted login on / for root from 10.8.0.1
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPREQUEST(br-lan) 10.1.2.69 SATINIZED_MAC
Mon Nov 11 14:28:22 2019 daemon.info dnsmasq-dhcp[2099]: DHCPACK(br-lan) 10.1.2.69 SATINIZED_MAC SATINIZED_HOSTNAME
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq[2099]: read /tmp/hosts/dhcp.cfg01411c - 2 addresses
Mon Nov 11 14:28:25 2019 daemon.info dnsmasq-dhcp[2099]: read /etc/ethers - 0 addresses
AP
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:24:48 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:24:52 2019 daemon.notice hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: did not acknowledge authentication response
Mon Nov 11 14:24:54 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:01 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:02 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:02 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:07 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:15 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:16 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:17 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:18 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:25:19 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:25:19 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:20 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:21 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:28:22 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:28:26 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:24 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:25 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:31 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:32 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:38 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:43 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:31:48 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:55 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:31:59 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:04 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:09 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:11 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: authenticated
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC IEEE 802.11: associated (aid 3)
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC RADIUS: starting accounting session SATINIZED_ID
Mon Nov 11 14:32:12 2019 daemon.info hostapd: wlan1: STA SATINIZED_MAC WPA: pairwise key handshake completed (RSN)
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 1 addresses
Mon Nov 11 14:32:12 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /etc/hosts - 4 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/odhcpd - 2 addresses
Mon Nov 11 14:32:15 2019 daemon.info dnsmasq[1069]: read /tmp/hosts/dhcp.cfg01411c - 0 addresses
Mon Nov 11 14:32:25 2019 daemon.err uhttpd[1220]: luci: accepted login on / for root from 10.8.0.1

any further questions and comments are welcome.

Is the AP also detecting radar? I see radar was detected on channels 104 and 124. If there really is radar there, don't use channels in that area of the band for your initial configuration.

In ath10k when you're running a STA and an AP on the same radio you must explicitly set the channel to the one that the STA is connecting to, or the AP will not come up. This becomes a big problem when DFS forces a new channel.

Everything is in AP mode. The AP is connected via LAN to the router.

root@router:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11a'
wireless.radio0.path='pci0000:01/0000:01:00.0'
wireless.radio0.htmode='VHT40'
wireless.radio0.country='DE'
wireless.radio0.legacy_rates='0'
wireless.radio0.distance='15'
wireless.radio0.channel='108'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.key='SATINIZED'
wireless.default_radio0.ssid='Olivenbaum'
wireless.default_radio0.ieee80211r='1'
wireless.default_radio0.nasid='SATINIZED'
wireless.default_radio0.mobility_domain='SATINIZED'
wireless.default_radio0.ft_over_ds='1'
wireless.default_radio0.ft_psk_generate_local='1'
wireless.default_radio0.r1_key_holder='SATINIZED'
wireless.default_radio0.pmk_r1_push='1'
wireless.default_radio0.ieee80211w='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.hwmode='11g'
wireless.radio1.path='platform/qca955x_wmac'
wireless.radio1.channel='8'
wireless.radio1.htmode='HT40'
wireless.radio1.country='DE'
wireless.radio1.legacy_rates='0'
wireless.radio1.distance='auto'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.encryption='psk2+ccmp'
wireless.default_radio1.key='SATINIZED'
wireless.default_radio1.ssid='Olivenbaum'
wireless.default_radio1.ieee80211r='1'
wireless.default_radio1.nasid='SATINIZED'
wireless.default_radio1.mobility_domain='SATINIZED'
wireless.default_radio1.ft_over_ds='1'
wireless.default_radio1.ft_psk_generate_local='1'
wireless.default_radio1.r1_key_holder='SATINIZED'
wireless.default_radio1.pmk_r1_push='1'
wireless.default_radio1.ieee80211w='1'
root@AP:~# uci show wireless
wireless.radio0=wifi-device
wireless.radio0.type='mac80211'
wireless.radio0.hwmode='11a'
wireless.radio0.path='pci0000:01/0000:01:00.0'
wireless.radio0.htmode='VHT40'
wireless.radio0.country='DE'
wireless.radio0.legacy_rates='0'
wireless.radio0.distance='15'
wireless.radio0.channel='128'
wireless.default_radio0=wifi-iface
wireless.default_radio0.device='radio0'
wireless.default_radio0.network='lan'
wireless.default_radio0.mode='ap'
wireless.default_radio0.key='SATINIZED'
wireless.default_radio0.ieee80211r='1'
wireless.default_radio0.mobility_domain='SATINIZED'
wireless.default_radio0.ft_over_ds='1'
wireless.default_radio0.ft_psk_generate_local='1'
wireless.default_radio0.pmk_r1_push='1'
wireless.default_radio0.ssid='Olivenbaum'
wireless.default_radio0.nasid='SATINIZED'
wireless.default_radio0.r1_key_holder='SATINIZED'
wireless.default_radio0.encryption='psk2+ccmp'
wireless.default_radio0.ieee80211w='1'
wireless.radio1=wifi-device
wireless.radio1.type='mac80211'
wireless.radio1.hwmode='11g'
wireless.radio1.path='platform/qca955x_wmac'
wireless.radio1.channel='3'
wireless.radio1.htmode='HT40'
wireless.radio1.country='DE'
wireless.radio1.legacy_rates='0'
wireless.radio1.distance='auto'
wireless.default_radio1=wifi-iface
wireless.default_radio1.device='radio1'
wireless.default_radio1.network='lan'
wireless.default_radio1.mode='ap'
wireless.default_radio1.ssid='Olivenbaum'
wireless.default_radio1.key='SATINIZED'
wireless.default_radio1.ieee80211r='1'
wireless.default_radio1.nasid='SATINIZED'
wireless.default_radio1.mobility_domain='SATINIZED'
wireless.default_radio1.ft_over_ds='1'
wireless.default_radio1.ft_psk_generate_local='1'
wireless.default_radio1.r1_key_holder='SATINIZED'
wireless.default_radio1.pmk_r1_push='1'
wireless.default_radio1.encryption='psk2+ccmp'
wireless.default_radio1.ieee80211w='1'

I switched to non DFS channels for now but they are more crowded. :frowning:

Is there something wrong with my configuration?

Congrats team and thanks for your hard work! But shouldn't you call it 19.12 at this point? :smiley:

Kernel 4.14 seems a bit dated now, why not bump to 4.19 it's been stable and fast running on mvebu WRT32X.

On R7800 I'm only seeing 15mbps on speedtest.net when connected over 5Ghz WiFi. Wired connection tests over 100mbps. Is anyone else seeing this?

1 Like

so this is 3rd reported issue about ath10k 5GHz speed. show your printscreen of luci wireless overview

Good call. It appears bitrate is 24 Mbits. Edit: That seems unrelated to the problem. Let me know how to collect good information about the problem.

I think that decision has to do with the fact that the 4.14 kernel is supported until 01.2024, where as 4.19 is only supported until 12.2020. see
I.e. Long Term Support

1 Like

4.19 has been “default” on master since right after the branch. A few remaining 4.14 targets are moving over. It can be non-trivial to change kernel versions.

From what I have read on the mailing list, “20.01” will likely be on 4.19, though I haven’t seen a formal decision.

Do not overestimate the validity of those pre-announced EOL dates, those are just the time spans 'guaranteed' in advance. All of those dates for past LTS kernels have been extended at least once, closer to their originally declared expiration. While no one has formally committed to that yet, it's very likely that v4.19[0] will be LTS supported beyond the final/ effective expiration of the v4.14 LTS kernel.

--
[0] Debian 10 'Buster' is shipping with kernel v4.19 and will be supported at least until ~2022, with the LTS efforts probably extending that until 2024. Ben Hutchings as part of the debian-kernel team has taken over maintenance for previous LTS kernels from Greg Kroah-Hartman before - and kept them officially under LTS maintenance on kernel.org for the (extended) durations of Debian's release cycles; it's very likely that he will take over v4.19 as well.

3 Likes

Oh my bad...
For some reason I thought that a few targets that were already on 4.19 were moved back to 4.14 to have a "unified" kernel, and I was trying to make sense of that...
Sorry for the confusion.

I occasionally get this error on the overview screen and can only fix it with a reboot.

1 Like

BT HomeHub 5A in the UK with Plusnet / BT (same). No issues other than DHCP lease times are miss reported i.e. reported as expired even when active (sometimes)

AdBlock and Stubby installed with no issues. Wireless works with no issues.

Shout out to the OpenWrt developers for their hard work. LuCI renders very nicely in Chrome and seams to be a bit quicker. Thanks.

1 Like