OpenWrt 23.05.0-rc2 - Second Release Candidate

Probably the devices are connected to 5Ghz as they support this and my accesspoints do too.
So I guess this can be the same issue indeed.
my device is "TP-Link Deco M4R v2" using the non-ct drivers at the moment.
and the issue always occurs when at least one of the devices is using video streaming, but that might be irreverent as this happens most of the day.

Still it would be great to have this fixed

Error on installing luci-app-ddns WRT1900ACv1

Installing luci-app-ddns (git-23.158.77284-47a61bd) to root...
Downloading https://downloads.openwrt.org/releases/23.05.0-rc2/packages/arm_cortex-a9_vfpv3-d16/luci/luci-app-ddns_git-23.158.77284-47a61bd_all.ipk
Installing liblua5.1.5 (5.1.5-10) to root...
Downloading https://downloads.openwrt.org/releases/23.05.0-rc2/packages/arm_cortex-a9_vfpv3-d16/base/liblua5.1.5_5.1.5-10_arm_cortex-a9_vfpv3-d16.ipk
Installing lua (5.1.5-10) to root... Downloading https://downloads.openwrt.org/releases/23.05.0-rc2/packages/arm_cortex-a9_vfpv3-d16/base/lua_5.1.5-10_arm_cortex-a9_vfpv3-d16.ipk
Installing luci-lib-nixio (git-22.222.71555-88b9088) to root...
Downloading https://downloads.openwrt.org/releases/23.05.0-rc2/packages/arm_cortex-a9_vfpv3-d16/luci/luci-lib-nixio_git-22.222.71555-88b9088_arm_cortex-a9_vfpv3-d16.ipk
Installing libnl-tiny2023-07-01 (2023-07-01-d433990c-1) to root...
Downloading https://downloads.openwrt.org/releases/23.05.0-rc2/packages/arm_cortex-a9_vfpv3-d16/base/libnl-tiny2023-07-01_2023-07-01-d433990c-1_arm_cortex-a9_vfpv3-d16.ipk
Configuring liblua5.1.5.
Configuring lua.
Configuring luci-lib-nixio.

Errors

Collected errors: * check_data_file_clashes: Package libnl-tiny2023-07-01 wants to install file /usr/lib/libnl-tiny.so But that file is already provided by package * libnl-tiny2023-04-02 * opkg_install_cmd: Cannot install package luci-app-ddns.

The opkg install command failed with code 255.

Same error with luci-app-openvpn

1 Like

Try updating libnl-tiny by itself. Then try installing the others.

My two EA8500's with ipq806x/generic ran stable on 23.05.0-rc2 with wpad-mbedtls and 802.11k and v BSS transition enabled.

Both my APs seem to have 50-75mbit/s performance drop on 5Ghz. Haven't tested 2.4Ghz.

Upgraded to 23.05.0-rc1, performance drop.
Downgrade to 22.03.5, performance is back.
Upgraded to 23.05.0-rc2, performance drop.
Downgrade to 22.03.5, performance is back.

Tests run before and after downgrades were minutes apart, wifi variables controlled for as best is possible.

RC2 should deliver higher performance compared to RC1 because the cpu scaling performance governor is set as default. But the issue is still not solved from what I read: https://github.com/openwrt/openwrt/issues/11676

Hmm, it's not allowing me to update. Also when I try uninstalling libnl-tiny2023-04-02 it screwed a bunch up, and I had to reset the router.

1 Like

update lists

Installing libnl-tiny2023-07-01 (2023-07-01-d433990c-1) to root... Downloading https://downloads.openwrt.org/releases/23.05.0-rc2/packages/arm_cortex-a9_vfpv3-d16/base/libnl-tiny2023-07-01_2023-07-01-d433990c-1_arm_cortex-a9_vfpv3-d16.ipk

Errors

Collected errors: * check_data_file_clashes: Package libnl-tiny2023-07-01 wants to install file /usr/lib/libnl-tiny.so But that file is already provided by package * libnl-tiny2023-04-02 * opkg_install_cmd: Cannot install package libnl-tiny2023-07-01.

Force overwrite and you will be ok.. I've tested and it working good

whats blocking 23.05 from actually released?

2 Likes

How to build my own firmware?

1 Like

U can use firmware-selector.openwrt.org

Or u can search youtube or Google how openwrt build firmware

Several things

1 Like

Got my BananaPi R3 but it keeps freezing after short time, don't know why. Using 23.05.0-rc2.
I will do some tests with disabled functionality (e.g. nut-monitor with USB UPS, disabling crowdsec-firewall-bouncer, disabling WiFi). Maybe I can narrow it down.
Is there a way to get to the old syslog after reboot?

Write log to storage or syslog server.

this is a list of all open issues,
I can't imagine the are planning to solve them all, especially since some are not solved for years.
I think some priority will be applied here.

I believe they should have linked you to the 23.05 release label?: https://github.com/openwrt/openwrt/labels/release%2F23.05

2 Likes

Probably related to

This release is unfortunately pretty much completely broken for my use case in its current form. The 22.03 snapshots worked phenomenally, however.

Something seems to have take a sharp turn at some point and broke a lot of stuff.

4 Likes

Dynalink DL-WRX36 - moved over from using Snapshot r23589 to 23.05.0-rc2 r23228 with the same issue as described here Dynalink DL-WRX36 Askey RT5010W IPQ8072A technical discussion - #1958 by otnert

WiFi causing so many issues with this router, using the WLAN.HK.2.9.0.1-01385 or 01837 drivers same, unusable...

Just had another complete WiFi crash on both 2G & 5G. Restarting WiFi no deal... require reboot.

Summary
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.400892] ---[ end trace 2555dcd356129f7e ]---
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.397679]  0xffffffc0080115f4
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.394467]  0xffffffc008791068
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.391256]  0xffffffc008790378
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.388044]  0xffffffc0080231a0
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.384831]  0xffffffc00802308c
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.381621]  0xffffffc00859d154
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.378409]  0xffffffc00859d0c8
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.375197]  0xffffffc00859cf78
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.371985]  0xffffffc00859a598
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.368774]  0xffffffc00863cae4
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.365560]  0xffffffc00863c848
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.362350]  0xffffffc00863d908
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.359138]  0xffffffc00863d0ac
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.355926]  0xffffffc00863e488
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.349595]  0xffffffc00863dffc
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.343259]  0xffffffc000b051b8 [cfg80211@000000007532fbbf+0x45000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.336922]  0xffffffc000b8b22c [mac80211@00000000f0fae715+0x85000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.330584]  0xffffffc000b72d24 [mac80211@00000000f0fae715+0x85000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.327888]  0xffffffc000b72a60 [mac80211@00000000f0fae715+0x85000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.320692] Call trace:
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.313486] x2 : 0000000000000000 x1 : ffffff8002a3a340 x0 : 00000000ffffff94
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.306281] x5 : 000000004e4b4fa9 x4 : 0000000000000000 x3 : ffffff8002a3a340
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.299076] x8 : ffffffc008a67b50 x7 : ffffffc008a67ba0 x6 : 0000000000008e20
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.291872] x11: 0000000000000004 x10: ffffffc008abfba0 x9 : 0000000000000000
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.284666] x14: 0000000000000214 x13: ffffffc00d26b378 x12: ffffffc008abfba0
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.277462] x17: 332076656476206e x16: 2037313a31623a32 x15: 000000000000063c
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.270257] x20: ffffff8008ba0880 x19: ffffff8014290000 x18: ffffffc008a67ba0
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.263052] x23: ffffffc00d26ba38 x22: ffffff8014854900 x21: ffffff8014290aa8
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.255847] x26: ffffff8001cab880 x25: ffffffc008b660c0 x24: ffffffc000b35000
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.252628] x29: ffffffc00d26b840 x28: ffffff8002a3a340 x27: ffffffc00d26bdd0
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.245950] sp : ffffffc00d26b840
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.239266] lr : 0xffffffc000b72a5c [mac80211@00000000f0fae715+0x85000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.232061] pc : 0xffffffc000b72a60 [mac80211@00000000f0fae715+0x85000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.227196] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.221123] Hardware name: Dynalink DL-WRX36 (DT)
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.198887] CPU: 1 PID: 1985 Comm: hostapd Not tainted 5.15.118 #0
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.084987]  nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcurve25519_generic libcrc32c libchacha crc_ccitt compat asn1_decoder ip6_udp_tunnel udp_tunnel tun sha512_generic seqiv jitterentropy_rng drbg michael_mic kpp hmac cmac uas usb_storage leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom uhci_hcd ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl ehci_hcd qca_nss_dp qca_ssdk gpio_button_hotplug f2fs aquantia hwmon crc32c_generic crc32_generic
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.084757] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet ath11k_ahb ath11k wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_irc nf_nat_h323 nf_nat_amanda nf_nat nf_flow_table nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_pptp nf_conntrack_irc nf_conntrack_h323 nf_conntrack_broadcast nf_conntrack_amanda nf_conntrack mac80211 libchacha20poly1305 iptable_raw iptable_mangle iptable_filter ipt_REJECT ip_tables chacha_neon cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG x_tables usblp ts_kmp ts_fsm ts_bm slhc qrtr_smd qrtr qmi_helpers poly1305_neon nfnetlink nf_reject_ipv6 nf_reject_ipv4
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.080061] WARNING: CPU: 1 PID: 1985 at 0xffffffc000b72a60 [mac80211@00000000f0fae715+0x85000]
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.070148] ------------[ cut here ]------------
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.062288] ath11k c000000.wifi: Found peer entry a6:xxxxx n vdev 3 after it was supposedly removed
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.053533] ath11k c000000.wifi: Failed to delete peer: 24:xxxxx for VDEV: 3
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.047081] ath11k c000000.wifi: failed to delete peer vdev_id 3 addr 24:xxxxx ret -108
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.040361] ath11k c000000.wifi: failed to send WMI_PEER_DELETE cmd
Thu Jul 27 11:13:46 2023 kern.warn kernel: [260606.040257] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 3
Thu Jul 27 11:13:41 2023 daemon.notice hostapd: phy0-ap0: STA 24:xxxxx IEEE 802.11: Could not add STA to kernel driver
Thu Jul 27 11:13:41 2023 kern.warn kernel: [260600.875616] ath11k c000000.wifi: Failed to add station: 24:xxxxx for VDEV: 0
Thu Jul 27 11:13:41 2023 kern.warn kernel: [260600.866851] ath11k c000000.wifi: Failed to add peer: 24:xxxxx for VDEV: 0
Thu Jul 27 11:13:41 2023 kern.warn kernel: [260600.858055] ath11k c000000.wifi: failed peer 24:xxxxx delete vdev_id 0 fallback ret -22
Thu Jul 27 11:13:41 2023 kern.warn kernel: [260600.850242] ath11k c000000.wifi: failed to find peer vdev_id 0 addr 24:xxxxx in delete
Thu Jul 27 11:13:41 2023 kern.warn kernel: [260600.850194] ath11k c000000.wifi: failed to find peer 24:xxxxx on vdev 0 after creation
Thu Jul 27 11:13:41 2023 kern.info kernel: [260600.752353] remoteproc remoteproc0: stopped remote processor cd00000.q6v5_wcss
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.719655] remoteproc remoteproc0: recovering cd00000.q6v5_wcss
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.711609] remoteproc remoteproc0: handling crash #1 in cd00000.q6v5_wcss
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.689357] remoteproc remoteproc0: crash detected in cd00000.q6v5_wcss: type fatal error
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650]
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] to   : 0x4bfb9aa8
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] from : 0x4bfb9230
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] Stack Dump
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650]
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] LR : 0x4b107860
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] BADVA : 0x00020000
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] SSR : 0x00000008
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] PC : 0x4b1080c4
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] FP : 0x4bfb9238
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] SP : 0x4bfb9230
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] Register:
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] Thread ID      : 0x00000069  Thread name    : WLAN RT0  Process ID     : 0
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] wal_peer_control.c:2870 Assertion is_graceful_to_handle failedparam0 :zero, param1 :zero, param2 :zero.
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650]
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] Image Variant : IMAGE_VARIANT_STRING=8074.wlanfw.eval_v2Q
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] QC Image Version: QC_IMAGE_VERSION_STRING=WLAN.HK.2.9.0.1-01385-QCAHKSWPL_SILICONZ-1
Thu Jul 27 11:13:41 2023 kern.err kernel: [260600.638650] qcom-q6v5-wcss-pil cd00000.q6v5_wcss: fatal error received:
Thu Jul 27 11:13:38 2023 daemon.notice hostapd: phy0-ap1: STA 24:xxxxx IEEE 802.11: did not acknowledge authentication response
Thu Jul 27 11:13:38 2023 daemon.notice hostapd: phy0-ap1: STA 24:xxxxx IEEE 802.11: did not acknowledge authentication response
Thu Jul 27 11:13:38 2023 daemon.notice hostapd: phy0-ap1: STA 24:xxxxx IEEE 802.11: did not acknowledge authentication response
Thu Jul 27 11:13:38 2023 daemon.notice hostapd: phy0-ap1: STA 24:xxxxx IEEE 802.11: did not acknowledge authentication response
Thu Jul 27 11:13:38 2023 daemon.notice hostapd: phy0-ap1: STA 24:xxxxx IEEE 802.11: did not acknowledge authentication response

I have been using Snapshot 23.05 with 1837 (added that my self and compiled) for 4 days without a problem, but using exclusive 5 GHz and just some Android devices attached