OpenWrt 24.10.0-rc2 - Second release candidate

Hi,

The OpenWrt community is proud to announce the second release candidate of the upcoming OpenWrt 24.10 stable series.
OpenWrt 24.10.0-rc2 incorporates over 5100 commits since branching the previous OpenWrt 23.05 release and has been under development for over one year.

This is just a release candidate and not the final release yet.

Download firmware images using the OpenWrt Firmware Selector:

Please test this version

This is not the final version, this is a test version. Please report problems and bugs in our issue tracker. https://github.com/openwrt/openwrt/issues

Changes between OpenWrt 24.10.0-rc1 and 24.10.0-rc2

  • Fixed opkg installation of kernel modules. The path to the kernel module packages was fixed.

For a detailed list of changes since OpenWrt 24.10.0-rc2 see the 24.10.0-rc2 changelog.

Highlights in OpenWrt 24.10:

General changes

  • TLS 1.3 support in default images
    • mbedtls was updated to version 3.6 which includes support for TLS 1.3
  • Activate POSIX Access Control Lists and file system security attributes for all file systems on devices with big flash sizes. This is needed by docker nowadays.
  • Activate kernel support for Multipath TCP on devices with big flash sizes.
  • Improved support for WiFi6 (802.11ax) and initial support for WiFi7 (802.11be)
    • Not many Wifi7 devices are supported by OpenWrt yet
  • Improved Link Layer Discovery Protocol (LLDP) support
  • OpenWrt 24.10 uses OPKG only, APK packages are not supported. Only main branch was changed to APK.

Many new devices added

OpenWrt 24.10 supports over 1950 devices. Support for over 100 new devices was added in addition to the device support by OpenWrt 23.05.

Target changes

  • Added d1 target for AllWinner D1 RISC-V SoC
  • Added ixp4xx target for Intel XScale IXP4xx SoCs.
  • Added loongarch64 target for SoCs with Loongson LoongArch CPUs.
  • Added starfive target for StarFive JH71x0 (7100/7110) SoCs.
  • Added stm32 target for STMicroelectronics STM32 SoCs.
  • Renamed ipq807x target to qualcommax.
  • Removed ath25 target. It supported Atheros ieee80211g devices with maximum 16MB RAM
  • Removed bcm63xx target. It supported some Broadcom DSL MIPS SoCs and was replaced by the bmips target. The Broadcom DSL itself was never supported.
  • Removed octeontx target. It supported the Octeon-TX CN80XX/CN81XX based boards.
  • Removed oxnas target. It supported the PLXTECH/Oxford NAS782x/OX8xx.
  • The qoriq target for the NXP QorIQ (PowerPC) SoCs is build
  • The ipq806x target for Qualcomm Atheros IPQ806X SoCs was converted to DSA

Core components update

Core components have the following versions in 24.10.0-rc2:

  • Updated toolchain:
    • musl libc 1.2.5
    • glibc 2.38
    • gcc 13.3.0
    • binutils 2.42
  • Updated Linux kernel
    • 6.6.63 for all targets
  • Network:
    • hostapd master snapshot from September 2024, dnsmasq 2.90, dropbear 2024.86
    • cfg80211/mac80211 from kernel 6.11.2

Upgrading to 24.10

Sysupgrade can be used to upgrade a device from 23.05 to 24.10, and configuration will be preserved in most cases.

  • Sysupgrade from 22.03 to 24.10 is not officially supported.

  • There is no configuration migration path for users of the ipq806x target for Qualcomm Atheros IPQ806X SoCs because it switched to DSA. You have to upgrade without saving the configuration.

  • User of the Linksys E8450 aka. Belkin RT3200 running OpenWrt 23.05 or earlier will need to run installer version v1.1.3 or later in order to reorganize the UBI layout for the 24.10 release. A detailed description is in the OpenWrt forum. Updating without using the installer will break the device. Sysupgrade will show a warning before doing an incompatible upgrade.

  • Users of the Xiaomi AX3200 aka. Redmi AX6S running OpenWrt 23.05 or earlier have to follow a special upgrade procedure described in the wiki. This will increase the flash memory available for OpenWrt. Updating without following the guide in the wiki break the device. Sysupgrade will show a warning before doing an incompatible upgrade.


Full release notes and upgrade instructions are available at
https://openwrt.org/releases/24.10/notes-24.10.0-rc2

In particular, make sure to read the regressions and known issues before upgrading:
https://openwrt.org/releases/24.10/notes-24.10.0-rc2#known_issues

For a detailed list of all changes since 24.10.0-rc1, refer to
https://openwrt.org/releases/24.10/changelog-24.10.0-rc2

To download the 24.10.0-rc2 images, navigate to:
https://downloads.openwrt.org/releases/24.10.0-rc2/targets/
Use OpenWrt Firmware Selector to download:
https://openwrt.github.io/firmware-selector-openwrt-org?version=24.10.0-rc2

As always, a big thank you goes to all our active package maintainers, testers, documenters and supporters.

Have fun!

The OpenWrt Community


To stay informed of new OpenWrt releases and security advisories, there
are new channels available:

21 Likes

I've just installed 24.10.0-rc2 on a spare Meraki MR42. It boots fine but when I run a wifi channel analysis I see the following errors in the log. Not sure if they are important. Maybe someone with more knowledge can tell?


Tue Dec  3 11:43:46 2024 kern.warn kernel: [  150.290497] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
Tue Dec  3 11:43:46 2024 kern.warn kernel: [  150.290570] ath10k_pci 0001:01:00.0: msdu-desc: 2500  skid: 32
Tue Dec  3 11:43:46 2024 kern.info kernel: [  150.367403] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
Tue Dec  3 11:43:46 2024 kern.info kernel: [  150.368131] ath10k_pci 0001:01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
Tue Dec  3 11:43:47 2024 kern.info kernel: [  150.751342] ath10k_pci 0001:01:00.0: rts threshold -1
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.752368] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.755473] ------------[ cut here ]------------
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.766398] WARNING: CPU: 0 PID: 817 at backports-6.11.2/net/mac80211/main.c:272 0xbf17a888 [mac80211@869cc7c0+0x77000]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.771107] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet ath10k_pci(O) ath10k_core(O) ath(O) pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) cfg80211(O) slhc nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ina2xx crc_ccitt compat(O) at24 sha512_arm seqiv geniv cmac leds_tlc591xx regmap_i2c leds_gpio xhci_hcd dwc3 sd_mod scsi_mod scsi_common ehci_hcd gpio_button_hotplug(O) crc32c_generic
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.819857] CPU: 0 PID: 817 Comm: rpcd Tainted: G           O       6.6.63 #0
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.842022] Hardware name: Generic DT based system
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.849145] Function entered at [<c030d7e8>] from [<c0308f50>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.853828] Function entered at [<c0308f50>] from [<c0a5e94c>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.859644] Function entered at [<c0a5e94c>] from [<c031d364>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.865459] Function entered at [<c031d364>] from [<c031d4e4>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.871276] Function entered at [<c031d4e4>] from [<bf17a888>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.877101] Function entered at [<bf17a888>] from [<bf17a9dc>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.882908] Function entered at [<bf17a9dc>] from [<c08787d4>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.888725] Function entered at [<c08787d4>] from [<c0878c38>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.894540] Function entered at [<c0878c38>] from [<c0878cd0>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.900354] Function entered at [<c0878cd0>] from [<c094869c>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.906172] Function entered at [<c094869c>] from [<c094aeec>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.911988] Function entered at [<c094aeec>] from [<c084abe8>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.917804] Function entered at [<c084abe8>] from [<c04c5564>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.923620] Function entered at [<c04c5564>] from [<c0300060>]
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.929434] Exception stack(0xc240ffa8 to 0xc240fff0)
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.935253] ffa0:                   00000008 bec0eb4c 00000008 00008914 bec0eb4c bec0eb40
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.940377] ffc0: 00000008 bec0eb4c b6eddb79 00000036 bec0ec34 bec0ec4c bec14ca4 00000018
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.948536] ffe0: b6fc2f74 bec0ea10 b6ed6b90 b6f7b704
Tue Dec  3 11:43:47 2024 kern.warn kernel: [  150.956780] ---[ end trace 0000000000000000 ]---
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  162.790095] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  162.790136] ath10k_pci 0000:01:00.0: msdu-desc: 2500  skid: 32
Tue Dec  3 11:43:59 2024 kern.info kernel: [  162.866117] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
Tue Dec  3 11:43:59 2024 kern.info kernel: [  162.866854] ath10k_pci 0000:01:00.0: wmi print 'free: 31080 iram: 23028 sram: 9596'
Tue Dec  3 11:43:59 2024 kern.info kernel: [  163.217199] ath10k_pci 0000:01:00.0: rts threshold -1
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.217801] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.221231] ------------[ cut here ]------------
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.232226] WARNING: CPU: 1 PID: 817 at backports-6.11.2/net/mac80211/main.c:272 0xbf17a888 [mac80211@869cc7c0+0x77000]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.237001] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet ath10k_pci(O) ath10k_core(O) ath(O) pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) cfg80211(O) slhc nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c ina2xx crc_ccitt compat(O) at24 sha512_arm seqiv geniv cmac leds_tlc591xx regmap_i2c leds_gpio xhci_hcd dwc3 sd_mod scsi_mod scsi_common ehci_hcd gpio_button_hotplug(O) crc32c_generic
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.285711] CPU: 1 PID: 817 Comm: rpcd Tainted: G        W  O       6.6.63 #0
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.307855] Hardware name: Generic DT based system
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.314975] Function entered at [<c030d7e8>] from [<c0308f50>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.319660] Function entered at [<c0308f50>] from [<c0a5e94c>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.325479] Function entered at [<c0a5e94c>] from [<c031d364>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.331293] Function entered at [<c031d364>] from [<c031d4e4>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.337108] Function entered at [<c031d4e4>] from [<bf17a888>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.342926] Function entered at [<bf17a888>] from [<bf17a9dc>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.348740] Function entered at [<bf17a9dc>] from [<c08787d4>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.354558] Function entered at [<c08787d4>] from [<c0878c38>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.360373] Function entered at [<c0878c38>] from [<c0878cd0>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.366187] Function entered at [<c0878cd0>] from [<c094869c>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.372005] Function entered at [<c094869c>] from [<c094aeec>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.377820] Function entered at [<c094aeec>] from [<c084abe8>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.383637] Function entered at [<c084abe8>] from [<c04c5564>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.389454] Function entered at [<c04c5564>] from [<c0300060>]
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.395268] Exception stack(0xc240ffa8 to 0xc240fff0)
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.401085] ffa0:                   00000008 bec0eb4c 00000008 00008914 bec0eb4c bec0eb40
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.406209] ffc0: 00000008 bec0eb4c b6eddb79 00000036 bec0ec34 bec0ec4c bec14ca4 00000018
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.414368] ffe0: b6fc2f74 bec0ea10 b6ed6b90 b6f7b704
Tue Dec  3 11:43:59 2024 kern.warn kernel: [  163.422607] ---[ end trace 0000000000000000 ]---

Flashed rc2 on my GL-MT6000. Added lots of packages and config tweaks it's working awesome.

Only con I'm seeing so far is some instances of daemon.err noted in 16680 though.

Thanks devs!

2 Likes

I still don't have the 5GHz band on the TP-Link Archer C60 v1 and other devices. Reported here.

1 Like

Thank you @darkxst, tried again with the updated migrate script for ERX and it worked. Thank you

3 Likes

https://downloads.openwrt.org/releases/24.10.0-rc2/targets/ath79/) nand missing
https://downloads.openwrt.org/releases/24.10.0-rc1/targets/ath79/nand/) is there tho

Netgear WAX202, used as a WDS repeater, with the following packages ordered via the firmware selector:

base-files busybox ca-bundle dnsmasq dropbear firewall4 fstools
kmod-crypto-hw-eip93 kmod-gpio-button-hotplug kmod-leds-gpio
kmod-nft-offload libc libgcc libustream-mbedtls logd mtd netifd
nftables odhcp6c odhcpd-ipv6only opkg ppp ppp-mod-pppoe procd
procd-seccomp procd-ujail uboot-envtools uci uclient-fetch
urandom-seed urngd wpad-mbedtls kmod-mt7915-firmware
-uboot-envtools luci
bridger diffutils umdns tcpdump luci-app-dawn luci-app-attendedsysupgrade
kmod-nf-nat6 irqbalance iperf3 htop owut

The resulting sysupgrade image has been flashed successfully, did not lose any configuration, and performs well enough for my purposes.

I will not test this RC on my Linksys E8450, as I have too many important meetings coming, too complex configuration that always produced something bad on upgrades even between minor versions, and there is no documented rollback path. Sorry!

@hauke

any plans to fix the sysupgrade server that is supports custom and attended sysupgrades?

Currently most of the profiles are reported as unsupported_profile as dicussed in the firmware-selector and owut threads?

3 Likes

the bin is flagged by M$ AV
image

Harmless info. Nothing to do with 24.10 specifically.

The informational warning Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4 is now printed with an error status, triggering kernel status dump message likely from an actual crash.

See discussion with the ath10k-ct driver author and others at

Thank you for another major (candidate) release and for all the work you did to bring about the latest LTS kernel.

I've upgraded my Belkin RT1800 - ramips/mt7621 + mt7915e to 24.10.0-rc2 from 23.05.5.

So far I've only noticed one problem: some WiFi clients (laptop, IoT devices) couldn't connect to the network while my Android phone could.

The logs (pasted below, MAC address redacted) were showing continuous connection attempts and disconnections. Changing the wireless security cipher from Force CCMP (AES) to auto seems to have solved the problem. The encryption is set to WPA2-PSK.

Thu Dec  5 07:30:49 2024 daemon.notice hostapd: wl0.501: AP-STA-DISCONNECTED aa:bb:cc:01:23:45
Thu Dec  5 07:30:50 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 IEEE 802.11: authenticated
Thu Dec  5 07:30:50 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 IEEE 802.11: associated (aid 1)
Thu Dec  5 07:30:50 2024 daemon.notice hostapd: wl0.501: AP-STA-CONNECTED aa:bb:cc:01:23:45 auth_alg=open
Thu Dec  5 07:30:50 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 RADIUS: starting accounting session D6F2896702C76542
Thu Dec  5 07:30:50 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 WPA: pairwise key handshake completed (RSN)
Thu Dec  5 07:30:50 2024 daemon.notice hostapd: wl0.501: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:01:23:45
Thu Dec  5 07:31:50 2024 daemon.notice hostapd: wl0.501: AP-STA-DISCONNECTED aa:bb:cc:01:23:45
Thu Dec  5 07:31:52 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 IEEE 802.11: authenticated
Thu Dec  5 07:31:52 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 IEEE 802.11: associated (aid 1)
Thu Dec  5 07:31:52 2024 daemon.notice hostapd: wl0.501: AP-STA-CONNECTED aa:bb:cc:01:23:45 auth_alg=open
Thu Dec  5 07:31:52 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 RADIUS: starting accounting session A40787B00ADF390C
Thu Dec  5 07:31:52 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 WPA: pairwise key handshake completed (RSN)
Thu Dec  5 07:31:52 2024 daemon.notice hostapd: wl0.501: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:01:23:45
Thu Dec  5 07:32:52 2024 daemon.notice hostapd: wl0.501: AP-STA-DISCONNECTED aa:bb:cc:01:23:45
Thu Dec  5 07:32:53 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 IEEE 802.11: authenticated
Thu Dec  5 07:32:53 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 IEEE 802.11: associated (aid 1)
Thu Dec  5 07:32:53 2024 daemon.notice hostapd: wl0.501: AP-STA-CONNECTED aa:bb:cc:01:23:45 auth_alg=open
Thu Dec  5 07:32:53 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 RADIUS: starting accounting session 9E7CF8AE4EC712FC
Thu Dec  5 07:32:53 2024 daemon.info hostapd: wl0.501: STA aa:bb:cc:01:23:45 WPA: pairwise key handshake completed (RSN)
Thu Dec  5 07:32:53 2024 daemon.notice hostapd: wl0.501: EAPOL-4WAY-HS-COMPLETED aa:bb:cc:01:23:45
Thu Dec  5 07:33:53 2024 daemon.notice hostapd: wl0.501: AP-STA-DISCONNECTED aa:bb:cc:01:23:45
1 Like

seems your pc is infected... did you check if the hash match?

1 Like

Xiaomi AX6000 upgraded no problems however I'm using as basic with only adblock added. Thanks to all developers.

MS themselves does not describe it past taking storage space.

1 Like

ath79/nand build was triggered again. The images are there now.

1 Like

I've whitelisted the file and did the upgrade - performance was worse than previous 24-10-snapshot so I reverted to that as I'm affected by Xiaomi AX3600 - ath11k c000000.wifi: failed to flush transmit queue · Issue #14965 · openwrt/openwrt

Installed on a R6220 and a WNR3700v2

Please add to the upgrading section the comment I've done about some ipq40xx devices.

Installed rc2 since yesterday on MikroTik RouterBOARD LHG 2nD (LHG 2) & Linksys WHW01, works fine. :kissing_heart:
Except I see higher memory usage compared to 23.x.x

TLS 1.3 requires only one round-trip, which in turn cuts the connection setup 
latency in half from TLS 1.2 which required two rounds trips to complete the
handshake.
These solutions will no longer be able to perform retrospective decryption
since PFS (ephemeral keys) are mandatory with TLS 1.3.

This is the one I have been waiting for, for a long time, Awesome :+1: (source)

Yay!

I couldn't agree more :innocent:, thanks guys.