if you restored some files then you have to manually set the image version to 2.0
Yes, I have restored my buckup settings.
Where to change to 2.0?
compat version from /etc/config/system ?
yes in /etc/config/system
option compat_version '2.0'
@kusmi
Same thing .. It will be better if you open ticket on github ... they will take action on it ....
I wish they will fix this thing on next update
I'm BPI-R4 user
The way to make C6v2 work as it did with 23.05.x is what I wrote on github, but the real solution would be to add the board to board2.bin
According to my friend for whom I updated remotely to 24.10.0-rc7, the previous rc6 version seemed stable on Archer c2600, whereas on rc7 he has disconnects (I didn't see anything strange in the logfile for wifi or wan. However, it was only hours later I could roll back to rc6 just to make sure it works again more stable).
Not sure what it is, did anybody else also observe the issue or is it known so in the final release 24.10.0 it may be fixed ?
Not sure how helpful my input for the developers may be
Many thanks and Cheers, Blinton.
So far so good on Netgear EX6100v2. Thanks devs!
I've been using the non ct drivers with this device for years since they are more stable.
Ditto for Archer C7 v2. 5 GHz + WPA3 somehow was very spotty with CT for me.
TP-Link RE205 V3 dmesg shows following trace with batman-adv enabled. I hope for some MT76 fixes. WR902AC V3 showed similar messages with recent snapshots. Keep up that great work.
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.663184] ------------[ cut here ]------------
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.672458] WARNING: CPU: 0 PID: 7 at backports-6.12.6/net/mac80211/main.c:408 0x82a023e0 [mac80211@d7869f1e+0x75000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.693606] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet mt76x0e(O) mt76x0_common(O) batman_adv(O) pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mt76x02_lib(O) mt7603e(O) mt76(O) mac80211(O) lzo cfg80211(O) slhc nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 lzo_rle lzo_decompress lzo_compress libcrc32c crc_ccitt compat(O) crc16 sha512_generic seqiv sha3_generic jitterentropy_rng drbg hmac geniv rng cmac crypto_acompress leds_gpio gpio_button_hotplug(O) crc32c_generic
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.824609] CPU: 0 PID: 7 Comm: kworker/u2:0 Tainted: G O 6.6.73 #0
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.839789] Workqueue: events_unbound 0x82900e20 [cfg80211@f1bfbe72+0x3a000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.853806] Stack : 81849d24 00000000 80640000 8181d880 00000000 00000000 00000000 00000000
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.870398] 00000000 00000000 00000000 00000000 00000000 00000001 81849ce8 5ea209ff
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.886987] 81849d80 00000000 00000000 81849c08 00000038 804d4b44 00000000 0000000c
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.903578] 62666231 403ae5d9 d1d4b8e6 2b323765 804ed204 804ed204 00000000 00000009
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.920171] 00000000 81807e5c 80640000 81808f05 00000000 8028234c 00000000 80770000
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.936764] ...
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.941602] Call Trace:
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.941612] [<80640000>] 0x80640000
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.953343] [<804d4b44>] 0x804d4b44
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.960248] [<80640000>] 0x80640000
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.967150] [<8028234c>] 0x8028234c
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.974053] [<8000613c>] 0x8000613c
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.980957] [<80006144>] 0x80006144
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.987860] [<804b5c0c>] 0x804b5c0c
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 87.994763] [<80021658>] 0x80021658
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.001702] [<82a023e0>] 0x82a023e0 [mac80211@d7869f1e+0x75000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.013502] [<82a023e0>] 0x82a023e0 [mac80211@d7869f1e+0x75000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.025266] [<80021708>] 0x80021708
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.032223] [<82a68970>] 0x82a68970 [mac80211@d7869f1e+0x75000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.044137] [<82a023e0>] 0x82a023e0 [mac80211@d7869f1e+0x75000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.055950] [<82a69aa0>] 0x82a69aa0 [mac80211@d7869f1e+0x75000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.067995] [<82900eb8>] 0x82900eb8 [cfg80211@f1bfbe72+0x3a000]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.079761] [<8007364c>] 0x8007364c
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.086763] [<80036640>] 0x80036640
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.093701] [<804d70e4>] 0x804d70e4
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.100603] [<8003b370>] 0x8003b370
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.107512] [<80036c88>] 0x80036c88
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.114415] [<804d7368>] 0x804d7368
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.121319] [<800369b4>] 0x800369b4
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.128222] [<8003ca60>] 0x8003ca60
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.135125] [<8003c984>] 0x8003c984
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.142027] [<8003c984>] 0x8003c984
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.148931] [<80001a78>] 0x80001a78
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.155854]
Fri Jan 31 21:22:46 2025 kern.warn kernel: [ 88.158976] ---[ end trace 0000000000000000 ]---
This looks similar to crashes above - try the non CT firmware for wifi (others reported success with that)
Did this with NBG6617 and Archer C7 but I don't know of alternative firmware for Mediatek chipsets.
which one do you recommend?
Same here (Linksys WHW01 v1).
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 34.961939] ------------[ cut here ]------------
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 34.972988] WARNING: CPU: 1 PID: 1079 at backports-6.12.6/net/mac80211/main.c:272 0xbf1bd85c [mac80211@4fcdddca+0x77000]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 34.977658] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet ath10k_pci(O) ath10k_core(O) ath(O) wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_queue nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) libchacha20poly1305 curve25519_neon cfg80211(O) slhc poly1305_arm nfnetlink_queue nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcurve25519_generic libcrc32c hwmon crc_ccitt compat(O) chacha_neon ip6_udp_tunnel udp_tunnel sha512_arm kpp ghash_arm_ce cmac leds_pca963x leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom gpio_button_hotplug(O) crc32c_generic
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.037596] CPU: 1 PID: 1079 Comm: hostapd Tainted: G O 6.6.73 #0
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.059769] Hardware name: Generic DT based system
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.067243] Function entered at [<c030d1d8>] from [<c0308ec8>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.071924] Function entered at [<c0308ec8>] from [<c0a5056c>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.077742] Function entered at [<c0a5056c>] from [<c032165c>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.083555] Function entered at [<c032165c>] from [<c03217dc>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.089368] Function entered at [<c03217dc>] from [<bf1bd85c>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.095200] Function entered at [<bf1bd85c>] from [<bf1bd9b0>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.101007] Function entered at [<bf1bd9b0>] from [<c0869f58>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.106822] Function entered at [<c0869f58>] from [<c086a3bc>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.112635] Function entered at [<c086a3bc>] from [<c086a454>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.118449] Function entered at [<c086a454>] from [<c093a304>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.124253] Function entered at [<c093a304>] from [<c093cb5c>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.130085] Function entered at [<c093cb5c>] from [<c083c25c>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.135902] Function entered at [<c083c25c>] from [<c04c6554>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.141717] Function entered at [<c04c6554>] from [<c0300040>]
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.147526] Exception stack(0xc33b9fa8 to 0xc33b9ff0)
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.153354] 9fa0: 00000010 beb48848 00000010 00008914 beb48848 00000000
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.158486] 9fc0: 00000010 beb48848 00000010 00000036 00000001 00000001 00000000 00000020
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.166642] 9fe0: 00563ea4 beb48708 004ddf94 b6f1666c
Sat Feb 1 06:01:29 2025 kern.warn kernel: [ 35.174917] ---[ end trace 0000000000000000 ]---
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.248227] ------------[ cut here ]------------
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.259118] WARNING: CPU: 2 PID: 1079 at backports-6.12.6/net/mac80211/main.c:272 0xbf1bd85c [mac80211@4fcdddca+0x77000]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.263877] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_inet ath10k_pci(O) ath10k_core(O) ath(O) wireguard pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_queue nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211(O) libchacha20poly1305 curve25519_neon cfg80211(O) slhc poly1305_arm nfnetlink_queue nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcurve25519_generic libcrc32c hwmon crc_ccitt compat(O) chacha_neon ip6_udp_tunnel udp_tunnel sha512_arm kpp ghash_arm_ce cmac leds_pca963x leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom gpio_button_hotplug(O) crc32c_generic
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.323780] CPU: 2 PID: 1079 Comm: hostapd Tainted: G W O 6.6.73 #0
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.345987] Hardware name: Generic DT based system
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.353457] Function entered at [<c030d1d8>] from [<c0308ec8>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.358139] Function entered at [<c0308ec8>] from [<c0a5056c>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.363955] Function entered at [<c0a5056c>] from [<c032165c>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.369771] Function entered at [<c032165c>] from [<c03217dc>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.375585] Function entered at [<c03217dc>] from [<bf1bd85c>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.381405] Function entered at [<bf1bd85c>] from [<bf1bd9b0>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.387218] Function entered at [<bf1bd9b0>] from [<c0869f58>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.393035] Function entered at [<c0869f58>] from [<c086a3bc>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.398850] Function entered at [<c086a3bc>] from [<c086a454>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.404666] Function entered at [<c086a454>] from [<c093a304>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.410483] Function entered at [<c093a304>] from [<c093cb5c>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.416298] Function entered at [<c093cb5c>] from [<c083c25c>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.422115] Function entered at [<c083c25c>] from [<c04c6554>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.427929] Function entered at [<c04c6554>] from [<c0300040>]
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.433746] Exception stack(0xc33b9fa8 to 0xc33b9ff0)
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.439567] 9fa0: 00000010 beb48848 00000010 00008914 beb48848 00000000
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.444692] 9fc0: 00000010 beb48848 00000010 00000036 00000001 00000001 00000000 00000020
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.452847] 9fe0: 00563ea4 beb48708 004ddf94 b6f1666c
Sat Feb 1 06:01:32 2025 kern.warn kernel: [ 37.461037] ---[ end trace 0000000000000000 ]---
No more warnings after switching to non ct.
Hi, yes I knew about the workaround indicated, just that @d687r02j8g indicates there was no post-modification after upgrading to rc7 and 5GHz works fine so I thought something was done between rc6 and rc7 but I find no evidence. I will try to upgrade one C6 V2 also. Thanks!
After upgrading my MikroTik cAP ac from 23.05.5 to 24.10.0-rc7 I can no longer SSH into the router or access luci from the browser.
It was setup as a dumb AP and the wireless network is still available and working fine - I just can't access the router either on wireless or connected with an ethernet cable.
Pinging 192.168.88.7 with 32 bytes of data:
Reply from 192.168.88.7: Destination port unreachable.
Here is the network cfg from the backup (I can't find a way to view the current config).
config interface 'loopback'
option device 'lo'
option proto 'static'
option ipaddr '127.0.0.1'
option netmask '255.0.0.0'
config globals 'globals'
option ula_prefix 'fd41:b79d:25c1::/48'
config device
option name 'br-lan'
option type 'bridge'
list ports 'lan'
list ports 'wan'
config device
option name 'lan'
option macaddr 'b8:69:f4:81:28:0f'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.88.7'
option netmask '255.255.255.0'
option gateway '192.168.88.1'
option ip6assign '60'
list dns '192.168.88.1'
config device
option name 'wan'
option macaddr 'b8:69:f4:81:28:0e'
Any idea what caused this and is there anything I can do to regain access? Maybe I need to add a firewall rule on the main router (MERCUSYS MR90X v1 running 23.05.4 at 192.168.88.1)
From where are you pinging? When a Destination host is unreachable, the reply always comes from a different IP address. An address of the router, or the address of the pinging device.
AFAIK 'Destinaton port unreachable' means there is a firewall rule in a router, prohibiting a ping forward.
in this case that would mean that your AP isn't allowed to answer the ping.
Have you already tried a fail-safe?
Hi!
Just updated a D-Link DIR825B1 from 23.05.5 to this RC.
No apparent issues so far. Updating from Luci with ASU works nicely.
In my case, after changing to non ct drivers 4 devices, no more kernel warnings.
I do not understand why this CT crap is still in the main and release branches, given that the actual development and support has stopped for years now. The decision to use CT at the time was that the developer was active in supporting it ...( 5 years ago )..
On the contrary, the non-ct is miles more stable (hundreds of posts in the forum evidencing that) and relatively recently updated.
Same for iNet GL-B1300