Request for testing OpenWrt 23.05 snapshots (23.05.5)

We are planning a new OpenWrt 23.05 service release soon.

Please test the OpenWrt 23.05 snapshots if you know how to recover your device: https://downloads.openwrt.org/releases/23.05-SNAPSHOT/targets/

If you find any regression please open a ticket or post in this topic.

Hauke

18 Likes

re200v4 ujail refuses to start dnsmasq

DAP-2610 working OK as dumb AP.

There is an old issue were upload speed is higher than download speed (not only in 23.05.XX, in previous versions I had the same issue).

Could you please post the logs or create a bug report on github for this problem please. https://github.com/openwrt/openwrt/issues

2 Likes

Was broken - openwrt-23.05-snapshot-r24058-3b85719b62-ramips-mt76x8-tplink_re200-v4-squashfs-sysupgrade.bin
Today good - openwrt-23.05-snapshot-r24097-e3bb35811e-ramips-mt76x8-tplink_re200-v4-squashfs-sysupgrade.bin
Just message dnsmasq ujail cannot init, then service restarted multiple times, never came up, config totally basic "Dumb-AP" - set one wifi, change LAN to DHCP client and disable DHCP server on lan.

Meraki MR-52 (ipq806x/generic) and my Proxmox VM (x86/64, qemu-standard-pc-q35-ich9-2009) are both running just peachy on OpenWrt 23.05-SNAPSHOT r24025-c241885687. Will update them to latest snapshots later this week and report back.

Today I noticed:

[58093.326888] ------------[ cut here ]------------
[58093.341595] WARNING: CPU: 0 PID: 12 at backports-6.1.110-1/net/mac80211/tx.c:5018 ieee80211_beacon_update_cntdwn+0xd4/0x3b8 [mac80211]
[58093.354110] Modules linked in: xt_connlimit nf_conncount xt_state xt_helper xt_conntrack xt_connmark xt_connbytes xt_CT wireguard pl2303 nft_redir nft_nat nft_masq nft_flow_offload nft_fib_inet nft_ct nft_chain_nat nf_nat nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet nf_flow_table nf_conntrack_netlink nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 libchacha20poly1305 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY usbserial poly1305_mips nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_quota nft_objref nft_numgen nft_log nft_limit nft_hash nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_counter nf_tables nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcurve25519_generic libcrc32c iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat chacha_mips ledtrig_usbport xt_set
[58093.354847]  ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ipmac ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 nfsv4 nfsv3 nfs ip6_udp_tunnel udp_tunnel rpcsec_gss_krb5 auth_rpcgss lockd sunrpc grace dns_resolver crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha512_generic sha1_generic seqiv jitterentropy_rng drbg md5 hmac ecb des_generic libdes cts cmac arc4 leds_gpio xhci_plat_hcd xhci_pci xhci_mtk_hcd xhci_hcd fsl_mph_dr_of ehci_platform ehci_fsl sd_mod scsi_mod scsi_common ehci_hcd gpio_button_hotplug dm_mirror dm_region_hash dm_log dm_crypt dm_mod dax usbcore nls_base usb_common crc32c_generic cbc sha256_generic libsha256 encrypted_keys trusted tpm rng_core
[58093.442344]  oid_registry asn1_encoder asn1_decoder
[58093.533401] CPU: 0 PID: 12 Comm: ksoftirqd/0 Not tainted 5.15.167 #0
[58093.539757] Stack : 00000000 80083d1c 00000000 00000004 00000000 00000000 81477b3c 80a10000
[58093.548134]         80860000 80783b9c 81454138 80858e03 00000000 00000001 81477ae8 81455be0
[58093.556496]         00000000 00000000 80783b9c 81477988 ffffefff 00000000 ffffffea 00000000
[58093.564850]         81477994 000001c8 8085ea30 ffffffff 80783b9c 00000001 00000000 8513cd3c
[58093.573213]         00000009 81477d24 8a632e40 873e35b0 00000018 8040622c 00000000 80a10000
[58093.581576]         ...
[58093.584022] Call Trace:
[58093.586452] [<80007f24>] show_stack+0x28/0xf0
[58093.590830] [<8037b110>] dump_stack_lvl+0x60/0x80
[58093.595530] [<8002df34>] __warn+0x9c/0x124
[58093.599633] [<8002e018>] warn_slowpath_fmt+0x5c/0xac
[58093.604606] [<8513cd3c>] ieee80211_beacon_update_cntdwn+0xd4/0x3b8 [mac80211]
[58093.611950] [<8513d904>] ieee80211_nullfunc_get+0x694/0xd08 [mac80211]
[58093.618571] 
[58093.620220] ---[ end trace 46922d2b4d003e32 ]---

The Sercomm NA502s is broken, (LZMA ERROR 1), https://github.com/openwrt/openwrt/pull/16412 needs to be merged as a simple fix.

23.05.4 and 23.05.3 were broken on the RE200v1 and RE210v1. I can only test on the weekend, but I fear the builds are still broken. See TP-Link RE200 v1 seemingly bricked after sysupgrade for details.

For merging to 23.05:
New nand chip into Xiaomi AX3000T: https://github.com/openwrt/openwrt/pull/16088 (the patch is added without any edits)

2 Likes

The pre-compiled sysupgrade image for TP-Link RE200v1 is still broken, but my own compiled image works fine.

I'm seeing

Wed Sep 18 11:37:16 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response
Wed Sep 18 11:37:20 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response
Wed Sep 18 11:37:24 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response
Wed Sep 18 11:37:27 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response

on r24097-e3bb35811e
I didn't see this on r24045-5773538c90 or earlier.

(post deleted by author)

D-Link DIR-882 rev.A1
(MediaTek MT7621AT/MT7615N)

Noticed when channel 48 is manually selected, router goes to/stays on channel 44.

That is not a problem, since wifi-n best 20MHz sub-channel is selected for signalling.

Netgear WAX202, used as a WDS client/repeater: I confirm that the previously reported 5 GHz speed regression is no longer there.

https://www.waveform.com/tools/bufferbloat?test-id=db8c245d-684f-485d-8a2a-4801f94a20b5

1 Like

?
During testing, channel 44 had numerous devices.
Channel 48 was empty, no devices.

Was it any different in 23.05.4?