Request for testing OpenWrt 23.05 snapshots (23.05.5)

We are planning a new OpenWrt 23.05 service release soon.

Please test the OpenWrt 23.05 snapshots if you know how to recover your device: https://downloads.openwrt.org/releases/23.05-SNAPSHOT/targets/

If you find any regression please open a ticket or post in this topic.

Hauke

24 Likes

re200v4 ujail refuses to start dnsmasq

1 Like

DAP-2610 working OK as dumb AP.

There is an old issue were upload speed is higher than download speed (not only in 23.05.XX, in previous versions I had the same issue).

Could you please post the logs or create a bug report on github for this problem please. https://github.com/openwrt/openwrt/issues

2 Likes

Was broken - openwrt-23.05-snapshot-r24058-3b85719b62-ramips-mt76x8-tplink_re200-v4-squashfs-sysupgrade.bin
Today good - openwrt-23.05-snapshot-r24097-e3bb35811e-ramips-mt76x8-tplink_re200-v4-squashfs-sysupgrade.bin
Just message dnsmasq ujail cannot init, then service restarted multiple times, never came up, config totally basic "Dumb-AP" - set one wifi, change LAN to DHCP client and disable DHCP server on lan.

1 Like

Meraki MR-52 (ipq806x/generic) and my Proxmox VM (x86/64, qemu-standard-pc-q35-ich9-2009) are both running just peachy on OpenWrt 23.05-SNAPSHOT r24025-c241885687. Will update them to latest snapshots later this week and report back.

Today I noticed:

[58093.326888] ------------[ cut here ]------------
[58093.341595] WARNING: CPU: 0 PID: 12 at backports-6.1.110-1/net/mac80211/tx.c:5018 ieee80211_beacon_update_cntdwn+0xd4/0x3b8 [mac80211]
[58093.354110] Modules linked in: xt_connlimit nf_conncount xt_state xt_helper xt_conntrack xt_connmark xt_connbytes xt_CT wireguard pl2303 nft_redir nft_nat nft_masq nft_flow_offload nft_fib_inet nft_ct nft_chain_nat nf_nat nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet nf_flow_table nf_conntrack_netlink nf_conntrack mt76x2e mt76x2_common mt76x02_lib mt7603e mt76 mac80211 libchacha20poly1305 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_tcpmss xt_statistic xt_recent xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_ecn xt_dscp xt_comment xt_TCPMSS xt_LOG xt_HL xt_DSCP xt_CLASSIFY usbserial poly1305_mips nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_quota nft_objref nft_numgen nft_log nft_limit nft_hash nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_counter nf_tables nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcurve25519_generic libcrc32c iptable_raw iptable_mangle iptable_filter ipt_ECN ip_tables crc_ccitt compat chacha_mips ledtrig_usbport xt_set
[58093.354847]  ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ipmac ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 nfsv4 nfsv3 nfs ip6_udp_tunnel udp_tunnel rpcsec_gss_krb5 auth_rpcgss lockd sunrpc grace dns_resolver crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha512_generic sha1_generic seqiv jitterentropy_rng drbg md5 hmac ecb des_generic libdes cts cmac arc4 leds_gpio xhci_plat_hcd xhci_pci xhci_mtk_hcd xhci_hcd fsl_mph_dr_of ehci_platform ehci_fsl sd_mod scsi_mod scsi_common ehci_hcd gpio_button_hotplug dm_mirror dm_region_hash dm_log dm_crypt dm_mod dax usbcore nls_base usb_common crc32c_generic cbc sha256_generic libsha256 encrypted_keys trusted tpm rng_core
[58093.442344]  oid_registry asn1_encoder asn1_decoder
[58093.533401] CPU: 0 PID: 12 Comm: ksoftirqd/0 Not tainted 5.15.167 #0
[58093.539757] Stack : 00000000 80083d1c 00000000 00000004 00000000 00000000 81477b3c 80a10000
[58093.548134]         80860000 80783b9c 81454138 80858e03 00000000 00000001 81477ae8 81455be0
[58093.556496]         00000000 00000000 80783b9c 81477988 ffffefff 00000000 ffffffea 00000000
[58093.564850]         81477994 000001c8 8085ea30 ffffffff 80783b9c 00000001 00000000 8513cd3c
[58093.573213]         00000009 81477d24 8a632e40 873e35b0 00000018 8040622c 00000000 80a10000
[58093.581576]         ...
[58093.584022] Call Trace:
[58093.586452] [<80007f24>] show_stack+0x28/0xf0
[58093.590830] [<8037b110>] dump_stack_lvl+0x60/0x80
[58093.595530] [<8002df34>] __warn+0x9c/0x124
[58093.599633] [<8002e018>] warn_slowpath_fmt+0x5c/0xac
[58093.604606] [<8513cd3c>] ieee80211_beacon_update_cntdwn+0xd4/0x3b8 [mac80211]
[58093.611950] [<8513d904>] ieee80211_nullfunc_get+0x694/0xd08 [mac80211]
[58093.618571] 
[58093.620220] ---[ end trace 46922d2b4d003e32 ]---

The Sercomm NA502s is broken, (LZMA ERROR 1), https://github.com/openwrt/openwrt/pull/16412 needs to be merged as a simple fix.

23.05.4 and 23.05.3 were broken on the RE200v1 and RE210v1. I can only test on the weekend, but I fear the builds are still broken. See TP-Link RE200 v1 seemingly bricked after sysupgrade for details.

For merging to 23.05:
New nand chip into Xiaomi AX3000T: https://github.com/openwrt/openwrt/pull/16088 (the patch is added without any edits)

3 Likes

The pre-compiled sysupgrade image for TP-Link RE200v1 is still broken, but my own compiled image works fine.

I'm seeing

Wed Sep 18 11:37:16 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response
Wed Sep 18 11:37:20 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response
Wed Sep 18 11:37:24 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response
Wed Sep 18 11:37:27 2024 daemon.notice hostapd: phy0-ap0: STA d8:1f:12:19:d8:4d IEEE 802.11: did not acknowledge authentication response

on r24097-e3bb35811e
I didn't see this on r24045-5773538c90 or earlier.

D-Link DIR-882 rev.A1
(MediaTek MT7621AT/MT7615N)

Noticed when channel 48 is manually selected, router goes to/stays on channel 44.

That is not a problem, since wifi-n best 20MHz sub-channel is selected for signalling.

1 Like

Netgear WAX202, used as a WDS client/repeater: I confirm that the previously reported 5 GHz speed regression is no longer there.

https://www.waveform.com/tools/bufferbloat?test-id=db8c245d-684f-485d-8a2a-4801f94a20b5

2 Likes

?
During testing, channel 44 had numerous devices.
Channel 48 was empty, no devices.

Was it any different in 23.05.4?

Has anyone tried it on a TUF AX 4200 router?
If it works, will this be the final version?

It is not final version.

I don't remember anymore. Tested 23.05.4 when released and several snapshot releases but I think I encountered similar/same? 5GHz WiFi selection problems as well, so reverted to Stable 23.05.2
After encountering failure to flash(s) with using recovery.bin for snapshots, having to resort to command line to recover... and 5GHz issue, decided to halt testing as well as corresponding notes.

Could fw4 be rolled forward to at least https://github.com/openwrt/firewall4/commit/698a53354fd280aae097efe08803c0c9a10c14c2
It would fix stuttering tcp connections over pppoe and wireguard, i post this in nftables.d form here multiple times a week.
@jow ?

1 Like