Coder Social home page Coder Social logo

build-release's Introduction

How to build x-wrt for your devices

First, fork this repository to your github account.

Clone it from your fork.

git clone https://github.com/[your_account]/build-release.git

Select a release tag to build.

You can find available tags at https://github.com/x-wrt/x-wrt/tags

For example tag 23.06_b202307110013

echo -n 23.06_b202307110013 >release.tag

Then you are going to build release tag 23.06_b202307110013

If you want to build master branch, then use master as tag name

echo -n master >release.tag

Run sh update-tags.sh <target> to start building your target.

Available targets see cat target.list

TARGET=ath79-generic
TARGET=ath79-generic-nosymbol
TARGET=ath79-nand
TARGET=ipq40xx-generic
TARGET=bcm27xx-bcm2709
TARGET=sunxi-cortexa7
TARGET=bcm27xx-bcm2710
TARGET=mediatek-mt7622
TARGET=mediatek-filogic
TARGET=qualcommax-ipq807x
TARGET=bcm27xx-bcm2711
TARGET=bcm53xx-generic
TARGET=ipq806x-generic
TARGET=kirkwood-generic
TARGET=mvebu-cortexa9
TARGET=ramips-mt7620
TARGET=ramips-mt7620-nosymbol
TARGET=ramips-mt7621
TARGET=ramips-mt7621-ext4fs
TARGET=ramips-mt76x8
TARGET=ramips-mt76x8-nosymbol
TARGET=rockchip-armv8
TARGET=armsr-armv8
TARGET=x86_64
TARGET=x86_64-docker

For example, to build all ipq40xx-generic target devices, please run:

sh update-tags.sh ipq40xx-generic

What is your device target?

You can find your device firmware at https://downloads.x-wrt.com/rom/

and then you should known the target name

for example:

Xiaomi Mi Router R3 target is ramips-mt7620

P&W R619AC target is ipq40xx-generic

x86 64bits target is x86_64

...

build-release's People

Contributors

bimizx avatar ptpt52 avatar x-wrt-dev avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

build-release's Issues

TX1806 23.06-b202309011202 UDP不通

已经尝试过:重新刷入固件、重置路由器、在刚重置完的状态测试
测试链接:https://networktest.twilio.com/

在更新到这个版本后UDP无法正常接通,尝试过一些游戏都没法正常加入对战房间。没有进行严谨测试UDP是完全不通还是高丢包,但上面那个链接每一次测试都会失败。刷OpenWRT官方23.05.0-rc3后UDP测试正常(不过那个版本有些别的毛病)。

红米AX6000 内核版本与软件包依赖版本不一致

[x-wrt-22.10-b202301010101-mediatek-filogic-xiaomi_redmi-router-ax6000-stock-squashfs-sysupgrade.bin]
在安装openclash依赖的时候会提醒软件版本与内核版本不一致
该版本内核版本为5.15.85 但是后缀版本并不与软件包对应的[5.15.85-1-9548efd7b7ab6663c8f4a0918160b6cb]版本一致,会有依赖问题,使用软件包中的kernel 只能升级到5.15.86 ,升级完之后会有更多的依赖问题,nftables 初始化失败。
https://downloads.openwrt.org/snapshots/targets/mediatek/filogic/kmods/

No internet access with the build X-WRT v22.03_b202205290126

Hi,

I downloaded the build X-WRT v22.03_b202205290126
Latest and tested it on both Pi4 and GDock 2.0 and found this issue:
I created multiple X-Wan and PPPOE and it worked fine for the first boot.
But when I restarted the device, pppoe was connected but there was no internet connection.
Tried to restarted again but still no internet connection unless I reset the device to original setting and config the Xwan again.
The issue occured to both Pi4 and Gdock, so for sure it is not a device issue. The previous build worked fine for me.

Please fix it.

Thank you!

Radio1 missing On MT7620a & range got shortened.

Bugs on v b202108291236

the latest release from Aug 29 made the system unusable. the wireless Radio1 (2.4Ghz) went missing on Xiaomi Mi Router R3 (MT7620a) and the range for the Radio0 (5Ghz) went to like only 1 meter. Hope it'll be solved in the next update.
note: i have already downgraded to a previous release. that works like charm.

**By the way Please provide a RELEASE NOTE or any kind of UPDATE LOG ** so that we can know what changed where.

Need Package Installation Unlocked

Unlock The Open Package Manager.

Hey dev! can u not lock the package installation on the firmwares. we need some packages to get some specific features like OPEN-WRT. So please unlock the package installation feature.

X-WRT x86 no space left on device

Hi,

I flashed the x-wrt-docker-24.04-b202406060001-x86-64-generic-ext4-combined-efi.img.gz to my NVME 512GB.

It is able to boot up but I cannot do anything. When I try to change the password, it says "no space left on device"

I tried several olders rom and got the same issue.

Any suggestion?

Thanks!

LINKSYS EA6350 V3

您可以使用此版本的 X-WRT v22.03_b202204240424 创建一个 rom 作为包含 sqm 包的基础,因为它具有 irqs 的组织,可以在内核中均匀分布负载,而不会使单个内核饱和。

mediatek firmware

Hello Ptpt52!
Thanks for adding new models (zyxel and mercursys) to builds.
I have an ask for include new firmware of mediatek wifi cards.
Could you grab all, or only mt7915modules:
https://git01.mediatek.com/plugins/gitiles/openwrt/feeds/mtk-openwrt-feeds/+/refs/heads/master/autobuild_mac80211_release/package/kernel/mt76/src/firmware

this is mt7915 version is:

mt7915e 0000:02:00.0: HW/SW Version: 0x8a108a10, Build Time: 20230418151304a
mt7915e 0000:02:00.0: WM Firmware Version: ____000000, Build Time: 20230418151336
mt7915e 0000:02:00.0: WA Firmware Version: DEV_000000, Build Time: 20230418151358

and it is running a lot better (less udp errors) than latest official repo, included in your builds.
Anyway thanks for your x-wrt builds. I personally love fakemesh app!
Thanks!

mi router stable version crash

Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.132833] ------------[ cut here ]------------
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.137605] WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:467 dev_watchdog+0x290/0x298
Sun Jan 14 08:20:11 2024 kern.info kernel: [79379.146058] NETDEV WATCHDOG: eth0 (mtk_soc_eth): transmit queue 0 timed out
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.153176] Modules linked in: rt2800soc rt2800mmio rt2800lib qcserial pppoe ppp_async option cdc_mbim wireguard usb_wwan sierra_net sierra rt2x00soc rt2x00mmio rt2x00lib rndis_host qmi_wwan pptp pppox ppp_mppe ppp_generic nft_fib_inet mt76x2e mt76x2_common mt76x02_lib mt76 mac80211 libchacha20poly1305 ipt_REJECT huawei_cdc_ncm cfg80211 cdc_ncm cdc_ether xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_recent xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_hl xt_helper xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_HL xt_DSCP xt_CLASSIFY usbserial usbnet usblp ums_usbat ums_sddr55 ums_sddr09 ums_karma ums_jumpshot ums_isd200 ums_freecom ums_datafab ums_cypress ums_alauda ts_fsm ts_bm tcp_scalable tcp_bbr slhc sch_cake r8152 poly1305_mips ntfs3 nft_tproxy nft_socket nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject_bridge nft_reject nft_redir nft_quota nft_queue nft_objref nft_numgen nft_nat
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.153664] nft_meta_bridge nft_masq nft_log nft_limit nft_hash nft_fwd_netdev nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_dup_netdev nft_ct nft_counter nft_compat nft_chain_nat nfnetlink_queue nf_tproxy_ipv6 nf_tproxy_ipv4 nf_tables nf_socket_ipv6 nf_socket_ipv4 nf_reject_ipv4 nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda nf_log_ipv6 nf_log_ipv4 nf_log_common nf_dup_netdev nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_pptp nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp nf_conntrack_broadcast nf_conntrack_bridge ts_kmp nf_conntrack_amanda nf_conncount macvlan libcurve25519_generic libcrc32c ipvlan iptable_nat iptable_mangle iptable_filter ipt_ECN ipheth ip_tables crc_ccitt compat chacha_mips cdc_wdm br_netfilter asn1_decoder natflow natcap nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.243224] act_gact xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ipmac ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 nfsv4 nfs nfs_ssc msdos ip6_gre ip_gre gre sit ip6_tunnel oid_registry tunnel6 tunnel4 ip_tunnel tun ovpn_dco_v2 udp_tunnel ip6_udp_tunnel lockd sunrpc grace autofs4 dns_resolver nls_utf8 nls_iso8859_1 nls_cp437 crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha512_generic sha256_generic libsha256 sha1_generic seqiv jitterentropy_rng drbg md5 md4 hmac ecb des_generic libdes cmac arc4 uas usb_storage leds_gpio ohci_platform ohci_hcd fsl_mph_dr_of ehci_platform ehci_fsl sd_mod scsi_mod ehci_hcd gpio_button_hotplug vfat fat ext4 mbcache jbd2 exfat usbcore
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.332557] nls_base usb_common mii crc32c_generic
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.426897] CPU: 0 PID: 0 Comm: swapper Not tainted 5.10.179 #0
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.432946] Stack : 01398a0b 8071dd54 00000000 00000000 80c0be0c 80860000 806a0000 805ff8c0
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.441503] 806a61a0 806a5d87 808633b4 00000000 00000000 00000001 80c0bdc0 47e600b9
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.450067] 00000000 00000000 805ff8c0 80c0bc60 ffffefff 00000000 00000000 ffffffea
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.458639] 00000000 80c0bc6c 000001da 806ac1f8 00000000 00000009 00000000 80412ffc
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.467210] 00000009 00000000 01398a0b 8071dd54 00000018 803194f4 00000000 80860000
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.475782] ...
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.478285] Call Trace:
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.480803] [<800071d8>] show_stack+0x30/0x100
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.485371] [<80025ea8>] __warn+0x9c/0x124
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.489558] [<80025fbc>] warn_slowpath_fmt+0x8c/0xac
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.494649] [<80412ffc>] dev_watchdog+0x290/0x298
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.499469] [<8006b010>] call_timer_fn.constprop.0+0x1c/0x8c
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.505270] [<8006b3e0>] run_timer_softirq+0x2c0/0x35c
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.510532] [<80572acc>] __do_softirq+0x10c/0x2e4
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.515361] [<80002bb0>] except_vec_vi_end+0xb8/0xc4
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.520432] [<805728c4>] r4k_wait_irqoff+0x18/0x24
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.525342] [<8004d9d8>] do_idle+0x7c/0xec
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.529527] [<8004dc54>] cpu_startup_entry+0x18/0x28
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.534619] [<80734cac>] start_kernel+0x548/0x570
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.539422]
Sun Jan 14 08:20:11 2024 kern.warn kernel: [79379.540942] ---[ end trace fa545df76bcbf99e ]---
Sun Jan 14 08:20:11 2024 kern.err kernel: [79379.545678] mtk_soc_eth 10100000.ethernet eth0: transmit timed out
Sun Jan 14 08:20:11 2024 kern.info kernel: [79379.551987] mtk_soc_eth 10100000.ethernet eth0: dma_cfg:80000067
Sun Jan 14 08:20:11 2024 kern.info kernel: [79379.558137] mtk_soc_eth 10100000.ethernet eth0: tx_ring=0, base=02db0000, max=1024, ctx=673, dtx=597, fdx=597, next=673
Sun Jan 14 08:20:11 2024 kern.info kernel: [79379.569156] mtk_soc_eth 10100000.ethernet eth0: rx_ring=0, base=02d90000, max=1024, calc=325, drx=326
Sun Jan 14 08:20:46 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d6:85:4f:92:47:24
Sun Jan 14 08:20:46 2024 user.info usteer: station d6:85:4f:92:47:24 disconnected from node hostapd.phy0-ap0
Sun Jan 14 08:20:47 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f IEEE 802.11: authenticated
Sun Jan 14 08:20:47 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f IEEE 802.11: associated (aid 2)
Sun Jan 14 08:20:47 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e6:9f:39:d8:6a:9f auth_alg=open
Sun Jan 14 08:20:47 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f RADIUS: starting accounting session 5F033285CA3E136B
Sun Jan 14 08:20:47 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:20:47 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e6:9f:39:d8:6a:9f
Sun Jan 14 08:20:58 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e6:9f:39:d8:6a:9f
Sun Jan 14 08:20:58 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 IEEE 802.11: authenticated
Sun Jan 14 08:20:58 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 IEEE 802.11: associated (aid 1)
Sun Jan 14 08:20:58 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d6:85:4f:92:47:24 auth_alg=open
Sun Jan 14 08:20:58 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 RADIUS: starting accounting session 4B81C5B140EF9541
Sun Jan 14 08:20:58 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:20:58 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d6:85:4f:92:47:24
Sun Jan 14 08:20:58 2024 user.info usteer: station e6:9f:39:d8:6a:9f disconnected from node hostapd.phy1-ap0
Sun Jan 14 08:21:11 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d6:85:4f:92:47:24
Sun Jan 14 08:21:11 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f IEEE 802.11: authenticated
Sun Jan 14 08:21:11 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f IEEE 802.11: associated (aid 2)
Sun Jan 14 08:21:11 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e6:9f:39:d8:6a:9f auth_alg=open
Sun Jan 14 08:21:11 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f RADIUS: starting accounting session 54029C8958105435
Sun Jan 14 08:21:11 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:21:11 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e6:9f:39:d8:6a:9f
Sun Jan 14 08:21:11 2024 user.info usteer: station d6:85:4f:92:47:24 disconnected from node hostapd.phy0-ap0
Sun Jan 14 08:21:21 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e6:9f:39:d8:6a:9f
Sun Jan 14 08:21:22 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 IEEE 802.11: authenticated
Sun Jan 14 08:21:22 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 IEEE 802.11: associated (aid 1)
Sun Jan 14 08:21:22 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d6:85:4f:92:47:24 auth_alg=open
Sun Jan 14 08:21:22 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 RADIUS: starting accounting session 3EC88288552C139F
Sun Jan 14 08:21:22 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:21:22 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d6:85:4f:92:47:24
Sun Jan 14 08:21:22 2024 user.info usteer: station e6:9f:39:d8:6a:9f disconnected from node hostapd.phy1-ap0
Sun Jan 14 08:21:26 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d6:85:4f:92:47:24
Sun Jan 14 08:21:26 2024 user.info usteer: station d6:85:4f:92:47:24 disconnected from node hostapd.phy0-ap0
Sun Jan 14 08:22:09 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 IEEE 802.11: authenticated
Sun Jan 14 08:22:09 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 IEEE 802.11: associated (aid 1)
Sun Jan 14 08:22:09 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d6:85:4f:92:47:24 auth_alg=open
Sun Jan 14 08:22:09 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 RADIUS: starting accounting session E6FA8C27EF4B4BD6
Sun Jan 14 08:22:09 2024 daemon.info hostapd: phy0-ap0: STA d6:85:4f:92:47:24 WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:22:09 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d6:85:4f:92:47:24
Sun Jan 14 08:22:27 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED d6:85:4f:92:47:24
Sun Jan 14 08:22:27 2024 user.info usteer: station d6:85:4f:92:47:24 disconnected from node hostapd.phy0-ap0
Sun Jan 14 08:22:29 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f IEEE 802.11: authenticated
Sun Jan 14 08:22:29 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f IEEE 802.11: associated (aid 2)
Sun Jan 14 08:22:29 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e6:9f:39:d8:6a:9f auth_alg=open
Sun Jan 14 08:22:29 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f RADIUS: starting accounting session AA2FE1AD4DE63D0F
Sun Jan 14 08:22:29 2024 daemon.info hostapd: phy1-ap0: STA e6:9f:39:d8:6a:9f WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:22:29 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e6:9f:39:d8:6a:9f
Sun Jan 14 08:22:47 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED e6:9f:39:d8:6a:9f
Sun Jan 14 08:22:47 2024 user.info usteer: station e6:9f:39:d8:6a:9f disconnected from node hostapd.phy1-ap0
Sun Jan 14 08:23:43 2024 kern.err kernel: [79460.271798] mtk_soc_eth 10100000.ethernet eth0: transmit timed out
Sun Jan 14 08:23:43 2024 kern.info kernel: [79460.278136] mtk_soc_eth 10100000.ethernet eth0: dma_cfg:80000067
Sun Jan 14 08:23:43 2024 kern.info kernel: [79460.284299] mtk_soc_eth 10100000.ethernet eth0: tx_ring=0, base=02db0000, max=1024, ctx=768, dtx=0, fdx=0, next=768
Sun Jan 14 08:23:43 2024 kern.info kernel: [79460.294970] mtk_soc_eth 10100000.ethernet eth0: rx_ring=0, base=02da0000, max=1024, calc=334, drx=335
Sun Jan 14 08:23:46 2024 daemon.info hostapd: phy0-ap0: STA d8:3b:bf:4e:01:c9 IEEE 802.11: authenticated
Sun Jan 14 08:23:46 2024 daemon.info hostapd: phy0-ap0: STA d8:3b:bf:4e:01:c9 IEEE 802.11: associated (aid 1)
Sun Jan 14 08:23:46 2024 daemon.notice hostapd: phy0-ap0: STA-OPMODE-SMPS-MODE-CHANGED d8:3b:bf:4e:01:c9 off
Sun Jan 14 08:23:47 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED d8:3b:bf:4e:01:c9 auth_alg=open
Sun Jan 14 08:23:47 2024 daemon.info hostapd: phy0-ap0: STA d8:3b:bf:4e:01:c9 RADIUS: starting accounting session 5A577B96C40AAEAB
Sun Jan 14 08:23:47 2024 daemon.info hostapd: phy0-ap0: STA d8:3b:bf:4e:01:c9 WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:23:47 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED d8:3b:bf:4e:01:c9
Sun Jan 14 08:23:56 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 80:8a:bd:3c:6a:a4
Sun Jan 14 08:23:56 2024 user.info usteer: station 80:8a:bd:3c:6a:a4 disconnected from node hostapd.phy0-ap0
Sun Jan 14 08:23:59 2024 daemon.notice netifd: Network device 'eth0' link is down
Sun Jan 14 08:23:59 2024 kern.info kernel: [79466.895777] mtk_soc_eth 10100000.ethernet eth0: port 1 link down
Sun Jan 14 08:23:59 2024 daemon.notice netifd: VLAN 'eth0.1' link is down
Sun Jan 14 08:23:59 2024 daemon.notice netifd: VLAN 'eth0.2' link is down
Sun Jan 14 08:23:59 2024 daemon.notice netifd: Interface 'wan' has link connectivity loss
Sun Jan 14 08:23:59 2024 daemon.notice netifd: Interface 'wan6' has link connectivity loss
Sun Jan 14 08:23:59 2024 kern.info kernel: [79466.906648] br-lan: port 1(eth0.1) entered disabled state
Sun Jan 14 08:24:00 2024 daemon.notice netifd: wan (3542): udhcpc: received SIGTERM
Sun Jan 14 08:24:00 2024 daemon.notice netifd: wan (3542): udhcpc: entering released state
Sun Jan 14 08:24:00 2024 daemon.notice netifd: wan (3542): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wan" } (Permission denied)
Sun Jan 14 08:24:00 2024 daemon.notice netifd: Interface 'wan' is now down
Sun Jan 14 08:24:00 2024 daemon.info hostapd: phy0-ap0: STA 80:8a:bd:3c:6a:a4 IEEE 802.11: authenticated
Sun Jan 14 08:24:00 2024 daemon.info hostapd: phy0-ap0: STA 80:8a:bd:3c:6a:a4 IEEE 802.11: associated (aid 2)
Sun Jan 14 08:24:00 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 80:8a:bd:3c:6a:a4 auth_alg=open
Sun Jan 14 08:24:00 2024 daemon.info hostapd: phy0-ap0: STA 80:8a:bd:3c:6a:a4 RADIUS: starting accounting session 236A4E769689AECF
Sun Jan 14 08:24:00 2024 daemon.info hostapd: phy0-ap0: STA 80:8a:bd:3c:6a:a4 WPA: pairwise key handshake completed (RSN)
Sun Jan 14 08:24:00 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 80:8a:bd:3c:6a:a4
Sun Jan 14 08:24:00 2024 daemon.notice hostapd: phy0-ap0: STA-OPMODE-N_SS-CHANGED 80:8a:bd:3c:6a:a4 1
Sun Jan 14 08:24:00 2024 daemon.notice netifd: Interface 'wan6' is now down
Sun Jan 14 08:24:00 2024 user.notice mwan3-hotplug[16362]: mwan3 hotplug on wan not called because interface disabled
Sun Jan 14 08:24:01 2024 kern.info kernel: [79468.551978] mtk_soc_eth 10100000.ethernet eth0: port 1 link up (100Mbps/Full duplex)
Sun Jan 14 08:24:01 2024 daemon.notice netifd: Network device 'eth0' link is up
Sun Jan 14 08:24:01 2024 kern.info kernel: [79468.563935] br-lan: port 1(eth0.1) entered blocking state
Sun Jan 14 08:24:01 2024 kern.info kernel: [79468.569533] br-lan: port 1(eth0.1) entered forwarding state
Sun Jan 14 08:24:01 2024 daemon.notice netifd: VLAN 'eth0.1' link is up
Sun Jan 14 08:24:01 2024 daemon.notice netifd: VLAN 'eth0.2' link is up
Sun Jan 14 08:24:01 2024 daemon.notice netifd: Interface 'wan' has link connectivity
Sun Jan 14 08:24:01 2024 daemon.notice netifd: Interface 'wan' is setting up now
Sun Jan 14 08:24:01 2024 daemon.notice netifd: Interface 'wan6' has link connectivity
Sun Jan 14 08:24:01 2024 daemon.notice netifd: Interface 'wan6' is setting up now
Sun Jan 14 08:24:02 2024 daemon.notice netifd: wan (16524): udhcpc: started, v1.36.1
Sun Jan 14 08:24:02 2024 daemon.notice netifd: wan (16524): udhcpc: broadcasting discover
Sun Jan 14 08:24:03 2024 user.notice mwan3-hotplug[16540]: mwan3 hotplug on wan6 not called because interface disabled
Sun Jan 14 08:24:05 2024 daemon.notice netifd: wan (16524): udhcpc: broadcasting discover
Sun Jan 14 08:24:08 2024 daemon.notice netifd: wan (16524): udhcpc: broadcasting discover

No internet access (PPPoE) since X-WRT v22.03_b202207182016

Hi,

I used X-WRT for a year. My router is GeHua GHL-R-001

X-WRT is working fine in my router in X-WRT v22.03_b202207110353, but since X-WRT v22.03_b202207182016, it can't make PPPoE connection to my ISP

image

Sat Jul 23 06:06:23 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Jul 23 06:06:23 2022 kern.warn kernel: [ 1122.637817] warning: catch unregister event for dev=eth0.2
Sat Jul 23 06:06:23 2022 kern.warn kernel: [ 1122.637869] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
Sat Jul 23 06:06:24 2022 daemon.notice netifd: Interface 'wan' is disabled
Sat Jul 23 06:06:24 2022 kern.warn kernel: [ 1122.777543] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
Sat Jul 23 06:06:24 2022 kern.warn kernel: [ 1122.777581] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
Sat Jul 23 06:06:24 2022 daemon.notice netifd: Interface 'wan' is enabled
Sat Jul 23 06:06:24 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Jul 23 06:06:24 2022 daemon.err insmod: module is already loaded - slhc
Sat Jul 23 06:06:24 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Jul 23 06:06:24 2022 daemon.err insmod: module is already loaded - pppox
Sat Jul 23 06:06:24 2022 daemon.err insmod: module is already loaded - pppoe
Sat Jul 23 06:06:24 2022 daemon.info pppd[7686]: Plugin pppoe.so loaded.
Sat Jul 23 06:06:24 2022 daemon.info pppd[7686]: PPPoE plugin from pppd 2.4.9
Sat Jul 23 06:06:24 2022 daemon.notice pppd[7686]: pppd 2.4.9 started by root, uid 0
Sat Jul 23 06:06:39 2022 daemon.warn pppd[7686]: Timeout waiting for PADO packets
Sat Jul 23 06:06:39 2022 daemon.err pppd[7686]: Unable to complete PPPoE Discovery
Sat Jul 23 06:06:39 2022 daemon.info pppd[7686]: Exit.
Sat Jul 23 06:06:39 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Jul 23 06:06:39 2022 kern.warn kernel: [ 1138.427925] warning: catch unregister event for dev=eth0.2
Sat Jul 23 06:06:39 2022 kern.warn kernel: [ 1138.427977] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
Sat Jul 23 06:06:39 2022 daemon.notice netifd: Interface 'wan' is disabled
Sat Jul 23 06:06:39 2022 daemon.notice netifd: Interface 'wan' is enabled
Sat Jul 23 06:06:39 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Jul 23 06:06:39 2022 kern.warn kernel: [ 1138.568454] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
Sat Jul 23 06:06:39 2022 kern.warn kernel: [ 1138.568501] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
Sat Jul 23 06:06:39 2022 daemon.err insmod: module is already loaded - slhc
Sat Jul 23 06:06:39 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Jul 23 06:06:39 2022 daemon.err insmod: module is already loaded - pppox
Sat Jul 23 06:06:39 2022 daemon.err insmod: module is already loaded - pppoe
Sat Jul 23 06:06:40 2022 daemon.info pppd[8148]: Plugin pppoe.so loaded.
Sat Jul 23 06:06:40 2022 daemon.info pppd[8148]: PPPoE plugin from pppd 2.4.9
Sat Jul 23 06:06:40 2022 daemon.notice pppd[8148]: pppd 2.4.9 started by root, uid 0
Sat Jul 23 06:06:55 2022 daemon.warn pppd[8148]: Timeout waiting for PADO packets
Sat Jul 23 06:06:55 2022 daemon.err pppd[8148]: Unable to complete PPPoE Discovery
Sat Jul 23 06:06:55 2022 daemon.info pppd[8148]: Exit.
Sat Jul 23 06:06:55 2022 daemon.notice netifd: Interface 'wan' is now down
Sat Jul 23 06:06:55 2022 kern.warn kernel: [ 1154.171871] warning: catch unregister event for dev=eth0.2
Sat Jul 23 06:06:55 2022 kern.warn kernel: [ 1154.171923] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
Sat Jul 23 06:06:55 2022 daemon.notice netifd: Interface 'wan' is disabled
Sat Jul 23 06:06:55 2022 kern.warn kernel: [ 1154.337945] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
Sat Jul 23 06:06:55 2022 kern.warn kernel: [ 1154.338001] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
Sat Jul 23 06:06:55 2022 daemon.notice netifd: Interface 'wan' is enabled
Sat Jul 23 06:06:55 2022 daemon.notice netifd: Interface 'wan' is setting up now
Sat Jul 23 06:06:55 2022 daemon.err insmod: module is already loaded - slhc
Sat Jul 23 06:06:55 2022 daemon.err insmod: module is already loaded - ppp_generic
Sat Jul 23 06:06:55 2022 daemon.err insmod: module is already loaded - pppox
Sat Jul 23 06:06:55 2022 daemon.err insmod: module is already loaded - pppoe
Sat Jul 23 06:06:55 2022 daemon.info pppd[8620]: Plugin pppoe.so loaded.
Sat Jul 23 06:06:55 2022 daemon.info pppd[8620]: PPPoE plugin from pppd 2.4.9
Sat Jul 23 06:06:56 2022 daemon.notice pppd[8620]: pppd 2.4.9 started by root, uid 0
Sat Jul 23 06:07:03 2022 daemon.err uwsgi[2175]: *** has_emperor mode detected (fd: 8) ***
Sat Jul 23 06:07:03 2022 daemon.err uwsgi[2175]: [uWSGI] getting INI configuration from /etc/uwsgi/vassals/luci-cgi_io.ini
Sat Jul 23 06:07:03 2022 daemon.err uwsgi[2175]: Sat Jul 23 06:07:03 2022 - [emperor] vassal /etc/uwsgi/vassals/luci-cgi_io.ini has been spawned
[ 1170.051556] warning: catch unregister event for dev=eth0.2
[ 1170.051597] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1170.237809] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1170.237851] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
[ 1185.885912] warning: catch unregister event for dev=eth0.2
[ 1185.885953] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1186.048057] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1186.048122] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
[ 1201.697516] warning: catch unregister event for dev=eth0.2
[ 1201.697559] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1201.858264] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1201.858308] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
[ 1217.538957] warning: catch unregister event for dev=eth0.2
[ 1217.539007] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1217.727998] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1217.728037] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
[ 1233.356544] warning: catch unregister event for dev=eth0.2
[ 1233.356587] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1233.498983] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1233.499041] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
[ 1249.119550] warning: catch unregister event for dev=eth0.2
[ 1249.119604] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1249.337836] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1249.337884] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook
[ 1265.068138] warning: catch unregister event for dev=eth0.2
[ 1265.068201] {natflow}:natflow_netdev_event(): catch NETDEV_UNREGISTER event for dev=eth0.2
[ 1265.218090] warning: (zone_netdev_event:345)dev=eth0.2 set zone=127 type=0
[ 1265.218133] {natflow}:natflow_netdev_event(): catch NETDEV_UP event for dev=eth0.2(tso=1,1,hw_csum=1,1), add ingress hook

I restart wan interface many times, waiting for a hour but issue still happened.

Allow packages to be hosted on Github?

I am unable to install kmod packages from opkg because of kernel version mismatch.
Can you upload all kmod packages built from source on github, every time a build occurs?

Router settings isn't saved upon reboot

x-wrt-21.10-b202112181729-ramips-mt7620-xiaomi_miwifi-r3-squashfs-sysupgrade.bin
Router settings isn't saved upon reboot. Also Network Shares doesn't show folders/files in Chinese font.

GL-MT6000 + X-Wrt(23.10_b202311141826) 启用转发加速(natflow) 影响tcp传输

型号 GL.iNet GL-MT6000
架构 ARMv8 Processor rev 4
目标平台 mediatek/filogic
固件版本 X-WRT 23.10_b202311141826 Lunar / LuCI Master git-23.317.86009-e30c777
内核版本 5.15.138

2023-11-16_021546
2023-11-16_020008
转发加速(natflow)启用时,外部网络访问本地的http串流(tcp协议),传输速度只有十几/几十KB/s

2023-11-16_021925
三个「转发加速」均启用后情况也是一样

2023-11-16_021528
2023-11-16_015803
转发加速(natflow)禁用后,外部网络可流畅访问本地http串流(视频码率约为10Mbps,传输速度能达到1.2MB/s)

但试过开启转发加速跑Speedtest-X测速或者rdp连接后播放视频都没有问题,就是上面的串流播放发现有问题,麻烦大佬帮忙排查一下,感谢!

mi router R3 no internet on any build after 22.03_b202209152117

I am experiencing no internet on any build after 22.03_b202209152117. My device is Xiaomi R3, system responds very slow on any other build. tried the latest build as of today 15-Nov-2023 23.10 version, found internet status ok, but no internet any connected devices, wired or wireless. Issue seems very strange, tried restarting multiple times too.

mediatek mt7915e firmware instability

Hello, I've tested nearly all your releases for my WSM20 machines - but current releases has latest mediatek firmware (mt7915e) from 202310xxx. I've noticed that it generates problems with wifi - timeouts and wifi is not working normally. I've uploaded older firmware from 20230418xxx - and after 1 day it is working good. I'll be informing is that better for longer periods.
Maybe it is more safe to get back to this firmware on that routers.
Regards

Xiaomi Router 4a (100M) Crashing issue during boot up

I have both the China and International version of the router, both prebuilt firmware available for download cause the router to basically crash with steady Orange Light. The odds of it happening is like out of 10 power cycles, 7 causes it to crash while the other 3 other ones not cause any crash.

The only solution so far is basically remove all the suspected bloat on the firmware as soon as your able to get in to the openwrt web interface:

  • xwan
  • mwan3
  • natcap
  • upnp
  • fakemesh
  • (and others that I cant remember)

after removing the bloats, 10 out of 10 of the power cycles now result without any crashes.

It would be great if you remove all of those on future firmware files.

关于x-wrt的疑问

1.x-wrt 内核比较lean的新 但是驱动太老 能否优化下驱动,驱动可以参考lean的源码中的驱动
他的驱动是从第三方github导入的;
2.x-wrt怎么github action全自动编译某个机型固件,例如我想编译hc5962并进行定制,麻烦出个示例;
3.x-wrt建议添加 上网时间控制插件 还有定时wifi插件 这两个大多数有需求;
4. x-wrt能否添加 开发者模式 在此模式下可以安装软件包,可在luci系统中添加此选线 如果选中开启此模式的话 可以放出软件包的菜单 ;
5.提个bug 其实改动比较麻烦 就是在系统无线中修改了无线ssid和密码等信息,但是设置向导中还显示默认的,可以做成空的 用户必填 否则不使用此功能(无法点击保存或者保存应用按钮)

full cone nat test failed

X-WRT 8.0_b202008301032 Focal r14416-12c1ef428d on netgear R6100, with "full cone nat" ON by default. But the STUN test is still PortRestrictedCone.
How to enable full cone nat?

MultiWAN管理器能否复用防火墙里配置的ipset?

固件版本:X-WRT 23.10_b202311141826 Lunar
防火墙 - IP 集合 里面能通过选取上传的文件配置 ipset,但 MultiWAN管理器 - 规则 里面的「IP配置」却不见有防火墙里配置的ipset可选,请问有什么便捷方法给MultiWAN管理器配置ipset?谢谢

phicomm_k3

X-WRT 23.06_b202310051156
k3 安装zerotier 安装不了 好像却少依赖

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.