Posted: Wed May 01, 2024 15:01 Post subject: New Build - 05/01/2024 - r56119
Welcome to Atheros r56119 beta release thread for reporting, feedback to developers and community benefit.
Please do not flash builds until installation is understood, risks involved and device specificrecovery methods.
Avoid discussions, create threads for questions, general problems or use search; this thread is not for support.
List router model & version or revision, operating & wireless modes & exact filename/firmware image flashed.
CLI Flash: 'cd /tmp' then 'wget {file URL}' (httponly) or 'curl -O {file URL}' (http, https, ftp) 'write {file} linux' then 'reboot'.
Issues, observations, and/or workarounds reported:
• WebUI: Clear history or use a portable. Temporary cache bypass: Ctrl+F5, Cmd+Shift+R or new private window/incognito.
• Please report findings with steps needed to reproduce, configuration, clients, output, logs and important information below!
Important:
• Detail issues & relevant configs, logs: syslog klog 'dmesg' 'cat /tmp/var/log/messages' nvram set console_debug=1, serial.
• Firewall NAT: 'iptables -vnL' 'iptables -t nat -vnL' 'iptables -t mangle -vnL' & 'cat /tmp/.ipt'. Debug Analyze: stracetcpdump.
• Gremlins: reboot. cold boot. Reset & reconfigure not restore backup. Search Trac & discuss in forum before opening tickets.
• Include operating & wireless modes (e.g. Gateway, Router, AP, SB, WDS, Mesh) and applicable configurations to reproduce.
Linksys EA8500...main gateway
DD-WRT v3.0-r56119 std (05/01/24)
Linux 6.1.89-rt28 #13 SMP Tue Apr 30 16:14:47 +07 2024 arm
scp 'firmware.bin' install over r53562
worky great so far -- up 11:45
#
Netgear WNDR3700 V4
DD-WRT v3.0-r56119 std (05/01/24)
Linux 3.18.140-d6 #200437 Wed May 1 06:54:55 +07 2024 mips
scp 'firmware.bin' install over r56029
WAP + OVPN server
all good -- up 11:50
#
Linksys E2100L
DD-WRT v3.0-r56119 std (05/01/24)
Linux 3.10.108-d11 #159690 Wed May 1 04:37:14 +07 2024 mips
GUI install over install over r56029
WAP + OVPN server
all good -- up 11:36
#
Linksys WRT160NL
DD-WRT v3.0-r56119 std (05/01/24)
Linux 3.10.108-d11 #159686 Wed May 1 04:31:49 +07 2024 mips
GUI install over install over r56029
WAP + OVPN server
all good -- up 11:35
Router/Version: Netgear R7500v2
Kernel: Linux 6.1.89-rt28 #13 SMP Tue Apr 30 16:14:47 +07 2024 arm
Previous/Reset: 56029 / No Reset
Mode: Gateway+AP, SFE Disabled, STP Disabled, Wifi 5(VANILLA)/2.4(VANILLA) Main+Guest(VAP), DNSMasq, USB(3.2, Ext2)/Entware, DNSCrypt, NAS/Samba, Static & DHCP, SSH, FTP, QoS (WAN) HFSC+FQ_CODEL using MAC.
Issues/Errors: Upgraded ok. Listed some oddities in the syslog that don't seem to have caused any problems.
Thanks to BS and crew for all your good work.
SQUASHFS:
Code:
May 1 12:00:07 192.168.1.1 user info [flash] : write block [26869760] at [0x019A0000]
May 1 12:00:07 192.168.1.1 user info [flash] : write block [27000832] at [0x019C0000]
May 1 12:00:07 192.168.1.1 user info [flash] : write block [27131904] at [0x019E0000]
May 1 12:00:07 192.168.1.1 user info [flash] : write block [27262976] at [0x01A00000]
May 1 12:00:07 192.168.1.1 user info [flash] : done [27394048]
May 1 12:00:08 192.168.1.1 kern err kernel [322042.380702] SQUASHFS error: Failed to read block 0x15d8b60: -5
May 1 12:00:08 192.168.1.1 kern err kernel [322042.380714] SQUASHFS error: Unable to read metadata cache entry [15d8b5e]
May 1 12:00:08 192.168.1.1 kern err kernel [322042.380720] SQUASHFS error: Unable to read directory block [15d8b5e:7c4]
This appears several times during the boot:
Code:
Jan 1 00:00:29 192.168.1.1 kern err kernel [ 29.635510] debugfs: File 'virt_if' in directory 'stats' already present!
Same Exception as in previous version:
Code:
Jan 1 00:00:43 192.168.1.1 user info [sfe] : shortcut forwarding engine successfully stopped
Jan 1 00:00:43 192.168.1.1 kern err kernel [ 43.666657] INFO: trying to register non-static key.
Jan 1 00:00:43 192.168.1.1 kern err kernel [ 43.666663] The code is fine but needs lockdep annotation, or maybe
Jan 1 00:00:43 192.168.1.1 kern err kernel [ 43.666665] you didn't initialize this object before use?
Jan 1 00:00:43 192.168.1.1 kern err kernel [ 43.666667] turning off the locking correctness validator.
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666671] CPU: 0 PID: 2077 Comm: tc Not tainted 6.1.89-rt28 #13
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666680] Hardware name: Generic DT based system
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666683] Backtrace:
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666689] [<c0b759b8>] (dump_backtrace.lto_priv.0) from [<c0b860e8>] (dump_stack_lvl+0x48/0x54)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666722] r7:c10cb198 r6:c8175424 r5:20000093 r4:c0d6ea48
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666724] [<c0b860a0>] (dump_stack_lvl) from [<c0b8610c>] (dump_stack+0x18/0x1c)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666736] r5:00000000 r4:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666739] [<c0b860f4>] (dump_stack) from [<c0368f60>] (register_lock_class.lto_priv.0+0x5ec/0x604)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666758] [<c0368974>] (register_lock_class.lto_priv.0) from [<c0b5af14>] (__lock_acquire.isra.0+0x4c/0x4e0)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666786] r10:00000002 r9:c8175424 r8:c81afb50 r7:60000093 r6:00000000 r5:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666791] r4:c201ec80
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666794] [<c0b5aec8>] (__lock_acquire.isra.0) from [<c0b117d4>] (lock_acquire.constprop.0+0x9c/0xe8)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666812] r10:c682a010 r9:c8175420 r8:c81afb50 r7:60000093 r6:00000000 r5:c81afa88
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666815] r4:c0f407c8
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666817] [<c0b11738>] (lock_acquire.constprop.0) from [<c035e67c>] (seqcount_lockdep_reader_access.lto_priv.0.lto_priv.0+0x38/0x50)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666842] r7:c682a000 r6:60000013 r5:c089ae38 r4:c8175424
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666845] [<c035e644>] (seqcount_lockdep_reader_access.lto_priv.0.lto_priv.0) from [<c089ae38>] (hfsc_dump_class_stats+0x84/0x1e4)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666872] r6:00000000 r5:c81afb50 r4:c8175400
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666876] [<c089adb4>] (hfsc_dump_class_stats) from [<c0869d8c>] (tc_fill_tclass+0x16c/0x224)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666895] r9:c0bf4e88 r8:c81afb50 r7:c682a000 r6:c81ed000 r5:c758c540 r4:c682a000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666898] [<c0869c20>] (tc_fill_tclass) from [<c086fca8>] (tc_ctl_tclass+0x1f4/0x51c)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666916] r10:c758c540 r9:c81ed000 r8:00010001 r7:0000081d r6:c81afcd8 r5:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666921] r4:c81bf000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666923] [<c086fab4>] (tc_ctl_tclass) from [<c0843904>] (rtnetlink_rcv_msg+0x144/0x3b8)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666942] r10:00000000 r9:00000000 r8:c12f94cc r7:00000000 r6:c758cd80 r5:00000018
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666945] r4:c81bf000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666949] [<c08437c0>] (rtnetlink_rcv_msg) from [<c0843bc4>] (rtnetlink_rcv+0x4c/0x118)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666963] r10:c81e9a44 r9:7fffffff r8:00000000 r7:c81bf000 r6:c758cd80 r5:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666966] r4:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666968] [<c0843b78>] (rtnetlink_rcv) from [<c08bc8c0>] (netlink_unicast.lto_priv.0+0x508/0x558)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666986] r7:c1819000 r6:00000054 r5:c81e9800 r4:c758cd80
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.666988] [<c08bc3b8>] (netlink_unicast.lto_priv.0) from [<c08bcacc>] (netlink_sendmsg+0x1bc/0x380)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667001] r10:00000000 r9:c81aff50 r8:c81e9800 r7:c758cd80 r6:00000054 r5:c81aff40
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667005] r4:00000054
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667008] [<c08bc910>] (netlink_sendmsg) from [<c0805398>] (____sys_sendmsg.lto_priv.0+0x218/0x22c)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667025] r10:00000054 r9:c29cbb80 r8:c81afdd0 r7:00000000 r6:00000000 r5:c08bc910
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667029] r4:c81aff40
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667031] [<c0805180>] (____sys_sendmsg.lto_priv.0) from [<c0805584>] (___sys_sendmsg.lto_priv.0+0x1d8/0x308)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667045] r10:7ffff000 r9:00000000 r8:00000001 r7:00000000 r6:c29cbb80 r5:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667049] r4:c81aff40
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667051] [<c08053ac>] (___sys_sendmsg.lto_priv.0) from [<c08057b0>] (sys_sendmsg+0xfc/0x124)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667064] r10:00000128 r9:c201ec80 r8:c0300254 r7:c29cbb80 r6:00000000 r5:bea79ca4
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667068] r4:00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667070] [<c08056b4>] (sys_sendmsg) from [<c0300080>] (ret_fast_syscall+0x0/0x1c)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667082] Exception stack(0xc81affa8 to 0xc81afff0)
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667088] ffa0: 00000000 00000000 00000003 bea79ca4 00000000 00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667094] ffc0: 00000000 00000000 bea79ca8 00000128 0002be58 0000002d 00000000 00000000
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667098] ffe0: bea79c50 bea79c40 b6f85730 b6f84c00
Jan 1 00:00:43 192.168.1.1 kern warning kernel [ 43.667103] r7:00000128 r6:bea79ca8 r5:00000000 r4:00000000