What's new

Custom firmware build for R9000/R8900 v. 1.0.4.39.1HF

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Voxel

Part of the Furniture
Stay at home please, torment your router, save you family. COVID-19 it is seriously.

Now: You have a lot what to do. This is important release. Mainly because of using new Toolchain including significant changes such as latest GCC compiler v 9.3.0 released Mar 12, 2020 instead of old 4.8.5 (2015).

https://gcc.gnu.org/gcc-9/

Goal is obvious: additional performance boost because of modern compiler optimization.

Continuation of:

https://www.snbforums.com/threads/custom-firmware-build-for-r9000.40125/
. . .
https://www.snbforums.com/threads/custom-firmware-build-for-r9000-r8900-v-1-0-4-38-1hf.62549/
https://www.snbforums.com/threads/custom-firmware-build-for-r9000-r8900-v-1-0-4-38-3hf.62650/

New version of my custom firmware build: 1.0.4.39.1HF.

Changes (vs 1.0.4.38.3HF):

1. Toolchain: GCC is upgraded 4.8.5->9.3.0.
2. Toolchain: binutils version is upgraded 2.32->2.34.
3. Toolchain: Go is upgraded 1.13.8->1.14.1.
4. NG/DNI bug in radvd is fixed (reported by microchip)
5. nano package is added (editor).
6. NG/DNI bug in UPG_upgrade.htm is fixed (by Kamoj).
7. transmission package is changed to use OpenSSL v. 1.0.2 (attept to fix https issue).
8. wireguard package is upgraded 0.0.20200215->0.0.20200318.
9. wireguard-tools package is upgraded 1.0.20200206->1.0.20200319.
10. libgcrypt sqlite3 wget packages: optimize for a size.
11. OpenSSL v. 1.1.1 package is upgraded 1.1.1d->1.1.1e.
12. DNSCrypt Proxy v.2 is upgraded 2.0.39->2.0.42.
13. bc package is upgraded 1.06->1.06.95.
14. libreadline package is upgraded 5.2->6.3.
15. libdevmapper package is upgraded 2.02.91->2.02.119.
16. e2fsprogs package is upgraded 1.45.5->1.45.6.
17. Changes in the Linux kernel and in many packages to provide compilation by GCC 9.3.0.

The link is:

https://www.voxel-firmware.com (thanks to vladlenas for his help with hosting).

Voxel.
 
Last edited:
@Voxel with this release, I want to buy a compatible NG router just to torment it! :)

Great updates and options for the NG community from you. Keep yourself and your family safe too! :)
 
Upgraded to this version, the only thing I became aware after reinstalling Kamoj's addon was the change to YeAH from Westwood for Congestion control.
Which is the correct setting? If any.

That sort of thing goes a bit outside my realm of knowledge, google searches give various opinions and something called TCP BBR, which isn't in this FW.
 
Upgraded to this version, the only thing I became aware after reinstalling Kamoj's addon was the change to YeAH from Westwood for Congestion control.
Which is the correct setting? If any.

That sort of thing goes a bit outside my realm of knowledge, google searches give various opinions and something called TCP BBR, which isn't in this FW.

Sorry, I forgot to add into release notes. YeAH was set as default in 39.1HF...

You may switch to Westwood+.

Voxel.
 
Hello Voxel,

Thank you for the good work you are doing on R9000 and keeping it current with NG bugs out. Regards.

Roger12
 
I lost power to my R9000 and found it lost all settings afterward on this version - can anyone confirm/deny the same? It goes right back into factory setup every time for me.
 
Hello,

Does any one know how to Disable WPS on R9000? I can't find a setting to completely disable WPS on R9000. I am running Voxel. Thanks.

Roger12
 
Hello,

Does any one know how to Disable WPS on R9000? I can't find a setting to completely disable WPS on R9000. I am running Voxel. Thanks.

Roger12


Advanced > Advanced Setup > Wireless Settings > WPS Settings
disable router's PIN
 
firmware del router V1.0.4.39.1HF
Kamoj Add-on V5.1b9-1
R9000
OS log--->I only paste a piece of it, what can it be?

20814:[wifi1] FWLOG: [21336576] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20815:[wifi1] FWLOG: [21337600] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20910:[wifi0] FWLOG: [21435650] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20911:[wifi0] FWLOG: [21436674] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20915:[wifi0] FWLOG: [21440771] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20916:[wifi0] FWLOG: [21441795] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20930:[wifi0] FWLOG: [21456131] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20931:[wifi0] FWLOG: [21457155] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20965:[wifi1] FWLOG: [21491205] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20967:[wifi1] FWLOG: [21493253] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20970:[wifi1] FWLOG: [21496325] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20972:[wifi1] FWLOG: [21498373] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
20973:[wifi1] FWLOG: [21499398] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20974:[wifi1] FWLOG: [21500421] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20976:[wifi1] FWLOG: [21502469] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20977:[wifi1] FWLOG: [21503493] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20978:[wifi1] FWLOG: [21504517] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20979:[wifi1] FWLOG: [21505541] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
20980:[wifi1] FWLOG: [21506565] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
20981:[wifi1] FWLOG: [21507590] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
20983:[wifi1] FWLOG: [21509638] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20986:[wifi1] FWLOG: [21512710] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
20988:[wifi1] FWLOG: [21514758] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
20990:[wifi1] FWLOG: [21516806] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
20991:[wifi1] FWLOG: [21517830] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
20992:[wifi1] FWLOG: [21518854] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
20994:[wifi1] FWLOG: [21520902] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
20995:[wifi1] FWLOG: [21521926] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21001:[wifi1] FWLOG: [21528070] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21002:[wifi1] FWLOG: [21529094] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21003:[wifi1] FWLOG: [21530118] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
21004:[wifi1] FWLOG: [21531142] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21005:[wifi1] FWLOG: [21532166] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21006:[wifi1] FWLOG: [21533190] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21007:[wifi1] FWLOG: [21534214] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
21009:[wifi1] FWLOG: [21536263] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21010:[wifi1] FWLOG: [21537286] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21013:[wifi1] FWLOG: [21540359] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21016:[wifi1] FWLOG: [21543431] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21017:[wifi1] FWLOG: [21544455] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21018:[wifi1] FWLOG: [21545479] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
21019:[wifi1] FWLOG: [21546503] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21021:[wifi1] FWLOG: [21548551] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21022:[wifi1] FWLOG: [21549575] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21025:[wifi1] FWLOG: [21552647] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
21026:[wifi1] FWLOG: [21553671] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
21027:[wifi1] FWLOG: [21554695] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
21029:[wifi1] FWLOG: [21556743] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
21030:[wifi1] FWLOG: [21557767] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
21031:[wifi1] FWLOG: [21558791] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
21033:[wifi0] FWLOG: [21561606] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
21033:[wifi1] FWLOG: [21560839] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
21034:[wifi0] FWLOG: [21562630] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
21036:[wifi1] FWLOG: [21563911] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
21037:[wifi1] FWLOG: [21564936] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
21038:[wifi1] FWLOG: [21565959] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
21050:[wifi1] FWLOG: [21578248] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
21052:[wifi1] FWLOG: [21580296] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x2, 0x0 )
21053:[wifi1] FWLOG: [21581320] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x3, 0x0 )
21054:[wifi1] FWLOG: [21582344] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21055:[wifi1] FWLOG: [21583368] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21059:[wifi1] FWLOG: [21587464] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21061:[wifi1] FWLOG: [21589512] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21062:[wifi1] FWLOG: [21590536] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21063:[wifi1] FWLOG: [21591560] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21065:[wifi1] FWLOG: [21593608] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21067:[admin login] from source 10.0.0.2,
21067:[wifi1] FWLOG: [21595656] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21068:[wifi1] FWLOG: [21596680] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21069:[wifi1] FWLOG: [21597705] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21072:[wifi1] FWLOG: [21600776] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21073:[wifi1] FWLOG: [21601800] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21074:[wifi1] FWLOG: [21602824] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21075:[wifi1] FWLOG: [21603848] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21076:[wifi1] FWLOG: [21604872] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21078:[wifi1] FWLOG: [21606921] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21079:[wifi1] FWLOG: [21607945] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21080:[wifi1] FWLOG: [21608969] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21082:[wifi1] FWLOG: [21611017] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21086:[wifi1] FWLOG: [21615113] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21088:[wifi1] FWLOG: [21617161] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21089:[wifi1] FWLOG: [21618185] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21090:[wifi1] FWLOG: [21619209] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21093:[wifi1] FWLOG: [21622281] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21094:[wifi1] FWLOG: [21623305] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21096:[DoS Attack: TCP/UDP Chargen] from source: 35.211.182.206, port 40862,
21097:[wifi1] FWLOG: [21626377] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21098:[wifi1] FWLOG: [21627401] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x4, 0x0 )
21100:[wifi1] FWLOG: [21629449] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21101:[wifi1] FWLOG: [21630473] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21102:[wifi1] FWLOG: [21631497] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21103:[wifi1] FWLOG: [21632522] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21104:[wifi1] FWLOG: [21633545] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21105:[wifi1] FWLOG: [21634569] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21107:[wifi1] FWLOG: [21636617] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
21108:[wifi1] FWLOG: [21637641] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x6, 0x0 )
21109:[wifi1] FWLOG: [21638666] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x5, 0x0 )
 
See my reply from last time you asked the same question:
https://www.snbforums.com/threads/kamoj-add-on-5-1-beta-testing-poll.62315/page-2#post-562673
https://www.snbforums.com/threads/kamoj-add-on-5-1-beta-testing-poll.62315/page-2#post-562700
If my previous answer was no good, please try google it and report back here when you know what it can be.:)

Or if we are lucky someone in this thread know what it can be!:cool:

firmware del router V1.0.4.39.1HF
Kamoj Add-on V5.1b9-1
R9000
OS log--->I only paste a piece of it, what can it be?

20814:[wifi1] FWLOG: [21336576] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20815:[wifi1] FWLOG: [21337600] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20910:[wifi0] FWLOG: [21435650] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
20911:[wifi0] FWLOG: [21436674] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x0, 0x0 )
20915:[wifi0] FWLOG: [21440771] WAL_DBGID_XCESS_FAILURES ( 0xffff, 0x1, 0x0 )
 
See my reply from last time you asked the same question:
https://www.snbforums.com/threads/kamoj-add-on-5-1-beta-testing-poll.62315/page-2#post-562673
https://www.snbforums.com/threads/kamoj-add-on-5-1-beta-testing-poll.62315/page-2#post-562700
If my previous answer was no good, please try google it and report back here when you know what it can be.:)

Or if we are lucky someone in this thread know what it can be!:cool:

tests carried out, if I turn off the wifi all the errors disappear, as when the wifi is turned on they return
 
Hi!
Running entware from 'tmp/plexmediaserver'
lrwxrwxrwx 1 root root 4 Apr 12 10:42 /opt/var -> /tmp
lrwxrwxrwx 1 root root 4 Apr 12 11:17 /opt/tmp -> /tmp
lrwxrwxrwx 1 root root 34 Apr 12 11:30 /opt/share -> /tmp/plexmediaserver/entware/share
lrwxrwxrwx 1 root root 32 Apr 12 11:31 /opt/etc -> /tmp/plexmediaserver/entware/etc
lrwxrwxrwx 1 root root 33 Apr 12 11:31 /opt/home -> /tmp/plexmediaserver/entware/home
lrwxrwxrwx 1 root root 33 Apr 12 11:31 /opt/root -> /tmp/plexmediaserver/entware/root
lrwxrwxrwx 1 root root 32 Apr 12 11:32 /opt/lib -> /tmp/plexmediaserver/entware/lib
lrwxrwxrwx 1 root root 32 Apr 12 11:32 /opt/bin -> /tmp/plexmediaserver/entware/bin
lrwxrwxrwx 1 root root 33 Apr 12 11:32 /opt/sbin -> /tmp/plexmediaserver/entware/sbin
lrwxrwxrwx 1 root root 32 Apr 12 11:32 /opt/usr -> /tmp/plexmediaserver/entware/usr

df -m
ubi1: plexmediaserver 257 46 207 18% /tmp/plexmediaserver

Running following services:
Thu Jan 1 00:00:11 UTC 1970 Entware services are started from /tmp/plexmediaserver!
Setting up swapspace version 1, size = 2147479553 bytes
Sun Apr 12 11:29:17 UTC 2020 Enabled swap #4
Starting rsync... done.
Starting netdata... done.
Starting unbound... done.
Starting minidlna... done.
Starting emailrelay... done.

Content of '/tmp/plexmediaserver' survived flashing official Netgear(1.0.5.14) & Voxel firmware!
Stay home & safe!
 

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top