jow wrote:You can try this as quick hack:
mv /dev/random /dev/random.orig
ln -s /dev/urandom /dev/random
Thanks your hack seems is working 
But I wonder if that has seriuos issues about security, what do you think about it?
And why does it occur? Is that a bug?
Thanks in advance!
Edit:
Well sadly and really is not working:
Mar 27 03:00:39 OpenWrt user.info kernel: device eth0.2 left promiscuous mode
Mar 27 03:02:39 OpenWrt user.err kernel: ath: DMA failed to stop in 10 ms AR_CR=0x00000024 AR_DIAG_SW=0x42000020 DMADBG_7=0x00026040
Mar 27 03:02:39 OpenWrt user.err kernel: ath: Could not stop RX, we could be confusing the DMA engine when we start RX up
Mar 27 03:02:52 OpenWrt user.info kernel: device wlan0 left promiscuous mode
Mar 27 03:02:52 OpenWrt user.info kernel: br-lan: port 2(wlan0) entering disabled state
Mar 27 03:02:56 OpenWrt user.err kernel: ath: Failed to stop TX DMA!
Mar 27 03:02:56 OpenWrt user.err kernel: ath: Failed to stop TX DMA!
Mar 27 03:02:57 OpenWrt user.info kernel: device wlan0 entered promiscuous mode
Mar 27 03:02:57 OpenWrt user.info kernel: br-lan: port 2(wlan0) entering forwarding state
Mar 27 03:02:57 OpenWrt daemon.info hostapd: wlan0: RADIUS Authentication server x.x.x.x:1812
Mar 27 03:02:59 OpenWrt user.info kernel: device wlan0 left promiscuous mode
Mar 27 03:02:59 OpenWrt user.info kernel: br-lan: port 2(wlan0) entering disabled state
Mar 27 03:02:59 OpenWrt user.info kernel: device wlan0 entered promiscuous mode
Mar 27 03:02:59 OpenWrt user.info kernel: br-lan: port 2(wlan0) entering forwarding state
I had no such a issue on rc4 
(Last edited by sebelk on 19 Jul 2011, 13:17)