Hey guys, first of all thank you for the hard work. I'll be installing this for the first time and I'm pretty new to OpenWRT so let me know if you need any particular logs / etc.
Thanks agian.
Hey guys, first of all thank you for the hard work. I'll be installing this for the first time and I'm pretty new to OpenWRT so let me know if you need any particular logs / etc.
Thanks agian.
Have now. Just noticed this on my U6+:
[2043880.286635] ieee80211 phy0: WA: free done event
[2043880.286635] 1022c280
[2043880.286635] len = 44
[2043880.286635] DW0 : 2c 00 07 30
[2043880.286635] DW1 : 04 99 b4 0e
[2043880.286635] DW2 : 00 80 01 89
[2043880.286635] DW3 : 00 00 00 41
[2043880.286635] DW4 : 12 80 ff 3f
[2043880.286635] DW5 : 00 00 00 41
[2043880.286635] DW6 : 13 00 0a 00
[2043880.286635] DW7 : 00 00 00 41
[2043880.286635] DW8 : 15 00 0b 00
[2043880.286635] DW9 : 00 00 00 41
[2043880.286635] DW10 : 17 00 0c 00
[2237026.460205] ieee80211 phy0: WA: free done event
[2237026.460205] 10224580
[2237026.460205] len = 24
[2237026.460205] DW0 : 18 00 03 30
[2237026.460205] DW1 : 01 39 24 66
[2237026.460205] DW2 : 00 40 01 90
[2237026.460205] DW3 : 03 c4 12 41
[2237026.460205] DW4 : 23 00 12 00
[2237026.460205] DW5 : b1 84 ff 3f
[2237952.147595] ieee80211 phy0: WA: free done event
[2237952.147595] 1022db80
[2237952.147595] len = 24
[2237952.147595] DW0 : 18 00 03 30
[2237952.147595] DW1 : 01 af 64 61
[2237952.147595] DW2 : 00 40 01 90
[2237952.147595] DW3 : 04 28 3f 41
[2237952.147595] DW4 : 24 00 13 00
[2237952.147595] DW5 : cb 8f ff 3f
[2237956.007201] ieee80211 phy0: WA: free done event
[2237956.007201] 1022b600
[2237956.007201] len = 24
[2237956.007201] DW0 : 18 00 03 30
[2237956.007201] DW1 : 01 dd 14 39
[2237956.007201] DW2 : 00 40 01 90
[2237956.007201] DW3 : 03 34 40 41
[2237956.007201] DW4 : 20 80 11 00
[2237956.007201] DW5 : 0c 90 ff 3f
[2237956.239859] ieee80211 phy0: WA: free done event
[2237956.239859] 1022bc40
[2237956.239859] len = 20
[2237956.239859] DW0 : 14 00 01 30
[2237956.239859] DW1 : 01 e6 84 56
[2237956.239859] DW2 : 00 c0 87 81
[2237956.239859] DW3 : c7 50 00 41
[2237956.239859] DW4 : 0a 80 ff 3f
This is a while ago now and I can't see anything wrong with any of the radios at the momemt. Can't say I noticed anything when it happened either, but I probably wouldn't if it's a temporary problem.
Interesting that this should happen with the 2.4GHz radio, which I'm only using for a few low speed IOT devices.
Might be relevant: Flashing with stock firmware 6.6.55 did not work (ended up in TFTP recovery. I tried two times).
Downgrading to 6.5.64 with TFTP and then attempting the flash worked first try.
And by "did not work" you are meaning that the actual flashing worked but failed to boot? You wouldn't happen to have a console log from that?
If this is the case, then I assume they've made some changes to the bootloader which makes our procedure fail. AFAIK, stock upgrades/downgrades will rewrite the bootloader too.
Thanks for sharing. Very good to know. Then there's no crisis.
Yes exactly. After the reboot it is stuck in the white-blue-off TFTP pattern.
No I don't have a bootlog. It's not my device and I did not see an easy, nondestructive way of opening it up.
This is very relevant, thank you for sharing.
Fortunately this provides an avenue for us to test what's different between stock firmware versions without bricking the device. I don't have a spare U6+ to try this on though, so this will have to wait until later (unless @bmork is willing to take up this task). I wonder if there were any changes to the "bootcmd_real" stuff we encountered the last time we poked around the bootloader.
For now we're just going to have to instruct new users to downgrade the stock firmware to 6.5.64 first before proceeding.
Unfortunately I'm in the same situation. Depending on my only U6+ for everyday use. Reverting to stock for a test isn't something I easily can do anymore.
I might get a spare one next week. Is there a relatively nice way to open it without completly destroying the case?
The case is two pieces held together with 5 snap-in tabs equally spaced around the circumference. The pieces are very durable. The back is metal, and the front is seriously tough plastic. I've opened mine up three times without breaking any of the tabs, and I think I've used way more force than I was comfortable with. And because the gap separating the two pieces face away from the front, even minor cosmetic damage to the plastic part can easily be hidden.
Basically use something like these iFixit tools or this other iFixit toolkit and pry away. If you're in the USA, your local Micro Center or Ace Hardware might have them in stock.
The UART pins are not populated, so you either need to solder in pin headers or use fishing wire to hold jumpers in place or whatever jig you can set up.
I have the same experience. These things are much easier to open than they seem. Exactly like the U6 Lite. Here are a few pictures I took when I opened mine, showing where the tabs are. And also showing the serial pinout. Note that I connect Vcc because I use a bluetooth UART module. You don't want to do that if you are using a regular USB module.
So...
I finally came around to opening one up (thanks for the images, it actually was way easier than many other devices without screws), updating it to 6.6.55 and trying to do the flash to OpenWrt.
And you know what? It just worked...
On one hand I'm glad, on the other I'm now wondering what might have caused this ^^'
We did have a unifi controller on the same network as the AP when originally testing so that might have been the culprit (I don't have one here to verify that though).
This time I had it directly connected to my PC though a PoE injector and fresh out of the box (I took it out of the box, put it into TFTP mode, opened the case, attached a USB/UART adapter, flashed 6.6.55 and then did the OpenWrt install as described in the commit).
This is the exact procedure I used when testing my OpenWrt install on U6+, so I'm happy to hear that it still works. We should spell this out explicitly as the recommended procedure moving forward, simply to minimize any possible interactions with the LAN during the installation.
Today I have successfully installed Openwrt based on @elbertmai commited guide.
My observations at installing Openwrt:
my device was shipped with unifi firmware 6.5.28. I tried to install Openwrt on this unifi firmware, even if all check outputs seemed ok, after installing openwrt the device was not able to boot. Unfortunately I don't have connected serial console, so I don't know why the device stopped boot.
Then I did recovery TFTP procedure and install inifi firmware 6.5.54
Install Openwrt was successfull and now is able to boot with openwrt, so thank you @elbertmai
Actually I'm facing an issue vlan config in /etc/config/network
My idea is use default interface eth0 as untagged (just for MGMT purposes) and a VLAN tag 2 just for wifi clients traffic. I tried to configure this (see below), but br-lan-ap with eth0.2 is not actvated (commands (brctsl show, ip link) shows only eth0 and 'br-lan'
config device
option name 'br-lan'
option type 'bridge'
list ports 'eth0'
config interface 'lan'
option device 'br-lan'
option proto 'static'
option ipaddr '192.168.1.1'
option netmask '255.255.255.0'
option ip6assign '60'
config device
option name 'br-lan-ap'
option type 'bridge'
list ports 'eth0.2'
config interface 'lan-ap'
option device 'br-lan-ap'
option proto 'none'
Have I missed something at configuring vlan? I applied the similar vlan configuration as described on Assigning VLAN IDs using DSA on devices with one physical port
Glad to hear that the install worked for you!
Setting up VLANs isn't a task specific to U6+, so it'll be better if you asked this question in the Installing and Using OpenWrt forum category. That way more people who can help can take a look at it.
Hi All,
I've just installed openwrt onto my u6+ using the instructions here which went without a hitch. I using a snapshot from the firmware selector (OpenWrt SNAPSHOT r25451-1a69543376 / LuCI Master git-24.067.67942-c68ec2f), and the device was straight out of the box, never used prior.
I have noticed that after approx 24-36 hours of uptime, the wifi performance drops dramatically with high pings, speeds of around 4Mbit (its normally 600Mbit at the place I'm testing it). The connected devices still indicate a good connection on 5Ghz wifi6, but actual network performance is poor. This has happened twice now (I only installed 3 days ago, so it happens every 24-36hrs) the first time it failed completely and I physically rebooted it, the second time, I was still able login and reboot remotely after checking the logs. Nothing stood out in logread or dmesg. As soon as its rebooted, performance is great again.
Has anyone else experienced this? Are there any proprietary components that would be updated if I were to revert to stock and bring it up to date? Are there any other logs I can capture when this happens again?
Thanks,
Dave
I recommend connecting to the U6+ via Ethernet when diagnosing radio issues. If you had another Ethernet-connected access point nearby, this may explain why your second attempt at connecting to U6+ worked.
Please post both the logs here anyway, because what doesn't stand out to you might stand out to one of us. The next time you see this issue, invoke wifi status
via SSH and post the JSON output here. Be sure to redact any keys and passphrases!
Also tell us more about the clients. Are they phones, laptops, desktops, etc? Operating systems, WiFi card manufacturer/model, etc?
The U6+ I have is running r24414-255d5c9bf8, which is quite a while ago. My U6+ appears to work as it should, but I'm not physically located near my U6+ right now to properly test this. It will be quite a while until I'm able to run the latest snapshot. In the meantime, try these things:
Thanks for the reply, I'll try all those things and provide logs next time it happens.
As for the network, this is the only AP in use. I have three SSIDs bridged to three different defined networks (on different vlans). They are lan, iot and guest. lan and guest have the same ssid on both 2.4 and 5ghz. The iot network is 2.4ghz only. Clients are the usual mix of pcs(linux, windows), phones (android), iot devices like tv, vacuum etc. I also have a number of esphome devices (esp8266 and esp32).
I bought the AP to add to my network in addition to my u6-lite (runnning openwrt), but for the moment while testing the u6+ is the only AP in use. The u6-lite has been good for a few years, though I have had the 2.4ghz network fail and require a restart once or twice..
It happened again as expected. My test device is a linux desktop with an msi intel ax200 based pci-e wifi card (but my pixel 6 phone behaved the same). Speeds tests were performed using a 'openspeedtest' docker container on a server on the wired side of the lan. Speeds when everything is working is around 500mbit/s. When it is degraded its much lower, tonight it was approx 40mbit/s download, though interestingly upload was around 150mbit/s.
Disabling 5Ghz to force to 2.4 brought speeds to approx 80mbit/s up/down, though I haven't done this test while everything was fine, so not sure what to expect.
Issuing a 'restart' of the 5.8Ghz radio seemed to help a little, but after a few speed tests downloads were down to 20-40Mbit/s again.
Load and memory use is fine, see pics. I've attached the requested logs. As before, rebooting restores performance.
[ 0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd034]
[ 0.000000] Linux version 6.1.80 (builder@buildhost) (aarch64-openwrt-linux-musl-gcc (OpenWrt GCC 12.3.0 r25451-1a69543376) 12.3.0, GNU ld (GNU Binutils) 2.40.0) #0 SMP Sun Mar 10 19:26:07 2024
[ 0.000000] Machine model: Ubiquiti UniFi 6 Plus
[ 0.000000] Zone ranges:
[ 0.000000] DMA [mem 0x0000000040000000-0x000000004fff7fff]
[ 0.000000] DMA32 empty
[ 0.000000] Normal empty
[ 0.000000] Movable zone start for each node
[ 0.000000] Early memory node ranges
[ 0.000000] node 0: [mem 0x0000000040000000-0x0000000042ffffff]
[ 0.000000] node 0: [mem 0x0000000043000000-0x000000004302ffff]
[ 0.000000] node 0: [mem 0x0000000043030000-0x0000000047c7ffff]
[ 0.000000] node 0: [mem 0x0000000047c80000-0x0000000047ffffff]
[ 0.000000] node 0: [mem 0x0000000048000000-0x000000004fff7fff]
[ 0.000000] Initmem setup node 0 [mem 0x0000000040000000-0x000000004fff7fff]
[ 0.000000] On node 0, zone DMA: 8 pages in unavailable ranges
[ 0.000000] psci: probing for conduit method from DT.
[ 0.000000] psci: PSCIv1.1 detected in firmware.
[ 0.000000] psci: Using standard PSCI v0.2 function IDs
[ 0.000000] psci: MIGRATE_INFO_TYPE not supported.
[ 0.000000] psci: SMC Calling Convention v1.2
[ 0.000000] percpu: Embedded 18 pages/cpu s33896 r8192 d31640 u73728
[ 0.000000] pcpu-alloc: s33896 r8192 d31640 u73728 alloc=18*4096
[ 0.000000] pcpu-alloc: [0] 0 [0] 1
[ 0.000000] Detected VIPT I-cache on CPU0
[ 0.000000] CPU features: detected: GIC system register CPU interface
[ 0.000000] CPU features: kernel page table isolation disabled by kernel configuration
[ 0.000000] alternatives: applying boot alternatives
[ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 64504
[ 0.000000] Kernel command line: console=ttyS0,115200n8 rootwait root=/dev/mmcblk0p7
[ 0.000000] Dentry cache hash table entries: 32768 (order: 6, 262144 bytes, linear)
[ 0.000000] Inode-cache hash table entries: 16384 (order: 5, 131072 bytes, linear)
[ 0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
[ 0.000000] Memory: 240064K/262112K available (8640K kernel code, 902K rwdata, 2492K rodata, 448K init, 304K bss, 22048K reserved, 0K cma-reserved)
[ 0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
[ 0.000000] rcu: Hierarchical RCU implementation.
[ 0.000000] rcu: RCU restricting CPUs from NR_CPUS=4 to nr_cpu_ids=2.
[ 0.000000] Tracing variant of Tasks RCU enabled.
[ 0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 10 jiffies.
[ 0.000000] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
[ 0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
[ 0.000000] GICv3: GIC: Using split EOI/Deactivate mode
[ 0.000000] GICv3: 640 SPIs implemented
[ 0.000000] GICv3: 0 Extended SPIs implemented
[ 0.000000] Root IRQ handler: gic_handle_irq
[ 0.000000] GICv3: GICv3 features: 16 PPIs
[ 0.000000] GICv3: CPU0: found redistributor 0 region 0:0x000000000c080000
[ 0.000000] rcu: srcu_init: Setting srcu_struct sizes based on contention.
[ 0.000000] arch_timer: cp15 timer(s) running at 13.00MHz (phys).
[ 0.000000] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x2ff89eacb, max_idle_ns: 440795202429 ns
[ 0.000000] sched_clock: 56 bits at 13MHz, resolution 76ns, wraps every 4398046511101ns
[ 0.000066] Calibrating delay loop (skipped), value calculated using timer frequency.. 26.00 BogoMIPS (lpj=130000)
[ 0.000074] pid_max: default: 32768 minimum: 301
[ 0.000346] Mount-cache hash table entries: 512 (order: 0, 4096 bytes, linear)
[ 0.000353] Mountpoint-cache hash table entries: 512 (order: 0, 4096 bytes, linear)
[ 0.001125] cacheinfo: Unable to detect cache hierarchy for CPU 0
[ 0.001524] cblist_init_generic: Setting adjustable number of callback queues.
[ 0.001529] cblist_init_generic: Setting shift to 1 and lim to 1.
[ 0.001653] rcu: Hierarchical SRCU implementation.
[ 0.001655] rcu: Max phase no-delay instances is 1000.
[ 0.002011] smp: Bringing up secondary CPUs ...
[ 0.002328] Detected VIPT I-cache on CPU1
[ 0.002381] cacheinfo: Unable to detect cache hierarchy for CPU 1
[ 0.002389] GICv3: CPU1: found redistributor 1 region 0:0x000000000c0a0000
[ 0.002416] CPU1: Booted secondary processor 0x0000000001 [0x410fd034]
[ 0.002475] smp: Brought up 1 node, 2 CPUs
[ 0.002480] SMP: Total of 2 processors activated.
[ 0.002484] CPU features: detected: 32-bit EL0 Support
[ 0.002486] CPU features: detected: CRC32 instructions
[ 0.002515] CPU features: emulated: Privileged Access Never (PAN) using TTBR0_EL1 switching
[ 0.002518] CPU: All CPU(s) started at EL2
[ 0.002520] alternatives: applying system-wide alternatives
[ 0.005778] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[ 0.005795] futex hash table entries: 512 (order: 3, 32768 bytes, linear)
[ 0.005920] pinctrl core: initialized pinctrl subsystem
[ 0.006727] NET: Registered PF_NETLINK/PF_ROUTE protocol family
[ 0.007059] DMA: preallocated 128 KiB GFP_KERNEL pool for atomic allocations
[ 0.007094] DMA: preallocated 128 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
[ 0.007118] DMA: preallocated 128 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
[ 0.007473] thermal_sys: Registered thermal governor 'fair_share'
[ 0.007477] thermal_sys: Registered thermal governor 'bang_bang'
[ 0.007480] thermal_sys: Registered thermal governor 'step_wise'
[ 0.007482] thermal_sys: Registered thermal governor 'user_space'
[ 0.007546] ASID allocator initialised with 65536 entries
[ 0.007974] pstore: Registered ramoops as persistent store backend
[ 0.007978] ramoops: using 0x10000@0x42ff0000, ecc: 0
[ 0.018159] cryptd: max_cpu_qlen set to 1000
[ 0.019163] SCSI subsystem initialized
[ 0.019322] libata version 3.00 loaded.
[ 0.020632] clocksource: Switched to clocksource arch_sys_counter
[ 0.021353] NET: Registered PF_INET protocol family
[ 0.021450] IP idents hash table entries: 4096 (order: 3, 32768 bytes, linear)
[ 0.021894] tcp_listen_portaddr_hash hash table entries: 256 (order: 0, 4096 bytes, linear)
[ 0.021908] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
[ 0.021916] TCP established hash table entries: 2048 (order: 2, 16384 bytes, linear)
[ 0.021934] TCP bind hash table entries: 2048 (order: 4, 65536 bytes, linear)
[ 0.021983] TCP: Hash tables configured (established 2048 bind 2048)
[ 0.022048] UDP hash table entries: 256 (order: 1, 8192 bytes, linear)
[ 0.022065] UDP-Lite hash table entries: 256 (order: 1, 8192 bytes, linear)
[ 0.022196] NET: Registered PF_UNIX/PF_LOCAL protocol family
[ 0.022220] PCI: CLS 0 bytes, default 64
[ 0.023275] workingset: timestamp_bits=46 max_order=16 bucket_order=0
[ 0.027145] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[ 0.027153] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[ 0.061101] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
[ 0.070428] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
[ 0.072838] printk: console [ttyS0] disabled
[ 0.092953] 11002000.serial: ttyS0 at MMIO 0x11002000 (irq = 72, base_baud = 2500000) is a ST16650V2
[ 0.757716] printk: console [ttyS0] enabled
[ 0.762687] cacheinfo: Unable to detect cache hierarchy for CPU 0
[ 0.772343] loop: module loaded
[ 0.775488] Loading iSCSI transport class v2.0-870.
[ 0.782279] spi spi0.0: setup: ignoring unsupported mode bits a00
[ 0.788623] spi-nor spi0.0: mx25l12805d (16384 Kbytes)
[ 0.794034] 2 fixed-partitions partitions found on MTD device spi0.0
[ 0.800387] Creating 2 MTD partitions on "spi0.0":
[ 0.805181] 0x000000000000-0x000000010000 : "EEPROM"
[ 0.810823] 0x000000010000-0x000000090000 : "u-boot-env"
[ 0.965917] mtk_soc_eth 15100000.ethernet eth0: mediatek frame engine at 0xffffffc009580000, irq 75
[ 0.975628] i2c_dev: i2c /dev entries driver
[ 0.981576] mtk-wdt 1001c000.watchdog: Watchdog enabled (timeout=31 sec, nowayout=0)
[ 0.990440] NET: Registered PF_INET6 protocol family
[ 0.996311] Segment Routing with IPv6
[ 0.999994] In-situ OAM (IOAM) with IPv6
[ 1.003989] NET: Registered PF_PACKET protocol family
[ 1.009065] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
[ 1.022506] 8021q: 802.1Q VLAN Support v1.8
[ 1.028035] pstore: Using crash dump compression: deflate
[ 1.047971] Waiting for root device /dev/mmcblk0p7...
[ 1.101193] mmc0: new high speed MMC card at address 0001
[ 1.107593] mmcblk0: mmc0:0001 MK2704 3.53 GiB
[ 1.113181] Alternate GPT is invalid, using primary GPT.
[ 1.118509] mmcblk0: p1 p2 p3 p4 p5 p6 p7 p8 p9 p10
[ 1.125117] mmcblk0boot0: mmc0:0001 MK2704 2.00 MiB
[ 1.131244] mmcblk0boot1: mmc0:0001 MK2704 2.00 MiB
[ 1.136536] mmcblk0rpmb: mmc0:0001 MK2704 512 KiB, chardev (250:0)
[ 1.173732] VFS: Mounted root (squashfs filesystem) readonly on device 179:7.
[ 1.181067] Freeing unused kernel memory: 448K
[ 1.220686] Run /sbin/init as init process
[ 1.224771] with arguments:
[ 1.227725] /sbin/init
[ 1.230419] with environment:
[ 1.233557] HOME=/
[ 1.235905] TERM=linux
[ 1.383651] init: Console is alive
[ 1.387221] init: - watchdog -
[ 1.687903] kmodloader: loading kernel modules from /etc/modules-boot.d/*
[ 1.714198] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
[ 1.723307] init: - preinit -
[ 2.036929] mtk_soc_eth 15100000.ethernet eth0: PHY [mdio-bus:00] driver [MediaTek MT7981 PHY] (irq=POLL)
[ 2.049284] mtk_soc_eth 15100000.ethernet eth0: configuring for phy/gmii link mode
[ 4.181033] loop0: detected capacity change from 0 to 262144
[ 4.230636] loop0: detected capacity change from 262144 to 252288
[ 4.563047] F2FS-fs (loop0): Mounted with checkpoint version = 8f5dcd1
[ 4.570241] mount_root: switching to f2fs overlay
[ 4.575859] overlayfs: null uuid detected in lower fs '/', falling back to xino=off,index=off,nfs_export=off.
[ 4.587257] urandom-seed: Seeding with /etc/urandom.seed
[ 4.629498] random: procd: uninitialized urandom read (4 bytes read)
[ 4.637032] procd: - early -
[ 4.639981] procd: - watchdog -
[ 5.184166] procd: - watchdog -
[ 5.187667] procd: - ubus -
[ 6.230846] mtk_soc_eth 15100000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 6.239307] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 11.940630] random: crng init done
[ 11.951004] procd: - init -
[ 12.214894] kmodloader: loading kernel modules from /etc/modules.d/*
[ 12.249795] crypto-safexcel 10320000.crypto: EIP97:230(0,1,4,4)-HIA:270(0,5,5),PE:150/433(alg:7fcdfc00)/0/0/0
[ 12.269401] Loading modules backported from Linux version v6.6.15-0-g51f354b815c4
[ 12.276919] Backport generated by backports.git 193becf2
[ 12.387905] urngd: v1.0.2 started.
[ 12.645321] mt798x-wmac 18000000.wifi: HW/SW Version: 0x8a108a10, Build Time: 20221208201745a
[ 12.645321]
[ 12.809533] mt798x-wmac 18000000.wifi: WM Firmware Version: ____000000, Build Time: 20221208201806
[ 12.921342] mt798x-wmac 18000000.wifi: WA Firmware Version: DEV_000000, Build Time: 20221208202048
[ 13.013194] mt798x-wmac 18000000.wifi: eeprom load fail, use default bin
[ 13.020215] mt798x-wmac 18000000.wifi: registering led 'mt76-phy0'
[ 13.028168] mt798x-wmac 18000000.wifi: registering led 'mt76-phy1'
[ 13.062586] PPP generic driver version 2.4.2
[ 13.068068] NET: Registered PF_PPPOX protocol family
[ 13.075728] kmodloader: done loading kernel modules from /etc/modules.d/*
[ 16.434459] mtk_soc_eth 15100000.ethernet eth0: Link is Down
[ 16.545428] mtk_soc_eth 15100000.ethernet eth0: PHY [mdio-bus:00] driver [MediaTek MT7981 PHY] (irq=POLL)
[ 16.557780] mtk_soc_eth 15100000.ethernet eth0: configuring for phy/gmii link mode
[ 16.570755] br-guest: port 1(eth0.3) entered blocking state
[ 16.576339] br-guest: port 1(eth0.3) entered disabled state
[ 16.582136] device eth0.3 entered promiscuous mode
[ 16.586924] device eth0 entered promiscuous mode
[ 16.669357] br-iot: port 1(eth0.4) entered blocking state
[ 16.674812] br-iot: port 1(eth0.4) entered disabled state
[ 16.680406] device eth0.4 entered promiscuous mode
[ 16.768172] br-lan: port 1(eth0.2) entered blocking state
[ 16.773640] br-lan: port 1(eth0.2) entered disabled state
[ 16.781046] device eth0.2 entered promiscuous mode
[ 17.804350] br-lan: port 2(phy1-ap0) entered blocking state
[ 17.809946] br-lan: port 2(phy1-ap0) entered disabled state
[ 17.815778] device phy1-ap0 entered promiscuous mode
[ 17.820871] br-lan: port 2(phy1-ap0) entered blocking state
[ 17.826445] br-lan: port 2(phy1-ap0) entered forwarding state
[ 18.228089] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[ 18.409880] br-lan: port 3(phy0-ap0) entered blocking state
[ 18.415547] br-lan: port 3(phy0-ap0) entered disabled state
[ 18.421314] device phy0-ap0 entered promiscuous mode
[ 18.426347] br-lan: port 3(phy0-ap0) entered blocking state
[ 18.431925] br-lan: port 3(phy0-ap0) entered forwarding state
[ 18.513602] device phy0-ap0 left promiscuous mode
[ 18.518405] br-lan: port 3(phy0-ap0) entered disabled state
[ 18.562787] br-lan: port 3(phy0-ap0) entered blocking state
[ 18.568388] br-lan: port 3(phy0-ap0) entered disabled state
[ 18.574165] device phy0-ap0 entered promiscuous mode
[ 18.579243] br-lan: port 3(phy0-ap0) entered blocking state
[ 18.584827] br-lan: port 3(phy0-ap0) entered forwarding state
[ 18.590829] br-lan: port 2(phy1-ap0) entered disabled state
[ 18.596920] br-lan: port 3(phy0-ap0) entered disabled state
[ 18.809385] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap0: link becomes ready
[ 18.816155] br-lan: port 3(phy0-ap0) entered blocking state
[ 18.821746] br-lan: port 3(phy0-ap0) entered forwarding state
[ 18.939760] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap1: link becomes ready
[ 19.022575] br-iot: port 2(phy0-ap2) entered blocking state
[ 19.028155] br-iot: port 2(phy0-ap2) entered disabled state
[ 19.033977] device phy0-ap2 entered promiscuous mode
[ 19.042483] br-iot: port 2(phy0-ap2) entered blocking state
[ 19.048064] br-iot: port 2(phy0-ap2) entered forwarding state
[ 19.054022] IPv6: ADDRCONF(NETDEV_CHANGE): br-iot: link becomes ready
[ 19.092344] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap2: link becomes ready
[ 19.356493] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap0: link becomes ready
[ 19.363229] br-lan: port 2(phy1-ap0) entered blocking state
[ 19.368804] br-lan: port 2(phy1-ap0) entered forwarding state
[ 19.492426] br-guest: port 2(phy1-ap1) entered blocking state
[ 19.498180] br-guest: port 2(phy1-ap1) entered disabled state
[ 19.504497] device phy1-ap1 entered promiscuous mode
[ 19.511044] device phy1-ap1 left promiscuous mode
[ 19.515805] br-guest: port 2(phy1-ap1) entered disabled state
[ 19.573070] br-guest: port 2(phy1-ap1) entered blocking state
[ 19.578834] br-guest: port 2(phy1-ap1) entered disabled state
[ 19.585850] device phy1-ap1 entered promiscuous mode
[ 19.590954] br-guest: port 2(phy1-ap1) entered blocking state
[ 19.596697] br-guest: port 2(phy1-ap1) entered forwarding state
[ 19.602794] br-guest: port 2(phy1-ap1) entered disabled state
[ 19.610818] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap1: link becomes ready
[ 19.617537] br-guest: port 2(phy1-ap1) entered blocking state
[ 19.623296] br-guest: port 2(phy1-ap1) entered forwarding state
[ 19.629519] IPv6: ADDRCONF(NETDEV_CHANGE): br-guest: link becomes ready
[ 20.711081] mtk_soc_eth 15100000.ethernet eth0: Link is Up - 1Gbps/Full - flow control rx/tx
[ 20.719550] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[ 20.726480] br-lan: port 1(eth0.2) entered blocking state
[ 20.731927] br-lan: port 1(eth0.2) entered forwarding state
[ 20.737697] br-guest: port 1(eth0.3) entered blocking state
[ 20.743311] br-guest: port 1(eth0.3) entered forwarding state
[ 20.749235] br-iot: port 1(eth0.4) entered blocking state
[ 20.754686] br-iot: port 1(eth0.4) entered forwarding state
[13170.700716] br-guest: port 2(phy1-ap1) entered disabled state
[13170.739736] device phy1-ap1 left promiscuous mode
[13170.744467] br-guest: port 2(phy1-ap1) entered disabled state
[13171.740686] br-lan: port 2(phy1-ap0) entered disabled state
[13171.746493] device phy1-ap0 left promiscuous mode
[13171.751271] br-lan: port 2(phy1-ap0) entered disabled state
[13171.990280] br-iot: port 2(phy0-ap2) entered disabled state
[13172.029310] device phy0-ap2 left promiscuous mode
[13172.034039] br-iot: port 2(phy0-ap2) entered disabled state
[13172.281869] device phy0-ap0 left promiscuous mode
[13172.286644] br-lan: port 3(phy0-ap0) entered disabled state
[13173.929760] br-lan: port 2(phy1-ap0) entered blocking state
[13173.935340] br-lan: port 2(phy1-ap0) entered disabled state
[13173.941118] device phy1-ap0 entered promiscuous mode
[13173.946156] br-lan: port 2(phy1-ap0) entered blocking state
[13173.951744] br-lan: port 2(phy1-ap0) entered forwarding state
[13173.960054] br-lan: port 2(phy1-ap0) entered disabled state
[13174.316495] br-lan: port 3(phy0-ap0) entered blocking state
[13174.322122] br-lan: port 3(phy0-ap0) entered disabled state
[13174.327868] device phy0-ap0 entered promiscuous mode
[13174.332979] br-lan: port 3(phy0-ap0) entered blocking state
[13174.338585] br-lan: port 3(phy0-ap0) entered forwarding state
[13174.695049] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap0: link becomes ready
[13174.819807] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap1: link becomes ready
[13174.910413] br-iot: port 2(phy0-ap2) entered blocking state
[13174.915995] br-iot: port 2(phy0-ap2) entered disabled state
[13174.921796] device phy0-ap2 entered promiscuous mode
[13174.927962] device phy0-ap2 left promiscuous mode
[13174.932792] br-iot: port 2(phy0-ap2) entered disabled state
[13175.000649] br-iot: port 2(phy0-ap2) entered blocking state
[13175.006229] br-iot: port 2(phy0-ap2) entered disabled state
[13175.011985] device phy0-ap2 entered promiscuous mode
[13175.016998] br-iot: port 2(phy0-ap2) entered blocking state
[13175.022570] br-iot: port 2(phy0-ap2) entered forwarding state
[13175.028923] br-iot: port 2(phy0-ap2) entered disabled state
[13175.059198] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap2: link becomes ready
[13175.065927] br-iot: port 2(phy0-ap2) entered blocking state
[13175.071525] br-iot: port 2(phy0-ap2) entered forwarding state
[13175.375181] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap0: link becomes ready
[13175.381930] br-lan: port 2(phy1-ap0) entered blocking state
[13175.387508] br-lan: port 2(phy1-ap0) entered forwarding state
[13175.479998] br-guest: port 2(phy1-ap1) entered blocking state
[13175.485776] br-guest: port 2(phy1-ap1) entered disabled state
[13175.491740] device phy1-ap1 entered promiscuous mode
[13175.501677] br-guest: port 2(phy1-ap1) entered blocking state
[13175.507429] br-guest: port 2(phy1-ap1) entered forwarding state
[13175.514123] device phy1-ap1 left promiscuous mode
[13175.518964] br-guest: port 2(phy1-ap1) entered disabled state
[13175.549890] br-guest: port 2(phy1-ap1) entered blocking state
[13175.555641] br-guest: port 2(phy1-ap1) entered disabled state
[13175.561600] device phy1-ap1 entered promiscuous mode
[13175.566650] br-guest: port 2(phy1-ap1) entered blocking state
[13175.572417] br-guest: port 2(phy1-ap1) entered forwarding state
[13175.580019] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap1: link becomes ready
{
"radio0": {
"up": true,
"pending": false,
"autostart": true,
"disabled": false,
"retry_setup_failed": false,
"config": {
"path": "platform/soc/18000000.wifi",
"channel": "1",
"band": "2g",
"htmode": "HE20",
"cell_density": 0
},
"interfaces": [
{
"section": "default_radio0",
"ifname": "phy0-ap0",
"config": {
"mode": "ap",
"ssid": "starla",
"encryption": "sae-mixed",
"key": "xxxxxxxxxx",
"network": [
"lan",
"LAN"
],
"mode": "ap"
},
"vlans": [
],
"stations": [
]
},
{
"section": "wifinet3",
"ifname": "phy0-ap1",
"config": {
"mode": "ap",
"ssid": "zero",
"encryption": "sae-mixed",
"key": "xxxxxxxxxxxxxxxxxx",
"mode": "ap"
},
"vlans": [
],
"stations": [
]
},
{
"section": "wifinet4",
"ifname": "phy0-ap2",
"config": {
"mode": "ap",
"ssid": "glass",
"encryption": "sae-mixed",
"isolate": true,
"key": "xxxxxxxxxxxxxxxxxxxxx",
"ieee80211w": 0,
"mode": "ap",
"isolate": true,
"network": [
"IOT"
]
},
"vlans": [
],
"stations": [
]
}
]
},
"radio1": {
"up": true,
"pending": false,
"autostart": true,
"disabled": false,
"retry_setup_failed": false,
"config": {
"path": "platform/soc/18000000.wifi+1",
"channel": "36",
"band": "5g",
"htmode": "HE80",
"cell_density": 0
},
"interfaces": [
{
"section": "default_radio1",
"ifname": "phy1-ap0",
"config": {
"mode": "ap",
"ssid": "starla",
"encryption": "sae-mixed",
"key": "xxxxxxxxxx",
"network": [
"lan",
"LAN"
],
"mode": "ap"
},
"vlans": [
],
"stations": [
]
},
{
"section": "wifinet2",
"ifname": "phy1-ap1",
"config": {
"mode": "ap",
"ssid": "zero",
"encryption": "sae-mixed",
"key": "xxxxxxxxxxxxxxxxxx",
"mode": "ap",
"network": [
"GUEST"
]
},
"vlans": [
],
"stations": [
]
}
]
}
}
logread: abbreviated as its too big for a post
Fri Mar 15 18:03:43 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 18:04:08 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 18:04:08 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 3)
Fri Mar 15 18:04:08 2024 daemon.notice hostapd: phy0-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 18:04:08 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 18:04:10 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 18:04:10 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 18:04:10 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 18:04:38 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 18:13:52 2024 daemon.info hostapd: phy1-ap0: STA 82:9f:53:51:eb:e6 IEEE 802.11: authenticated
Fri Mar 15 18:13:52 2024 daemon.info hostapd: phy1-ap0: STA 82:9f:53:51:eb:e6 IEEE 802.11: associated (aid 7)
Fri Mar 15 18:13:52 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 82:9f:53:51:eb:e6 auth_alg=open
Fri Mar 15 18:13:52 2024 daemon.info hostapd: phy1-ap0: STA 82:9f:53:51:eb:e6 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 18:13:52 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 82:9f:53:51:eb:e6
Fri Mar 15 18:25:38 2024 daemon.info hostapd: phy1-ap0: STA 48:51:c5:48:ff:58 IEEE 802.11: associated (aid 8)
Fri Mar 15 18:25:39 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 48:51:c5:48:ff:58 auth_alg=sae
Fri Mar 15 18:25:39 2024 daemon.info hostapd: phy1-ap0: STA 48:51:c5:48:ff:58 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 18:25:39 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 48:51:c5:48:ff:58
Fri Mar 15 18:45:08 2024 daemon.info hostapd: phy1-ap1: STA 28:7f:cf:82:69:0f IEEE 802.11: associated (aid 4)
Fri Mar 15 18:45:08 2024 daemon.notice hostapd: phy1-ap1: AP-STA-CONNECTED 28:7f:cf:82:69:0f auth_alg=sae
Fri Mar 15 18:45:08 2024 daemon.info hostapd: phy1-ap1: STA 28:7f:cf:82:69:0f WPA: pairwise key handshake completed (RSN)
Fri Mar 15 18:45:08 2024 daemon.notice hostapd: phy1-ap1: EAPOL-4WAY-HS-COMPLETED 28:7f:cf:82:69:0f
Fri Mar 15 19:01:47 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 19:01:47 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 1)
Fri Mar 15 19:01:47 2024 daemon.notice hostapd: phy1-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 19:01:47 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 19:01:49 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 19:01:49 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 19:01:49 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 19:02:17 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 19:03:25 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 19:03:25 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 3)
Fri Mar 15 19:03:25 2024 daemon.notice hostapd: phy0-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 19:03:25 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 19:03:25 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 19:03:25 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 19:03:25 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 19:03:34 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 5)
Fri Mar 15 19:03:34 2024 daemon.notice hostapd: phy1-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 19:03:34 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 19:03:37 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=sae
Fri Mar 15 19:03:37 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 19:03:37 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 19:03:55 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 19:04:04 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 19:04:24 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 19:04:24 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 4)
Fri Mar 15 19:04:24 2024 daemon.notice hostapd: phy0-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 19:04:24 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 19:04:24 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 19:04:24 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 19:04:24 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 19:04:54 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 19:37:37 2024 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED 28:7f:cf:82:69:0f
Fri Mar 15 19:53:09 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 60:09:c3:c7:ed:f9
Fri Mar 15 19:53:10 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: authenticated
Fri Mar 15 19:53:10 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: associated (aid 13)
Fri Mar 15 19:53:10 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED 60:09:c3:c7:ed:f9 auth_alg=open
Fri Mar 15 19:53:10 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 19:53:10 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED 60:09:c3:c7:ed:f9
Fri Mar 15 19:54:54 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 60:09:c3:c7:ed:f9
Fri Mar 15 19:54:54 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: authenticated
Fri Mar 15 19:54:54 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: associated (aid 13)
Fri Mar 15 19:54:55 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED 60:09:c3:c7:ed:f9 auth_alg=open
Fri Mar 15 19:54:55 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 19:54:55 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED 60:09:c3:c7:ed:f9
Fri Mar 15 20:00:13 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 60:09:c3:c7:ed:f9
Fri Mar 15 20:00:13 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: disassociated due to inactivity
Fri Mar 15 20:00:14 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:00:58 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED c4:dd:57:76:ba:30
Fri Mar 15 20:00:58 2024 daemon.info hostapd: phy0-ap2: STA c4:dd:57:76:ba:30 IEEE 802.11: authenticated
Fri Mar 15 20:00:58 2024 daemon.info hostapd: phy0-ap2: STA c4:dd:57:76:ba:30 IEEE 802.11: associated (aid 2)
Fri Mar 15 20:00:58 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED c4:dd:57:76:ba:30 auth_alg=open
Fri Mar 15 20:00:58 2024 daemon.info hostapd: phy0-ap2: STA c4:dd:57:76:ba:30 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:00:58 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED c4:dd:57:76:ba:30
Fri Mar 15 20:06:23 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 20:06:23 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 1)
Fri Mar 15 20:06:23 2024 daemon.notice hostapd: phy1-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 20:06:23 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 20:06:25 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 20:06:25 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:06:25 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 20:06:53 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:07:09 2024 daemon.info hostapd: phy1-ap1: STA 28:7f:cf:82:69:0f IEEE 802.11: authenticated
Fri Mar 15 20:07:09 2024 daemon.info hostapd: phy1-ap1: STA 28:7f:cf:82:69:0f IEEE 802.11: associated (aid 4)
Fri Mar 15 20:07:09 2024 daemon.notice hostapd: phy1-ap1: AP-STA-CONNECTED 28:7f:cf:82:69:0f auth_alg=open
Fri Mar 15 20:07:09 2024 daemon.info hostapd: phy1-ap1: STA 28:7f:cf:82:69:0f WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:07:09 2024 daemon.notice hostapd: phy1-ap1: EAPOL-4WAY-HS-COMPLETED 28:7f:cf:82:69:0f
Fri Mar 15 20:07:10 2024 daemon.notice hostapd: phy1-ap1: AP-STA-DISCONNECTED 28:7f:cf:82:69:0f
Fri Mar 15 20:08:33 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 20:08:33 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 4)
Fri Mar 15 20:08:33 2024 daemon.notice hostapd: phy0-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 20:08:33 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 20:08:33 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 20:08:33 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:08:33 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 20:09:03 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:21:16 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 48:3f:da:00:f1:4d
Fri Mar 15 20:21:16 2024 daemon.info hostapd: phy0-ap2: STA 48:3f:da:00:f1:4d IEEE 802.11: authenticated
Fri Mar 15 20:21:16 2024 daemon.info hostapd: phy0-ap2: STA 48:3f:da:00:f1:4d IEEE 802.11: associated (aid 9)
Fri Mar 15 20:21:16 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED 48:3f:da:00:f1:4d auth_alg=open
Fri Mar 15 20:21:16 2024 daemon.info hostapd: phy0-ap2: STA 48:3f:da:00:f1:4d WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:21:16 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED 48:3f:da:00:f1:4d
Fri Mar 15 20:22:02 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: authenticated
Fri Mar 15 20:22:02 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: associated (aid 12)
Fri Mar 15 20:22:03 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED 60:09:c3:c7:ed:f9 auth_alg=open
Fri Mar 15 20:22:03 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:22:03 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED 60:09:c3:c7:ed:f9
Fri Mar 15 20:27:27 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 60:09:c3:c7:ed:f9
Fri Mar 15 20:27:27 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: disassociated due to inactivity
Fri Mar 15 20:27:28 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:33:47 2024 daemon.notice netifd: LAN (2583): udhcpc: sending renew to server 192.168.1.1
Fri Mar 15 20:33:47 2024 daemon.notice netifd: LAN (2583): udhcpc: lease of 192.168.1.108 obtained from 192.168.1.1, lease time 43200
Fri Mar 15 20:33:47 2024 daemon.info hostapd: phy0-ap0: STA b0:4a:39:9f:50:61 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:47 2024 daemon.info hostapd: phy0-ap0: STA 48:d6:d5:8b:8f:b4 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:47 2024 daemon.info hostapd: phy0-ap0: STA 7c:d9:5c:7c:4b:6f WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA c4:dd:57:76:ba:30 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA a0:92:08:1f:43:32 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA c4:82:e1:0c:ce:73 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 4c:75:25:d6:67:64 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 48:3f:da:00:f1:4d WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 2c:f4:32:67:fb:c0 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 4c:eb:d6:de:19:19 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 4c:eb:d6:dd:77:25 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 54:af:97:42:df:45 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy0-ap2: STA 98:cd:ac:2f:68:29 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA 54:60:09:dd:2d:32 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA f0:ef:86:2a:67:93 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA a4:36:c7:a5:21:b2 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA 48:51:c5:48:ff:58 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA 82:9f:53:51:eb:e6 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA be:47:f2:cf:c7:6a WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap1: STA b4:0e:de:76:c5:c8 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap1: STA dc:68:eb:b9:3c:73 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:48 2024 daemon.info hostapd: phy1-ap1: STA b2:3b:d6:a5:4e:89 WPA: group key handshake completed (RSN)
Fri Mar 15 20:33:50 2024 daemon.info hostapd: phy0-ap2: STA c8:f0:9e:82:fd:94 WPA: group key handshake completed (RSN)
Fri Mar 15 20:39:53 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 20:39:53 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 1)
Fri Mar 15 20:39:53 2024 daemon.notice hostapd: phy1-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 20:39:53 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 20:39:53 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 20:39:53 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:39:53 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 20:40:23 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:47:17 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 20:47:17 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 5)
Fri Mar 15 20:47:17 2024 daemon.notice hostapd: phy1-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 20:47:17 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 20:47:19 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 20:47:19 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:47:19 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 20:47:47 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:48:44 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 20:48:44 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 3)
Fri Mar 15 20:48:44 2024 daemon.notice hostapd: phy0-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 20:48:44 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 20:48:44 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 20:48:44 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:48:44 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 20:49:14 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:50:19 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 20:50:19 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 4)
Fri Mar 15 20:50:19 2024 daemon.notice hostapd: phy0-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 20:50:19 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 20:50:21 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 20:50:21 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:50:21 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 20:50:49 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 20:58:25 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 20:58:25 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 1)
Fri Mar 15 20:58:25 2024 daemon.notice hostapd: phy1-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 20:58:25 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 20:58:25 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 20:58:25 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 20:58:25 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 20:58:55 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:00:49 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 21:00:49 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 4)
Fri Mar 15 21:00:49 2024 daemon.notice hostapd: phy0-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 21:00:49 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 21:00:51 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 21:00:51 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:00:51 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 21:01:19 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:09:23 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 21:09:23 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 1)
Fri Mar 15 21:09:23 2024 daemon.notice hostapd: phy1-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 21:09:23 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 21:09:23 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 21:09:23 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:09:23 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 21:09:53 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:11:40 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 21:11:40 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 4)
Fri Mar 15 21:11:40 2024 daemon.notice hostapd: phy0-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 21:11:40 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 21:11:42 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 21:11:42 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:11:42 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 21:12:10 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:14:42 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 21:14:42 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 1)
Fri Mar 15 21:14:42 2024 daemon.notice hostapd: phy1-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 21:14:42 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 21:14:44 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 21:14:44 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:14:44 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 21:15:06 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 21:15:06 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 5)
Fri Mar 15 21:15:06 2024 daemon.notice hostapd: phy1-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 21:15:06 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 21:15:06 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 21:15:06 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:15:06 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 21:15:12 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:15:36 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:17:56 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 21:17:56 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 3)
Fri Mar 15 21:17:56 2024 daemon.notice hostapd: phy0-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 21:17:56 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 21:17:58 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 21:17:58 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:17:58 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 21:18:26 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:35:49 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 21:35:49 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 4)
Fri Mar 15 21:35:49 2024 daemon.notice hostapd: phy0-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 21:35:49 2024 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 21:35:49 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 21:35:49 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:35:49 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 21:36:19 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:40:02 2024 daemon.info hostapd: phy1-ap0: STA c8:b2:9b:99:77:3a IEEE 802.11: authenticated
Fri Mar 15 21:40:02 2024 daemon.info hostapd: phy1-ap0: STA c8:b2:9b:99:77:3a IEEE 802.11: associated (aid 9)
Fri Mar 15 21:40:03 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED c8:b2:9b:99:77:3a auth_alg=open
Fri Mar 15 21:40:03 2024 daemon.info hostapd: phy1-ap0: STA c8:b2:9b:99:77:3a WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:40:03 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED c8:b2:9b:99:77:3a
Fri Mar 15 21:40:10 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED c8:b2:9b:99:77:3a
Fri Mar 15 21:42:38 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: authenticated
Fri Mar 15 21:42:38 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: associated (aid 1)
Fri Mar 15 21:42:38 2024 daemon.notice hostapd: phy1-ap0: Prune association for ee:83:1b:02:bc:76
Fri Mar 15 21:42:38 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED ee:83:1b:02:bc:76
Fri Mar 15 21:42:38 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED ee:83:1b:02:bc:76 auth_alg=open
Fri Mar 15 21:42:38 2024 daemon.info hostapd: phy0-ap0: STA ee:83:1b:02:bc:76 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:42:38 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED ee:83:1b:02:bc:76
Fri Mar 15 21:43:08 2024 daemon.info hostapd: phy1-ap0: STA ee:83:1b:02:bc:76 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:43:49 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: authenticated
Fri Mar 15 21:43:49 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: associated (aid 12)
Fri Mar 15 21:43:50 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED 60:09:c3:c7:ed:f9 auth_alg=open
Fri Mar 15 21:43:50 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:43:50 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED 60:09:c3:c7:ed:f9
Fri Mar 15 21:48:44 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: authenticated
Fri Mar 15 21:48:44 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: associated (aid 5)
Fri Mar 15 21:48:44 2024 daemon.notice hostapd: phy1-ap0: Prune association for 22:31:c2:27:a6:78
Fri Mar 15 21:48:44 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED 22:31:c2:27:a6:78
Fri Mar 15 21:48:46 2024 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED 22:31:c2:27:a6:78 auth_alg=open
Fri Mar 15 21:48:46 2024 daemon.info hostapd: phy0-ap0: STA 22:31:c2:27:a6:78 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:48:46 2024 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED 22:31:c2:27:a6:78
Fri Mar 15 21:49:01 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 60:09:c3:c7:ed:f9
Fri Mar 15 21:49:01 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: disassociated due to inactivity
Fri Mar 15 21:49:02 2024 daemon.info hostapd: phy0-ap2: STA 60:09:c3:c7:ed:f9 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:49:14 2024 daemon.info hostapd: phy1-ap0: STA 22:31:c2:27:a6:78 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:49:51 2024 daemon.info hostapd: phy0-ap2: STA 76:c8:b0:d3:c9:87 IEEE 802.11: associated (aid 12)
Fri Mar 15 21:49:51 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED 76:c8:b0:d3:c9:87 auth_alg=sae
Fri Mar 15 21:49:51 2024 daemon.info hostapd: phy0-ap2: STA 76:c8:b0:d3:c9:87 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:49:51 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED 76:c8:b0:d3:c9:87
Fri Mar 15 21:51:59 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED 76:c8:b0:d3:c9:87
Fri Mar 15 21:51:59 2024 daemon.info hostapd: phy0-ap2: STA 76:c8:b0:d3:c9:87 IEEE 802.11: disassociated
Fri Mar 15 21:52:00 2024 daemon.info hostapd: phy0-ap2: STA 76:c8:b0:d3:c9:87 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Fri Mar 15 21:58:12 2024 daemon.err uhttpd[1731]: [info] luci: accepted login on /admin/status/overview for root from 192.168.1.241
Fri Mar 15 21:58:22 2024 authpriv.info dropbear[5398]: Child connection from 192.168.1.241:46580
Fri Mar 15 21:58:22 2024 authpriv.notice dropbear[5398]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:Pp0q6i4rHCMQ8G+cfYjKcpL933Eo6L+MQWHVMiYTidg from 192.168.1.241:46580
Fri Mar 15 21:58:54 2024 daemon.info hostapd: phy1-ap0: STA e0:d0:45:da:b1:c8 IEEE 802.11: associated (aid 3)
Fri Mar 15 21:58:54 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED e0:d0:45:da:b1:c8 auth_alg=sae
Fri Mar 15 21:58:54 2024 daemon.info hostapd: phy1-ap0: STA e0:d0:45:da:b1:c8 WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:58:54 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED e0:d0:45:da:b1:c8
Fri Mar 15 21:59:01 2024 authpriv.info dropbear[5398]: Exit (root) from <192.168.1.241:46580>: Disconnect received
Fri Mar 15 21:59:44 2024 daemon.info hostapd: phy1-ap0: STA c8:b2:9b:99:77:3a IEEE 802.11: authenticated
Fri Mar 15 21:59:44 2024 daemon.info hostapd: phy1-ap0: STA c8:b2:9b:99:77:3a IEEE 802.11: associated (aid 4)
Fri Mar 15 21:59:44 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED c8:b2:9b:99:77:3a auth_alg=open
Fri Mar 15 21:59:44 2024 daemon.info hostapd: phy1-ap0: STA c8:b2:9b:99:77:3a WPA: pairwise key handshake completed (RSN)
Fri Mar 15 21:59:44 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED c8:b2:9b:99:77:3a
Fri Mar 15 22:01:26 2024 authpriv.info dropbear[5408]: Child connection from 192.168.1.241:59984
Fri Mar 15 22:01:26 2024 authpriv.notice dropbear[5408]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:Pp0q6i4rHCMQ8G+cfYjKcpL933Eo6L+MQWHVMiYTidg from 192.168.1.241:59984
Do you happen to know what's going on at approximately the 3 hour 40 minute mark? There's a bunch of entries at around 13170 seconds in the dmesg log.
These two facts makes me think the radios are actually working fine, it's just the packet handling between the network interfaces that's gone awry. Of course, that's just a guess.
My U6+ is running kernel 5.15, and yours is running 6.1. Maybe there's a regression somewhere between the two versions? Complicating matters is that the OpenWrt developers are moving to kernel 6.6 for the next release, which might change the observed behavior.
Can you post the contents of /etc/config/network
and /etc/config/dhcp
? Just to make sure the AP configuration is sound.
Hail Mary suggestion: try disabling mixed SAE and enable only WPA2-PSK for now. This obviously won't fix the underlying problem, but it is another thing that's different between our U6+ devices.