Archer A6 V3 unstable wifi on 21.02.3

Hey, I just got a TP Link A6 V3 today and I have been having problems with the wifi on this.

I create 5 SSIDs each on 2.4 and 5ghz bands and put these in separate VLANs.

After saving the configuration, SSIDs of 1 random band do not come online. Sometimes, They may come up automatically after a few minutes and sometimes they just never work.

I read some posts here that suggested power cycling it but even after power cycling the AP, They may work once after that but the problem comes back again after few restarts.

System logs are here, https://pastebin.com/raw/VpKUbwiE

(I couldn't paste the logs in this post because of character limits)

Over all, Wifi speeds are on part with the stock FW but the stabality and random issues like this render this AP unsuitable.

This is what I see when I try to restart the 2.4ghz interface which is not working right now.

Mon May 16 18:17:31 2022 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) --> new PHY
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.207556] br-lan: port 9(wlan0) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.212937] br-lan: port 9(wlan0) entered disabled state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.219030] device wlan0 entered promiscuous mode
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.224293] br-lan: port 9(wlan0) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.229724] br-lan: port 9(wlan0) entered forwarding state
Mon May 16 18:17:31 2022 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.236042] br-lan: port 9(wlan0) entered disabled state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.339755] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.346661] br-lan: port 9(wlan0) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.352084] br-lan: port 9(wlan0) entered forwarding state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.366068] br-lan: port 11(wlan0-1) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.371735] br-lan: port 11(wlan0-1) entered disabled state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.378033] device wlan0-1 entered promiscuous mode
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.384157] br-lan: port 11(wlan0-1) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.389790] br-lan: port 11(wlan0-1) entered forwarding state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.478840] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-1: link becomes ready
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.494262] br-lan: port 12(wlan0-2) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.499919] br-lan: port 12(wlan0-2) entered disabled state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.506226] device wlan0-2 entered promiscuous mode
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.512454] br-lan: port 12(wlan0-2) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.518088] br-lan: port 12(wlan0-2) entered forwarding state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.609436] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-2: link becomes ready
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.624532] br-lan: port 13(wlan0-3) entered blocking state
Mon May 16 18:17:31 2022 kern.info kernel: [ 2237.630352] br-lan: port 13(wlan0-3) entered disabled state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.636723] device wlan0-3 entered promiscuous mode
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.643214] br-lan: port 13(wlan0-3) entered blocking state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.648871] br-lan: port 13(wlan0-3) entered forwarding state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.746056] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0-3: link becomes ready
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.761315] br-lan: port 14(wlan0-4) entered blocking state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.767123] br-lan: port 14(wlan0-4) entered disabled state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.773398] device wlan0-4 entered promiscuous mode
Mon May 16 18:17:32 2022 daemon.err hostapd: Could not set interface wlan0-4 flags (UP): Resource busy
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.797356] device wlan0-4 left promiscuous mode
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.802108] br-lan: port 14(wlan0-4) entered disabled state
Mon May 16 18:17:32 2022 daemon.err hostapd: Failed to add BSS (BSSID=1e:27:f5:7d:af:a8)
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.930479] br-lan: port 13(wlan0-3) entered disabled state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.940461] device wlan0-3 left promiscuous mode
Mon May 16 18:17:32 2022 kern.info kernel: [ 2237.945170] br-lan: port 13(wlan0-3) entered disabled state
Mon May 16 18:17:32 2022 daemon.notice hostapd: nl80211: Failed to remove interface wlan0-3 from bridge br-lan: No such device
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.102817] br-lan: port 12(wlan0-2) entered disabled state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.113829] device wlan0-2 left promiscuous mode
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.118637] br-lan: port 12(wlan0-2) entered disabled state
Mon May 16 18:17:32 2022 daemon.notice hostapd: nl80211: Failed to remove interface wlan0-2 from bridge br-lan: No such device
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.278409] br-lan: port 11(wlan0-1) entered disabled state
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.289067] device wlan0-1 left promiscuous mode
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.293782] br-lan: port 11(wlan0-1) entered disabled state
Mon May 16 18:17:32 2022 daemon.notice hostapd: nl80211: Failed to remove interface wlan0-1 from bridge br-lan: No such device
Mon May 16 18:17:32 2022 daemon.err hostapd: Interface initialization failed
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->DISABLED
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0: AP-DISABLED
Mon May 16 18:17:32 2022 daemon.err hostapd: wlan0: Unable to setup interface.
Mon May 16 18:17:32 2022 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.424867] device wlan0 left promiscuous mode
Mon May 16 18:17:32 2022 kern.info kernel: [ 2238.429710] br-lan: port 9(wlan0) entered disabled state
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Mon May 16 18:17:32 2022 daemon.err hostapd: hostapd_free_hapd_data: Interface wlan0 wasn't started
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0-1: CTRL-EVENT-TERMINATING
Mon May 16 18:17:32 2022 daemon.err hostapd: hostapd_free_hapd_data: Interface wlan0-1 wasn't started
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0-2: CTRL-EVENT-TERMINATING
Mon May 16 18:17:32 2022 daemon.err hostapd: hostapd_free_hapd_data: Interface wlan0-2 wasn't started
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0-3: CTRL-EVENT-TERMINATING
Mon May 16 18:17:32 2022 daemon.err hostapd: hostapd_free_hapd_data: Interface wlan0-3 wasn't started
Mon May 16 18:17:32 2022 daemon.notice hostapd: wlan0-4: CTRL-EVENT-TERMINATING
Mon May 16 18:17:32 2022 daemon.err hostapd: hostapd_free_hapd_data: Interface wlan0-4 wasn't started
Mon May 16 18:17:32 2022 daemon.notice netifd: radio0 (14952): Command failed: Invalid argument
Mon May 16 18:17:32 2022 daemon.notice netifd: radio0 (14952): Device setup failed: HOSTAPD_START_FAILED
Mon May 16 18:17:32 2022 daemon.notice netifd: Wireless device 'radio0' set retry=0
Mon May 16 18:17:32 2022 daemon.crit netifd: Wireless device 'radio0' setup failed, retry=0
Mon May 16 18:17:33 2022 daemon.notice netifd: Wireless device 'radio0' is now down

This one error happens,

Could not set interface wlan0-4 flags (UP): Resource busy

and then there is a cascading failure leading to just disabling the 2.4ghz completely.

Filed a bug here, https://github.com/openwrt/openwrt/issues/9895

Based on your reply on the other member's thread -

SSH in and run the following -

logread | grep STA

cat /etc/config/wireless

Redact the passwords in the option key sections of the wireless results.

Post the results in preformatted text, by using the icon highlighted in red...

OpenWRT Posting Icons

My wireless config is here,

config wifi-device 'radio0'
	option type 'mac80211'
	option path '1e140000.pcie/pci0000:00/0000:00:00.0/0000:01:00.0'
	option band '2g'
	option cell_density '0'
	option htmode 'HT20'
	option txpower '19'
	option channel '6'

config wifi-device 'radio1'
	option type 'mac80211'
	option path '1e140000.pcie/pci0000:00/0000:00:01.0/0000:02:00.0'
	option band '5g'
	option cell_density '0'
	option htmode 'VHT80'
	option country 'IN'
	option channel '112'

config wifi-iface 'wifinet0'
	option device 'radio0'
	option mode 'ap'
	option ssid 'DJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan30'

config wifi-iface 'wifinet1'
	option device 'radio1'
	option mode 'ap'
	option ssid 'DJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan30'

config wifi-iface 'wifinet2'
	option device 'radio0'
	option mode 'ap'
	option ssid 'MJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan40'

config wifi-iface 'wifinet3'
	option device 'radio1'
	option mode 'ap'
	option ssid 'MJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan40'

config wifi-iface 'wifinet4'
	option device 'radio0'
	option mode 'ap'
	option ssid 'RJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan20'

config wifi-iface 'wifinet5'
	option device 'radio1'
	option mode 'ap'
	option ssid 'RJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan20'
	option disabled '1'

config wifi-iface 'wifinet6'
	option device 'radio0'
	option mode 'ap'
	option ssid 'YJHome'
	option encryption 'psk2'
	option key '521d43biq'
	option network 'vlan10'

config wifi-iface 'wifinet7'
	option device 'radio1'
	option mode 'ap'
	option ssid 'YJHome'
	option encryption 'psk2'
	option key ''
	option network 'vlan10'

config wifi-iface 'wifinet8'
	option device 'radio0'
	option mode 'ap'
	option ssid 'JGuest'
	option encryption 'psk2'
	option key ''
	option network 'vlan60'

config wifi-iface 'wifinet9'
	option device 'radio1'
	option mode 'ap'
	option ssid 'JGuest'
	option encryption 'psk2'
	option key ''
	option network 'vlan60'

Network Config is here,


config switch
	option enable_vlan '1'
	option reset '1'
	option name 'switch0'

config interface 'loopback'
	option device 'lo'
	option proto 'static'
	option ipaddr '127.0.0.1'
	option netmask '255.0.0.0'

config globals 'globals'
	option packet_steering '1'
	option ula_prefix 'fd1f:6f7f:e1f6::/48'

config device
	option name 'br-lan'
	option type 'bridge'
	list ports 'lan1'
	list ports 'lan2'
	list ports 'lan3'
	list ports 'lan4'
	list ports 'wan'

config switch_vlan
	option device 'switch0'
	option vlan '99'

config device
	option type '8021q'
	option ifname 'br-lan'
	option vid '99'
	option name 'br-lan.99'

config interface 'vlan99'
	option proto 'dhcp'
	option device 'br-lan.99'

config bridge-vlan
	option device 'br-lan'
	option vlan '99'
	list ports 'wan:t*'

config bridge-vlan
	option device 'br-lan'
	option vlan '10'
	list ports 'wan:t'

config bridge-vlan
	option device 'br-lan'
	option vlan '20'
	list ports 'wan:t'

config bridge-vlan
	option device 'br-lan'
	option vlan '30'
	list ports 'lan1'
	list ports 'lan2'
	list ports 'lan3'
	list ports 'lan4'
	list ports 'wan:t'

config bridge-vlan
	option device 'br-lan'
	option vlan '40'
	list ports 'wan:t'

config bridge-vlan
	option device 'br-lan'
	option vlan '60'
	list ports 'wan:t'

config interface 'vlan10'
	option device 'br-lan.10'
	option proto 'none'

config interface 'vlan20'
	option device 'br-lan.20'
	option proto 'none'

config interface 'vlan30'
	option device 'br-lan.30'
	option proto 'none'

config interface 'vlan40'
	option device 'br-lan.40'
	option proto 'none'

config interface 'vlan60'
	option device 'br-lan.60'
	option proto 'none'

it was complaining with this error,

Tue May 17 01:08:03 2022 daemon.err hostapd: Could not set interface wlan0-4 flags (UP): Resource busy
Tue May 17 01:08:03 2022 kern.info kernel: [ 1106.678430] device wlan0-4 left promiscuous mode
Tue May 17 01:08:03 2022 kern.info kernel: [ 1106.683174] br-lan: port 14(wlan0-4) entered disabled state
Tue May 17 01:08:03 2022 daemon.err hostapd: Failed to add BSS (BSSID=1e:27:f5:7d:af:a8)

wlan0-4 is the JGuest SSID on 2.4ghz band. I disabled that SSID and now it works.

logread | grep STA
Tue May 17 00:52:19 2022 daemon.notice netifd: radio1 (5793): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 00:52:20 2022 daemon.notice netifd: radio0 (5843): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 00:52:40 2022 daemon.notice netifd: radio1 (7242): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 00:53:07 2022 daemon.notice netifd: radio1 (8152): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 00:54:18 2022 daemon.notice netifd: radio1 (9797): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 00:55:21 2022 daemon.notice netifd: radio1 (10993): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 01:03:16 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 IEEE 802.11: authenticated
Tue May 17 01:03:16 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 IEEE 802.11: associated (aid 1)
Tue May 17 01:03:17 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED ea:26:e6:a7:e6:a8
Tue May 17 01:03:17 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 WPA: pairwise key handshake completed (RSN)
Tue May 17 01:04:17 2022 daemon.notice netifd: radio0 (17202): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 01:04:51 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED ea:26:e6:a7:e6:a8
Tue May 17 01:04:54 2022 daemon.notice netifd: radio0 (18680): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 01:05:15 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 IEEE 802.11: authenticated
Tue May 17 01:05:15 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 IEEE 802.11: associated (aid 1)
Tue May 17 01:05:15 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED ea:26:e6:a7:e6:a8
Tue May 17 01:05:15 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 WPA: pairwise key handshake completed (RSN)
Tue May 17 01:07:20 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED ea:26:e6:a7:e6:a8
Tue May 17 01:07:29 2022 daemon.notice netifd: radio0 (21607): Device setup failed: HOSTAPD_START_FAILED
Tue May 17 01:07:30 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 IEEE 802.11: authenticated
Tue May 17 01:07:30 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 IEEE 802.11: associated (aid 1)
Tue May 17 01:07:30 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED ea:26:e6:a7:e6:a8
Tue May 17 01:07:30 2022 daemon.info hostapd: wlan1: STA ea:26:e6:a7:e6:a8 WPA: pairwise key handshake completed (RSN)
Tue May 17 01:08:03 2022 daemon.notice netifd: radio0 (23487): Device setup failed: HOSTAPD_START_FAILED

Run iw list and post the results.

Wiphy phy1
	wiphy index: 1
	max # scan SSIDs: 4
	max scan IEs length: 2304 bytes
	max # sched scan SSIDs: 0
	max # match sets: 0
	Retry short limit: 7
	Retry long limit: 4
	Coverage class: 0 (up to 0m)
	Device supports AP-side u-APSD.
	Device supports T-DLS.
	Available Antennas: TX 0x3 RX 0x3
	Configured Antennas: TX 0x3 RX 0x3
	Supported interface modes:
		 * IBSS
		 * managed
		 * AP
		 * AP/VLAN
		 * monitor
		 * mesh point
		 * P2P-client
		 * P2P-GO
	Band 2:
		Capabilities: 0x1ff
			RX LDPC
			HT20/HT40
			SM Power Save disabled
			RX Greenfield
			RX HT20 SGI
			RX HT40 SGI
			TX STBC
			RX STBC 1-stream
			Max AMSDU length: 3839 bytes
			No DSSS/CCK HT40
		Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
		Minimum RX AMPDU time spacing: No restriction (0x00)
		HT TX/RX MCS rate indexes supported: 0-15
		VHT Capabilities (0x338001f8):
			Max MPDU length: 3895
			Supported Channel Width: 160 MHz, 80+80 MHz
			RX LDPC
			short GI (80 MHz)
			short GI (160/80+80 MHz)
			TX STBC
			RX antenna pattern consistency
			TX antenna pattern consistency
		VHT RX MCS set:
			1 streams: MCS 0-9
			2 streams: MCS 0-9
			3 streams: not supported
			4 streams: not supported
			5 streams: not supported
			6 streams: not supported
			7 streams: not supported
			8 streams: not supported
		VHT RX highest supported: 0 Mbps
		VHT TX MCS set:
			1 streams: MCS 0-9
			2 streams: MCS 0-9
			3 streams: not supported
			4 streams: not supported
			5 streams: not supported
			6 streams: not supported
			7 streams: not supported
			8 streams: not supported
		VHT TX highest supported: 0 Mbps
		Frequencies:
			* 5180 MHz [36] (23.0 dBm)
			* 5200 MHz [40] (23.0 dBm)
			* 5220 MHz [44] (23.0 dBm)
			* 5240 MHz [48] (23.0 dBm)
			* 5260 MHz [52] (23.0 dBm)
			* 5280 MHz [56] (23.0 dBm)
			* 5300 MHz [60] (23.0 dBm)
			* 5320 MHz [64] (23.0 dBm)
			* 5500 MHz [100] (23.0 dBm)
			* 5520 MHz [104] (23.0 dBm)
			* 5540 MHz [108] (23.0 dBm)
			* 5560 MHz [112] (23.0 dBm)
			* 5580 MHz [116] (23.0 dBm)
			* 5600 MHz [120] (23.0 dBm)
			* 5620 MHz [124] (23.0 dBm)
			* 5640 MHz [128] (23.0 dBm)
			* 5660 MHz [132] (23.0 dBm)
			* 5680 MHz [136] (23.0 dBm)
			* 5700 MHz [140] (23.0 dBm)
			* 5720 MHz [144] (23.0 dBm)
			* 5745 MHz [149] (23.0 dBm)
			* 5765 MHz [153] (23.0 dBm)
			* 5785 MHz [157] (23.0 dBm)
			* 5805 MHz [161] (23.0 dBm)
			* 5825 MHz [165] (23.0 dBm)
			* 5845 MHz [169] (23.0 dBm)
			* 5865 MHz [173] (23.0 dBm)
	valid interface combinations:
		 * #{ IBSS } <= 1, #{ managed, AP, mesh point, P2P-client, P2P-GO } <= 16,
		   total <= 16, #channels <= 1, STA/AP BI must match
	HT Capability overrides:
		 * MCS: ff ff ff ff ff ff ff ff ff ff
		 * maximum A-MSDU length
		 * supported channel width
		 * short GI for 40 MHz
		 * max A-MPDU length exponent
		 * min MPDU start spacing
	max # scan plans: 1
	max scan plan interval: 0
	max scan plan iterations: 0
	Supported extended features:
		* [ VHT_IBSS ]: VHT-IBSS
		* [ RRM ]: RRM
		* [ SET_SCAN_DWELL ]: scan dwell setting
		* [ CQM_RSSI_LIST ]: multiple CQM_RSSI_THOLD records
		* [ CONTROL_PORT_OVER_NL80211 ]: control port over nl80211
		* [ TXQS ]: FQ-CoDel-enabled intermediate TXQs
		* [ AIRTIME_FAIRNESS ]: airtime fairness scheduling
		* [ AQL ]: Airtime Queue Limits (AQL)
		* [ CONTROL_PORT_NO_PREAUTH ]: disable pre-auth over nl80211 control port support
		* [ DEL_IBSS_STA ]: deletion of IBSS station support
		* [ SCAN_FREQ_KHZ ]: scan on kHz frequency support
		* [ CONTROL_PORT_OVER_NL80211_TX_STATUS ]: tx status for nl80211 control port support
Wiphy phy0
	wiphy index: 0
	max # scan SSIDs: 4
	max scan IEs length: 2257 bytes
	max # sched scan SSIDs: 0
	max # match sets: 0
	Retry short limit: 7
	Retry long limit: 4
	Coverage class: 0 (up to 0m)
	Device supports AP-side u-APSD.
	Device supports T-DLS.
	Available Antennas: TX 0x3 RX 0x3
	Configured Antennas: TX 0x3 RX 0x3
	Supported interface modes:
		 * IBSS
		 * managed
		 * AP
		 * AP/VLAN
		 * monitor
		 * mesh point
		 * P2P-client
		 * P2P-GO
	Band 1:
		Capabilities: 0x1fe
			HT20/HT40
			SM Power Save disabled
			RX Greenfield
			RX HT20 SGI
			RX HT40 SGI
			TX STBC
			RX STBC 1-stream
			Max AMSDU length: 3839 bytes
			No DSSS/CCK HT40
		Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
		Minimum RX AMPDU time spacing: No restriction (0x00)
		HT TX/RX MCS rate indexes supported: 0-15
		Frequencies:
			* 2412 MHz [1] (20.0 dBm)
			* 2417 MHz [2] (20.0 dBm)
			* 2422 MHz [3] (20.0 dBm)
			* 2427 MHz [4] (20.0 dBm)
			* 2432 MHz [5] (20.0 dBm)
			* 2437 MHz [6] (20.0 dBm)
			* 2442 MHz [7] (20.0 dBm)
			* 2447 MHz [8] (20.0 dBm)
			* 2452 MHz [9] (20.0 dBm)
			* 2457 MHz [10] (20.0 dBm)
			* 2462 MHz [11] (20.0 dBm)
			* 2467 MHz [12] (20.0 dBm)
			* 2472 MHz [13] (20.0 dBm)
			* 2484 MHz [14] (disabled)
	valid interface combinations:
		 * #{ IBSS } <= 1, #{ managed, AP, mesh point, P2P-client, P2P-GO } <= 4,
		   total <= 4, #channels <= 1, STA/AP BI must match
	HT Capability overrides:
		 * MCS: ff ff ff ff ff ff ff ff ff ff
		 * maximum A-MSDU length
		 * supported channel width
		 * short GI for 40 MHz
		 * max A-MPDU length exponent
		 * min MPDU start spacing
	max # scan plans: 1
	max scan plan interval: -1
	max scan plan iterations: 0
	Supported extended features:
		* [ RRM ]: RRM
		* [ CQM_RSSI_LIST ]: multiple CQM_RSSI_THOLD records
		* [ CONTROL_PORT_OVER_NL80211 ]: control port over nl80211
		* [ TXQS ]: FQ-CoDel-enabled intermediate TXQs
		* [ AIRTIME_FAIRNESS ]: airtime fairness scheduling
		* [ AQL ]: Airtime Queue Limits (AQL)
		* [ SCAN_RANDOM_SN ]: use random sequence numbers in scans
		* [ SCAN_MIN_PREQ_CONTENT ]: use probe request with only rate IEs in scans
		* [ CONTROL_PORT_NO_PREAUTH ]: disable pre-auth over nl80211 control port support
		* [ DEL_IBSS_STA ]: deletion of IBSS station support
		* [ SCAN_FREQ_KHZ ]: scan on kHz frequency support
		* [ CONTROL_PORT_OVER_NL80211_TX_STATUS ]: tx status for nl80211 control port support

I am totally guessing but is this it?

		   total <= 4, #channels <= 1, STA/AP BI must match

Only 4 SSIDs supported on 2.4ghz compared to 16 on 5ghz?

This is the line to look at for 2.4 GHz -

managed, AP, mesh point, P2P-client, P2P-GO } <= 4

So if you have any AP's or mesh points, they count against the 4.

Yep, 16 is the correct number for 5 GHz -

managed, AP, mesh point, P2P-client, P2P-GO } <= 16

2 Likes

Thank you soo much!

I have updated the github issue with these details and I will close it now.

This topic was automatically closed 10 days after the last reply. New replies are no longer allowed.