BT Home Hub 5A, LEDE-17.01.6: crashing AC access point (Atheros QCA9880 802.11nac)

Good Morning Forum,

I installed LEDE on an old BT hub a few weekes ago. At the beginning everything worked fine.

After some time the wireless AC access point ( Qualcomm Atheros QCA9880 802.11nac) started crashing intermittently. Usually it's been happening overnight when all AC devices are disconnected or put to sleep.

The hard reboot solves the issue until it crash again.

The BGN access point (Generic MAC80211 802.11bgn) is solid as a rock and is up all the time. So I set up all devices to fall back to it whenever AC goes down.

I tried to narrow down the issue but no luck so far.

Anyone has come across the issue?

It happened again this morning so I put together all logs and pasting in below

syslog
------
Fri Sep 28 05:48:20 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 05:49:33 2018 kern.warn kernel: [213936.750642] ath10k_pci 0000:02:00.0: failed to install key for vdev 0 peer x:x:x:x:x:x: -145
Fri Sep 28 05:49:33 2018 kern.err kernel: [213936.758336] wlan0: failed to remove key (1, ff:ff:ff:ff:ff:ff) from hardware (-145)
Fri Sep 28 05:49:36 2018 kern.warn kernel: [213939.766570] ath10k_pci 0000:02:00.0: failed to install key for vdev 0 peer x:x:x:x:x:x: -145
Fri Sep 28 05:49:36 2018 kern.err kernel: [213939.774298] wlan0: failed to set key (1, ff:ff:ff:ff:ff:ff) to hardware (-145)
Fri Sep 28 05:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 05:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 05:54:36 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 05:55:30 2018 daemon.notice netifd: wan (1638): udhcpc: sending renew
Fri Sep 28 05:55:30 2018 daemon.notice netifd: wan (1638): udhcpc: lease of x.x.x.x obtained, lease time 3600
Fri Sep 28 05:59:18 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:02:41 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:10:13 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:14:15 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:17:54 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:23:50 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:25:30 2018 daemon.notice netifd: wan (1638): udhcpc: sending renew
Fri Sep 28 06:25:30 2018 daemon.notice netifd: wan (1638): udhcpc: lease of x.x.x.x obtained, lease time 3600
Fri Sep 28 06:27:25 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:32:07 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:34:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:34:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:36:41 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:44:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:44:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:46:15 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:49:35 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:54:28 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 06:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 06:55:30 2018 daemon.notice netifd: wan (1638): udhcpc: sending renew
Fri Sep 28 06:55:30 2018 daemon.notice netifd: wan (1638): udhcpc: lease of x.x.x.x obtained, lease time 3600
Fri Sep 28 06:57:50 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:00:09 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: authenticated
Fri Sep 28 07:00:09 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: associated (aid 2)
Fri Sep 28 07:00:09 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED x:x:x:x:x:x
Fri Sep 28 07:00:09 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: pairwise key handshake completed (RSN)
Fri Sep 28 07:00:21 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.113 x:x:x:x:x:x 
Fri Sep 28 07:00:21 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.113 x:x:x:x:x:x BRW28565A5C84D5
Fri Sep 28 07:02:38 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:11:37 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:15:22 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:24:19 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:25:30 2018 daemon.notice netifd: wan (1638): udhcpc: sending renew
Fri Sep 28 07:25:30 2018 daemon.notice netifd: wan (1638): udhcpc: lease of x.x.x.x obtained, lease time 3600
Fri Sep 28 07:33:35 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:34:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:34:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:34:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:37:22 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:41:03 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.182 x:x:x:x:x:x 
Fri Sep 28 07:41:03 2018 daemon.warn dnsmasq-dhcp[2029]: Ignoring domain box for DHCP host name frau
Fri Sep 28 07:41:03 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.182 x:x:x:x:x:x frau
Fri Sep 28 07:43:23 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:44:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:44:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:44:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:52:22 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: authenticated
Fri Sep 28 07:52:22 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: associated (aid 4)
Fri Sep 28 07:52:22 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED x:x:x:x:x:x
Fri Sep 28 07:52:22 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: pairwise key handshake completed (RSN)
Fri Sep 28 07:52:22 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:52:22 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 07:52:22 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 07:52:22 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 000100011c61hh44001eec80d4be on br-lan: ok x:x:x::18e/128 
Fri Sep 28 07:52:22 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 07:52:22 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 0 addresses
Fri Sep 28 07:52:22 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 07:52:22 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 07:52:22 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:52:23 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 07:52:23 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 000100011c61hh44001eec80d4be on br-lan: ok x:x:x::18e/128 
Fri Sep 28 07:52:23 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 07:52:23 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 1 addresses
Fri Sep 28 07:52:23 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 07:52:23 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 07:52:25 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:52:25 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 07:52:26 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:52:30 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:53:02 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:54:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 07:55:17 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:55:17 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 07:55:30 2018 daemon.notice netifd: wan (1638): udhcpc: sending renew
Fri Sep 28 07:55:30 2018 daemon.notice netifd: wan (1638): udhcpc: lease of x.x.x.x obtained, lease time 3600
Fri Sep 28 07:56:20 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:56:20 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 07:57:23 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:57:23 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 07:57:36 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 07:58:26 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:58:26 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 07:59:59 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 07:59:59 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:01:02 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 08:01:02 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:02:05 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 08:02:05 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:03:52 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.103 00:11:32:30:20:2f 
Fri Sep 28 08:03:52 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.103 00:11:32:30:20:2f nsa
Fri Sep 28 08:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:04:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:07:25 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:12:10 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:14:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:16:04 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 08:16:04 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:16:32 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:20:07 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: authenticated
Fri Sep 28 08:20:07 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: associated (aid 5)
Fri Sep 28 08:20:07 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED x:x:x:x:x:x
Fri Sep 28 08:20:07 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: pairwise key handshake completed (RSN)
Fri Sep 28 08:20:07 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:07 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:07 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:20:08 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:08 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:10 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:10 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:10 2018 daemon.info dnsmasq-dhcp[2029]: DHCPDISCOVER(br-lan) x:x:x:x:x:x 
Fri Sep 28 08:20:10 2018 daemon.info dnsmasq-dhcp[2029]: DHCPOFFER(br-lan) 192.168.1.180 x:x:x:x:x:x 
Fri Sep 28 08:20:11 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:20:14 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:14 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:14 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.180 x:x:x:x:x:x 
Fri Sep 28 08:20:14 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.180 x:x:x:x:x:x home4
Fri Sep 28 08:20:15 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:15 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:15 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 08:20:15 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 2 addresses
Fri Sep 28 08:20:15 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 08:20:15 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 08:20:15 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:20:16 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:16 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:18 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.180 x:x:x:x:x:x 
Fri Sep 28 08:20:18 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.180 x:x:x:x:x:x home4
Fri Sep 28 08:20:18 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:18 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:22 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:22 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:20:30 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:20:30 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 0001000121375a2cf01faf0ff7df on br-lan: ok x:x:x::f12/128 
Fri Sep 28 08:21:19 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.180 x:x:x:x:x:x 
Fri Sep 28 08:21:19 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.180 x:x:x:x:x:x home4
Fri Sep 28 08:22:03 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:23:25 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.180 x:x:x:x:x:x 
Fri Sep 28 08:23:25 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.180 x:x:x:x:x:x home4
Fri Sep 28 08:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:24:31 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: group key handshake completed (RSN)
Fri Sep 28 08:25:30 2018 daemon.notice netifd: wan (1638): udhcpc: sending renew
Fri Sep 28 08:25:30 2018 daemon.notice netifd: wan (1638): udhcpc: lease of x.x.x.x obtained, lease time 3600
Fri Sep 28 08:29:19 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: disconnected due to excessive missing ACKs
Fri Sep 28 08:29:19 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED x:x:x:x:x:x
Fri Sep 28 08:29:19 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: authenticated
Fri Sep 28 08:29:19 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: associated (aid 4)
Fri Sep 28 08:29:19 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED x:x:x:x:x:x
Fri Sep 28 08:29:19 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: pairwise key handshake completed (RSN)
Fri Sep 28 08:29:19 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 08:29:19 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:29:20 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:29:20 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:29:20 2018 daemon.warn odhcpd[800]: DHCPV6 CONFIRM IA_NA from 000100011c61hh44001eec80d4be on br-lan: not on-link x:x:x::18e/128 
Fri Sep 28 08:29:21 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:29:21 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 000100011c61hh44001eec80d4be on br-lan: ok x:x:x::18e/128 
Fri Sep 28 08:29:21 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 08:29:21 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 1 addresses
Fri Sep 28 08:29:21 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 08:29:21 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 08:29:22 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:29:22 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 000100011c61hh44001eec80d4be on br-lan: ok x:x:x::18e/128 
Fri Sep 28 08:29:22 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 08:29:22 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 2 addresses
Fri Sep 28 08:29:22 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 08:29:22 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 08:29:24 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:29:24 2018 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED x:x:x:x:x:x
Fri Sep 28 08:29:47 2018 kern.warn kernel: [223550.791684] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:29:50 2018 kern.warn kernel: [223553.799591] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:29:53 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:29:56 2018 kern.warn kernel: [223560.155450] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:29:59 2018 kern.warn kernel: [223563.167391] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:00 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:01 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:02 2018 daemon.err uhttpd[1122]: sh: write error: Broken pipe
Fri Sep 28 08:30:04 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.180 x:x:x:x:x:x 
Fri Sep 28 08:30:04 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.180 x:x:x:x:x:x home4
Fri Sep 28 08:30:04 2018 kern.warn kernel: [223568.059251] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:30:07 2018 kern.warn kernel: [223571.067177] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:30:13 2018 kern.warn kernel: [223577.475028] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:30:16 2018 kern.warn kernel: [223580.486966] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:30:18 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: authenticated
Fri Sep 28 08:30:18 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x IEEE 802.11: associated (aid 4)
Fri Sep 28 08:30:18 2018 daemon.notice hostapd: wlan1: AP-STA-CONNECTED x:x:x:x:x:x
Fri Sep 28 08:30:18 2018 daemon.info hostapd: wlan1: STA x:x:x:x:x:x WPA: pairwise key handshake completed (RSN)
Fri Sep 28 08:30:18 2018 daemon.info dnsmasq-dhcp[2029]: DHCPREQUEST(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 08:30:18 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:30:18 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:30:18 2018 daemon.warn odhcpd[800]: DHCPV6 SOLICIT IA_NA from 000100011c61hh44001eec80d4be on br-lan: ok x:x:x::18e/128 
Fri Sep 28 08:30:18 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:30:18 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 08:30:18 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 1 addresses
Fri Sep 28 08:30:18 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 08:30:18 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 08:30:19 2018 daemon.notice odhcpd[800]: Got DHCPv6 request
Fri Sep 28 08:30:19 2018 daemon.warn odhcpd[800]: DHCPV6 REQUEST IA_NA from 000100011c61hh44001eec80d4be on br-lan: ok x:x:x::18e/128 
Fri Sep 28 08:30:19 2018 daemon.info dnsmasq[2029]: read /etc/hosts - 4 addresses
Fri Sep 28 08:30:19 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/odhcpd - 2 addresses
Fri Sep 28 08:30:19 2018 daemon.info dnsmasq[2029]: read /tmp/hosts/dhcp.cfg02411c - 2 addresses
Fri Sep 28 08:30:19 2018 daemon.info dnsmasq-dhcp[2029]: read /etc/ethers - 0 addresses
Fri Sep 28 08:30:22 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:30:23 2018 daemon.info dnsmasq-dhcp[2029]: DHCPINFORM(br-lan) 192.168.1.123 x:x:x:x:x:x 
Fri Sep 28 08:30:23 2018 daemon.info dnsmasq-dhcp[2029]: DHCPACK(br-lan) 192.168.1.123 x:x:x:x:x:x home7
Fri Sep 28 08:30:23 2018 kern.warn kernel: [223587.482790] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request
Fri Sep 28 08:30:26 2018 daemon.info odhcpd[800]: Using a RA lifetime of 0 seconds on br-lan
Fri Sep 28 08:30:26 2018 kern.warn kernel: [223590.494725] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request

fwiw, perhaps try reverting to 17.01.4 ?

Does using 20 MHz wireless N mode make any difference?

According to kernel log, the driver appears to be the same for both 17.01.4 and 17.01.6.

ath10k_pci 0000:02:00.0: firmware ver 10.2.4-1.0-00016 api 5 features no-p2p,raw-mode,mfp crc32 0c5668f8

Are you using a DFS channel ?

One other similar bug report for different LEDE 17.01 device reported in June 2018:
FS#1587

Upgraded to OpenWrt 18.06.1. It was running fine for a few days and crashed today in the morning.

Started testing with N/20Mhz. So far so good but it's been running just for a few hours now.

DFS channel - if you mean setting Channel to "auto" - then yes

FS#1587 describes the same issue as mine

Just done some reading on ath10k driver. The remarks section says

  • applying ath9k regulatory domain hack patch from OpenWRT causes firmware crash (reason: regulatory hint function is never called and ath10k never sends scan channel list to the firmware which in turn causes firmware to crash on scan)

Does OpenWRT use this regulatory domain hack patch ?

DFS channels are the ones found above channel 48 but as you are using 'Auto', I think it should default to using ch. 36 to 48. Otherwise, choose a fixed channel number.

What is the history of your Hub?
ie. did 5 GHz work fine with previous BT firmware?

The only other mysterious 5 GHz issues I've come across are posted here
ebilan forum link

I too have observed this unwanted 'behaviour' on a HH5, which on the outside is a 2017 built Plusnet One.

What seems to happen is when a DHCP lease expires, the hub correctly starts a renewal handshake with the device whose lease has expired. On 11bgn (radio1) wifi, this functions without a hitch. But on 11ac (radio0) wifi, if the DHCP lease has expired and the expected device is no longer in range, the 11ac gets messed in the head; I'm not sure if it's dropped or deadlocked, but only a reboot will bring the 5G back.

Overnight when 5GHz clients are powered off and DHCP leases are most likely to expire, it seems logical to observe your reported result. I doubt it's OpenWRT playing up though, maybe the Qualcom driver is buggy?

So how long are your DHCP leases for? (see the DHCP Server section on the Luci Interface page)

Because of other stability and range issues, I only use my 11ac wifi in client mode to bridge with an upstream gateway.

btw I read in your DMESG the dreaded "Broken pipe" message. From reading around, I understand this is to do with the auto refresh mode in Luci, and is regarded as just an annoying spam msg.

@bill888: The 'Auto' mode seems to not work this way because my 5GHZ interface works on channel 136 (which has been aut-selected). I'm going to change it to non-DFS channel.

It is a second hand hub so I don't know the full history. I didn't test the original firmware either.

N/20Ghz working fine so far but it's slow (144Mbps).

@Geekuino:
The same story here. Radio0 stops working overnight when all clients are off.
Strangely not many reports on it on the forum.
I'm on default DHCP lease which is 12h.

@openwrt fwiw, I only ever use channels 36 to 48.

You could try N/40MHz next to see if it is stable. This should benefit wireless devices with a single aerial, but note the WAN to WLAN throughput speeds max out at 50+ Mbps on HH5a.

@Geekuino The DHCP server does not initiate lease renewal by trying to contact client. It's the other way round. It is the DHCP client which has to periodically contact the original DHCP server to request lease renewal. It's unlikely the DHCP server is causing the problem imho.

@bill888 Agreed, the DHCP client always asks for a renewal.

What clouds the issue is that clients are also associated (by negotation and authentication) with radio0. One would assume that radio0 does not dis-associate clients just because their leases expire > DHCP is OSI layer 7 and SSID is layer 2.

So what happens if radio0 expects a client to be associated when their lease expires, but the client is now dark and cold? Or is DHCP is a red herring and there's something odd with the 11ac frame handling on the Qualcomm chip? The Dmesg is suspicious...

Fri Sep 28 08:29:47 2018 kern.warn kernel: [223550.791684] ath10k_pci 0000:02:00.0: failed to send pdev bss chan info request

btw I would be interesting to know why BT ceased using the HH5A design, and Plusnet continued with it?

I still think the DHCP is a red-herring imho (but I could be wrong)

The reason why BT Retail and BT Business stopped supplying the 2013 model HH5A, is because they released the new BT Smart Hub from summer 2016. Plusnet continue to supply the HH5A because Plusnet is the low cost budget ISP for those of us who can't afford BT prices :slight_smile:

For your amusement:
BT Smart Hub commercial

@bill888 Thanks. So BT designed an aerial system that sends a tight beam of WiFi energy, vertical into the sky... smart that. Actually I was wondering about the history behind the HH5 model B? And did that have any known issues on the 5G channels?

For ath10k make sure that 802.11w protected management frames are disabled as that is known to cause crashes in the firmware (and unfortunately seems likely to never be fixed in the firmware even though it's a requirement of 802.11ac). It's fine and recommended to be optional for ath9k though.

https://openwrt.org/docs/guide-user/network/wifi/basic?s[]=802&s[]=11w

ieee80211w setting to enable MFP seems to be disabled by default ?

It is disabled by default.

1 Like

Even though I haven't narrowed down the culprit the following changes have resolved the issue:

  • changed radio0 channel to < 48

  • shortened DHCP lease time to 1h

  • downgraded radio0 to N/40MHz (most painful as it limits transfers to 300Mbps)

The router has been running for a week now with no issues. Seems to be pretty sturdy now.