EX6150v2 wifi 5ghz drivers bug

hi,
running following below 5ghz wifi stopped to work ... is that some bug?

Thanks!

Model Netgear EX6150v2
Architecture ARMv7 Processor rev 5 (v7l)
Firmware Version OpenWrt 21.02.1 r16325-88151b8303 / LuCI openwrt-21.02 branch git-21.295.67054-13df80d

Kernel Log:
https://paste.debian.net/1239844/

Any idea here? or no interest? thanks

Does LAN stop working too?

@frolic lan works fine, 2.4 ghz worked fine all clients active just 5g completely dropoff till reboot

SSH in to the router and run the following -

cat /etc/config/wireless

cat /etc/config/network

logread | grep STA

Redact the passwords in the option key sections of the wireless config results.

Post all results in preformatted text, by using the icon highlighted in red...

OpenWRT Posting Icons

hello, pls find attached details

cat /etc/config/wireless

root@OpenWrt-ext1:~# cat /etc/config/wireless

config wifi-device 'radio0'
        option type 'mac80211'
        option hwmode '11g'
        option path 'platform/soc/a000000.wifi'
        option htmode 'HT20'
        option channel '4'
        option txpower '16'
        option country 'CZ'
        option cell_density '0'

config wifi-iface 'default_radio0'
        option device 'radio0'
        option network 'lan'
        option mode 'ap'
        option ssid 'xxxx'
        option encryption 'sae-mixed'
        option key 'xxxx'
        option wpa_disable_eapol_key_retries '1'

config wifi-device 'radio1'
        option type 'mac80211'
        option hwmode '11a'
        option path 'platform/soc/a800000.wifi'
        option channel '56'
        option country 'CZ'
        option cell_density '0'
        option htmode 'VHT80'
        option txpower '14'

config wifi-iface 'default_radio1'
        option device 'radio1'
        option network 'lan'
        option mode 'ap'
        option ssid 'xxxx5ghz'
        option encryption 'sae-mixed'
        option key 'xxxx'
        option wpa_disable_eapol_key_retries '1'

cat /etc/config/network

root@OpenWrt-ext1:~# cat /etc/config/network

config interface 'loopback'
        option device 'lo'
        option proto 'static'
        option ipaddr '127.0.0.1'
        option netmask '255.0.0.0'

config globals 'globals'
        option ula_prefix 'fddc:69d5:f394::/48'

config device
        option name 'br-lan'
        option type 'bridge'
        list ports 'eth0'

config interface 'lan'
        option device 'br-lan'
        option proto 'static'
        option netmask '255.255.255.0'
        option ip6assign '60'
        option ipaddr '10.0.1.3'
        option gateway '10.0.1.1'

logread | grep STA

root@OpenWrt-ext1:~# logread | grep STA
Wed Feb 16 21:54:36 2022 daemon.info hostapd: wlan0: STA 00:0c:8a:4e:21:93 WPA: group key handshake completed (RSN)
Wed Feb 16 21:55:40 2022 daemon.info hostapd: wlan1: STA d4:91:0f:f1:b5:b0 WPA: group key handshake completed (RSN)
Wed Feb 16 22:04:56 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: associated (aid 2)
Wed Feb 16 22:04:57 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED a8:db:03:31:35:21
Wed Feb 16 22:04:57 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 WPA: pairwise key handshake completed (RSN)
Wed Feb 16 22:15:08 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED a8:db:03:31:35:21
Wed Feb 16 22:15:08 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: disassociated due to inactivity
Wed Feb 16 22:15:09 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Feb 17 01:07:06 2022 daemon.info hostapd: wlan0: STA cc:c3:ea:59:10:a5 IEEE 802.11: authenticated
Thu Feb 17 01:07:06 2022 daemon.info hostapd: wlan0: STA cc:c3:ea:59:10:a5 IEEE 802.11: associated (aid 1)
Thu Feb 17 01:07:06 2022 daemon.notice hostapd: wlan0: AP-STA-CONNECTED cc:c3:ea:59:10:a5
Thu Feb 17 01:07:06 2022 daemon.info hostapd: wlan0: STA cc:c3:ea:59:10:a5 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 01:27:24 2022 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED cc:c3:ea:59:10:a5
Thu Feb 17 01:27:24 2022 daemon.info hostapd: wlan0: STA cc:c3:ea:59:10:a5 IEEE 802.11: disassociated due to inactivity
Thu Feb 17 01:27:25 2022 daemon.info hostapd: wlan0: STA cc:c3:ea:59:10:a5 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Feb 17 02:29:16 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: associated (aid 2)
Thu Feb 17 02:29:16 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED f4:0e:01:38:33:39
Thu Feb 17 02:29:16 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 02:30:02 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: associated (aid 3)
Thu Feb 17 02:30:02 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED a8:db:03:31:35:21
Thu Feb 17 02:30:02 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 02:36:53 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED a8:db:03:31:35:21
Thu Feb 17 02:36:53 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: disassociated due to inactivity
Thu Feb 17 02:36:54 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Feb 17 02:37:01 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED f4:0e:01:38:33:39
Thu Feb 17 02:37:01 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: disassociated due to inactivity
Thu Feb 17 02:37:02 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Feb 17 02:56:38 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: associated (aid 2)
Thu Feb 17 02:56:38 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED f4:0e:01:38:33:39
Thu Feb 17 02:56:38 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 02:58:50 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: authenticated
Thu Feb 17 02:58:52 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: authenticated
Thu Feb 17 02:58:52 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: associated (aid 2)
Thu Feb 17 02:58:52 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 03:04:39 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED f4:0e:01:38:33:39
Thu Feb 17 03:04:39 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: disassociated due to inactivity
Thu Feb 17 03:04:40 2022 daemon.info hostapd: wlan1: STA f4:0e:01:38:33:39 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Feb 17 03:08:12 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: associated (aid 2)
Thu Feb 17 03:08:12 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED a8:db:03:31:35:21
Thu Feb 17 03:08:12 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 03:15:28 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED a8:db:03:31:35:21
Thu Feb 17 03:15:28 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: disassociated due to inactivity
Thu Feb 17 03:15:29 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Thu Feb 17 03:58:23 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: authenticated
Thu Feb 17 03:58:23 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: associated (aid 2)
Thu Feb 17 03:58:23 2022 daemon.notice hostapd: wlan1: AP-STA-CONNECTED a8:db:03:31:35:21
Thu Feb 17 03:58:23 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 WPA: pairwise key handshake completed (RSN)
Thu Feb 17 04:10:39 2022 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED a8:db:03:31:35:21
Thu Feb 17 04:10:39 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: disassociated due to inactivity
Thu Feb 17 04:10:40 2022 daemon.info hostapd: wlan1: STA a8:db:03:31:35:21 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
root@OpenWrt-ext1:~#

thanks

In Europe, channel 56 is a DFS (radar) channel, which should be avoided.

In some geographic locations, it is illegal, and when a DFS radar channel fires up, your connection is dropped.

Complicating your issue is the 80 MHz channel width. It not only overlaps 6 other channels...but also, those 6 are DFS.

I would suggest picking a channel between 36 and 48, or 149 to 161.

Start with a channel width of 40 MHz.

So your log is showing deauthenticated due to inactivity (timer DEAUTH/REMOVE)

This is normal when devices go into sleep mode.

Try the following -

Uncheck "Disable Inactivity Polling".

Increase the value in "Station inactivity limit".

I set mine to 10 hours.

I have a couple of static devices that were getting kicked when I didn't want them kicked, so that solved it.

Keep in mind that some client devices do not support sae mixed.

I would use WPA2-PSK with AES for those that don't.

For those that do, set up a separate guest/IoT network specifically for them.

hello,
thank you for the suggestions... mine was already set as following

so it was Unchecked.

i can try to change the channels as u suggested.

no idea. it happened again today.

@frollic
and thats what i found in dmesg... so seems more as openwrt/kernel/driver issue?

[3754934.590330] device br-lan entered promiscuous mode
[3754936.454035] device br-lan left promiscuous mode
[3755203.518303] device wlan1 left promiscuous mode
[3755203.518686] br-lan: port 2(wlan1) entered disabled state
[3755203.595480] ath10k_ahb a800000.wifi: mac-vif-chan had error in htt_rx_h_vdev_channel, peer-id: 0  vdev-id: 0 peer-addr: a0:04:60:1e:4a:3e.
[3755203.596314] ath10k_ahb a800000.wifi: mac flush null vif, drop 0 queues 0xffff
[3755203.609628] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.614225] ------------[ cut here ]------------
[3755203.620147] WARNING: CPU: 0 PID: 0 at target-arm_cortex-a7+neon-vfpv4_musl_eabi/linux-ipq40xx_generic/ath10k-ct-regular/ath10k-ct-2021-09-22-e6a7d5b5/ath10k-5.10/htt_rx.c:1096 0xbf224110 [ath10k_core@79eb8f84+0x5f000]
[3755203.624913] Modules linked in: pppoe ppp_async iptable_nat ath10k_pci ath10k_core ath xt_state xt_nat xt_conntrack xt_REDIRECT xt_MASQUERADE xt_FLOWOFFLOAD xt_CT pppox ppp_generic nf_nat nf_flow_table_hw nf_flow_table nf_conntrack mac80211 ipt_REJECT cfg80211 xt_time xt_tcpudp xt_multiport xt_mark xt_mac xt_limit xt_comment xt_TCPMSS xt_LOG slhc nf_reject_ipv4 nf_log_ipv4 nf_defrag_ipv6 nf_defrag_ipv4 iptable_mangle iptable_filter ip_tables hwmon crc_ccitt compat nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom gpio_button_hotplug
[3755203.678968] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.154 #0
[3755203.701188] Hardware name: Generic DT based system
[3755203.707445] Function entered at [<c030e444>] from [<c030aec4>]
[3755203.712562] Function entered at [<c030aec4>] from [<c088b244>]
[3755203.718550] Function entered at [<c088b244>] from [<c032134c>]
[3755203.724537] Function entered at [<c032134c>] from [<c03213b8>]
[3755203.730528] Function entered at [<c03213b8>] from [<bf224110>]
[3755203.736548] Function entered at [<bf224110>] from [<bf2242d0>]
[3755203.742508] Function entered at [<bf2242d0>] from [<bf228988>]
[3755203.748495] Function entered at [<bf228988>] from [<bf229510>]
[3755203.754486] Function entered at [<bf229510>] from [<bf26852c>]
[3755203.760479] Function entered at [<bf26852c>] from [<c0739540>]
[3755203.766465] Function entered at [<c0739540>] from [<c07397a8>]
[3755203.772457] Function entered at [<c07397a8>] from [<c0302288>]
[3755203.778447] Function entered at [<c0302288>] from [<c03252ec>]
[3755203.784436] Function entered at [<c03252ec>] from [<c036b2b8>]
[3755203.790425] Function entered at [<c036b2b8>] from [<c05b73c4>]
[3755203.796415] Function entered at [<c05b73c4>] from [<c0301a8c>]
[3755203.802406] Exception stack(0xc0b01f28 to 0xc0b01f70)
[3755203.808396] 1f20:                   00000000 2c005068 cfd77274 c0313b60 ffffe000 c0b04e68
[3755203.813350] 1f40: c0b04ea8 00000001 00000000 c0a3fde8 c0b0df80 00000000 c0b04f10 c0b01f78
[3755203.821680] 1f60: c03082f8 c03082fc 60000013 ffffffff
[3755203.830008] Function entered at [<c0301a8c>] from [<c03082fc>]
[3755203.835217] Function entered at [<c03082fc>] from [<c0349d20>]
[3755203.841466] Function entered at [<c0349d20>] from [<c0349fe8>]
[3755203.847455] Function entered at [<c0349fe8>] from [<c0a00d58>]
[3755203.853469] ---[ end trace a8b74add6e232640 ]---
[3755203.861152] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.864055] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.869914] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.875681] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.881544] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.887310] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.893153] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.898965] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.904754] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.910601] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.916389] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.922230] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.928041] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.933836] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.939678] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.945468] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.951309] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.957100] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.962937] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.968755] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.974546] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.980388] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.986181] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.992022] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755203.997832] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.003628] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.009470] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.015259] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.021099] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.026892] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.032731] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755204.038545] ath10k_ahb a800000.wifi: No VIF found for vdev 0

[3755206.138111] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755206.143905] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755206.149745] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755206.155539] ath10k_ahb a800000.wifi: No VIF found for vdev 0
[3755206.162630] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.167278] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.174915] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.182349] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.189814] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.197187] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.204700] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.212188] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.219645] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.227074] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.234592] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.242053] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.249525] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.256897] ath10k_ahb a000000.wifi: SWBA overrun on vdev 0, skipped old beacon
[3755206.269693] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755206.271773] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755206.278608] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755207.809687] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[3755207.809744] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[3755207.845302] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[3755207.846367] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[3755208.137207] ath10k_ahb a800000.wifi: rts threshold -1
[3755208.142471] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[3755208.154903] br-lan: port 2(wlan1) entered blocking state
[3755208.154948] br-lan: port 2(wlan1) entered disabled state
[3755208.159828] device wlan1 entered promiscuous mode
[3755208.219684] device wlan1 left promiscuous mode
[3755208.221043] br-lan: port 2(wlan1) entered disabled state
[3755208.267966] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755209.758745] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[3755209.758802] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[3755209.794422] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[3755209.795473] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[3755210.082741] ath10k_ahb a800000.wifi: rts threshold -1
[3755210.090537] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[3755210.105915] br-lan: port 2(wlan1) entered blocking state
[3755210.105958] br-lan: port 2(wlan1) entered disabled state
[3755210.110847] device wlan1 entered promiscuous mode
[3755210.159707] device wlan1 left promiscuous mode
[3755210.161074] br-lan: port 2(wlan1) entered disabled state
[3755210.222272] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755211.707369] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[3755211.707420] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[3755211.743131] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[3755211.744539] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[3755212.031612] ath10k_ahb a800000.wifi: rts threshold -1
[3755212.037395] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[3755212.052818] br-lan: port 2(wlan1) entered blocking state
[3755212.052861] br-lan: port 2(wlan1) entered disabled state
[3755212.057647] device wlan1 entered promiscuous mode
[3755212.097973] device wlan1 left promiscuous mode
[3755212.098751] br-lan: port 2(wlan1) entered disabled state
[3755212.169518] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755213.660560] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[3755213.660607] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[3755213.696182] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[3755213.697618] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[3755213.982275] ath10k_ahb a800000.wifi: rts threshold -1
[3755213.986182] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[3755213.998417] br-lan: port 2(wlan1) entered blocking state
[3755213.998461] br-lan: port 2(wlan1) entered disabled state
[3755214.003530] device wlan1 entered promiscuous mode
[3755214.047950] device wlan1 left promiscuous mode
[3755214.048727] br-lan: port 2(wlan1) entered disabled state
[3755214.098407] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 0
[3755215.589444] ath10k_ahb a800000.wifi: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
[3755215.589502] ath10k_ahb a800000.wifi: msdu-desc: 2500  skid: 32
[3755215.625147] ath10k_ahb a800000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
[3755215.626298] ath10k_ahb a800000.wifi: wmi print 'free: 53252 iram: 13432 sram: 35752'
[3755215.916780] ath10k_ahb a800000.wifi: rts threshold -1
[3755215.923342] ath10k_ahb a800000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[3755215.933269] br-lan: port 2(wlan1) entered blocking state
[3755215.933748] br-lan: port 2(wlan1) entered disabled state
[3755215.939574] device wlan1 entered promiscuous mode
[3755234.597778] device br-lan entered promiscuous mode
[3755236.512313] device br-lan left promiscuous mode
[3755534.595542] device br-lan entered promiscuous mode
[3755536.507713] device br-lan left promiscuous mode

how can you do that? I mean set up two networks with different Security mode?

do i have to upgrade openwrt image on that device?