Follow on conversation for TP-Link Archer A6 v2 5GHz improvements, including user support

in variant 3 , stock board data not working. Need to check the difference with variant 1 and variant 2.
invalid board magic

we used the dl/google-drive/1L3phKriJCGbkdo3rrDT_MeLn_3HbKgsc/firmware/QCA9888/hw.2/boardData_2_0_QCA9888_5G_YA105.bin file provided.

Does it match?

$ md5sum files/lib/firmware/ath10k/QCA9888/hw2.0/board-2.bin
7f98d98948cdd0ed8f10eac30dde1d1b  files/lib/firmware/ath10k/QCA9888/hw2.0/board-2.bin
$ sha1sum files/lib/firmware/ath10k/QCA9888/hw2.0/board-2.bin
bb0bce13abdf5af6379cbd64d54c2c4805b38bcc  files/lib/firmware/ath10k/QCA9888/hw2.0/board-2.bin
$ sha512sum files/lib/firmware/ath10k/QCA9888/hw2.0/board-2.bin
a2681d49f459ed57aff6bb6f56fa8b48fc7fb192746391b2de1b58b79900dac1e0ed733cd8474b4d73b7bbaa6a7a22560004027e28824a1fbf100ba2cc50604f  files/lib/firmware/ath10k/QCA9888/hw2.0/board-2.bin
1 Like

yes. matched

$ md5sum boardData_2_0_QCA9888_5G_YA105.bin
7f98d98948cdd0ed8f10eac30dde1d1b  boardData_2_0_QCA9888_5G_YA105.bin

Well, zram isn't magic. It might give you a usability edge on near-borderline systems, but don't expect miracles. The default lzo algorithm also isn't an example of performance (both in compression ratio and speed), but there are better choices.
Additionally, the zram-swap defaults are rather conservative. You might want to play with them, in addition to the vm.{overcommit,swappiness,page-cluster} parameters.

I flashed build 30 v2 just now and 5gz is working, no more reboots. Connected to my phone which refused to connect before. Range also seems to be very good. Will do further testing.

1 Like

That is build 26, snapshot variant

1 Like

Please. Add a custom files to enable 2.4ghz wifi and 5ghz wifi by default.

File name: wireless
File placing location: (build_directory)/files/etc/config/
File will include this


config wifi-device 'radio0'
	option type 'mac80211'
	option channel '36'
	option hwmode '11a'
	option path 'pci0000:00/0000:00:00.0'
	option htmode 'VHT80'
	option country 'TW'
	option cell_density '0'
	option txpower '23'
	option legacy_rates '0'

config wifi-iface 'default_radio0'
	option device 'radio0'
	option network 'lan'
	option mode 'ap'
	option encryption 'none'
	option ssid 'OpenWrt 5G'

config wifi-device 'radio1'
	option type 'mac80211'
	option hwmode '11g'
	option path 'platform/ahb/18100000.wmac'
	option htmode 'HT20'
	option txpower '25'
	option cell_density '0'
	option channel 'auto'
	option country 'TW'
	option legacy_rates '0'

config wifi-iface 'default_radio1'
	option device 'radio1'
	option network 'lan'
	option mode 'ap'
	option ssid 'OpenWrt'
	option encryption 'none'


This seems a little bit too specific. The operator can configure their wireless settings after installing the firmware.

1 Like

I have restored the default of adding kmos zram and zram swap. I did not see any relevant bugs at: https://bugs.openwrt.org/...?zram . If you can file a bug it can be fixed.

There was a bug in the builds previously with the variants. This has been addressed in build 32 onwards.

To remind everyone - these are automated builds w/luci of snapshots. You should be prepared for bugs. You should understand your hardware and take caution and know your recovery options.

1 Like

Can we try this firmware?

If someone wants to patch openwrt, I will track their repo and produce builds as well.

1 Like

Hi pdinc-oss,

Sorry I've been busy with work. As I mentioned in an earlier post, I have the TP-Link AC1200 (Archer A6), and I just tried the following builds for openwrt-ath79-generic-tplink_archer-c6-v2-us-squashfs-sysupgrade.bin:

#38 variant 2 and snapshot variant
#30 variant 2
#26 snapshot variant

However, I still could not connect via 5G with any of these versions. Do you think I might have a hardware issue, or could there be something specific to Archer A6 (US version) that has not been addressed? Thanks again!

Should maybe add a warning on the device wiki that flashing back to stock will require TFTP, and that the TFTP on this device is finicky. Almost gave up with my PC and various switches / Ethernet dongles, then happened to try an old MacBook which worked with a dongle and no switch.

The CPU on this is anemic for 2020, but this is probably still the best bang-for-your-buck ($35 on sale new in US) router that happens to also have OpenWrt support. Low power consumption at 3W or so idle.

Hopefully the 5ghz issues are eventually fixed. My experiences seem to echo what I skimmed of this thread and the GitHub commit. From another OpenWrt router two rooms away, latest snapshot measured high 70s RSSI vs 50-60s on stock. Speeds were okay for my needs, at 200-300Mbps in the same room on snapshot, but stock still averages 300-400Mbps and has working WPA3 out of the box, so Iā€™m going to use that for now. Even though the speeds were fine on OpenWrt, the signal difference led to my devices more readily swapping from a more distant AP when moving between rooms, which was a tangible improvement.

I will attempt to flash a new in box router today, using build 38 snapshot factory. I will then connect a windows 10 dell laptop to it. Please post as much details (e.g. bottom of device label information as you can)

Info from router label:
tp-link
Model: Archer A6 (US), Ver: 2.8
AC1200 Wireless MU-MIMO Gigabit Router
Made in Vietnam

can you share system log of openwrt?

Hi, this is what I got after trying to connect via 5G (using build 38 variant 2). I haven't had a chance to upgrade to the latest build yet.

Sun Dec 20 06:47:29 2020 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) --> new PHY
Sun Dec 20 06:47:31 2020 kern.warn kernel: [103265.264248] ath10k_pci 0000:00:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
Sun Dec 20 06:47:31 2020 kern.warn kernel: [103265.272214] ath10k_pci 0000:00:00.0: msdu-desc: 2500  skid: 32
Sun Dec 20 06:47:31 2020 kern.info kernel: [103265.301694] ath10k_pci 0000:00:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
Sun Dec 20 06:47:31 2020 kern.info kernel: [103265.313113] ath10k_pci 0000:00:00.0: wmi print 'free: 151124 iram: 4132 sram: 56640'
Sun Dec 20 06:47:31 2020 kern.warn kernel: [103265.621868] ath10k_pci 0000:00:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Sun Dec 20 06:47:31 2020 kern.info kernel: [103265.639248] br-lan: port 3(wlan0) entered blocking state
Sun Dec 20 06:47:31 2020 kern.info kernel: [103265.644904] br-lan: port 3(wlan0) entered disabled state
Sun Dec 20 06:47:31 2020 kern.info kernel: [103265.650946] device wlan0 entered promiscuous mode
Sun Dec 20 06:47:31 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Sun Dec 20 06:47:31 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Sun Dec 20 06:47:32 2020 kern.info kernel: [103266.228002] ath10k_pci 0000:00:00.0: NOTE:  Firmware DBGLOG output disabled in debug_mask: 0x10000000
Sun Dec 20 06:47:32 2020 kern.info kernel: [103266.251481] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Sun Dec 20 06:47:32 2020 kern.info kernel: [103266.258464] br-lan: port 3(wlan0) entered blocking state
Sun Dec 20 06:47:32 2020 kern.info kernel: [103266.264118] br-lan: port 3(wlan0) entered forwarding state
Sun Dec 20 06:47:32 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Sun Dec 20 06:47:32 2020 daemon.notice hostapd: wlan0: AP-ENABLED
Sun Dec 20 06:47:32 2020 daemon.notice netifd: Network device 'wlan0' link is up
Sun Dec 20 06:47:33 2020 daemon.debug dnsmasq[2474]: listening on wlan0(#18): fe80::1e3b:f3ff:fe4c:939b%wlan0 port 53
Sun Dec 20 06:47:50 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 IEEE 802.11: authenticated
Sun Dec 20 06:47:50 2020 daemon.notice hostapd: wlan0: STA-OPMODE-N_SS-CHANGED 68:db:f5:ac:4e:54 1
Sun Dec 20 06:47:50 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 IEEE 802.11: associated (aid 1)
Sun Dec 20 06:47:50 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 68:db:f5:ac:4e:54
Sun Dec 20 06:47:50 2020 kern.warn kernel: [103284.866738] ath10k_pci 0000:00:00.0: Invalid peer id 0 or peer stats buffer, peer: 67587bca  sta: 00000000
Sun Dec 20 06:47:50 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 RADIUS: starting accounting session EEBFBCAA22714836
Sun Dec 20 06:47:50 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:47:54 2020 daemon.info dnsmasq-dhcp[2474]: DHCPDISCOVER(br-lan) 68:db:f5:ac:4e:54
Sun Dec 20 06:47:54 2020 daemon.info dnsmasq-dhcp[2474]: DHCPOFFER(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:47:54 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:47:54 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:48:03 2020 kern.warn kernel: [103297.150065] ath10k_pci 0000:00:00.0: Invalid VHT mcs 15 peer stats
Sun Dec 20 06:48:13 2020 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED d2:9f:53:65:6a:8f
Sun Dec 20 06:48:13 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: disassociated
Sun Dec 20 06:48:13 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:13 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:13 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:13 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:13 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:14 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Dec 20 06:48:16 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: authenticated
Sun Dec 20 06:48:16 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: authenticated
Sun Dec 20 06:48:16 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: associated (aid 2)
Sun Dec 20 06:48:16 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d2:9f:53:65:6a:8f
Sun Dec 20 06:48:16 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f RADIUS: starting accounting session EFB4561A8ACCAB7B
Sun Dec 20 06:48:16 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:48:22 2020 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED d2:9f:53:65:6a:8f
Sun Dec 20 06:48:32 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:32 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:32 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:32 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:33 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:48:38 2020 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED d6:6f:ea:ae:25:02
Sun Dec 20 06:48:38 2020 daemon.info hostapd: wlan1: STA d6:6f:ea:ae:25:02 IEEE 802.11: disassociated
Sun Dec 20 06:48:39 2020 daemon.info hostapd: wlan1: STA d6:6f:ea:ae:25:02 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sun Dec 20 06:48:40 2020 daemon.info hostapd: wlan1: STA d6:6f:ea:ae:25:02 IEEE 802.11: authenticated
Sun Dec 20 06:48:40 2020 daemon.info hostapd: wlan1: STA d6:6f:ea:ae:25:02 IEEE 802.11: associated (aid 1)
Sun Dec 20 06:48:40 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d6:6f:ea:ae:25:02
Sun Dec 20 06:48:40 2020 daemon.info hostapd: wlan1: STA d6:6f:ea:ae:25:02 RADIUS: starting accounting session A040331C1A3442F7
Sun Dec 20 06:48:40 2020 daemon.info hostapd: wlan1: STA d6:6f:ea:ae:25:02 WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:48:41 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.224 d6:6f:ea:ae:25:02
Sun Dec 20 06:48:41 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.224 d6:6f:ea:ae:25:02 MVP
Sun Dec 20 06:48:50 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: authenticated
Sun Dec 20 06:48:50 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f IEEE 802.11: associated (aid 2)
Sun Dec 20 06:48:50 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED d2:9f:53:65:6a:8f
Sun Dec 20 06:48:50 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f RADIUS: starting accounting session 2E2E921DD770D756
Sun Dec 20 06:48:50 2020 daemon.info hostapd: wlan1: STA d2:9f:53:65:6a:8f WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:48:50 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.220 d2:9f:53:65:6a:8f
Sun Dec 20 06:48:50 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.220 d2:9f:53:65:6a:8f iPhone
Sun Dec 20 06:49:49 2020 kern.info kernel: [103403.853811] device wlan1 left promiscuous mode
Sun Dec 20 06:49:49 2020 kern.info kernel: [103403.858719] br-lan: port 2(wlan1) entered disabled state
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: Remove interface 'wlan1'
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan1: interface state ENABLED->DISABLED
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED d2:9f:53:65:6a:8f
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED d6:6f:ea:ae:25:02
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan1: AP-STA-DISCONNECTED 8e:82:f2:da:6d:25
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan1: AP-DISABLED
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan1: CTRL-EVENT-TERMINATING
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: nl80211: deinit ifname=wlan1 disabled_11b_rates=0
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: nl80211: Failed to remove interface wlan1 from bridge br-lan: Invalid argument
Sun Dec 20 06:49:50 2020 daemon.debug dnsmasq[2474]: stopped listening on wlan1(#14): fe80::1e3b:f3ff:fe4c:939c%wlan1 port 53
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED 68:db:f5:ac:4e:54
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan0: AP-DISABLED
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Sun Dec 20 06:49:50 2020 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Sun Dec 20 06:49:50 2020 kern.info kernel: [103404.321876] device wlan0 left promiscuous mode
Sun Dec 20 06:49:50 2020 kern.info kernel: [103404.326752] br-lan: port 3(wlan0) entered disabled state
Sun Dec 20 06:49:50 2020 kern.info kernel: [103404.337496] ath10k_pci 0000:00:00.0: mac flush null vif, drop 0 queues 0xffff
Sun Dec 20 06:49:50 2020 kern.warn kernel: [103404.346068] ath10k_pci 0000:00:00.0: peer-unmap-event: unknown peer id 0
Sun Dec 20 06:49:50 2020 kern.warn kernel: [103404.353109] ath10k_pci 0000:00:00.0: peer-unmap-event: unknown peer id 0
Sun Dec 20 06:49:50 2020 daemon.notice netifd: Network device 'wlan0' link is down
Sun Dec 20 06:49:50 2020 daemon.debug dnsmasq[2474]: stopped listening on wlan0(#18): fe80::1e3b:f3ff:fe4c:939b%wlan0 port 53
Sun Dec 20 06:49:51 2020 daemon.notice netifd: radio0 (5750): Command failed: Not found
Sun Dec 20 06:49:55 2020 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy wlan0) --> new PHY
Sun Dec 20 06:49:57 2020 kern.warn kernel: [103411.519900] ath10k_pci 0000:00:00.0: 10.4 wmi init: vdevs: 16  peers: 48  tid: 96
Sun Dec 20 06:49:57 2020 kern.warn kernel: [103411.527774] ath10k_pci 0000:00:00.0: msdu-desc: 2500  skid: 32
Sun Dec 20 06:49:57 2020 kern.info kernel: [103411.557136] ath10k_pci 0000:00:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186  msdu-desc: 2500  sw-crypt: 0 ct-sta: 0'
Sun Dec 20 06:49:57 2020 kern.info kernel: [103411.568554] ath10k_pci 0000:00:00.0: wmi print 'free: 151124 iram: 4132 sram: 56640'
Sun Dec 20 06:49:57 2020 kern.warn kernel: [103411.877290] ath10k_pci 0000:00:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Sun Dec 20 06:49:57 2020 kern.info kernel: [103411.905511] br-lan: port 2(wlan0) entered blocking state
Sun Dec 20 06:49:57 2020 kern.info kernel: [103411.911160] br-lan: port 2(wlan0) entered disabled state
Sun Dec 20 06:49:57 2020 kern.info kernel: [103411.917043] device wlan0 entered promiscuous mode
Sun Dec 20 06:49:57 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
Sun Dec 20 06:49:57 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Sun Dec 20 06:49:58 2020 kern.info kernel: [103412.584605] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
Sun Dec 20 06:49:58 2020 kern.info kernel: [103412.591511] br-lan: port 2(wlan0) entered blocking state
Sun Dec 20 06:49:58 2020 kern.info kernel: [103412.597134] br-lan: port 2(wlan0) entered forwarding state
Sun Dec 20 06:49:58 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
Sun Dec 20 06:49:58 2020 daemon.notice hostapd: wlan0: AP-ENABLED
Sun Dec 20 06:49:59 2020 daemon.notice netifd: Network device 'wlan0' link is up
Sun Dec 20 06:50:00 2020 daemon.debug dnsmasq[2474]: listening on wlan0(#19): fe80::1e3b:f3ff:fe4c:939b%wlan0 port 53
Sun Dec 20 06:50:06 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 IEEE 802.11: authenticated
Sun Dec 20 06:50:06 2020 daemon.notice hostapd: wlan0: STA-OPMODE-N_SS-CHANGED 68:db:f5:ac:4e:54 1
Sun Dec 20 06:50:06 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 IEEE 802.11: associated (aid 1)
Sun Dec 20 06:50:06 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 68:db:f5:ac:4e:54
Sun Dec 20 06:50:06 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 RADIUS: starting accounting session 84C4F4E89C721653
Sun Dec 20 06:50:06 2020 daemon.info hostapd: wlan0: STA 68:db:f5:ac:4e:54 WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:50:07 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:07 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:10 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:10 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:11 2020 daemon.info hostapd: wlan0: STA 04:52:f3:1b:e3:8b IEEE 802.11: authenticated
Sun Dec 20 06:50:11 2020 daemon.info hostapd: wlan0: STA 04:52:f3:1b:e3:8b IEEE 802.11: associated (aid 2)
Sun Dec 20 06:50:11 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:11 2020 daemon.info hostapd: wlan0: STA 04:52:f3:1b:e3:8b RADIUS: starting accounting session C7F7F1C81D8F818E
Sun Dec 20 06:50:11 2020 daemon.info hostapd: wlan0: STA 04:52:f3:1b:e3:8b WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:50:13 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: authenticated
Sun Dec 20 06:50:13 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: associated (aid 3)
Sun Dec 20 06:50:13 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED fa:37:04:a8:81:69
Sun Dec 20 06:50:13 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 RADIUS: starting accounting session 65F640AED3C44FB7
Sun Dec 20 06:50:13 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 WPA: pairwise key handshake completed (RSN)
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPDISCOVER(br-lan) 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPOFFER(br-lan) 192.168.1.140 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPDISCOVER(br-lan) 68:db:f5:ac:4e:54
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPOFFER(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPDISCOVER(br-lan) 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPOFFER(br-lan) 192.168.1.140 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:14 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.180 68:db:f5:ac:4e:54
Sun Dec 20 06:50:15 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.140 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:15 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.140 04:52:f3:1b:e3:8b Daniels-iPad
Sun Dec 20 06:50:16 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.140 04:52:f3:1b:e3:8b
Sun Dec 20 06:50:16 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.140 04:52:f3:1b:e3:8b Daniels-iPad
Sun Dec 20 06:50:19 2020 daemon.info dnsmasq-dhcp[2474]: DHCPDISCOVER(br-lan) fa:37:04:a8:81:69
Sun Dec 20 06:50:19 2020 daemon.info dnsmasq-dhcp[2474]: DHCPOFFER(br-lan) 192.168.1.205 fa:37:04:a8:81:69
Sun Dec 20 06:50:21 2020 daemon.info dnsmasq-dhcp[2474]: DHCPREQUEST(br-lan) 192.168.1.205 fa:37:04:a8:81:69
Sun Dec 20 06:50:21 2020 daemon.info dnsmasq-dhcp[2474]: DHCPACK(br-lan) 192.168.1.205 fa:37:04:a8:81:69 MVP
Sun Dec 20 06:50:23 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:23 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:23 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:23 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:23 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:44 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:44 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:44 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:44 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:50:45 2020 daemon.notice hostapd: wlan0: STA 06:28:37:20:df:b3 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:16 2020 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED fa:37:04:a8:81:69
Sun Dec 20 06:51:16 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:17 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:17 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:17 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:17 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:36 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:36 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:36 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:36 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:37 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:51:54 2020 daemon.err uwsgi[1821]: Sun Dec 20 06:51:54 2020 - [emperor] bringing back instance /etc/uwsgi/vassals/luci-cgi_io.ini to on-demand mode
Sun Dec 20 06:51:54 2020 daemon.err uwsgi[1821]: Sun Dec 20 06:51:54 2020 - [emperor] curse the uwsgi instance /etc/uwsgi/vassals/luci-cgi_io.ini (pid: 5196)
Sun Dec 20 06:51:56 2020 daemon.err uwsgi[1821]: [uwsgi-emperor] /etc/uwsgi/vassals/luci-cgi_io.ini -> back to "on demand" mode, waiting for connections on socket "/var/run//luci-cgi_io.socket" ...
Sun Dec 20 06:52:10 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:10 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: authenticated
Sun Dec 20 06:52:10 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: authenticated
Sun Dec 20 06:52:19 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:19 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:20 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:20 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:20 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:27 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: authenticated
Sun Dec 20 06:52:27 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:27 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:27 2020 daemon.info hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: authenticated
Sun Dec 20 06:52:27 2020 daemon.notice hostapd: wlan0: STA fa:37:04:a8:81:69 IEEE 802.11: did not acknowledge authentication response
Sun Dec 20 06:52:41 2020 daemon.err uwsgi[1821]: *** has_emperor mode detected (fd: 8) ***
Sun Dec 20 06:52:41 2020 daemon.err uwsgi[1821]: [uWSGI] getting INI configuration from /etc/uwsgi/vassals/luci-cgi_io.ini
Sun Dec 20 06:52:41 2020 daemon.err uwsgi[1821]: Sun Dec 20 06:52:41 2020 - [emperor] vassal /etc/uwsgi/vassals/luci-cgi_io.ini has been spawned
Sun Dec 20 06:52:41 2020 daemon.err uwsgi[1821]: Sun Dec 20 06:52:41 2020 - [emperor] vassal /etc/uwsgi/vassals/luci-cgi_io.ini is ready to accept requests

I have not had any issues yet on the snapshot variant, been getting good speeds too. I am going to deploy it to more units. Do you have a test case/plan I can follow?