Hi all! I am new here. I got in October a second hand mf286d TIM branded, to use the 4G LTE Modem + Wifi AC.
I followed the amazing guide and installed the 23.05 via serial. I'm not an expert, but I am familiar with basic networking, and I learned a lot on the way, I'm so excited! I take this moment to thank you for being part of this amazing community!
I managed to (after a lot of reading, watching YouTube videos, troubleshooting and translating polish and Italian to English and ChatGPT) successfully install OpenWRT, and have 120Mbps with 4G via ethernet.
I read about doing an update to the firmware to B12 (it is possible using openwrt without the zteframework?) and What is this exactly, just the modem firmware, or a firmware for the router to avoid openwrt?
Edit: I found my modem Information
Modem type
ZTE MF286D
Revision / Firmware
BD_TIMITMF286DMODULEV1.0.0B09
I still have some problems I could not manage to solve, maybe someone experienced something similar or know what can be going on?
Wifi connections make my router reboot constantly. When my computer is connected via N with WPA2PSK AES (I learned that mixed security can turn things unstable), the connection drops every couple of minutes. When my computer tries to connect with the AC interface (with or without security), the router becomes unstable in a constant reboot, until I force stop reconnecting.
Current packages used are
luci-proto-qmi
ath10k-board-qca4019
ath10k-firmware-qca4019-ct
kmod-ath
kmod-ath10k-ct
The System Log is as follows
Wed Jan 22 22:19:32 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:f7:00
Wed Jan 22 22:24:46 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:06:0d:0f:f7:00
Wed Jan 22 22:24:46 2025 kern.info kernel: [ 1485.212735] ath10k_ahb a000000.wifi: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
Wed Jan 22 22:24:46 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: authenticated
Wed Jan 22 22:24:46 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: associated (aid 2)
Wed Jan 22 22:24:46 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:0f:f7:00 auth_alg=open
Wed Jan 22 22:24:46 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 WPA: pairwise key handshake completed (RSN)
Wed Jan 22 22:24:46 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:f7:00
Wed Jan 22 22:29:56 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:06:0d:0f:f7:00
Wed Jan 22 22:29:56 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: disassociated due to inactivity
Wed Jan 22 22:29:57 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Jan 22 22:29:57 2025 kern.info kernel: [ 1796.302237] ath10k_ahb a000000.wifi: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
Wed Jan 22 22:30:00 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: authenticated
Wed Jan 22 22:30:00 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: associated (aid 2)
Wed Jan 22 22:30:00 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:0f:f7:00 auth_alg=open
Wed Jan 22 22:30:00 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 WPA: pairwise key handshake completed (RSN)
Wed Jan 22 22:30:00 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:f7:00
Wed Jan 22 22:35:14 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:06:0d:0f:f7:00
Wed Jan 22 22:35:14 2025 kern.info kernel: [ 2113.630958] ath10k_ahb a000000.wifi: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
Wed Jan 22 22:35:14 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: authenticated
Wed Jan 22 22:35:14 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: associated (aid 2)
Wed Jan 22 22:35:14 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:0f:f7:00 auth_alg=open
Wed Jan 22 22:35:14 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 WPA: pairwise key handshake completed (RSN)
Wed Jan 22 22:35:14 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:f7:00
Wed Jan 22 22:40:28 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:06:0d:0f:f7:00
Wed Jan 22 22:40:28 2025 kern.info kernel: [ 2427.811158] ath10k_ahb a000000.wifi: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
Wed Jan 22 22:40:28 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: authenticated
Wed Jan 22 22:40:28 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: associated (aid 2)
Wed Jan 22 22:40:28 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:0f:f7:00 auth_alg=open
Wed Jan 22 22:40:28 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 WPA: pairwise key handshake completed (RSN)
Wed Jan 22 22:40:28 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:f7:00
Wed Jan 22 22:45:41 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:06:0d:0f:f7:00
Wed Jan 22 22:45:42 2025 kern.info kernel: [ 2741.040498] ath10k_ahb a000000.wifi: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
Wed Jan 22 22:45:42 2025 daemon.notice hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: did not acknowledge authentication response
Wed Jan 22 22:45:45 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: authenticated
Wed Jan 22 22:45:45 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 IEEE 802.11: associated (aid 2)
Wed Jan 22 22:45:45 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:0f:f7:00 auth_alg=open
Wed Jan 22 22:45:45 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:f7:00 WPA: pairwise key handshake completed (RSN)
Wed Jan 22 22:45:45 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:f7:00
With a fresh install, OpenWRT public wifi networks work perfectly. As soon as I install luci-proto-qmi, Wifi AC connections make the router unstable and to reboot instantly.
The other 2 things are related to performance. My Carrier supports 200Mbps (tested sim with my phone).
a) When using my MF286D, Internet speed via Ethernet is limited to 120MBps. How can I increase it?
b) With Wifi N, speed is limited to 15Mbps...
I just swapped both ath10 packages for mainline, and rebooted. It didn't work. I created a new AC Wifi, and the same as before happened. As soon as it is connected the router enters a reboot loop
Just did this. Channel for AC to 80Mhz, and put Driver default for Tx power, with the Main Drivers. Same issue persists, rebooting in loop upon connecting to the wifi.
Now the following is the logged (I'm missing to try the above with the original ath10k drivers still)
Restarting AC network
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: Set new config for phy phy1:
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: Remove interface 'phy1'
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: phy1-ap0: interface state ENABLED->DISABLED
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: phy1-ap0: CTRL-EVENT-TERMINATING
Thu Jan 23 00:01:08 2025 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Thu Jan 23 00:01:08 2025 kern.warn kernel: [ 149.064910] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 1
Thu Jan 23 00:01:08 2025 kern.warn kernel: [ 149.065043] ath10k_ahb a800000.wifi: peer-unmap-event: unknown peer id 1
Thu Jan 23 00:01:08 2025 daemon.notice wpa_supplicant[1139]: Set new config for phy phy1
Thu Jan 23 00:01:08 2025 daemon.notice netifd: Wireless device 'radio1' is now down
Thu Jan 23 00:01:08 2025 daemon.notice netifd: radio1 (3796): WARNING: Variable 'data' does not exist or is not an array/object
Thu Jan 23 00:01:08 2025 daemon.notice hostapd: Set new config for phy phy1:
Thu Jan 23 00:01:08 2025 daemon.notice wpa_supplicant[1139]: Set new config for phy phy1
Thu Jan 23 00:01:09 2025 daemon.notice wpa_supplicant[1139]: Set new config for phy phy1
Thu Jan 23 00:01:09 2025 daemon.notice hostapd: Set new config for phy phy1: /var/run/hostapd-phy1.conf
Thu Jan 23 00:01:09 2025 daemon.notice hostapd: Restart interface for phy phy1
Thu Jan 23 00:01:09 2025 daemon.notice hostapd: Configuration file: data: driver=nl80211 logger_syslog=127 logger_syslog_level=2 logger_stdout=127 logger_stdout_level=2 country_code=ES ieee80211d=1 ieee80211h=1 hw_mode=a beacon_int=100 chanlist=36 tx_queue_data2_burst=2.0 #num_global_macaddr=1 ieee80211n=1 ht_coex=0 ht_capab=[HT40+][LDPC][SHORT-GI-20][SHORT-GI-40][TX-STBC][RX-STBC1][MAX-AMSDU-7935][DSSS_CCK-40] ieee80211ac=1 vht_oper_chwidth=1 vht_oper_centr_freq_seg0_idx=42 vht_capab=[RXLDPC][SHORT-GI-80][TX-STBC-2BY1][SU-BEAMFORMER][SU-BEAMFORMEE][MU-BEAMFORMER][MU-BEAMFORMEE][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][SOUNDING-DIMENSION-2][BF-ANTENNA-3][MAX-MPDU-11454][MAX-A-MPDU-LEN-EXP7] channel=36 interface=phy1-ap0 bssid=c8:ea:f8:a7:00:00 ctrl_interface=/var/run/hostapd bss_load_update_period=60 chan_util_avg_period=600 disassoc_low_ack=1 skip_inactivity_poll=0 preamble=1 wmm_enabled=1 ignore_broadcast_ssid=0 uapsd_advertisement_enabled=1 utf8_ssid=1 multi_ap=0 wpa_passphrase=Password wpa_psk_file=/var/run/host
Thu Jan 23 00:01:11 2025 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Thu Jan 23 00:01:11 2025 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->HT_SCAN
Thu Jan 23 00:01:11 2025 daemon.notice netifd: Wireless device 'radio1' is now up
Thu Jan 23 00:01:11 2025 kern.info kernel: [ 152.287073] IPv6: ADDRCONF(NETDEV_CHANGE): phy1-ap0: link becomes ready
Thu Jan 23 00:01:11 2025 daemon.notice hostapd: phy1-ap0: interface state HT_SCAN->ENABLED
Thu Jan 23 00:01:11 2025 daemon.notice hostapd: phy1-ap0: AP-ENABLED
Upon connecting
Thu Jan 23 00:02:38 2025 daemon.info hostapd: phy1-ap0: STA a0:78:17:78:26:eb IEEE 802.11: authenticated
Thu Jan 23 00:02:38 2025 daemon.info hostapd: phy1-ap0: STA a0:78:17:78:26:eb IEEE 802.11: associated (aid 1)
Thu Jan 23 00:02:38 2025 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED a0:78:17:78:26:eb auth_alg=open
Thu Jan 23 00:02:38 2025 daemon.info hostapd: phy1-ap0: STA a0:78:17:78:26:eb WPA: pairwise key handshake completed (RSN)
Thu Jan 23 00:02:38 2025 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED a0:78:17:78:00:00
And Kaboom! Reboots.
I'm trying the same with the original drivers now.
I asked ChatGPT for help to compare the log of the restart of the Wifi AC interface, with both packages.
It said that the original ones (-CT) are slightly better as there are less permission errors. Yet, it identified the following
peer-unmap-event: unknown peer id 0 appears twice, which could indicate a minor issue related to peer mapping.
Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4 suggests a potential firmware limitation, although this may not critically affect functionality.
There is a warning in the script: Variable 'data' does not exist or is not an array/object.
The interface eventually stabilizes and becomes operational (AP-ENABLED).
Im sharing this in case anyone is curious. However, despite the log result, upon connecting to Wifi, the connection drops, and the router is immediately inaccesible via ethernet.
Also, an update here. I was using it with wifi N and it seems that while doing a Speedtest with speedtest.net, then the connection with the router dropped. As soon as I disconnect the wifi, I plug ethernet and I can login via LuCi.
With ethernet everything seems to work fine...
I tried checking logs (this happened 8:35), not sure why is happening this
System Log fro LuCi (debug)
Thu Jan 23 08:35:08 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.100 fe:79:10:e2:00:00 iPhone
Thu Jan 23 08:35:08 2025 user.notice nft-qos-monitor: ACTION=add, MACADDR=fe:79:10:e2:00:00, IPADDR=192.168.1.100, HOSTNAME=iPhone
Thu Jan 23 08:35:09 2025 user.notice nft-qos-dynamic: ACTION=add, MACADDR=fe:79:10:e2:00:00, IPADDR=192.168.1.100, HOSTNAME=iPhone
Thu Jan 23 08:35:12 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:00:00 IEEE 802.11: authenticated
Thu Jan 23 08:35:12 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:00:00 IEEE 802.11: associated (aid 3)
Thu Jan 23 08:35:12 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:0f:00:00 auth_alg=open
Thu Jan 23 08:35:12 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:0f:00:00 WPA: pairwise key handshake completed (RSN)
Thu Jan 23 08:35:12 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:0f:00:00
Thu Jan 23 08:35:16 2025 kern.warn kernel: [ 79.733006] ath10k_ahb a000000.wifi: htt tx: fixing invalid VHT TX rate code 0xff
I am not sure about the Kernel timestamps but here are the last lines...
[ 23.905025] qca8k-ipq4019 c000000.switch wan: configuring for phy/psgmii link mode
[ 26.433236] ath10k_ahb a000000.wifi: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
[ 26.433318] ath10k_ahb a000000.wifi: msdu-desc: 2500 skid: 32
[ 26.482557] ath10k_ahb a000000.wifi: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
[ 26.483505] ath10k_ahb a000000.wifi: wmi print 'free: 53268 iram: 13704 sram: 35752'
[ 26.815264] ath10k_ahb a000000.wifi: rts threshold -1
[ 26.815865] ath10k_ahb a000000.wifi: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[ 26.822833] br-lan: port 4(phy0-ap0) entered blocking state
[ 26.830423] br-lan: port 4(phy0-ap0) entered disabled state
[ 26.836176] device phy0-ap0 entered promiscuous mode
[ 26.926409] ath10k_ahb a000000.wifi: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
[ 26.959983] qca8k-ipq4019 c000000.switch lan3: Link is Up - 1Gbps/Full - flow control rx/tx
[ 26.960143] br-lan: port 2(lan3) entered blocking state
[ 26.967320] br-lan: port 2(lan3) entered forwarding state
[ 26.972765] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[ 27.144997] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap0: link becomes ready
[ 27.145335] br-lan: port 4(phy0-ap0) entered blocking state
[ 27.150528] br-lan: port 4(phy0-ap0) entered forwarding state
[ 31.017328] ath10k_ahb a000000.wifi: Invalid peer id 0 or peer stats buffer, peer: 7447956a sta: 00000000
@IceG do you still have a mf286d as I see your custom Openwrt snapshot builds stopped on the 20th October last year:
I'm trying to remember if there was a known issue with 23.05 builds and that's why most people used Snapshot until the 24.10 release candidates came out for ipq4019 devices.
Ohh, thank you so much for tagging @4IceG! I tried your snapshot in my router. It has so many nice features (such as the Internet Status in Overview). I had problems with it also, and I could not troubleshoot installing packages as it was from snapshot, so I am now using 23.05+your packages now =) for the modem.
I know that in 4IceG's snapshot the ath drivers are the -ct ones, with version slightly newer... kmod-ath10k-ct - 6.6.35.2024.03.03~eb3f488a-r1 instead of 5.5 and ath10k-board-qca4019 - 20240513-r1 instead of 2023...
is there a way to get these? (can even this be the problem)?
@brada4, OpenWrt 24.10.0-rc6 r28388-58d0057481 helped with the Wifi N not crashing when doing a speedtest, THANK YOU! However it did crash (the wifi) after a few minutes...
The wifi AC still crashed upon connecting. I think the router doesn't restart, but rather the wifi crashes...
These are logs for when the wifi N crashed...
Sat Jan 25 16:00:29 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 IEEE 802.11: associated (aid 3)
Sat Jan 25 16:00:29 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:00:00 auth_alg=open
Sat Jan 25 16:00:29 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 WPA: pairwise key handshake completed (RSN)
Sat Jan 25 16:00:29 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:00:00
Sat Jan 25 16:04:48 2025 daemon.notice netifd: wwan (3805): udhcpc: sending renew to server 172.20.10.1
Sat Jan 25 16:04:48 2025 daemon.notice netifd: wwan (3805): udhcpc: lease of 172.20.10.XXX obtained from 172.20.10.XXX, lease time 3600
Sat Jan 25 16:05:43 2025 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED b8:06:0d:00:00
Sat Jan 25 16:05:43 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 IEEE 802.11: disassociated due to inactivity
Sat Jan 25 16:05:43 2025 kern.info kernel: [ 2156.269547] ath10k_ahb a000000.wifi: mac flush vdev 0 drop 0 queues 0x1 ar->paused: 0x0 arvif->paused: 0x0
Sat Jan 25 16:05:44 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Sat Jan 25 16:05:48 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 IEEE 802.11: authenticated
Sat Jan 25 16:05:48 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 IEEE 802.11: associated (aid 3)
Sat Jan 25 16:05:48 2025 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED b8:06:0d:00:00 auth_alg=open
Sat Jan 25 16:05:48 2025 daemon.info hostapd: phy0-ap0: STA b8:06:0d:00:00 WPA: pairwise key handshake completed (RSN)
Sat Jan 25 16:05:48 2025 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED b8:06:0d:00:00
Sat Jan 25 16:08:35 2025 daemon.notice netifd: Network device 'phy0-sta0' link is down
Sat Jan 25 16:08:35 2025 daemon.notice netifd: Interface 'wwan' has link connectivity loss
Sat Jan 25 16:08:35 2025 kern.info kernel: [ 2327.846717] phy0-sta0: deauthenticated from a6:b4:a9:00:00 (Reason: 2=PREV_AUTH_NOT_VALID)
Sat Jan 25 16:08:35 2025 daemon.notice netifd: wwan (3805): udhcpc: received SIGTERM
Sat Jan 25 16:08:35 2025 daemon.notice netifd: wwan (3805): udhcpc: unicasting a release of 172.20.10.XXX to 172.20.10.XXX
Sat Jan 25 16:08:35 2025 daemon.notice netifd: wwan (3805): udhcpc: sending release
Sat Jan 25 16:08:35 2025 daemon.notice netifd: wwan (3805): udhcpc: entering released state
Sat Jan 25 16:08:35 2025 daemon.notice netifd: wwan (3805): Command failed: ubus call network.interface notify_proto { "action": 0, "link-up": false, "keep": false, "interface": "wwan" } (Permission denied)
Sat Jan 25 16:08:35 2025 daemon.notice netifd: Interface 'wwan' is now down
Sat Jan 25 16:08:35 2025 kern.info kernel: [ 2327.961101] ath10k_ahb a000000.wifi: mac flush vdev 1 drop 0 queues 0x2 ar->paused: 0x0 arvif->paused: 0x0
Sat Jan 25 16:08:35 2025 kern.warn kernel: [ 2327.962021] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 2
Sat Jan 25 16:08:35 2025 kern.warn kernel: [ 2327.969860] ath10k_ahb a000000.wifi: peer-unmap-event: unknown peer id 2
Sat Jan 25 16:08:35 2025 daemon.notice wpa_supplicant[1350]: phy0-sta0: CTRL-EVENT-DISCONNECTED bssid=a6:b4:a9:00:00 reason=2
Sat Jan 25 16:08:35 2025 daemon.notice wpa_supplicant[1350]: phy0-sta0: Added BSSID a6:b4:a9:00:00 into ignore list, ignoring for 10 seconds
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using nameserver 8.8.8.8#53
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using nameserver 8.8.4.4#53
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sat Jan 25 16:08:35 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sat Jan 25 16:10:26 2025 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 00:e0:4c:00:00
Sat Jan 25 16:10:26 2025 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.XXX 00:e0:4c:00:00
Sat Jan 25 16:10:28 2025 user.notice nft-qos-monitor: ACTION=add, MACADDR=00:e0:4c:00:00, IPADDR=192.168.1.XXX, HOSTNAME=Device
Sat Jan 25 16:10:28 2025 user.notice nft-qos-monitor: ACTION=update, MACADDR=a0:78:17:00:00:00, IPADDR=192.168.1.114, HOSTNAME=
Sat Jan 25 16:10:28 2025 user.notice nft-qos-monitor: ACTION=add, MACADDR=00:e0:4c:00:00:00, IPADDR=192.168.1.220, HOSTNAME=St
Sat Jan 25 16:10:28 2025 user.notice nft-qos-dynamic: ACTION=update, MACADDR=a0:78:17:00:00:00, IPADDR=192.168.1.114, HOSTNAME=
Sat Jan 25 16:10:28 2025 user.notice nft-qos-dynamic: ACTION=add, MACADDR=00:e0:4c:00:00:00, IPADDR=192.168.1.220, HOSTNAME=St
Sat Jan 25 16:10:29 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.114 a0:78:17:00:00:00
Sat Jan 25 16:10:29 2025 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.220 00:e0:4c:00:00:00 St
Sat Jan 25 16:10:30 2025 kern.info kernel: [ 2440.321094] br-lan: port 3(lan4) entered disabled state
Sat Jan 25 16:10:31 2025 kern.info kernel: [ 2440.434657] qca8k-ipq4019 c000000.switch lan4: Link is Down
Sat Jan 25 16:10:31 2025 daemon.notice netifd: Network device 'lan4' link is down
Sat Jan 25 16:10:31 2025 kern.info kernel: [ 2440.608141] br-lan: port 2(lan3) entered disabled state
Sat Jan 25 16:10:31 2025 kern.info kernel: [ 2440.608601] br-lan: port 3(lan4) entered blocking state
Sat Jan 25 16:10:31 2025 kern.info kernel: [ 2440.609091] br-lan: port 3(lan4) entered forwarding state
Sat Jan 25 16:10:31 2025 daemon.notice netifd: Network device 'lan3' link is down
Sat Jan 25 16:10:31 2025 daemon.notice netifd: bridge 'br-lan' link is down
Sat Jan 25 16:10:31 2025 daemon.notice netifd: Interface 'lan' has link connectivity loss
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using nameserver 8.8.8.8#53
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using nameserver 8.8.4.4#53
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using nameserver 8.8.8.8#53
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Sat Jan 25 16:10:49 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Hello! I have been trying to find a solution after getting the release candidate 7.
My computer now manages to connect via wifi AC, but after a speedtest it crashes.
I am using now RC7, and the non-ct kmod and firmware drivers. I also ensured the wifi network is in the the br-lan network, DCHP assigns 8.8.8.8 as DNS configured the firewall so that LAN has internet.
The following system log appears:
08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test
Mon Feb 3 08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Mon Feb 3 08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Mon Feb 3 08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local
Mon Feb 3 08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Mon Feb 3 08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Mon Feb 3 08:38:44 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Mon Feb 3 08:38:45 2025 user.notice firewall: Reloading firewall due to ifup of 4G_4 (wwan0)
Mon Feb 3 08:41:13 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:20 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:32 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:32 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:39 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:48 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:48 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:48 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:48 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:48 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:48 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:51 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:52 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:59 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:41:59 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:04 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:04 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:18 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:20 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:20 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:20 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:20 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:38 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:45 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:42:45 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:05 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:17 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:22 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:24 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:24 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:43 2025 daemon.err uhttpd[1360]: [info] luci: accepted login on /admin/status/logs for root from 192.168.1.2
Mon Feb 3 08:43:44 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:43:44 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:44:03 2025 daemon.notice hostapd: handle_probe_req: send failed
Mon Feb 3 08:44:03 2025 daemon.notice hostapd: handle_probe_req: send failed