MT7916 with Banana PI R4 - Wifi disconnect

Hello,
I did install 2x MT7916 on Banana PI R4 and build snapshot manually last week to include all required drivers. Wifi is available for all my devices. : 2.4Ghz, 5Ghz and 6Ghz. However, wifi drops intermittently. It happens on a PC or a smartphone like iPhone. It happens with a full strength signal (like 2 meters from router) or with a weak signal.
I decided to enable debug log. However, I'm unable to understand the issue. Could you help me to debug ?
In that case, I got drop on my iPhone 15 about 12:12.


Tue Jun  4 12:10:00 2024 authpriv.info dropbear[13095]: Child connection from 192.168.32.34:33818
Tue Jun  4 12:10:00 2024 authpriv.notice dropbear[13095]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:/t/xxxxxx from 192.168.32.34:33818
Tue Jun  4 12:10:00 2024 authpriv.info dropbear[13095]: Exit (root) from <192.168.32.34:33818>: Exited normally
Tue Jun  4 12:11:00 2024 authpriv.info dropbear[13097]: Child connection from 192.168.32.34:37714
Tue Jun  4 12:11:00 2024 authpriv.notice dropbear[13097]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:/t/xxxxxx from 192.168.32.34:37714
Tue Jun  4 12:11:00 2024 authpriv.info dropbear[13097]: Exit (root) from <192.168.32.34:37714>: Exited normally
Tue Jun  4 12:12:00 2024 authpriv.info dropbear[13099]: Child connection from 192.168.32.34:55384
Tue Jun  4 12:12:00 2024 authpriv.notice dropbear[13099]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:/t/xxxxxx from 192.168.32.34:55384
Tue Jun  4 12:12:00 2024 authpriv.info dropbear[13099]: Exit (root) from <192.168.32.34:55384>: Exited normally
Tue Jun  4 12:12:16 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authentication OK (open system)
Tue Jun  4 12:12:16 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 0 notification
Tue Jun  4 12:12:16 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-AUTHENTICATE.indication(c6:f1:38:5b:aa:aa, OPEN_SYSTEM)
Tue Jun  4 12:12:16 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authenticated
Tue Jun  4 12:12:16 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 1
Tue Jun  4 12:12:16 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 2
Tue Jun  4 12:12:16 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 3
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 4
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 5
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query timed out
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authentication OK (open system)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 0 notification
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-AUTHENTICATE.indication(c6:f1:38:5b:aa:aa, OPEN_SYSTEM)
Tue Jun  4 12:12:17 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authenticated
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: PMKID found from PMKSA cache eap_type=0 vlan=0
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association OK (aid 1)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 8 notification
Tue Jun  4 12:12:17 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: associated (aid 1)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-REASSOCIATE.indication(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: binding station to interface 'phy1-ap0'
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 1 notification
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 4 notification
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: sending 1/4 msg of 4-Way Handshake
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: received EAPOL-Key frame (2/4 Pairwise)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: sending 3/4 msg of 4-Way Handshake
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: received EAPOL-Key frame (4/4 Pairwise)
Tue Jun  4 12:12:17 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: authorizing port
Tue Jun  4 12:12:17 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa RADIUS: starting accounting session 323B512ED34B69DA
Tue Jun  4 12:12:17 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: pairwise key handshake completed (RSN)
Tue Jun  4 12:12:17 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED c6:f1:38:5b:aa:aa
Tue Jun  4 12:12:48 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED c6:f1:38:5b:aa:aa
Tue Jun  4 12:12:48 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 2 notification
Tue Jun  4 12:12:48 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: unauthorizing port
Tue Jun  4 12:12:48 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: disassociated
Tue Jun  4 12:12:48 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DISASSOCIATE.indication(c6:f1:38:5b:aa:aa, 8)
Tue Jun  4 12:12:48 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:49 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DEAUTHENTICATE.indication(c6:f1:38:5b:aa:aa, 2)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authentication OK (open system)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-AUTHENTICATE.indication(c6:f1:38:5b:aa:aa, OPEN_SYSTEM)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:49 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authenticated
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: PMKID found from PMKSA cache eap_type=0 vlan=0
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association OK (aid 1)
Tue Jun  4 12:12:49 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: associated (aid 1)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-ASSOCIATE.indication(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: binding station to interface 'phy1-ap0'
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 1 notification
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: start authentication
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: unauthorizing port
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: sending 1/4 msg of 4-Way Handshake
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: received EAPOL-Key frame (2/4 Pairwise)
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: sending 3/4 msg of 4-Way Handshake
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: received EAPOL-Key frame (4/4 Pairwise)
Tue Jun  4 12:12:49 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED c6:f1:38:5b:aa:aa auth_alg=open
Tue Jun  4 12:12:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: authorizing port
Tue Jun  4 12:12:49 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa RADIUS: starting accounting session B15179D5B88C5075
Tue Jun  4 12:12:49 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: pairwise key handshake completed (RSN)
Tue Jun  4 12:12:49 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED c6:f1:38:5b:aa:aa
Tue Jun  4 12:12:49 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:12:53 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:12:58 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:13:00 2024 authpriv.info dropbear[13101]: Child connection from 192.168.32.34:42578
Tue Jun  4 12:13:00 2024 authpriv.notice dropbear[13101]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:/t/xxxxxx from 192.168.32.34:42578
Tue Jun  4 12:13:00 2024 authpriv.info dropbear[13101]: Exit (root) from <192.168.32.34:42578>: Exited normally
Tue Jun  4 12:13:33 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:13:49 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED c6:f1:38:5b:aa:aa
Tue Jun  4 12:13:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 2 notification
Tue Jun  4 12:13:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: unauthorizing port
Tue Jun  4 12:13:49 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: disassociated
Tue Jun  4 12:13:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DISASSOCIATE.indication(c6:f1:38:5b:aa:aa, 8)
Tue Jun  4 12:13:49 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:13:50 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Jun  4 12:13:50 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DEAUTHENTICATE.indication(c6:f1:38:5b:aa:aa, 2)
Tue Jun  4 12:13:50 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authentication OK (open system)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-AUTHENTICATE.indication(c6:f1:38:5b:aa:aa, OPEN_SYSTEM)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:13:54 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authenticated
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: PMKID found from PMKSA cache eap_type=0 vlan=0
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association OK (aid 1)
Tue Jun  4 12:13:54 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: associated (aid 1)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-ASSOCIATE.indication(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-DELETEKEYS.request(c6:f1:38:5b:aa:aa)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: binding station to interface 'phy1-ap0'
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 1 notification
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: start authentication
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: unauthorizing port
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: sending 1/4 msg of 4-Way Handshake
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: received EAPOL-Key frame (2/4 Pairwise)
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: sending 3/4 msg of 4-Way Handshake
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: received EAPOL-Key frame (4/4 Pairwise)
Tue Jun  4 12:13:54 2024 daemon.notice hostapd: phy1-ap0: AP-STA-CONNECTED c6:f1:38:5b:aa:aa auth_alg=open
Tue Jun  4 12:13:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.1X: authorizing port
Tue Jun  4 12:13:54 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa RADIUS: starting accounting session 091FE887C473F2CB
Tue Jun  4 12:13:54 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: pairwise key handshake completed (RSN)
Tue Jun  4 12:13:54 2024 daemon.notice hostapd: phy1-ap0: EAPOL-4WAY-HS-COMPLETED c6:f1:38:5b:aa:aa
Tue Jun  4 12:13:54 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:13:59 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:14:00 2024 authpriv.info dropbear[13111]: Child connection from 192.168.32.34:46590
Tue Jun  4 12:14:00 2024 authpriv.notice dropbear[13111]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:/t/xxxxxx from 192.168.32.34:46590
Tue Jun  4 12:14:00 2024 authpriv.info dropbear[13111]: Exit (root) from <192.168.32.34:46590>: Exited normally
Tue Jun  4 12:14:04 2024 daemon.warn odhcpd[2538]: No default route present, overriding ra_lifetime to 0!
Tue Jun  4 12:15:00 2024 authpriv.info dropbear[13113]: Child connection from 192.168.32.34:47878
Tue Jun  4 12:15:00 2024 authpriv.notice dropbear[13113]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:/t/xxxxxx from 192.168.32.34:47878
Tue Jun  4 12:15:00 2024 authpriv.info dropbear[13113]: Exit (root) from <192.168.32.34:47878>: Exited normally
Tue Jun  4 12:15:53 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authentication OK (open system)
Tue Jun  4 12:15:53 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 0 notification
Tue Jun  4 12:15:53 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-AUTHENTICATE.indication(c6:f1:38:5b:aa:aa, OPEN_SYSTEM)
Tue Jun  4 12:15:53 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authenticated
Tue Jun  4 12:15:53 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 1
Tue Jun  4 12:15:53 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 2
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 3
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 4
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query attempt 5
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: association SA Query timed out
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authentication OK (open system)
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa WPA: event 0 notification
Tue Jun  4 12:15:54 2024 daemon.debug hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa MLME: MLME-AUTHENTICATE.indication(c6:f1:38:5b:aa:aa, OPEN_SYSTEM)
Tue Jun  4 12:15:54 2024 daemon.info hostapd: phy1-ap0: STA c6:f1:38:5b:aa:aa IEEE 802.11: authenticated