Problem with WDS bridge

i have a feeling this bug still exists:
https://dev.archive.openwrt.org/ticket/20148

i have been trying to get wds bridge to work but it just wont fly it works for a short amount of time and then it just goes haywire

Access point (WDS)

Model
TP-Link Archer C5 v1
Architecture
Qualcomm Atheros QCA9558 ver 1 rev 0
Firmware Version
OpenWrt 19.07.0 r10860-a3ffeb413b / LuCI openwrt-19.07 branch git-20.006.26738-35aa527

[289301.373120] net_ratelimit: 227 callbacks suppressed
[289301.373132] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.389221] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.429012] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.441522] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.452493] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.463454] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.501634] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.512633] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.523614] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[289301.534576] br-lan: received packet on wlan1.sta1 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327023.940465] net_ratelimit: 326 callbacks suppressed
[327023.940477] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327023.957315] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327023.969494] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327023.982004] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327023.994347] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327024.006442] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327024.018473] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327024.031265] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327024.043218] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)
[327024.055538] br-lan: received packet on wlan0.sta2 with own address as source address (addr:30:b5:c2:7f:65:4a, vlan:0)

Client (WDS)

Model
TP-Link TL-WDR3600 v1
Architecture
Atheros AR9344 rev 2
Firmware Version
OpenWrt 19.07.0 r10860-a3ffeb413b / LuCI openwrt-19.07 branch git-20.006.26738-35aa527

[103539.749629] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103541.752972] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103543.745697] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103545.751770] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103547.746809] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103549.750601] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103551.777580] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103553.755589] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103555.745721] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103557.758408] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103559.769794] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103561.757508] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103563.753017] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103565.746483] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103567.758998] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103569.747152] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103571.744557] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103573.748795] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103575.762087] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103577.792578] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103579.757374] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103581.753866] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103583.768339] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103585.788699] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103587.745452] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103589.748193] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103591.748775] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103593.766540] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103595.748245] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103597.748240] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103599.750131] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103601.755668] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103603.744954] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103605.747330] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103607.748971] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103609.750958] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103611.747225] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103613.758673] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103615.748183] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103617.765635] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103619.776739] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103621.753714] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103623.745444] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103625.758052] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103627.766736] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103629.758262] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103631.761120] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103633.748662] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
[103633.767098] br-lan: received packet on wlan1 with own address as source address (addr:14:cc:20:92:08:14, vlan:0)
[103633.777591] br-lan: topology change detected, propagating
[103633.783185] br-lan: port 6(wlan1) entered blocking state

if i need to post more information just request which logs/settings i should add

thanks in advance

i have changed /etc/modules.d/ath9k
from

"ath9k"
to
"ath9k nohwcrypt=1"
it seems to have sorted the issue

ok had them running last night new issue

on the AP:

Tue Feb 11 07:55:14 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:55:15 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:55:16 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:55:17 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:55:23 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: deauthenticated due to local deauth request
Tue Feb 11 07:58:28 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: authenticated
Tue Feb 11 07:58:28 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: associated (aid 2)
Tue Feb 11 07:58:28 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:58:29 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:58:30 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:58:31 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: disassociated
Tue Feb 11 07:58:32 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Tue Feb 11 07:59:02 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: authenticated
Tue Feb 11 07:59:02 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: associated (aid 2)
Tue Feb 11 07:59:02 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:59:03 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:59:04 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:59:05 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 07:59:11 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: deauthenticated due to local deauth request
Tue Feb 11 08:00:03 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: authenticated
Tue Feb 11 08:00:03 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: associated (aid 2)
Tue Feb 11 08:00:03 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:04 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:05 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:06 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:12 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: deauthenticated due to local deauth request
Tue Feb 11 08:00:54 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: authenticated
Tue Feb 11 08:00:54 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: associated (aid 2)
Tue Feb 11 08:00:54 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:55 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:56 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:00:57 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:01:03 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: deauthenticated due to local deauth request
Tue Feb 11 08:01:29 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: authenticated
Tue Feb 11 08:01:29 2020 daemon.info hostapd: wlan0: STA d8:c4:e9:f2:8f:ff IEEE 802.11: associated (aid 2)
Tue Feb 11 08:01:29 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:01:30 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:01:31 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff
Tue Feb 11 08:01:32 2020 daemon.notice hostapd: wlan0: AP-STA-POSSIBLE-PSK-MISMATCH d8:c4:e9:f2:8f:ff

on the client:

Tue Feb 11 03:59:30 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=69 duration=300 reason=CONN_FAILED
Tue Feb 11 03:59:30 2020 kern.info kernel: [34335.689855] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:04:31 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:04:31 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:04:31 2020 kern.info kernel: [34636.506806] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:04:31 2020 kern.info kernel: [34636.529010] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:04:31 2020 kern.info kernel: [34636.586890] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:04:31 2020 kern.info kernel: [34636.662112] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:04:31 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=70 duration=300 reason=CONN_FAILED
Tue Feb 11 04:04:31 2020 kern.info kernel: [34636.736003] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:09:32 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:09:32 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:09:32 2020 kern.info kernel: [34937.552019] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:09:32 2020 kern.info kernel: [34937.574398] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:09:32 2020 kern.info kernel: [34937.677150] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:09:32 2020 kern.info kernel: [34937.750169] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:09:33 2020 kern.info kernel: [34937.827078] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:09:33 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=71 duration=300 reason=CONN_FAILED
Tue Feb 11 04:14:33 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:14:33 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:14:33 2020 kern.info kernel: [35238.638387] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:14:33 2020 kern.info kernel: [35238.660608] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:14:33 2020 kern.info kernel: [35238.766646] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:14:34 2020 kern.info kernel: [35238.835625] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:14:34 2020 kern.info kernel: [35238.906563] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:14:34 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=72 duration=300 reason=CONN_FAILED
Tue Feb 11 04:19:34 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:19:34 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:19:34 2020 kern.info kernel: [35539.725160] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:19:34 2020 kern.info kernel: [35539.747529] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:19:35 2020 kern.info kernel: [35539.823721] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:19:35 2020 kern.info kernel: [35539.860245] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:19:35 2020 kern.info kernel: [35539.929142] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:19:35 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=73 duration=300 reason=CONN_FAILED
Tue Feb 11 04:24:35 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:24:35 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:24:35 2020 kern.info kernel: [35840.750670] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:24:35 2020 kern.info kernel: [35840.772938] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:24:36 2020 kern.info kernel: [35840.842932] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:24:36 2020 kern.info kernel: [35840.921036] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:24:36 2020 kern.info kernel: [35841.027628] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:24:36 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=74 duration=300 reason=CONN_FAILED
Tue Feb 11 04:29:37 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:29:37 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:29:37 2020 kern.info kernel: [36141.847024] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:29:37 2020 kern.info kernel: [36141.869248] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:29:37 2020 kern.info kernel: [36141.947418] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:29:37 2020 kern.info kernel: [36142.020931] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:29:37 2020 kern.info kernel: [36142.101779] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:29:37 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=75 duration=300 reason=CONN_FAILED
Tue Feb 11 04:34:38 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:34:38 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:34:38 2020 kern.info kernel: [36442.923076] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:34:38 2020 kern.info kernel: [36442.945318] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:34:38 2020 kern.info kernel: [36443.015546] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:34:38 2020 kern.info kernel: [36443.095439] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:34:38 2020 kern.info kernel: [36443.209323] wlan0: authentication with 30:b5:c2:7f:65:4a timed out
Tue Feb 11 04:34:38 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="illusion" auth_failures=76 duration=300 reason=CONN_FAILED
Tue Feb 11 04:39:39 2020 daemon.notice wpa_supplicant[1541]: wlan0: CTRL-EVENT-SSID-REENABLED id=0 ssid="illusion"
Tue Feb 11 04:39:39 2020 daemon.notice wpa_supplicant[1541]: wlan0: SME: Trying to authenticate with 30:b5:c2:7f:65:4a (SSID='illusion' freq=2447 MHz)
Tue Feb 11 04:39:39 2020 kern.info kernel: [36744.039627] wlan0: authenticate with 30:b5:c2:7f:65:4a
Tue Feb 11 04:39:39 2020 kern.info kernel: [36744.061898] wlan0: send auth to 30:b5:c2:7f:65:4a (try 1/3)
Tue Feb 11 04:39:39 2020 kern.info kernel: [36744.140100] wlan0: send auth to 30:b5:c2:7f:65:4a (try 2/3)
Tue Feb 11 04:39:39 2020 kern.info kernel: [36744.204532] wlan0: send auth to 30:b5:c2:7f:65:4a (try 3/3)
Tue Feb 11 04:39:39 2020 kern.info kernel: [36744.262429] wlan0: authentication with 30:b5:c2:7f:65:4a timed out

which again results in no connectivity on the client

and it gets worse...
i disabled the regular wifi on the access point (regular as in non5G seeing that seemed to still be working)
and reenabled it and now i get this on the client

Tue Feb 11 11:06:14 2020 kern.warn kernel: [59939.352652] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:14 2020 kern.warn kernel: [59939.363213] br-lan: received packet on wlan1 with own address as source address (addr:14:cc:20:92:08:14, vlan:0)
Tue Feb 11 11:06:14 2020 kern.info kernel: [59939.373603] br-lan: topology change detected, propagating
Tue Feb 11 11:06:14 2020 kern.info kernel: [59939.379079] br-lan: port 6(wlan1) entered blocking state
Tue Feb 11 11:06:16 2020 kern.info kernel: [59940.791715] br-lan: port 5(wlan0) entered forwarding state
Tue Feb 11 11:06:16 2020 kern.info kernel: [59940.797301] br-lan: topology change detected, propagating
Tue Feb 11 11:06:39 2020 kern.info kernel: [59963.912507] br-lan: port 6(wlan1) neighbor 7fff.14:cc:20:92:08:15 lost
Tue Feb 11 11:06:39 2020 kern.info kernel: [59963.919162] br-lan: port 6(wlan1) entered listening state
Tue Feb 11 11:06:40 2020 kern.warn kernel: [59965.353485] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:41 2020 kern.info kernel: [59965.992594] br-lan: port 6(wlan1) entered learning state
Tue Feb 11 11:06:42 2020 kern.warn kernel: [59967.353487] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:43 2020 kern.info kernel: [59968.072711] br-lan: port 6(wlan1) entered forwarding state
Tue Feb 11 11:06:43 2020 kern.info kernel: [59968.078290] br-lan: topology change detected, propagating
Tue Feb 11 11:06:44 2020 kern.warn kernel: [59969.353881] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:46 2020 kern.warn kernel: [59971.363720] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:48 2020 kern.warn kernel: [59973.380803] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:50 2020 kern.warn kernel: [59975.360788] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:52 2020 kern.warn kernel: [59977.360907] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.778626] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.795637] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.818006] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.841256] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.862200] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.933588] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.955480] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.970334] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:54 2020 kern.warn kernel: [59978.989437] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:57 2020 kern.warn kernel: [59982.366368] net_ratelimit: 238 callbacks suppressed
Tue Feb 11 11:06:57 2020 kern.warn kernel: [59982.366382] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:57 2020 kern.warn kernel: [59982.398726] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:57 2020 kern.warn kernel: [59982.421798] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:57 2020 kern.warn kernel: [59982.445148] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:58 2020 kern.warn kernel: [59982.467640] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:58 2020 kern.warn kernel: [59982.491486] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:58 2020 kern.warn kernel: [59982.518277] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:58 2020 kern.warn kernel: [59982.532953] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:58 2020 kern.warn kernel: [59982.552874] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:06:58 2020 kern.warn kernel: [59982.575958] br-lan: received packet on wlan0 with own address as source address (addr:14:cc:20:92:08:15, vlan:0)
Tue Feb 11 11:07:20 2020 kern.warn kernel: [60005.356246] net_ratelimit: 66 callbacks suppressed
Tue Feb 11 11:07:20 2020 kern.warn kernel: [60005.356260] br-lan: received packet on wlan1 with own address as source address (addr:14:cc:20:92:08:14, vlan:0)
Tue Feb 11 11:07:20 2020 kern.info kernel: [60005.371498] br-lan: topology change detected, propagating
Tue Feb 11 11:07:20 2020 kern.info kernel: [60005.377003] br-lan: port 6(wlan1) entered blocking state
Tue Feb 11 11:08:03 2020 kern.info kernel: [60047.756076] br-lan: port 6(wlan1) neighbor 7fff.14:cc:20:92:08:15 lost
Tue Feb 11 11:08:03 2020 kern.info kernel: [60047.762735] br-lan: port 6(wlan1) entered listening state
Tue Feb 11 11:08:05 2020 kern.info kernel: [60049.836180] br-lan: port 6(wlan1) entered learning state
Tue Feb 11 11:08:07 2020 kern.info kernel: [60051.916240] br-lan: port 6(wlan1) entered forwarding state
Tue Feb 11 11:08:07 2020 kern.info kernel: [60051.921812] br-lan: topology change detected, propagating
Tue Feb 11 11:08:08 2020 kern.warn kernel: [60053.358128] br-lan: received packet on wlan1 with own address as source address (addr:14:cc:20:92:08:14, vlan:0)
Tue Feb 11 11:08:08 2020 kern.info kernel: [60053.368524] br-lan: topology change detected, propagating
Tue Feb 11 11:08:08 2020 kern.info kernel: [60053.374006] br-lan: port 6(wlan1) entered blocking state

ok the own adress error was a result from me bridging the 5g and non 5g network for redundancy it didn't like that

Making network loops may be acceptable if you set STP on the bridge. Otherwise there will be huge problems. With STP the kernel will choose one of the paths to keep and then block the other one-- it offers redundancy but doesn't give you more bandwidth.

I've never seen "Possible PSK Mismatch" mean anything other than that the keys indeed don't match. In other words a client is trying to connect using the wrong passphrase.

that sounds like a bug

probably rekeying issue in nohwcrypt mode