R7500 v2 Wifi Performance Issues and syslog errors

I have had significant performance issues on my R7500 v2 router since my upgrade to from Lede to OpenWrt 18. Additionally, some of my devices won't connect or only show a connection without any actual network access. I've researched and updated my wireless config file for various potential issues. I've also noticed system log errors related to wlan.

I'd really appreciate any help or guidance that the forum members can provide.

Parts of the log file are as follows:

Syslog selected statements

Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 13.719857] ath10k_pci 0000:01:00.0: assign IRQ: got 67
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 13.720859] ath10k_pci 0000:01:00.0: enabling device (0140 -> 0142)
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 13.720944] ath10k_pci 0000:01:00.0: enabling bus mastering
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 13.721400] ath10k_pci 0000:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
Wed Oct 17 08:22:27 2018 kern.warn kernel: [ 13.899125] ath10k_pci 0000:01:00.0: Direct firmware load for ath10k/QCA99X0/hw2.0/firmware-6.bin failed with error -2
Wed Oct 17 08:22:27 2018 kern.warn kernel: [ 13.899171] ath10k_pci 0000:01:00.0: Falling back to user helper
Wed Oct 17 08:22:27 2018 kern.err kernel: [ 13.937557] firmware ath10k!QCA99X0!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 14.235955] ath10k_pci 0000:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003b01ff sub 168c:0002
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 14.236004] ath10k_pci 0000:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 14.247469] ath10k_pci 0000:01:00.0: firmware ver 10.4.1.00030-1 api 5 features no-p2p crc32 d2901e01
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 14.308969] ath10k_pci 0000:01:00.0: board_file api 2 bmi_id 1:1 crc32 08fa09f2
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 15.583022] ath10k_pci 0000:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 512 raw 0 hwcrypto 1
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.665196] ath: EEPROM regdomain: 0x0
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.665208] ath: EEPROM indicates default country code should be used
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.665218] ath: doing EEPROM country->regdmn map search
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.665234] ath: country maps to regdmn code: 0x3a
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.665247] ath: Country alpha2 being used: US
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.665257] ath: Regpair used: 0x3a
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.672059] ath10k_pci 0001:01:00.0: assign IRQ: got 100
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 15.673010] ath10k_pci 0001:01:00.0: enabling device (0140 -> 0142)
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 15.673123] ath10k_pci 0001:01:00.0: enabling bus mastering
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 15.673712] ath10k_pci 0001:01:00.0: pci irq msi oper_irq_mode 2 irq_mode 0 reset_mode 0
Wed Oct 17 08:22:27 2018 kern.warn kernel: [ 15.865909] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/QCA99X0/hw2.0/firmware-6.bin failed with error -2
Wed Oct 17 08:22:27 2018 kern.warn kernel: [ 15.865949] ath10k_pci 0001:01:00.0: Falling back to user helper
Wed Oct 17 08:22:27 2018 kern.err kernel: [ 16.149913] firmware ath10k!QCA99X0!hw2.0!firmware-6.bin: firmware_loading_store: map pages failed
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 16.150153] ath10k_pci 0001:01:00.0: qca99x0 hw2.0 target 0x01000000 chip_id 0x003b01ff sub 168c:0002
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 16.157924] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 1
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 16.169597] ath10k_pci 0001:01:00.0: firmware ver 10.4.1.00030-1 api 5 features no-p2p crc32 d2901e01
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 16.231730] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 1:2 crc32 08fa09f2
Wed Oct 17 08:22:27 2018 kern.info kernel: [ 17.512392] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 512 raw 0 hwcrypto 1
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 17.594341] ath: EEPROM regdomain: 0x0
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 17.594349] ath: EEPROM indicates default country code should be used
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 17.594355] ath: doing EEPROM country->regdmn map search
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 17.594366] ath: country maps to regdmn code: 0x3a
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 17.594373] ath: Country alpha2 being used: US
Wed Oct 17 08:22:27 2018 kern.debug kernel: [ 17.594379] ath: Regpair used: 0x3a

Wed Oct 17 08:22:33 2018 kern.info kernel: [ 23.672147] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
Wed Oct 17 08:22:33 2018 kern.info kernel: [ 23.672255] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Wed Oct 17 08:22:33 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Wed Oct 17 08:22:33 2018 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf

Wed Oct 17 08:22:36 2018 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Wed Oct 17 08:22:36 2018 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->HT_SCAN
Wed Oct 17 08:22:36 2018 kern.info kernel: [ 26.776856] br-secure: port 2(wlan1) entered disabled state
Wed Oct 17 08:22:36 2018 daemon.err hostapd: Using interface wlan1 with hwaddr 9c:3d:cf:ee:86:b0 and ssid "Schaub-Secure"

Wed Oct 17 08:22:36 2018 daemon.err hostapd: Using interface wlan0 with hwaddr 9c:3d:cf:ee:86:af and ssid "Schaub-Secure"
Wed Oct 17 08:22:36 2018 daemon.err hostapd: Using interface wlan1-1 with hwaddr 9e:3d:cf:ee:86:b0 and ssid "Schaub-IoT"
Wed Oct 17 08:22:36 2018 daemon.err hostapd: Using interface wlan1-2 with hwaddr 9a:3d:cf:ee:86:b0 and ssid "Schaub-BackDoor"
Wed Oct 17 08:22:37 2018 daemon.err hostapd: Using interface wlan0-1 with hwaddr 9e:3d:cf:ee:86:af and ssid "Schaub-IoT"

Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 IEEE 802.11: authentication OK (open system)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 MLME: MLME-AUTHENTICATE.indication(d8:49:2f:e0:0d:86, OPEN_SYSTEM)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 MLME: MLME-DELETEKEYS.request(d8:49:2f:e0:0d:86)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 IEEE 802.11: authentication OK (open system)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 MLME: MLME-AUTHENTICATE.indication(d8:49:2f:e0:0d:86, OPEN_SYSTEM)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 MLME: MLME-DELETEKEYS.request(d8:49:2f:e0:0d:86)
Wed Oct 17 08:22:37 2018 daemon.info hostapd: wlan1: STA d8:49:2f:e0:0d:86 IEEE 802.11: authenticated
Wed Oct 17 08:22:37 2018 daemon.info hostapd: wlan1: STA d8:49:2f:e0:0d:86 IEEE 802.11: authenticated
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 IEEE 802.11: association OK (aid 1)
Wed Oct 17 08:22:37 2018 daemon.info hostapd: wlan1: STA d8:49:2f:e0:0d:86 IEEE 802.11: associated (aid 1)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 MLME: MLME-ASSOCIATE.indication(d8:49:2f:e0:0d:86)
Wed Oct 17 08:22:37 2018 daemon.debug hostapd: wlan1: STA d8:49:2f:e0:0d:86 MLME: MLME-DELETEKEYS.request(d8:49:2f:e0:0d:86)

Note that I currently have some different encryption options on various SSID's in an effort to troubleshoot the problem, but it was all consistent until a few days ago. Bottom line, I haven't had any performance improvements. Wireless configuration follows:

Wireless

config wifi-device 'radio0'
option type 'mac80211'
option channel '36'
option hwmode '11a'
option path 'soc/1b500000.pci/pci0000:00/0000:00:00.0/0000:01:00.0'
option channel '153'
option frag '2346'
option rts '2347'
option log_level '0'
option htmode 'VHT80'
option disabled '0'

config wifi-iface 'default_radio0'
option device 'radio0'
option mode 'ap'
option ssid 'Schaub-Secure'
option key '[top secret]'
option network 'secure'
option disassoc_low_ack '0'
option encryption 'psk2'

config wifi-device 'radio1'
option type 'mac80211'
option channel '11'
option hwmode '11g'
option path 'soc/1b700000.pci/pci0001:00/0001:00:00.0/0001:01:00.0'
option country 'US'
option htmode 'HT20'
option frag '2346'
option rts '2347'
option log_level '0'
option legacy_rates '1'
option disabled '0'

config wifi-iface 'default_radio1'
option device 'radio1'
option mode 'ap'
option ssid 'Schaub-Secure'
option network 'secure'
option key '[top secret]'
option disassoc_low_ack '0'
option encryption 'psk2'

config wifi-iface
option device 'radio0'
option mode 'ap'
option ssid 'Schaub-IoT'
option encryption 'psk2+ccmp'
option key '[top secret]'
option network 'IoT'
option disassoc_low_ack '0'

config wifi-iface
option device 'radio1'
option mode 'ap'
option ssid 'Schaub-IoT'
option encryption 'psk2+ccmp'
option key '[top secret]'
option network 'IoT'
option disassoc_low_ack '0'

config wifi-iface
option device 'radio1'
option mode 'ap'
option ssid 'Schaub-BackDoor'
option network 'lan'
option encryption 'psk2+ccmp'
option key '[top secret]'
option hidden '1'