Hi,
I'm on official snapshot of 2023-02-02. radio0 (QCA), radio2 (2.4 GHz IPQ) still work after the crash. radio1 doesn't work anymore until I reboot the device. I had no luck issuing "rmmod ath11k; modprobe ath11k; wifi up" to revive it without a reboot.
Here's the log. radio1 (AX) crashed at 09:27.
I've made a watchdog script to help me out with auto-reboot-on-error. ( Link: https://github.com/Catfriend1/openwrt-presence/blob/master/scripts/ath11k-watchdog/ath11k-watchdog.sh )
Fri Feb 3 08:06:05 2023 daemon.info hostapd: phy0-ap0: STA aa:aa:aa:aa:aa:aa WPA: group key handshake completed (RSN)
Fri Feb 3 09:27:30 2023 daemon.notice hostapd: phy1-ap0: DFS-RADAR-DETECTED freq=5500 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5570 cf2=0
Fri Feb 3 09:27:30 2023 daemon.notice hostapd: dfs_downgrade_bandwidth: no DFS channels left, waiting for NOP to finish
Fri Feb 3 09:27:30 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Fri Feb 3 09:27:30 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: DFS-RADAR-DETECTED freq=5500 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5570 cf2=0
Fri Feb 3 09:27:30 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: DFS-NEW-CHANNEL freq=5260 chan=52 sec_chan=1
Fri Feb 3 09:27:30 2023 daemon.warn wpa_supplicant[2074]: DFS failed to schedule CSA (-22) - trying fallback
Fri Feb 3 09:27:30 2023 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Fri Feb 3 09:27:30 2023 kern.info kernel: [91302.025793] device phy1-ap0 left promiscuous mode
Fri Feb 3 09:27:30 2023 kern.info kernel: [91302.025959] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb 3 09:27:30 2023 daemon.notice netifd: Network device 'phy1-ap0' link is down
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.109179] ------------[ cut here ]------------
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.109218] WARNING: CPU: 0 PID: 0 at ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.112875] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet batman_adv ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211 cfg80211 slhc qrtr_smd qrtr qmi_helpers ns nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c hwmon crc_ccitt compat seqiv jitterentropy_rng drbg michael_mic hmac cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp qca_ssdk gpio_button_hotplug crc32c_generic
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.168932] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.15.90 #0
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.191167] Hardware name: Xiaomi AX3600 (DT)
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.197415] pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.201672] pc : ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.208444] lr : ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x2bd8/0x49f0 [ath11k]
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.215735] sp : ffffffc008003c20
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.223018] x29: ffffffc008003c20 x28: 0000000000000030 x27: ffffffc008bd8010
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.226499] x26: 0000000000000038 x25: 00000000000001d0 x24: ffffff80192e0380
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.233616] x23: 0000000000000000 x22: 0000000000000003 x21: ffffff8005e22020
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.240735] x20: ffffff8004640000 x19: ffffff8009138300 x18: 0000000000000000
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.247853] x17: ffffffc017476000 x16: ffffffc008004000 x15: 0000000000004000
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.254970] x14: 0000000000000147 x13: 0000000000000001 x12: 0000000000000001
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.262089] x11: 0000000000000001 x10: 0000000000000890 x9 : 0000000000000000
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.269207] x8 : ffffff8004862000 x7 : 0000000000000028 x6 : 0000000000000004
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.276325] x5 : 00000000000011ae x4 : 0000000000000002 x3 : ffffff8004640000
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.283444] x2 : 0000000000000001 x1 : 0000000000000006 x0 : ffffff8005e22020
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.290562] Call trace:
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.297671] ath11k_hal_rx_sw_mon_ring_buf_paddr_get+0x4628/0x49f0 [ath11k]
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.299935] ath11k_htc_rx_completion_handler+0x464/0x610 [ath11k]
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.306878] ath11k_ce_per_engine_service+0x2e0/0x3f0 [ath11k]
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.313127] 0xffffffc000b37c30
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.318939] tasklet_action_common.constprop.0+0x144/0x180
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.321982] tasklet_action+0x28/0x34
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.327534] _stext+0x10c/0x28c
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.331265] irq_exit+0xbc/0x100
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.334216] handle_domain_irq+0x64/0x90
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.337690] gic_handle_irq+0x74/0xa0
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.341595] call_on_irq_stack+0x28/0x54
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.345156] do_interrupt_handler+0x54/0x60
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.349149] el1_interrupt+0x30/0x50
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.353055] el1h_64_irq_handler+0x18/0x24
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.356874] el1h_64_irq+0x78/0x7c
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.360778] arch_cpu_idle+0x18/0x2c
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.364165] default_idle_call+0x20/0x70
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.367899] do_idle+0x214/0x240
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.371803] cpu_startup_entry+0x28/0x60
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.375016] rest_init+0xc8/0xe0
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.378922] arch_call_rest_init+0x10/0x1c
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.382134] start_kernel+0x6a8/0x6cc
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.386040] __primary_switched+0xa0/0xa8
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.389774] ---[ end trace 353f3c65c9a03fdc ]---
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.393870] ath11k c000000.wifi: vdev start resp error status 3 (dfs violation)
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.398532] ath11k c000000.wifi: failed to synchronize setup for vdev 2 restart: -22
Fri Feb 3 09:27:30 2023 kern.warn kernel: [91302.405501] ath11k c000000.wifi: failed to restart vdev 2: -22
Fri Feb 3 09:27:31 2023 daemon.notice hostapd: phy1-ap0: interface state ENABLED->DISABLED
Fri Feb 3 09:27:31 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: leaving mesh
Fri Feb 3 09:27:36 2023 daemon.notice netifd: Network device 'phy1-mesh0' link is down
Fri Feb 3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' has link connectivity loss
Fri Feb 3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: interface state ENABLED->COUNTRY_UPDATE
Fri Feb 3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: interface state COUNTRY_UPDATE->DFS
Fri Feb 3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=1, seg0=58, seg1=0, cac_time=60s
Fri Feb 3 09:27:36 2023 kern.warn kernel: [91307.706731] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Fri Feb 3 09:27:36 2023 daemon.notice wpa_supplicant[2074]: phy1-mesh0: new peer notification for aa:aa:aa:aa:aa:aa
Fri Feb 3 09:27:36 2023 kern.info kernel: [91307.731728] batman_adv: bat0: Interface deactivated: phy1-mesh0
Fri Feb 3 09:27:36 2023 kern.info kernel: [91307.731774] batman_adv: bat0: Removing interface: phy1-mesh0
Fri Feb 3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' is now down
Fri Feb 3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Fri Feb 3 09:27:36 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Fri Feb 3 09:27:36 2023 kern.info kernel: [91307.742788] br-vl177: port 6(phy1-ap0) entered blocking state
Fri Feb 3 09:27:36 2023 kern.info kernel: [91307.742840] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: interface state DISABLED->COUNTRY_UPDATE
Fri Feb 3 09:27:36 2023 daemon.err hostapd: could not get valid channel
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->DFS
Fri Feb 3 09:27:36 2023 kern.info kernel: [91307.748479] device phy1-ap0 entered promiscuous mode
Fri Feb 3 09:27:36 2023 daemon.warn netifd: Wireless device 'radio1' setup failed, retry=3
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: Remove interface 'phy1-ap0'
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: interface state DFS->DISABLED
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: phy1-ap0: CTRL-EVENT-TERMINATING
Fri Feb 3 09:27:36 2023 daemon.err hostapd: rmdir[ctrl_interface=/var/run/hostapd]: Permission denied
Fri Feb 3 09:27:36 2023 daemon.err hostapd: hostapd_free_hapd_data: Interface phy1-ap0 wasn't started
Fri Feb 3 09:27:36 2023 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Fri Feb 3 09:27:36 2023 kern.info kernel: [91308.470747] device phy1-ap0 left promiscuous mode
Fri Feb 3 09:27:36 2023 kern.info kernel: [91308.470889] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb 3 09:27:37 2023 daemon.notice netifd: radio1 (19800): Command failed: Not found
Fri Feb 3 09:27:37 2023 daemon.notice wpa_supplicant[19821]: supp-global-ctrl-iface-init(/var/run/wpa_supplicant/global) (will try fixup): bind(PF_UNIX): Address in use
Fri Feb 3 09:27:37 2023 daemon.notice wpa_supplicant[19821]: Successfully initialized wpa_supplicant
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.817754] ------------[ cut here ]------------
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.817797] WARNING: CPU: 2 PID: 19819 at ieee80211_del_virtual_monitor+0x190/0xb0c [mac80211]
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.821454] Modules linked in: pppoe ppp_async nft_fib_inet nf_flow_table_ipv6 nf_flow_table_ipv4 nf_flow_table_inet batman_adv ath11k_ahb ath11k ath10k_pci ath10k_core ath pppox ppp_generic nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_nat nft_masq nft_log nft_limit nft_hash nft_flow_offload nft_fib_ipv6 nft_fib_ipv4 nft_fib nft_ct nft_counter nft_chain_nat nf_tables nf_nat nf_flow_table nf_conntrack mac80211 cfg80211 slhc qrtr_smd qrtr qmi_helpers ns nfnetlink nf_reject_ipv6 nf_reject_ipv4 nf_log_syslog nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c hwmon crc_ccitt compat seqiv jitterentropy_rng drbg michael_mic hmac cmac leds_gpio xhci_plat_hcd xhci_pci xhci_hcd dwc3 dwc3_qcom qca_nss_dp qca_ssdk gpio_button_hotplug crc32c_generic
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.876992] CPU: 2 PID: 19819 Comm: ip Tainted: G W 5.15.90 #0
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.899228] Hardware name: Xiaomi AX3600 (DT)
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.906515] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.910859] pc : ieee80211_del_virtual_monitor+0x190/0xb0c [mac80211]
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.917630] lr : ieee80211_del_virtual_monitor+0x180/0xb0c [mac80211]
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.924226] sp : ffffffc0095bba50
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.930644] x29: ffffffc0095bba50 x28: 0000000000000001 x27: 0000000000000000
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.933951] x26: 0000000000401002 x25: ffffff8009ae7c10 x24: ffffff8010d14900
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.941068] x23: 0000000000001003 x22: 0000000000000001 x21: ffffffc000ac36e0
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.948187] x20: ffffff8005e20880 x19: ffffff8010d14000 x18: 0000000000000000
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.955305] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.962422] x14: 00000000000002fb x13: 0000000000000000 x12: 0000000000004400
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.969540] x11: ffffff8002b47d14 x10: ffffff8002b47d00 x9 : 00000000000000bc
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.976658] x8 : 0000000000000001 x7 : 0000000000000011 x6 : ffffff8002baa800
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.983776] x5 : 0000000000000011 x4 : 0000000000000000 x3 : ffffff8002f0de00
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.990895] x2 : 0000000000000000 x1 : 0000000000000007 x0 : 0000000000000001
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91308.998014] Call trace:
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.005122] ieee80211_del_virtual_monitor+0x190/0xb0c [mac80211]
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.007386] ieee80211_del_virtual_monitor+0x9dc/0xb0c [mac80211]
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.013635] __dev_close_many+0xa8/0x11c
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.019707] __dev_change_flags+0x124/0x194
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.023700] dev_change_flags+0x24/0x6c
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.027606] devinet_ioctl+0x398/0x69c
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.031425] inet_ioctl+0x250/0x260
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.035246] sock_ioctl+0x240/0x49c
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.038629] __arm64_sys_ioctl+0x598/0x108c
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.042104] invoke_syscall.constprop.0+0x5c/0x104
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.046273] do_el0_svc+0x6c/0x15c
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.051129] el0_svc+0x18/0x54
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.054516] el0t_64_sync_handler+0xe8/0x114
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.057555] el0t_64_sync+0x184/0x188
Fri Feb 3 09:27:37 2023 kern.warn kernel: [91309.061981] ---[ end trace 353f3c65c9a03fdd ]---
Fri Feb 3 09:27:42 2023 kern.warn kernel: [91314.106750] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Fri Feb 3 09:27:42 2023 daemon.notice netifd: Interface 'nwi_mesh0' is disabled
Fri Feb 3 09:27:42 2023 daemon.notice netifd: Wireless device 'radio1' is now down
Fri Feb 3 09:27:43 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy1.conf (phy phy1-ap0) --> new PHY
Fri Feb 3 09:27:43 2023 kern.info kernel: [91314.754127] br-vl177: port 6(phy1-ap0) entered blocking state
Fri Feb 3 09:27:43 2023 kern.info kernel: [91314.754176] br-vl177: port 6(phy1-ap0) entered disabled state
Fri Feb 3 09:27:43 2023 daemon.notice hostapd: phy1-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Feb 3 09:27:43 2023 daemon.err hostapd: could not get valid channel
Fri Feb 3 09:27:43 2023 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->DFS
Fri Feb 3 09:27:43 2023 kern.info kernel: [91314.759251] device phy1-ap0 entered promiscuous mode
Fri Feb 3 09:27:44 2023 daemon.notice netifd: radio1 (19979): command failed: Link has been severed (-67)
Fri Feb 3 09:27:44 2023 daemon.notice netifd: radio1 (19979): command failed: Link has been severed (-67)
Fri Feb 3 09:27:44 2023 daemon.notice netifd: Wireless device 'radio1' is now up
Fri Feb 3 09:27:44 2023 daemon.notice netifd: Interface 'nwi_mesh0' is enabled
Fri Feb 3 09:27:47 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: interface state UNINITIALIZED->COUNTRY_UPDATE
Fri Feb 3 09:27:47 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: interface state COUNTRY_UPDATE->DFS
Fri Feb 3 09:27:47 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=1, seg0=58, seg1=0, cac_time=60s
Fri Feb 3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: DFS-CAC-COMPLETED success=1 freq=5260 ht_enabled=0 chan_offset=0 chan_width=3 cf1=5290 cf2=0
Fri Feb 3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: interface state DFS->ENABLED
Fri Feb 3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: AP-ENABLED
Fri Feb 3 09:28:53 2023 kern.warn kernel: [91384.746786] ath11k c000000.wifi: failed to flush transmit queue, data pkts pending 2
Fri Feb 3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: joining mesh MESHSSID
Fri Feb 3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: CTRL-EVENT-CONNECTED - Connection to 00:00:00:00:00:00 completed [id=0 id_str=]
Fri Feb 3 09:28:53 2023 daemon.notice netifd: Network device 'phy1-mesh0' link is up
Fri Feb 3 09:28:53 2023 daemon.notice netifd: Interface 'nwi_mesh0' has link connectivity
Fri Feb 3 09:28:53 2023 daemon.notice netifd: Interface 'nwi_mesh0' is setting up now
Fri Feb 3 09:28:53 2023 daemon.notice wpa_supplicant[19821]: phy1-mesh0: MESH-GROUP-STARTED ssid="MESHSSID" id=0
Fri Feb 3 09:28:53 2023 kern.info kernel: [91384.847204] batman_adv: bat0: Adding interface: phy1-mesh0
Fri Feb 3 09:28:53 2023 kern.info kernel: [91384.847301] batman_adv: bat0: Interface activated: phy1-mesh0
Fri Feb 3 09:28:53 2023 daemon.notice netifd: Interface 'nwi_mesh0' is now up
Fri Feb 3 09:32:11 2023 daemon.notice hostapd: phy2-ap0: AP-STA-POLL-OK aa:aa:aa:aa:aa:aa
(...)
Fri Feb 3 09:48:10 2023 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED aa:aa:aa:aa:aa:aa
Fri Feb 3 09:49:07 2023 daemon.notice hostapd: phy2-ap0: AP-STA-DISCONNECTED aa:aa:aa:aa:aa:aa
Fri Feb 3 09:49:10 2023 kern.info kernel: [92602.028076] nss-dp 3a001400.dp3 lan1: PHY Link up speed: 1000
Fri Feb 3 09:49:10 2023 kern.info kernel: [92602.028165] br-vl177: port 1(lan1) entered blocking state
Fri Feb 3 09:49:10 2023 kern.info kernel: [92602.032819] br-vl177: port 1(lan1) entered forwarding state
Fri Feb 3 09:49:10 2023 daemon.notice netifd: Network device 'lan1' link is up
Fri Feb 3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa IEEE 802.11: authenticated
Fri Feb 3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa IEEE 802.11: associated (aid 1)
Fri Feb 3 09:49:10 2023 daemon.notice hostapd: phy2-ap0: AP-STA-CONNECTED aa:aa:aa:aa:aa:aa auth_alg=open
Fri Feb 3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa RADIUS: starting accounting session aa:aa:aa:aa:aa:aa
Fri Feb 3 09:49:10 2023 daemon.info hostapd: phy2-ap0: STA aa:aa:aa:aa:aa:aa WPA: pairwise key handshake completed (RSN)
Fri Feb 3 09:49:10 2023 daemon.notice hostapd: phy2-ap0: EAPOL-4WAY-HS-COMPLETED aa:aa:aa:aa:aa:aa
Fri Feb 3 09:49:28 2023 daemon.notice hostapd: phy0-ap0: AP-STA-DISCONNECTED aa:aa:aa:aa:aa:aa
Kind regards,
Catfriend1