[Solved] Hostapd WPA2 issues and kernel warning

I want to use hostapd on my banana pi R2 in WPA2-PSK only mode and bridge it with my eth0 and tap0 interfaces on bridge0. The hostapd config I am using is the following:

interface=ap0
bridge=bridge0
driver=nl80211
ssid=WhaleLAN
hw_mode=g
channel=3
macaddr_acl=0
auth_algs=1
wpa=2
wpa_passphrase=#redacted
wpa_key_mgmt=WPA-PSK WPA-PSK-SHA256
rsn_pairwise=CCMP

before running the hostapd service this script executes:

#!/bin/sh
echo 0 > /dev/wmtWifi
echo A > /dev/wmtWifi
wmt_loader
rfkill unblock wlan
/sbin/ip link set ap0 up

Hostapd command:

/usr/sbin/hostapd -dd -B -P /var/run/hostapd.pid /etc/hostapd/hostapd.conf

the ssid is not visible at this point and connecting a debian client directly results in the clients NetworkManager saying:

wl2s0: WPA: IE in 3/4 msg does not match with IE in Beacon/ProbeResp

Here is the syslog of the BPIR2 during that time:

16902 Sep 24 02:34:46 gateway systemd[1]: Starting WhaleLAN Access Point...
16903 Sep 24 02:34:46 gateway kernel: [ 1558.256586] [MTK-WIFI] WIFI_open: WIFI_open: major 153 minor 0 (pid 11818)
16904 Sep 24 02:34:46 gateway kernel: [ 1558.256650] [MTK-WIFI] WIFI_write: WIFI_write 0
16905 Sep 24 02:34:46 gateway kernel: [ 1558.256650]
16906 Sep 24 02:34:46 gateway avahi-daemon[712]: Interface ap0.IPv6 no longer relevant for mDNS.
16907 Sep 24 02:34:46 gateway avahi-daemon[712]: Leaving mDNS multicast group on interface ap0.IPv6 with address fe80::8:22ff:fe8c:a60e.
16908 Sep 24 02:34:46 gateway avahi-daemon[712]: Withdrawing address record for fe80::8:22ff:fe8c:a60e on ap0.
16909 Sep 24 02:34:46 gateway kernel: [ 1558.559765] [MTK-WIFI] WIFI_write: Turn off p2p/ap mode
16910 Sep 24 02:34:46 gateway kernel: [ 1558.559830] [WMT-FUNC][W]wmt_func_wifi_off:WMT-FUNC: wmt wlan func on before wlan remove
16911 Sep 24 02:34:46 gateway kernel: [ 1558.559845] [MTK-WIFI] register_set_p2p_mode_handler: (pid 902) register set p2p mode handler   (null)
16912 Sep 24 02:34:47 gateway kernel: [ 1558.729664] [WMT-FUNC][W]wmt_func_wifi_off:WMT-FUNC: wmt call wlan remove ok
16913 Sep 24 02:34:47 gateway kernel: [ 1558.729690] [WMT-CORE][W]wmt_core_dump_func_state:[AF FUNC OFF]status(b:0 f:0 g:0 w:0 lpbk:2 coredump:0 wmt:2 stp:0)
16914 Sep 24 02:34:47 gateway kernel: [ 1558.729740] [STP] mtk_wcn_stp_psm_enable:[W] STP Not Ready, Dont do Sleep/Wakeup
16915 Sep 24 02:34:47 gateway kernel: [ 1558.729756] [WMT-EXP][W]mtk_wcn_wmt_func_ctrl:OPID(4) type(3) ok
16916 Sep 24 02:34:47 gateway kernel: [ 1558.729763] [MTK-WIFI] WIFI_write: WMT turn off WIFI OK!
16917 Sep 24 02:34:47 gateway kernel: [ 1558.729789] [MTK-WIFI] WIFI_close: WIFI_close: major 153 minor 0 (pid 11818)
16918 Sep 24 02:34:47 gateway kernel: [ 1558.729879] [MTK-WIFI] WIFI_open: WIFI_open: major 153 minor 0 (pid 11818)
16919 Sep 24 02:34:47 gateway kernel: [ 1558.729911] [MTK-WIFI] WIFI_write: WIFI_write A
16920 Sep 24 02:34:47 gateway kernel: [ 1558.729911]
16921 Sep 24 02:34:47 gateway kernel: [ 1558.729960] [WMT-FUNC][W]wmt_func_wifi_on:WMT-FUNC: wmt wlan func on before wlan probe
16922 Sep 24 02:34:48 gateway kernel: [ 1559.772484] [MTK-WIFI] register_set_p2p_mode_handler: (pid 902) register set p2p mode handler c07132b8
16923 Sep 24 02:34:48 gateway kernel: [ 1559.772518] [WMT-FUNC][W]wmt_func_wifi_on:WMT-FUNC: wmt call wlan probe ok
16924 Sep 24 02:34:48 gateway kernel: [ 1559.772533] [WMT-CORE][W]wmt_core_dump_func_state:[AF FUNC ON]status(b:0 f:0 g:0 w:2 lpbk:2 coredump:0 wmt:2 stp:0)
16925 Sep 24 02:34:48 gateway kernel: [ 1559.775634] [STP] mtk_wcn_stp_psm_enable:[W] STP Not Ready, Dont do Sleep/Wakeup
16926 Sep 24 02:34:48 gateway kernel: [ 1559.775657] [WMT-EXP][W]mtk_wcn_wmt_func_ctrl:OPID(3) type(3) ok
16927 Sep 24 02:34:48 gateway kernel: [ 1559.775665] [MTK-WIFI] WIFI_write: WMT turn on WIFI success!
16928 Sep 24 02:34:48 gateway kernel: [ 1559.777186] [MTK-WIFI] WIFI_write: Set wlan mode 0 --> 1
16929 Sep 24 02:34:48 gateway kernel: [ 1559.777221] [MTK-WIFI] WIFI_close: WIFI_close: major 153 minor 0 (pid 11818)
16930 Sep 24 02:34:48 gateway configure_ap0.sh[11818]: init combo device
16931 Sep 24 02:34:48 gateway configure_ap0.sh[11818]: Opened combo device
16932 Sep 24 02:34:48 gateway configure_ap0.sh[11818]: get device id : 30243
16933 Sep 24 02:34:48 gateway configure_ap0.sh[11818]: set device id : 30243
16934 Sep 24 02:34:48 gateway configure_ap0.sh[11818]: do module init: 30243
16935 Sep 24 02:34:48 gateway configure_ap0.sh[11818]: failed to init module
16936 Sep 24 02:34:48 gateway kernel: [ 1559.780407] [WMT-DETECT][I]wmt_detect_open:open major 154 minor 0 (pid 11843)
16937 Sep 24 02:34:48 gateway kernel: [ 1559.780437] [WMT-DETECT][I]wmt_detect_unlocked_ioctl:cmd (-2147191037),arg(0)
16938 Sep 24 02:34:48 gateway kernel: [ 1559.780498] [WMT-DETECT][I]wmt_detect_unlocked_ioctl:cmd (1074034433),arg(30243)
16939 Sep 24 02:34:48 gateway kernel: [ 1559.780507] set current consys chipid (0x7623)
16940 Sep 24 02:34:48 gateway kernel: [ 1559.780517] [WMT-DETECT][I]wmt_detect_unlocked_ioctl:cmd (-2147191036),arg(30243)
16941 Sep 24 02:34:48 gateway kernel: [ 1559.780525] [WMT-MOD-INIT][I]do_common_drv_init:start to do common driver init, chipid:0x00007623
16942 Sep 24 02:34:48 gateway kernel: [ 1559.780540] osal_fifo_init:Because pFifo room is avialable, we clear the room and allocate them again.
16943 Sep 24 02:34:48 gateway kernel: [ 1559.780552] _osal_fifo_deinit:pFifo = NULL or pFifo->pFifoBody = NULL, error
16948 Sep 24 02:34:48 gateway kernel: [ 1559.783413] [WCN-MOD-INIT][E]do_connectivity_driver_init(50):abort connectivity driver init, because common part is not ready
16949 Sep 24 02:34:48 gateway kernel: [ 1559.783763] [WMT-DETECT][I]wmt_detect_close:close major 154 minor 0 (pid 11843)
16950 Sep 24 02:34:49 gateway configure_ap0.sh[11818]: device ap0 is not a slave of bridge0
16951 Sep 24 02:34:49 gateway hostapd[11921]: random: Trying to read entropy from /dev/random
16952 Sep 24 02:34:49 gateway hostapd[11921]: Configuration file: /etc/hostapd/hostapd.conf
16953 Sep 24 02:34:49 gateway hostapd[11921]: ctrl_interface_group=0
16954 Sep 24 02:34:49 gateway hostapd[11921]: rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
16955 Sep 24 02:34:49 gateway hostapd[11921]: rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
16956 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported cipher 00-0f-ac:1
16957 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported cipher 00-0f-ac:5
16958 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported cipher 00-0f-ac:2
16959 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported cipher 00-0f-ac:4
16960 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported cipher 00-0f-ac:6
16961 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=1
16962 Sep 24 02:34:49 gateway kernel: [ 1560.825329] device ap0 entered promiscuous mode
16963 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=6
16964 Sep 24 02:34:49 gateway kernel: [ 1560.825547] bridge0: port 3(ap0) entered forwarding state
16965 Sep 24 02:34:49 gateway kernel: [ 1560.825592] bridge0: port 3(ap0) entered forwarding state
16966 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Disable use_monitor with device_ap_sme since no monitor mode support detected
16967 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: interface ap0 in phy phy1
16968 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Set mode ifindex 174 iftype 3 (AP)
16969 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Setup AP(ap0) - device_ap_sme=1 use_monitor=0
16970 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Subscribe to mgmt frames with AP handle 0x7f70a9f8 (device SME)
16971 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x7f70a9f8 match=
16972 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Enable Probe Request reporting nl_preq=0x7f70abb8
16973 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Register frame type=0x40 (WLAN_FC_STYPE_PROBE_REQ) nl_handle=0x7f70abb8 match=
16974 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: QCA vendor test command returned -95 (Operation not supported)
16975 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Add own interface ifindex 7
16976 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: if_indices[16]: 7
16977 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Add own interface ifindex 174
16978 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: if_indices[16]: 7 174
16979 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Adding interface ap0 into bridge bridge0
16980 Sep 24 02:34:49 gateway hostapd[11921]: phy: phy1
16981 Sep 24 02:34:49 gateway hostapd[11921]: BSS count 1, BSSID mask 00:00:00:00:00:00 (0 bits)
16982 Sep 24 02:34:49 gateway hostapd[11921]: ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
16983 Sep 24 02:34:49 gateway hostapd[11921]: Previous country code DE, new country code DE
16984 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Regulatory information - country=DE (DFS-ETSI)
16985 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: 2400-2483 @ 40 MHz 20 mBm
16986 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: 5150-5250 @ 80 MHz 20 mBm (no outdoor)
16987 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: 5250-5350 @ 80 MHz 20 mBm (no outdoor) (DFS)
16988 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: 5470-5725 @ 160 MHz 26 mBm (DFS)
16989 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: 5725-5875 @ 80 MHz 13 mBm
16990 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: 57000-66000 @ 2160 MHz 40 mBm
16991 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Added 802.11b mode based on 802.11g information
16992 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=20 dBm
16993 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=2 freq=2417 MHz max_tx_power=20 dBm
16994 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=3 freq=2422 MHz max_tx_power=20 dBm
16995 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=4 freq=2427 MHz max_tx_power=20 dBm
16996 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=5 freq=2432 MHz max_tx_power=20 dBm
16997 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=6 freq=2437 MHz max_tx_power=20 dBm
16998 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=7 freq=2442 MHz max_tx_power=20 dBm
16999 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=8 freq=2447 MHz max_tx_power=20 dBm
17000 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=9 freq=2452 MHz max_tx_power=20 dBm
17001 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=10 freq=2457 MHz max_tx_power=20 dBm
17002 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=11 freq=2462 MHz max_tx_power=20 dBm
17003 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=12 freq=2467 MHz max_tx_power=20 dBm
17004 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=1 chan=13 freq=2472 MHz max_tx_power=20 dBm
17005 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=36 freq=5180 MHz max_tx_power=20 dBm
17006 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=40 freq=5200 MHz max_tx_power=20 dBm
17007 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=44 freq=5220 MHz matar xf 3.4.112-sun7i.tgz --keep-directory-symlink -C /
17008 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=48 freq=5240 MHz max_tx_power=20 dBm
17009 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=149 freq=5745 MHz max_tx_power=13 dBm
17010 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=153 freq=5765 MHz max_tx_power=13 dBm
17011 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=157 freq=5785 MHz max_tx_power=13 dBm
17012 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=161 freq=5805 MHz max_tx_power=13 dBm
17013 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=2 chan=165 freq=5825 MHz max_tx_power=13 dBm
17014 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=20 dBm
17015 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=2 freq=2417 MHz max_tx_power=20 dBm
17016 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=3 freq=2422 MHz max_tx_power=20 dBm
17017 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=4 freq=2427 MHz max_tx_power=20 dBm
17018 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=5 freq=2432 MHz max_tx_power=20 dBm
17019 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=6 freq=2437 MHz max_tx_power=20 dBm
17020 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=7 freq=2442 MHz max_tx_power=20 dBm
17021 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=8 freq=2447 MHz max_tx_power=20 dBm
17022 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=9 freq=2452 MHz max_tx_power=20 dBm
17023 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=10 freq=2457 MHz max_tx_power=20 dBm
17024 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=11 freq=2462 MHz max_tx_power=20 dBm
17025 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=12 freq=2467 MHz max_tx_power=20 dBm
17026 Sep 24 02:34:49 gateway hostapd[11921]: Allowed channel: mode=0 chan=13 freq=2472 MHz max_tx_power=20 dBm
17027 Sep 24 02:34:49 gateway hostapd[11921]: hw vht capab: 0x0, conf vht capab: 0x0
17028 Sep 24 02:34:49 gateway hostapd[11921]: Completing interface initialization
17029 Sep 24 02:34:49 gateway hostapd[11921]: Mode: IEEE 802.11g  Channel: 3  Frequency: 2422 MHz
17030 Sep 24 02:34:49 gateway hostapd[11921]: DFS 0 channels required radar detection
17031 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Set freq 2422 (ht_enabled=1, vht_enabled=0, bandwidth=20 MHz, cf1=2422 MHz, cf2=0 MHz)
17032 Sep 24 02:34:49 gateway hostapd[11921]:   * freq=2422
17033 Sep 24 02:34:49 gateway hostapd[11921]:   * vht_enabled=0
17034 Sep 24 02:34:49 gateway hostapd[11921]:   * ht_enabled=1
17035 Sep 24 02:34:49 gateway hostapd[11921]:   * sec_channel_offset=0
17036 Sep 24 02:34:49 gateway hostapd[11921]:   * channel_type=1
17037 Sep 24 02:34:49 gateway hostapd[11921]: RATE[0] rate=10 flags=0x1
17038 Sep 24 02:34:49 gateway hostapd[11921]: RATE[1] rate=20 flags=0x1
17039 Sep 24 02:34:49 gateway hostapd[11921]: RATE[2] rate=55 flags=0x1
17040 Sep 24 02:34:49 gateway hostapd[11921]: RATE[3] rate=110 flags=0x1
17041 Sep 24 02:34:49 gateway hostapd[11921]: RATE[4] rate=60 flags=0x0
17042 Sep 24 02:34:49 gateway hostapd[11921]: RATE[5] rate=90 flags=0x0
17043 Sep 24 02:34:49 gateway hostapd[11921]: RATE[6] rate=120 flags=0x0
17044 Sep 24 02:34:49 gateway hostapd[11921]: RATE[7] rate=180 flags=0x0
17045 Sep 24 02:34:49 gateway hostapd[11921]: RATE[8] rate=240 flags=0x0
17046 Sep 24 02:34:49 gateway hostapd[11921]: RATE[9] rate=360 flags=0x0
17047 Sep 24 02:34:49 gateway hostapd[11921]: RATE[10] rate=480 flags=0x0
17048 Sep 24 02:34:49 gateway hostapd[11921]: RATE[11] rate=540 flags=0x0
17049 Sep 24 02:34:49 gateway hostapd[11921]: hostapd_setup_bss(hapd=0x7f708858 (ap0), first=1)
17050 Sep 24 02:34:49 gateway hostapd[11921]: ap0: Flushing old station entries
17051 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: flush -> DEL_STATION ap0 (all)
17052 Sep 24 02:34:49 gateway hostapd[11921]: ap0: Deauthenticate all stations
17053 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: sta_remove -> DEL_STATION ap0 ff:ff:ff:ff:ff:ff --> 0 (Success)
17054 Sep 24 02:34:49 gateway hostapd[11921]: wpa_driver_nl80211_set_key: ifindex=174 (ap0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
17055 Sep 24 02:34:49 gateway hostapd[11921]: wpa_driver_nl80211_set_key: ifindex=174 (ap0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
17056 Sep 24 02:34:49 gateway hostapd[11921]: wpa_driver_nl80211_set_key: ifindex=174 (ap0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
17057 Sep 24 02:34:49 gateway hostapd[11921]: wpa_driver_nl80211_set_key: ifindex=174 (ap0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
17058 Sep 24 02:34:49 gateway hostapd[11921]: Using interface ap0 with hwaddr 02:08:22:c8:38:13 and ssid "WhaleLAN"
17059 Sep 24 02:34:49 gateway hostapd[11921]: Deriving WPA PSK based on passphrase
17060 Sep 24 02:34:49 gateway hostapd[11921]: SSID - hexdump_ascii(len=8):
17061 Sep 24 02:34:49 gateway hostapd[11921]:      57 68 61 6c 65 4c 41 4e                           WhaleLAN
17062 Sep 24 02:34:49 gateway hostapd[11921]: PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
17063 Sep 24 02:34:49 gateway hostapd[11921]: PSK (from passphrase) - hexdump(len=32): [REMOVED]
17064 Sep 24 02:34:49 gateway hostapd[11921]: random: Got 20/20 bytes from /dev/random
17065 Sep 24 02:34:49 gateway hostapd[11921]: Get randomness: len=32 entropy=0
17066 Sep 24 02:34:49 gateway hostapd[11921]: GMK - hexdump(len=32): [REMOVED]
17067 Sep 24 02:34:49 gateway hostapd[11921]: Get randomness: len=32 entropy=0
17068 Sep 24 02:34:49 gateway hostapd[11921]: Key Counter - hexdump(len=32): [REMOVED]
17069 Sep 24 02:34:49 gateway hostapd[11921]: WPA: Delay group state machine start until Beacon frames have been configured
17070 Sep 24 02:34:49 gateway hostapd[11921]: RSN pre-auth interface 'eth0'
17071 Sep 24 02:34:49 gateway hostapd[11921]: RSN pre-auth interface 'eth1'
17072 Sep 24 02:34:49 gateway hostapd[11921]: RSN pre-auth interface 'tap0'
17073 Sep 24 02:34:49 gateway hostapd[11921]: RSN pre-auth interface 'bridge0'
17074 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Set beacon (beacon_set=0)
17075 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Beacon head - hexdump(len=59): 80 00 00 00 ff ff ff ff ff ff 02 08 22 c8 38 13 02 08 22 c8 38 13 00 00 00 00 00     00 00 00 00 00 2c 01 11 04 00 08 57 68 61 6c 65 4c 41 4e 01 08 82 84 8b 9
      6 0c 12 18 24 03 01 03
17076 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Beacon tail - hexdump(len=93): 2a 01 04 32 04 30 48 60 6c 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00 00 0f     ac 02 00 0f ac 06 01 00 2d 1a 0c 00 03 ff 00 00 00 00 00 00 00 00 00 00 0
      0 01 00 00 00 00 00 00 00 00 00 00 3d 16 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 04 00 00 00 02
17077 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: ifindex=174
17078 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: beacon_int=300
17079 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: dtim_period=2
17080 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: ssid - hexdump_ascii(len=8):
17081 Sep 24 02:34:49 gateway hostapd[11921]:      57 68 61 6c 65 4c 41 4e                           WhaleLAN
17082 Sep 24 02:34:49 gateway hostapd[11921]:   * beacon_int=300
17083 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: hidden SSID not in use
17084 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: privacy=1
17085 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: auth_algs=0x1
17086 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: wpa_version=0x2
17087 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: key_mgmt_suites=0x102
17088 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: pairwise_ciphers=0x18
17089 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: group_cipher=0x10
17090 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: SMPS mode - off
17091 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: beacon_ies - hexdump(len=6): 7f 04 00 00 00 02
17092 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: proberesp_ies - hexdump(len=6): 7f 04 00 00 00 02
17093 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: assocresp_ies - hexdump(len=6): 7f 04 00 00 00 02
17094 Sep 24 02:34:49 gateway hostapd[11921]: WPA: Start group state machine to set initial keys
17095 Sep 24 02:34:49 gateway hostapd[11921]: WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
17096 Sep 24 02:34:49 gateway hostapd[11921]: Get randomness: len=16 entropy=0
17097 Sep 24 02:34:49 gateway hostapd[11921]: GTK - hexdump(len=16): [REMOVED]
17098 Sep 24 02:34:49 gateway hostapd[11921]: WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
17099 Sep 24 02:34:49 gateway hostapd[11921]: wpa_driver_nl80211_set_key: ifindex=174 (ap0) alg=3 addr=0x7f6bb0e4 key_idx=1 set_tx=1 seq_len=0 key_len=16
17100 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
17101 Sep 24 02:34:49 gateway hostapd[11921]:    broadcast key
17102 Sep 24 02:34:49 gateway hostapd[11921]: nl80211: Set ap0 operstate 0->1 (UP)
17103 Sep 24 02:34:49 gateway hostapd[11921]: netlink: Operstate: ifindex=174 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
17104 Sep 24 02:34:49 gateway hostapd[11921]: Failed to set TX queue parameters for queue 0.
17105 Sep 24 02:34:49 gateway hostapd[11921]: Failed to set TX queue parameters for queue 1.
17106 Sep 24 02:34:49 gateway hostapd[11921]: Failed to set TX queue parameters for queue 2.
17107 Sep 24 02:34:49 gateway hostapd[11921]: Failed to set TX queue parameters for queue 3.
17108 Sep 24 02:34:49 gateway hostapd[11921]: ap0: interface state COUNTRY_UPDATE->ENABLED
17109 Sep 24 02:34:49 gateway hostapd[11921]: ap0: AP-ENABLED
17110 Sep 24 02:34:49 gateway hostapd[11921]: ap0: Setup of interface done.
17111 Sep 24 02:34:49 gateway hostapd[11921]: ctrl_iface not configured!
17112 Sep 24 02:34:49 gateway configure_bridge.sh[11925]: device ap0 is already a member of a bridge; can't enslave it to bridge bridge0.
17113 Sep 24 02:34:49 gateway systemd[1]: Started WhaleLAN Access Point.
17114 Sep 24 02:34:50 gateway avahi-daemon[712]: Joining mDNS multicast group on interface ap0.IPv6 with address fe80::8:22ff:fec8:3813.
17115 Sep 24 02:34:50 gateway avahi-daemon[712]: New relevant interface ap0.IPv6 for mDNS.
17116 Sep 24 02:34:50 gateway avahi-daemon[712]: Registering new address record for fe80::8:22ff:fec8:3813 on ap0.*.
17117 Sep 24 02:34:52 gateway ntpd[1711]: Listen normally on 19 ap0 [fe80::8:22ff:fec8:3813%174]:123
17118 Sep 24 02:34:52 gateway ntpd[1711]: Deleting interface #18 ap0, fe80::8:22ff:fe8c:a60e%172#123, interface stats: received=0, sent=0, dropped=0, active_time=299     secs
17119 Sep 24 02:34:52 gateway ntpd[1711]: new interface(s) found: waking up resolver
17120 Sep 24 02:35:04 gateway kernel: [ 1575.869589] bridge0: port 3(ap0) entered forwarding state
17121 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.11: associated
17122 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: event 1 notification
17123 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: start authentication
17124 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.1X: unauthorizing port
17125 Sep 24 02:35:07 gateway kernel: [ 1579.300175] ------------[ cut here ]------------
17126 Sep 24 02:35:07 gateway kernel: [ 1579.300209] WARNING: CPU: 2 PID: 11841 at net/wireless/nl80211.c:3618 nl80211_put_sta_rate+0xf8/0x200()
17127 Sep 24 02:35:07 gateway kernel: [ 1579.300217] Modules linked in: tun bridge stp llc ahci libahci libata mtk_thermal mtk_cir ip6table_filter ip6_tables     ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
       nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables
17128 Sep 24 02:35:07 gateway kernel: [ 1579.300285] CPU: 2 PID: 11841 Comm: tx_thread Tainted: G        W       4.4.70-BPI-R2-Kernel #1
17129 Sep 24 02:35:07 gateway kernel: [ 1579.300291] Hardware name: Mediatek Cortex-A7 (Device Tree)
17130 Sep 24 02:35:07 gateway kernel: [ 1579.300316] [<c0019bf0>] (unwind_backtrace) from [<c0014748>] (show_stack+0x20/0x24)
17131 Sep 24 02:35:07 gateway kernel: [ 1579.300332] [<c0014748>] (show_stack) from [<c055746c>] (dump_stack+0x9c/0xb0)
17132 Sep 24 02:35:07 gateway kernel: [ 1579.300350] [<c055746c>] (dump_stack) from [<c0033c0c>] (warn_slowpath_common+0x94/0xc4)
17133 Sep 24 02:35:07 gateway kernel: [ 1579.300365] [<c0033c0c>] (warn_slowpath_common) from [<c0033cf8>] (warn_slowpath_null+0x2c/0x34)
17134 Sep 24 02:35:07 gateway kernel: [ 1579.300379] [<c0033cf8>] (warn_slowpath_null) from [<c0aaaf38>] (nl80211_put_sta_rate+0xf8/0x200)
17135 Sep 24 02:35:07 gateway kernel: [ 1579.300395] [<c0aaaf38>] (nl80211_put_sta_rate) from [<c0a81580>] (nl80211_send_station+0x520/0xb08)
17136 Sep 24 02:35:07 gateway kernel: [ 1579.300408] [<c0a81580>] (nl80211_send_station) from [<c0a81c00>] (cfg80211_new_sta+0x98/0x198)
17137 Sep 24 02:35:07 gateway kernel: [ 1579.300423] [<c0a81c00>] (cfg80211_new_sta) from [<c0729134>] (kalP2PGOStationUpdate+0x9c/0xa4)
17138 Sep 24 02:35:07 gateway kernel: [ 1579.300438] [<c0729134>] (kalP2PGOStationUpdate) from [<c0744a38>] (p2pRunEventAAASuccess+0x24/0x2c)
17139 Sep 24 02:35:07 gateway kernel: [ 1579.300454] [<c0744a38>] (p2pRunEventAAASuccess) from [<c072e274>] (aaaFsmRunEventTxDone+0x1a4/0x1ac)
17140 Sep 24 02:35:07 gateway kernel: [ 1579.300470] [<c072e274>] (aaaFsmRunEventTxDone) from [<c070c2c4>] (nicRxProcessEventPacket+0x8bc/0x9bc)
17141 Sep 24 02:35:07 gateway kernel: [ 1579.300484] [<c070c2c4>] (nicRxProcessEventPacket) from [<c070c538>] (nicRxProcessRFBs+0xc4/0x184)
17142 Sep 24 02:35:07 gateway kernel: [ 1579.300498] [<c070c538>] (nicRxProcessRFBs) from [<c070c864>] (nicProcessRxInterrupt+0x3c/0x40)
17143 Sep 24 02:35:07 gateway kernel: [ 1579.300514] [<c070c864>] (nicProcessRxInterrupt) from [<c0705ad8>] (nicProcessIST_impl+0x64/0xbc)
17144 Sep 24 02:35:07 gateway kernel: [ 1579.300530] [<c0705ad8>] (nicProcessIST_impl) from [<c0705b94>] (nicProcessIST+0x64/0xa0)
17145 Sep 24 02:35:07 gateway kernel: [ 1579.300547] [<c0705b94>] (nicProcessIST) from [<c06f72dc>] (wlanIST+0x50/0xa4)
17146 Sep 24 02:35:07 gateway kernel: [ 1579.300564] [<c06f72dc>] (wlanIST) from [<c07169bc>] (tx_thread+0x3dc/0x454)
17147 Sep 24 02:35:07 gateway kernel: [ 1579.300582] [<c07169bc>] (tx_thread) from [<c00529b8>] (kthread+0x110/0x128)
17148 Sep 24 02:35:07 gateway kernel: [ 1579.300599] [<c00529b8>] (kthread) from [<c000fbf8>] (ret_from_fork+0x14/0x3c)
17149 Sep 24 02:35:07 gateway kernel: [ 1579.300607] ---[ end trace c115e8ac3f5866ef ]---
17150 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: sending 1/4 msg of 4-Way Handshake
17151 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: received EAPOL-Key frame (2/4 Pairwise)
17152 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: sending 3/4 msg of 4-Way Handshake
17153 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.11: disassociated
17154 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: event 2 notification
17155 Sep 24 02:35:07 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.1X: unauthorizing port
17156 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.11: associated
17157 Sep 24 02:35:11 gateway rsyslogd-2007: action 'action 10' suspended, next retry is Mon Sep 24 02:36:11 2018 [v8.16.0 try http://www.rsyslog.com/e/2007 ]
17158 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: event 1 notification
17159 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: start authentication
17160 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.1X: unauthorizing port
17182 Sep 24 02:35:11 gateway kernel: [ 1582.884522] [<c0705b94>] (nicProcessIST) from [<c06f72dc>] (wlanIST+0x50/0xa4)
17183 Sep 24 02:35:11 gateway kernel: [ 1582.884539] [<c06f72dc>] (wlanIST) from [<c07169bc>] (tx_thread+0x3dc/0x454)
17184 Sep 24 02:35:11 gateway kernel: [ 1582.884556] [<c07169bc>] (tx_thread) from [<c00529b8>] (kthread+0x110/0x128)
17185 Sep 24 02:35:11 gateway kernel: [ 1582.884573] [<c00529b8>] (kthread) from [<c000fbf8>] (ret_from_fork+0x14/0x3c)
17186 Sep 24 02:35:11 gateway kernel: [ 1582.884581] ---[ end trace c115e8ac3f5866f0 ]---
17187 Sep 24 02:35:11 gateway kernel: [ 1582.884588] ------------[ cut here ]------------
17188 Sep 24 02:35:11 gateway kernel: [ 1582.884601] WARNING: CPU: 1 PID: 11841 at net/wireless/nl80211.c:3618 nl80211_put_sta_rate+0xf8/0x200()
17189 Sep 24 02:35:11 gateway kernel: [ 1582.884606] Modules linked in: tun bridge stp llc ahci libahci libata mtk_thermal mtk_cir ip6table_filter ip6_tables     ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
       nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables
17190 Sep 24 02:35:11 gateway kernel: [ 1582.884663] CPU: 1 PID: 11841 Comm: tx_thread Tainted: G        W       4.4.70-BPI-R2-Kernel #1
17191 Sep 24 02:35:11 gateway kernel: [ 1582.884669] Hardware name: Mediatek Cortex-A7 (Device Tree)
17192 Sep 24 02:35:11 gateway kernel: [ 1582.884683] [<c0019bf0>] (unwind_backtrace) from [<c0014748>] (show_stack+0x20/0x24)
17193 Sep 24 02:35:11 gateway kernel: [ 1582.884697] [<c0014748>] (show_stack) from [<c055746c>] (dump_stack+0x9c/0xb0)
17194 Sep 24 02:35:11 gateway kernel: [ 1582.884712] [<c055746c>] (dump_stack) from [<c0033c0c>] (warn_slowpath_common+0x94/0xc4)
17195 Sep 24 02:35:11 gateway kernel: [ 1582.884726] [<c0033c0c>] (warn_slowpath_common) from [<c0033cf8>] (warn_slowpath_null+0x2c/0x34)
17196 Sep 24 02:35:11 gateway kernel: [ 1582.884740] [<c0033cf8>] (warn_slowpath_null) from [<c0aaaf38>] (nl80211_put_sta_rate+0xf8/0x200)
17197 Sep 24 02:35:11 gateway kernel: [ 1582.884753] [<c0aaaf38>] (nl80211_put_sta_rate) from [<c0a81580>] (nl80211_send_station+0x520/0xb08)
17198 Sep 24 02:35:11 gateway kernel: [ 1582.884765] [<c0a81580>] (nl80211_send_station) from [<c0a81c00>] (cfg80211_new_sta+0x98/0x198)
17199 Sep 24 02:35:11 gateway kernel: [ 1582.884778] [<c0a81c00>] (cfg80211_new_sta) from [<c0729134>] (kalP2PGOStationUpdate+0x9c/0xa4)
17200 Sep 24 02:35:11 gateway kernel: [ 1582.884791] [<c0729134>] (kalP2PGOStationUpdate) from [<c0744a38>] (p2pRunEventAAASuccess+0x24/0x2c)
17201 Sep 24 02:35:11 gateway kernel: [ 1582.884805] [<c0744a38>] (p2pRunEventAAASuccess) from [<c072e274>] (aaaFsmRunEventTxDone+0x1a4/0x1ac)
17202 Sep 24 02:35:11 gateway kernel: [ 1582.884819] [<c072e274>] (aaaFsmRunEventTxDone) from [<c070c2c4>] (nicRxProcessEventPacket+0x8bc/0x9bc)
17203 Sep 24 02:35:11 gateway kernel: [ 1582.884833] [<c070c2c4>] (nicRxProcessEventPacket) from [<c070c538>] (nicRxProcessRFBs+0xc4/0x184)
17204 Sep 24 02:35:11 gateway kernel: [ 1582.884846] [<c070c538>] (nicRxProcessRFBs) from [<c070c864>] (nicProcessRxInterrupt+0x3c/0x40)
17205 Sep 24 02:35:11 gateway kernel: [ 1582.884861] [<c070c864>] (nicProcessRxInterrupt) from [<c0705ad8>] (nicProcessIST_impl+0x64/0xbc)
17206 Sep 24 02:35:11 gateway kernel: [ 1582.884877] [<c0705ad8>] (nicProcessIST_impl) from [<c0705b94>] (nicProcessIST+0x64/0xa0)
17207 Sep 24 02:35:11 gateway kernel: [ 1582.884891] [<c0705b94>] (nicProcessIST) from [<c06f72dc>] (wlanIST+0x50/0xa4)
17208 Sep 24 02:35:11 gateway kernel: [ 1582.884906] [<c06f72dc>] (wlanIST) from [<c07169bc>] (tx_thread+0x3dc/0x454)
17209 Sep 24 02:35:11 gateway kernel: [ 1582.884921] [<c07169bc>] (tx_thread) from [<c00529b8>] (kthread+0x110/0x128)
17210 Sep 24 02:35:11 gateway kernel: [ 1582.884936] [<c00529b8>] (kthread) from [<c000fbf8>] (ret_from_fork+0x14/0x3c)
17211 Sep 24 02:35:11 gateway kernel: [ 1582.884943] ---[ end trace c115e8ac3f5866f1 ]---
17212 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: received EAPOL-Key frame (2/4 Pairwise)
17213 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: sending 3/4 msg of 4-Way Handshake
17214 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.11: disassociated
17215 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: event 2 notification
17216 Sep 24 02:35:11 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.1X: unauthorizing port
17217 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.11: associated
17218 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: event 1 notification
17219 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: start authentication
17220 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec IEEE 802.1X: unauthorizing port
17221 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: sending 1/4 msg of 4-Way Handshake
17222 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: received EAPOL-Key frame (2/4 Pairwise)
17223 Sep 24 02:35:12 gateway hostapd: ap0: STA e8:b1:fc:af:81:ec WPA: sending 3/4 msg of 4-Way Handshake
17224 Sep 24 02:35:12 gateway kernel: [ 1584.380153] ------------[ cut here ]------------
17225 Sep 24 02:35:12 gateway kernel: [ 1584.380189] WARNING: CPU: 1 PID: 11841 at net/wireless/nl80211.c:3618 nl80211_put_sta_rate+0xf8/0x200()
17226 Sep 24 02:35:12 gateway kernel: [ 1584.380197] Modules linked in: tun bridge stp llc ahci libahci libata mtk_thermal mtk_cir ip6table_filter ip6_tables     ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4
       nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables
17227 Sep 24 02:35:12 gateway kernel: [ 1584.380263] CPU: 1 PID: 11841 Comm: tx_thread Tainted: G        W       4.4.70-BPI-R2-Kernel #1
17228 Sep 24 02:35:12 gateway kernel: [ 1584.380270] Hardware name: Mediatek Cortex-A7 (Device Tree)
17229 Sep 24 02:35:12 gateway kernel: [ 1584.380294] [<c0019bf0>] (unwind_backtrace) from [<c0014748>] (show_stack+0x20/0x24)
17230 Sep 24 02:35:12 gateway kernel: [ 1584.380311] [<c0014748>] (show_stack) from [<c055746c>] (dump_stack+0x9c/0xb0)
17231 Sep 24 02:35:12 gateway kernel: [ 1584.380329] [<c055746c>] (dump_stack) from [<c0033c0c>] (warn_slowpath_common+0x94/0xc4)
17232 Sep 24 02:35:12 gateway kernel: [ 1584.380344] [<c0033c0c>] (warn_slowpath_common) from [<c0033cf8>] (warn_slowpath_null+0x2c/0x34)
17233 Sep 24 02:35:12 gateway kernel: [ 1584.380358] [<c0033cf8>] (warn_slowpath_null) from [<c0aaaf38>] (nl80211_put_sta_rate+0xf8/0x200)
17234 Sep 24 02:35:12 gateway kernel: [ 1584.380374] [<c0aaaf38>] (nl80211_put_sta_rate) from [<c0a81500>] (nl80211_send_station+0x4a0/0xb08)
17235 Sep 24 02:35:12 gateway kernel: [ 1584.380387] [<c0a81500>] (nl80211_send_station) from [<c0a81c00>] (cfg80211_new_sta+0x98/0x198)
17236 Sep 24 02:35:12 gateway kernel: [ 1584.380402] [<c0a81c00>] (cfg80211_new_sta) from [<c0729134>] (kalP2PGOStationUpdate+0x9c/0xa4)
17237 Sep 24 02:35:12 gateway kernel: [ 1584.380417] [<c0729134>] (kalP2PGOStationUpdate) from [<c0744a38>] (p2pRunEventAAASuccess+0x24/0x2c)
17238 Sep 24 02:35:12 gateway kernel: [ 1584.380433] [<c0744a38>] (p2pRunEventAAASuccess) from [<c072e274>] (aaaFsmRunEventTxDone+0x1a4/0x1ac)
17239 Sep 24 02:35:12 gateway kernel: [ 1584.380449] [<c072e274>] (aaaFsmRunEventTxDone) from [<c070c2c4>] (nicRxProcessEventPacket+0x8bc/0x9bc)
17240 Sep 24 02:35:12 gateway kernel: [ 1584.380463] [<c070c2c4>] (nicRxProcessEventPacket) from [<c070c538>] (nicRxProcessRFBs+0xc4/0x184)
...

Please try to remove bridge-option in hostapd.conf

I tried that already but it makes no difference

Which image and which kernel.do you use? Can you try my debian/ubuntu with a 4.14-kernel to exclude a hardware-issue?

I am using the Ubuntu 16.04 with 4.4.70-BPI-R2-Kernel from 2017. Is thre a way to keep my other settings when using the new image?

You can use newer kernel with your current system (have to change network-config to match dsa) but if you use a new image you have to configure it again (copy config files from old system).

Alright I used 4.14.62_main prebuilt from your Google Cloud and extracted BPI-ROOT to my FS Root I also used bpi-bootsel and gzip to flash the uImage file to the BPI Bootsector. Note also that I accidentally omitted the bananapi\bpi-r2\linux\ folders from the uboot.img.gz file.

Result: BPI does not boot anymore

All 3 LEDs stay on and I don’t get any image via HDMI. Sadly, I don’t know how to get out of this mess :\

Do not flash uimage…it is only a file which have to be to copied to bpi-Boot-partition.

Uboot have to be flashed,but not to position 0.

Figured as much afterwards xD

Any tips on how to reverse it though? I can’t boot into it anymore and I don’t have a UART interface available :\

You can try use this: https://www.fw-web.de/dokuwiki/doku.php?id=en/bpi-r2/storage starting on step 4 and use sd instead of loop8

Alternative you can dd the first 1 mb from image to your sdcard. In both files you have to copy back uimage and uenv.txt to root-partition.

Else you can copy 101mb from priginal image to your sd-card. This will restore the first 1mb and the bpi-boot-partition (100mb)

I have try hostapd. My other computer or phone don’t see the ssid of the BPI-R2. First I have try with a bridge, after I have try with no bridge. The bridge works between eth0 and eth1.

I have read this message. Need I install the new kernel ? Can I build the kernel with the BPI-R2 or with Mageia ?

“wmt_loader” doesn’t work.

root@bpi-iot-ros-ai:~# wmt_loader
init combo device
Opened combo device
get device id : 30243
set device id : 30243
do module init: 30243
failed to init module

last failed of wmtloader can be ignored

Without your config,hostapd-log and kernelversion we/i cannot help you

My kernel version : root@bpi-iot-ros-ai:~# uname -r 4.4.70-BPI-R2-Kernel

Where is the config,hostapd-log ?

root@bpi-iot-ros-ai:/etc/hostapd# grep hostapd /var/log/syslog
Nov  4 22:03:38 bpi-iot-ros-ai hostapd[2063]:  * Starting advanced IEEE 802.11 management hostapd
Nov  4 22:03:38 bpi-iot-ros-ai hostapd[2063]:    ...fail!

How do you start hostapd? If starting hostapd manually you can set config by parameter and see the log on terminal

Again…take a look in my wiki www.fw-web.de/dokuwiki

You are wanted this :

  • root@bpi-iot-ros-ai:/etc/hostapd# /usr/sbin/hostapd -dd  /etc/hostapd/hostapd.conf
    
  • random: Trying to read entropy from /dev/random
    
  • Configuration file: /etc/hostapd/hostapd.conf
    
  • rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
    
  • rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
    
  • nl80211: Using driver-based roaming
    
  • nl80211: TDLS supported
    
  • nl80211: TDLS external setup
    
  • nl80211: Supported cipher 00-0f-ac:1
    
  • nl80211: Supported cipher 00-0f-ac:5
    
  • nl80211: Supported cipher 00-0f-ac:2
    
  • nl80211: Supported cipher 00-0f-ac:4
    
  • nl80211: Supported cipher 00-0f-ac:6
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=1
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=6
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4096
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4097
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4098
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4099
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4104
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4100
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4103
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4102
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4354
    
  • nl80211: Supported vendor command: vendor_id=0x1a11 subcmd=4608
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=0
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=1
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=2
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=3
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=4
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=5
    
  • nl80211: Supported vendor event: vendor_id=0x1a11 subcmd=6
    
  • nl80211: interface wlan0 in phy phy0
    
  • nl80211: Set mode ifindex 8 iftype 3 (AP)
    
  • nl80211: Failed to set interface 8 to mode 3: -95 (Operation not supported)
    
  • nl80211: Try mode change after setting interface down
    
  • nl80211: Set mode ifindex 8 iftype 3 (AP)
    
  • nl80211: Failed to set interface 8 to mode 3: -95 (Operation not supported)
    
  • nl80211: Interface mode change to 3 from 0 failed
    
  • nl80211: Could not configure driver mode
    
  • nl80211: deinit ifname=wlan0 disabled_11b_rates=0
    
  • nl80211: Remove monitor interface: refcount=0
    
  • netlink: Operstate: ifindex=8 linkmode=0 (kernel-control), operstate=6 (IF_OPER_UP)
    
  • nl80211: Set mode ifindex 8 iftype 2 (STATION)
    
  • nl80211 driver initialization failed.
    
  • hostapd_interface_deinit_free(0x7f6dccd8)
    
  • hostapd_interface_deinit_free: num_bss=1 conf->num_bss=1
    
  • hostapd_interface_deinit(0x7f6dccd8)
    
  • wlan0: interface state UNINITIALIZED->DISABLED
    
  • hostapd_bss_deinit: deinit bss wlan0
    
  • wlan0: AP-DISABLED 
    
  • hostapd_cleanup(hapd=0x7f6dd9a0 (wlan0))
    
  • hostapd_free_hapd_data: Interface wlan0 wasn't started
    
  • hostapd_interface_deinit_free: driver=(nil) drv_priv=(nil) -> hapd_deinit
    
  • hostapd_interface_free(0x7f6dccd8)
    
  • hostapd_interface_free: free hapd 0x7f6dd9a0
    
  • hostapd_cleanup_iface(0x7f6dccd8)
    
  • hostapd_cleanup_iface_partial(0x7f6dccd8)
    
  • hostapd_cleanup_iface: free iface=0x7f6dccd8

Please post your /etc/hostapd/hostapd.conf and make your log readable with code-button </> (select log and then press it)

My /etc/hostapd/hostapd.conf # This is the name of the WiFi interface we configured above interface=wlan0

# Use the nl80211 driver with the brcmfmac driver
#driver=nl80211
driver=nl80211

# YOUR BRIDGE NAME
#bridge=br0

# YOUR COUNTRY HERE
country_code=FR
ieee80211d=1

# This is the name of the network
ssid=Mon_réseau_domestique
# Use the 2.4GHz band
hw_mode=g

# Use channel 6
channel=6

# Enable 802.11n
#ieee80211n=1

# Enable WMM
wmm_enabled=1

# Enable 40MHz channels with 20ns guard interval
ht_capab=[HT40][SHORT-GI-20][DSSS_CCK-40]

# Accept all MAC addresses
macaddr_acl=0

# Use WPA authentication
auth_algs=1

# Require clients to know the network name
ignore_broadcast_ssid=0

# Use WPA2
wpa=2

# Use a pre-shared key
wpa_key_mgmt=WPA-PSK

wpa_pairwise=TKIP

# The network passphrase
wpa_passphrase=Pas Ici

# Use AES, instead of TKIP
rsn_pairwise=CCMP

For the log, “carrier return” and “line’s jump” doesn’t work… I don’t know why :frowning:

internal wifi-device is named ap0 and have to created before runnind hostapd

https://www.fw-web.de/dokuwiki/doku.php?id=en:bpi-r2:wlan

Before starting hostapd please check if ap0 exists

I have found it with "Can’t open device node(/dev/stpwmt) error:-1 "

root@bpi-iot-ros-ai:~# ifconfig -a|grep Link
bond0     Link encap:Ethernet  HWaddr 72:a1:72:02:27:c3  
br0       Link encap:Ethernet  HWaddr 32:d1:55:7d:03:39  
          inet6 addr: fe80::30d1:55ff:fe7d:339/64 Scope:Link
br0:avahi Link encap:Ethernet  HWaddr 32:d1:55:7d:03:39  
docker0   Link encap:Ethernet  HWaddr 02:42:c2:ca:a0:fa  
eth0      Link encap:Ethernet  HWaddr fe:e9:dc:36:38:a8  
          inet6 addr: fe80::fce9:dcff:fe36:38a8/64 Scope:Link
eth1      Link encap:Ethernet  HWaddr 92:e8:79:fb:e3:10  
lo        Link encap:Local Loopback  
sit0      Link encap:IPv6-in-IPv4  
tunl0     Link encap:IPIP Tunnel  HWaddr   
wlan0     Link encap:Ethernet  HWaddr 00:08:22:5c:b7:fb  
root@bpi-iot-ros-ai:~# wmt_loader
init combo device
Opened combo device
get device id : 30243
set device id : 30243
do module init: 30243
failed to init module 
root@bpi-iot-ros-ai:~# stp_uart_launcher -p /etc/firmware &
[1] 3053
root@bpi-iot-ros-ai:~# Can't open device node(/dev/stpwmt) error:-1 
Can't open device node(/dev/stpwmt) error:-1 
[...]
echo A >/dev/wmtWifi 
root@bpi-iot-ros-ai:~# Can't open device node(/dev/stpwmt) error:-1 
Can't open device node(/dev/stpwmt) error:-1 
Can't open device node(/dev/stpwmt) error:-1 
Can't open device node(/dev/stpwmt) error:-1 
ifconfig -a|grep Link          Can't open device node(/dev/stpwmt) error:-1 

ap0       Link encap:Ethernet  HWaddr 02:08:22:5c:b7:fb  
          inet6 addr: fe80::8:22ff:fe5c:b7fb/64 Scope:Link
bond0     Link encap:Ethernet  HWaddr 72:a1:72:02:27:c3  
br0       Link encap:Ethernet  HWaddr 32:d1:55:7d:03:39  
          inet6 addr: fe80::30d1:55ff:fe7d:339/64 Scope:Link
br0:avahi Link encap:Ethernet  HWaddr 32:d1:55:7d:03:39  
docker0   Link encap:Ethernet  HWaddr 02:42:c2:ca:a0:fa  
eth0      Link encap:Ethernet  HWaddr fe:e9:dc:36:38:a8  
          inet6 addr: fe80::fce9:dcff:fe36:38a8/64 Scope:Link
eth1      Link encap:Ethernet  HWaddr 92:e8:79:fb:e3:10  
lo        Link encap:Local Loopback  
sit0      Link encap:IPv6-in-IPv4  
tunl0     Link encap:IPIP Tunnel  HWaddr   
wlan0     Link encap:Ethernet  HWaddr 00:08:22:5c:b7:fb  
root@bpi-iot-ros-ai:~# Can't open device node(/dev/stpwmt) error:-1 
Can't open device node(/dev/stpwmt) error:-1 
[...]
root@bpi-iot-ros-ai:~# Can't open device node(/dev/stpwmt) error:-1 
Can't open device node(/dev/stpwmt) error:-1 
ifconfig 
ap0       Link encap:Ethernet  HWaddr 02:08:22:5c:b7:fb  
          inet addr:192.192.2.1  Bcast:192.192.2.255  Mask:255.255.255.0
          inet6 addr: fe80::8:22ff:fe5c:b7fb/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:48 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:0 (0.0 B)  TX bytes:7480 (7.4 KB)

tail -f /var/log/kern.ord say :

Nov 5 02:58:58 bpi-iot-ros-ai kernel: [ 561.727825] [WMT-DEV][W]WMT_open:wait_event_timeout (2000)ms,(200)jiffies,return -EIO

tail -f /var/log/syslog say :

Nov 5 03:01:19 bpi-iot-ros-ai kernel: [ 702.027770] [WMT-DEV][W]WMT_open:wait_event_timeout (2000)ms,(200)jiffies,return -EIO

I try to reboot…

ap0 it not here. root@bpi-iot-ros-ai:~# echo A >/dev/wmtWifi

and ap0 is here.

/etc/hostapd# /usr/sbin/hostapd -dd /etc/hostapd/hostapd.conf After many line it’s halt…

  • root@bpi-iot-ros-ai:/etc/hostapd# /usr/sbin/hostapd -dd /etc/hostapd/hostapd.conf
  • random: Trying to read entropy from /dev/random
  • Configuration file: /etc/hostapd/hostapd.conf
  • rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
  • rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
  • nl80211: Using driver-based roaming
  • nl80211: TDLS supported
  • nl80211: TDLS external setup
  • nl80211: Supported cipher 00-0f-ac:1
  • nl80211: Supported cipher 00-0f-ac:5
  • […]
  • nl80211: Set ap0 operstate 0->1 (UP)
  • netlink: Operstate: ifindex=10 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  • Failed to set TX queue parameters for queue 0.
  • Failed to set TX queue parameters for queue 1.
  • Failed to set TX queue parameters for queue 2.
  • Failed to set TX queue parameters for queue 3.
  • ap0: interface state COUNTRY_UPDATE->ENABLED
  • ap0: AP-ENABLED
  • ap0: Setup of interface done.

After many minute:

  • random: Got 6/8 bytes from /dev/random
  • random: Got 2/2 bytes from /dev/random

After many minutes :

  • ap0: WPA rekeying GTK
  • WPA: group state machine entering state SETKEYS (VLAN-ID 0)
  • Get randomness: len=16 entropy=0
  • GTK - hexdump(len=16): [REMOVED]
  • wpa_group_setkeys: GKeyDoneStations=0
  • WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
  • wpa_driver_nl80211_set_key: ifindex=10 (ap0) alg=3 addr=0x7f6360e4 key_idx=2 set_tx=1 seq_len=0 key_len=16
  • nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  • broadcast key

All 10 min come this message

  • ap0: WPA rekeying GTK
  • WPA: group state machine entering state SETKEYS (VLAN-ID 0)
  • Get randomness: len=16 entropy=0
  • GTK - hexdump(len=16): [REMOVED]
  • wpa_group_setkeys: GKeyDoneStations=0
  • WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
  • wpa_driver_nl80211_set_key: ifindex=10 (ap0) alg=3 addr=0x7f6360e4 key_idx=2 set_tx=1 seq_len=0 key_len=16
  • nl80211: KEY_DATA - hexdump(len=16): [REMOVED]
  • broadcast key

Okay, finally got around to reinstalling my BPI-R2. Upgrading to 4.14 solved the issue apparantly.

WPA2-PSK AccessPoint works now without the kernel throwing errors. I used the deb_stretch_4.14.80_SD image from @frank-w and customized it for my network. I have a new issue concerning nat forwarding on the LAN ports but I will open a new thread for that.

Thanks :slight_smile: