I ran into an issue with DFS radar detection. If I understand correctly, hostapd will disable wifi, which it does. 30 minutes later, it should then scan again and bring wifi back up if radar is not detected. But the scan fails
Tue Nov 26 09:44:02 2024 daemon.notice hostapd: phy1-ap0: DFS-RADAR-DETECTED freq=5260 ht_enabled=0 chan_offset=0 chan_width=5 cf1=5250 cf2=0
Tue Nov 26 09:44:02 2024 daemon.warn hostapd: Can't set DFS state for freq 5180 MHz
Tue Nov 26 09:44:02 2024 daemon.warn hostapd: Can't set DFS state for freq 5200 MHz
Tue Nov 26 09:44:02 2024 daemon.warn hostapd: Can't set DFS state for freq 5220 MHz
Tue Nov 26 09:44:02 2024 daemon.warn hostapd: Can't set DFS state for freq 5240 MHz
Tue Nov 26 09:44:02 2024 daemon.notice hostapd: dfs_downgrade_bandwidth: no DFS channels left, waiting for NOP to finish
Tue Nov 26 09:44:02 2024 daemon.notice hostapd: phy1-ap0: AP-DISABLED
Tue Nov 26 09:44:02 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED xx:xx:xx:xx:84:f5
Tue Nov 26 09:44:03 2024 daemon.notice hostapd: phy1-ap0: AP-STA-DISCONNECTED xx:xx:xx:xx:39:f3
Tue Nov 26 09:44:03 2024 daemon.err hostapd: 20/40 MHz: center segment 0 (=50) and center freq 1 (=5270) not in sync
Tue Nov 26 09:44:03 2024 daemon.err hostapd: Failed to set beacon parameters
Tue Nov 26 09:44:03 2024 daemon.err hostapd: 20/40 MHz: center segment 0 (=50) and center freq 1 (=5270) not in sync
Tue Nov 26 09:44:03 2024 daemon.err hostapd: Failed to set beacon parameters
Tue Nov 26 09:44:03 2024 daemon.notice hostapd: nl80211: Failed to remove interface phy1-ap1 from bridge br-lan: No such device
Tue Nov 26 09:44:03 2024 daemon.notice hostapd: nl80211: deinit ifname=phy1-ap0 disabled_11b_rates=0
Tue Nov 26 09:44:03 2024 daemon.notice hostapd: phy1-ap0: interface state ENABLED->DISABLED
Tue Nov 26 09:44:03 2024 daemon.notice hostapd: phy1-ap0: interface state DISABLED->COUNTRY_UPDATE
Tue Nov 26 09:44:03 2024 daemon.notice hostapd: phy1-ap0: interface state COUNTRY_UPDATE->HT_SCAN
Tue Nov 26 09:44:04 2024 daemon.err hostapd: could not get valid channel
Tue Nov 26 09:44:04 2024 daemon.notice hostapd: phy1-ap0: interface state HT_SCAN->DFS
Tue Nov 26 09:44:06 2024 daemon.err hostapd: nl80211: kernel reports: key addition failed
Tue Nov 26 09:44:06 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:39:f3 IEEE 802.11: associated (aid 1)
Tue Nov 26 09:44:06 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED xx:xx:xx:xx:39:f3 auth_alg=ft
Tue Nov 26 09:47:05 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:84:f5 IEEE 802.11: authenticated
Tue Nov 26 09:47:05 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:84:f5 IEEE 802.11: associated (aid 2)
Tue Nov 26 09:47:06 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:84:f5 IEEE 802.11: associated (aid 2)
Tue Nov 26 09:47:06 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED xx:xx:xx:xx:84:f5 auth_alg=sae
Tue Nov 26 09:47:06 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:84:f5 RADIUS: starting accounting session CC1D1F2AB041E14D
Tue Nov 26 09:47:06 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:84:f5 WPA: pairwise key handshake completed (RSN)
Tue Nov 26 09:47:06 2024 daemon.notice hostapd: phy0-ap1: EAPOL-4WAY-HS-COMPLETED xx:xx:xx:xx:84:f5
Tue Nov 26 09:59:16 2024 daemon.notice hostapd: phy0-ap1: AP-STA-DISCONNECTED xx:xx:xx:xx:39:f3
Tue Nov 26 09:59:16 2024 daemon.err hostapd: nl80211: kernel reports: key addition failed
Tue Nov 26 09:59:16 2024 daemon.info hostapd: phy0-ap1: STA xx:xx:xx:xx:39:f3 IEEE 802.11: associated (aid 1)
Tue Nov 26 09:59:16 2024 daemon.notice hostapd: phy0-ap1: AP-STA-CONNECTED xx:xx:xx:xx:39:f3 auth_alg=ft
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5260 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5260 cf2=0
Tue Nov 26 10:14:33 2024 daemon.err hostapd: could not get valid channel
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5280 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5280 cf2=0
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=0, seg0=50, seg1=0, cac_time=60s
Tue Nov 26 10:14:33 2024 daemon.err hostapd: 20/40 MHz: center segment 0 (=50) and center freq 1 (=5270) not in sync
Tue Nov 26 10:14:33 2024 daemon.err hostapd: Can't set freq params
Tue Nov 26 10:14:33 2024 daemon.err hostapd: DFS start_dfs_cac() failed, -1
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5300 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5300 cf2=0
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=0, seg0=50, seg1=0, cac_time=60s
Tue Nov 26 10:14:33 2024 daemon.err hostapd: 20/40 MHz: center segment 0 (=50) and center freq 1 (=5270) not in sync
Tue Nov 26 10:14:33 2024 daemon.err hostapd: Can't set freq params
Tue Nov 26 10:14:33 2024 daemon.err hostapd: DFS start_dfs_cac() failed, -1
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-NOP-FINISHED freq=5320 ht_enabled=0 chan_offset=0 chan_width=0 cf1=5320 cf2=0
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: interface state DFS->DFS
Tue Nov 26 10:14:33 2024 daemon.notice hostapd: phy1-ap0: DFS-CAC-START freq=5260 chan=52 sec_chan=1, width=0, seg0=50, seg1=0, cac_time=60s
Tue Nov 26 10:14:33 2024 daemon.err hostapd: 20/40 MHz: center segment 0 (=50) and center freq 1 (=5270) not in sync
Tue Nov 26 10:14:33 2024 daemon.err hostapd: Can't set freq params
Tue Nov 26 10:14:33 2024 daemon.err hostapd: DFS start_dfs_cac() failed, -1
Tue Nov 26 10:22:33 2024 daemon.notice hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 IEEE 802.11: did not acknowledge authentication response
Tue Nov 26 10:22:33 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 IEEE 802.11: associated (aid 2)
Tue Nov 26 10:22:33 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED xx:xx:xx:xx:cd:c0 auth_alg=open
Tue Nov 26 10:22:33 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 RADIUS: starting accounting session EFF0EFE24B3850A8
Tue Nov 26 10:22:33 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 WPA: pairwise key handshake completed (RSN)
Tue Nov 26 10:22:33 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED xx:xx:xx:xx:cd:c0
Tue Nov 26 10:22:53 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 IEEE 802.11: disconnected due to excessive missing ACKs
Tue Nov 26 10:22:53 2024 daemon.notice hostapd: phy0-ap2: AP-STA-DISCONNECTED xx:xx:xx:xx:cd:c0
Tue Nov 26 10:22:56 2024 daemon.notice hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 IEEE 802.11: did not acknowledge authentication response
Tue Nov 26 10:23:04 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 IEEE 802.11: authenticated
Tue Nov 26 10:23:04 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 IEEE 802.11: associated (aid 2)
Tue Nov 26 10:23:04 2024 daemon.notice hostapd: phy0-ap2: AP-STA-CONNECTED xx:xx:xx:xx:cd:c0 auth_alg=open
Tue Nov 26 10:23:04 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 RADIUS: starting accounting session CB19C90DEE2BCF43
Tue Nov 26 10:23:04 2024 daemon.info hostapd: phy0-ap2: STA xx:xx:xx:xx:cd:c0 WPA: pairwise key handshake completed (RSN)
Tue Nov 26 10:23:04 2024 daemon.notice hostapd: phy0-ap2: EAPOL-4WAY-HS-COMPLETED xx:xx:xx:xx:cd:c0
Does anyone have any idea on how to resolve this?