Still odd behavior from what I witness. DFS only means dynamic frequency selection, not drop frequency fullstop ;- ) I am also using a channel where DFS is mandatory and I neither have problems with my LineageOS devices nor that the channel ever get changed through Openwrt, but as soon as I start some old stock Android devices some "sort of DFS" (or a bug / configuration issue) kicks in and the wireless interface will be disabled (evtl. only temporarily)
Netgear R7800, 21.02.1 Guest network, Enable key reinstallation (KRACK) countermeasures enabled, Disassociate On Low Acknowledgement disabled, 40 Mhz channel width, AC mode, Coverage cell density: not sure if it was on very high
opkg list-installed | grep ath10k
ath10k-board-qca9984 - 20201118-3
ath10k-firmware-qca9984-ct - 2020-11-08-1
kmod-ath10k-ct - 5.4.154+2021-09-22-e6a7d5b5-1
System log:
Wed Dec 22 17:27:41 2021 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED CLIENT1
Wed Dec 22 17:37:50 2021 daemon.notice netifd: wan (1313): udhcpc: sending renew to PROVIDER
Wed Dec 22 17:45:20 2021 daemon.notice netifd: wan (1313): udhcpc: sending renew to PROVIDER
Wed Dec 22 17:46:25 2021 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED CLIENT2
Wed Dec 22 17:46:25 2021 daemon.info hostapd: wlan0-1: STA CLIENT2 IEEE 802.11: disassociated due to inactivity
Wed Dec 22 17:46:26 2021 daemon.info hostapd: wlan0-1: STA CLIENT2 IEEE 802.11: deauthenticated due to inactivity (timer DEAUTH/REMOVE)
Wed Dec 22 17:49:05 2021 daemon.notice netifd: wan (1313): udhcpc: sending renew to PROVIDER
Wed Dec 22 17:50:57 2021 daemon.notice netifd: wan (1313): udhcpc: sending renew to PROVIDER
Wed Dec 22 17:51:53 2021 daemon.notice netifd: wan (1313): udhcpc: sending renew to 0.0.0.0
Wed Dec 22 17:51:53 2021 daemon.notice netifd: wan (1313): udhcpc: lease of IP obtained, lease time 7200
Wed Dec 22 18:09:28 2021 daemon.notice hostapd: wlan0-1: STA CLIENT2 IEEE 802.11: did not acknowledge authentication response
Wed Dec 22 18:09:47 2021 daemon.info hostapd: wlan0-1: STA CLIENT2 IEEE 802.11: authenticated
Wed Dec 22 18:09:47 2021 daemon.info hostapd: wlan0-1: STA CLIENT2 IEEE 802.11: associated (aid 2)
Wed Dec 22 18:09:47 2021 daemon.notice hostapd: wlan0-1: AP-STA-CONNECTED CLIENT2
Wed Dec 22 18:09:47 2021 daemon.info hostapd: wlan0-1: STA CLIENT2 WPA: pairwise key handshake completed (RSN)
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: wlan0: DFS-RADAR-DETECTED freq=5600 ht_enabled=1 chan_offset=-1 chan_width=2 cf1=5590 cf2=0
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: dfs_downgrade_bandwidth: no DFS channels left, waiting for NOP to finish
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: wlan0: AP-DISABLED
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: wlan0: AP-STA-DISCONNECTED CLIENT3
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED CLIENT2
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: wlan0-1: AP-STA-DISCONNECTED CLIENT4
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.334834] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.334881] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.339606] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.347027] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.353777] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.360092] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.365684] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.373007] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.379167] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.386084] ath10k_pci 0000:01:00.0: no vif for vdev_id 1 found
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.392551] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 1
Wed Dec 22 18:17:49 2021 daemon.notice netifd: Network device 'wlan0-1' link is down
Wed Dec 22 18:17:49 2021 daemon.notice netifd: Interface 'guest5g' has link connectivity loss
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.397527] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 1
Wed Dec 22 18:17:49 2021 daemon.notice netifd: Interface 'guest5g' is now down
Wed Dec 22 18:17:49 2021 daemon.notice netifd: Interface 'guest5g' is disabled
Wed Dec 22 18:17:49 2021 daemon.warn odhcpd[1426]: No network(s) available on guest5g
Wed Dec 22 18:17:49 2021 daemon.err odhcpd[1426]: setsockopt(IPV6_ADD_MEMBERSHIP): No such device
Wed Dec 22 18:17:49 2021 daemon.err odhcpd[1426]: setsockopt(SO_BINDTODEVICE): No such device
Wed Dec 22 18:17:49 2021 daemon.err odhcpd[1426]: setsockopt(SO_BINDTODEVICE): No such device
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Wed Dec 22 18:17:49 2021 kern.info kernel: [40956.524321] device wlan0 left promiscuous mode
Wed Dec 22 18:17:49 2021 kern.info kernel: [40956.524424] br-lan: port 2(wlan0) entered disabled state
Wed Dec 22 18:17:49 2021 kern.info kernel: [40956.586620] ath10k_pci 0000:01:00.0: mac flush null vif, drop 0 queues 0xffff
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.587518] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
Wed Dec 22 18:17:49 2021 kern.warn kernel: [40956.592851] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
Wed Dec 22 18:17:49 2021 daemon.notice netifd: Network device 'wlan0' link is down
Wed Dec 22 18:17:49 2021 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Wed Dec 22 18:17:55 2021 kern.warn kernel: [40962.611194] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
Wed Dec 22 18:17:55 2021 kern.warn kernel: [40962.611220] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
Wed Dec 22 18:17:55 2021 kern.info kernel: [40962.693264] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
Wed Dec 22 18:17:55 2021 kern.info kernel: [40962.694114] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
Wed Dec 22 18:17:56 2021 daemon.err odhcpd[1426]: Failed to send to ff02::1%guest5g@wlan0-1 (Bad file descriptor)
Wed Dec 22 18:17:56 2021 kern.info kernel: [40963.077855] ath10k_pci 0000:01:00.0: rts threshold -1
Wed Dec 22 18:17:56 2021 kern.warn kernel: [40963.083063] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
Wed Dec 22 18:17:56 2021 kern.info kernel: [40963.088320] br-lan: port 2(wlan0) entered blocking state
Wed Dec 22 18:17:56 2021 kern.info kernel: [40963.093004] br-lan: port 2(wlan0) entered disabled state
Wed Dec 22 18:17:56 2021 kern.info kernel: [40963.098894] device wlan0 entered promiscuous mode
Wed Dec 22 18:17:56 2021 daemon.notice hostapd: wlan0: interface state DISABLED->COUNTRY_UPDATE
Wed Dec 22 18:17:56 2021 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
Wed Dec 22 18:17:56 2021 daemon.err hostapd: could not get valid channel
Wed Dec 22 18:17:56 2021 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Wed Dec 22 18:26:55 2021 daemon.err odhcpd[1426]: Failed to send to ff02::1%guest5g@wlan0-1 (Bad file descriptor)
Wed Dec 22 18:31:20 2021 daemon.err uhttpd[2086]: luci: accepted login on / for root from 192.168.1.145
Kernel Log
[ 2185.875994] ath10k_pci 0000:01:00.0: Invalid peer id 1 or peer stats buffer, peer: be4781d6 sta: 00000000
[ 2288.859972] ath10k_pci 0000:01:00.0: Invalid VHT mcs 15 peer stats
[40956.334834] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
[40956.334881] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
[40956.339606] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
[40956.347027] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
[40956.353777] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
[40956.360092] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
[40956.365684] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
[40956.373007] ath10k_pci 0000:01:00.0: received addba event for invalid vdev_id: 1
[40956.379167] ath10k_pci 0000:01:00.0: No VIF found for vdev 1
[40956.386084] ath10k_pci 0000:01:00.0: no vif for vdev_id 1 found
[40956.392551] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 1
[40956.397527] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 1
[40956.524321] device wlan0 left promiscuous mode
[40956.524424] br-lan: port 2(wlan0) entered disabled state
[40956.586620] ath10k_pci 0000:01:00.0: mac flush null vif, drop 0 queues 0xffff
[40956.587518] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
[40956.592851] ath10k_pci 0000:01:00.0: peer-unmap-event: unknown peer id 0
[40962.611194] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
[40962.611220] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
[40962.693264] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
[40962.694114] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13156 sram: 11224'
[40963.077855] ath10k_pci 0000:01:00.0: rts threshold -1
[40963.083063] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
[40963.088320] br-lan: port 2(wlan0) entered blocking state
[40963.093004] br-lan: port 2(wlan0) entered disabled state
[40963.098894] device wlan0 entered promiscuous mode
Addendum: About 30 minutes later radio starts again on the very same channel it first "detected radar" and gone into NOP. But that doesn't work long....seem related to an virtual AP created and perhaps to the numbers of stations connected. Not many in my case. Two seems to be no problem but three or four and trouble starts
daemon.warn odhcpd[1453]: No DHCP range available on guest5g