You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Error is marked below. Start of DFS scan failed. Worked fine in stable 19.07.7
Sat Mar 13 13:56:02 2021 daemon.notice netifd: Network device 'tap_vpn' link is up
Sat Mar 13 13:56:02 2021 daemon.notice netifd: Interface 'VPN' has link connectivity
Sat Mar 13 13:56:02 2021 daemon.debug dnsmasq[3234]: stopped listening on ifb4eth0.2(#17): fe80::446d:ecff:fe53:d19d port 53
Sat Mar 13 13:56:02 2021 daemon.debug dnsmasq[3234]: listening on tap_vpn(#21): 192.168.177.6 port 53
Sat Mar 13 13:56:02 2021 kern.info kernel: [ 46.882314] br-lan: port 4(wlan1) entered blocking state
Sat Mar 13 13:56:02 2021 kern.info kernel: [ 46.882341] br-lan: port 4(wlan1) entered disabled state
Sat Mar 13 13:56:02 2021 kern.info kernel: [ 46.887211] device wlan1 entered promiscuous mode
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ACS
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan1: ACS-STARTED
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5180 chan=36 sec_chan=1, width=2, seg0=50, seg1=0, cac_time=60s Sat Mar 13 13:56:02 2021 daemon.err hostapd: DFS start_dfs_cac() failed, -1
Sat Mar 13 13:56:02 2021 daemon.err hostapd: Interface initialization failed
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: interface state DFS->DISABLED
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: AP-DISABLED
Sat Mar 13 13:56:02 2021 user.notice SQM: Starting SQM script: piece_of_cake.qos on eth0.2, in: 52000 Kbps, out: 34000 Kbps
Sat Mar 13 13:56:03 2021 daemon.debug dnsmasq[3234]: listening on ifb4eth0.2(#24): fe80::60be:29ff:fe04:e719%ifb4eth0.2 port 53
Sat Mar 13 13:56:04 2021 daemon.debug dnsmasq[3234]: listening on tap_vpn(#21): fe80::5c10:4cff:fe75:60f9%tap_vpn port 53
The text was updated successfully, but these errors were encountered:
NilsRo:
Error is marked below. Start of DFS scan failed. Worked fine in stable 19.07.7
Sat Mar 13 13:56:02 2021 daemon.notice netifd: Network device 'tap_vpn' link is up
Sat Mar 13 13:56:02 2021 daemon.notice netifd: Interface 'VPN' has link connectivity
Sat Mar 13 13:56:02 2021 daemon.debug dnsmasq[3234]: stopped listening on ifb4eth0.2(#17): fe80::446d:ecff:fe53:d19d port 53
Sat Mar 13 13:56:02 2021 daemon.debug dnsmasq[3234]: listening on tap_vpn(#21): 192.168.177.6 port 53
Sat Mar 13 13:56:02 2021 kern.info kernel: [ 46.882314] br-lan: port 4(wlan1) entered blocking state
Sat Mar 13 13:56:02 2021 kern.info kernel: [ 46.882341] br-lan: port 4(wlan1) entered disabled state
Sat Mar 13 13:56:02 2021 kern.info kernel: [ 46.887211] device wlan1 entered promiscuous mode
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: ACS: Automatic channel selection started, this may take a bit
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->ACS
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan1: ACS-STARTED
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: interface state HT_SCAN->DFS
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: DFS-CAC-START freq=5180 chan=36 sec_chan=1, width=2, seg0=50, seg1=0, cac_time=60s
Sat Mar 13 13:56:02 2021 daemon.err hostapd: DFS start_dfs_cac() failed, -1
Sat Mar 13 13:56:02 2021 daemon.err hostapd: Interface initialization failed
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: interface state DFS->DISABLED
Sat Mar 13 13:56:02 2021 daemon.notice hostapd: wlan0: AP-DISABLED
Sat Mar 13 13:56:02 2021 user.notice SQM: Starting SQM script: piece_of_cake.qos on eth0.2, in: 52000 Kbps, out: 34000 Kbps
Sat Mar 13 13:56:03 2021 daemon.debug dnsmasq[3234]: listening on ifb4eth0.2(#24): fe80::60be:29ff:fe04:e719%ifb4eth0.2 port 53
Sat Mar 13 13:56:04 2021 daemon.debug dnsmasq[3234]: listening on tap_vpn(#21): fe80::5c10:4cff:fe75:60f9%tap_vpn port 53
The text was updated successfully, but these errors were encountered: