WiFi scan while connected

Does the NCS stack + nRF7002 support scanning while connected? I would expect it could, to support handoff, but getting errors.

Using nRF7002-DK and NCS 2.8.0.

Compile the wifi/shell example for nrf7002dk/nrf5340/cpuapp, no other changes.

*** Booting nRF Connect SDK v2.8.0-a2386bfc8401 ***
*** Using Zephyr OS v3.7.99-0bc3393fb112 ***
Starting nrf7002dk with CPU frequency: 128 MHz
[00:00:00.532,226] <inf> wifi_supplicant: wpa_supplicant initialized


uart:~$ wifi connect -s Hizzulon <my AP credentials>
Connection requested
Connected
[00:00:19.725,433] <inf> wpa_supp: MBO: Disable MBO/OCE due to misbehaving AP not having enabled PMF
[00:00:19.726,226] <inf> wpa_supp: wlan0: SME: Trying to authenticate with fc:34:97:af:71:54 (SSID='Hizzulon' freq=5220 MHz)
[00:00:20.086,120] <inf> wpa_supp: wlan0: Trying to associate with fc:34:97:af:71:54 (SSID='Hizzulon' freq=5220 MHz)
[00:00:20.102,874] <inf> wpa_supp: wlan0: Associated with fc:34:97:af:71:54
[00:00:20.103,027] <inf> wpa_supp: MBO: Disable MBO/OCE due to misbehaving AP not having enabled PMF
[00:00:20.103,118] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
[00:00:20.122,253] <inf> wpa_supp: wlan0: WPA: Key negotiation completed with fc:34:97:af:71:54 [PTK=CCMP GTK=CCMP]
[00:00:20.122,467] <inf> wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to fc:34:97:af:71:54 completed [id=0 id_str=]
[00:00:20.137,420] <inf> net_dhcpv4: Received: 192.168.1.203


uart:~$ wifi status
Status: successful
==================
State: COMPLETED
Interface Mode: STATION
Link Mode: WIFI 6 (802.11ax/HE)
SSID: Hizzulon
BSSID: FC:34:97:AF:71:54
Band: 5GHz
Channel: 44
Security: WPA2-PSK
MFP: Optional
RSSI: -34
Beacon Interval: 100
DTIM: 1
TWT: Supported
Current PHY rate : 26000


uart:~$ wifi scan
Scan requested

[wait ~30 seconds]


Scan request failed (-116)

[wait another ~30 seconds]


[00:01:33.363,311] <err> wifi_nrf: nrf_wifi_fmac_chg_vif_state: RPU is unresponsive for 10 sec
[00:01:33.363,342] <err> wifi_nrf: nrf_wifi_if_stop_zep: nrf_wifi_fmac_chg_vif_state failed
[00:01:33.364,013] <inf> wifi_supplicant: Network interface 1 (0x200013c0) down
[00:01:33.375,396] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
[00:01:33.375,854] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
[00:01:35.533,050] <inf> wifi_supplicant: Network interface 1 (0x200013c0) up
uart:~$ wifi status
Status: successful
==================
State: DISCONNECTED
uart:~$ 

So the scan fails, but later there's another error that looks like the low-level nRF7002 driver failing and recovering (CONFIG_NRF_WIFI_RPU_RECOVERY is enabled by default).

If scan while connected isn't a supported feature, I would expect it to error immediately, not get into a state where it drops the connection?

A probably related issue: if I issue "wifi connect" with invalid credentials, wifi status is "SCANNING" forever (certainly much longer than the 30 second scan timeout), and later connect requests fail with:

uart:~$ wifi connect <credentials>
Connection requested
[00:01:58.298,828] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
[00:01:58.302,124] <inf> wpa_supp: wlan0: Reject scan trigger since one is already pending
[00:01:58.302,246] <wrn> wpa_supp: wlan0: Failed to initiate AP scan
[00:01:58.304,992] <inf> wpa_supp: wlan0: Reject scan trigger since one is already pending
[00:01:58.305,114] <wrn> wpa_supp: wlan0: Failed to initiate AP scan

I need to explicitly do "wifi disconnect" before it will stop scanning and allow another connection. Normally, issuing a connect command while already connected disconnects automatically then initiates the new connection.

Parents
  • Hi Remi

    So we have now started investigating this, and to try getting some more debug data, could you please try the following:

    1. Connect to the 2.4GHz band and try scanning for 2.4GHz and then 5GHz APs while connected there to see if the scan is the problem in whichever the connected band is or strictly related to the 5GHz band? This should help narrow down the possibilities

    2. Connect to the 5GHz band and try scanning on all channels excluding the specific connected channel. From your logs it seems like the DK is connected at channel 44 here, so you can try scanning on the 5GHz band (except channel 44) with the following command:
    wifi scan -b 5 -c 5:36,40,48,52,56,60,64,68,96,100,104,108,112,116,120,124,128,132,136,140,144,149,153,157,161,165`

    Note that you will need to increase the operating channels to 50 in build time for this, by setting -DCONFIG_WIFI_MGMT_SCAN_CHAN_MAX_MANUAL = 50 in your Kconfig fragments.

    Best regards,

    Simon

Reply
  • Hi Remi

    So we have now started investigating this, and to try getting some more debug data, could you please try the following:

    1. Connect to the 2.4GHz band and try scanning for 2.4GHz and then 5GHz APs while connected there to see if the scan is the problem in whichever the connected band is or strictly related to the 5GHz band? This should help narrow down the possibilities

    2. Connect to the 5GHz band and try scanning on all channels excluding the specific connected channel. From your logs it seems like the DK is connected at channel 44 here, so you can try scanning on the 5GHz band (except channel 44) with the following command:
    wifi scan -b 5 -c 5:36,40,48,52,56,60,64,68,96,100,104,108,112,116,120,124,128,132,136,140,144,149,153,157,161,165`

    Note that you will need to increase the operating channels to 50 in build time for this, by setting -DCONFIG_WIFI_MGMT_SCAN_CHAN_MAX_MANUAL = 50 in your Kconfig fragments.

    Best regards,

    Simon

Children
  • Second test first: connect to the 5GHz AP and limit the channel scanning:

    uart:~$ wifi scan -b 5
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Hizzulon 8 | 44 (5GHz ) | -54 | WPA2-PSK | FC:34:97:AF:71:34 | Disable
    2 | 0 | 161 (5GHz ) | -64 | WPA2-PSK | FC:34:97:AF:71:38 | Disable
    3 | 0 | 161 (5GHz ) | -65 | WPA2-PSK | BA:34:97:AF:71:3D | Disable
    4 | DIRECT-roku-45P-0E44CB 22 | 44 (5GHz ) | -86 | WPA2-PSK | 22:EF:BD:34:5E:DF | Disable
    Scan request done


    uart:~$ wifi connect -s Hizzulon <credentials>
    Connection requested
    Connected
    [00:00:37.407,592] <inf> wpa_supp: wlan0: SME: Trying to authenticate with fc:34:97:af:71:34 (SSID='Hizzulon' freq=5220 MHz)
    [00:00:37.767,456] <inf> wpa_supp: wlan0: Trying to associate with fc:34:97:af:71:34 (SSID='Hizzulon' freq=5220 MHz)
    [00:00:37.784,240] <inf> wpa_supp: wlan0: Associated with fc:34:97:af:71:34
    [00:00:37.784,423] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    [00:00:37.802,429] <inf> wpa_supp: wlan0: WPA: Key negotiation completed with fc:34:97:af:71:34 [PTK=CCMP GTK=CCMP]
    [00:00:37.802,642] <inf> wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to fc:34:97:af:71:34 completed [id=0 id_str=]
    [00:00:37.813,659] <inf> net_dhcpv4: Received: 192.168.1.237


    uart:~$ wifi scan -b 5 -c 5:36,40,48,52,56,60,64,68,96,100,104,108,112,116,120,124,128,132,136,140,144,149,153,157,161,165
    Scan requested
    Scan request failed (-116)
    [00:02:11.144,927] <err> wifi_nrf: nrf_wifi_fmac_chg_vif_state: RPU is unresponsive for 10 sec
    [00:02:11.144,927] <err> wifi_nrf: nrf_wifi_if_stop_zep: nrf_wifi_fmac_chg_vif_state failed
    [00:02:11.145,629] <inf> wifi_supplicant: Network interface 1 (0x200013c0) down
    [00:02:11.157,012] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:02:11.157,379] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:02:13.314,422] <inf> wifi_supplicant: Network interface 1 (0x200013c0) up

    So it's failing on the scan, even with the AP channel 44 excluded.

    I tried the channels individually, e.g. "wifi scan -b 5 -c 4:40", including ones listed in valid_5g_chans_20mhz, like 169. I tried them all ((including 44), but not all are listed here, just some interesting ones (this was done after a reset and a new connection, like all tests):

    uart:~$ wifi scan -b 5 -c 5:40
    Scan requested
    Scan request done


    uart:~$ wifi scan -b 5 -c 5:44
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Hizzulon 8 | 44 (5GHz ) | -54 | WPA2-PSK | FC:34:97:AF:71:34 | Disable
    2 | 0 | 44 (5GHz ) | -85 | WPA2-PSK | 22:EF:BD:34:5E:DF | Disable
    Scan request done


    uart:~$ wifi scan -b 5 -c 5:48
    Scan requested
    Scan request done


    uart:~$ wifi scan -b 5 -c 5:161
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | 0 | 161 (5GHz ) | -65 | WPA2-PSK | FC:34:97:AF:71:38 | Disable
    2 | 0 | 161 (5GHz ) | -66 | WPA2-PSK | BA:34:97:AF:71:3D | Disable
    Scan request done


    uart:~$ wifi scan -b 5 -c 5:165
    Scan requested
    Scan request failed (-116)
    [00:02:33.109,252] <err> wifi_nrf: nrf_wifi_fmac_chg_vif_state: RPU is unresponsive for 10 sec
    [00:02:33.109,252] <err> wifi_nrf: nrf_wifi_if_stop_zep: nrf_wifi_fmac_chg_vif_state failed
    [00:02:33.109,924] <inf> wifi_supplicant: Network interface 1 (0x200013c0) down
    [00:02:33.121,337] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:02:33.121,673] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:02:35.278,839] <inf> wifi_supplicant: Network interface 1 (0x200013c0) up

    It's only channel 165 that fails. Even adjacent channels, like 163 and 167, are fine. 

    There were no networks on channels other than 44 and 161 in the initial scan, so not sure what the relationship with 165 is.

    On to the first test. As I mentioned, the nRF7002 is unable to connect to my 2.4GHz AP (Asus ZenWiFi AX, with the latest firmware), so I enabled a hotspot on my laptop (with an Intel Wi-Fi 6 AX301) at either 2.4GHz or 5GHz, shown in these scans as "Laptop".

    uart:~$ wifi scan
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Laptop 6 | 44 (5GHz ) | -36 | WPA2-PSK | 8A:D8:2E:2D:24:90 | Disable
    2 | Hizzulon2 9 | 7 (2.4GHz) | -52 | WPA2-PSK | FC:34:97:AF:71:30 | Disable
    3 | Hizzulon 8 | 44 (5GHz ) | -53 | WPA2-PSK | FC:34:97:AF:71:34 | Disable
    4 | 0 | 161 (5GHz ) | -66 | WPA2-PSK | BA:34:97:AF:71:3D | Disable
    5 | 0 | 161 (5GHz ) | -66 | WPA2-PSK | FC:34:97:AF:71:38 | Disable
    6 | Padres19 8 | 10 (2.4GHz) | -83 | WPA2-PSK | BC:9A:8E:33:9A:74 | Optional
    7 | ATT8H862E9 10 | 2 (2.4GHz) | -85 | WPA2-PSK | 90:9D:7D:60:6A:90 | Optional
    8 | c67a96cd 8 | 1 (2.4GHz) | -85 | WPA2-PSK | 50:2C:C6:7A:96:CD | Disable
    9 | TP-Link_Extender 16 | 2 (2.4GHz) | -87 | OPEN | A8:6E:84:13:F7:66 | Disable
    10 | 0 | 44 (5GHz ) | -88 | WPA2-PSK | 22:EF:BD:34:5E:DF | Disable
    11 | DIRECT-AA-HP OfficeJet 4650 27 | 2 (2.4GHz) | -88 | WPA2-PSK | 48:BA:4E:A5:13:AB | Disable
    12 | ATT5ffDcTA 10 | 1 (2.4GHz) | -89 | WPA2-PSK | 74:8A:0D:86:7F:D0 | Optional
    13 | ATT_kleefeld_internet 21 | 6 (2.4GHz) | -90 | WPA2-PSK | E0:1F:2B:68:7F:64 | Optional
    14 | ATTxxJqgs2 10 | 1 (2.4GHz) | -92 | WPA2-PSK | 10:C4:CA:DA:EF:E4 | Optional
    15 | ATTkuv7HS2 10 | 8 (2.4GHz) | -92 | WPA2-PSK | 58:60:D8:7C:DD:30 | Optional
    Scan request done


    uart:~$ wifi connect -s Laptop <credentials>
    Connection requested
    Connected
    [00:00:36.527,923] <inf> wpa_supp: wlan0: SME: Trying to authenticate with 8a:d8:2e:2d:24:90 (SSID='Laptop' freq=5220 MHz)
    [00:00:36.888,000] <inf> wpa_supp: wlan0: Trying to associate with 8a:d8:2e:2d:24:90 (SSID='Laptop' freq=5220 MHz)
    [00:00:36.904,815] <inf> wpa_supp: wlan0: Associated with 8a:d8:2e:2d:24:90
    [00:00:36.904,998] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    [00:00:36.920,898] <inf> wpa_supp: wlan0: WPA: Key negotiation completed with 8a:d8:2e:2d:24:90 [PTK=CCMP GTK=CCMP]
    [00:00:36.921,112] <inf> wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to 8a:d8:2e:2d:24:90 completed [id=0 id_str=]
    [00:00:36.955,657] <inf> net_dhcpv4: Received: 192.168.137.6

    uart:~$ wifi status
    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 5 (802.11ac/VHT)
    SSID: Laptop
    BSSID: 8A:D8:2E:2D:24:90
    Band: 5GHz
    Channel: 44
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -37
    Beacon Interval: 100
    DTIM: 3
    TWT: Not supported
    Current PHY rate : 39000


    uart:~$ wifi scan -b 5
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Laptop 6 | 44 (5GHz ) | -35 | WPA2-PSK | 8A:D8:2E:2D:24:90 | Disable
    2 | Hizzulon 8 | 44 (5GHz ) | -52 | WPA2-PSK | FC:34:97:AF:71:34 | Disable
    3 | 0 | 44 (5GHz ) | -86 | WPA2-PSK | 22:EF:BD:34:5E:DF | Disable
    Scan request done

    Scanning works when connected to the laptop hotspot. Same channel 44 as the "Hizzulon" hotspot.

    Repeated the test with connected to laptop hotspot at 2.4GHz:

    uart:~$ wifi scan
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Laptop 6 | 6 (2.4GHz) | -26 | WPA2-PSK | 8A:D8:2E:2D:24:90 | Disable
    2 | Hizzulon2 9 | 7 (2.4GHz) | -51 | WPA2-PSK | FC:34:97:AF:71:30 | Disable
    3 | Hizzulon 8 | 44 (5GHz ) | -55 | WPA2-PSK | FC:34:97:AF:71:34 | Disable
    4 | 0 | 161 (5GHz ) | -66 | WPA2-PSK | BA:34:97:AF:71:3D | Disable
    5 | 0 | 161 (5GHz ) | -66 | WPA2-PSK | FC:34:97:AF:71:38 | Disable
    6 | Padres19 8 | 10 (2.4GHz) | -85 | WPA2-PSK | BC:9A:8E:33:9A:74 | Optional
    7 | DIRECT-AA-HP OfficeJet 4650 27 | 2 (2.4GHz) | -85 | WPA2-PSK | 48:BA:4E:A5:13:AB | Disable
    8 | MySpectrumWiFiD9-2G 19 | 11 (2.4GHz) | -88 | WPA2-PSK | C8:B4:22:2A:13:D7 | Disable
    9 | 0 | 11 (2.4GHz) | -88 | WPA2-PSK | 7A:83:C2:03:48:A8 | Disable
    10 | c67a96cd 8 | 1 (2.4GHz) | -88 | WPA2-PSK | 50:2C:C6:7A:96:CD | Disable
    11 | 0 | 44 (5GHz ) | -89 | WPA2-PSK | 22:EF:BD:34:5E:DF | Disable
    12 | ATT5cs7fRv_Guest 16 | 6 (2.4GHz) | -92 | WPA2-PSK | C2:BD:13:3B:A3:2A | Optional
    13 | ATT3d6b9X2 10 | 1 (2.4GHz) | -92 | WPA-PSK | 44:E1:37:C7:31:A0 | Disable
    14 | CocktailClub 12 | 6 (2.4GHz) | -93 | WPA2-PSK | A0:2D:13:3B:A3:29 | Disable
    Scan request done


    uart:~$ wifi connect -s Laptop <credentials>
    Connection requested
    Connected
    [00:00:36.011,840] <inf> wpa_supp: wlan0: SME: Trying to authenticate with 8a:d8:2e:2d:24:90 (SSID='Laptop' freq=2437 MHz)
    [00:00:36.404,815] <inf> wpa_supp: wlan0: Trying to associate with 8a:d8:2e:2d:24:90 (SSID='Laptop' freq=2437 MHz)
    [00:00:36.423,858] <inf> wpa_supp: wlan0: Associated with 8a:d8:2e:2d:24:90
    [00:00:36.424,041] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    [00:00:36.439,422] <inf> wpa_supp: wlan0: WPA: Key negotiation completed with 8a:d8:2e:2d:24:90 [PTK=CCMP GTK=CCMP]
    [00:00:36.439,636] <inf> wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to 8a:d8:2e:2d:24:90 completed [id=0 id_str=]
    [00:00:36.488,372] <inf> net_dhcpv4: Received: 192.168.137.18


    uart:~$ wifi status
    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 4 (802.11n/HT)
    SSID: Laptop
    BSSID: 8A:D8:2E:2D:24:90
    Band: 2.4GHz
    Channel: 6
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -27
    Beacon Interval: 100
    DTIM: 3
    TWT: Not supported
    Current PHY rate : 0


    uart:~$ wifi scan
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Laptop 6 | 6 (2.4GHz) | -24 | WPA2-PSK | 8A:D8:2E:2D:24:90 | Disable
    2 | Hizzulon 8 | 44 (5GHz ) | -51 | WPA2-PSK | FC:34:97:AF:71:34 | Disable
    3 | Hizzulon2 9 | 7 (2.4GHz) | -52 | WPA2-PSK | FC:34:97:AF:71:30 | Disable
    4 | Padres19 8 | 10 (2.4GHz) | -83 | WPA2-PSK | BC:9A:8E:33:9A:74 | Optional
    5 | ATT8H862E9 10 | 2 (2.4GHz) | -83 | WPA2-PSK | 90:9D:7D:60:6A:90 | Optional
    6 | DIRECT-AA-HP OfficeJet 4650 27 | 2 (2.4GHz) | -86 | WPA2-PSK | 48:BA:4E:A5:13:AB | Disable
    7 | c67a96cd 8 | 1 (2.4GHz) | -87 | WPA2-PSK | 50:2C:C6:7A:96:CD | Disable
    8 | ATTGIWU8Yu 10 | 6 (2.4GHz) | -91 | WPA2-PSK | CC:AB:2C:01:D8:34 | Optional
    9 | TP-Link_Extender 16 | 2 (2.4GHz) | -92 | OPEN | A8:6E:84:13:F7:66 | Disable
    10 | CocktailClub 12 | 6 (2.4GHz) | -92 | WPA2-PSK | A0:2D:13:3B:A3:29 | Disable
    11 | ATT_kleefeld_internet 21 | 6 (2.4GHz) | -92 | WPA2-PSK | E0:1F:2B:68:7F:64 | Optional
    12 | ATT5cs7fRv_Guest 16 | 6 (2.4GHz) | -92 | WPA2-PSK | C2:BD:13:3B:A3:2A | Optional
    Scan request done

    No surprises there, it also works with the laptop hotspot at 2.4GHz.

    I looked around for some other APs I could connect to and I have a Pixel8 which supports 2.4 and 5GHz hotspots, advertised as "Pixel" here. Also configured the Pixel8 hotspot to "WPA2-Personal" security instead of "WPA2/3 Personal" to make things closer.

    I powered off the "Hizzulon" AP so it would have no effect on these tests.

    uart:~$ wifi scan
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Pixel 5 | 161 (5GHz ) | -52 | WPA2-PSK | 2A:A7:8E:EE:67:70 | Optional
    2 | Pixel 5 | 7 (2.4GHz) | -52 | WPA2-PSK | 2A:58:71:EE:67:70 | Optional
    3 | DIRECT-roku-45P-0E44CB 22 | 44 (5GHz ) | -79 | WPA2-PSK | 22:EF:BD:34:5E:DF | Disable
    4 | Padres19 8 | 10 (2.4GHz) | -87 | WPA2-PSK | BC:9A:8E:33:9A:74 | Optional
    5 | Tims House 10 | 11 (2.4GHz) | -88 | WPA2-PSK | 90:D0:92:04:1B:84 | Optional
    Scan request done


    uart:~$ wifi connect -b 5 -s Pixel <credentials>
    Connection requested
    Connected
    [00:00:28.738,250] <inf> wpa_supp: wlan0: SME: Trying to authenticate with 2a:a7:8e:ee:67:70 (SSID='Pixel' freq=5805 MHz)
    [00:00:29.099,487] <inf> wpa_supp: wlan0: Trying to associate with 2a:a7:8e:ee:67:70 (SSID='Pixel' freq=5805 MHz)
    [00:00:29.115,875] <inf> wpa_supp: wlan0: Associated with 2a:a7:8e:ee:67:70
    [00:00:29.116,058] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    [00:00:29.224,578] <inf> wpa_supp: wlan0: WPA: Key negotiation completed with 2a:a7:8e:ee:67:70 [PTK=CCMP GTK=CCMP]
    [00:00:29.224,792] <inf> wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to 2a:a7:8e:ee:67:70 completed [id=0 id_str=]
    [00:00:29.259,307] <inf> net_dhcpv4: Received: 192.168.8.105


    uart:~$ wifi status
    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 6 (802.11ax/HE)
    SSID: Pixel
    BSSID: 2A:A7:8E:EE:67:70
    Band: 5GHz
    Channel: 161
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -55
    Beacon Interval: 100
    DTIM: 2
    TWT: Not supported
    Current PHY rate : 26000


    uart:~$ wifi scan -b 5 -c 5:165
    Scan requested
    Scan request failed (-116)
    [00:01:47.003,356] <err> wifi_nrf: nrf_wifi_fmac_chg_vif_state: RPU is unresponsive for 10 sec
    [00:01:47.003,356] <err> wifi_nrf: nrf_wifi_if_stop_zep: nrf_wifi_fmac_chg_vif_state failed
    [00:01:47.004,028] <inf> wifi_supplicant: Network interface 1 (0x200013c0) down
    [00:01:47.015,441] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:01:47.015,808] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:01:49.172,973] <inf> wifi_supplicant: Network interface 1 (0x200013c0) up

    Fails on channel 165, exactly the same as the original AP.

    Connecting at 2.4GHz:

    uart:~$ wifi scan
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Pixel 5 | 7 (2.4GHz) | -50 | WPA2-PSK | 2A:58:71:EE:67:70 | Optional
    2 | Pixel 5 | 161 (5GHz ) | -57 | WPA2-PSK | 2A:A7:8E:EE:67:70 | Optional
    3 | ATT5cs7fRv_Guest 16 | 1 (2.4GHz) | -81 | WPA2-PSK | 82:7D:13:64:CC:E6 | Optional
    4 | ATT8H862E9 10 | 2 (2.4GHz) | -83 | WPA2-PSK | 90:9D:7D:60:6A:90 | Optional
    5 | CocktailClub 12 | 1 (2.4GHz) | -83 | WPA2-PSK | A0:2D:13:64:CC:E5 | Disable
    6 | Padres19 8 | 10 (2.4GHz) | -84 | WPA2-PSK | BC:9A:8E:33:9A:74 | Optional
    7 | DIRECT-AA-HP OfficeJet 4650 27 | 2 (2.4GHz) | -86 | WPA2-PSK | 48:BA:4E:A5:13:AB | Disable
    8 | ATT7zYv8G7 10 | 1 (2.4GHz) | -87 | WPA2-PSK | 10:C4:CA:3D:C1:94 | Optional
    9 | ATTxxJqgs2 10 | 1 (2.4GHz) | -87 | WPA2-PSK | 10:C4:CA:DA:EF:E4 | Optional
    10 | MySpectrumWiFiD9-2G 19 | 11 (2.4GHz) | -88 | WPA2-PSK | C8:B4:22:2A:13:D7 | Disable
    11 | c67a96cd 8 | 1 (2.4GHz) | -90 | WPA2-PSK | 50:2C:C6:7A:96:CD | Disable
    12 | ATTkuv7HS2 10 | 8 (2.4GHz) | -91 | WPA2-PSK | 58:60:D8:7C:DD:30 | Optional
    Scan request done


    uart:~$ wifi connect -b 2 -s Pixel <credentials>
    Connection requested
    [00:00:29.379,577] <inf> wpa_supp: wlan0: SME: Trying to authenticate with 2a:58:71:ee:67:70 (SSID='Pixel' freq=2442 MHz)
    [00:00:29.759,582] <inf> wpa_supp: wlan0: Trying to associate with 2a:58:71:ee:67:70 (SSID='Pixel' freq=2442 MHz)
    [00:00:29.788,360] <inf> wpa_supp: wlan0: Associated with 2a:58:71:ee:67:70
    [00:00:29.788,513] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    Connected
    [00:00:39.788,665] <inf> wpa_supp: wlan0: Authentication with 2a:58:71:ee:67:70 timed out.
    [00:00:39.791,076] <inf> wpa_supp: wlan0: CTRL-EVENT-DISCONNECTED bssid=2a:58:71:ee:67:70 reason=3 locally_generated=1
    [00:00:39.791,320] <inf> wpa_supp: BSSID 2a:58:71:ee:67:70 ignore list count incremented to 2, ignoring for 10 seconds
    [00:00:39.795,471] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    Connected
    [00:00:40.857,269] <inf> wpa_supp: wlan0: SME: Trying to authenticate with 2a:58:71:ee:67:70 (SSID='Pixel' freq=2442 MHz)
    [00:00:40.866,729] <inf> wpa_supp: wlan0: Trying to associate with 2a:58:71:ee:67:70 (SSID='Pixel' freq=2442 MHz)
    [00:00:40.886,779] <inf> wpa_supp: wlan0: Associated with 2a:58:71:ee:67:70
    [00:00:40.886,962] <inf> wpa_supp: wlan0: CTRL-EVENT-SUBNET-STATUS-UPDATE status=0
    [00:00:40.949,279] <inf> wpa_supp: wlan0: WPA: Key negotiation completed with 2a:58:71:ee:67:70 [PTK=CCMP GTK=CCMP]
    [00:00:40.949,493] <inf> wpa_supp: wlan0: CTRL-EVENT-CONNECTED - Connection to 2a:58:71:ee:67:70 completed [id=0 id_str=]
    [00:00:40.996,215] <inf> net_dhcpv4: Received: 192.168.8.105


    uart:~$ wifi status
    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 6 (802.11ax/HE)
    SSID: Pixel
    BSSID: 2A:58:71:EE:67:70
    Band: 2.4GHz
    Channel: 7
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -53
    Beacon Interval: 100
    DTIM: 2
    TWT: Not supported
    Current PHY rate : 0


    uart:~$ wifi scan -b 5 -t passive
    Scan requested

    Num | SSID (len) | Chan (Band) | RSSI | Security | BSSID | MFP
    1 | Pixel 5 | 161 (5GHz ) | -54 | WPA2-PSK | 2A:A7:8E:EE:67:70 | Optional
    Scan request done


    uart:~$ wifi scan -b 5 -c 5:165
    Scan requested
    Scan request failed (-116)
    [00:02:16.802,520] <err> wifi_nrf: nrf_wifi_fmac_chg_vif_state: RPU is unresponsive for 10 sec
    [00:02:16.802,520] <err> wifi_nrf: nrf_wifi_if_stop_zep: nrf_wifi_fmac_chg_vif_state failed
    [00:02:16.803,222] <inf> wifi_supplicant: Network interface 1 (0x200013c0) down
    [00:02:16.814,605] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:02:16.814,971] <inf> wpa_supp: wlan0: CTRL-EVENT-DSCP-POLICY clear_all
    [00:02:18.972,045] <inf> wifi_supplicant: Network interface 1 (0x200013c0) up

    When connected at 2.4GHz, it still fails when scanning channel 165.

    Also note the timeout and reconnection. I repeated the test several times and got it each time, though it quickly reconnected. Not sure if that's an issue with the Pixel8 or the nRF7002.

    I tried with my iPhone SE 2nd gen, which only supports 2.4GHz hotspot, and wasn't able to connect to that. It might have been something with WPA3 (I did use -k 3), but suspicious that I'm not able to connect to either my AP or the iPhone at 2.4GHz. That's a separate issue.

    So in summary: scanning fails with both my AP and a Pixel8 hotspot on channel 165 whether connected to 2.4GHz or 5GHz, but works with my laptop hotspot connected at either 2.4 or 5GHz.

    Pasting the various wifi status again here:

    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 6 (802.11ax/HE)
    SSID: Hizzulon
    BSSID: FC:34:97:AF:71:34
    Band: 5GHz
    Channel: 44
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -53
    Beacon Interval: 100
    DTIM: 1
    TWT: Supported
    Current PHY rate : 26000


    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 5 (802.11ac/VHT)
    SSID: Laptop
    BSSID: 8A:D8:2E:2D:24:90
    Band: 5GHz
    Channel: 44
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -37
    Beacon Interval: 100
    DTIM: 3
    TWT: Not supported
    Current PHY rate : 39000

    Status: successful
    ==================
    State: COMPLETED
    Interface Mode: STATION
    Link Mode: WIFI 6 (802.11ax/HE)
    SSID: Pixel
    BSSID: 2A:A7:8E:EE:67:70
    Band: 5GHz
    Channel: 161
    Security: WPA2-PSK
    MFP: Optional
    RSSI: -55
    Beacon Interval: 100
    DTIM: 2
    TWT: Not supported
    Current PHY rate : 26000

    Similar parameters. AP and Pixel have different channels, I'm not able to assign the AP to any arbitrary channel but did try channel 48 and same failure. AP and laptop have same channel 44, AP fails but laptop works. Notable is that the Link Mode is WIFI 5 for Laptop, which works, so maybe something with wifi 6 mode?

    If you have access to a Pixel8 (possibly other Android phones also), you should be able to reproduce these results.

Related