Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIFI STA and AP Connection Issue (SDK 5.3.2) (IDFGH-14297) #15088

Open
3 tasks done
varram-bdh opened this issue Dec 24, 2024 · 4 comments
Open
3 tasks done

WIFI STA and AP Connection Issue (SDK 5.3.2) (IDFGH-14297) #15088

varram-bdh opened this issue Dec 24, 2024 · 4 comments
Assignees
Labels
Status: Opened Issue is new Type: Bug bugs in IDF

Comments

@varram-bdh
Copy link

Answers checklist.

  • I have read the documentation ESP-IDF Programming Guide and the issue is not addressed there.
  • I have updated my IDF branch (master or release) to the latest version and checked that the issue is present there.
  • I have searched the issue tracker for a similar issue and not found a similar issue.

IDF version.

V5.3.2

Espressif SoC revision.

ESP32-WROOM-32

Operating System used.

Windows

How did you build your project?

VS Code IDE

If you are using Windows, please specify command line type.

PowerShell

Development Kit.

ESP32-WROOM-32

Power Supply used.

External 3.3V

What is the expected behavior?

There is an issue with connecting in STATION mode to a specific AP.

Currently, there are no problems with other APs except for this particular one. While the AP itself might be suspected, all other devices I own, except for the ESP32, connect to the AP without any issues.
I don't think there is an issue with the AP itself.

Additionally, there are no problems when using programs developed with ESP32 SDK 3.x. However, the issue occurs with SDK 4.x and SDK 5.x.

The security protocol is WPA2-PSK with AES encryption.

What is the actual behavior?

Even when using the STA example program provided in SDK 5.3.2, the same issue occurs.
Path: v5.3.2\esp-idf\examples\wifi\getting_started\station

Additionally, the connection issue persists even when using the AT COMMAND method.

Steps to reproduce.

  1. The issue occurs in my application
  2. Using the STATION example from SDK 5.3.2 - the same issue occurs.
  3. Using the AT COMMAND method with the BIN file - the same issue occurs.
    ...

Debug Logs.

rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
configsip: 0, SPIWP:0xee
clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
mode:DIO, clock div:2
load:0x3fff0030,len:7176
load:0x40078000,len:15564
ho 0 tail 12 room 4
load:0x40080400,len:4
load:0x40080404,len:3904
entry 0x40080640
I (31) boot: ESP-IDF v5.3.2-dirty 2nd stage bootloader
I (31) boot: compile time Dec 24 2024 11:37:25
I (31) boot: Multicore bootloader
I (36) boot: chip revision: v3.1
I (40) boot.esp32: SPI Speed      : 40MHz
I (44) boot.esp32: SPI Mode       : DIO
I (49) boot.esp32: SPI Flash Size : 2MB
I (53) boot: Enabling RNG early entropy source...
I (59) boot: Partition Table:
I (62) boot: ## Label            Usage          Type ST Offset   Length
I (70) boot:  0 nvs              WiFi data        01 02 00009000 00006000
I (77) boot:  1 phy_init         RF data          01 01 0000f000 00001000
I (85) boot:  2 factory          factory app      00 00 00010000 00100000
I (92) boot: End of partition table
I (96) esp_image: segment 0: paddr=00010020 vaddr=3f400020 size=1b664h (112228) map
I (143) esp_image: segment 1: paddr=0002b68c vaddr=3ffb0000 size=03f34h ( 16180) load
I (150) esp_image: segment 2: paddr=0002f5c8 vaddr=40080000 size=00a50h (  2640) load
I (151) esp_image: segment 3: paddr=00030020 vaddr=400d0020 size=79780h (497536) map
I (328) esp_image: segment 4: paddr=000a97a8 vaddr=40080a50 size=16c64h ( 93284) load
I (376) boot: Loaded app from partition at offset 0x10000
I (377) boot: Disabling RNG early entropy source...
I (389) cpu_start: Multicore app
D (389) cpu_start: Pro cpu up
D (389) cpu_start: Starting app cpu, entry point is 0x40081224
D (0) cpu_start: App cpu up
D (400) clk: RTC_SLOW_CLK calibration value: 2858074
D (412) cpu_start: calling init function: 0x400d1364 on core: 0
D (412) cpu_start: calling init function: 0x400d1864 on core: 0
I (414) cpu_start: Pro cpu start user code
I (419) cpu_start: cpu freq: 160000000 Hz
D (424) cpu_start: calling init function: 0x400d12a4 on core: 0
I (430) app_init: Application information:
I (434) app_init: Project name:     wifi_station
I (440) app_init: App version:      v5.3.2-dirty
I (445) app_init: Compile time:     Dec 24 2024 13:29:16
I (451) app_init: ELF file SHA256:  158ed4a10...
I (456) app_init: ESP-IDF:          v5.3.2-dirty
D (461) cpu_start: calling init function: 0x400d1378 on core: 0
I (467) efuse_init: Min chip rev:     v0.0
I (472) efuse_init: Max chip rev:     v3.99
I (477) efuse_init: Chip rev:         v3.1
D (482) cpu_start: calling init function: 0x400d305c on core: 0
D (488) memory_layout: Checking 9 reserved memory ranges:
D (493) memory_layout: Reserved memory range 0x3ff82000 - 0x3ff82000
D (500) memory_layout: Reserved memory range 0x3ffae000 - 0x3ffae6e0
D (506) memory_layout: Reserved memory range 0x3ffb0000 - 0x3ffb8150
D (513) memory_layout: Reserved memory range 0x3ffe0000 - 0x3ffe0440
D (519) memory_layout: Reserved memory range 0x3ffe3f20 - 0x3ffe4350
D (526) memory_layout: Reserved memory range 0x40070000 - 0x40078000
D (532) memory_layout: Reserved memory range 0x40078000 - 0x40080000
D (538) memory_layout: Reserved memory range 0x40080000 - 0x400976b4
D (545) memory_layout: Reserved memory range 0x50001fe8 - 0x50002000
D (551) memory_layout: Building list of available memory regions:
D (557) memory_layout: Available memory region 0x3ffae6e0 - 0x3ffb0000
D (564) memory_layout: Available memory region 0x3ffb8150 - 0x3ffc0000
D (571) memory_layout: Available memory region 0x3ffc0000 - 0x3ffc2000
D (577) memory_layout: Available memory region 0x3ffc2000 - 0x3ffc4000
D (584) memory_layout: Available memory region 0x3ffc4000 - 0x3ffc6000
D (590) memory_layout: Available memory region 0x3ffc6000 - 0x3ffc8000
D (597) memory_layout: Available memory region 0x3ffc8000 - 0x3ffca000
D (604) memory_layout: Available memory region 0x3ffca000 - 0x3ffcc000
D (610) memory_layout: Available memory region 0x3ffcc000 - 0x3ffce000
D (617) memory_layout: Available memory region 0x3ffce000 - 0x3ffd0000
D (623) memory_layout: Available memory region 0x3ffd0000 - 0x3ffd2000
D (630) memory_layout: Available memory region 0x3ffd2000 - 0x3ffd4000
D (637) memory_layout: Available memory region 0x3ffd4000 - 0x3ffd6000
D (643) memory_layout: Available memory region 0x3ffd6000 - 0x3ffd8000
D (650) memory_layout: Available memory region 0x3ffd8000 - 0x3ffda000
D (656) memory_layout: Available memory region 0x3ffda000 - 0x3ffdc000
D (663) memory_layout: Available memory region 0x3ffdc000 - 0x3ffde000
D (670) memory_layout: Available memory region 0x3ffde000 - 0x3ffe0000
D (676) memory_layout: Available memory region 0x3ffe0440 - 0x3ffe3f20
D (683) memory_layout: Available memory region 0x3ffe4350 - 0x3ffe8000
D (689) memory_layout: Available memory region 0x3ffe8000 - 0x3fff0000
D (696) memory_layout: Available memory region 0x3fff0000 - 0x3fff8000
D (703) memory_layout: Available memory region 0x3fff8000 - 0x3fffc000
D (709) memory_layout: Available memory region 0x3fffc000 - 0x40000000
D (716) memory_layout: Available memory region 0x400976b4 - 0x40098000
D (722) memory_layout: Available memory region 0x40098000 - 0x4009a000
D (729) memory_layout: Available memory region 0x4009a000 - 0x4009c000
D (735) memory_layout: Available memory region 0x4009c000 - 0x4009e000
D (742) memory_layout: Available memory region 0x4009e000 - 0x400a0000
I (749) heap_init: Initializing. RAM available for dynamic allocation:
D (756) heap_init: New heap initialised at 0x3ffae6e0
I (761) heap_init: At 3FFAE6E0 len 00001920 (6 KiB): DRAM
D (767) heap_init: New heap initialised at 0x3ffb8150
I (772) heap_init: At 3FFB8150 len 00027EB0 (159 KiB): DRAM
I (778) heap_init: At 3FFE0440 len 00003AE0 (14 KiB): D/IRAM
I (785) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
D (791) heap_init: New heap initialised at 0x400976b4
I (796) heap_init: At 400976B4 len 0000894C (34 KiB): IRAM
D (803) cpu_start: calling init function: 0x400d442c on core: 0
D (809) cpu_start: calling init function: 0x400d3e30 on core: 0
D (815) cpu_start: calling init function: 0x400d18a8 on core: 0
D (821) intr_alloc: Connected src 46 to int 1 (cpu 0)
D (826) cpu_start: calling init function: 0x400d18b4 on core: 0
D (832) cpu_start: calling init function: 0x400d5638 on core: 0
D (838) cpu_start: calling init function: 0x400d6014 on core: 0
D (844) cpu_start: calling init function: 0x400d3e9c on core: 0
D (850) cpu_start: calling init function: 0x400d4248 on core: 0
D (856) cpu_start: calling init function: 0x400d18c0 on core: 0
D (862) spi_flash: trying chip: issi
D (865) spi_flash: trying chip: gd
D (869) spi_flash: trying chip: mxic
D (872) spi_flash: trying chip: winbond
D (876) spi_flash: trying chip: generic
I (880) spi_flash: detected chip: generic
I (885) spi_flash: flash io: dio
W (889) spi_flash: Detected size(4096k) larger than the size in the binary image header(2048k). Using the size in the binary image header.
D (902) cpu_start: calling init function: 0x400d1404 on core: 0
D (908) cpu_start: calling init function: 0x4012c3e8
D (913) cpu_start: calling init function: 0x400dee20
D (918) cpu_start: calling init function: 0x400890dc
D (923) cpu_start: calling init function: 0x400d2894
D (928) cpu_start: calling init function: 0x400d1e8c
D (933) cpu_start: calling init function: 0x4010ef5c on core: 0
D (939) intr_alloc: Connected src 17 to int 2 (cpu 0)
D (944) cpu_start: calling init function: 0x400d18e4 on core: 0
D (950) intr_alloc: Connected src 24 to int 3 (cpu 0)
D (955) app_start: Starting scheduler on CPU0
 (960) intr_alloc: Connected src 25 to int 1 (cpu 1)
D (960) app_start: Starting scheduler on CPU1
mI (960) main_task: Started on CPU0
D (980) heap_init: New heap initialised at 0x3ffe0440
D (980) heap_init: New heap initialised at 0x3ffe4350
D (980) intr_alloc: Connected src 16 to int 5 (cpu 0)
I (980) main_task: Calling app_main()
I (1010) wifi station: ESP_WIFI_MODE_STA
D (1010) esp_netif_lwip: LwIP stack has been initialized
D (1020) esp_netif_lwip: esp-netif has been successfully initialized
D (1020) event: running task for loop 0x3ffbcb54
D (1020) event: created task for loop 0x3ffbcb54
D (1030) event: created event loop 0x3ffbcb54
D (1030) esp_netif_lwip: check: remote, if=0x3ffba200 fn=0x400dc9fc
D (1040) esp_netif_objects: esp_netif_add_to_list_unsafe netif added successfully (total netifs: 1)
D (1050) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (1060) nvs: nvs_open_from_partition misc 1
I (1070) wifi:wifi driver task: 3ffc00b4, prio:23, stack:6656, core=0
D (1070) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 8 bit
D (1070) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 0 bit
D (1080) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 24 bit
D (1090) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 16 bit
D (1090) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 8 bit
D (1100) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 0 bit
D (1110) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 16 bit
D (1110) nvs: nvs_open_from_partition nvs.net80211 1
D (1120) nvs: nvs_get opmode 1
D (1120) nvs: nvs_get_str_or_blob sta.ssid
D (1130) nvs: nvs_get sta.authmode 1
D (1130) nvs: nvs_get_str_or_blob sta.pswd
D (1130) nvs: nvs_get_str_or_blob sta.pmk
D (1140) nvs: nvs_get sta.chan 1
D (1140) nvs: nvs_get auto.conn 1
D (1140) nvs: nvs_get bssid.set 1
D (1150) nvs: nvs_get_str_or_blob sta.bssid
D (1150) nvs: nvs_get sta.lis_intval 2
D (1160) nvs: nvs_get sta.phym 1
D (1160) nvs: nvs_get sta.phybw 1
D (1160) nvs: nvs_get_str_or_blob sta.apsw
D (1170) nvs: nvs_get_str_or_blob sta.apinfo
D (1170) nvs: nvs_get sta.scan_method 1
D (1180) nvs: nvs_get sta.sort_method 1
D (1180) nvs: nvs_get sta.minrssi 1
D (1180) nvs: nvs_get sta.minauth 1
D (1190) nvs: nvs_get sta.pmf_e 1
D (1190) nvs: nvs_get sta.pmf_r 1
D (1190) nvs: nvs_get sta.btm_e 1
D (1200) nvs: nvs_get sta.rrm_e 1
D (1200) nvs: nvs_get sta.mbo_e 1
D (1200) nvs: nvs_get_str_or_blob ap.ssid
D (1210) nvs: nvs_get_str_or_blob ap.passwd
D (1210) nvs: nvs_get_str_or_blob ap.pmk
D (1220) nvs: nvs_get ap.chan 1
D (1220) nvs: nvs_get ap.authmode 1
D (1220) nvs: nvs_get ap.hidden 1
D (1230) nvs: nvs_get ap.max.conn 1
D (1230) nvs: nvs_get bcn.interval 2
D (1230) nvs: nvs_get ap.phym 1
D (1240) nvs: nvs_get ap.phybw 1
D (1240) nvs: nvs_get ap.sndchan 1
D (1240) nvs: nvs_get ap.pmf_e 1
D (1250) nvs: nvs_get ap.pmf_r 1
D (1250) nvs: nvs_get ap.p_cipher 1
D (1250) nvs: nvs_get lorate 1
D (1260) nvs: nvs_get_str_or_blob country
D (1260) nvs: nvs_get ap.ftm_r 1
D (1260) nvs: nvs_get sta.ft 1
D (1270) nvs: nvs_get sta.owe 1
D (1270) nvs: nvs_get sta.trans_d 1
D (1270) nvs: nvs_get sta.sae_h2e 1
D (1280) nvs: nvs_get sta.sae_pk_mode 1
D (1280) nvs: nvs_get sta.bss_retry 1
D (1280) nvs: nvs_get_str_or_blob sta.owe_data
D (1290) nvs: nvs_get sta.he_dcm 1
D (1290) nvs: nvs_get sta.he_dcm_c_tx 1
D (1300) nvs: nvs_get sta.he_dcm_c_rx 1
D (1300) nvs: nvs_get sta.he_mcs9_d 1
D (1300) nvs: nvs_get sta.he_su_b_d 1
D (1310) nvs: nvs_get sta.he_su_b_f_d 1
D (1310) nvs: nvs_get sta.he_mu_b_f_d 1
D (1320) nvs: nvs_get sta.he_cqi_f_d 1
D (1320) nvs: nvs_get_str_or_blob sta.sae_h2e_id
D (1320) nvs: nvs_get ap.sae_h2e 1
D (1330) nvs: nvs_get_str_or_blob ap.pmk_info
D (1330) nvs: nvs_get nan.phym 1
D (1340) nvs: nvs_get sta.pwr_reset 1
D (1340) nvs: nvs_get band 1
D (1340) nvs: nvs_set ap.sndchan 1 1
I (1350) wifi:wifi firmware version: b0fd6006b
I (1350) wifi:wifi certification version: v7.0
I (1350) wifi:config NVS flash: enabled
I (1360) wifi:config nano formating: disabled
I (1360) wifi:Init data frame dynamic rx buffer num: 32
I (1370) wifi:Init static rx mgmt buffer num: 5
I (1370) wifi:Init management short buffer num: 32
I (1380) wifi:Init dynamic tx buffer num: 32
I (1380) wifi:Init static rx buffer size: 1600
I (1380) wifi:Init static rx buffer num: 10
I (1390) wifi:Init dynamic rx buffer num: 32
D (1390) wifi:Reset scan defaults in ms : min,max,passive,chan_dwell :(0,120,360,30)
I (1400) wifi_init: rx ba win: 6
I (1400) wifi_init: accept mbox: 6
I (1410) wifi_init: tcpip mbox: 32
I (1410) wifi_init: udp mbox: 6
I (1410) wifi_init: tcp mbox: 6
I (1420) wifi_init: tcp tx win: 5760
I (1420) wifi_init: tcp rx win: 5760
I (1430) wifi_init: tcp mss: 1440
I (1430) wifi_init: WiFi IRAM OP enabled
I (1440) wifi_init: WiFi RX IRAM OP enabled
D (1440) nvs: nvs_get opmode 1
D (1440) wifi:clear blacklist
W (1450) wifi:Password length matches WPA2 standards, authmode threshold changes from OPEN to WPA2
D (1460) nvs: nvs_get_str_or_blob sta.ssid
D (1460) nvs: nvs_get sta.pmf_e 1
D (1460) nvs: nvs_get sta.phybw 1
I (1470) phy_init: phy_version 4840,02e0d70,Sep  2 2024,19:39:07
D (1470) phy_init: loading PHY init data from application binary
D (1480) nvs: nvs_open_from_partition phy 0
D (1480) nvs: nvs_get cal_version 4
D (1490) nvs: nvs_get_str_or_blob cal_mac
D (1490) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 8 bit
D (1500) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 0 bit
D (1500) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 24 bit
D (1510) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 16 bit
D (1520) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 8 bit
D (1530) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 0 bit
D (1530) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 16 bit
D (1540) nvs: nvs_get_str_or_blob cal_data
D (1550) nvs: nvs_close 3
D (1550) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 8 bit
D (1550) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 0 bit
D (1560) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 24 bit
D (1570) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 16 bit
D (1580) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 8 bit
D (1580) efuse: In EFUSE_BLK0__DATA1_REG is used 8 bits starting with 0 bit
D (1590) efuse: In EFUSE_BLK0__DATA2_REG is used 8 bits starting with 16 bit
D (1670) wifi:filter: set rx policy=0
I (1670) wifi:mode : sta (30:c9:22:25:fb:ec)
I (1670) wifi:enable tsf
D (1670) wifi:filter: set rx policy=1
D (1670) wifi:connect status 0 -> 0
D (1670) event: running post WIFI_EVENT:43 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (1680) event: running post WIFI_EVENT:2 with handler 0x400df098 and context 0x3ffbdc7c on loop 0x3ffbcb54
D (1690) wifi_init_default: wifi_start esp-netif:0x3ffbda7c event-id2
D (1700) wifi_init_default: WIFI mac address: 30 c9 22 25 fb ec
D (1710) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dc24c
I (1710) wifi station: wifi_init_sta finished.
D (1710) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (1720) esp_netif_handlers: esp_netif action has started with netif0x3ffbda7c from event_id=2
D (1730) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dcbcc
D (1740) esp_netif_lwip: esp_netif_start_api 0x3ffbda7c
D (1740) esp_netif_lwip: esp_netif_get_hostname esp_netif:0x3ffbda7c
D (1750) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (1760) event: running post WIFI_EVENT:2 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (1770) wifi:Start wifi connect
D (1770) wifi:connect status 0 -> 0
D (1770) wifi:connect chan=0
D (1770) wifi:first chan=1
D (1780) wifi:connect status 0 -> 1
D (1780) wifi:filter: set rx policy=3
D (1780) wifi:clear scan ap list
D (1790) wifi:start scan: type=0x50f, priority=2, cb=0x400f2b28, arg=0x0, ss_state=0x1, time=119563, index=0
D (1800) wifi:perform scan: ss_state=0x9, chan<1,0>, dur<0,120>
D (1920) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (1920) wifi:perform scan: ss_state=0x9, chan<2,0>, dur<0,120>
D (2040) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (2050) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (2170) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (2170) wifi:perform scan: ss_state=0x9, chan<4,0>, dur<0,120>
D (2290) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (2290) wifi:perform scan: ss_state=0x9, chan<5,0>, dur<0,120>
D (2410) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (2410) wifi:perform scan: ss_state=0x9, chan<6,0>, dur<0,120>
D (2530) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (2530) wifi:perform scan: ss_state=0x9, chan<7,0>, dur<0,120>
D (2650) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (2650) wifi:perform scan: ss_state=0x9, chan<8,0>, dur<0,120>
D (2670) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (2670) wifi:profile match: ss_state=0x7
D (2670) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x7
D (2670) wifi:find first mathched ssid, scan done
D (2680) wifi:filter: set rx policy=4
D (2680) wifi:first chan=1
D (2680) wifi:handoff_cb: status=0
D (2690) wifi:ap found, mac=28:4e:e9:0f:37:27
D (2690) wifi:going for connection with bssid=28:4e:e9:0f:37:27
D (2700) wifi:new_bss=0x3ffb6188, cur_bss=0x0, new_chan=<8,0>, cur_chan=1
D (2700) wifi:filter: set rx policy=5
I (2710) wifi:new:<8,0>, old:<1,0>, ap:<255,255>, sta:<8,0>, prof:1, snd_ch_cfg:0x0
D (2710) wifi:connect_op: status=0, auth=5, cipher=3
D (2720) wifi:auth mode is not none
D (2720) wifi:connect_bss: auth=1, reconnect=0
I (2720) wifi:state: init -> auth (0xb0)
D (2730) nvs: nvs_get sta.pwr_reset 1
D (2730) nvs: nvs_set sta.pwr_reset 1 1
D (2740) event: running post WIFI_EVENT:43 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (2750) wifi:start 1s AUTH timer
D (2750) wifi:clear scan ap list
D (2770) wifi:recv auth: seq=2, status=0, algo=0
I (2770) wifi:state: auth -> assoc (0x0)
D (2770) nvs: nvs_get sta.pwr_reset 1
D (2770) wifi:restart connect 1s timer for assoc
D (2810) wifi:recv assoc: type=0x10
D (2810) wifi:filter: set rx policy=6
I (2810) wifi:state: assoc -> run (0x10)
D (2810) nvs: nvs_get sta.pwr_reset 1
D (2810) wifi:start 10s connect timer for 4 way handshake
D (2820) wifi:recv deauth, reason=0x6
I (2820) wifi:state: run -> init (0x6c0)
D (2820) nvs: nvs_get sta.pwr_reset 1
D (2830) nvs: nvs_set sta.pwr_reset 1 0
D (2840) wifi:stop beacon and connect timers
D (2840) wifi:recv deauth/disassoc
D (2840) wifi:connect status 1 -> 2
D (2840) wifi:add bssid 28:4e:e9:0f:37:27 to blacklist, cnt=0
D (2850) wifi:sta leave
D (2850) wifi:stop CSA timer
D (2850) wifi:connect status 2 -> 0
D (2850) wifi:remove 28:4e:e9:0f:37:27 from rc list
I (2860) wifi:new:<8,0>, old:<8,0>, ap:<255,255>, sta:<8,0>, prof:1, snd_ch_cfg:0x0
D (2870) wifi:filter: set rx policy=8
D (2870) wifi:Send disconnect event, reason=6, AP number=0
D (2880) event: running post WIFI_EVENT:5 with handler 0x400def2c and context 0x3ffbdd0c on loop 0x3ffbcb54
D (2880) esp_netif_handlers: esp_netif action disconnected with netif0x3ffbda7c from event_id=5
D (2890) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dce54
D (2900) esp_netif_lwip: esp_netif_down_api esp_netif:0x3ffbda7c
D (2910) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3ffbda7c
D (2910) esp_netif_lwip: if0x3ffbda7c start ip lost tmr: interval=120
D (2920) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (2930) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (2930) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (2940) event: running post WIFI_EVENT:5 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (2950) wifi:Start wifi connect
D (2950) wifi:connect status 0 -> 0
D (2950) wifi:connect chan=0
D (2960) wifi:first chan=8
D (2960) wifi:connect status 0 -> 1
D (2960) wifi:filter: set rx policy=3
D (2970) wifi:clear scan ap list
D (2970) wifi:start scan: type=0x50f, priority=2, cb=0x400f2b28, arg=0x0, ss_state=0x1, time=1301553, index=0
D (2980) wifi:perform scan: ss_state=0x9, chan<8,0>, dur<0,120>
I (2980) wifi station: retry to connect to the AP
I (2990) wifi station: connect to the AP fail
D (2990) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (3000) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (3010) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (3010) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (3090) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (3100) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (3100) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3100) wifi:perform scan: ss_state=0x9, chan<1,0>, dur<0,120>
D (3230) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3230) wifi:perform scan: ss_state=0x9, chan<2,0>, dur<0,120>
D (3350) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3350) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (3470) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3470) wifi:perform scan: ss_state=0x9, chan<4,0>, dur<0,120>
D (3590) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3590) wifi:perform scan: ss_state=0x9, chan<5,0>, dur<0,120>
D (3710) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3720) wifi:perform scan: ss_state=0x9, chan<6,0>, dur<0,120>
D (3840) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3840) wifi:perform scan: ss_state=0x9, chan<7,0>, dur<0,120>
D (3960) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (3960) wifi:perform scan: ss_state=0x9, chan<9,0>, dur<0,120>
D (4080) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (4080) wifi:perform scan: ss_state=0x9, chan<10,0>, dur<0,120>
D (4200) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (4200) wifi:perform scan: ss_state=0x9, chan<11,0>, dur<0,120>
D (4320) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (4320) wifi:perform scan: ss_state=0x9, chan<12,0>, dur<360,360>
D (4690) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (4690) wifi:perform scan: ss_state=0x9, chan<13,0>, dur<360,360>
D (5050) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (5050) wifi:perform scan: ss_state=0x9, chan<14,0>, dur<360,360>
D (5410) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (5410) wifi:filter: set rx policy=4
D (5410) wifi:first chan=1
D (5410) wifi:handoff_cb: status=0
D (5410) wifi:clear blacklist
D (5410) wifi:clear rc list
D (5420) wifi:clear blacklist
D (5420) wifi:Send disconnect event, reason=205
D (5420) wifi:connect status 1 -> 3
D (5430) wifi:disable connect timer
D (5430) wifi:clear scan ap list
D (5430) event: running post WIFI_EVENT:5 with handler 0x400def2c and context 0x3ffbdd0c on loop 0x3ffbcb54
D (5440) esp_netif_handlers: esp_netif action disconnected with netif0x3ffbda7c from event_id=5
D (5450) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dce54
D (5460) esp_netif_lwip: esp_netif_down_api esp_netif:0x3ffbda7c
D (5460) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3ffbda7c
D (5470) esp_netif_lwip: if0x3ffbda7c start ip lost tmr: already started
D (5480) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (5480) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (5490) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (5500) event: running post WIFI_EVENT:5 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (5510) wifi:Start wifi connect
D (5510) wifi:connect status 3 -> 0
D (5510) wifi:connect chan=0
D (5510) wifi:first chan=8
D (5520) wifi:connect status 0 -> 1
D (5520) wifi:filter: set rx policy=3
D (5520) wifi:clear scan ap list
D (5530) wifi:start scan: type=0x50f, priority=2, cb=0x400f2b28, arg=0x0, ss_state=0x1, time=3860068, index=0
D (5540) wifi:perform scan: ss_state=0x9, chan<8,0>, dur<0,120>
I (5540) wifi station: retry to connect to the AP
I (5550) wifi station: connect to the AP fail
D (5550) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (5560) wifi:profile match: ss_state=0x7
D (5560) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (5570) wifi:profile match: ss_state=0x7
D (5570) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x7
D (5580) wifi:find first mathched ssid, scan done
D (5580) wifi:filter: set rx policy=4
D (5590) wifi:first chan=1
D (5590) wifi:handoff_cb: status=0
D (5590) wifi:ap found, mac=28:4e:e9:0f:37:27
D (5600) wifi:going for connection with bssid=28:4e:e9:0f:37:27
D (5600) wifi:new_bss=0x3ffb6188, cur_bss=0x0, new_chan=<8,0>, cur_chan=8
D (5610) wifi:filter: set rx policy=5
I (5610) wifi:new:<8,0>, old:<8,0>, ap:<255,255>, sta:<8,0>, prof:1, snd_ch_cfg:0x0
D (5620) wifi:connect_op: status=0, auth=5, cipher=3
D (5620) wifi:auth mode is not none
D (5630) wifi:connect_bss: auth=1, reconnect=0
I (5630) wifi:state: init -> auth (0xb0)
D (5630) nvs: nvs_get sta.pwr_reset 1
D (5640) nvs: nvs_set sta.pwr_reset 1 1
D (5650) wifi:start 1s AUTH timer
D (5650) wifi:clear scan ap list
D (5660) wifi:recv disassoc: reason=8
I (5660) wifi:state: auth -> init (0x8a0)
D (5660) nvs: nvs_get sta.pwr_reset 1
D (5660) nvs: nvs_set sta.pwr_reset 1 0
D (5680) wifi:stop beacon and connect timers
D (5680) wifi:connect status 1 -> 4
D (5680) wifi:reason: auth fail(202)
D (5680) wifi:add bssid 28:4e:e9:0f:37:27 to blacklist, cnt=0
D (5680) wifi:stop CSA timer
D (5680) wifi:connect status 4 -> 0
D (5690) wifi:remove 28:4e:e9:0f:37:27 from rc list
I (5690) wifi:new:<8,0>, old:<8,0>, ap:<255,255>, sta:<8,0>, prof:1, snd_ch_cfg:0x0
D (5700) wifi:filter: set rx policy=8
D (5700) wifi:Send disconnect event, reason=202, AP number=0
D (5710) event: running post WIFI_EVENT:5 with handler 0x400def2c and context 0x3ffbdd0c on loop 0x3ffbcb54
D (5720) esp_netif_handlers: esp_netif action disconnected with netif0x3ffbda7c from event_id=5
D (5730) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dce54
D (5730) esp_netif_lwip: esp_netif_down_api esp_netif:0x3ffbda7c
D (5740) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3ffbda7c
D (5750) esp_netif_lwip: if0x3ffbda7c start ip lost tmr: already started
D (5750) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (5760) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (5770) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (5770) event: running post WIFI_EVENT:5 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (5780) wifi:Start wifi connect
D (5780) wifi:connect status 0 -> 0
D (5790) wifi:connect chan=0
D (5790) wifi:first chan=8
D (5790) wifi:connect status 0 -> 1
D (5800) wifi:filter: set rx policy=3
D (5800) wifi:clear scan ap list
D (5800) wifi:start scan: type=0x50f, priority=2, cb=0x400f2b28, arg=0x0, ss_state=0x1, time=4161434, index=0
D (5810) wifi:perform scan: ss_state=0x9, chan<8,0>, dur<0,120>
I (5820) wifi station: retry to connect to the AP
I (5820) wifi station: connect to the AP fail
D (5820) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (5830) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (5860) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (5860) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (5940) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (5940) wifi:perform scan: ss_state=0x9, chan<1,0>, dur<0,120>
D (6060) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6060) wifi:perform scan: ss_state=0x9, chan<2,0>, dur<0,120>
D (6180) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6180) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (6300) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6300) wifi:perform scan: ss_state=0x9, chan<4,0>, dur<0,120>
D (6430) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6430) wifi:perform scan: ss_state=0x9, chan<5,0>, dur<0,120>
D (6550) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6550) wifi:perform scan: ss_state=0x9, chan<6,0>, dur<0,120>
D (6670) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6670) wifi:perform scan: ss_state=0x9, chan<7,0>, dur<0,120>
D (6790) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6790) wifi:perform scan: ss_state=0x9, chan<9,0>, dur<0,120>
D (6910) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (6910) wifi:perform scan: ss_state=0x9, chan<10,0>, dur<0,120>
D (7030) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (7030) wifi:perform scan: ss_state=0x9, chan<11,0>, dur<0,120>
D (7160) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (7160) wifi:perform scan: ss_state=0x9, chan<12,0>, dur<360,360>
D (7520) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (7520) wifi:perform scan: ss_state=0x9, chan<13,0>, dur<360,360>
D (7880) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (7880) wifi:perform scan: ss_state=0x9, chan<14,0>, dur<360,360>
D (8240) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (8240) wifi:filter: set rx policy=4
D (8240) wifi:first chan=1
D (8240) wifi:handoff_cb: status=0
D (8240) wifi:clear blacklist
D (8250) wifi:clear rc list
D (8250) wifi:clear blacklist
D (8250) wifi:Send disconnect event, reason=205
D (8260) wifi:connect status 1 -> 3
D (8260) wifi:disable connect timer
D (8260) wifi:clear scan ap list
D (8260) event: running post WIFI_EVENT:5 with handler 0x400def2c and context 0x3ffbdd0c on loop 0x3ffbcb54
D (8270) esp_netif_handlers: esp_netif action disconnected with netif0x3ffbda7c from event_id=5
D (8280) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dce54
D (8290) esp_netif_lwip: esp_netif_down_api esp_netif:0x3ffbda7c
D (8300) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3ffbda7c
D (8300) esp_netif_lwip: if0x3ffbda7c start ip lost tmr: already started
D (8310) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (8320) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (8320) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (8330) event: running post WIFI_EVENT:5 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (8340) wifi:Start wifi connect
D (8340) wifi:connect status 3 -> 0
D (8340) wifi:connect chan=0
D (8350) wifi:first chan=8
D (8350) wifi:connect status 0 -> 1
D (8350) wifi:filter: set rx policy=3
D (8360) wifi:clear scan ap list
D (8360) wifi:start scan: type=0x50f, priority=2, cb=0x400f2b28, arg=0x0, ss_state=0x1, time=6718459, index=0
D (8370) wifi:perform scan: ss_state=0x9, chan<8,0>, dur<0,120>
I (8370) wifi station: retry to connect to the AP
I (8380) wifi station: connect to the AP fail
D (8380) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (8390) wifi:profile match: ss_state=0x7
D (8390) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x7
D (8400) wifi:find first mathched ssid, scan done
D (8400) wifi:filter: set rx policy=4
D (8410) wifi:first chan=1
D (8410) wifi:handoff_cb: status=0
D (8410) wifi:ap found, mac=28:4e:e9:0f:37:27
D (8420) wifi:going for connection with bssid=28:4e:e9:0f:37:27
D (8420) wifi:new_bss=0x3ffb6188, cur_bss=0x0, new_chan=<8,0>, cur_chan=8
D (8430) wifi:filter: set rx policy=5
I (8430) wifi:new:<8,0>, old:<8,0>, ap:<255,255>, sta:<8,0>, prof:1, snd_ch_cfg:0x0
D (8440) wifi:connect_op: status=0, auth=5, cipher=3
D (8450) wifi:auth mode is not none
D (8450) wifi:connect_bss: auth=1, reconnect=0
I (8450) wifi:state: init -> auth (0xb0)
D (8460) nvs: nvs_get sta.pwr_reset 1
D (8460) nvs: nvs_set sta.pwr_reset 1 1
D (8470) wifi:start 1s AUTH timer
D (8470) wifi:clear scan ap list
D (8490) wifi:recv auth: seq=2, status=0, algo=0
I (8490) wifi:state: auth -> assoc (0x0)
D (8490) nvs: nvs_get sta.pwr_reset 1
D (8490) wifi:restart connect 1s timer for assoc
D (8530) wifi:recv assoc: type=0x10
D (8530) wifi:filter: set rx policy=6
I (8530) wifi:state: assoc -> run (0x10)
D (8530) nvs: nvs_get sta.pwr_reset 1
D (8530) wifi:start 10s connect timer for 4 way handshake
D (8540) wifi:recv deauth, reason=0x6
I (8540) wifi:state: run -> init (0x6c0)
D (8540) nvs: nvs_get sta.pwr_reset 1
D (8550) nvs: nvs_set sta.pwr_reset 1 0
D (8560) wifi:stop beacon and connect timers
D (8560) wifi:recv deauth/disassoc
D (8560) wifi:connect status 1 -> 2
D (8560) wifi:add bssid 28:4e:e9:0f:37:27 to blacklist, cnt=0
D (8570) wifi:sta leave
D (8570) wifi:stop CSA timer
D (8570) wifi:connect status 2 -> 0
D (8570) wifi:remove 28:4e:e9:0f:37:27 from rc list
I (8580) wifi:new:<8,0>, old:<8,0>, ap:<255,255>, sta:<8,0>, prof:1, snd_ch_cfg:0x0
D (8590) wifi:filter: set rx policy=8
D (8590) wifi:Send disconnect event, reason=6, AP number=0
D (8600) event: running post WIFI_EVENT:5 with handler 0x400def2c and context 0x3ffbdd0c on loop 0x3ffbcb54
D (8600) esp_netif_handlers: esp_netif action disconnected with netif0x3ffbda7c from event_id=5
D (8610) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dce54
D (8620) esp_netif_lwip: esp_netif_down_api esp_netif:0x3ffbda7c
D (8630) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3ffbda7c
D (8630) esp_netif_lwip: if0x3ffbda7c start ip lost tmr: already started
D (8640) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (8650) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (8650) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (8660) event: running post WIFI_EVENT:5 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
D (8670) wifi:Start wifi connect
D (8670) wifi:connect status 0 -> 0
D (8670) wifi:connect chan=0
D (8680) wifi:first chan=8
D (8680) wifi:connect status 0 -> 1
D (8680) wifi:filter: set rx policy=3
D (8690) wifi:clear scan ap list
D (8690) wifi:start scan: type=0x50f, priority=2, cb=0x400f2b28, arg=0x0, ss_state=0x1, time=7049117, index=0
D (8700) wifi:perform scan: ss_state=0x9, chan<8,0>, dur<0,120>
I (8710) wifi station: retry to connect to the AP
I (8710) wifi station: connect to the AP fail
D (8710) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (8720) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (8730) wifi:rsn valid: gcipher=1 ucipher=3 akm=5 mac=28:4e:e9:0f:37:27
D (8730) wifi:find the 28:4e:e9:0f:37:27 in blacklist.

D (8830) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (8830) wifi:perform scan: ss_state=0x9, chan<1,0>, dur<0,120>
D (8950) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (8950) wifi:perform scan: ss_state=0x9, chan<2,0>, dur<0,120>
D (9070) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9070) wifi:perform scan: ss_state=0x9, chan<3,0>, dur<0,120>
D (9190) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9190) wifi:perform scan: ss_state=0x9, chan<4,0>, dur<0,120>
D (9310) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9310) wifi:perform scan: ss_state=0x9, chan<5,0>, dur<0,120>
D (9430) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9430) wifi:perform scan: ss_state=0x9, chan<6,0>, dur<0,120>
D (9560) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9560) wifi:perform scan: ss_state=0x9, chan<7,0>, dur<0,120>
D (9680) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9680) wifi:perform scan: ss_state=0x9, chan<9,0>, dur<0,120>
D (9800) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9800) wifi:perform scan: ss_state=0x9, chan<10,0>, dur<0,120>
D (9920) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (9920) wifi:perform scan: ss_state=0x9, chan<11,0>, dur<0,120>
D (10040) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (10040) wifi:perform scan: ss_state=0x9, chan<12,0>, dur<360,360>
D (10400) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (10400) wifi:perform scan: ss_state=0x9, chan<13,0>, dur<360,360>
D (10770) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (10770) wifi:perform scan: ss_state=0x9, chan<14,0>, dur<360,360>
D (11130) wifi:scan end: arg=0x3ffb49e0, status=0, ss_state=0x3
D (11130) wifi:filter: set rx policy=4
D (11130) wifi:first chan=1
D (11130) wifi:handoff_cb: status=0
D (11130) wifi:clear blacklist
D (11130) wifi:clear rc list
D (11140) wifi:clear blacklist
D (11140) wifi:Send disconnect event, reason=205
D (11140) wifi:connect status 1 -> 3
D (11150) wifi:disable connect timer
D (11150) wifi:clear scan ap list
D (11150) event: running post WIFI_EVENT:5 with handler 0x400def2c and context 0x3ffbdd0c on loop 0x3ffbcb54
D (11160) esp_netif_handlers: esp_netif action disconnected with netif0x3ffbda7c from event_id=5
D (11170) esp_netif_lwip: check: remote, if=0x3ffbda7c fn=0x400dce54
D (11180) esp_netif_lwip: esp_netif_down_api esp_netif:0x3ffbda7c
D (11180) esp_netif_lwip: esp_netif_start_ip_lost_timer esp_netif:0x3ffbda7c
D (11190) esp_netif_lwip: if0x3ffbda7c start ip lost tmr: already started
D (11200) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (11200) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (11210) esp_netif_lwip: call api in lwip: ret=0x0, give sem
D (11220) event: running post WIFI_EVENT:5 with handler 0x400d6be0 and context 0x3ffc5e3c on loop 0x3ffbcb54
I (11230) wifi station: connect to the AP fail
I (11230) wifi station: Failed to connect to SSID:SK_3724_2.4G, password:!!1cbdbad346
I (11240) main_task: Returned from app_main()
D (122910) esp_netif_lwip: esp_netif_ip_lost_timer esp_netif:0x3ffbda7c
D (122910) esp_netif_lwip: check: local, if=0x3ffbda7c fn=0x400dd164
D (122910) esp_netif_lwip: esp_netif_update_default_netif_lwip 0x3ffbda7c
D (122910) esp_netif_lwip: if0x3ffbda7c ip lost tmr: raise ip lost event
D (122920) event: no handlers have been registered for event IP_EVENT:1 posted to loop 0x3ffbcb54

More Information.

I also think it might be a timing issue. Occasionally, the connection succeeds during repeated attempts. This occurs when the log level is set to DEBUG.

@varram-bdh varram-bdh added the Type: Bug bugs in IDF label Dec 24, 2024
@github-actions github-actions bot changed the title WIFI STA and AP Connection Issue (SDK 5.3.2) WIFI STA and AP Connection Issue (SDK 5.3.2) (IDFGH-14297) Dec 24, 2024
@espressif-bot espressif-bot added the Status: Opened Issue is new label Dec 24, 2024
@Xiehanxin
Copy link

hi @varram-bdh could you share your router setting page? I want to confirm th settings, and could you tell me you specific router brand?

@varram-bdh
Copy link
Author

hi @Xiehanxin The router currently causing the issue is provided by SK Telecom in Korea.
Model: GW-ME611R
Manufacturer/Country of Origin: Mercury Co., Ltd./China

I will update the page soon.

@varram-bdh
Copy link
Author

As an additional update, I found that the event handler is generating an ID of 43. This is not documented anywhere.

@varram-bdh
Copy link
Author

varram-bdh commented Dec 26, 2024

@Xiehanxin
If you need additional configuration screens, please let me know.
image
image
image
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Status: Opened Issue is new Type: Bug bugs in IDF
Projects
None yet
Development

No branches or pull requests

4 participants