V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
wpo
V2EX  ›  Android

一个无法理解的微果投影仪 Wi-Fi 断连问题

  •  
  •   wpo · 2023-01-10 11:01:26 +08:00 · 3957 次点击
    这是一个创建于 444 天前的主题,其中的信息可能已经有所发展或是发生改变。

    22 年 6 月京东入手一台微果 C1 ,在卧室投影看柯南和小新当背景音非常满意,期间有更新几个系统版本,出问题时检测为最新。 这是一台只能搜索到 2.4G 的设备,我用 K2P 放了一个 2.4G 只有投影仪使用,从入手到 12 月都正常在用,未发现连接问题。问题出在 12 月 28 号的时候,说来也巧,这天中招了开始请假,发现投影仪一直提示 xxx Wi-Fi 认证失败,反复连上几秒到几十秒就断开出现提示,然后我就去捣鼓了一下路由器,修改 SSID 名称密码、手动改信道、改加密逻辑、改为无密码认证、重置等,还是无法正常使用,然后尝试更换了路由器并执行以上操作,也依然如此。然后使用 iPhone 、一加放了热点,都还是不行。期间尝试了重置投影仪系统也是一样。 就这样搞了两天最后我笃定是投影仪坏了,因为人不舒服就躺了几天。申请了京东售后,京东很爽快的给我寄来一台新的,1 月 4 号收到,快快乐乐打开连接,不到 5 秒,立马就弹窗了,我人都麻了,不太理解这个情况,尝试联系坚果客服(是坚果的子品牌),说没有遇过这样的情况。 因为微果 C1 的系统无线能连上 ADB (非常良心),我判断系统可能也带有调试控制台,在点击系统版本后果然出现了一个 log 页面,在 log 页面开启日志后,在 Wi-Fi 反复断开的间隙中艰难的导出 log ,我截取了应该是触发了断开的 log 片段,有没有大佬能看明白为啥。

    01-05 23:49:34.008  3383  3383 D wpa_supplicant: nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: nl80211: Disconnect event
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: wlan0: Event DEAUTH (11) received
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: wlan0: Deauthentication notification
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: wlan0:  * reason 1
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: Deauthentication frame IE(s) - hexdump(len=0): [NULL]
    01-05 23:49:34.008  3383  3383 I wpa_supplicant: wlan0: CTRL-EVENT-DISCONNECTED bssid=24:cf:24:bb:44:4d reason=1
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: wlan0: Auto connect disabled: do not try to re-connect
    01-05 23:49:34.008  3383  3383 D wpa_supplicant: wlan0: Ignore connection failure indication since interface has been put into disconnected state
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: TDLS: Remove peers on disassociation
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: wlan0: WPA: Clear old PMK and PTK
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: Notifying disconnect reason to hidl control: 1
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: wlan0: Disconnect event - remove keys
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0
    01-05 23:49:34.009  3179  3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onDisconnected received
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0xb32290c0 key_idx=0 set_tx=0 seq_len=0 key_len=0
    01-05 23:49:34.009  3179  3642 E SupplicantStaIfaceHal: onDisconnected 4way=false locallyGenerated=false reasonCode=1
    01-05 23:49:34.009  3383  3383 D wpa_supplicant:    addr=24:cf:24:bb:44:4d
    01-05 23:49:34.009  3383  3383 D wpa_supplicant: nl80211: Data frame filter flags=0x0
    01-05 23:49:34.009  3179  3642 D JmGOWifiEventTracker: setDisconnectionEvent reason:1
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: wlan0: State: COMPLETED -> DISCONNECTED
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: nl80211: Set wlan0 operstate 1->0 (DORMANT)
    01-05 23:49:34.010  3179  3345 D JmGOWifiEventTracker: handleMessage: E msg.what=10005
    01-05 23:49:34.010  3179  3345 D JmGOWifiEventTracker: processMsg: ConnectedState
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
    01-05 23:49:34.010  3179  3345 D JmGOWifiEventTracker:  ConnectedState EVENT_SET_NETWORK_STATE
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: Notifying state change event to hidl control: 0
    01-05 23:49:34.010  3179  3345 D JmGOWifiEventTracker: processMsg: ConnectModeState
    01-05 23:49:34.010  3179  3345 D JmGOWifiEventTracker:  ConnectModeState EVENT_SET_NETWORK_STATE
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: Notifying bssid changed to hidl control
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: EAPOL: External notification - portEnabled=0
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: EAPOL: SUPP_PAE entering state DISCONNECTED
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: EAPOL: Supplicant port status: Unauthorized
    01-05 23:49:34.010  3179  3345 D JmGOWifiEventTracker: handleMessage: X
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: nl80211: Skip set_supp_port(unauthorized) while not associated
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: EAPOL: SUPP_BE entering state INITIALIZE
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: EAPOL: External notification - portValid=0
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: EAPOL: External notification - EAP success=0
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: RTM_NEWLINK: ifi_index=11 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING])
    01-05 23:49:34.010  3179  3260 I EthernetTracker: interfaceLinkStateChanged, iface: wlan0, up: false
    01-05 23:49:34.010  3383  3383 D wpa_supplicant: RTM_NEWLINK: ifi_index=11 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP])
    01-05 23:49:34.011  3179  3260 D PppoeUtils: updateInterface: wlan0 link down
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: Regulatory domain change
    01-05 23:49:34.011  2786  2786 I wificond: Regulatory domain changed
    01-05 23:49:34.011  3383  3383 D wpa_supplicant:  * initiator=0
    01-05 23:49:34.011  3383  3383 D wpa_supplicant:  * type=1
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: wlan0: Event CHANNEL_LIST_CHANGED (27) received
    01-05 23:49:34.011  3383  3383 I wpa_supplicant: wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: wlan0: Updating hw mode
    01-05 23:49:34.011  3179  3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onStateChanged received
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: Regulatory information - country=00
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: 2402-2472 @ 40 MHz 20 mBm
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: 2457-2482 @ 20 MHz 20 mBm
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: 5170-5250 @ 80 MHz 20 mBm
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: 5250-5330 @ 80 MHz 20 mBm
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: 5490-5730 @ 160 MHz 20 mBm
    01-05 23:49:34.011  3179  3642 D JmGOWifiEventTracker: setSupplicantState supState:DISCONNECTED
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: 5735-5835 @ 80 MHz 20 mBm
    01-05 23:49:34.011  3179  3642 D JmGOWifiEventTracker: setWifiNetworkState state:DISCONNECTED
    01-05 23:49:34.011  3383  3383 D wpa_supplicant: nl80211: Added 802.11b mode based on 802.11g information
    01-05 23:49:34.003  2888  2888 I NiEvMon : type=1400 audit(0.0:9730): avc: denied { read } for name="printk" dev="proc" ino=20652 scontext=u:r:mt_dtv-svc:s0 tcontext=u:object_r:proc_sys_kernel_printk:s0 tclass=file permissive=1
    01-05 23:49:34.012  3179  3344 D WifiStateMachine:  ConnectedState !NETWORK_DISCONNECTION_EVENT rt=274797/274797 24:cf:24:bb:44:4d nid=0 reason=1 lastbssid=24:cf:24:bb:44:4d freq=2447 rssi=-47
    01-05 23:49:34.012  3179  3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onBssidChanged received
    01-05 23:49:34.012  3179  3344 W LastMileLogger: Ignoring negative connection id: -1
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: handleMessage: E msg.what=10005
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: processMsg: ConnectedState
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker:  ConnectedState EVENT_SET_NETWORK_STATE
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: transitionTo: destState=ConnectModeState
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: processMsg: ConnectModeState
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker:  ConnectModeState EVENT_SET_NETWORK_STATE
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: handleMessage: new destination call exit/enter
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: setupTempStateStackWithStatesToEnter: X mTempStateStackCount=1,curStateInfo: state=DefaultState,active=true,parent=null
    01-05 23:49:34.012  3179  3345 D JmGOWifiEventTracker: invokeExitMethods: ConnectedState
    01-05 23:49:34.013  3179  3345 D JmGOWifiEventTracker: invokeExitMethods: ConnectModeState
    01-05 23:49:34.013  3179  3345 D JmGOWifiEventTracker: moveTempStackToStateStack: i=0,j=1
    01-05 23:49:34.013  2786  2786 I wificond: 2.4Ghz frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472
    01-05 23:49:34.013  3179  3345 D JmGOWifiEventTracker: moveTempStackToStateStack: X mStateStackTop=1,startingIndex=1,Top=ConnectModeState
    01-05 23:49:34.013  2786  2786 I wificond: 5Ghz non-DFS frequencies:
    01-05 23:49:34.013  3179  3345 D JmGOWifiEventTracker: invokeEnterMethods: ConnectModeState
    01-05 23:49:34.013  2786  2786 I wificond: 5Ghz DFS frequencies:
    01-05 23:49:34.013  3179  3345 D JmGOWifiEventTracker: handleMessage: X
    01-05 23:49:34.013  3179  3260 V WifiNative: Interface status unchanged on Iface:{Name=wlan0,Id=0,Type=STA} from true, Ignoring...
    01-05 23:49:34.013  3179  3260 E WifiService: XXXXX WifiInterfaceObserver interfaceLinkStateChanged wlan0 up=false
    01-05 23:49:34.013  2720  2720 D WifiHAL : Start get packet fate command
    01-05 23:49:34.013  2720  2720 D WifiHAL : createRequest Get Tx packet fate request
    01-05 23:49:34.014  3179  3260 I EthernetTracker: interfaceLinkStateChanged, iface: wlan0, up: false
    01-05 23:49:34.014  3179  3260 D PppoeUtils: updateInterface: wlan0 link down
    01-05 23:49:34.014  2720  2720 D WifiHAL : Start get packet fate command
    01-05 23:49:34.014  2720  2720 D WifiHAL : createRequest Get Rx packet fate request
    
    
    5 条回复    2023-01-10 20:06:29 +08:00
    ju5t4fun
        1
    ju5t4fun  
       2023-01-10 14:39:26 +08:00
    试过路由器 WiFi 先隐藏 ssid ,然后换个 ssid 名字吗?

    看到 log 里有 Deauthentication ,搞不好是有人闲得无聊在搞断网攻击
    OCD2057
        2
    OCD2057  
       2023-01-10 15:14:56 +08:00
    感觉是你附近有人一直在发 deauth, 导致 station 认为自己断网
    wpo
        3
    wpo  
    OP
       2023-01-10 17:21:27 +08:00
    @ju5t4fun 试过隐藏,然后在投影仪直接添加,也会这样。
    Deauthentication 这个攻击是针对 2.4G 的吗?手机连接 2.4G 没有影响。
    systemcall
        4
    systemcall  
       2023-01-10 19:44:19 +08:00
    @wpo #3
    很多人是闲得无聊拿 esp8266 之类的物联网模块做的,一般是只有 2.4G 的,因为便宜
    ysc3839
        5
    ysc3839  
       2023-01-10 20:06:29 +08:00 via Android
    手机没问题的话可能是能防这种攻击,我之前试过路由器上跑 mdk3 模拟 SSID 来实现模拟定位,三星 S5 是能搜到这些 SSID ,定位也变了,但是小米 6 就搜不到。
    关于   ·   帮助文档   ·   博客   ·   API   ·   FAQ   ·   我们的愿景   ·   实用小工具   ·   3164 人在线   最高记录 6543   ·     Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 · 26ms · UTC 10:54 · PVG 18:54 · LAX 03:54 · JFK 06:54
    Developed with CodeLauncher
    ♥ Do have faith in what you're doing.