一个无法理解的微果投影仪 Wi-Fi 断连问题 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
wpo
V2EX    Android

一个无法理解的微果投影仪 Wi-Fi 断连问题

  •  
  •   wpo 2023-01-10 11:01:26 +08:00 12309 次点击
    这是一个创建于 1084 天前的主题,其中的信息可能已经有所发展或是发生改变。

    22 年 6 月京东入手一台微果 C1 ,在卧室投影看柯南和小新当背景音非常满意,期间有更新几个系统版本,出问题时检测为最新。 这是一台只能搜索到 2.4G 的设备,我用 K2P 放了一个 2.4G 只有投影仪使用,从入手到 12 月都正常在用,未发现连接问题。问题出在 12 月 28 号的时候,说来也巧,这天中招了开始请假,发现投影仪一直提示 xxx Wi-Fi 认证失败,反复连上几秒到几十秒就断开出现提示,然后我就去捣鼓了一下路由器,修改 SSID 名密码、手动改信道、改加密逻辑、改为无密码认证、重置等,还是无法正常使用,然后尝试更换了路由器并执行以上操作,也依然如此。然后使用 iPhone 、一加放了热点,都还是不行。期间尝试了重置投影仪系统也是一样。 就这样搞了两天最后我笃定是投影仪坏了,因为人不舒服就躺了几天。申请了京东售后,京东很爽快的给我寄来一台新的,1 月 4 号收到,快快乐乐打开连接,不到 5 秒,立马就弹窗了,我人都麻了,不太理解这个情况,尝试联系坚果客服(是坚果的子品牌),说没有遇过这样的情况。 因为微果 C1 的系统无线能连上 ADB (非常良心),我判断系统可能也带有调试控制台,在点击系统版本后果然出现了一个 log 页面,在 log 页面开启日志后,在 Wi-Fi 反复断开的间隙中艰难的导出 log ,我截取了应该是触发了断开的 log 片段,有没有大佬能看明白为啥。

    01-05 23:49:34.008 3383 3383 D wpa_supplicant: nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0 01-05 23:49:34.008 3383 3383 D wpa_supplicant: nl80211: Disconnect event 01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Event DEAUTH (11) received 01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Deauthentication notification 01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: * reason 1 01-05 23:49:34.008 3383 3383 D wpa_supplicant: Deauthentication frame IE(s) - hexdump(len=0): [NULL] 01-05 23:49:34.008 3383 3383 I wpa_supplicant: wlan0: CTRL-EVENT-DISCONNECTED bssid=24:cf:24:bb:44:4d reason=1 01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Auto connect disabled: do not try to re-connect 01-05 23:49:34.008 3383 3383 D wpa_supplicant: wlan0: Ignore connection failure indication since interface has been put into disconnected state 01-05 23:49:34.009 3383 3383 D wpa_supplicant: TDLS: Remove peers on disassociation 01-05 23:49:34.009 3383 3383 D wpa_supplicant: wlan0: WPA: Clear old PMK and PTK 01-05 23:49:34.009 3383 3383 D wpa_supplicant: Notifying disconnect reason to hidl control: 1 01-05 23:49:34.009 3383 3383 D wpa_supplicant: wlan0: Disconnect event - remove keys 01-05 23:49:34.009 3383 3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 01-05 23:49:34.009 3383 3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 01-05 23:49:34.009 3179 3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onDisconnected received 01-05 23:49:34.009 3383 3383 D wpa_supplicant: wpa_driver_nl80211_set_key: ifindex=11 (wlan0) alg=0 addr=0xb32290c0 key_idx=0 set_tx=0 seq_len=0 key_len=0 01-05 23:49:34.009 3179 3642 E SupplicantStaIfaceHal: onDisconnected 4way=false locallyGenerated=false reasOnCode=1 01-05 23:49:34.009 3383 3383 D wpa_supplicant: addr=24:cf:24:bb:44:4d 01-05 23:49:34.009 3383 3383 D wpa_supplicant: nl80211: Data frame filter flags=0x0 01-05 23:49:34.009 3179 3642 D JmGOWifiEventTracker: setDisconnectionEvent reason:1 01-05 23:49:34.010 3383 3383 D wpa_supplicant: wlan0: State: COMPLETED -> DISCONNECTED 01-05 23:49:34.010 3383 3383 D wpa_supplicant: nl80211: Set wlan0 operstate 1->0 (DORMANT) 01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: handleMessage: E msg.what=10005 01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectedState 01-05 23:49:34.010 3383 3383 D wpa_supplicant: netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) 01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: ConnectedState EVENT_SET_NETWORK_STATE 01-05 23:49:34.010 3383 3383 D wpa_supplicant: Notifying state change event to hidl control: 0 01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectModeState 01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: ConnectModeState EVENT_SET_NETWORK_STATE 01-05 23:49:34.010 3383 3383 D wpa_supplicant: Notifying bssid changed to hidl control 01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: External notification - portEnabled=0 01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: SUPP_PAE entering state DISCONNECTED 01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: Supplicant port status: Unauthorized 01-05 23:49:34.010 3179 3345 D JmGOWifiEventTracker: handleMessage: X 01-05 23:49:34.010 3383 3383 D wpa_supplicant: nl80211: Skip set_supp_port(unauthorized) while not associated 01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: SUPP_BE entering state INITIALIZE 01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: External notification - portValid=0 01-05 23:49:34.010 3383 3383 D wpa_supplicant: EAPOL: External notification - EAP success=0 01-05 23:49:34.010 3383 3383 D wpa_supplicant: RTM_NEWLINK: ifi_index=11 ifname=wlan0 wext ifi_family=0 ifi_flags=0x1043 ([UP][RUNNING]) 01-05 23:49:34.010 3179 3260 I EthernetTracker: interfaceLinkStateChanged, iface: wlan0, up: false 01-05 23:49:34.010 3383 3383 D wpa_supplicant: RTM_NEWLINK: ifi_index=11 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x1003 ([UP]) 01-05 23:49:34.011 3179 3260 D PppoeUtils: updateInterface: wlan0 link down 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Regulatory domain change 01-05 23:49:34.011 2786 2786 I wificond: Regulatory domain changed 01-05 23:49:34.011 3383 3383 D wpa_supplicant: * initiator=0 01-05 23:49:34.011 3383 3383 D wpa_supplicant: * type=1 01-05 23:49:34.011 3383 3383 D wpa_supplicant: wlan0: Event CHANNEL_LIST_CHANGED (27) received 01-05 23:49:34.011 3383 3383 I wpa_supplicant: wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD 01-05 23:49:34.011 3383 3383 D wpa_supplicant: wlan0: Updating hw mode 01-05 23:49:34.011 3179 3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onStateChanged received 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Regulatory information - country=00 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 2402-2472 @ 40 MHz 20 mBm 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 2457-2482 @ 20 MHz 20 mBm 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5170-5250 @ 80 MHz 20 mBm 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5250-5330 @ 80 MHz 20 mBm 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5490-5730 @ 160 MHz 20 mBm 01-05 23:49:34.011 3179 3642 D JmGOWifiEventTracker: setSupplicantState supState:DISCONNECTED 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: 5735-5835 @ 80 MHz 20 mBm 01-05 23:49:34.011 3179 3642 D JmGOWifiEventTracker: setWifiNetworkState state:DISCONNECTED 01-05 23:49:34.011 3383 3383 D wpa_supplicant: nl80211: Added 802.11b mode based on 802.11g information 01-05 23:49:34.003 2888 2888 I NiEvMon : type=1400 audit(0.0:9730): avc: denied { read } for name="printk" dev="proc" ino=20652 scOntext=u:r:mt_dtv-svc:s0 tcOntext=u:object_r:proc_sys_kernel_printk:s0 tclass=file permissive=1 01-05 23:49:34.012 3179 3344 D WifiStateMachine: ConnectedState !NETWORK_DISCONNECTION_EVENT rt=274797/274797 24:cf:24:bb:44:4d nid=0 reason=1 lastbssid=24:cf:24:bb:44:4d freq=2447 rssi=-47 01-05 23:49:34.012 3179 3642 D SupplicantStaIfaceHal: ISupplicantStaIfaceCallback.onBssidChanged received 01-05 23:49:34.012 3179 3344 W LastMileLogger: Ignoring negative connection id: -1 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: handleMessage: E msg.what=10005 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectedState 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: ConnectedState EVENT_SET_NETWORK_STATE 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: transitionTo: destState=ConnectModeState 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: processMsg: ConnectModeState 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: ConnectModeState EVENT_SET_NETWORK_STATE 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: handleMessage: new destination call exit/enter 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: setupTempStateStackWithStatesToEnter: X mTempStateStackCount=1,curStateInfo: state=DefaultState,active=true,parent=null 01-05 23:49:34.012 3179 3345 D JmGOWifiEventTracker: invokeExitMethods: ConnectedState 01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: invokeExitMethods: ConnectModeState 01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: moveTempStackToStateStack: i=0,j=1 01-05 23:49:34.013 2786 2786 I wificond: 2.4Ghz frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: moveTempStackToStateStack: X mStateStackTop=1,startingIndex=1,Top=ConnectModeState 01-05 23:49:34.013 2786 2786 I wificond: 5Ghz non-DFS frequencies: 01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: invokeEnterMethods: ConnectModeState 01-05 23:49:34.013 2786 2786 I wificond: 5Ghz DFS frequencies: 01-05 23:49:34.013 3179 3345 D JmGOWifiEventTracker: handleMessage: X 01-05 23:49:34.013 3179 3260 V WifiNative: Interface status unchanged on Iface:{Name=wlan0,Id=0,Type=STA} from true, Ignoring... 01-05 23:49:34.013 3179 3260 E WifiService: XXXXX WifiInterfaceObserver interfaceLinkStateChanged wlan0 up=false 01-05 23:49:34.013 2720 2720 D WifiHAL : Start get packet fate command 01-05 23:49:34.013 2720 2720 D WifiHAL : createRequest Get Tx packet fate request 01-05 23:49:34.014 3179 3260 I EthernetTracker: interfaceLinkStateChanged, iface: wlan0, up: false 01-05 23:49:34.014 3179 3260 D PppoeUtils: updateInterface: wlan0 link down 01-05 23:49:34.014 2720 2720 D WifiHAL : Start get packet fate command 01-05 23:49:34.014 2720 2720 D WifiHAL : createRequest Get Rx packet fate request 
    5 条回复    2023-01-10 20:06:29 +08:00
    ju5t4fun
        1
    ju5t4fun  
       2023-01-10 14:39:26 +08:00
    试过路由器 WiFi 先隐藏 ssid ,然后换个 ssid 名字吗?

    看到 log 里有 Deauthentication ,搞不好是有人闲得无聊在搞断网攻击
    OCD2057
        2
    OCD2057  
       2023-01-10 15:14:56 +08:00
    感觉是你附近有人一直在发 deauth, 导致 station 认为自己断网
    wpo
        3
    wpo  
    OP
       2023-01-10 17:21:27 +08:00
    @ju5t4fun 试过隐藏,然后在投影仪直接添加,也会这样。
    Deauthentication 这个攻击是针对 2.4G 的吗?手机连接 2.4G 没有影响。
    systemcall
        4
    systemcall  
       2023-01-10 19:44:19 +08:00
    @wpo #3
    很多人是闲得无聊拿 esp8266 之类的物联网模块做的,一般是只有 2.4G 的,因为便宜
    ysc3839
        5
    ysc3839  
       2023-01-10 20:06:29 +08:00 via Android
    手机没问题的话可能是能防这种攻击,我之前试过路由器上跑 mdk3 模拟 SSID 来实现模拟定位,三星 S5 是能搜到这些 SSID ,定位也变了,但是小米 6 就搜不到。
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     889 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 25ms UTC 21:39 PVG 05:39 LAX 13:39 JFK 16:39
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86