Arch Linux에서 반복되는 Wi-Fi 연결 끊기를 디버깅하는 방법은 무엇입니까?


11

무선 연결 을 얻기 위해 오랜 시간 동안 노력한 후 이제는 몇 초마다 실제 인터넷에 몇 초만 연결되는 것처럼 매우 스케치적인 것을 얻을 수 있습니다. wpa_supplicant -d -i wlp0s29f7u5 -c wifi.conf -Dwext한 VT와 while ! yes | pacman -Syu; do :; done다른 VT에서 실행 되고 몇 분이 지난 후에도 여전히 완료되지는 않지만 잠시 후 몇 개의 파일을 다운로드 할 수 있습니다.

iw dev wlp0s29f7u5 link 아치 머신에서 약 -40dB의 신호 강도를보고하는데, 이는 -70dB의 이웃 우분투 랩톱보다 훨씬 나쁩니다.

연결 출력 :

# wpa_supplicant -d -i wlp0s29f7u5 -c wifi.conf -Dwext
wpa_supplicant v2.0
Successfully initialized wpa_supplicant
Initializing interface 'wlp0s29f7u5' conf 'wifi.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wifi.conf' -> '/root/wifi.conf'
Reading configuration file '/root/wifi.conf'
ctrl_interface='/var/run/wpa_supplicant'
Priority group 0
   id=0 ssid='BTHub4-GRK6'
WEXT: cfg80211-based driver detected
wext: interface wlp0s29f7u5 phy: phy0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0x1f flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlp0s29f7u5: Own MAC address: e8:4e:06:14:7a:77
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wlp0s29f7u5: RSN: flushing PMKID list in the driver
wlp0s29f7u5: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlp0s29f7u5
WPS: UUID based on MAC address - hexdump(len=16): 7c c4 e6 42 89 cb 59 26 95 2a b6 fd f8 85 e6 3a
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlp0s29f7u5: Added interface wlp0s29f7u5
wlp0s29f7u5: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
wlp0s29f7u5: State: DISCONNECTED -> SCANNING
wlp0s29f7u5: Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 10 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=16
wlp0s29f7u5: Event SCAN_RESULTS (3) received
Received 838 bytes of scan results (2 BSSes)
wlp0s29f7u5: BSS: Start scan result update 1
wlp0s29f7u5: BSS: Add new id 0 BSSID cc:33:bb:13:8a:f4 SSID 'BTHub4-GRK6'
wlp0s29f7u5: BSS: Add new id 1 BSSID 00:22:b0:60:09:69 SSID 'leandro'
BSS: last_scan_res_used=2/32 last_scan_full=0
wlp0s29f7u5: New scan results available
wlp0s29f7u5: Selecting BSS from priority group 0
wlp0s29f7u5: 0: cc:33:bb:13:8a:f4 ssid='BTHub4-GRK6' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=10
wlp0s29f7u5:    selected based on RSN IE
wlp0s29f7u5:    selected BSS cc:33:bb:13:8a:f4 ssid='BTHub4-GRK6'
wlp0s29f7u5: Request association: reassociate: 0  selected: cc:33:bb:13:8a:f4  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
wlp0s29f7u5: Trying to associate with cc:33:bb:13:8a:f4 (SSID='BTHub4-GRK6' freq=2457 MHz)
wlp0s29f7u5: Cancelling scan request
wlp0s29f7u5: WPA: clearing own WPA/RSN IE
wlp0s29f7u5: Automatic auth_alg selection: 0x1
RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
RSN: Search for BSSID cc:33:bb:13:8a:f4
RSN: No PMKSA cache entry found
wlp0s29f7u5: RSN: using IEEE 802.11i/D9.0
wlp0s29f7u5: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
wlp0s29f7u5: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
wlp0s29f7u5: WPA: using GTK TKIP
wlp0s29f7u5: WPA: using PTK CCMP
wlp0s29f7u5: WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPAioctl[SIOCSIWFREQ]: Device or resource busy
 IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlp0s29f7u5: No keys have been configured - skip key clearing
wlp0s29f7u5: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Limit connection to BSSID cc:33:bb:13:8a:f4 freq=2457 MHz based on scan results (bssid_set=0)
wlp0s29f7u5: set_disable_max_amsdu: -1
wlp0s29f7u5: set_ampdu_factor: -1
wlp0s29f7u5: set_ampdu_density: -1
wlp0s29f7u5: set_disable_ht40: 0
wlp0s29f7u5: set_disable_sgi: 0
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlp0s29f7u5: Association request to the driver failed
wlp0s29f7u5: Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=27
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=65
AssocResp IE wireless event - hexdump(len=49): 01 04 82 84 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 08 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 05 00 09 86 01 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: cc:33:bb:13:8a:f4
wlp0s29f7u5: Event ASSOCINFO (4) received
wlp0s29f7u5: Association info event
resp_ies - hexdump(len=49): 01 04 82 84 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 18 00 50 f2 02 01 01 08 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 05 00 09 86 01 00
wlp0s29f7u5: Event ASSOC (0) received
wlp0s29f7u5: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlp0s29f7u5: Associated to a new BSS: BSSID=cc:33:bb:13:8a:f4
wlp0s29f7u5: No keys have been configured - skip key clearing
wlp0s29f7u5: Associated with cc:33:bb:13:8a:f4
wlp0s29f7u5: WPA: Association event - clear replay counter
wlp0s29f7u5: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
wlp0s29f7u5: Setting authentication timeout: 10 sec 0 usec
wlp0s29f7u5: Cancelling scan request
wlp0s29f7u5: RX EAPOL from cc:33:bb:13:8a:f4
wlp0s29f7u5: Setting authentication timeout: 10 sec 0 usec
wlp0s29f7u5: IEEE 802.1X RX: version=1 type=3 length=95
wlp0s29f7u5:   EAPOL-Key type=2
wlp0s29f7u5:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlp0s29f7u5:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): c8 c9 ae c3 18 6c 23 4a a0 38 99 55 ec 9c c5 da ad 2d 00 dd 7a b3 33 c2 20 8b ab 41 e5 cd 1e b6
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlp0s29f7u5: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlp0s29f7u5: WPA: RX message 1 of 4-Way Handshake from cc:33:bb:13:8a:f4 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): ab ec fb 19 6f 98 4a 00 75 78 4a 0d e0 37 fd d2 c3 44 29 66 2b 7e 93 57 06 0a f5 68 1b 02 aa fa
WPA: PTK derivation - A1=e8:4e:06:14:7a:77 A2=cc:33:bb:13:8a:f4
WPA: Nonce1 - hexdump(len=32): ab ec fb 19 6f 98 4a 00 75 78 4a 0d e0 37 fd d2 c3 44 29 66 2b 7e 93 57 06 0a f5 68 1b 02 aa fa
WPA: Nonce2 - hexdump(len=32): c8 c9 ae c3 18 6c 23 4a a0 38 99 55 ec 9c c5 da ad 2d 00 dd 7a b3 33 c2 20 8b ab 41 e5 cd 1e b6
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlp0s29f7u5: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): c1 ea 02 f5 f1 e3 47 51 44 b9 05 4b 04 37 bc 2a
wlp0s29f7u5: RX EAPOL from cc:33:bb:13:8a:f4
wlp0s29f7u5: IEEE 802.1X RX: version=1 type=3 length=175
wlp0s29f7u5:   EAPOL-Key type=2
wlp0s29f7u5:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlp0s29f7u5:   key_length=16 key_data_length=80
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): c8 c9 ae c3 18 6c 23 4a a0 38 99 55 ec 9c c5 da ad 2d 00 dd 7a b3 33 c2 20 8b ab 41 e5 cd 1e b6
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): da 02 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 4c 67 eb c0 a0 be 0f ac 28 36 7d da e5 f2 b9 08
RSN: encrypted key data - hexdump(len=80): a5 39 e0 01 c0 2b 4b 12 f5 2d de e5 5f 1e 41 a3 f7 27 13 a6 cc 9a 94 a7 cb a5 7c 69 1c 3e 0f 4c 93 a5 93 7b cc c3 2b fc 20 47 ba d5 f3 60 5f c9 70 cb 71 b1 01 81 31 95 b0 a3 15 ef b6 fe f4 87 02 6d 7d f7 11 02 db b4 c3 92 ea ce 6e f3 a9 13
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
wlp0s29f7u5: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlp0s29f7u5: WPA: RX message 3 of 4-Way Handshake from cc:33:bb:13:8a:f4 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 9c 1c 9f 0b f1 8d 96 63 e1 a9 8e e6 f8 74 95 71 ee 71 65 d5 e5 3e df 4c 42 ae 80 a1 e3 b1 a7 5f dd 00 00 00 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
wlp0s29f7u5: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): f9 ab 08 31 3c b6 d4 55 6b 2f 39 9d bb 9a 99 a8
wlp0s29f7u5: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlp0s29f7u5: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
wlp0s29f7u5: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): da 02 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
wlp0s29f7u5: WPA: Key negotiation completed with cc:33:bb:13:8a:f4 [PTK=CCMP GTK=TKIP]
wlp0s29f7u5: Cancelling authentication timeout
wlp0s29f7u5: State: GROUP_HANDSHAKE -> COMPLETED
wlp0s29f7u5: CTRL-EVENT-CONNECTED - Connection to cc:33:bb:13:8a:f4 completed [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlp0s29f7u5' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])

기기 정보:

# lsusb | grep WLAN
Bus 004 Device 004: ID 0bda:8178 Realtek Semiconductor Corp. RTL8192CU 802.11n WLAN Adapter

펌웨어 : rtlwifi/rtl8192cufw.bin

인터페이스 드라이버 : rtl8192cu

운영체제 :

# uname -a
Linux archiso 3.10.10-1-ARCH #1 SMP PREEMPT Fri Aug 30 11:30:06 CEST 2013 x86_64 GNU/Linux

진행 상태는 보통 EAPOL: disable timer tick계속 진행하기 전에 몇 초 동안 회선 에서 일시 중지됩니다 .

어떤 아이디어가 잘못 될 수 있습니까? 결과물은 대부분 그리스어입니다.

가능한 빨리 연결하기 위해 연결이 설정되면 DHCP 임대 갱신과 같이 백그라운드에서 다른 작업을 수행해야합니까?

마지막으로 -40dB는 "허용 가능한"링크 품질로 간주됩니까?

업데이트 : dmesg이제 다음과 같은 엄청난 양의 것들이 있습니다.

wlp0s29f7u5: Connection to AP cc:33:bb:13:8a:f4 lost
cfg80211: Calling CRDA to update world regulatory domain
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 2/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 3/3)
wlp0s29f7u5: authentication with cc:33:bb:13:8a:f4 timed out
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: authenticated
wlp0s29f7u5: associating with AP with corrupt beacon and probe response
wlp0s29f7u5: associate with cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: RX AssocResp from cc:33:bb:13:8a:f4 (capab=0x431 status=0 aid=24)
wlp0s29f7u5: associated
wlp0s29f7u5: Connection to AP cc:33:bb:13:8a:f4 lost
cfg80211: Calling CRDA for country: PL
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 2/3)
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 3/3)
wlp0s29f7u5: authentication with cc:33:bb:13:8a:f4 timed out
wlp0s29f7u5: authenticate with cc:33:bb:13:8a:f4
wlp0s29f7u5: send auth to cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: authenticated
wlp0s29f7u5: associating with AP with corrupt beacon and probe response
wlp0s29f7u5: associate with cc:33:bb:13:8a:f4 (try 1/3)
wlp0s29f7u5: RX AssocResp from cc:33:bb:13:8a:f4 (capab=0x431 status=0 aid=24)
wlp0s29f7u5: associated
wlp0s29f7u5: Connection to AP cc:33:bb:13:8a:f4 lost

여기에는 여러 가지 이상한 일이 있습니다.

  • "손상된 비콘 및 프로브 응답"이란 무엇이며 어떻게 수정합니까?
  • 영국에있을 때 왜 폴란드에 있다고 생각합니까?
  • 첫 번째 세 번의 연결 시도가 항상 네 번째 동안 성공하는 이유는 무엇입니까?

어떤 와이파이 컨트롤러입니까? 어떤 기계입니까? 의 결과를 붙여 넣을 수 lspci있습니까?
mtahmed 2016 년

좋아, 나는 와이파이 컨트롤러가 문제라고 생각한다. 어떤 OS를 사용하고 있습니까? archlinux입니까?
mtahmed 2016 년

내가 아는 한, 문제는 rtl8192c * 드라이버에 있습니다. dkms-rtl8192cuAUR 에서 패키지를 설치 하고 재부팅 한 후 시도하십시오. 그것이 작동하는지 알려주세요. BTW, 어떤 기계를 사용하고 있습니까? 노트북?
mtahmed

데스크톱 시스템이지만 왜 차이가 있을까요?
l0b0

rtl8192의 특정 하드웨어 조합이 작동하지 않는 것으로 알려져 있습니다. dkms-rtl8192cu드라이버 를 사용해 보셨습니까 ?
mtahmed

답변:


1

문제는 wpa_supplicant 설정입니다. 먼저 -Dext 가 오래되었습니다. -Dnl80211 초 사용 ; net.lonet.wlp0s29f7u5 이외의 다른 것을 초기 스크립트에 추가하지 말고 부팅시로드하여 추가하십시오. 제삼; NetworkManager 또는 Wicd 넷째와 같은 것을 제거하십시오. net 파일과 config_wlp0s29f7u5 = "dhcp"를 정리하십시오. WIFI 연결에서 dhcp를 사용하는 경우 유용합니다. 또한 수퍼 유저 액세스 유형이 dhcpcd 인 터미널에도 있습니다 . 재미로; 그것은 당신에게 많은 고통을 해결할 수 있습니다


또한 커널에서 Dnl80211 지원 및 Wi-Fi 카드 모듈을 확인하십시오.
r004

@ r004 님, 안녕하세요. USE에 오신 것을 환영합니다. 일반적으로 추가 정보가있는 경우 의견을 추가하지 않고 자신의 답변을 수정하는 것이 좋습니다. 또한 백틱을 사용하여 텍스트를 코드 형식으로 지정할 수 있습니다.
l0b0
당사 사이트를 사용함과 동시에 당사의 쿠키 정책개인정보 보호정책을 읽고 이해하였음을 인정하는 것으로 간주합니다.
Licensed under cc by-sa 3.0 with attribution required.