AP34F8.E716.0300#reload Proceed with reload? [confirm] [*09/13/2024 07:10:52.1196] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Setup(3). cli: AP Rebooting: CLI triggered reboot(reload command) [ OK ] Removed slice system-sshd\x2dkeyg Stopping Clean Air daemon... Stopping System Monitor service... Stopping WCPD process... [ OK ] Stopped Cisco kexec. Stopping Cisco kexec... [ OK ] Stopped target Timers. Stopping Cisco rtd service... Stopping Cisco brain service... [ OK ] Stopped NTP_PROC daemon. [ OK ] Stopped NSS Firmware Monitor daemon. [ OK ] Stopped System Monitor service. [ OK ] Stopped Serial Getty on ttyS0. [ OK ] Stopped Cisco led service. [ OK ] Stopped Cisco klogd. [ OK ] Stopped Cisco printkd. [ OK ] Stopped Hostapd process. [ OK ] Stopped Cisco rtd service. [ OK ] Stopped Fast CGI daemon. [ OK ] Stopped AP Trace daemon. [ OK ] Stopped OpenSSH server daemon. [ OK ] Stopped Cisco brain service. [ OK ] Stopped Clean Air daemon. [ OK ] Stopped capwapd. [ OK ] Stopped WCPD process. [ OK ] Stopped DNSmasq. [ OK ] Stopped DHCPv6 client. [ OK ] Stopped gRPC server daemon. [ OK ] Stopped target sshd-keygen.target. [ OK ] Removed slice system-serial\x2dgetty.slice. [ OK ] Stopped target Basic System. [ OK ] Stopped target Paths. [ OK ] Stopped target System Initialization. [ OK ] Stopped Cisco ME service. Stopping Cisco ME service... Stopping rsyslog client... Stopping Cisco nolan USB service... [ OK ] Stopped Cisco S16platfomm. Stopping Cisco S16platfomm... Stopping Cisco system time saving... [*09/13/2024 07:10:52.3596] netlink socket init done, pnl->spectral_fd=4 [*09/13/2024 07:10:58.6976] [*09/13/2024 07:10:58.6976] Writing reload timestamp (Fri Sep 13 07:10:58 UTC 2024) to disk [*09/13/2024 07:10:58.6976] [ OK ] Stopped Cisco certtime service. Stopping Cisco certtime service... [ OK ] Stopped Cisco certificate create service. Stopping Cisco certificate create service... Stopping Cisco watchdog... Stopping Cisco synclogd... [ OK ] Stopped target Slices. [ OK ] Removed slice -.slice. [ OK ] Reached target Shutdown. [09/13/2024 07:11:01.2368] Restarting system. U-Boot 2012.07 (btldr release 42) (Jun 23 2023 - 13:28:53) This product contains some software licensed under the "GNU General Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of "GNU General Public License, version 2", available here: http://www.gnu.org/licenses/old-licenses/gpl-2.0.html DRAM: 1 GiB NAND (ONFI): Detected MICRON MT29F2G08ABBEAH4 [256 MiB] SF: Detected Macronix MX25U3235F [4 MiB] MFG data loaded Scanning shenv data blocks Total valid parts=4 Active shenv part[1:1], write_counter=16 PCI0 Link Intialized PCI1 Link Intialized Net: PHY ID = 0x4dd074, eth0 found AR8033 PHY PHY ID = 0x4dd074, eth1 found AR8033 PHY Valid I2C chip addresses: 51 52 AP 1832/1852 detected... Power Type: 802.3at POE detected... Signature returns 0 BL signing verification success, continue to run... Auto boot mode, use bootipq directly Hit ESC key to stop autoboot: 0 Specified BOOT: part2 Booting from part2 Read 1024 bytes from volume part2 to 45000000 Read 63147785 bytes from volume part2 to 45000000 Signature returns 0 Image signing verification success, continue to run... Using machid 0x1260 from environment Starting image ... [01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d [01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache [01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point [01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc [01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M usbcore.authorized_default=0 console=ttyHSL1,9600n8 activepart=part2 activeboot=0 wdgtriggered=0 [01/01/1970 00:00:00.1600] CPU1: Booted secondary processor [01/01/1970 00:00:00.2300] [01/01/1970 00:00:00.2300] +++ hydra_ap_gpio_value =3 [01/01/1970 00:00:37.5084] ACPU PVS: 1 [01/01/1970 00:00:39.2879] buginf tty flushing thread started, ttyport=eec82a90 [*01/01/1970 00:00:45.2960] buginf() enabled. [*01/01/1970 00:00:45.3060] Made it into bootsh: May 10 2024 12:16:00 T-e0550ad380a1f81adf839cc9111f3a6bf79904ff-ge0550ad3-aut Welcome to Cisco. Usage of this device is governed by Cisco's End User License Agreement, available at: http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html. Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 This product contains cryptographic features and is subject to United States and local country laws governing import, export, transfer and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return this product immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. This product contains some software licensed under the "GNU General Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of "GNU General Public License, version 2", available here: http://www.gnu.org/licenses/old-licenses/gpl-2.0.html This product contains some software licensed under the "GNU Library General Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of "GNU Library General Public License, version 2", available here: http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html This product contains some software licensed under the "GNU Lesser General Public License, version 2.1" provided with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser General Public License, version 2.1", available here: http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html This product contains some software licensed under the "GNU General Public License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of "GNU General Public License, Version 3", available here: http://www.gnu.org/licenses/gpl.html. This product contains some software licensed under the "GNU Affero General Public License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of "GNU Affero General Public License, version 3", available here: http://www.gnu.org/licenses/agpl-3.0.html. [*01/01/1970 00:00:46.6756] /init: ioctl(SIOCGIFHWADDR): wired0: No such device [*01/01/1970 00:00:46.6856] /init: ioctl(SIOCGIFHWADDR): wired0: No such device [*01/01/1970 00:00:46.7455] /init: ioctl(SIOCGIFHWADDR): wired0: No such device [*01/01/1970 00:00:46.7555] /init: ioctl(SIOCGIFHWADDR): wired0: No such device [ OK ] Reached target Cisco File Systems (Pre). [ OK ] Reached target Timers. [ OK ] Created slice -.slice. [ OK ] Listening on Delayed Shutdown Socket. [ OK ] Reached target Sockets. [ OK ] Created slice system.slice. [ OK ] Created slice system-sshd\x2dkeygen.slice. Starting Cisco UBIFS reformat/mount... [ OK ] Created slice system-serial\x2dgetty.slice. [ OK ] Reached target Slices. [ OK ] Started Cisco UBIFS reformat/mount. Starting Cisco early mount... [ OK ] Started Cisco early mount. [ OK ] Reached target Local File Systems (Pre). Starting Cisco platform file generation... Starting Cisco system time setup... [*01/01/1970 00:00:51.5041] Last reload time: Sep 13 07:10:58 2024 [*09/13/2024 07:10:58.0000] Setting system time Fri Sep 13 07:10:58 UTC 2024 Starting Cisco fips check... Starting Cisco seed generation... [*09/13/2024 07:10:58.3299] GCM-128 POST passed [*09/13/2024 07:10:58.3299] GCM-256 POST passed [ OK ] Started Cisco platform file generation. [ OK ] Started Cisco system time setup. [ OK ] Started Cisco fips check. [ OK ] Started Cisco seed generation. [ OK ] Reached target Local File Systems. Starting Cisco pkg install service... Starting Cisco S10 boot service... [ OK ] Started Cisco system time saving. Starting Cisco system time saving... [09/13/2024 07:10:58.0299] sysctl link missing during unregister: /net/ipv4/neigh//eth0 [09/13/2024 07:10:58.2699] sysctl link missing during unregister: /net/ipv4/neigh//eth1 [ OK ] Started Cisco S10 boot service. Starting Cisco nss service... [*09/13/2024 07:10:59.5495] === 5G radio domain is 14, COPY 5G BDF files from non_ETSI_BDF folder === [*09/13/2024 07:10:59.5795] /etc/init.d/S10boot: Warning: deleting backup ap images to save storage... [*09/13/2024 07:10:59.5895] 1 [*09/13/2024 07:10:59.8294] Active version: 8.10.196.0 [*09/13/2024 07:10:59.8294] Backup version: 8.5.182.0 [*09/13/2024 07:11:00.0594] [*09/13/2024 07:11:00.0594] led pattern module start [*09/13/2024 07:11:00.1093] AP1852I [*09/13/2024 07:11:00.2393] nss_driver - Turbo Support 1 [*09/13/2024 07:11:00.2393] Supported Frequencies - 110Mhz 550Mhz 733Mhz [*09/13/2024 07:11:00.2893] NSS firmware booted [*09/13/2024 07:11:00.3193] NSS firmware booted [*09/13/2024 07:11:00.8191] Current value of FACTORY_RESET=0 [*09/13/2024 07:11:00.8391] Last reload time: Sep 13 07:10:58 2024 [*09/13/2024 07:10:58.0000] Setting system time Fri Sep 13 07:10:58 UTC 2024 [*09/13/2024 07:10:58.1499] device wired0 entered promiscuous mode [*09/13/2024 07:10:58.3599] device wired1 entered promiscuous mode [*09/13/2024 07:10:59.0497] Last reload reason : 1: reload command Starting Cisco watchdog... Starting Cisco nolan service... [ OK ] Started Cisco nss service. [ OK ] Started Cisco watchdog. [ OK ] Started Cisco nolan service. [ OK ] Started Cisco pkg install service. Starting Cisco S15platform... Starting Cisco nolan USB service... Starting Cisco Kclick... [ OK ] Started Cisco S15platform. [ OK ] Started Cisco nolan USB service. [*09/13/2024 07:11:01.4289] stile module dp init successfully [*09/13/2024 07:11:01.4289] NBAR Label:BLD_POLARIS_DEV_LATEST_20200414_053707 Module timestamp: May 10 2024 at 12:05:42 User: ttaichol [ OK ] Started Cisco Kclick. Starting Cisco Kclick... Starting Cisco certificate create service... Starting Cisco ME service... [ OK ] Started Cisco Kclick. Starting rsyslog client... [*09/13/2024 07:11:02.2287] Loading sha2... [*09/13/2024 07:11:02.2287] Dumpping sha1... [*09/13/2024 07:11:02.2987] miibus get eedd2c00! Starting Cisco S16platfomm... Starting Cisco syslog service... [ OK ] Started Cisco ME service. [ OK ] Started rsyslog client. [ OK ] Started Cisco S16platfomm. [ OK ] Started Cisco syslog service. Starting Cisco synclogd... [ OK ] Started Cisco synclogd. [ OK ] Started Cisco certificate create service. Starting Cisco certtime service... [ OK ] Started Cisco certtime service. [ OK ] Reached target System Initialization. [*09/13/2024 07:11:03.4483] pid 2922's current affinity mask: 3 [*09/13/2024 07:11:03.4483] pid 2922's new affinity mask: 1 [*09/13/2024 07:11:03.7682] Loading MIC cert and key [*09/13/2024 07:11:03.7782] Dumpping sha2... [*09/13/2024 07:11:05.1778] Loading MIC cert and key [ OK ] Reached target Paths. [ OK ] Reached target Basic System. [ OK ] Started Serial Getty on ttyS0. Starting Serial Getty on ttyS0... [ OK ] Reached target Login Prompts. Starting Cisco rtd service... Starting Hostapd process... Starting Cisco printkd... Starting WCPD process... Starting Cisco led service... Starting Clean Air daemon... [ OK ] Started System Monitor service. Starting System Monitor service... [ OK ] Started NTP_PROC daemon. Starting NTP_PROC daemon... Starting capwapd... Starting AP Trace daemon... [ OK ] Started NSS Firmware Monitor daemon. Starting NSS Firmware Monitor daemon... Starting Cisco klogd... Starting Fast CGI daemon... Starting Cisco brain service... Starting gRPC server daemon... Starting Cisco kexec... Starting RSYNC User Key Generation... [ OK ] Started Cisco led service. [ OK ] Started Cisco kexec. [ OK ] Started Cisco printkd. [ OK ] Started Cisco klogd. [ OK ] Started Fast CGI daemon. [ OK ] Started Cisco rtd service. [ OK ] Started AP Trace daemon. [ OK ] Started Hostapd process. [ OK ] Started RSYNC User Key Generation. [ OK ] Reached target sshd-keygen.target. Starting OpenSSH server daemon... [*09/13/2024 07:11:09.4664] pid 3074's current affinity mask: 3 [*09/13/2024 07:11:09.4664] pid 3074's new affinity mask: 1 [*09/13/2024 07:11:11.2359] pid 3171's current affinity mask: 3 [*09/13/2024 07:11:11.2359] pid 3171's new affinity mask: 1 [*09/13/2024 07:11:11.4158] [*09/13/2024 07:11:11.4158] Click sched monitor: schedulers = 1 [ OK ] Started OpenSSH server daemon. [*09/13/2024 07:11:11.8957] pid 3180's current affinity mask: 3 [*09/13/2024 07:11:11.8957] pid 3180's new affinity mask: 1 [*09/13/2024 07:11:12.0856] __mm_init_module [*09/13/2024 07:11:12.1356] [*09/13/2024 07:11:12.1356] __ol_ath_attach() Allocated scn eeac0480 [*09/13/2024 07:11:12.1556] ol_ath_attach interface_id 0 [*09/13/2024 07:11:12.1556] Chip id: 0x9, chip version: 0x1000000 [*09/13/2024 07:11:12.1556] [*09/13/2024 07:11:12.1556] Target Version is 1000000 [*09/13/2024 07:11:12.1556] [*09/13/2024 07:11:12.1556] Flash Download Address c0000 [*09/13/2024 07:11:12.1556] ol_transfer_bin_file: flash data file defined [*09/13/2024 07:11:12.1556] Cal location [0]: 00000000 [*09/13/2024 07:11:12.1556] [*09/13/2024 07:11:12.1556] Wifi0 NAND FLASH Select OFFSET 0x1000 [*09/13/2024 07:11:12.1756] qc98xx_verify_checksum: flash checksum passed: 0xdc25 [*09/13/2024 07:11:12.1756] ol_transfer_bin_file 3861: Download Flash data len 12064 [*09/13/2024 07:11:12.1956] [*09/13/2024 07:11:12.1956] Board data initialized [*09/13/2024 07:11:12.2355] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660 [*09/13/2024 07:11:12.2355] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1 [*09/13/2024 07:11:12.2355] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin [*09/13/2024 07:11:12.3055] [*09/13/2024 07:11:12.3055] [Flash] : Ignore Module param [*09/13/2024 07:11:12.3055] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0 [*09/13/2024 07:11:12.3355] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin [*09/13/2024 07:11:13.5251] [*09/13/2024 07:11:13.5251] ol_ath_copy_tgt_iram() iram read paddr: 0x980000 host paddr 0x44000000 Radio id 0 [*09/13/2024 07:11:13.7051] Startup Mode-0 set [*09/13/2024 07:11:13.7051] HTC Service:0x0300 ep:1 TX flow control disabled [*09/13/2024 07:11:13.7051] HTC Service:0x0100 ep:2 TX flow control disabled [*09/13/2024 07:11:13.7051] Firmware_Build_Number:70 [*09/13/2024 07:11:13.7051] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffaa [*09/13/2024 07:11:13.7051] [*09/13/2024 07:11:13.7051] RES CFG Support wmi_service_bitmap 9778 [*09/13/2024 07:11:13.7051] [*09/13/2024 07:11:13.7051] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT [*09/13/2024 07:11:13.7051] ol_ath_service_ready_event: sw_cal_support_check_flag: 1 [*09/13/2024 07:11:13.7751] wmi_ready_event_rx: WMI UNIFIED READY event [*09/13/2024 07:11:13.7751] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0 [*09/13/2024 07:11:13.7851] spectral_init_netlink 81 NULL SKB [*09/13/2024 07:11:13.7851] ACS not enabled [*09/13/2024 07:11:13.7851] ol_ath_thermal_mitigation_attach: -- [*09/13/2024 07:11:13.7851] [*09/13/2024 07:11:13.7851] __ol_ath_attach() Allocated scn ed8c0480 [*09/13/2024 07:11:13.8051] ol_ath_attach interface_id 1 [*09/13/2024 07:11:13.8051] Chip id: 0x9, chip version: 0x1000000 [*09/13/2024 07:11:13.8051] [*09/13/2024 07:11:13.8051] Target Version is 1000000 [*09/13/2024 07:11:13.8051] [*09/13/2024 07:11:13.8051] Flash Download Address c0000 [*09/13/2024 07:11:13.8051] ol_transfer_bin_file: flash data file defined [*09/13/2024 07:11:13.8051] Cal location [1]: 00004000 [*09/13/2024 07:11:13.8051] [*09/13/2024 07:11:13.8051] wifi1 NAND FLASH Select OFFSET 0x5000 [*09/13/2024 07:11:13.8251] qc98xx_verify_checksum: flash checksum passed: 0xcc15 [*09/13/2024 07:11:13.8251] ol_transfer_bin_file 3861: Download Flash data len 12064 [*09/13/2024 07:11:13.8450] [*09/13/2024 07:11:13.8450] Board data initialized [*09/13/2024 07:11:13.8950] ol_ath_download_firmware :First OTP download and Execute is good address:0x9c00 return param 4660 [*09/13/2024 07:11:13.8950] ol_ath_download_firmware:##Board Id 7 , CHIP Id 1 [*09/13/2024 07:11:13.8950] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS239_negative_pwr_offset_5G_v2_007.bin [*09/13/2024 07:11:13.9850] [*09/13/2024 07:11:13.9850] [Flash] : Ignore Module param [*09/13/2024 07:11:13.9850] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0 User Access Verification Username: [*09/13/2024 07:11:14.0050] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin [*09/13/2024 07:11:14.6948] FWLOG: [71583] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:14.6948] FWLOG: [71583] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:14.6948] FWLOG: [71583] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:14.6948] FWLOG: [71583] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:15.0947] [*09/13/2024 07:11:15.0947] ol_ath_copy_tgt_iram() iram read paddr: 0x980000 host paddr 0x44200000 Radio id 1 [*09/13/2024 07:11:15.2546] HTC Rx: insufficient length, got:4 expected =8 [*09/13/2024 07:11:15.2546] <---------Dumping 8 Bytes : BAD RX packet length ------> [*09/13/2024 07:11:15.2546] [0]: 00 00 00 00 00 00 00 00 [*09/13/2024 07:11:15.2546] <-------------------------------------------------> [*09/13/2024 07:11:15.2646] Startup Mode-0 set [*09/13/2024 07:11:15.2646] HTC Service:0x0300 ep:1 TX flow control disabled [*09/13/2024 07:11:15.2646] HTC Service:0x0100 ep:2 TX flow control disabled [*09/13/2024 07:11:15.2646] Firmware_Build_Number:70 [*09/13/2024 07:11:15.2646] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339b79b2 vht_supp_mcs:0x0000ffaa [*09/13/2024 07:11:15.2646] [*09/13/2024 07:11:15.2646] RES CFG Support wmi_service_bitmap 9778 [*09/13/2024 07:11:15.2646] [*09/13/2024 07:11:15.2646] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT [*09/13/2024 07:11:15.2646] ol_ath_service_ready_event: sw_cal_support_check_flag: 1 [*09/13/2024 07:11:15.3346] wmi_ready_event_rx: WMI UNIFIED READY event [*09/13/2024 07:11:15.3346] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 1 [*09/13/2024 07:11:15.3446] acfg_attach: Offload using existing sock c3f22600 [*09/13/2024 07:11:15.3446] spectral_init_netlink 81 NULL SKB [*09/13/2024 07:11:15.3446] ACS not enabled [*09/13/2024 07:11:15.3446] ol_ath_thermal_mitigation_attach: -- [*09/13/2024 07:11:15.3846] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16 [*09/13/2024 07:11:15.3846] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16 [*09/13/2024 07:11:15.8344] ol_txrx_set_mesh_mode val 1 [*09/13/2024 07:11:16.1843] ol_txrx_set_mesh_mode val 1 [*09/13/2024 07:11:16.2643] FWLOG: [73135] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:16.2643] FWLOG: [73135] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:16.2643] FWLOG: [73135] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:16.2643] FWLOG: [73135] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 ) [*09/13/2024 07:11:16.2643] FWLOG: [73143] WAL_DBGID_PDEV_INFO_PRINT ( 0x3a, 0x10, 0x0, 0x10, 0x0 ) [*09/13/2024 07:11:18.1037] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000 [*09/13/2024 07:11:18.1037] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000 [*09/13/2024 07:11:19.0634] ip6_port srcr2, ip6local fe80::36f8:e7ff:fe16:300, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 2(slaac) [*09/13/2024 07:11:19.6833] ethernet_port wired0, ip 192.168.10.100, netmask 255.255.255.0, gw 192.168.10.1, mtu 1500, bcast 192.168.10.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false [*09/13/2024 07:11:20.5030] pid 4125's current affinity mask: 3 [*09/13/2024 07:11:20.5030] pid 4125's new affinity mask: 1 [*09/13/2024 07:11:22.1125] chpasswd: password for user changed [*09/13/2024 07:11:22.1925] pid 4152's current affinity mask: 3 [*09/13/2024 07:11:22.1925] pid 4152's new affinity mask: 1 [*09/13/2024 07:11:22.2325] pid 4178's current affinity mask: 3 [*09/13/2024 07:11:22.2325] pid 4178's new affinity mask: 1 [*09/13/2024 07:11:22.4624] USB Device Disconnected from the AP [*09/13/2024 07:11:22.8823] device aptrace0 entered promiscuous mode [*09/13/2024 07:11:22.9223] device to_container entered promiscuous mode [*09/13/2024 07:11:24.7717] DOT11_TXP[0]:Domain configured: 1 class:E [*09/13/2024 07:11:25.1016] DOT11_TXP[1]:Domain configured: 14 class:S [*09/13/2024 07:11:27.2209] DOT11_DRV[1]: Init Radio1 [*09/13/2024 07:11:27.2509] DOT11_DRV[1]: set_channel Channel set to 36 [*09/13/2024 07:11:27.2709] DOT11_DRV[0]: Init Radio0 [*09/13/2024 07:11:27.3009] DOT11_DRV[0]: set_channel Channel set to 6 [*09/13/2024 07:11:27.3809] DOT11_DRV[0]: set_channel Channel set to 1 [*09/13/2024 07:11:27.3809] DOT11_DRV[0]: Channel set to 1, width 20 [*09/13/2024 07:11:27.3809] DOT11_DRV[0]: Channel set to 1 skipped [*09/13/2024 07:11:27.4009] DOT11_DRV[0]: Channel set to 1, width 20 [*09/13/2024 07:11:27.4009] DOT11_DRV[0]: Channel set to 1 skipped [*09/13/2024 07:11:27.4109] DOT11_DRV[1]: set_channel Channel set to 36 [*09/13/2024 07:11:27.4208] DOT11_DRV[1]: Channel set to 36, width 20 [*09/13/2024 07:11:27.4208] DOT11_DRV[1]: Channel set to 36 skipped [*09/13/2024 07:11:27.4208] DOT11_DRV[1]: Channel set to 36, width 20 [*09/13/2024 07:11:27.4208] DOT11_DRV[1]: Channel set to 36 skipped [*09/13/2024 07:11:37.5477] AP IPv4 Address updated from 0.0.0.0 to 192.168.10.100 [*09/13/2024 07:11:37.5577] send CAPWAP ctrl msg to the socket: Socket operation on non-socket [*09/13/2024 07:11:37.5677] dtls_init: Use MIC certificate [*09/13/2024 07:11:37.8676] [*09/13/2024 07:11:37.8676] CAPWAP State: Init [*09/13/2024 07:11:37.8676] [*09/13/2024 07:11:37.8676] CAPWAP State: Discovery [*09/13/2024 07:11:37.8776] Discovery Request sent to 192.168.10.1, discovery type STATIC_CONFIG(1) [*09/13/2024 07:11:37.8776] Discovery Request sent to 192.168.10.1, discovery type STATIC_CONFIG(1) [*09/13/2024 07:11:37.8876] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0) [*09/13/2024 07:11:37.8876] [*09/13/2024 07:11:37.8876] CAPWAP State: Discovery [*09/13/2024 07:11:37.8876] Discovery Response from 192.168.10.1 [*09/13/2024 07:11:37.9376] Discovery Response from 192.168.10.1 [*09/13/2024 07:11:37.9376] Discovery Response from 192.168.10.1 [*09/13/2024 07:11:42.0363] Start: RPC thread 1105710224 created. [*09/13/2024 07:13:42.0000] [*09/13/2024 07:13:42.0000] CAPWAP State: DTLS Setup [*09/13/2024 07:11:37.8876] CAPWAP State: Discovery [*09/13/2024 07:11:37.8876] Discovery Response from 192.168.10.1 [*09/13/2024 07:11:37.9376] Discovery Response from 192.168.10.1 [*09/13/2024 07:11:37.9376] Discovery Response from 192.168.10.1 [*09/13/2024 07:11:42.0363] Start: RPC thread 1105710224 created. [*09/13/2024 07:13:42.0000] [*09/13/2024 07:13:42.0000] CAPWAP State: DTLS Setup [*09/13/2024 07:14:15.3696] [*09/13/2024 07:14:15.3696] phy_value=0: org="0x1000" phy_reg="0x1000" [*09/13/2024 07:14:15.3696] device wired1 left promiscuous mode [*09/13/2024 07:14:39.0222] [*09/13/2024 07:14:39.0222] CAPWAP State: DTLS Teardown [*09/13/2024 07:14:39.1621] upgrade.sh: Script called with args:[ABORT] [*09/13/2024 07:14:39.2021] do ABORT, part2 is active part [*09/13/2024 07:14:39.2421] upgrade.sh: Cleanup tmp files ... [*09/13/2024 07:14:39.2621] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Teardown(4). [*09/13/2024 07:14:39.2621] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: DTLS Teardown(4). [*09/13/2024 07:14:43.7907] No more AP manager addresses remain.. [*09/13/2024 07:14:43.7907] No valid AP manager found for controller 'SWS-test' (ip: 192.168.10.1) [*09/13/2024 07:14:43.7907] Failed to join controller SWS-test. [*09/13/2024 07:14:43.7907] Failed to join controller.