cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1297
Views
0
Helpful
9
Replies

AIR-2802e-a-k9 into a standalone AP

telecom.vdm
Level 1
Level 1

Hi,

I have issues while changing my AIR-2802e-a-k9 into a standalone AP. I used the below command with tftp

#ap-type mobility-express tftp://192.168.20.50/AIR-AP2800-K9-ME-8-10-185-0.tar

The new image is downloaded successfully, however I have the following error : 

unable to boot from prefered partition part1. Booted on part2

And once boot process completed, the AP continue to reboot itself . reason : CAPWAP discover fail

 

How can I fix this and force the AP to boot with the new ME image ? 

 

Thank you

9 Replies 9

marce1000
VIP
VIP

 

 - Post the complete boot process of the AP . 

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

telecom.vdm
Level 1
Level 1

BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled


General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.44
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **


U-Boot 2013.01-g2ee3a18aa (Jun 03 2022 - 11:27:17) SDK version: 2015_T2.0p10

Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae448
BSS: 0x3ffeff0c
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 1, name "part2"
Loading file 'part2/part.bin' to addr 0x02000000 with size 18656147 (0x011cab93)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2017-10-30 0:48:00 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 18655139 Bytes = 17.8 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4007208 Bytes = 3.8 MiB
Image 1: 14632351 Bytes = 14 MiB
Image 2: 15563 Bytes = 15.2 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x031c6b18
Loading Multi-File Image ... OK
OK
Loading Device Tree to 01ff9000, end 01fffcca ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1016028K/1048576K available (5592K kernel code, 362K rwdata, 2348K rodata, 343K init, 465K bss, 32548K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:05.6200] buginf tty flushing thread started, ttyport=bf0f2000
[01/01/1970 00:00:05.7900] m25p80 spi1.0: found mx25l3206, expected n25q032
[01/01/1970 00:00:06.0100] i2c i2c-0: of_i2c: modalias failure on /soc/internal-regs/i2c@11000/chan2
[01/01/1970 00:00:07.0600] UBI warning: print_rsvd_warning: cannot reserve enough PEBs for bad PEB handling, reserved 20, need 32
[*01/01/1970 00:00:07.2104] buginf() enabled.

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

[*01/01/1970 00:00:07.2201] Made it into bootsh: Oct 29 2017 17:39:41
[*01/01/1970 00:00:07.2223] bootsh build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya
init started: BusyBox v1.20.2 (2017-10-29 16:46:16 PDT)

 

User Access Verification
Username: [*01/01/1970 00:00:13.0701]
[*01/01/1970 00:00:13.0701]
[*01/01/1970 00:00:13.0701]
[*01/01/1970 00:00:13.0701]
[*01/01/1970 00:00:13.0701] Authenticating ACT2 ID:AP2800
[*01/01/1970 00:00:13.0701] Authenticating SN:FDO22372WWN
[*01/01/1970 00:00:13.0705]
[*01/01/1970 00:00:13.0705] (ACT2Boot) Hardware is Cisco (c) authentic
[*01/01/1970 00:00:13.0706]
[*09/19/2018 23:59:59.0054] [11/03/2019 11:27:13.4000] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
Last reload time[11/03/2019 11:27:13.4900] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
: Nov 3 11:27:13 2019
[*11/03/2019 11:27:13.0001] Setting system time Sun Nov 3 11:27:13 UTC 2019
[*11/03/2019 11:27:13.0109] /usr/bin/btldr_upgrade: Bootloader booted on master version 0x144 Bundle: none
[*11/03/2019 11:27:13.0109] Verifying shadow against master...
[*11/03/2019 11:27:13.0109] shadow version 144
[*11/03/2019 11:27:13.0109] No updates
[*11/03/2019 11:27:13.2559] Active version: 8.2.166.0
[*11/03/2019 11:27:13.2569] Backup version: 0.0.0.0
[*11/03/2019 11:27:14.7605] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 11:27:19.8560] Firmware download complete
[11/03/2019 11:27:19.9800] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[11/03/2019 11:27:20.0600] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[*11/03/2019 11:27:21.3138] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 11:27:25.6294] Firmware download complete
[*11/03/2019 11:27:26.0477] ifconfig: SIOCGIFFLAGS: No such device
[*11/03/2019 11:27:26.1555] Initializing NSS Firmware
[11/03/2019 11:27:29.2800] Disabling lock debugging due to kernel taint
[*11/03/2019 11:27:29.2853] stil[11/03/2019 11:27:29.3700] stile module dp init successfully
e_lm_ft_barbados[11/03/2019 11:27:29.4500] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 : module licenseNBAR VERSION: 'Copyright (c) module build date: Jan 28 2016 at 10:43:16
2014-2015 by cisco Systems, Inc.' taints kernel.
[*11/03/2019 11:27:30.8953]
[*11/03/2019 11:27:30.8984] boot 127 build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya board barbados mac 70:6D:15:05:DD:B2
[*11/03/2019 11:27:30.9009] Module: act2_driver .text=0x7f000000 data=0x7f000770 bss=0x7f000a04
[*11/03/2019 11:27:30.9009] Module: aptrace .text=0x7f004000 data=0x7f00bd8c bss=0x7f00c1f0
[*11/03/2019 11:27:30.9009] Module: ap8x .text=0x7f013000 data=0x7f0bde6c bss=0x7f0c37c8
[*11/03/2019 11:27:30.9009] Module: mv_nss_api .text=0x7f290000 data=0x7f2decd8 bss=0x7f2e00e8
[*11/03/2019 11:27:30.9009] Module: proclikefs .text=0x7f2ef000 data= bss=0x7f2efb80
[*11/03/2019 11:27:30.9009] Module: stile_lm_ft .text= data= bss=
[*11/03/2019 11:27:30.9009] Module: stile_lm_dp .text= data= bss=
[*11/03/2019 11:27:30.9009] Module: mtdoops .text=0x7fb80000 data=0x7fb80dd8 bss=0x7fb80f50
[*11/03/2019 11:27:30.9009] Module: ansi_cprng .text=0x7fb85000 data=0x7fb858bc bss=0x7fb85af8
[*11/03/2019 11:27:30.9009] Module: crc_itu_t .text=0x7fb89000 data= bss=
[*11/03/2019 11:27:30.9009] Module: rng_core .te[11/03/2019 11:27:32.1600] wired0 emac 2: link up
xt=0x7fb8d000 [11/03/2019 11:27:32.2300] wired0: link up
data=0x7fb8d818 bss=0x7fb8d9d8
[*11/03/2019 11:27:30.9009] Module: udf .text=0x7fb91000 data=0x7fba0f34 bss=0x7fba10b0
[*11/03/2019 11:27:31.0088] Last reload reason : 0: unknown
[*11/03/2019 11:27:39.2822]
[*11/03/2019 11:27:39.2822] Click sched monitor: schedulers = 1
[*11/03/2019 11:27:42.3246] ethernet_port wired0, ip 192.168.20.100, netmask 255.255.255.0, gw 192.168.20.1, mtu 1500, bcast 192.168.20.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*11/03/2019 11:27:53.5135] Create symlink /dev/mic_cert result 0
[*11/03/2019 11:27:53.5135] Loading certificates from storage...
[*11/03/2019 11:27:53.5256] SKU to radio FW
[*11/03/2019 11:27:53.5573] Generating key, this may take a while...
[*11/03/2019 11:27:58.3760] Public key portion is:
[*11/03/2019 11:27:58.3760] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnezqntUmIS1UDseXdIGl+nLFgkBkiuD0nomXzX4KtKMkl7Guu2HKZ/l+TTKSVuAN7G1N69+Ia92CuHqjSqbwfBsJong4SeXrwCTUFjl+R5dMic5jtFL3X4b0U4JURCUUm4aTEWTFbrrpPrnJjXaZ9wFpQA+a5+7UsY/UCPjJmV/7bFqFhcJOwSdoyCS3Yiw9D5/nmayWZ84D+6l/9Dj3+XIU+JLR/H1HHOOz+Ymn4GINp8Nc68xAvP5HW0b7quZX/tIOf63wJMfEUezNu1Z5GIzDn31KFu6O7J8bGYErhl9Lj2M7fx/IZXfvIvfhtwSnrKTfprSo6wAhU2t/MZBhV root@m706D1505DDB2
[*11/03/2019 11:27:58.3760] Fingerprint: md5 a5:df:af:59:a1:e6:dc:91:b4:3d:c3:bf:e3:2a:31:72
[*11/03/2019 11:27:58.4612] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_XOR_5G_FILE__/\/radio_fw\/X5.csv/g' -e 's/__EVM_POWER_XOR_5G_FILE__/\/radio_fw\/EVM_X5.csv/g' -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/11/g' -e 's/__PRODUCT_ID__/AIR-AP2802E-A-K9/g' -e 's/__AP_TYPE__/55/g' -e 's/__WIRELESS_MAC__/F8:0F:6F:4B:52:80/g' -e 's/__WIRED_MAC__/70:6D:15:05:DD:B2/g' -e 's/__WIRED1_MAC__/70:6D:15:05:DD:B2/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*11/03/2019 11:27:58.5510] Password for 'Cisco' changed
[*11/03/2019 11:27:59.6864] Stopped Radio 0
[*11/03/2019 11:27:59.7019] DOT11_DRV[0]: set_channel Channel set to 6
[*11/03/2019 11:28:00.3343] Stopped Radio 1
[*11/03/2019 11:28:00.3498] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:00.9858] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:01.3030] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:01.3175] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:01.8728] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:02.2478] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:02.6284] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:03.0079] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:03.0199] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:03.6149] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:03.7447] WTP IP Address = 192.168.20.100
[*11/03/2019 11:28:04.0752] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:04.4414] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:04.5037] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:05.1101] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:28:05.4893] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:05.9610] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:06.4342] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:06.5370] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:07.2321] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:28:07.3608] CAPWAP State: Discovery
[*11/03/201[11/03/2019 11:28:07.4100] device capwap0 entered promiscuous mode
9 11:28:07.3629] Discovery Reque[11/03/2019 11:28:07.5200] device capwap1 entered promiscuous mode
st sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:28:07.3634] CAPWAP State: Init
[*11/03/2019 11:28:07.3635] CAPWAP State: Discovery
[*11/03/2019 11:28:16.8637] CAPWAP State: Discovery
[*11/03/2019 11:28:16.8654] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:28:26.3664] CAPWAP State: Discovery
[*11/03/2019 11:28:26.3706] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:28:35.8691] CAPWAP State: Discovery
[*11/03/2019 11:28:35.8707] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:28:45.3718] CAPWAP State: Discovery
[*11/03/2019 11:28:45.3738] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:28:54.8746] CAPWAP State: Discovery
[*11/03/2019 11:28:54.8762] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:29:04.3774] CAPWAP State: Discovery
[*11/03/2019 11:29:04.3793] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:29:13.8801] CAPWAP State: Discovery
[*11/03/2019 11:29:13.8817] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:29:23.3828] CAPWAP State: Discovery
[*11/03/2019 11:29:23.3867] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:29:32.8856] CAPWAP State: Discovery
[*11/03/2019 11:29:32.8872] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:29:42.3883] CAPWAP State: Discovery
[*11/03/2019 11:29:42.3899] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:29:51.8914] CAPWAP State: Discovery
[*11/03/2019 11:29:51.8932] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:01.3938] CAPWAP State: Discovery
[*11/03/2019 11:30:01.3954] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:10.8966] CAPWAP State: Discovery
[*11/03/2019 11:30:10.8981] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:20.3993] CAPWAP State: Discovery
[*11/03/2019 11:30:20.4032] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:29.9020] CAPWAP State: Discovery
[*11/03/2019 11:30:29.9040] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:39.4048] CAPWAP State: Discovery
[*11/03/2019 11:30:39.4064] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:48.9076] CAPWAP State: Discovery
[*11/03/2019 11:30:48.9092] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:30:58.4103] CAPWAP State: Discovery
[*11/03/2019 11:30:58.4118] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:31:00.0086] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 11:31:00.6602] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 11:31:07.9130] CAPWAP State: Discovery
[*11/03/2019 11:31:07.9146] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:31:17.4158] CAPWAP State: Discovery
[*11/03/2019 11:31:17.4196] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:31:26.9185] CAPWAP State: Discovery
[*11/03/2019 11:31:26.9201] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:31:36.4212] CAPWAP State: Discovery
[*11/03/2019 11:31:36.4229] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:31:45.9239] CAPWAP State: Discovery
[*11/03/2019 11:31:45.9255] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:31:55.4267] CAPWAP State: Discovery
[*11/03/2019 11:31:55.4287] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:32:04.9295] CAPWAP State: Discovery

telecom.vdm
Level 1
Level 1

[*11/03/2019 11:32:04.9311] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:32:14.4322] CAPWAP State: Discovery
[*11/03/2019 11:32:14.4361] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:32:23.9349] CAPWAP State: Discovery
[*11/03/2019 11:32:23.9365] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:32:33.4377] CAPWAP State: Discovery
[*11/03/2019 11:32:33.4396] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:32:42.9404] CAPWAP State: Discovery
[*11/03/2019 11:32:42.9420] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:32:52.4432] CAPWAP State: Discovery
[*11/03/2019 11:32:52.4448] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:01.9460] CAPWAP State: Discovery
[*11/03/2019 11:33:01.9476] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:11.4487] CAPWAP State: Discovery
[*11/03/2019 11:33:11.4526] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:20.9514] CAPWAP State: Discovery
[*11/03/2019 11:33:20.9534] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:30.4542] CAPWAP State: Discovery
[*11/03/2019 11:33:30.4558] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:39.9570] CAPWAP State: Discovery
[*11/03/2019 11:33:39.9585] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:49.4597] CAPWAP State: Discovery
[*11/03/2019 11:33:49.4613] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:33:58.9624] CAPWAP State: Discovery
[*11/03/2019 11:33:58.9643] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:34:00.0085] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 11:34:00.6603] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 11:34:08.4652] CAPWAP State: Discovery
[*11/03/2019 11:34:08.4690] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:34:17.9679] CAPWAP State: Discovery
[*11/03/2019 11:34:17.9695] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:34:27.4707] CAPWAP State: Discovery
[*11/03/2019 11:34:27.4723] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:34:36.9734] CAPWAP State: Discovery
[*11/03/2019 11:34:36.9750] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:34:46.4765] CAPWAP State: Discovery
[*11/03/2019 11:34:46.4784] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:34:55.9789] CAPWAP State: Discovery
[*11/03/2019 11:34:55.9805] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:35:05.4817] CAPWAP State: Discovery
[*11/03/2019 11:35:05.4833] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:35:14.9844] CAPWAP State: Discovery
[*11/03/2019 11:35:14.9860] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:35:24.4872] CAPWAP State: Discovery
[*11/03/2019 11:35:24.4891] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:35:33.9899] CAPWAP State: Discovery
[*11/03/2019 11:35:33.9915] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:35:43.4926] CAPWAP State: Discovery
[*11/03/2019 11:35:43.4942] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:35:52.9954] CAPWAP State: Discovery
[*11/03/2019 11:35:52.9970] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:36:02.4979] Failed to discover MWAR for 50 times, reboot AP...
[*11/03/2019 11:36:02.5014] AP Rebooting: Reset Request from Controller(Capwap Discovery Failed)


Writing reload timestamp (Sun Nov 3 11:36:02 UTC 2019) to disk


[*11/03/2019 11:36:02.5407] cp: can't stat '/storage/cisco_cli_history': No such file or directory
[*11/03/2019 11:36:03.5407] umount: can't umount /storage: Device or resource busy
failed to unmount /storage; waiting 1s and trying again.
[*11/03/2019 11:[11/03/2019 11:36:04.5400] device capwap0 left promiscuous mode
The system is going[11/03/2019 11:36:04.6700] device capwap1 left promiscuous mode
down NOW!
Sent SIGTERM to all processes
Sent SIGKILL to all processes
Requesting system reboot84]
[11/03/2019 11:36:06.6200] reboot: Restarting system
[11/03/2019 11:36:06.6800] SMP: failed to stop secondary CPUs

BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled


General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.44
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **


U-Boot 2013.01-g2ee3a18aa (Jun 03 2022 - 11:27:17) SDK version: 2015_T2.0p10

Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae448
BSS: 0x3ffeff0c
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 1, name "part2"
Loading file 'part2/part.bin' to addr 0x02000000 with size 18656147 (0x011cab93)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2017-10-30 0:48:00 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 18655139 Bytes = 17.8 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4007208 Bytes = 3.8 MiB
Image 1: 14632351 Bytes = 14 MiB
Image 2: 15563 Bytes = 15.2 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x031c6b18
Loading Multi-File Image ... OK
OK
Loading Device Tree to 01ff9000, end 01fffcca ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1016028K/1048576K available (5592K kernel code, 362K rwdata, 2348K rodata, 343K init, 465K bss, 32548K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:05.6100] buginf tty flushing thread started, ttyport=bf12b800
[01/01/1970 00:00:05.7300] m25p80 spi1.0: found mx25l3206, expected n25q032
[01/01/1970 00:00:05.9500] i2c i2c-0: of_i2c: modalias failure on /soc/internal-regs/i2c@11000/chan2
[01/01/1970 00:00:07.0000] UBI warning: print_rsvd_warning: cannot reserve enough PEBs for bad PEB handling, reserved 20, need 32
[*01/01/1970 00:00:07.1504] buginf() enabled.

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

[*01/01/1970 00:00:07.1602] Made it into bootsh: Oct 29 2017 17:39:41
[*01/01/1970 00:00:07.1625] bootsh build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya
init started: BusyBox v1.20.2 (2017-10-29 16:46:16 PDT)

 

User Access Verification
Username: [*01/01/1970 00:00:13.0082]
[*01/01/1970 00:00:13.0082]
[*01/01/1970 00:00:13.0082]
[*01/01/1970 00:00:13.0082]
[*01/01/1970 00:00:13.0082] Authenticating ACT2 ID:AP2800
[*01/01/1970 00:00:13.0082] Authenticating SN:FDO22372WWN
[*01/01/1970 00:00:13.0086]
[*01/01/1970 00:00:13.0087] (ACT2Boot) Hardware is Cisco (c) authentic
[*01/01/1970 00:00:13.0087]
[*09/19/2018[11/03/2019 11:36:02.3900] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
23:59:59.0055] [11/03/2019 11:36:02.4700] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
Last reload time: Nov 3 11:36:02 2019
[*11/03/2019 11:36:02.0001] Setting system time Sun Nov 3 11:36:02 UTC 2019
[*11/03/2019 11:36:02.0109] /usr/bin/btldr_upgrade: Bootloader booted on master version 0x144 Bundle: none
[*11/03/2019 11:36:02.0109] Verifying shadow against master...
[*11/03/2019 11:36:02.0109] shadow version 144
[*11/03/2019 11:36:02.0109] No updates
[*11/03/2019 11:36:02.2559] Active version: 8.2.166.0
[*11/03/2019 11:36:02.2569] Backup version: 0.0.0.0
[*11/03/2019 11:36:03.7436] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 11:36:08.8533] Firmware download complete
[11/03/2019 11:36:08.9800] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[11/03/2019 11:36:09.0600] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[*11/03/2019 11:36:10.3125] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 11:36:14.6525] Firmware download complete
[*11/03/2019 11:36:15.0777] [11/03/2019 11:36:18.3100] Disabling lock debugging due to kernel taint
[*11/03/2019 11:36:18.3207] stil[11/03/2019 11:36:18.4000] stile module dp init successfully
e_lm_ft_barbados[11/03/2019 11:36:18.4900] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 : module licenseNBAR VERSION: 'Copyright (c) module build date: Jan 28 2016 at 10:43:16
2014-2015 by cisco Systems, Inc.' taints kernel.
[*11/03/2019 11:36:19.9309]
[*11/03/2019 11:36:19.9339] boot 128 build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya board barbados mac 70:6D:15:05:DD:B2
[*11/03/2019 11:36:19.9367] Module: act2_driver .text=0x7f000000 data=0x7f000770 bss=0x7f000a04
[*11/03/2019 11:36:19.9367] Module: aptrace .text=0x7f004000 data=0x7f00bd8c bss=0x7f00c1f0
[*11/03/2019 11:36:19.9367] Module: ap8x .text=0x7f013000 data=0x7f0bde6c bss=0x7f0c37c8
[*11/03/2019 11:36:19.9367] Module: mv_nss_api .text=0x7f290000 data=0x7f2decd8 bss=0x7f2e00e8
[*11/03/2019 11:36:19.9367] Module: proclikefs .text=0x7f2ef000 data= bss=0x7f2efb80
[*11/03/2019 11:36:19.9367] Module: stile_lm_ft .text= data= bss=
[*11/03/2019 11:36:19.9367] Module: stile_lm_dp .text= data= bss=
[*11/03/2019 11:36:19.9367] Module: mtdoops .text=0x7fb80000 data=0x7fb80dd8 bss=0x7fb80f50
[*11/03/2019 11:36:19.9367] Module: ansi_cprng .text=0x7fb85000 data=0x7fb858bc bss=0x7fb85af8
[*11/03/2019 11:36:19.9368] Module: crc_itu_t .text=0x7fb89000 data= bss=
[*11/03/2019 11:36:19.9368] Module: rng_core .te[11/03/2019 11:36:21.2000] wired0 emac 2: link up
xt=0x7fb8d000 [11/03/2019 11:36:21.2700] wired0: link up
data=0x7fb8d818 bss=0x7fb8d9d8
[*11/03/2019 11:36:19.9368] Module: udf .text=0x7fb91000 data=0x7fba0f34 bss=0x7fba10b0
[*11/03/2019 11:36:20.0495] Last reload reason : 2: Capwap Discovery Failed
[*11/03/2019 11:36:28.3141]
[*11/03/2019 11:36:28.3141] Click sched monitor: schedulers = 1
[*11/03/2019 11:36:31.3677] ethernet_port wired0, ip 192.168.20.100, netmask 255.255.255.0, gw 192.168.20.1, mtu 1500, bcast 192.168.20.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*11/03/2019 11:36:42.5549] Create symlink /dev/mic_cert result 0
[*11/03/2019 11:36:42.5549] Loading certificates from storage...
[*11/03/2019 11:36:42.5671] SKU to radio FW
[*11/03/2019 11:36:42.5986] Generating key, this may take a while...
[*11/03/2019 11:36:43.1870] Public key portion is:
[*11/03/2019 11:36:43.1870] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCrNLJVLZo42rvze5m7S55Zms39ccyCgQwuh6ItDQ1iOzpPcRJuy3Cxn5n1vdo3sG0YXyhaHN6Q08ujlfb4gWaVZdBt9XpxmMisJSy0PEpmdfbGHp0qWjjag3duoLEO7+uagjuc11unhu38u0P+1t6tbVFENPXo05LYkS2xXDiwsHT/ymseK8EIb9hpfYc/NmkhSg/sH0Sp2/Eq318LfwwJg/NhqYeMV0IqSka/mDXXfxJL5MF4X5O0ZZiMVPV63WqnkC2jMbj76LHspqy7sNBBK+KpUvPLGKi6ljhUX2KA0i05aV/8F/ZHPiSYS6ubWQwrF8q9loVQHXqfjpP5eoK9 root@m706D1505DDB2
[*11/03/2019 11:36:43.1870] Fingerprint: md5 ab:43:dd:35:2a:c9:4a:99:8f:18:4f:7a:48:16:04:86
[*11/03/2019 11:36:43.2721] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_XOR_5G_FILE__/\/radio_fw\/X5.csv/g' -e 's/__EVM_POWER_XOR_5G_FILE__/\/radio_fw\/EVM_X5.csv/g' -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/11/g' -e 's/__PRODUCT_ID__/AIR-AP2802E-A-K9/g' -e 's/__AP_TYPE__/55/g' -e 's/__WIRELESS_MAC__/F8:0F:6F:4B:52:80/g' -e 's/__WIRED_MAC__/70:6D:15:05:DD:B2/g' -e 's/__WIRED1_MAC__/70:6D:15:05:DD:B2/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*11/03/2019 11:36:44.5167] Stopped Radio 1
[*11/03/2019 11:36:44.5322] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:45.1644] Stopped Radio 0
[*11/03/2019 11:36:45.1799] DOT11_DRV[0]: set_channel Channel set to 6
[*11/03/2019 11:36:47.2754] waiting for POE negotiation to complete
[*11/03/2019 11:36:47.2754]
[*11/03/2019 11:36:49.3345] Password for 'Cisco' changed
[*11/03/2019 11:36:49.6615] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:49.9760] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:49.9880] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:50.5440] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:50.9192] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:51.2995] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:51.6779] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:51.6900] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:52.2834] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:52.4129] WTP IP Address = 192.168.20.100
[*11/03/2019 11:36:52.7495] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:53.1145] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:53.1767] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:53.7823] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 11:36:54.1587] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:54.6322] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:55.0992] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:55.2015] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:55.9024] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 11:36:56.0312] CAPWAP State: Discovery
[*11/03/201[11/03/2019 11:36:56.0800] device capwap0 entered promiscuous mode
9 11:36:56.0332] Discovery Reque[11/03/2019 11:36:56.1900] device capwap1 entered promiscuous mode
st sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:36:56.0337] CAPWAP State: Init
[*11/03/2019 11:36:56.0338] CAPWAP State: Discovery
[*11/03/2019 11:37:05.5864] CAPWAP State: Discovery
[*11/03/2019 11:37:05.5880] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:37:15.0890] CAPWAP State: Discovery
[*11/03/2019 11:37:15.0932] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:37:24.5917] CAPWAP State: Discovery
[*11/03/2019 11:37:24.5933] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 11:37:34.0944] CAPWAP State: Discovery

telecom.vdm
Level 1
Level 1

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2023.09.27 10:46:05 =~=~=~=~=~=~=~=~=~=~=~=

BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled


General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.44
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **


U-Boot 2013.01-g2ee3a18aa (Jun 03 2022 - 11:27:17) SDK version: 2015_T2.0p10

Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae448
BSS: 0x3ffeff0c
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 3  2  1  0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 1, name "part2"
Loading file 'part2/part.bin' to addr 0x02000000 with size 18656147 (0x011cab93)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2017-10-30 0:48:00 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 18655139 Bytes = 17.8 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4007208 Bytes = 3.8 MiB
Image 1: 14632351 Bytes = 14 MiB
Image 2: 15563 Bytes = 15.2 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x031c6b18
Loading Multi-File Image ... OK
OK
Loading Device Tree to 01ff9000, end 01fffcca ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1016028K/1048576K available (5592K kernel code, 362K rwdata, 2348K rodata, 343K init, 465K bss, 32548K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:05.6300] buginf tty flushing thread started, ttyport=bc921400
[01/01/1970 00:00:05.7500] m25p80 spi1.0: found mx25l3206, expected n25q032
[01/01/1970 00:00:05.9700] i2c i2c-0: of_i2c: modalias failure on /soc/internal-regs/i2c@11000/chan2
[01/01/1970 00:00:07.0200] UBI warning: print_rsvd_warning: cannot reserve enough PEBs for bad PEB handling, reserved 20, need 32
[*01/01/1970 00:00:07.1695] buginf() enabled.

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

[*01/01/1970 00:00:07.1793] Made it into bootsh: Oct 29 2017 17:39:41
[*01/01/1970 00:00:07.1815] bootsh build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya
[*01/01/1970 00:00:08.3796] init started: BusyBox v1.20.2 (2017-10-29 16:46:16 PDT)


User Access Verification
Username: [*01/01/1970 00:00:13.0143]
[*01/01/1970 00:00:13.0143]
[*01/01/1970 00:00:13.0143]
[*01/01/1970 00:00:13.0143]
[*01/01/1970 00:00:13.0143] Authenticating ACT2 ID:AP2800
[*01/01/1970 00:00:13.0143] Authenticating SN:FDO22372WWN
[*01/01/1970 00:00:13.0147]
[*01/01/1970 00:00:13.0147] (ACT2Boot) Hardware is Cisco (c) authentic
[*01/01/1970 00:00:13.0148]
[*09/19/2018[11/03/2019 12:28:48.3800] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
23:59:59.0054] [11/03/2019 12:28:48.4700] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
Last reload time: Nov 3 12:28:48 2019
[*11/03/2019 12:28:48.0001] Setting system time Sun Nov 3 12:28:48 UTC 2019
[*11/03/2019 12:28:48.0109] /usr/bin/btldr_upgrade: Bootloader booted on master version 0x144 Bundle: none
[*11/03/2019 12:28:48.0109] Verifying shadow against master...
[*11/03/2019 12:28:48.0109] shadow version 144
[*11/03/2019 12:28:48.0109] No updates
[*11/03/2019 12:28:48.2557] Active version: 8.2.166.0
[*11/03/2019 12:28:48.2567] Backup version: 0.0.0.0
[*11/03/2019 12:28:49.7489] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 12:28:54.7654] Firmware download complete
[11/03/2019 12:28:54.8800] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[11/03/2019 12:28:54.9700] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[*11/03/2019 12:28:56.2244] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 12:29:00.5009] Firmware download complete
[*11/03/2019 12:29:00.9143] ifconfig: SIOCGIFFLAGS: No such device
[*11/03/2019 12:29:01.0287] Initializing NSS Firmware
[11/03/2019 12:29:04.1500] Disabling lock debugging due to kernel taint
[*11/03/2019 12:29:04.1580] stil[11/03/2019 12:29:04.2400] stile module dp init successfully
e_lm_ft_barbados[11/03/2019 12:29:04.3300] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 : module licenseNBAR VERSION: 'Copyright (c) module build date: Jan 28 2016 at 10:43:16
2014-2015 by cisco Systems, Inc.' taints kernel.
[*11/03/2019 12:29:05.7679]
[*11/03/2019 12:29:05.7712] boot 135 build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya board barbados mac 70:6D:15:05:DD:B2
[*11/03/2019 12:29:05.7737] Module: act2_driver .text=0x7f000000 data=0x7f000770 bss=0x7f000a04
[*11/03/2019 12:29:05.7737] Module: aptrace .text=0x7f004000 data=0x7f00bd8c bss=0x7f00c1f0
[*11/03/2019 12:29:05.7737] Module: ap8x .text=0x7f013000 data=0x7f0bde6c bss=0x7f0c37c8
[*11/03/2019 12:29:05.7737] Module: mv_nss_api .text=0x7f290000 data=0x7f2decd8 bss=0x7f2e00e8
[*11/03/2019 12:29:05.7737] Module: proclikefs .text=0x7f2ef000 data= bss=0x7f2efb80
[*11/03/2019 12:29:05.7737] Module: stile_lm_ft .text= data= bss=
[*11/03/2019 12:29:05.7737] Module: stile_lm_dp .text= data= bss=
[*11/03/2019 12:29:05.7737] Module: mtdoops .text=0x7fb80000 data=0x7fb80dd8 bss=0x7fb80f50
[*11/03/2019 12:29:05.7737] Module: ansi_cprng .text=0x7fb85000 data=0x7fb858bc bss=0x7fb85af8
[*11/03/2019 12:29:05.7737] Module: crc_itu_t .text=0x7fb89000 data= bss=
[*11/03/2019 12:29:05.7737] Module: rng_core .te[11/03/2019 12:29:07.0200] wired0 emac 2: link up
xt=0x7fb8d000 [11/03/2019 12:29:07.0900] wired0: link up
data=0x7fb8d818 bss=0x7fb8d9d8
[*11/03/2019 12:29:05.7737] Module: udf .text=0x7fb91000 data=0x7fba0f34 bss=0x7fba10b0
[*11/03/2019 12:29:05.8812] Last reload reason : 0: unknown
[*11/03/2019 12:29:14.1480]
[*11/03/2019 12:29:14.1480] Click sched monitor: schedulers = 1
[*11/03/2019 12:29:17.1945] ethernet_port wired0, ip 192.168.20.100, netmask 255.255.255.0, gw 192.168.20.1, mtu 1500, bcast 192.168.20.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false
[*11/03/2019 12:29:28.3883] Create symlink /dev/mic_cert result 0
[*11/03/2019 12:29:28.3883] Loading certificates from storage...
[*11/03/2019 12:29:28.4005] SKU to radio FW
[*11/03/2019 12:29:28.4315] Generating key, this may take a while...
[*11/03/2019 12:29:29.4862] Public key portion is:
[*11/03/2019 12:29:29.4863] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxEHVfFYfPWx3VnE/6YFdzrYsRbTsNt4IMI32JTLlLyLNPgLvebIC26Nb1M4WK7nf4PoLmUl5W46xb0E7hyjnLPnbzIJ2tgL2CjLzDL3GDimEgwSoThJEY8OavEUPH39j+un5Id14nj4GwzwqCmAGKwCXqW+tx4VSail0o54oFPeDpHRANFWAMRdTFNX7uQ2eSEKzRO11sPCFwd+EXxu7GwCMi4nqZSdXVB8+82EBsftXvSiXrmpgSsIFmfwnk8/e5p9v9MTArr9Zg/yWnB2LkPF/4D5OIE2lly0D/zRoIcEWJb+K4XNRu8nmvUOrtAk+5JvEw4yWbTbxeYuEdEQoJ root@m706D1505DDB2
[*11/03/2019 12:29:29.4863] Fingerprint: md5 7a:7d:8f:72:6f:dd:de:f4:70:61:3c:86:58:ee:53:e4
[*11/03/2019 12:29:29.5716] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_XOR_5G_FILE__/\/radio_fw\/X5.csv/g' -e 's/__EVM_POWER_XOR_5G_FILE__/\/radio_fw\/EVM_X5.csv/g' -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/11/g' -e 's/__PRODUCT_ID__/AIR-AP2802E-A-K9/g' -e 's/__AP_TYPE__/55/g' -e 's/__WIRELESS_MAC__/F8:0F:6F:4B:52:80/g' -e 's/__WIRED_MAC__/70:6D:15:05:DD:B2/g' -e 's/__WIRED1_MAC__/70:6D:15:05:DD:B2/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*11/03/2019 12:29:30.7953] Stopped Radio 1
[*11/03/2019 12:29:30.8109] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:31.4462] Stopped Radio 0
[*11/03/2019 12:29:31.4618] DOT11_DRV[0]: set_channel Channel set to 6
[*11/03/2019 12:29:33.6398] Password for 'Cisco' changed
[*11/03/2019 12:29:33.9677] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:34.2849] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:34.2970] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:34.8519] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:35.2272] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:35.6090] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:35.9891] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:36.0012] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:36.6034] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:36.7330] WTP IP Address = 192.168.20.100
[*11/03/2019 12:29:37.0638] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:37.4298] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:37.4919] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:38.1000] DOT11_DRV[0]: set_channel Channel set to 1
[*11/03/2019 12:29:38.4847] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:38.9562] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:39.4239] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:39.5265] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:40.2216] DOT11_DRV[1]: set_channel Channel set to 36
[*11/03/2019 12:29:40.3509] CAPWAP State: Discovery
[*11/03/2019 12:29:40.3531] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:29:40.3536] CAPWAP State: Init
[*11/03/2019 12:29:40.3538] CAPWAP State: Discovery
[11/03/2019 12:29:41.3800] device capwap0 entered promiscuous mode
[11/03/2019 12:29:41.4900] device capwap1 entered promiscuous mode
[*11/03/2019 12:29:49.8520] CAPWAP State: Discovery
[*11/03/2019 12:29:49.8536] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:29:59.3547] CAPWAP State: Discovery
[*11/03/2019 12:29:59.3566] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:30:08.8574] CAPWAP State: Discovery
[*11/03/2019 12:30:08.8591] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:30:18.3601] CAPWAP State: Discovery
[*11/03/2019 12:30:18.3616] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:30:27.8628] CAPWAP State: Discovery
[*11/03/2019 12:30:27.8644] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:30:37.3656] CAPWAP State: Discovery
[*11/03/2019 12:30:37.3675] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:30:46.8683] CAPWAP State: Discovery
[*11/03/2019 12:30:46.8699] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:30:56.3711] CAPWAP State: Discovery
[*11/03/2019 12:30:56.3727] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:31:05.8738] CAPWAP State: Discovery
[*11/03/2019 12:31:05.8754] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:31:15.3765] CAPWAP State: Discovery
[*11/03/2019 12:31:15.3782] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:31:24.8796] CAPWAP State: Discovery
[*11/03/2019 12:31:24.8812] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:31:34.3821] CAPWAP State: Discovery
[*11/03/2019 12:31:34.3836] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:31:43.8848] CAPWAP State: Discovery
[*11/03/2019 12:31:43.8864] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:31:53.3875] CAPWAP State: Discovery
[*11/03/2019 12:31:53.3891] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:02.8903] CAPWAP State: Discovery
[*11/03/2019 12:32:02.8922] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:12.3931] CAPWAP State: Discovery
[*11/03/2019 12:32:12.3946] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:21.8958] CAPWAP State: Discovery
[*11/03/2019 12:32:21.8974] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:31.1192] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 12:32:31.3985] CAPWAP State: Discovery
[*11/03/2019 12:32:31.4000] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:31.7718] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 12:32:40.9012] CAPWAP State: Discovery
[*11/03/2019 12:32:40.9028] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:50.4040] CAPWAP State: Discovery
[*11/03/2019 12:32:50.4055] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:32:59.9067] CAPWAP State: Discovery
[*11/03/2019 12:32:59.9084] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:33:09.4095] CAPWAP State: Discovery
[*11/03/2019 12:33:09.4111] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:33:18.9123] CAPWAP State: Discovery
[*11/03/2019 12:33:18.9139] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:33:28.4150] CAPWAP State: Discovery
[*11/03/2019 12:33:28.4169] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:33:37.9177] CAPWAP State: Discovery
[*11/03/2019 12:33:37.9194] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:33:47.4205] CAPWAP State: Discovery
[*11/03/2019 12:33:47.4244] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:33:56.9233] CAPWAP State: Discovery
[*11/03/2019 12:33:56.9249] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:34:06.4260] CAPWAP State: Discovery
[*11/03/2019 12:34:06.4279] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:34:15.9287] CAPWAP State: Discovery
[*11/03/2019 12:34:15.9302] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:34:25.4315] CAPWAP State: Discovery
[*11/03/2019 12:34:25.4330] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:34:34.9342] CAPWAP State: Discovery
[*11/03/2019 12:34:34.9358] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:34:44.4370] CAPWAP State: Discovery
[*11/03/2019 12:34:44.4409] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:34:53.9397] CAPWAP State: Discovery
[*11/03/2019 12:34:53.9416] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:35:03.4425] CAPWAP State: Discovery
[*11/03/2019 12:35:03.4440] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:35:12.9452] CAPWAP State: Discovery
[*11/03/2019 12:35:12.9468] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:35:22.4479] CAPWAP State: Discovery
[*11/03/2019 12:35:22.4495] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:35:31.1198] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 12:35:31.7722] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/03/2019 12:35:31.9507] CAPWAP State: Discovery
[*11/03/2019 12:35:31.9526] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:35:41.4534] CAPWAP State: Discovery
[*11/03/2019 12:35:41.4573] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:35:50.9561] CAPWAP State: Discovery
[*11/03/2019 12:35:50.9577] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:00.4589] CAPWAP State: Discovery
[*11/03/2019 12:36:00.4604] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:09.9616] CAPWAP State: Discovery
[*11/03/2019 12:36:09.9632] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:19.4648] CAPWAP State: Discovery
[*11/03/2019 12:36:19.4664] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:28.9671] CAPWAP State: Discovery
[*11/03/2019 12:36:28.9688] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:38.4699] CAPWAP State: Discovery
[*11/03/2019 12:36:38.4738] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:47.9726] CAPWAP State: Discovery
[*11/03/2019 12:36:47.9742] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:36:57.4754] CAPWAP State: Discovery
[*11/03/2019 12:36:57.4773] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:37:06.9781] CAPWAP State: Discovery
[*11/03/2019 12:37:06.9797] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:37:16.4809] CAPWAP State: Discovery
[*11/03/2019 12:37:16.4825] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:37:25.9836] CAPWAP State: Discovery
[*11/03/2019 12:37:25.9852] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/03/2019 12:37:35.4861] Failed to discover MWAR for 50 times, reboot AP...
[*11/03/2019 12:37:35.4895] AP Rebooting: Reset Request from Controller(Capwap Discovery Failed)

Writing reload timestamp (Sun Nov 3 12:37:35 UTC 2019) to disk


[*11/03/2019 12:37:35.5287] cp: can't stat '/storage/cisco_cli_history': No such file or directory
[*11/03/2019 12:37:36.5285] umount: can't umount /storage: Device or resource busy
failed to unmount /storage; waiting 1s and trying again.
[*11/03/2019 12:[11/03/2019 12:37:37.5200] device capwap0 left promiscuous mode
[*11/03/2019 12:37:37.5314] The[11/03/2019 12:37:37.6300] device capwap1 left promiscuous mode
system is going down NOW!
[*11/03/2019 12:37:37.5317] Sent SIGTERM to all processes
[*11/03/2019 12:37:38.5378] Sent SIGKILL to all processes
[*11/03/2019 12:37:38.5379] Requesting system reboot
[11/03/2019 12:37:39.5300] reboot: Restarting system
[11/03/2019 12:37:39.5900] SMP: failed to stop secondary CPUs

BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled


General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.44
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED

____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _ \
| |___ | |\__ \| (__| (_) |
\____||_||___/ \___|\___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ \ / _ \ / _ \| __|
| |_| |___| |_) | (_) | (_) | |_
\___/ |____/ \___/ \___/ \__|
** LOADER **


U-Boot 2013.01-g2ee3a18aa (Jun 03 2022 - 11:27:17) SDK version: 2015_T2.0p10

Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB

RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0

Map: Code: 0x3fed8000:0x3ffae448
BSS: 0x3ffeff0c
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)

Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 3  2  1  0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 1, name "part2"
Loading file 'part2/part.bin' to addr 0x02000000 with size 18656147 (0x011cab93)...
Done
SF: Detected MX25L3205D with page size 64 KiB, total 4 MiB

Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2017-10-30 0:48:00 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 18655139 Bytes = 17.8 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4007208 Bytes = 3.8 MiB
Image 1: 14632351 Bytes = 14 MiB
Image 2: 15563 Bytes = 15.2 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x031c6b18
Loading Multi-File Image ... OK
OK
Loading Device Tree to 01ff9000, end 01fffcca ... OK

Starting Device Tree update ('fdt_skip_update' = no)

Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful

Starting kernel ...

[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1016028K/1048576K available (5592K kernel code, 362K rwdata, 2348K rodata, 343K init, 465K bss, 32548K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:05.6100] buginf tty flushing thread started, ttyport=be87cc00
[01/01/1970 00:00:05.7900] m25p80 spi1.0: found mx25l3206, expected n25q032
[01/01/1970 00:00:06.0300] i2c i2c-0: of_i2c: modalias failure on /soc/internal-regs/i2c@11000/chan2
[01/01/1970 00:00:07.0800] UBI warning: print_rsvd_warning: cannot reserve enough PEBs for bad PEB handling, reserved 20, need 32
[*01/01/1970 00:00:07.2293] buginf() enabled.

Welcome to Cisco.

Usage of this device is governed by Cisco's End User License Agreement,
available at:
http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html.


Restricted Rights Legend

Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html


This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html


This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html


This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html.

[*01/01/1970 00:00:07.2391] Made it into bootsh: Oct 29 2017 17:39:41
[*01/01/1970 00:00:07.2414] bootsh build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya
[*01/01/1970 00:00:08.4665] init started: BusyBox v1.20.2 (2017-10-29 16:46:16 PDT)


User Access Verification
Username: [*01/01/1970 00:00:13.0814]
[*01/01/1970 00:00:13.0814]
[*01/01/1970 00:00:13.0814]
[*01/01/1970 00:00:13.0814]
[*01/01/1970 00:00:13.0814] Authenticating ACT2 ID:AP2800
[*01/01/1970 00:00:13.0814] Authenticating SN:FDO22372WWN
[*01/01/1970 00:00:13.0818]
[*01/01/1970 00:00:13.0818] (ACT2Boot) Hardware is Cisco (c) authentic
[*01/01/1970 00:00:13.0818]
[*09/19/2018[11/03/2019 12:37:35.3800] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
23:59:59.0054] [11/03/2019 12:37:35.4700] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
Last reload time: Nov 3 12:37:35 2019
[*11/03/2019 12:37:35.0001] Setting system time Sun Nov 3 12:37:35 UTC 2019
[*11/03/2019 12:37:35.0109] /usr/bin/btldr_upgrade: Bootloader booted on master version 0x144 Bundle: none
[*11/03/2019 12:37:35.0109] Verifying shadow against master...
[*11/03/2019 12:37:35.0109] shadow version 144
[*11/03/2019 12:37:35.0109] No updates
[*11/03/2019 12:37:35.2559] Active version: 8.2.166.0
[*11/03/2019 12:37:35.2569] Backup version: 0.0.0.0
[*11/03/2019 12:37:36.7485] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 12:37:41.8043] Firmware download complete
[11/03/2019 12:37:41.9300] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
[11/03/2019 12:37:42.0100] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
[*11/03/2019 12:37:43.2640] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/03/2019 12:37:47.5415] Firmware download complete
[*11/03/2019 12:37:47.9580] ifconfig: SIOCGIFFLAGS: No such device
[*11/03/2019 12:37:48.0653] Initializing NSS Firmware
[11/03/2019 12:37:51.1900] Disabling lock debugging due to kernel taint
[*11/03/2019 12:37:51.1957] stil[11/03/2019 12:37:51.2800] stile module dp init successfully
e_lm_ft_barbados[11/03/2019 12:37:51.3600] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 : module licenseNBAR VERSION: 'Copyright (c) module build date: Jan 28 2016 at 10:43:16
2014-2015 by cisco Systems, Inc.' taints kernel.
[*11/03/2019 12:37:52.8073]
[*11/03/2019 12:37:52.8104] boot 136 build T-755d39039e82d51f8adfd01a40ff30b608c7fa5b-g755d3903-vipendya board barbados mac 70:6D:15:05:DD:B2
[*11/03/2019 12:37:52.8130] Module: act2_driver .text=0x7f000000 data=0x7f000770 bss=0x7f000a04
[*11/03/2019 12:37:52.8130] Module: aptrace .text=0x7f004000 data=0x7f00bd8c bss=0x7f00c1f0
[*11/03/2019 12:37:52.8130] Module: ap8x .text=0x7f013000 data=0x7f0bde6c bss=0x7f0c37c8
[*11/03/2019 12:37:52.8130] Module: mv_nss_api .text=0x7f290000 data=0x7f2decd8 bss=0x7f2e00e8
[*11/03/2019 12:37:52.8130] Module: proclikefs .text=0x7f2ef000 data= bss=0x7f2efb80
[*11/03/2019 12:37:52.8130] Module: stile_lm_ft .text= data= bss=
[*11/03/2019 12:37:52.8130] Module: stile_lm_dp .text= data= bss=
[*11/03/2019 12:37:52.8130] Module: mtdoops .text=0x7fb80000 data=0x7fb80dd8 bss=0x7fb80f50
[*11/03/2019 12:37:52.8130] Module: ansi_cprng .text=0x7fb85000 data=0x7fb858bc bss=0x7fb85af8
[*11/03/2019 12:37:52.8130] Module: crc_itu_t .text=0x7fb89000 data= bss=
[*11/03/2019 12:37:52.8130] Module: rng_core .te[11/03/2019 12:37:54.0700] wired0 emac 2: link up
xt=0x7fb8d000 [11/03/2019 12:37:54.1400] wired0: link up
data=0x7fb8d818 bss=0x7fb8d9d8
[*11/03/2019 12:37:52.8130] Module: udf .text=0x7fb91000 data=0x7fba0f34 bss=0x7fba10b0
[*11/03/2019 12:37:52.9262] Last reload reason : 2: Capwap Discovery Failed
[*11/03/2019 12:38:01.1909]
[*11/03/2019 12:38:01.1909] Click sched monitor: schedulers = 1
[*11/03/2019 12:38:04.2418] ethernet_port wired0, ip 192.168.20.100, netmask 255.255.255.0, gw 192.168.20.1, mtu 1500, bcast 192.168.20.255, dns1 0.0.0.0, is_static true, vid 0, static_ip_failover false, dhcp_vlan_failover false
[

 

 - Well 'at least' it still seems to boot a capwap image , verify if AIR-AP2800-K9-ME-8-10-185-0.tar or related directories (named as such) can be found on the AP with the dir command and or look for a .bin file (too)

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

telecom.vdm
Level 1
Level 1

AP706D.1505.DDB2#dir % Unrecognized command
AP706D.1505.DDB2#
AP706D.1505.DDB2#
AP706D.1505.DDB2#
AP706D.1505.DDB2#
Exec mode commands
ap-type Set the access point type
archive Archive commands
capwap CAPWAP exec commands
clear Reset functions
config Configure parameters
copy Copy a file
debug Debugging functions (see also 'undebug')
delete Delete a file
disable Turn off privileged commands
enable Turn on privileged commands
exec-timeout Set the exec-timeout
logging Logging commands
logout Logout out from CLI
more Display a file
no Negate a command or set its defaults
ping Send echo messages
reload Halt and perform a cold restart
show Show running system information
terminal Terminal parameters
test Test susbystems, memory and interfaces
traceroute Trace route to destination undebug Disable debugging functions (see also 'debug')
AP706D.1505.DDB2#

telecom.vdm
Level 1
Level 1

AP706D.1505.DDB2#show flash
Directory of /storage/
total 48
-rw-r--r-- 1 root root 4 Nov 3 14:44 BOOT_COUNT
-rw-r--r-- 1 root root 4 Nov 3 14:44 BOOT_COUNT.reserve
-rw-r--r-- 1 root root 28 Nov 3 14:44 RELOADED_AT_UTC
drwxr-xr-x 3 root root 224 Sep 20 2018 application
-rw-r--r-- 1 root root 428 Nov 2 20:02 base_capwap_cfg_info
-rw-r--r-- 1 root root 225 Nov 2 17:24 bootloader.log
-rw-r--r-- 1 root root 5 Nov 2 16:34 bootloader_verify.shadow
-rw-r--r-- 1 root root 18 Nov 2 16:34 config
-rw-r--r-- 1 root root 0 Nov 3 14:44 config.local
-rw-r--r-- 1 root root 17 Nov 3 14:44 config.mobexp
drwxr-xr-x 2 root root 160 Sep 20 2018 cores
drwxr-xr-x 2 root root 320 Nov 2 16:35 dropbear
-rw-r--r-- 1 root root 217 Nov 2 16:59 last_good_uplink_config
drwxr-xr-x 2 root root 160 Sep 19 2018 lists
-rw-r--r-- 1 root root 63 Oct 25 17:47 part2_info.ver
-rw-r--r-- 1 root root 4096 Nov 3 14:44 random_seed
-rw-r--r-- 1 root root 3 Nov 2 16:34 rxtx_mode
-rw-r--r-- 1 root root 0 Nov 2 16:35 sensord_CSPRNG0
-rw-r--r-- 1 root root 0 Nov 2 16:35 sensord_CSPRNG1
drwxr-xr-x 3 support root 224 Sep 19 2018 support
drwxr-xr-x 2 root root 2200 Nov 3 14:44 syslogs
---------------------------------------------------------------------------
Filesystem Size Used Available Use% Mounted on
flash 57.5M 240.0K 54.3M 0% /storage

AP706D.1505.DDB2#

 

    - Verify md5sum of the mobility express image ,

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Rich R
VIP
VIP

Active version: 8.2.166.0 - that's a very old version of software running on the AP so first upgrade it to:
https://software.cisco.com/download/home/286304498/type/286288051/release/15.3.3-JF15
Then upgrade it to:
https://software.cisco.com/download/home/286304498/type/286288051/release/15.3.3-JK9
And only then try to convert to Mobility Express 8.10.185.0.
As Marce says you should always check the MD5 checksum of the downloaded file matches that shown on the Cisco download page.

Review Cisco Networking for a $25 gift card