×

cisco 1810 升级LWAP 固件 ap1g4-k9w8-tar.153-3

lixiaoyao lixiaoyao 发表于2020-04-07 14:25:18 浏览4124 评论0

抢沙发发表评论

[*04/07/2020 06:22:17.0522]
[*04/07/2020 06:22:17.0522] CAPWAP State: DTLS Teardown
[*04/07/2020 06:22:17.1621] do ABORT, part1 is active part
[*04/07/2020 06:22:17.1821] upgrade.sh: Cleanup tmp files ...
[*04/07/2020 06:22:31.8176]
[*04/07/2020 06:22:31.8176] CAPWAP State: Discovery
[*04/07/2020 06:22:31.8176] Discovery Request sent to 192.168.3.249, discovery type STATIC_CONFIG(1)
[*04/07/2020 06:22:31.8176] IP DNS query for CISCO-CAPWAP-CONTROLLER.lan
[*04/07/2020 06:22:31.8375] Discovery Request sent to 192.168.3.249, discovery type STATIC_CONFIG(1)
[*04/07/2020 06:22:31.8375] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*04/07/2020 06:22:31.8375] Discovery Response from 192.168.3.249

[*04/07/2020 06:23:14.0197] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Join(5).
[*04/07/2020 06:23:38.0522]
[*04/07/2020 06:23:38.0522] CAPWAP State: DTLS Teardown
[*04/07/2020 06:23:38.1621] do ABORT, part1 is active part
[*04/07/2020 06:23:38.1921] upgrade.sh: Cleanup tmp files ...

[*04/07/2020 06:23:52.8176] CAPWAP State: Discovery
[*04/07/2020 06:23:52.8375] Discovery Request sent to 192.168.3.249, discovery type STATIC_CONFIG(1)
[*04/07/2020 06:23:52.8375] IP DNS query for CISCO-CAPWAP-CONTROLLER.lan
[*04/07/2020 06:23:52.8475] Discovery Request sent to 192.168.3.249, discovery type STATIC_CONFIG(1)
[*04/07/2020 06:23:52.8475] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*04/07/2020 06:23:52.8475] Discovery Response from 192.168.3.249
User Access Verification
Username: cisco
Password:
AP00A2.8912.5410>en
Password:


[*04/07/2020 06:24:02.0000]
AP00A2.8912.5410#archive download-sw /reload tftp://192.168.3.20/ap1g4-k9w8-tar.153-3.JPJ3.tar
Starting download AP image tftp://192.168.3.20/ap1g4-k9w8-tar.153-3.JPJ3.tar ...
It may take a few minutes. If longer, please abort command, check network and try again.
######################################################################## 100.0%
Upgrading ...
do NO_UPGRADE, part1 is active part
do PREDOWNLOAD, part1 is active part
upgrade.sh: Start doing upgrade arg1=PREDOWNLOAD arg2=,from_cli arg3= ...
upgrade.sh: Using image /tmp/cli_part.tar on corsica ...
Image signing verify success.
upgrade.sh: btldr version: AP ver 37, image ver 38
Verify returns 0
Unlocking /dev/mtd4 ...
Erasing /dev/mtd4 ...
23+0 records in
23+0 records out
[*04/07/2020 06:25:00.9716]
[*04/07/2020 06:25:00.9716] CAPWAP State: DTLS Teardown
upgrade.sh: btldr is updated successfully!
upgrade.sh: Copying to /storage/boot_part2: info.ver
upgrade.sh: Copying to /storage/boot_part2: info
upgrade.sh: Copying to /storage/boot_part2: btldr.bin.lzma
[*04/07/2020 06:25:01.0815] do ABORT, part1 is active part
upgrade.sh: Copying to /storage/boot_part2: btldr_md5
[*04/07/2020 06:25:01.1015] upgrade.sh: Skip cleanup tmp files while upgrade is still in progress.
upgrade.sh: Done with copying corsica btldr to /storage/boot_part2
upgrade.sh: part to upgrade is part2
upgrade.sh: AP version1: part2 8.5.160.0, img 17.2.1.11
upgrade.sh: Updating UBI device...
[*04/07/2020 06:25:15.7270]
[*04/07/2020 06:25:15.7270] CAPWAP State: Discovery
[*04/07/2020 06:25:15.7370] Discovery Request sent to 192.168.3.249, discovery type STATIC_CONFIG(1)
[*04/07/2020 06:25:15.7370] IP DNS query for CISCO-CAPWAP-CONTROLLER.lan
[*04/07/2020 06:25:15.7470] Discovery Request sent to 192.168.3.249, discovery type STATIC_CONFIG(1)
[*04/07/2020 06:25:15.7569] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*04/07/2020 06:25:15.7569] Discovery Response from 192.168.3.249


upgrade.sh: AP version2: part2 17.2.1.11, img 17.2.1.11
upgrade.sh: AP backup  version: 17.2.1.11
upgrade.sh: Finished upgrade task.
upgrade.sh: Cleanup for do_upgrade...
upgrade.sh: /tmp/upgrade_in_progress cleaned
upgrade.sh: Cleanup tmp files ...
do ACTIVATE, part1 is active part
upgrade.sh: activate part2, set BOOT to part2
upgrade.sh: AP primary version after reload: 17.2.1.11
upgrade.sh: AP backup  version after reload: 8.10.112.0
Successfully setup AP image.
Archive done.


[*04/07/2020 06:25:23.1546] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
upgrade: archive CLI
         Stopping Cisco rtd service...
 5)      Stopping Pnp agent...
         Stopping gRPC server daemon...
         Stopping Clean Air daemon...
[*04/07/2020 06:25:24.9241] netlink socket init done, pnl->spectral_fd=4
         Stopping System Monitor service...
[  OK  ] Stopped Cisco printkd.
[  OK  ] Stopped Cisco led service.
[  OK  ] Stopped NSS Firmware Monitor daemon.
[  OK  ] Stopped Serial Getty on ttyS0.
[  OK  ] Stopped System Monitor service.
[  OK  ] Stopped Cisco klogd.
[  OK  ] Stopped NTP_PROC daemon.
[  OK  ] Stopped OpenSSH server daemon.
[  OK  ] Stopped Hostapd process.
[  OK  ] Stopped AP Trace daemon.
[  OK  ] Stopped Fast CGI daemon.
[  OK  ] Stopped Cisco rtd service.
[  OK  ] Stopped Clean Air daemon.
[  OK  ] Stopped WCPD process.
[  OK  ] Stopped DNSmasq.
[  OK  ] Stopped DNSmasq for host.
[  OK  ] Stopped PNP Syslog Service.
[  OK  ] Stopped DHCPv6 client.
[  OK  ] Stopped dhcpv6 client watcher.
[  OK  ] Stopped gRPC server daemon.
[  OK  ] Stopped capwapd.
[  OK  ] Removed slice system-serialx2dgetty.slice.
[  OK  ] Stopped Pnp agent.
[  OK  ] Stopped target Basic System.
[  OK  ] Stopped target Paths.
[  OK  ] Reached target Shutdown.
[04/07/2020 06:25:35.8607] Restarting system.


U-Boot 2012.07 (btldr release 37) (Jul 05 2019 - 13:29:57)

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

DRAM:  512 MiB
NAND (ONFI): Detected SPANSION S34MS02G2 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[0:1], write_counter=14
PCI0 Link Intialized
PCI1 Link Intialized
Net:   
Dev ID = 0x1302, QCA8337 Detected...
athrs17_reg_init: complete
athrs17_vlan_config ...done
MAC1 addr:0:a2:89:12:54:11
MAC2 addr:0:3:7f:ba:db:2
Valid I2C chip addresses: 51 52
AP 1810 detected...
Power Type: 802.3at POE detected...


Found new boot image.
Validating new image integrity ... Passed.
Erasing current boot.
Erasing at 0x16f000 -- 100% complete.
Copy boot image ...
................................................................................................................................................................................................................................................................................................................................
First validation passed.
Active new image.
................................
Second validation passed.
Disable backup copy ...
Erasing at 0x33f000 -- 100% complete.
Boot upgrade completed.

resetting ...


U-Boot 2012.07 (btldr release 38) (Oct 29 2019 - 06:39:45)

This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html

DRAM:  512 MiB
NAND (ONFI): Detected SPANSION S34MS02G2 [256 MiB]
SF: Detected Macronix MX25U3235F [4 MiB]
MFG data loaded
Scanning shenv data blocks
Total valid parts=4
Active shenv part[0:1], write_counter=14
PCI0 Link Intialized
PCI1 Link Intialized
Net:   
Dev ID = 0x1302, QCA8337 Detected...
athrs17_reg_init: complete
athrs17_vlan_config ...done
MAC1 addr:0:a2:89:12:54:11
MAC2 addr:0:3:7f:ba:db:2
Valid I2C chip addresses: 51 52
AP 1810 detected...
Power Type: 802.3at POE detected...
Signature returns 0
BL signing verification success, continue to run...
Auto boot mode, use bootipq directly
Hit ESC key to stop autoboot:  0
Specified BOOT: part2

Booting from part2

Read 1024 bytes from volume part2 to 45000000
Read 39416221 bytes from volume part2 to 45000000

访客