AP Firmware 2.2v Released!

This update includes refinements that enhance hotspot operation and provide improved insight into client activity.

  • Add support for displaying password/voucher used in Devices List.
  • Resolve issue when incorrect hotspot certificate is used when Let’s Encrypt certificate is renewed.

This update is being rolled out now. You can manually initiate the upgrade if you’d like, or it will automatically update overnight (if auto-updates are enabled). The complete, up-to-date change log is available here:

As always, if you have questions or encounter any issues, feel free to reply here or start a new topic. Please include details about the issue so we can assist you effectively.

1 Like

Thanks, Mike! Update seemed to install OK, but I started seeing this crash logged after updating a couple of APs manually.

Dec 11 18:38:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:37:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:37:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:36:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:34:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:33:45 LivingRoomAP daemon.info procd: Instance radsecproxy::instance1 s in a crash loop 6 crashes, 0 seconds since last crash
Dec 11 18:33:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:32:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:32:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:31:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:31:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:30:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:30:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:29:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:29:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:28:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:28:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:27:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:27:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:26:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:26:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:25:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:25:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:24:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:24:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:23:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:23:01 LivingRoomAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:22:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:21:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:20:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:19:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:18:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:17:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:16:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:15:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:14:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:13:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:12:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:11:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:10:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:09:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:08:12 LivingRoomAP daemon.info procd: Instance radsecproxy::instance1 s in a crash loop 6 crashes, 0 seconds since last crash
Dec 11 18:08:01 HallwayAP user.notice root: sent crash from /var/run/oops/2
Dec 11 18:08:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:07:05 HallwayAP user.notice root: failed to send crash (/var/run/oops/1): curl: (6) Could not resolve host: manage.alta.inc
Dec 11 18:06:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:05:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:04:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:03:01 HallwayAP user.notice root: sent crash from /var/run/oops/1

Seemed to continue even after rebooting the access points again. Wireless devices seem to be operating properly at the moment, but I wanted to post this just in case anyone else spotted this behavior. I’ll try to post an update if I notice it continuing tonight.

Quick edit:

This seems to precede these crashes that are being logged

Dec 11 18:52:01 HallwayAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962801] bfe0: 76eb6fac 76995ac4 0000feff 76f64174 60000010 ffffffff
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962794] bfc0: 00000000 01ca9db0 00000000 01ca9db0 76b847fc 00000000 00000002 76b4ece0
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962786] bfa0:                                     00000000 00000000 01ca9c68 00000000
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962780] Exception stack(0x95f3bfb0 to 0x95f3bff8)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962775] [<80312bb8>] (do_DataAbort) from [<80301d5c>] (__dabt_usr+0x3c/0x40)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962767] [<80312a18>] (do_page_fault) from [<80312bb8>] (do_DataAbort+0x38/0xb8)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962759] [<8031266c>] (__do_user_fault) from [<80312a18>] (do_page_fault+0x2e4/0x324)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962750] [<808e743c>] (dump_stack) from [<8031266c>] (__do_user_fault+0xbc/0xfc)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962739] [<8030aaf4>] (show_stack) from [<808e743c>] (dump_stack+0x88/0xa8)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962728] [<8030e9b0>] (unwind_backtrace) from [<8030aaf4>] (show_stack+0x10/0x14)
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962706] Hardware name: ipq5018-ap6pro, Version: 2.2v
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962701] CPU: 1 PID: 14520 Comm: rcstats Tainted: P                  5.4.213 #0
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962694] Control: 10c0383d  Table: 5859c06a  DAC: 00000055
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962690] Flags: nZCv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment user
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962684] r3 : 00000000  r2 : 01ca9c68  r1 : 00000000  r0 : 00000000
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962680] r7 : 01ca9db0  r6 : 00000000  r5 : 01ca9db0  r4 : 00000000
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962676] r10: 00000002  r9 : 00000000  r8 : 76b847fc
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962673] sp : 76995ac4  ip : 76eb6fac  fp : 76b4ece0
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962669] pc : [<76f64174>]    lr : [<0000feff>]    psr: 60000010
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962665] LR is at 0xfeff
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962661] PC is at 0x76f64174
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962650] Hardware name: ipq5018-ap6pro, Version: 2.2v
Dec 11 18:52:00 HallwayAP kern.warn kernel: [ 1033.962647] CPU: 1 PID: 14520 Comm: rcstats Tainted: P                  5.4.213 #0
Dec 11 18:52:00 HallwayAP kern.err kernel: [ 1033.962630] [00000000] *pgd=5802f835, *pte=00000000, *ppte=00000000
Dec 11 18:52:00 HallwayAP kern.err kernel: [ 1033.962626] pgd = 240a8854
Dec 11 18:52:00 HallwayAP kern.err kernel: [ 1033.962618] rcstats: unhandled page fault (11) at 0x00000000, code 0x017
Dec 11 18:52:00 HallwayAP kern.err kernel: [ 1033.962602] 8<--- cut here ---

Second Edit:

Seeing this on an AP at another test site as well unfortunately :frowning: Seems to specifically be affecting stat collection?

Dec 11 18:59:01 TestAP user.notice root: sent crash from /var/run/oops/1
Dec 11 18:59:01 TestAP user.notice root: scanning...
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473877] bfe0: 76ef1fac 769d0ac4 0000feff 76f9f174 60000010 ffffffff
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473870] bfc0: 00000000 01730f10 00000000 01730f10 0173124c 00000003 00000001 76ae7f90
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473862] bfa0:                                     00000000 00000000 01730dbc 00000000
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473855] Exception stack(0x9101bfb0 to 0x9101bff8)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473850] [<80312bb8>] (do_DataAbort) from [<80301d5c>] (__dabt_usr+0x3c/0x40)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473840] [<80312a18>] (do_page_fault) from [<80312bb8>] (do_DataAbort+0x38/0xb8)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473832] [<8031266c>] (__do_user_fault) from [<80312a18>] (do_page_fault+0x2e4/0x324)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473822] [<808e743c>] (dump_stack) from [<8031266c>] (__do_user_fault+0xbc/0xfc)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473806] [<8030aaf4>] (show_stack) from [<808e743c>] (dump_stack+0x88/0xa8)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473792] [<8030e9b0>] (unwind_backtrace) from [<8030aaf4>] (show_stack+0x10/0x14)
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473759] Hardware name: ipq5018-ap6pro, Version: 2.2v
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473755] CPU: 1 PID: 4777 Comm: rcstats Tainted: P                  5.4.213 #0
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473748] Control: 10c0383d  Table: 5bdf406a  DAC: 00000055
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473744] Flags: nZCv  IRQs on  FIQs on  Mode USER_32  ISA ARM  Segment user
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473738] r3 : 00000000  r2 : 01730dbc  r1 : 00000000  r0 : 00000000
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473734] r7 : 01730f10  r6 : 00000000  r5 : 01730f10  r4 : 00000000
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473730] r10: 00000001  r9 : 00000003  r8 : 0173124c
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473726] sp : 769d0ac4  ip : 76ef1fac  fp : 76ae7f90
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473722] pc : [<76f9f174>]    lr : [<0000feff>]    psr: 60000010
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473718] LR is at 0xfeff
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473710] PC is at 0x76f9f174
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473692] Hardware name: ipq5018-ap6pro, Version: 2.2v
Dec 11 18:59:00 TestAP kern.warn kernel: [  145.473687] CPU: 1 PID: 4777 Comm: rcstats Tainted: P                  5.4.213 #0
Dec 11 18:59:00 TestAP kern.err kernel: [  145.473669] [00000000] *pgd=5cf09835, *pte=00000000, *ppte=00000000
Dec 11 18:59:00 TestAP kern.err kernel: [  145.473664] pgd = 0d153ce3
Dec 11 18:59:00 TestAP kern.err kernel: [  145.473653] rcstats: unhandled page fault (11) at 0x00000000, code 0x017
Dec 11 18:59:00 TestAP kern.err kernel: [  145.473628] 8<--- cut here ---
1 Like

Thanks for the report @jmszuch. I’m seeing something here too. At least partially the same.. just got off a call, wanted to acknowledge we’ve seen your report and are investigating.

1 Like

Confirming there is a bug with rcstats, and there is a fix already, too. It was in the build of 2.2v we were testing internally but for some reason it missed the public tag. Investigating further, we’ll follow up.

1 Like

Thanks, Mike! Appreciate the update :slight_smile:

1 Like

No problem! The update with the rcstats fix is currently in testing. We’re doing a final verification and aiming to release tonight, pending that everything looks good.

1 Like

Thanks again! Fingers crossed everything looks good after the quick round of testing.

Somewhat related as I imagine it may have gotten side lined by this, but is there a new switch firmware release as well? I see it looks like 2.3n is waiting in the wings but there aren’t any release notes quite yet.

Thanks!

1 Like

Yeah, I got distracted by the bug report, so I’m sorry, that’s on me. I should’ve had those release notes up already.. Getting them posted now. Thanks!

1 Like

Totally understand! Figured I’d ask since I was thinking about it. Much appreciate you getting this and the switch release notes handled :smiley:

FWIW, 2.2w is live, release notes, posts, etc are about to go up. No problem!

2 Likes