Legacy image found Image Name: Juniper U-Boot Script File Image Type: ARM Unknown OS Script (uncompressed) Data Size: 1900 Bytes = 1.9 KiB Load Address: 00000000 Entry Point: 00000000 Contents: Image 0: 1892 Bytes = 1.8 KiB Verifying Checksum ... OK ## Executing script at 61000000 Setting bus to 0 SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB device 0 offset 0x140000, size 0x140000 SF: 1310720 bytes @ 0x140000 Read: OK 7313fffc: 5a6d1cc7 ..mZ crc32 for 73000000 ... 7313ffff ==> c71c6d5a Total of 1 word(s) were the same starting USB... USB0: USB EHCI 1.00 scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80 unable to get device descriptor (error=-1) 3 USB Device(s) found scanning usb for storage devices... 1 Storage Device(s) found SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005 ## Starting application at 0x00000074 ... Consoles: U-Boot console FreeBSD/armv6 U-Boot loader, Revision 1.2 (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016) DRAM: 2048MB Number of U-Boot devices: 2 U-Boot env: loaderdev not set, will probe all devices. Found U-Boot device: disk Probing all disk devices... Checking unit=0 slice= partition=... good. Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from previous installed Junos packages ... If previous set of packages are not available, we will boot from the currently installed set of packages. | /packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99] /packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7 /packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479] loading required module 'netstack' /packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de] /packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e] /packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602] /packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654] /packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c] /packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580] loading required module 'pvi_db' /packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617] loading required module 'devrt' /packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81] /packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6] loading required module 'miibus' /packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491] /packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5] /packages/sets/active/boot/os-kernel/contents.izo size=0x993800 /packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194] /packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747] /packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8] /packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94] /packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf] Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'. SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088 Booting [/packages/sets/active/boot/os-kernel/kernel]... Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'. Kernel entry at 0xc1000180... Kernel args: (null) ---<>--- GDB: no debug ports present KDB: debugger backends: ddb ndb KDB: current backend: ddb Copyright (c) 1992-2020 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022 builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm Juniper clang version 10.0.1 (git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902) module rtc already present! module wdog already present! module resetpfe already present! module crypto already present! arm unwind: module 'crypto.ko' not on list at unload time sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)! CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000) CPU Features: Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk Optional instructions: UMULL, SMULL, SIMD(ext) LoUU:2 LoC:2 LoUIS:2 Cache level 1: 32KB/32B 4-way data cache WB Read-Alloc Write-Alloc 32KB/32B 4-way instruction cache Read-Alloc real memory = 2147483648 (2048 MB) avail memory = 1985765376 (1893 MB) arc4random: no preloaded entropy cache Security policy loaded: JUNOS MAC/privcheck (mac_privcheck) Security policy loaded: Junos MAC/fips (mac_fips) Security policy loaded: MAC/veriexec (mac_veriexec) Security policy loaded: MAC/grantbylabel (mac_grantbylabel) Security policy loaded: Junos MAC/SDK (mac_sdk) MAC/veriexec fingerprint module loaded: SHA384 MAC/veriexec fingerprint module loaded: SHA1 MAC/veriexec fingerprint module loaded: SHA256 rescue: initialized netisr_init: forcing maxthreads from 4 to 1 random: entropy device external interface Initializing DCF platform properties .. Calling dcf_ng_hw_init for platform hw vecs initialization ofwbus0: simplebus0: on ofwbus0 ihost_armpll0: mem 0-0xfff on simplebus0 simplebus1: on ofwbus0 bcmidm0: mem 0x100000-0x1fffff on simplebus1 l2cache0: mem 0x22000-0x22fff on simplebus0 l2cache0: cannot allocate IRQ, not using interrupt l2cache0: Part number: 0x3, release: 0x9 (r3p3) l2cache0: L2 Cache enabled: 256KB/32B 16 ways bcmcru0: mem 0xe000-0xefff on simplebus1 gic0: mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0 gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256 mp_tmr0: mem 0x20200-0x202ff irq 1 on simplebus0 Timecounter "MPCore" frequency 625000000 Hz quality 800 mp_tmr1: mem 0x20600-0x2061f irq 2 on simplebus0 Event timer "MPCore" frequency 625000000 Hz quality 1000 cpulist0: on ofwbus0 cpu0: on cpulist0 cmic0: mem 0x3200000-0x32fffff irq 0 on ofwbus0 cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064: cmicbus0: on cmic0 cmicmdio0: on cmicbus0 epcmic0: mem 0x20000000-0x200fffff on ofwbus0 epccg0: mem 0x20800000-0x20807fff on ofwbus0 ccgmdio0: mem 0x2000-0x20ff on simplebus1 gpio0: mem 0xa000-0xa0ff irq 4 on simplebus1 gpiobus0: on gpio0 gpioc0: on gpio0 iichb0: mem 0x8000-0x8fff irq 5 on simplebus1 iicbus0: on iichb0 iic0: on iicbus0 iicswitch0: at addr 0xe0 on iicbus0 poe0: on iicswitch0 poe reset failed rtc8564je_rtc0: on iicswitch0 rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s cpld0: at addr 0x62 on iicbus0 cpldbus0: on cpld0 wdog0: on cpldbus0 oamctl0: on cpldbus0 fan0: on cpldbus0 fan1: on cpldbus0 resetctrl0: on cpldbus0 resetpfe0: on cpldbus0 resetphy0: on cpldbus0 bcmdmu0: mem 0xf000-0xffff on simplebus1 paxb0: mem 0x12000-0x12fff on simplebus1 uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1 uart0: [GIANT-LOCKED] uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1 uart1: console (9600,n,8,1) uart1: [GIANT-LOCKED] bcmrng0: mem 0x32000-0x32fff on simplebus1 random: registering fast source Broadcom RBG200 RNG bcm560xgmac0: mem 0x42000-0x42fff irq 8 on simplebus1 bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80 miibus0: on bcm560xgmac0 brgphy0: PHY 1 on miibus0 brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto ehci0: mem 0x48000-0x49fff irq 9 on simplebus1 ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064: usbus0: EHCI version 1.0 usbus0 on ehci0 spi0: mem 0x47000-0x47fff irq 10 on simplebus1 spibus0: on spi0 mx25l0: at cs 0 mode 0 on spibus0 mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K cryptosoft0: Initializing product: 169 .. JUNOS procfs is initialized. Timecounters tick every 10.000 msec tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0 Registering tcp_platform_dependent = tcp_handle_special_ports md0: Preloaded image 10041344 bytes at 0xc2f3a000 usbus0: 480Mbps High Speed USB v2.0 paxb0: PCIe PHY Link Status :0x1c paxb0: PCIe PHY-DL Link up :0x1c ugen0.1: at usbus0 uhub0: on usbus0 Trying to mount root from cd9660:/dev/md0.uzip []... uhub0: 3 ports with 3 removable, self powered ugen0.2: at usbus0 uhub1 on uhub0 uhub1: on usbus0 Entropy start-up health tests performed on 256 samples passed. random: unblocking device. uhub1: 4 ports with 3 removable, self powered ugen0.3: at usbus0 umass0 on uhub1 umass0: on usbus0 umass0: SCSI over Bulk-Only; quirks = 0x8100 umass0:0:0: Attached to scbus0 da0 at umass-sim0 bus 0 scbus0 target 0 lun 0 da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device da0: Serial Number 65001641D960D081 da0: 40.000MB/s transfers da0: 1910MB (3911680 512 byte sectors) da0: quirks=0x3 random: unblocking device. usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored) ** /dev/gpt/junos ** Last Mounted on /.mount ** Phase 1 - Check Blocks and Sizes INCORRECT BLOCK COUNT I=136802 (40 should be 0) CORRECT? yes INCORRECT BLOCK COUNT I=142282 (8 should be 0) CORRECT? yes ** Phase 2 - Check Pathnames ** Phase 3 - Check Connectivity ** Phase 4 - Check Reference Counts ** Phase 5 - Check Cyl groups FREE BLK COUNT(S) WRONG IN SUPERBLK SALVAGE? yes SUMMARY INFORMATION BAD SALVAGE? yes BLK(S) MISSING IN BIT MAPS SALVAGE? yes 6757 files, 125718 used, 223846 free (182 frags, 27958 blocks, 0.1% fragmentation) ***** FILE SYSTEM MARKED CLEAN ***** ***** FILE SYSTEM WAS MODIFIED ***** @ 1667988468 [2022-11-09 10:07:48] preboot Initializing Verified Exec: Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR ugen0.4: at usbus0 umass1 on uhub1 umass1: on usbus0 umass1: SCSI over Bulk-Only; quirks = 0xc100 umass1:1:1: Attached to scbus1 ugen0.4: at usbus0 (disconnected) umass1: at uhub1, port 4, addr 4 (disconnected) (da1:umass-sim1:1:0:0): got CAM status 0x44 (da1:umass-sim1:1:0:0): fatal error, failed to attach to device umass1: detached Enforcing Verified Exec: ugen0.4: at usbus0 umass1 on uhub1 umass1: on usbus0 umass1: SCSI over Bulk-Only; quirks = 0xc100 umass1:1:1: Attached to scbus1 da1 at umass-sim1 bus 1 scbus1 target 0 lun 0 da1: Removable Direct Access SPC-4 SCSI device da1: Serial Number 08606E6D402EF1C0B70118A8 da1: 40.000MB/s transfers da1: 7377MB (15109516 512 byte sectors, DIF type 8) da1: quirks=0x2 Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221 Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221 @ 1667988491 [2022-11-09 10:08:11 UTC] mount start @ 1667988492 [2022-11-09 10:08:12 UTC] junos 22.1R1.10 Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221 Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1 Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1 Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221 Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1 Starting watchdog daemon ... Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting na-telemetry-arm-32-22.1R1.10 Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1 chown: nobody: illegal group name Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-openconfig-arm-32-22.1R1.10 Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1 Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jsdn-arm-32-22.1R1.10 Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jsd-arm-32-22.1R1.10-jet-1 Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1 mount_nullfs: /mfs/var: No such file or directory mount_nullfs: /mfs/var: No such file or directory Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1 Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1 Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting dsa-arm-32-22.1R1.10 @ 1667988588 [2022-11-09 10:09:48 UTC] mount done Removing /etc/malloc.conf Checking platform support for: pvi:ex2300-48p @ 1667988596 [2022-11-09 10:09:56 UTC] mountlate start @ 1667988601 [2022-11-09 10:10:01 UTC] mountlate done kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform IPsec: Initialized Security Association Processing. link_elf: symbol in_cksum undefined kldload: can't load nfsd.ko: No such file or directory sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)! sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)! sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)! Calling dcf_ng_hw_init for platform hw vecs initialization Loading the CHMIC module Loading the DC Platform NETPFE module bcmsdk_5_9_x kld Loading BCMSDK module..... Junosprocfs mounted on /junosproc. loader.name="FreeBSD/armv6 U-Boot loader" loader.version="1.2" FreeBSD/armv6 U-Boot loader 1.2 972+0 records in 972+0 records out 505440 bytes transferred in 0.038686 secs (13065140 bytes/sec) @ 1667988639 [2022-11-09 10:10:39 UTC] mgd start Creating initial configuration: ... mgd: commit complete @ 1667988717 [2022-11-09 10:11:57 UTC] mgd done Lock Manager RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved. Unix Domain sockets Lock manager Lock manager 'lockmgr' started successfully. Database Initialization Utility RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved. Profile database initialized Enhanced arp scale is disabled /etc/rc: WARNING: No dump device. Savecore not run. Prefetching /usr/sbin/rpd ... Prefetching /usr/sbin/lacpd ... Prefetching /usr/sbin/chassisd ... @ 1667988728 [2022-11-09 10:12:08 UTC] mountlater start @ 1667988736 [2022-11-09 10:12:16 UTC] mountlater done Starting jlaunchhelperd. Starting cron. Nov 9 10:12:18 jlaunchd 13111 - - inet-process (PID 13133) started Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13133(inet-process): new process Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): exec_command Nov 9 10:12:18 jlaunchd 13111 - - sntpsync (PID 13136) started Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): new process Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command Nov 9 10:12:18 jlaunchd 13111 - - internal-routing-service (PID 13137) started Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): exec_command Nov 9 10:12:19 jlaunchd 13111 - - pfe-manager (PID 13148) started Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): new process Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): exec_command Nov 9 10:12:19 jlaunchd 13111 - - license-service (PID 13150) started Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): new process Nov 9 10:12:19 jlaunchd 13111 - - can not access /usr/sbin/sdk-mgmtd: No such file or directory Nov 9 10:12:19 jlaunchd 13111 - - Starting of initial processes complete Wed Nov 9 10:12:24 UTC 2022 ugen0.4: at usbus0 (disconnected) umass1: at uhub1, port 4, addr 4 (disconnected) da1 at umass-sim1 bus 1 scbus1 target 0 lun 0 da1: s/n 08606E6D402EF1C0B70118A8 detached (da1:umass-sim1:1:0:0): Periph destroyed umass1: detached FLASH bank: 1 checkboard Board: EX2300-48P Base MAC: 68F38E1EE5BE TOP_UC_TAP_WRITE_DATA = 0xbfbbffff arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz DDR Tuning Complete Net: Registering eth Broadcom BCM IPROC Ethernet driver 0.1 Using GMAC0 (0x18042000) et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1 bcmiproc_eth-0 Last Reset Reason: 8 Hit ^C to stop autoboot: 0 SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB device 0 offset 0x3c0000, size 0x10000 SF: 65536 bytes @ 0x3c0000 Read: OK ## Checking Image at 61000000 ... Legacy image found Image Name: Juniper U-Boot Script File Image Type: ARM Unknown OS Script (uncompressed) Data Size: 1900 Bytes = 1.9 KiB Load Address: 00000000 Entry Point: 00000000 Contents: Image 0: 1892 Bytes = 1.8 KiB Verifying Checksum ... OK ## Executing script at 61000000 Setting bus to 0 sleep - delay execution for some time SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB device 0 offset 0x140000, size 0x140000 SF: 1310720 bytes @ 0x140000 Read: OK sleep - delay execution for some time 7313fffc: 5a6d1cc7 ..mZ crc32 for 73000000 ... 7313ffff ==> c71c6d5a Total of 1 word(s) were the same starting USB... USB0: USB EHCI 1.00 scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80 unable to get device descriptor (error=-1) 3 USB Device(s) found scanning usb for storage devices... 1 Storage Device(s) found SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005 ## Starting application at 0x00000074 ... Consoles: U-Boot console FreeBSD/armv6 U-Boot loader, Revision 1.2 (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016) DRAM: 2048MB Number of U-Boot devices: 2 U-Boot env: loaderdev not set, will probe all devices. Found U-Boot device: disk Probing all disk devices... Checking unit=0 slice= partition=... good. Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Main Menu 1. Boot [J]unos volume 2. Boot Junos volume in [S]afe mode 3. [R]eboot 4. [B]oot menu 5. [M]ore options Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: Attempting to boot from USB ... No USB media found Boot Menu 1. Boot [P]revious installed Junos packages 2. Boot Junos in [S]ingle user mode 3. Boot from [R]ecovery snapshot 4. Boot from [U]SB 5. Boot to [O]AM shell 6. Snapshot [B]oot menu 7. [M]ain menu Choice: FLASH bank: 1 checkboard Board: EX2300-48P Base MAC: 68F38E1EE5BE TOP_UC_TAP_WRITE_DATA = 0xbfbbffff arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz DDR Tuning Complete Net: Registering eth Broadcom BCM IPROC Ethernet driver 0.1 Using GMAC0 (0x18042000) et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1 bcmiproc_eth-0 Last Reset Reason: 8 Hit ^C to stop autoboot: 0 SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB device 0 offset 0x3c0000, size 0x10000 SF: 65536 bytes @ 0x3c0000 Read: OK ## Checking Image at 61000000 ... Legacy image found Image Name: Juniper U-Boot Script File Image Type: ARM Unknown OS Script (uncompressed) Data Size: 1900 Bytes = 1.9 KiB Load Address: 00000000 Entry Point: 00000000 Contents: Image 0: 1892 Bytes = 1.8 KiB Verifying Checksum ... OK ## Executing script at 61000000 Setting bus to 0 SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB device 0 offset 0x140000, size 0x140000 SF: 1310720 bytes @ 0x140000 Read: OK 7313fffc: 5a6d1cc7 ..mZ crc32 for 73000000 ... 7313ffff ==> c71c6d5a Total of 1 word(s) were the same starting USB... USB0: USB EHCI 1.00 scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80 unable to get device descriptor (error=-1) 3 USB Device(s) found scanning usb for storage devices... 1 Storage Device(s) found SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005 ## Starting application at 0x00000074 ... Consoles: U-Boot console FreeBSD/armv6 U-Boot loader, Revision 1.2 (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016) DRAM: 2048MB Number of U-Boot devices: 2 U-Boot env: loaderdev not set, will probe all devices. Found U-Boot device: disk Probing all disk devices... Checking unit=0 slice= partition=... good. Booting from Junos volume ... | /packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99] /packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7 /packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479] loading required module 'netstack' /packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de] /packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e] /packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602] /packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654] /packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c] /packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580] loading required module 'pvi_db' /packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617] loading required module 'devrt' /packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81] /packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6] loading required module 'miibus' /packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491] /packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5] /packages/sets/active/boot/os-kernel/contents.izo size=0x993800 /packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194] /packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747] /packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8] /packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94] /packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf] Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'. SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088 Booting [/packages/sets/active/boot/os-kernel/kernel]... Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'. Kernel entry at 0xc1000180... Kernel args: (null) ---<>--- GDB: no debug ports present KDB: debugger backends: ddb ndb KDB: current backend: ddb Copyright (c) 1992-2020 The FreeBSD Project. Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved. FreeBSD is a registered trademark of The FreeBSD Foundation. FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022 builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm Juniper clang version 10.0.1 (git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902) module rtc already present! module wdog already present! module resetpfe already present! module crypto already present! arm unwind: module 'crypto.ko' not on list at unload time sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)! CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000) CPU Features: Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk Optional instructions: UMULL, SMULL, SIMD(ext) LoUU:2 LoC:2 LoUIS:2 Cache level 1: 32KB/32B 4-way data cache WB Read-Alloc Write-Alloc 32KB/32B 4-way instruction cache Read-Alloc real memory = 2147483648 (2048 MB) avail memory = 1985765376 (1893 MB) arc4random: no preloaded entropy cache Security policy loaded: JUNOS MAC/privcheck (mac_privcheck) Security policy loaded: Junos MAC/fips (mac_fips) Security policy loaded: MAC/veriexec (mac_veriexec) Security policy loaded: MAC/grantbylabel (mac_grantbylabel) Security policy loaded: Junos MAC/SDK (mac_sdk) MAC/veriexec fingerprint module loaded: SHA384 MAC/veriexec fingerprint module loaded: SHA1 MAC/veriexec fingerprint module loaded: SHA256 rescue: initialized netisr_init: forcing maxthreads from 4 to 1 random: entropy device external interface Initializing DCF platform properties .. Calling dcf_ng_hw_init for platform hw vecs initialization ofwbus0: simplebus0: on ofwbus0 ihost_armpll0: mem 0-0xfff on simplebus0 simplebus1: on ofwbus0 bcmidm0: mem 0x100000-0x1fffff on simplebus1 l2cache0: mem 0x22000-0x22fff on simplebus0 l2cache0: cannot allocate IRQ, not using interrupt l2cache0: Part number: 0x3, release: 0x9 (r3p3) l2cache0: L2 Cache enabled: 256KB/32B 16 ways bcmcru0: mem 0xe000-0xefff on simplebus1 gic0: mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0 gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256 mp_tmr0: mem 0x20200-0x202ff irq 1 on simplebus0 Timecounter "MPCore" frequency 625000000 Hz quality 800 mp_tmr1: mem 0x20600-0x2061f irq 2 on simplebus0 Event timer "MPCore" frequency 625000000 Hz quality 1000 cpulist0: on ofwbus0 cpu0: on cpulist0 cmic0: mem 0x3200000-0x32fffff irq 0 on ofwbus0 cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064: cmicbus0: on cmic0 cmicmdio0: on cmicbus0 epcmic0: mem 0x20000000-0x200fffff on ofwbus0 epccg0: mem 0x20800000-0x20807fff on ofwbus0 ccgmdio0: mem 0x2000-0x20ff on simplebus1 gpio0: mem 0xa000-0xa0ff irq 4 on simplebus1 gpiobus0: on gpio0 gpioc0: on gpio0 iichb0: mem 0x8000-0x8fff irq 5 on simplebus1 iicbus0: on iichb0 iic0: on iicbus0 iicswitch0: at addr 0xe0 on iicbus0 poe0: on iicswitch0 poe reset failed rtc8564je_rtc0: on iicswitch0 rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s cpld0: at addr 0x62 on iicbus0 cpldbus0: on cpld0 wdog0: on cpldbus0 oamctl0: on cpldbus0 fan0: on cpldbus0 fan1: on cpldbus0 resetctrl0: on cpldbus0 resetpfe0: on cpldbus0 resetphy0: on cpldbus0 bcmdmu0: mem 0xf000-0xffff on simplebus1 paxb0: mem 0x12000-0x12fff on simplebus1 uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1 uart0: [GIANT-LOCKED] uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1 uart1: console (9600,n,8,1) uart1: [GIANT-LOCKED] bcmrng0: mem 0x32000-0x32fff on simplebus1 random: registering fast source Broadcom RBG200 RNG bcm560xgmac0: mem 0x42000-0x42fff irq 8 on simplebus1 bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80 miibus0: on bcm560xgmac0 brgphy0: PHY 1 on miibus0 brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto ehci0: mem 0x48000-0x49fff irq 9 on simplebus1 ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064: usbus0: EHCI version 1.0 usbus0 on ehci0 spi0: mem 0x47000-0x47fff irq 10 on simplebus1 spibus0: on spi0 mx25l0: at cs 0 mode 0 on spibus0 mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K cryptosoft0: Initializing product: 169 .. JUNOS procfs is initialized. Timecounters tick every 10.000 msec tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0 Registering tcp_platform_dependent = tcp_handle_special_ports md0: Preloaded image 10041344 bytes at 0xc2f3a000 usbus0: 480Mbps High Speed USB v2.0 paxb0: PCIe PHY Link Status :0x1c paxb0: PCIe PHY-DL Link up :0x1c ugen0.1: at usbus0 uhub0: on usbus0 Trying to mount root from cd9660:/dev/md0.uzip []... uhub0: 3 ports with 3 removable, self powered ugen0.2: at usbus0 uhub1 on uhub0 uhub1: on usbus0 Entropy start-up health tests performed on 256 samples passed. random: unblocking device. uhub1: 4 ports with 3 removable, self powered ugen0.3: at usbus0 umass0 on uhub1 umass0: on usbus0 umass0: SCSI over Bulk-Only; quirks = 0x8100 umass0:0:0: Attached to scbus0 da0 at umass-sim0 bus 0 scbus0 target 0 lun 0 da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device da0: Serial Number 65001641D960D081 da0: 40.000MB/s transfers da0: 1910MB (3911680 512 byte sectors) da0: quirks=0x3 random: unblocking device. usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored) ** /dev/gpt/junos ** Last Mounted on /.mount ** Phase 1 - Check Blocks and Sizes INCORRECT BLOCK COUNT I=136828 (40 should be 0) CORRECT? yes ** Phase 2 - Check Pathnames ** Phase 3 - Check Connectivity ** Phase 4 - Check Reference Counts ** Phase 5 - Check Cyl groups 6764 files, 125797 used, 223767 free (191 frags, 27947 blocks, 0.1% fragmentation) ***** FILE SYSTEM MARKED CLEAN ***** ***** FILE SYSTEM WAS MODIFIED ***** @ 1667990872 [2022-11-09 10:47:52] preboot Initializing Verified Exec: Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR ugen0.4: at usbus0 umass1 on uhub1 umass1: on usbus0 umass1: SCSI over Bulk-Only; quirks = 0xc100 umass1:1:1: Attached to scbus1 ugen0.4: at usbus0 (disconnected) umass1: at uhub1, port 4, addr 4 (disconnected) (probe0:umass-sim1:1:0:0): REPORT LUNS. CDB: a0 00 00 00 00 00 00 00 00 10 00 00 (probe0:umass-sim1:1:0:0): CAM status: CCB request completed with an error (probe0:umass-sim1:1:0:0): Retrying command, 4 more tries remain (da1:umass-sim1:1:0:0): got CAM status 0xa (da1:umass-sim1:1:0:0): fatal error, failed to attach to device umass1: detached Enforcing Verified Exec: ugen0.4: at usbus0 umass1 on uhub1 umass1: on usbus0 umass1: SCSI over Bulk-Only; quirks = 0xc100 umass1:1:1: Attached to scbus1 da1 at umass-sim1 bus 1 scbus1 target 0 lun 0 da1: Removable Direct Access SPC-4 SCSI device da1: Serial Number 08606E6D402EF1C0B70118A8 da1: 40.000MB/s transfers da1: 7377MB (15109516 512 byte sectors, DIF type 8) da1: quirks=0x2 Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221 Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221 @ 1667990894 [2022-11-09 10:48:14 UTC] mount start @ 1667990895 [2022-11-09 10:48:15 UTC] junos 22.1R1.10 Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221 Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1 Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1 Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221 Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1 Starting watchdog daemon ... Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting na-telemetry-arm-32-22.1R1.10 Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1 chown: nobody: illegal group name Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-openconfig-arm-32-22.1R1.10 Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1 Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jsdn-arm-32-22.1R1.10 Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jsd-arm-32-22.1R1.10-jet-1 Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1 mount_nullfs: /mfs/var: No such file or directory mount_nullfs: /mfs/var: No such file or directory Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1 Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1 Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1 Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256 Mounting dsa-arm-32-22.1R1.10 @ 1667990991 [2022-11-09 10:49:51 UTC] mount done Removing /etc/malloc.conf Checking platform support for: pvi:ex2300-48p @ 1667990999 [2022-11-09 10:49:59 UTC] mountlate start @ 1667991004 [2022-11-09 10:50:04 UTC] mountlate done kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform IPsec: Initialized Security Association Processing. link_elf: symbol in_cksum undefined kldload: can't load nfsd.ko: No such file or directory sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)! sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)! sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)! Calling dcf_ng_hw_init for platform hw vecs initialization Loading the CHMIC module Loading the DC Platform NETPFE module bcmsdk_5_9_x kld Loading BCMSDK module..... Junosprocfs mounted on /junosproc. loader.name="FreeBSD/armv6 U-Boot loader" loader.version="1.2" FreeBSD/armv6 U-Boot loader 1.2 972+0 records in 972+0 records out 505440 bytes transferred in 0.040014 secs (12631458 bytes/sec) @ 1667991041 [2022-11-09 10:50:41 UTC] mgd start Creating initial configuration: ... mgd: commit complete @ 1667991120 [2022-11-09 10:52:00 UTC] mgd done Lock Manager RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved. Unix Domain sockets Lock manager Lock manager 'lockmgr' started successfully. Database Initialization Utility RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved. Profile database initialized Enhanced arp scale is disabled /etc/rc: WARNING: No dump device. Savecore not run. Prefetching /usr/sbin/rpd ... Prefetching /usr/sbin/lacpd ... Prefetching /usr/sbin/chassisd ... @ 1667991131 [2022-11-09 10:52:11 UTC] mountlater start @ 1667991139 [2022-11-09 10:52:19 UTC] mountlater done Starting jlaunchhelperd. Starting cron. Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): exec_command Nov 9 10:52:21 jlaunchd 13111 - - sntpsync (PID 13134) started Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): new process Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command Nov 9 10:52:21 jlaunchd 13111 - - internal-routing-service (PID 13137) started Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process Nov 9 10:52:21 jlaunchd 13111 - - Found pid 13105 for already running process: eventd Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13105(event-processing): new process Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): exec_command Nov 9 10:52:22 jlaunchd 13111 - - virtual-chassis-control (PID 13138) started Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): new process Wed Nov 9 10:52:26 UTC 2022 Nov 9 10:52:30 jlaunchd 13111 - - Registered PID 13204(pfed): exec_command