Junos OS

 View Only
last person joined: yesterday 

Ask questions and share experiences about Junos OS.
Expand all | Collapse all

EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

  • 1.  EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 11:26
    Hi,

    I configured an EX2300-48P for a customer, it worked properly. Customer was unhappy with the config so send a replacement config to me to apply. It starts like this:
    configure                
    delete                 
    yes        

    Obviously this deleted the complete configuration. 
    After this I setup the password, wanted to commit it, but it never finish commiting, always drop out from CLI to the login screen. I login again with the new password, starts again, but it keeps dropping me out, sometime I don't even reach the configuration menu.
    I tried to reinstall junos from recovery partition / usb, but before the login screen it freeze down completely, I don't get access to CLI. I could press anything, wait hours, nothing happens.
    I tried the password recovery guide - no success
    I tried the reinstall / format guide for this device - no success, if I choose boot from usb in the boot menu, nothing happens.

    Does anyone idea what should I do with this device to work it again?
    Thanks for your help.


    ------------------------------
    BALAZS KISS
    ------------------------------


  • 2.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 11:31
    You could try "request system zeroize".
    That would restore the switch back to factory.

    ------------------------------
    PAUL PETERSON
    ------------------------------



  • 3.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 11:41
    Hi,

    Thanks for your answer.
    I would like to try, but I don't get to the login screen, it freeze down before it, I attached the log file.


    ------------------------------
    BALAZS KISS
    ------------------------------



  • 4.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 11:51
      |   view attached
    Log:

    ------------------------------
    BALAZS KISS
    ------------------------------

    Attachment(s)



  • 5.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 11:54

    Legacy image found
    Image Name: Juniper U-Boot Script File
    Image Type: ARM Unknown OS Script (uncompressed)
    Data Size: 1900 Bytes = 1.9 KiB
    Load Address: 00000000
    Entry Point: 00000000
    Contents:
    Image 0: 1892 Bytes = 1.8 KiB
    Verifying Checksum ... OK
    ## Executing script at 61000000
    Setting bus to 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x140000, size 0x140000
    SF: 1310720 bytes @ 0x140000 Read: OK
    7313fffc: 5a6d1cc7 ..mZ
    crc32 for 73000000 ... 7313ffff ==> c71c6d5a
    Total of 1 word(s) were the same
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from previous installed Junos packages ...
    If previous set of packages are not available, we will boot
    from the currently installed set of packages.
    |
    /packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99]
    /packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7
    /packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479]
    loading required module 'netstack'
    /packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de]
    /packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e]
    /packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602]
    /packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654]
    /packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c]
    /packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580]
    loading required module 'pvi_db'
    /packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617]
    loading required module 'devrt'
    /packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81]
    /packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6]
    loading required module 'miibus'
    /packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491]
    /packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5]
    /packages/sets/active/boot/os-kernel/contents.izo size=0x993800
    /packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194]
    /packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747]
    /packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8]
    /packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94]
    /packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf]
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088
    Booting [/packages/sets/active/boot/os-kernel/kernel]...
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    Kernel entry at 0xc1000180...
    Kernel args: (null)
    ---<<BOOT>>---
    GDB: no debug ports present
    KDB: debugger backends: ddb ndb
    KDB: current backend: ddb
    Copyright (c) 1992-2020 The FreeBSD Project.
    Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
    The Regents of the University of California. All rights reserved.
    FreeBSD is a registered trademark of The FreeBSD Foundation.
    FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022
    builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm
    Juniper clang version 10.0.1 (git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902)
    module rtc already present!
    module wdog already present!
    module resetpfe already present!
    module crypto already present!
    arm unwind: module 'crypto.ko' not on list at unload time
    sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)!
    CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
    CPU Features:
    Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
    Optional instructions:
    UMULL, SMULL, SIMD(ext)
    LoUU:2 LoC:2 LoUIS:2
    Cache level 1:
    32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
    32KB/32B 4-way instruction cache Read-Alloc
    real memory = 2147483648 (2048 MB)
    avail memory = 1985765376 (1893 MB)
    arc4random: no preloaded entropy cache
    Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
    Security policy loaded: Junos MAC/fips (mac_fips)
    Security policy loaded: MAC/veriexec (mac_veriexec)
    Security policy loaded: MAC/grantbylabel (mac_grantbylabel)
    Security policy loaded: Junos MAC/SDK (mac_sdk)
    MAC/veriexec fingerprint module loaded: SHA384
    MAC/veriexec fingerprint module loaded: SHA1
    MAC/veriexec fingerprint module loaded: SHA256
    rescue: initialized
    netisr_init: forcing maxthreads from 4 to 1
    random: entropy device external interface
    Initializing DCF platform properties ..
    Calling dcf_ng_hw_init for platform hw vecs initialization
    ofwbus0: <Open Firmware Device Tree>
    simplebus0: <Flattened device tree simple bus> on ofwbus0
    ihost_armpll0: <Broadcom iHost ARM PLL> mem 0-0xfff on simplebus0
    simplebus1: <Flattened device tree simple bus> on ofwbus0
    bcmidm0: <Broadcom Interconnect Device Management (IDM)> mem 0x100000-0x1fffff on simplebus1
    l2cache0: <PL310 L2 cache controller> mem 0x22000-0x22fff on simplebus0
    l2cache0: cannot allocate IRQ, not using interrupt
    l2cache0: Part number: 0x3, release: 0x9 (r3p3)
    l2cache0: L2 Cache enabled: 256KB/32B 16 ways
    bcmcru0: <Broadcom BCM56XXX cru> mem 0xe000-0xefff on simplebus1
    gic0: <ARM Generic Interrupt Controller> mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0
    gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256
    mp_tmr0: <ARM MPCore Timers> mem 0x20200-0x202ff irq 1 on simplebus0
    Timecounter "MPCore" frequency 625000000 Hz quality 800
    mp_tmr1: <ARM MPCore Timers> mem 0x20600-0x2061f irq 2 on simplebus0
    Event timer "MPCore" frequency 625000000 Hz quality 1000
    cpulist0: <Open Firmware CPU Group> on ofwbus0
    cpu0: <Open Firmware CPU> on cpulist0
    cmic0: <Broadcom CMIC> mem 0x3200000-0x32fffff irq 0 on ofwbus0
    cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064:
    cmicbus0: <CMIC Functions> on cmic0
    cmicmdio0: <Broadcom CMIC MDIO> on cmicbus0
    epcmic0: <Broadcom,epcmic> mem 0x20000000-0x200fffff on ofwbus0
    epccg0: <Broadcom,epccg> mem 0x20800000-0x20807fff on ofwbus0
    ccgmdio0: <Broadcom BCM56060 CCG-MDIO> mem 0x2000-0x20ff on simplebus1
    gpio0: <Broadcom BCM56XXX GPIO controller> mem 0xa000-0xa0ff irq 4 on simplebus1
    gpiobus0: <GPIO bus> on gpio0
    gpioc0: <GPIO controller> on gpio0
    iichb0: <Broadcom iProc SMBus Controller> mem 0x8000-0x8fff irq 5 on simplebus1
    iicbus0: <OFW I2C bus> on iichb0
    iic0: <I2C generic I/O> on iicbus0
    iicswitch0: <I2C Switch/Multiplexer> at addr 0xe0 on iicbus0
    poe0: <POE> on iicswitch0
    poe reset failed
    rtc8564je_rtc0: <EPSON 8564JE Real Time Clock(RTC)> on iicswitch0
    rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s
    cpld0: <Juniper CPLD for iProc> at addr 0x62 on iicbus0
    cpldbus0: <CPLD Functions> on cpld0
    wdog0: <CPLD Watchdog Timer for iProc> on cpldbus0
    oamctl0: <OAM Control using CPLD for iProc> on cpldbus0
    fan0: <CPLD fan controller> on cpldbus0
    fan1: <CPLD fan controller> on cpldbus0
    resetctrl0: <I2C switch reset driver> on cpldbus0
    resetpfe0: <Reset EP PFE> on cpldbus0
    resetphy0: <CPLD PHY Reset for iProc> on cpldbus0
    bcmdmu0: <Broadcom BCM56XXX dmu> mem 0xf000-0xffff on simplebus1
    paxb0: <Broadcom,PAXB> mem 0x12000-0x12fff on simplebus1
    uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1
    uart0: [GIANT-LOCKED]
    uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1
    uart1: console (9600,n,8,1)
    uart1: [GIANT-LOCKED]
    bcmrng0: <Broadcom RBG200 RNG> mem 0x32000-0x32fff on simplebus1
    random: registering fast source Broadcom RBG200 RNG
    bcm560xgmac0: <Broadcom-56xxx GMAC> mem 0x42000-0x42fff irq 8 on simplebus1
    bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80
    miibus0: <MII bus> on bcm560xgmac0
    brgphy0: <BCM54616S 10/100/1000baseTX PHY> PHY 1 on miibus0
    brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
    ehci0: <BCMIPROC-USB-EHCI> mem 0x48000-0x49fff irq 9 on simplebus1
    ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064:
    usbus0: EHCI version 1.0
    usbus0 on ehci0
    spi0: <Broadcom BCM56XXX SPI> mem 0x47000-0x47fff irq 10 on simplebus1
    spibus0: <OFW SPI bus> on spi0
    mx25l0: <M25Pxx Flash Family> at cs 0 mode 0 on spibus0
    mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K
    cryptosoft0: <software crypto>
    Initializing product: 169 ..
    JUNOS procfs is initialized.
    Timecounters tick every 10.000 msec
    tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0
    Registering tcp_platform_dependent = tcp_handle_special_ports
    md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 10041344 bytes at 0xc2f3a000
    usbus0: 480Mbps High Speed USB v2.0
    paxb0: PCIe PHY Link Status :0x1c
    paxb0: PCIe PHY-DL Link up :0x1c
    ugen0.1: <Broadcom EHCI root HUB> at usbus0
    uhub0: <Broadcom EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
    Trying to mount root from cd9660:/dev/md0.uzip []...
    uhub0: 3 ports with 3 removable, self powered
    ugen0.2: <vendor 0x05e3 USB2.0 Hub> at usbus0
    uhub1 on uhub0
    uhub1: <vendor 0x05e3 USB2.0 Hub, class 9/0, rev 2.00/85.37, addr 2> on usbus0
    Entropy start-up health tests performed on 256 samples passed.
    random: unblocking device.
    uhub1: 4 ports with 3 removable, self powered
    ugen0.3: <vendor 0x13fe USB DISK 2.0> at usbus0
    umass0 on uhub1
    umass0: <vendor 0x13fe USB DISK 2.0, class 0/0, rev 2.00/1.00, addr 3> on usbus0
    umass0: SCSI over Bulk-Only; quirks = 0x8100
    umass0:0:0: Attached to scbus0
    da0 at umass-sim0 bus 0 scbus0 target 0 lun 0
    da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device
    da0: Serial Number 65001641D960D081
    da0: 40.000MB/s transfers
    da0: 1910MB (3911680 512 byte sectors)
    da0: quirks=0x3<NO_SYNC_CACHE,NO_6_BYTE>
    random: unblocking device.
    usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored)
    ** /dev/gpt/junos
    ** Last Mounted on /.mount
    ** Phase 1 - Check Blocks and Sizes
    INCORRECT BLOCK COUNT I=136802 (40 should be 0)
    CORRECT? yes

    INCORRECT BLOCK COUNT I=142282 (8 should be 0)
    CORRECT? yes

    ** Phase 2 - Check Pathnames
    ** Phase 3 - Check Connectivity
    ** Phase 4 - Check Reference Counts
    ** Phase 5 - Check Cyl groups
    FREE BLK COUNT(S) WRONG IN SUPERBLK
    SALVAGE? yes

    SUMMARY INFORMATION BAD
    SALVAGE? yes

    BLK(S) MISSING IN BIT MAPS
    SALVAGE? yes

    6757 files, 125718 used, 223846 free (182 frags, 27958 blocks, 0.1% fragmentation)

    ***** FILE SYSTEM MARKED CLEAN *****

    ***** FILE SYSTEM WAS MODIFIED *****
    @ 1667988468 [2022-11-09 10:07:48] preboot
    Initializing Verified Exec:
    Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
    umass1: at uhub1, port 4, addr 4 (disconnected)
    (da1:umass-sim1:1:0:0): got CAM status 0x44
    (da1:umass-sim1:1:0:0): fatal error, failed to attach to device
    umass1: detached
    Enforcing Verified Exec:
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
    da1: <Kingston DataTraveler 3.0 > Removable Direct Access SPC-4 SCSI device
    da1: Serial Number 08606E6D402EF1C0B70118A8
    da1: 40.000MB/s transfers
    da1: 7377MB (15109516 512 byte sectors, DIF type 8)
    da1: quirks=0x2<NO_6_BYTE>
    Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221
    @ 1667988491 [2022-11-09 10:08:11 UTC] mount start
    @ 1667988492 [2022-11-09 10:08:12 UTC] junos 22.1R1.10
    Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221
    Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1
    Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1
    Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1
    Starting watchdog daemon ...
    Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting na-telemetry-arm-32-22.1R1.10
    Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1
    chown: nobody: illegal group name
    Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-openconfig-arm-32-22.1R1.10
    Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1
    Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsdn-arm-32-22.1R1.10
    Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsd-arm-32-22.1R1.10-jet-1
    Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1
    mount_nullfs: /mfs/var: No such file or directory
    mount_nullfs: /mfs/var: No such file or directory
    Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1
    Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1
    Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting dsa-arm-32-22.1R1.10
    @ 1667988588 [2022-11-09 10:09:48 UTC] mount done
    Removing /etc/malloc.conf
    Checking platform support for: pvi:ex2300-48p
    @ 1667988596 [2022-11-09 10:09:56 UTC] mountlate start
    @ 1667988601 [2022-11-09 10:10:01 UTC] mountlate done
    kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform
    IPsec: Initialized Security Association Processing.
    link_elf: symbol in_cksum undefined
    kldload: can't load nfsd.ko: No such file or directory
    sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)!
    sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)!
    sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)!
    Calling dcf_ng_hw_init for platform hw vecs initialization
    Loading the CHMIC module
    Loading the DC Platform NETPFE module
    bcmsdk_5_9_x kld
    Loading BCMSDK module.....
    Junosprocfs mounted on /junosproc.
    loader.name="FreeBSD/armv6 U-Boot loader"
    loader.version="1.2"
    FreeBSD/armv6 U-Boot loader
    1.2
    972+0 records in
    972+0 records out
    505440 bytes transferred in 0.038686 secs (13065140 bytes/sec)
    @ 1667988639 [2022-11-09 10:10:39 UTC] mgd start
    Creating initial configuration: ...
    mgd: commit complete
    @ 1667988717 [2022-11-09 10:11:57 UTC] mgd done

    Lock Manager
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Unix Domain sockets Lock manager
    Lock manager 'lockmgr' started successfully.

    Database Initialization Utility
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Profile database initialized
    Enhanced arp scale is disabled
    /etc/rc: WARNING: No dump device. Savecore not run.
    Prefetching /usr/sbin/rpd ...
    Prefetching /usr/sbin/lacpd ...
    Prefetching /usr/sbin/chassisd ...
    @ 1667988728 [2022-11-09 10:12:08 UTC] mountlater start
    @ 1667988736 [2022-11-09 10:12:16 UTC] mountlater done
    Starting jlaunchhelperd.
    Starting cron.
    Nov 9 10:12:18 jlaunchd 13111 - - inet-process (PID 13133) started
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13133(inet-process): new process
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): exec_command
    Nov 9 10:12:18 jlaunchd 13111 - - sntpsync (PID 13136) started
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): new process
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command
    Nov 9 10:12:18 jlaunchd 13111 - - internal-routing-service (PID 13137) started
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): exec_command
    Nov 9 10:12:19 jlaunchd 13111 - - pfe-manager (PID 13148) started
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): new process
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): exec_command
    Nov 9 10:12:19 jlaunchd 13111 - - license-service (PID 13150) started
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): new process
    Nov 9 10:12:19 jlaunchd 13111 - - can not access /usr/sbin/sdk-mgmtd: No such file or directory
    Nov 9 10:12:19 jlaunchd 13111 - - Starting of initial processes complete

    Wed Nov 9 10:12:24 UTC 2022
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
    umass1: at uhub1, port 4, addr 4 (disconnected)
    da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
    da1: <Kingston DataTraveler 3.0 > s/n 08606E6D402EF1C0B70118A8 detached
    (da1:umass-sim1:1:0:0): Periph destroyed
    umass1: detached
    FLASH bank: 1
    checkboard
    Board: EX2300-48P
    Base MAC: 68F38E1EE5BE
    TOP_UC_TAP_WRITE_DATA = 0xbfbbffff
    arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz
    DDR Tuning Complete
    Net: Registering eth
    Broadcom BCM IPROC Ethernet driver 0.1
    Using GMAC0 (0x18042000)
    et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1
    bcmiproc_eth-0
    Last Reset Reason: 8
    Hit ^C to stop autoboot: 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x3c0000, size 0x10000
    SF: 65536 bytes @ 0x3c0000 Read: OK

    ## Checking Image at 61000000 ...
    Legacy image found
    Image Name: Juniper U-Boot Script File
    Image Type: ARM Unknown OS Script (uncompressed)
    Data Size: 1900 Bytes = 1.9 KiB
    Load Address: 00000000
    Entry Point: 00000000
    Contents:
    Image 0: 1892 Bytes = 1.8 KiB
    Verifying Checksum ... OK
    ## Executing script at 61000000
    Setting bus to 0
    sleep - delay execution for some time

    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x140000, size 0x140000
    SF: 1310720 bytes @ 0x140000 Read: OK
    sleep - delay execution for some time

    7313fffc: 5a6d1cc7 ..mZ
    crc32 for 73000000 ... 7313ffff ==> c71c6d5a
    Total of 1 word(s) were the same
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice: FLASH bank: 1
    checkboard
    Board: EX2300-48P
    Base MAC: 68F38E1EE5BE
    TOP_UC_TAP_WRITE_DATA = 0xbfbbffff
    arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz
    DDR Tuning Complete
    Net: Registering eth
    Broadcom BCM IPROC Ethernet driver 0.1
    Using GMAC0 (0x18042000)
    et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1
    bcmiproc_eth-0
    Last Reset Reason: 8
    Hit ^C to stop autoboot: 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x3c0000, size 0x10000
    SF: 65536 bytes @ 0x3c0000 Read: OK

    ## Checking Image at 61000000 ...
    Legacy image found
    Image Name: Juniper U-Boot Script File
    Image Type: ARM Unknown OS Script (uncompressed)
    Data Size: 1900 Bytes = 1.9 KiB
    Load Address: 00000000
    Entry Point: 00000000
    Contents:
    Image 0: 1892 Bytes = 1.8 KiB
    Verifying Checksum ... OK
    ## Executing script at 61000000
    Setting bus to 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x140000, size 0x140000
    SF: 1310720 bytes @ 0x140000 Read: OK
    7313fffc: 5a6d1cc7 ..mZ
    crc32 for 73000000 ... 7313ffff ==> c71c6d5a
    Total of 1 word(s) were the same
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.

    Booting from Junos volume ...
    |
    /packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99]
    /packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7
    /packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479]
    loading required module 'netstack'
    /packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de]
    /packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e]
    /packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602]
    /packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654]
    /packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c]
    /packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580]
    loading required module 'pvi_db'
    /packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617]
    loading required module 'devrt'
    /packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81]
    /packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6]
    loading required module 'miibus'
    /packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491]
    /packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5]
    /packages/sets/active/boot/os-kernel/contents.izo size=0x993800
    /packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194]
    /packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747]
    /packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8]
    /packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94]
    /packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf]
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088
    Booting [/packages/sets/active/boot/os-kernel/kernel]...
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    Kernel entry at 0xc1000180...
    Kernel args: (null)
    ---<<BOOT>>---
    GDB: no debug ports present
    KDB: debugger backends: ddb ndb
    KDB: current backend: ddb
    Copyright (c) 1992-2020 The FreeBSD Project.
    Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
    The Regents of the University of California. All rights reserved.
    FreeBSD is a registered trademark of The FreeBSD Foundation.
    FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022
    builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm
    Juniper clang version 10.0.1 (git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902)
    module rtc already present!
    module wdog already present!
    module resetpfe already present!
    module crypto already present!
    arm unwind: module 'crypto.ko' not on list at unload time
    sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)!
    CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
    CPU Features:
    Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
    Optional instructions:
    UMULL, SMULL, SIMD(ext)
    LoUU:2 LoC:2 LoUIS:2
    Cache level 1:
    32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
    32KB/32B 4-way instruction cache Read-Alloc
    real memory = 2147483648 (2048 MB)
    avail memory = 1985765376 (1893 MB)
    arc4random: no preloaded entropy cache
    Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
    Security policy loaded: Junos MAC/fips (mac_fips)
    Security policy loaded: MAC/veriexec (mac_veriexec)
    Security policy loaded: MAC/grantbylabel (mac_grantbylabel)
    Security policy loaded: Junos MAC/SDK (mac_sdk)
    MAC/veriexec fingerprint module loaded: SHA384
    MAC/veriexec fingerprint module loaded: SHA1
    MAC/veriexec fingerprint module loaded: SHA256
    rescue: initialized
    netisr_init: forcing maxthreads from 4 to 1
    random: entropy device external interface
    Initializing DCF platform properties ..
    Calling dcf_ng_hw_init for platform hw vecs initialization
    ofwbus0: <Open Firmware Device Tree>
    simplebus0: <Flattened device tree simple bus> on ofwbus0
    ihost_armpll0: <Broadcom iHost ARM PLL> mem 0-0xfff on simplebus0
    simplebus1: <Flattened device tree simple bus> on ofwbus0
    bcmidm0: <Broadcom Interconnect Device Management (IDM)> mem 0x100000-0x1fffff on simplebus1
    l2cache0: <PL310 L2 cache controller> mem 0x22000-0x22fff on simplebus0
    l2cache0: cannot allocate IRQ, not using interrupt
    l2cache0: Part number: 0x3, release: 0x9 (r3p3)
    l2cache0: L2 Cache enabled: 256KB/32B 16 ways
    bcmcru0: <Broadcom BCM56XXX cru> mem 0xe000-0xefff on simplebus1
    gic0: <ARM Generic Interrupt Controller> mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0
    gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256
    mp_tmr0: <ARM MPCore Timers> mem 0x20200-0x202ff irq 1 on simplebus0
    Timecounter "MPCore" frequency 625000000 Hz quality 800
    mp_tmr1: <ARM MPCore Timers> mem 0x20600-0x2061f irq 2 on simplebus0
    Event timer "MPCore" frequency 625000000 Hz quality 1000
    cpulist0: <Open Firmware CPU Group> on ofwbus0
    cpu0: <Open Firmware CPU> on cpulist0
    cmic0: <Broadcom CMIC> mem 0x3200000-0x32fffff irq 0 on ofwbus0
    cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064:
    cmicbus0: <CMIC Functions> on cmic0
    cmicmdio0: <Broadcom CMIC MDIO> on cmicbus0
    epcmic0: <Broadcom,epcmic> mem 0x20000000-0x200fffff on ofwbus0
    epccg0: <Broadcom,epccg> mem 0x20800000-0x20807fff on ofwbus0
    ccgmdio0: <Broadcom BCM56060 CCG-MDIO> mem 0x2000-0x20ff on simplebus1
    gpio0: <Broadcom BCM56XXX GPIO controller> mem 0xa000-0xa0ff irq 4 on simplebus1
    gpiobus0: <GPIO bus> on gpio0
    gpioc0: <GPIO controller> on gpio0
    iichb0: <Broadcom iProc SMBus Controller> mem 0x8000-0x8fff irq 5 on simplebus1
    iicbus0: <OFW I2C bus> on iichb0
    iic0: <I2C generic I/O> on iicbus0
    iicswitch0: <I2C Switch/Multiplexer> at addr 0xe0 on iicbus0
    poe0: <POE> on iicswitch0
    poe reset failed
    rtc8564je_rtc0: <EPSON 8564JE Real Time Clock(RTC)> on iicswitch0
    rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s
    cpld0: <Juniper CPLD for iProc> at addr 0x62 on iicbus0
    cpldbus0: <CPLD Functions> on cpld0
    wdog0: <CPLD Watchdog Timer for iProc> on cpldbus0
    oamctl0: <OAM Control using CPLD for iProc> on cpldbus0
    fan0: <CPLD fan controller> on cpldbus0
    fan1: <CPLD fan controller> on cpldbus0
    resetctrl0: <I2C switch reset driver> on cpldbus0
    resetpfe0: <Reset EP PFE> on cpldbus0
    resetphy0: <CPLD PHY Reset for iProc> on cpldbus0
    bcmdmu0: <Broadcom BCM56XXX dmu> mem 0xf000-0xffff on simplebus1
    paxb0: <Broadcom,PAXB> mem 0x12000-0x12fff on simplebus1
    uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1
    uart0: [GIANT-LOCKED]
    uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1
    uart1: console (9600,n,8,1)
    uart1: [GIANT-LOCKED]
    bcmrng0: <Broadcom RBG200 RNG> mem 0x32000-0x32fff on simplebus1
    random: registering fast source Broadcom RBG200 RNG
    bcm560xgmac0: <Broadcom-56xxx GMAC> mem 0x42000-0x42fff irq 8 on simplebus1
    bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80
    miibus0: <MII bus> on bcm560xgmac0
    brgphy0: <BCM54616S 10/100/1000baseTX PHY> PHY 1 on miibus0
    brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
    ehci0: <BCMIPROC-USB-EHCI> mem 0x48000-0x49fff irq 9 on simplebus1
    ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064:
    usbus0: EHCI version 1.0
    usbus0 on ehci0
    spi0: <Broadcom BCM56XXX SPI> mem 0x47000-0x47fff irq 10 on simplebus1
    spibus0: <OFW SPI bus> on spi0
    mx25l0: <M25Pxx Flash Family> at cs 0 mode 0 on spibus0
    mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K
    cryptosoft0: <software crypto>
    Initializing product: 169 ..
    JUNOS procfs is initialized.
    Timecounters tick every 10.000 msec
    tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0
    Registering tcp_platform_dependent = tcp_handle_special_ports
    md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 10041344 bytes at 0xc2f3a000
    usbus0: 480Mbps High Speed USB v2.0
    paxb0: PCIe PHY Link Status :0x1c
    paxb0: PCIe PHY-DL Link up :0x1c
    ugen0.1: <Broadcom EHCI root HUB> at usbus0
    uhub0: <Broadcom EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
    Trying to mount root from cd9660:/dev/md0.uzip []...
    uhub0: 3 ports with 3 removable, self powered
    ugen0.2: <vendor 0x05e3 USB2.0 Hub> at usbus0
    uhub1 on uhub0
    uhub1: <vendor 0x05e3 USB2.0 Hub, class 9/0, rev 2.00/85.37, addr 2> on usbus0
    Entropy start-up health tests performed on 256 samples passed.
    random: unblocking device.
    uhub1: 4 ports with 3 removable, self powered
    ugen0.3: <vendor 0x13fe USB DISK 2.0> at usbus0
    umass0 on uhub1
    umass0: <vendor 0x13fe USB DISK 2.0, class 0/0, rev 2.00/1.00, addr 3> on usbus0
    umass0: SCSI over Bulk-Only; quirks = 0x8100
    umass0:0:0: Attached to scbus0
    da0 at umass-sim0 bus 0 scbus0 target 0 lun 0
    da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device
    da0: Serial Number 65001641D960D081
    da0: 40.000MB/s transfers
    da0: 1910MB (3911680 512 byte sectors)
    da0: quirks=0x3<NO_SYNC_CACHE,NO_6_BYTE>
    random: unblocking device.
    usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored)
    ** /dev/gpt/junos
    ** Last Mounted on /.mount
    ** Phase 1 - Check Blocks and Sizes
    INCORRECT BLOCK COUNT I=136828 (40 should be 0)
    CORRECT? yes

    ** Phase 2 - Check Pathnames
    ** Phase 3 - Check Connectivity
    ** Phase 4 - Check Reference Counts
    ** Phase 5 - Check Cyl groups
    6764 files, 125797 used, 223767 free (191 frags, 27947 blocks, 0.1% fragmentation)

    ***** FILE SYSTEM MARKED CLEAN *****

    ***** FILE SYSTEM WAS MODIFIED *****
    @ 1667990872 [2022-11-09 10:47:52] preboot
    Initializing Verified Exec:
    Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
    umass1: at uhub1, port 4, addr 4 (disconnected)
    (probe0:umass-sim1:1:0:0): REPORT LUNS. CDB: a0 00 00 00 00 00 00 00 00 10 00 00
    (probe0:umass-sim1:1:0:0): CAM status: CCB request completed with an error
    (probe0:umass-sim1:1:0:0): Retrying command, 4 more tries remain
    (da1:umass-sim1:1:0:0): got CAM status 0xa
    (da1:umass-sim1:1:0:0): fatal error, failed to attach to device
    umass1: detached
    Enforcing Verified Exec:
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
    da1: <Kingston DataTraveler 3.0 > Removable Direct Access SPC-4 SCSI device
    da1: Serial Number 08606E6D402EF1C0B70118A8
    da1: 40.000MB/s transfers
    da1: 7377MB (15109516 512 byte sectors, DIF type 8)
    da1: quirks=0x2<NO_6_BYTE>
    Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221
    @ 1667990894 [2022-11-09 10:48:14 UTC] mount start
    @ 1667990895 [2022-11-09 10:48:15 UTC] junos 22.1R1.10
    Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221
    Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1
    Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1
    Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1
    Starting watchdog daemon ...
    Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting na-telemetry-arm-32-22.1R1.10
    Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1
    chown: nobody: illegal group name
    Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-openconfig-arm-32-22.1R1.10
    Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1
    Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsdn-arm-32-22.1R1.10
    Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsd-arm-32-22.1R1.10-jet-1
    Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1
    mount_nullfs: /mfs/var: No such file or directory
    mount_nullfs: /mfs/var: No such file or directory
    Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1
    Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1
    Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting dsa-arm-32-22.1R1.10
    @ 1667990991 [2022-11-09 10:49:51 UTC] mount done
    Removing /etc/malloc.conf
    Checking platform support for: pvi:ex2300-48p
    @ 1667990999 [2022-11-09 10:49:59 UTC] mountlate start
    @ 1667991004 [2022-11-09 10:50:04 UTC] mountlate done
    kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform
    IPsec: Initialized Security Association Processing.
    link_elf: symbol in_cksum undefined
    kldload: can't load nfsd.ko: No such file or directory
    sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)!
    sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)!
    sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)!
    Calling dcf_ng_hw_init for platform hw vecs initialization
    Loading the CHMIC module
    Loading the DC Platform NETPFE module
    bcmsdk_5_9_x kld
    Loading BCMSDK module.....
    Junosprocfs mounted on /junosproc.
    loader.name="FreeBSD/armv6 U-Boot loader"
    loader.version="1.2"
    FreeBSD/armv6 U-Boot loader
    1.2
    972+0 records in
    972+0 records out
    505440 bytes transferred in 0.040014 secs (12631458 bytes/sec)
    @ 1667991041 [2022-11-09 10:50:41 UTC] mgd start
    Creating initial configuration: ...
    mgd: commit complete
    @ 1667991120 [2022-11-09 10:52:00 UTC] mgd done

    Lock Manager
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Unix Domain sockets Lock manager
    Lock manager 'lockmgr' started successfully.

    Database Initialization Utility
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Profile database initialized
    Enhanced arp scale is disabled
    /etc/rc: WARNING: No dump device. Savecore not run.
    Prefetching /usr/sbin/rpd ...
    Prefetching /usr/sbin/lacpd ...
    Prefetching /usr/sbin/chassisd ...
    @ 1667991131 [2022-11-09 10:52:11 UTC] mountlater start
    @ 1667991139 [2022-11-09 10:52:19 UTC] mountlater done
    Starting jlaunchhelperd.
    Starting cron.
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): exec_command
    Nov 9 10:52:21 jlaunchd 13111 - - sntpsync (PID 13134) started
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): new process
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command
    Nov 9 10:52:21 jlaunchd 13111 - - internal-routing-service (PID 13137) started
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process
    Nov 9 10:52:21 jlaunchd 13111 - - Found pid 13105 for already running process: eventd
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13105(event-processing): new process
    Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): exec_command
    Nov 9 10:52:22 jlaunchd 13111 - - virtual-chassis-control (PID 13138) started
    Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): new process

    Wed Nov 9 10:52:26 UTC 2022
    Nov 9 10:52:30 jlaunchd 13111 - - Registered PID 13204(pfed): exec_command

    ------------------------------
    BALAZS KISS
    ------------------------------



  • 6.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 11:55

    Legacy image found
    Image Name: Juniper U-Boot Script File
    Image Type: ARM Unknown OS Script (uncompressed)
    Data Size: 1900 Bytes = 1.9 KiB
    Load Address: 00000000
    Entry Point: 00000000
    Contents:
    Image 0: 1892 Bytes = 1.8 KiB
    Verifying Checksum ... OK
    ## Executing script at 61000000
    Setting bus to 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x140000, size 0x140000
    SF: 1310720 bytes @ 0x140000 Read: OK
    7313fffc: 5a6d1cc7 ..mZ
    crc32 for 73000000 ... 7313ffff ==> c71c6d5a
    Total of 1 word(s) were the same
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from previous installed Junos packages ...
    If previous set of packages are not available, we will boot
    from the currently installed set of packages.
    |
    /packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99]
    /packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7
    /packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479]
    loading required module 'netstack'
    /packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de]
    /packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e]
    /packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602]
    /packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654]
    /packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c]
    /packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580]
    loading required module 'pvi_db'
    /packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617]
    loading required module 'devrt'
    /packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81]
    /packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6]
    loading required module 'miibus'
    /packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491]
    /packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5]
    /packages/sets/active/boot/os-kernel/contents.izo size=0x993800
    /packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194]
    /packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747]
    /packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8]
    /packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94]
    /packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf]
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088
    Booting [/packages/sets/active/boot/os-kernel/kernel]...
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    Kernel entry at 0xc1000180...
    Kernel args: (null)
    ---<<BOOT>>---
    GDB: no debug ports present
    KDB: debugger backends: ddb ndb
    KDB: current backend: ddb
    Copyright (c) 1992-2020 The FreeBSD Project.
    Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
    The Regents of the University of California. All rights reserved.
    FreeBSD is a registered trademark of The FreeBSD Foundation.
    FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022
    builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm
    Juniper clang version 10.0.1 (git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902)
    module rtc already present!
    module wdog already present!
    module resetpfe already present!
    module crypto already present!
    arm unwind: module 'crypto.ko' not on list at unload time
    sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)!
    CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
    CPU Features:
    Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
    Optional instructions:
    UMULL, SMULL, SIMD(ext)
    LoUU:2 LoC:2 LoUIS:2
    Cache level 1:
    32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
    32KB/32B 4-way instruction cache Read-Alloc
    real memory = 2147483648 (2048 MB)
    avail memory = 1985765376 (1893 MB)
    arc4random: no preloaded entropy cache
    Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
    Security policy loaded: Junos MAC/fips (mac_fips)
    Security policy loaded: MAC/veriexec (mac_veriexec)
    Security policy loaded: MAC/grantbylabel (mac_grantbylabel)
    Security policy loaded: Junos MAC/SDK (mac_sdk)
    MAC/veriexec fingerprint module loaded: SHA384
    MAC/veriexec fingerprint module loaded: SHA1
    MAC/veriexec fingerprint module loaded: SHA256
    rescue: initialized
    netisr_init: forcing maxthreads from 4 to 1
    random: entropy device external interface
    Initializing DCF platform properties ..
    Calling dcf_ng_hw_init for platform hw vecs initialization
    ofwbus0: <Open Firmware Device Tree>
    simplebus0: <Flattened device tree simple bus> on ofwbus0
    ihost_armpll0: <Broadcom iHost ARM PLL> mem 0-0xfff on simplebus0
    simplebus1: <Flattened device tree simple bus> on ofwbus0
    bcmidm0: <Broadcom Interconnect Device Management (IDM)> mem 0x100000-0x1fffff on simplebus1
    l2cache0: <PL310 L2 cache controller> mem 0x22000-0x22fff on simplebus0
    l2cache0: cannot allocate IRQ, not using interrupt
    l2cache0: Part number: 0x3, release: 0x9 (r3p3)
    l2cache0: L2 Cache enabled: 256KB/32B 16 ways
    bcmcru0: <Broadcom BCM56XXX cru> mem 0xe000-0xefff on simplebus1
    gic0: <ARM Generic Interrupt Controller> mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0
    gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256
    mp_tmr0: <ARM MPCore Timers> mem 0x20200-0x202ff irq 1 on simplebus0
    Timecounter "MPCore" frequency 625000000 Hz quality 800
    mp_tmr1: <ARM MPCore Timers> mem 0x20600-0x2061f irq 2 on simplebus0
    Event timer "MPCore" frequency 625000000 Hz quality 1000
    cpulist0: <Open Firmware CPU Group> on ofwbus0
    cpu0: <Open Firmware CPU> on cpulist0
    cmic0: <Broadcom CMIC> mem 0x3200000-0x32fffff irq 0 on ofwbus0
    cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064:
    cmicbus0: <CMIC Functions> on cmic0
    cmicmdio0: <Broadcom CMIC MDIO> on cmicbus0
    epcmic0: <Broadcom,epcmic> mem 0x20000000-0x200fffff on ofwbus0
    epccg0: <Broadcom,epccg> mem 0x20800000-0x20807fff on ofwbus0
    ccgmdio0: <Broadcom BCM56060 CCG-MDIO> mem 0x2000-0x20ff on simplebus1
    gpio0: <Broadcom BCM56XXX GPIO controller> mem 0xa000-0xa0ff irq 4 on simplebus1
    gpiobus0: <GPIO bus> on gpio0
    gpioc0: <GPIO controller> on gpio0
    iichb0: <Broadcom iProc SMBus Controller> mem 0x8000-0x8fff irq 5 on simplebus1
    iicbus0: <OFW I2C bus> on iichb0
    iic0: <I2C generic I/O> on iicbus0
    iicswitch0: <I2C Switch/Multiplexer> at addr 0xe0 on iicbus0
    poe0: <POE> on iicswitch0
    poe reset failed
    rtc8564je_rtc0: <EPSON 8564JE Real Time Clock(RTC)> on iicswitch0
    rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s
    cpld0: <Juniper CPLD for iProc> at addr 0x62 on iicbus0
    cpldbus0: <CPLD Functions> on cpld0
    wdog0: <CPLD Watchdog Timer for iProc> on cpldbus0
    oamctl0: <OAM Control using CPLD for iProc> on cpldbus0
    fan0: <CPLD fan controller> on cpldbus0
    fan1: <CPLD fan controller> on cpldbus0
    resetctrl0: <I2C switch reset driver> on cpldbus0
    resetpfe0: <Reset EP PFE> on cpldbus0
    resetphy0: <CPLD PHY Reset for iProc> on cpldbus0
    bcmdmu0: <Broadcom BCM56XXX dmu> mem 0xf000-0xffff on simplebus1
    paxb0: <Broadcom,PAXB> mem 0x12000-0x12fff on simplebus1
    uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1
    uart0: [GIANT-LOCKED]
    uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1
    uart1: console (9600,n,8,1)
    uart1: [GIANT-LOCKED]
    bcmrng0: <Broadcom RBG200 RNG> mem 0x32000-0x32fff on simplebus1
    random: registering fast source Broadcom RBG200 RNG
    bcm560xgmac0: <Broadcom-56xxx GMAC> mem 0x42000-0x42fff irq 8 on simplebus1
    bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80
    miibus0: <MII bus> on bcm560xgmac0
    brgphy0: <BCM54616S 10/100/1000baseTX PHY> PHY 1 on miibus0
    brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
    ehci0: <BCMIPROC-USB-EHCI> mem 0x48000-0x49fff irq 9 on simplebus1
    ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064:
    usbus0: EHCI version 1.0
    usbus0 on ehci0
    spi0: <Broadcom BCM56XXX SPI> mem 0x47000-0x47fff irq 10 on simplebus1
    spibus0: <OFW SPI bus> on spi0
    mx25l0: <M25Pxx Flash Family> at cs 0 mode 0 on spibus0
    mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K
    cryptosoft0: <software crypto>
    Initializing product: 169 ..
    JUNOS procfs is initialized.
    Timecounters tick every 10.000 msec
    tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0
    Registering tcp_platform_dependent = tcp_handle_special_ports
    md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 10041344 bytes at 0xc2f3a000
    usbus0: 480Mbps High Speed USB v2.0
    paxb0: PCIe PHY Link Status :0x1c
    paxb0: PCIe PHY-DL Link up :0x1c
    ugen0.1: <Broadcom EHCI root HUB> at usbus0
    uhub0: <Broadcom EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
    Trying to mount root from cd9660:/dev/md0.uzip []...
    uhub0: 3 ports with 3 removable, self powered
    ugen0.2: <vendor 0x05e3 USB2.0 Hub> at usbus0
    uhub1 on uhub0
    uhub1: <vendor 0x05e3 USB2.0 Hub, class 9/0, rev 2.00/85.37, addr 2> on usbus0
    Entropy start-up health tests performed on 256 samples passed.
    random: unblocking device.
    uhub1: 4 ports with 3 removable, self powered
    ugen0.3: <vendor 0x13fe USB DISK 2.0> at usbus0
    umass0 on uhub1
    umass0: <vendor 0x13fe USB DISK 2.0, class 0/0, rev 2.00/1.00, addr 3> on usbus0
    umass0: SCSI over Bulk-Only; quirks = 0x8100
    umass0:0:0: Attached to scbus0
    da0 at umass-sim0 bus 0 scbus0 target 0 lun 0
    da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device
    da0: Serial Number 65001641D960D081
    da0: 40.000MB/s transfers
    da0: 1910MB (3911680 512 byte sectors)
    da0: quirks=0x3<NO_SYNC_CACHE,NO_6_BYTE>
    random: unblocking device.
    usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored)
    ** /dev/gpt/junos
    ** Last Mounted on /.mount
    ** Phase 1 - Check Blocks and Sizes
    INCORRECT BLOCK COUNT I=136802 (40 should be 0)
    CORRECT? yes

    INCORRECT BLOCK COUNT I=142282 (8 should be 0)
    CORRECT? yes

    ** Phase 2 - Check Pathnames
    ** Phase 3 - Check Connectivity
    ** Phase 4 - Check Reference Counts
    ** Phase 5 - Check Cyl groups
    FREE BLK COUNT(S) WRONG IN SUPERBLK
    SALVAGE? yes

    SUMMARY INFORMATION BAD
    SALVAGE? yes

    BLK(S) MISSING IN BIT MAPS
    SALVAGE? yes

    6757 files, 125718 used, 223846 free (182 frags, 27958 blocks, 0.1% fragmentation)

    ***** FILE SYSTEM MARKED CLEAN *****

    ***** FILE SYSTEM WAS MODIFIED *****
    @ 1667988468 [2022-11-09 10:07:48] preboot
    Initializing Verified Exec:
    Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
    umass1: at uhub1, port 4, addr 4 (disconnected)
    (da1:umass-sim1:1:0:0): got CAM status 0x44
    (da1:umass-sim1:1:0:0): fatal error, failed to attach to device
    umass1: detached
    Enforcing Verified Exec:
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
    da1: <Kingston DataTraveler 3.0 > Removable Direct Access SPC-4 SCSI device
    da1: Serial Number 08606E6D402EF1C0B70118A8
    da1: 40.000MB/s transfers
    da1: 7377MB (15109516 512 byte sectors, DIF type 8)
    da1: quirks=0x2<NO_6_BYTE>
    Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221
    @ 1667988491 [2022-11-09 10:08:11 UTC] mount start
    @ 1667988492 [2022-11-09 10:08:12 UTC] junos 22.1R1.10
    Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221
    Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1
    Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1
    Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1
    Starting watchdog daemon ...
    Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting na-telemetry-arm-32-22.1R1.10
    Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1
    chown: nobody: illegal group name
    Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-openconfig-arm-32-22.1R1.10
    Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1
    Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsdn-arm-32-22.1R1.10
    Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsd-arm-32-22.1R1.10-jet-1
    Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1
    mount_nullfs: /mfs/var: No such file or directory
    mount_nullfs: /mfs/var: No such file or directory
    Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1
    Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1
    Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting dsa-arm-32-22.1R1.10
    @ 1667988588 [2022-11-09 10:09:48 UTC] mount done
    Removing /etc/malloc.conf
    Checking platform support for: pvi:ex2300-48p
    @ 1667988596 [2022-11-09 10:09:56 UTC] mountlate start
    @ 1667988601 [2022-11-09 10:10:01 UTC] mountlate done
    kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform
    IPsec: Initialized Security Association Processing.
    link_elf: symbol in_cksum undefined
    kldload: can't load nfsd.ko: No such file or directory
    sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)!
    sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)!
    sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)!
    Calling dcf_ng_hw_init for platform hw vecs initialization
    Loading the CHMIC module
    Loading the DC Platform NETPFE module
    bcmsdk_5_9_x kld
    Loading BCMSDK module.....
    Junosprocfs mounted on /junosproc.
    loader.name="FreeBSD/armv6 U-Boot loader"
    loader.version="1.2"
    FreeBSD/armv6 U-Boot loader
    1.2
    972+0 records in
    972+0 records out
    505440 bytes transferred in 0.038686 secs (13065140 bytes/sec)
    @ 1667988639 [2022-11-09 10:10:39 UTC] mgd start
    Creating initial configuration: ...
    mgd: commit complete
    @ 1667988717 [2022-11-09 10:11:57 UTC] mgd done

    Lock Manager
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Unix Domain sockets Lock manager
    Lock manager 'lockmgr' started successfully.

    Database Initialization Utility
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Profile database initialized
    Enhanced arp scale is disabled
    /etc/rc: WARNING: No dump device. Savecore not run.
    Prefetching /usr/sbin/rpd ...
    Prefetching /usr/sbin/lacpd ...
    Prefetching /usr/sbin/chassisd ...
    @ 1667988728 [2022-11-09 10:12:08 UTC] mountlater start
    @ 1667988736 [2022-11-09 10:12:16 UTC] mountlater done
    Starting jlaunchhelperd.
    Starting cron.
    Nov 9 10:12:18 jlaunchd 13111 - - inet-process (PID 13133) started
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13133(inet-process): new process
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): exec_command
    Nov 9 10:12:18 jlaunchd 13111 - - sntpsync (PID 13136) started
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): new process
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command
    Nov 9 10:12:18 jlaunchd 13111 - - internal-routing-service (PID 13137) started
    Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): exec_command
    Nov 9 10:12:19 jlaunchd 13111 - - pfe-manager (PID 13148) started
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): new process
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): exec_command
    Nov 9 10:12:19 jlaunchd 13111 - - license-service (PID 13150) started
    Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): new process
    Nov 9 10:12:19 jlaunchd 13111 - - can not access /usr/sbin/sdk-mgmtd: No such file or directory
    Nov 9 10:12:19 jlaunchd 13111 - - Starting of initial processes complete

    Wed Nov 9 10:12:24 UTC 2022
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
    umass1: at uhub1, port 4, addr 4 (disconnected)
    da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
    da1: <Kingston DataTraveler 3.0 > s/n 08606E6D402EF1C0B70118A8 detached
    (da1:umass-sim1:1:0:0): Periph destroyed
    umass1: detached
    FLASH bank: 1
    checkboard
    Board: EX2300-48P
    Base MAC: 68F38E1EE5BE
    TOP_UC_TAP_WRITE_DATA = 0xbfbbffff
    arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz
    DDR Tuning Complete
    Net: Registering eth
    Broadcom BCM IPROC Ethernet driver 0.1
    Using GMAC0 (0x18042000)
    et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1
    bcmiproc_eth-0
    Last Reset Reason: 8
    Hit ^C to stop autoboot: 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x3c0000, size 0x10000
    SF: 65536 bytes @ 0x3c0000 Read: OK

    ## Checking Image at 61000000 ...
    Legacy image found
    Image Name: Juniper U-Boot Script File
    Image Type: ARM Unknown OS Script (uncompressed)
    Data Size: 1900 Bytes = 1.9 KiB
    Load Address: 00000000
    Entry Point: 00000000
    Contents:
    Image 0: 1892 Bytes = 1.8 KiB
    Verifying Checksum ... OK
    ## Executing script at 61000000
    Setting bus to 0
    sleep - delay execution for some time

    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x140000, size 0x140000
    SF: 1310720 bytes @ 0x140000 Read: OK
    sleep - delay execution for some time

    7313fffc: 5a6d1cc7 ..mZ
    crc32 for 73000000 ... 7313ffff ==> c71c6d5a
    Total of 1 word(s) were the same
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice:
    Attempting to boot from USB ...
    No USB media found
    Boot Menu

    1. Boot [P]revious installed Junos packages
    2. Boot Junos in [S]ingle user mode
    3. Boot from [R]ecovery snapshot

    4. Boot from [U]SB

    5. Boot to [O]AM shell

    6. Snapshot [B]oot menu

    7. [M]ain menu
    Choice: FLASH bank: 1
    checkboard
    Board: EX2300-48P
    Base MAC: 68F38E1EE5BE
    TOP_UC_TAP_WRITE_DATA = 0xbfbbffff
    arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz
    DDR Tuning Complete
    Net: Registering eth
    Broadcom BCM IPROC Ethernet driver 0.1
    Using GMAC0 (0x18042000)
    et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1
    bcmiproc_eth-0
    Last Reset Reason: 8
    Hit ^C to stop autoboot: 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x3c0000, size 0x10000
    SF: 65536 bytes @ 0x3c0000 Read: OK

    ## Checking Image at 61000000 ...
    Legacy image found
    Image Name: Juniper U-Boot Script File
    Image Type: ARM Unknown OS Script (uncompressed)
    Data Size: 1900 Bytes = 1.9 KiB
    Load Address: 00000000
    Entry Point: 00000000
    Contents:
    Image 0: 1892 Bytes = 1.8 KiB
    Verifying Checksum ... OK
    ## Executing script at 61000000
    Setting bus to 0
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
    device 0 offset 0x140000, size 0x140000
    SF: 1310720 bytes @ 0x140000 Read: OK
    7313fffc: 5a6d1cc7 ..mZ
    crc32 for 73000000 ... 7313ffff ==> c71c6d5a
    Total of 1 word(s) were the same
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.

    Booting from Junos volume ...
    |
    /packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99]
    /packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7
    /packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479]
    loading required module 'netstack'
    /packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de]
    /packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e]
    /packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602]
    /packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654]
    /packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c]
    /packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580]
    loading required module 'pvi_db'
    /packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617]
    loading required module 'devrt'
    /packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81]
    /packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6]
    loading required module 'miibus'
    /packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491]
    /packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5]
    /packages/sets/active/boot/os-kernel/contents.izo size=0x993800
    /packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194]
    /packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747]
    /packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8]
    /packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94]
    /packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf]
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088
    Booting [/packages/sets/active/boot/os-kernel/kernel]...
    Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
    Kernel entry at 0xc1000180...
    Kernel args: (null)
    ---<<BOOT>>---
    GDB: no debug ports present
    KDB: debugger backends: ddb ndb
    KDB: current backend: ddb
    Copyright (c) 1992-2020 The FreeBSD Project.
    Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
    The Regents of the University of California. All rights reserved.
    FreeBSD is a registered trademark of The FreeBSD Foundation.
    FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022
    builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm
    Juniper clang version 10.0.1 (git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902)
    module rtc already present!
    module wdog already present!
    module resetpfe already present!
    module crypto already present!
    arm unwind: module 'crypto.ko' not on list at unload time
    sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)!
    CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
    CPU Features:
    Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
    Optional instructions:
    UMULL, SMULL, SIMD(ext)
    LoUU:2 LoC:2 LoUIS:2
    Cache level 1:
    32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
    32KB/32B 4-way instruction cache Read-Alloc
    real memory = 2147483648 (2048 MB)
    avail memory = 1985765376 (1893 MB)
    arc4random: no preloaded entropy cache
    Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
    Security policy loaded: Junos MAC/fips (mac_fips)
    Security policy loaded: MAC/veriexec (mac_veriexec)
    Security policy loaded: MAC/grantbylabel (mac_grantbylabel)
    Security policy loaded: Junos MAC/SDK (mac_sdk)
    MAC/veriexec fingerprint module loaded: SHA384
    MAC/veriexec fingerprint module loaded: SHA1
    MAC/veriexec fingerprint module loaded: SHA256
    rescue: initialized
    netisr_init: forcing maxthreads from 4 to 1
    random: entropy device external interface
    Initializing DCF platform properties ..
    Calling dcf_ng_hw_init for platform hw vecs initialization
    ofwbus0: <Open Firmware Device Tree>
    simplebus0: <Flattened device tree simple bus> on ofwbus0
    ihost_armpll0: <Broadcom iHost ARM PLL> mem 0-0xfff on simplebus0
    simplebus1: <Flattened device tree simple bus> on ofwbus0
    bcmidm0: <Broadcom Interconnect Device Management (IDM)> mem 0x100000-0x1fffff on simplebus1
    l2cache0: <PL310 L2 cache controller> mem 0x22000-0x22fff on simplebus0
    l2cache0: cannot allocate IRQ, not using interrupt
    l2cache0: Part number: 0x3, release: 0x9 (r3p3)
    l2cache0: L2 Cache enabled: 256KB/32B 16 ways
    bcmcru0: <Broadcom BCM56XXX cru> mem 0xe000-0xefff on simplebus1
    gic0: <ARM Generic Interrupt Controller> mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0
    gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256
    mp_tmr0: <ARM MPCore Timers> mem 0x20200-0x202ff irq 1 on simplebus0
    Timecounter "MPCore" frequency 625000000 Hz quality 800
    mp_tmr1: <ARM MPCore Timers> mem 0x20600-0x2061f irq 2 on simplebus0
    Event timer "MPCore" frequency 625000000 Hz quality 1000
    cpulist0: <Open Firmware CPU Group> on ofwbus0
    cpu0: <Open Firmware CPU> on cpulist0
    cmic0: <Broadcom CMIC> mem 0x3200000-0x32fffff irq 0 on ofwbus0
    cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064:
    cmicbus0: <CMIC Functions> on cmic0
    cmicmdio0: <Broadcom CMIC MDIO> on cmicbus0
    epcmic0: <Broadcom,epcmic> mem 0x20000000-0x200fffff on ofwbus0
    epccg0: <Broadcom,epccg> mem 0x20800000-0x20807fff on ofwbus0
    ccgmdio0: <Broadcom BCM56060 CCG-MDIO> mem 0x2000-0x20ff on simplebus1
    gpio0: <Broadcom BCM56XXX GPIO controller> mem 0xa000-0xa0ff irq 4 on simplebus1
    gpiobus0: <GPIO bus> on gpio0
    gpioc0: <GPIO controller> on gpio0
    iichb0: <Broadcom iProc SMBus Controller> mem 0x8000-0x8fff irq 5 on simplebus1
    iicbus0: <OFW I2C bus> on iichb0
    iic0: <I2C generic I/O> on iicbus0
    iicswitch0: <I2C Switch/Multiplexer> at addr 0xe0 on iicbus0
    poe0: <POE> on iicswitch0
    poe reset failed
    rtc8564je_rtc0: <EPSON 8564JE Real Time Clock(RTC)> on iicswitch0
    rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s
    cpld0: <Juniper CPLD for iProc> at addr 0x62 on iicbus0
    cpldbus0: <CPLD Functions> on cpld0
    wdog0: <CPLD Watchdog Timer for iProc> on cpldbus0
    oamctl0: <OAM Control using CPLD for iProc> on cpldbus0
    fan0: <CPLD fan controller> on cpldbus0
    fan1: <CPLD fan controller> on cpldbus0
    resetctrl0: <I2C switch reset driver> on cpldbus0
    resetpfe0: <Reset EP PFE> on cpldbus0
    resetphy0: <CPLD PHY Reset for iProc> on cpldbus0
    bcmdmu0: <Broadcom BCM56XXX dmu> mem 0xf000-0xffff on simplebus1
    paxb0: <Broadcom,PAXB> mem 0x12000-0x12fff on simplebus1
    uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1
    uart0: [GIANT-LOCKED]
    uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1
    uart1: console (9600,n,8,1)
    uart1: [GIANT-LOCKED]
    bcmrng0: <Broadcom RBG200 RNG> mem 0x32000-0x32fff on simplebus1
    random: registering fast source Broadcom RBG200 RNG
    bcm560xgmac0: <Broadcom-56xxx GMAC> mem 0x42000-0x42fff irq 8 on simplebus1
    bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80
    miibus0: <MII bus> on bcm560xgmac0
    brgphy0: <BCM54616S 10/100/1000baseTX PHY> PHY 1 on miibus0
    brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
    ehci0: <BCMIPROC-USB-EHCI> mem 0x48000-0x49fff irq 9 on simplebus1
    ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064:
    usbus0: EHCI version 1.0
    usbus0 on ehci0
    spi0: <Broadcom BCM56XXX SPI> mem 0x47000-0x47fff irq 10 on simplebus1
    spibus0: <OFW SPI bus> on spi0
    mx25l0: <M25Pxx Flash Family> at cs 0 mode 0 on spibus0
    mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K
    cryptosoft0: <software crypto>
    Initializing product: 169 ..
    JUNOS procfs is initialized.
    Timecounters tick every 10.000 msec
    tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0
    Registering tcp_platform_dependent = tcp_handle_special_ports
    md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 10041344 bytes at 0xc2f3a000
    usbus0: 480Mbps High Speed USB v2.0
    paxb0: PCIe PHY Link Status :0x1c
    paxb0: PCIe PHY-DL Link up :0x1c
    ugen0.1: <Broadcom EHCI root HUB> at usbus0
    uhub0: <Broadcom EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
    Trying to mount root from cd9660:/dev/md0.uzip []...
    uhub0: 3 ports with 3 removable, self powered
    ugen0.2: <vendor 0x05e3 USB2.0 Hub> at usbus0
    uhub1 on uhub0
    uhub1: <vendor 0x05e3 USB2.0 Hub, class 9/0, rev 2.00/85.37, addr 2> on usbus0
    Entropy start-up health tests performed on 256 samples passed.
    random: unblocking device.
    uhub1: 4 ports with 3 removable, self powered
    ugen0.3: <vendor 0x13fe USB DISK 2.0> at usbus0
    umass0 on uhub1
    umass0: <vendor 0x13fe USB DISK 2.0, class 0/0, rev 2.00/1.00, addr 3> on usbus0
    umass0: SCSI over Bulk-Only; quirks = 0x8100
    umass0:0:0: Attached to scbus0
    da0 at umass-sim0 bus 0 scbus0 target 0 lun 0
    da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device
    da0: Serial Number 65001641D960D081
    da0: 40.000MB/s transfers
    da0: 1910MB (3911680 512 byte sectors)
    da0: quirks=0x3<NO_SYNC_CACHE,NO_6_BYTE>
    random: unblocking device.
    usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored)
    ** /dev/gpt/junos
    ** Last Mounted on /.mount
    ** Phase 1 - Check Blocks and Sizes
    INCORRECT BLOCK COUNT I=136828 (40 should be 0)
    CORRECT? yes

    ** Phase 2 - Check Pathnames
    ** Phase 3 - Check Connectivity
    ** Phase 4 - Check Reference Counts
    ** Phase 5 - Check Cyl groups
    6764 files, 125797 used, 223767 free (191 frags, 27947 blocks, 0.1% fragmentation)

    ***** FILE SYSTEM MARKED CLEAN *****

    ***** FILE SYSTEM WAS MODIFIED *****
    @ 1667990872 [2022-11-09 10:47:52] preboot
    Initializing Verified Exec:
    Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
    umass1: at uhub1, port 4, addr 4 (disconnected)
    (probe0:umass-sim1:1:0:0): REPORT LUNS. CDB: a0 00 00 00 00 00 00 00 00 10 00 00
    (probe0:umass-sim1:1:0:0): CAM status: CCB request completed with an error
    (probe0:umass-sim1:1:0:0): Retrying command, 4 more tries remain
    (da1:umass-sim1:1:0:0): got CAM status 0xa
    (da1:umass-sim1:1:0:0): fatal error, failed to attach to device
    umass1: detached
    Enforcing Verified Exec:
    ugen0.4: <Kingston DataTraveler 3.0> at usbus0
    umass1 on uhub1
    umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
    umass1: SCSI over Bulk-Only; quirks = 0xc100
    umass1:1:1: Attached to scbus1
    da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
    da1: <Kingston DataTraveler 3.0 > Removable Direct Access SPC-4 SCSI device
    da1: Serial Number 08606E6D402EF1C0B70118A8
    da1: 40.000MB/s transfers
    da1: 7377MB (15109516 512 byte sectors, DIF type 8)
    da1: quirks=0x2<NO_6_BYTE>
    Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221
    @ 1667990894 [2022-11-09 10:48:14 UTC] mount start
    @ 1667990895 [2022-11-09 10:48:15 UTC] junos 22.1R1.10
    Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221
    Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1
    Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1
    Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221
    Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1
    Starting watchdog daemon ...
    Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting na-telemetry-arm-32-22.1R1.10
    Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1
    chown: nobody: illegal group name
    Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-openconfig-arm-32-22.1R1.10
    Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1
    Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsdn-arm-32-22.1R1.10
    Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jsd-arm-32-22.1R1.10-jet-1
    Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1
    mount_nullfs: /mfs/var: No such file or directory
    mount_nullfs: /mfs/var: No such file or directory
    Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1
    Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1
    Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1
    Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
    Mounting dsa-arm-32-22.1R1.10
    @ 1667990991 [2022-11-09 10:49:51 UTC] mount done
    Removing /etc/malloc.conf
    Checking platform support for: pvi:ex2300-48p
    @ 1667990999 [2022-11-09 10:49:59 UTC] mountlate start
    @ 1667991004 [2022-11-09 10:50:04 UTC] mountlate done
    kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform
    IPsec: Initialized Security Association Processing.
    link_elf: symbol in_cksum undefined
    kldload: can't load nfsd.ko: No such file or directory
    sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)!
    sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)!
    sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)!
    Calling dcf_ng_hw_init for platform hw vecs initialization
    Loading the CHMIC module
    Loading the DC Platform NETPFE module
    bcmsdk_5_9_x kld
    Loading BCMSDK module.....
    Junosprocfs mounted on /junosproc.
    loader.name="FreeBSD/armv6 U-Boot loader"
    loader.version="1.2"
    FreeBSD/armv6 U-Boot loader
    1.2
    972+0 records in
    972+0 records out
    505440 bytes transferred in 0.040014 secs (12631458 bytes/sec)
    @ 1667991041 [2022-11-09 10:50:41 UTC] mgd start
    Creating initial configuration: ...
    mgd: commit complete
    @ 1667991120 [2022-11-09 10:52:00 UTC] mgd done

    Lock Manager
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Unix Domain sockets Lock manager
    Lock manager 'lockmgr' started successfully.

    Database Initialization Utility
    RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
    Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

    Profile database initialized
    Enhanced arp scale is disabled
    /etc/rc: WARNING: No dump device. Savecore not run.
    Prefetching /usr/sbin/rpd ...
    Prefetching /usr/sbin/lacpd ...
    Prefetching /usr/sbin/chassisd ...
    @ 1667991131 [2022-11-09 10:52:11 UTC] mountlater start
    @ 1667991139 [2022-11-09 10:52:19 UTC] mountlater done
    Starting jlaunchhelperd.
    Starting cron.
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): exec_command
    Nov 9 10:52:21 jlaunchd 13111 - - sntpsync (PID 13134) started
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): new process
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command
    Nov 9 10:52:21 jlaunchd 13111 - - internal-routing-service (PID 13137) started
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process
    Nov 9 10:52:21 jlaunchd 13111 - - Found pid 13105 for already running process: eventd
    Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13105(event-processing): new process
    Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): exec_command
    Nov 9 10:52:22 jlaunchd 13111 - - virtual-chassis-control (PID 13138) started
    Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): new process

    Wed Nov 9 10:52:26 UTC 2022
    Nov 9 10:52:30 jlaunchd 13111 - - Registered PID 13204(pfed): exec_command

    ------------------------------
    BALAZS KISS
    ------------------------------



  • 7.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-09-2022 14:05
    You should probably avoid such long posts. It is better to upload a file.

    A format install didn't solve the problem? That's odd. I see you used Junos 22.1R1. That is not a release that I would recommend. Use 20.4R3-Sx where Sx stands for the latest service release (you need to select "Junos SR" when downloading, 20.4R3-S5 is the latest release right now).

    Try 20.4R3-S5 and report back!


  • 8.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-10-2022 03:32
    Sorry for the long post, I'm unable to delete it.
    I can't get through on login screen neither recovery mode nor usb boot so I'm not able to format install or reinstall the junos. That's why I need help.
    Customer has license for this version only, so it must be this one, even if will be able to reinstall this.

    ------------------------------
    BALAZS KISS
    ------------------------------



  • 9.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-10-2022 06:51
    You should see this in an EX2300 when you have a USB stick inserted in it (even if i has no Junos image on it):

    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... 4 USB Device(s) found
    scanning usb for storage devices... 2 Storage Device(s) found

    What you have in your logs is:
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found

    As you can see, I have 4 USB devices and you only get 3. I also have 2 storage devices and you have only 1 (the built-in one, no external USB stick). Replace your USB memory to a better one. I'm not sure about the requirements for the USB memory but as long as it's a decent quality stick it should be fine.

    The following is of special importance:

    "Transfer the image to a bootable USB. You can make a USB drive bootable by using the dd command in shell, or use GUI-based USB flash drive utilities such as Rufus or ISO Burner for Windows.
    Note: "img.gz" files may need to be extracted to "img".
    "

    /Fredrik


  • 10.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-10-2022 07:04
    Hi,


    Sandisk never worked on juniper devices, so we usually use Kingston Datatraveller. I suppose it should be good as it was recognized by the devices when I copy images to devices.
    In my log file I can see this:

    "
    starting USB...
    USB0: USB EHCI 1.00
    scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
    unable to get device descriptor (error=-1)
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found
    SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
    ## Starting application at 0x00000074 ...
    Consoles: U-Boot console

    FreeBSD/armv6 U-Boot loader, Revision 1.2
    (fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)

    DRAM: 2048MB
    Number of U-Boot devices: 2
    U-Boot env: loaderdev not set, will probe all devices.
    Found U-Boot device: disk
    Probing all disk devices...
    Checking unit=0 slice=<auto> partition=<auto>... good.
    Main Menu

    1. Boot [J]unos volume
    2. Boot Junos volume in [S]afe mode

    3. [R]eboot

    4. [B]oot menu
    5. [M]ore options
    "

    Nothing happens when I try boot menu and choose USB.
    I can buy a new USB, but the question is what brand and model should I buy if the Kingston is not good enough?

    Regards,




    ------------------------------
    BALAZS KISS
    ------------------------------



  • 11.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-10-2022 07:35
    Hi!

    As long as you don't see 4 USB devices and 2 disks, you don't have a USB device that works.

    You have this:
    3 USB Device(s) found
    scanning usb for storage devices... 1 Storage Device(s) found

    Selecting USB Boot will not work until you get a proper USB memory. Sorry!

    /Fredrik


  • 12.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-10-2022 10:35
    Well the good news, we tried another stick from another brand and it was booting from it.

    Bad news, it was frozen again, just before the login. Exactly at the same location like last time.  :(

    ------------------------------
    BALAZS KISS
    ------------------------------



  • 13.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-10-2022 12:50
    So, despite a successful USB format install, the switch will not boot? Have you tried downloading the Junos version again just to make sure you don't have a corrupt version of Junos?

    Also, I find it odd that the customer isn't entitled to anything but Junos 22.2R1. I've never heard of such a license before and the EX2300 is covered by a limited lifetime warranty and Junos upgrades. I still suggest that you download the 20.4R3-S5 release and try that one. Once the switch is OK, you can upgrade to 22.2 if you like (again, I wouldn't recommend that release!).


  • 14.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-11-2022 04:12
    Morning.

    Yes, I can confirm it stops just before the login screen. We waited, tried to press buttons, but nothing.

    Customer has hundreds of sites with thousands of devices and all are setup by us. They use different versions for different devices, and all the switches got this version, so that's why we can't make exception. As this site is already late, only my curiosity leads me, how to resolve this, this device will go back to manufacturer in RMA process and we will use another one.  

    I will try to use the suggested version for installing later when I have time. I will let you know about results.

    ------------------------------
    BALAZS KISS
    ------------------------------



  • 15.  RE: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it

    Posted 11-11-2022 05:56
    My next question was going to be if you had a service contract for the switch :) If you have the time, try the 20.4 as I suggested, otherwose open a case with JTAC (or RMA directly).

    /Fredrik