Legacy image found
Image Name: Juniper U-Boot Script File
Image Type: ARM Unknown OS Script (uncompressed)
Data Size: 1900 Bytes = 1.9 KiB
Load Address: 00000000
Entry Point: 00000000
Contents:
Image 0: 1892 Bytes = 1.8 KiB
Verifying Checksum ... OK
## Executing script at 61000000
Setting bus to 0
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
device 0 offset 0x140000, size 0x140000
SF: 1310720 bytes @ 0x140000 Read: OK
7313fffc: 5a6d1cc7 ..mZ
crc32 for 73000000 ... 7313ffff ==> c71c6d5a
Total of 1 word(s) were the same
starting USB...
USB0: USB EHCI 1.00
scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
unable to get device descriptor (error=-1)
3 USB Device(s) found
scanning usb for storage devices... 1 Storage Device(s) found
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
## Starting application at 0x00000074 ...
Consoles: U-Boot console
FreeBSD/armv6 U-Boot loader, Revision 1.2
(
fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)
DRAM: 2048MB
Number of U-Boot devices: 2
U-Boot env: loaderdev not set, will probe all devices.
Found U-Boot device: disk
Probing all disk devices...
Checking unit=0 slice=<auto> partition=<auto>... good.
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from previous installed Junos packages ...
If previous set of packages are not available, we will boot
from the currently installed set of packages.
|
/packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99]
/packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7
/packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479]
loading required module 'netstack'
/packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de]
/packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e]
/packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602]
/packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654]
/packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c]
/packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580]
loading required module 'pvi_db'
/packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617]
loading required module 'devrt'
/packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81]
/packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6]
loading required module 'miibus'
/packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491]
/packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5]
/packages/sets/active/boot/os-kernel/contents.izo size=0x993800
/packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194]
/packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747]
/packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8]
/packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94]
/packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf]
Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088
Booting [/packages/sets/active/boot/os-kernel/kernel]...
Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
Kernel entry at 0xc1000180...
Kernel args: (null)
---<<BOOT>>---
GDB: no debug ports present
KDB: debugger backends: ddb ndb
KDB: current backend: ddb
Copyright (c) 1992-2020 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022
builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm
Juniper clang version 10.0.1 (
git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902)
module rtc already present!
module wdog already present!
module resetpfe already present!
module crypto already present!
arm unwind: module 'crypto.ko' not on list at unload time
sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)!
CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
CPU Features:
Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
Optional instructions:
UMULL, SMULL, SIMD(ext)
LoUU:2 LoC:2 LoUIS:2
Cache level 1:
32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
32KB/32B 4-way instruction cache Read-Alloc
real memory = 2147483648 (2048 MB)
avail memory = 1985765376 (1893 MB)
arc4random: no preloaded entropy cache
Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
Security policy loaded: Junos MAC/fips (mac_fips)
Security policy loaded: MAC/veriexec (mac_veriexec)
Security policy loaded: MAC/grantbylabel (mac_grantbylabel)
Security policy loaded: Junos MAC/SDK (mac_sdk)
MAC/veriexec fingerprint module loaded: SHA384
MAC/veriexec fingerprint module loaded: SHA1
MAC/veriexec fingerprint module loaded: SHA256
rescue: initialized
netisr_init: forcing maxthreads from 4 to 1
random: entropy device external interface
Initializing DCF platform properties ..
Calling dcf_ng_hw_init for platform hw vecs initialization
ofwbus0: <Open Firmware Device Tree>
simplebus0: <Flattened device tree simple bus> on ofwbus0
ihost_armpll0: <Broadcom iHost ARM PLL> mem 0-0xfff on simplebus0
simplebus1: <Flattened device tree simple bus> on ofwbus0
bcmidm0: <Broadcom Interconnect Device Management (IDM)> mem 0x100000-0x1fffff on simplebus1
l2cache0: <PL310 L2 cache controller> mem 0x22000-0x22fff on simplebus0
l2cache0: cannot allocate IRQ, not using interrupt
l2cache0: Part number: 0x3, release: 0x9 (r3p3)
l2cache0: L2 Cache enabled: 256KB/32B 16 ways
bcmcru0: <Broadcom BCM56XXX cru> mem 0xe000-0xefff on simplebus1
gic0: <ARM Generic Interrupt Controller> mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0
gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256
mp_tmr0: <ARM MPCore Timers> mem 0x20200-0x202ff irq 1 on simplebus0
Timecounter "MPCore" frequency 625000000 Hz quality 800
mp_tmr1: <ARM MPCore Timers> mem 0x20600-0x2061f irq 2 on simplebus0
Event timer "MPCore" frequency 625000000 Hz quality 1000
cpulist0: <Open Firmware CPU Group> on ofwbus0
cpu0: <Open Firmware CPU> on cpulist0
cmic0: <Broadcom CMIC> mem 0x3200000-0x32fffff irq 0 on ofwbus0
cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064:
cmicbus0: <CMIC Functions> on cmic0
cmicmdio0: <Broadcom CMIC MDIO> on cmicbus0
epcmic0: <Broadcom,epcmic> mem 0x20000000-0x200fffff on ofwbus0
epccg0: <Broadcom,epccg> mem 0x20800000-0x20807fff on ofwbus0
ccgmdio0: <Broadcom BCM56060 CCG-MDIO> mem 0x2000-0x20ff on simplebus1
gpio0: <Broadcom BCM56XXX GPIO controller> mem 0xa000-0xa0ff irq 4 on simplebus1
gpiobus0: <GPIO bus> on gpio0
gpioc0: <GPIO controller> on gpio0
iichb0: <Broadcom iProc SMBus Controller> mem 0x8000-0x8fff irq 5 on simplebus1
iicbus0: <OFW I2C bus> on iichb0
iic0: <I2C generic I/O> on iicbus0
iicswitch0: <I2C Switch/Multiplexer> at addr 0xe0 on iicbus0
poe0: <POE> on iicswitch0
poe reset failed
rtc8564je_rtc0: <EPSON 8564JE Real Time Clock(RTC)> on iicswitch0
rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s
cpld0: <Juniper CPLD for iProc> at addr 0x62 on iicbus0
cpldbus0: <CPLD Functions> on cpld0
wdog0: <CPLD Watchdog Timer for iProc> on cpldbus0
oamctl0: <OAM Control using CPLD for iProc> on cpldbus0
fan0: <CPLD fan controller> on cpldbus0
fan1: <CPLD fan controller> on cpldbus0
resetctrl0: <I2C switch reset driver> on cpldbus0
resetpfe0: <Reset EP PFE> on cpldbus0
resetphy0: <CPLD PHY Reset for iProc> on cpldbus0
bcmdmu0: <Broadcom BCM56XXX dmu> mem 0xf000-0xffff on simplebus1
paxb0: <Broadcom,PAXB> mem 0x12000-0x12fff on simplebus1
uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1
uart0: [GIANT-LOCKED]
uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1
uart1: console (9600,n,8,1)
uart1: [GIANT-LOCKED]
bcmrng0: <Broadcom RBG200 RNG> mem 0x32000-0x32fff on simplebus1
random: registering fast source Broadcom RBG200 RNG
bcm560xgmac0: <Broadcom-56xxx GMAC> mem 0x42000-0x42fff irq 8 on simplebus1
bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80
miibus0: <MII bus> on bcm560xgmac0
brgphy0: <BCM54616S 10/100/1000baseTX PHY> PHY 1 on miibus0
brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
ehci0: <BCMIPROC-USB-EHCI> mem 0x48000-0x49fff irq 9 on simplebus1
ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064:
usbus0: EHCI version 1.0
usbus0 on ehci0
spi0: <Broadcom BCM56XXX SPI> mem 0x47000-0x47fff irq 10 on simplebus1
spibus0: <OFW SPI bus> on spi0
mx25l0: <M25Pxx Flash Family> at cs 0 mode 0 on spibus0
mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K
cryptosoft0: <software crypto>
Initializing product: 169 ..
JUNOS procfs is initialized.
Timecounters tick every 10.000 msec
tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0
Registering tcp_platform_dependent = tcp_handle_special_ports
md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 10041344 bytes at 0xc2f3a000
usbus0: 480Mbps High Speed USB v2.0
paxb0: PCIe PHY Link Status :0x1c
paxb0: PCIe PHY-DL Link up :0x1c
ugen0.1: <Broadcom EHCI root HUB> at usbus0
uhub0: <Broadcom EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
Trying to mount root from cd9660:/dev/md0.uzip []...
uhub0: 3 ports with 3 removable, self powered
ugen0.2: <vendor 0x05e3 USB2.0 Hub> at usbus0
uhub1 on uhub0
uhub1: <vendor 0x05e3 USB2.0 Hub, class 9/0, rev 2.00/85.37, addr 2> on usbus0
Entropy start-up health tests performed on 256 samples passed.
random: unblocking device.
uhub1: 4 ports with 3 removable, self powered
ugen0.3: <vendor 0x13fe USB DISK 2.0> at usbus0
umass0 on uhub1
umass0: <vendor 0x13fe USB DISK 2.0, class 0/0, rev 2.00/1.00, addr 3> on usbus0
umass0: SCSI over Bulk-Only; quirks = 0x8100
umass0:0:0: Attached to scbus0
da0 at umass-sim0 bus 0 scbus0 target 0 lun 0
da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device
da0: Serial Number 65001641D960D081
da0: 40.000MB/s transfers
da0: 1910MB (3911680 512 byte sectors)
da0: quirks=0x3<NO_SYNC_CACHE,NO_6_BYTE>
random: unblocking device.
usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored)
** /dev/gpt/junos
** Last Mounted on /.mount
** Phase 1 - Check Blocks and Sizes
INCORRECT BLOCK COUNT I=136802 (40 should be 0)
CORRECT? yes
INCORRECT BLOCK COUNT I=142282 (8 should be 0)
CORRECT? yes
** Phase 2 - Check Pathnames
** Phase 3 - Check Connectivity
** Phase 4 - Check Reference Counts
** Phase 5 - Check Cyl groups
FREE BLK COUNT(S) WRONG IN SUPERBLK
SALVAGE? yes
SUMMARY INFORMATION BAD
SALVAGE? yes
BLK(S) MISSING IN BIT MAPS
SALVAGE? yes
6757 files, 125718 used, 223846 free (182 frags, 27958 blocks, 0.1% fragmentation)
***** FILE SYSTEM MARKED CLEAN *****
***** FILE SYSTEM WAS MODIFIED *****
@ 1667988468 [2022-11-09 10:07:48] preboot
Initializing Verified Exec:
Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR
ugen0.4: <Kingston DataTraveler 3.0> at usbus0
umass1 on uhub1
umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
umass1: SCSI over Bulk-Only; quirks = 0xc100
umass1:1:1: Attached to scbus1
ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
umass1: at uhub1, port 4, addr 4 (disconnected)
(da1:umass-sim1:1:0:0): got CAM status 0x44
(da1:umass-sim1:1:0:0): fatal error, failed to attach to device
umass1: detached
Enforcing Verified Exec:
ugen0.4: <Kingston DataTraveler 3.0> at usbus0
umass1 on uhub1
umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
umass1: SCSI over Bulk-Only; quirks = 0xc100
umass1:1:1: Attached to scbus1
da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
da1: <Kingston DataTraveler 3.0 > Removable Direct Access SPC-4 SCSI device
da1: Serial Number 08606E6D402EF1C0B70118A8
da1: 40.000MB/s transfers
da1: 7377MB (15109516 512 byte sectors, DIF type 8)
da1: quirks=0x2<NO_6_BYTE>
Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221
Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221
@ 1667988491 [2022-11-09 10:08:11 UTC] mount start
@ 1667988492 [2022-11-09 10:08:12 UTC] junos 22.1R1.10
Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221
Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1
Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1
Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221
Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1
Starting watchdog daemon ...
Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting na-telemetry-arm-32-22.1R1.10
Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1
chown: nobody: illegal group name
Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-openconfig-arm-32-22.1R1.10
Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1
Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jsdn-arm-32-22.1R1.10
Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jsd-arm-32-22.1R1.10-jet-1
Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1
mount_nullfs: /mfs/var: No such file or directory
mount_nullfs: /mfs/var: No such file or directory
Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1
Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1
Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting dsa-arm-32-22.1R1.10
@ 1667988588 [2022-11-09 10:09:48 UTC] mount done
Removing /etc/malloc.conf
Checking platform support for: pvi:ex2300-48p
@ 1667988596 [2022-11-09 10:09:56 UTC] mountlate start
@ 1667988601 [2022-11-09 10:10:01 UTC] mountlate done
kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform
IPsec: Initialized Security Association Processing.
link_elf: symbol in_cksum undefined
kldload: can't load nfsd.ko: No such file or directory
sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)!
sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)!
sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)!
Calling dcf_ng_hw_init for platform hw vecs initialization
Loading the CHMIC module
Loading the DC Platform NETPFE module
bcmsdk_5_9_x kld
Loading BCMSDK module.....
Junosprocfs mounted on /junosproc.
loader.name="FreeBSD/armv6 U-Boot loader"
loader.version="1.2"
FreeBSD/armv6 U-Boot loader
1.2
972+0 records in
972+0 records out
505440 bytes transferred in 0.038686 secs (13065140 bytes/sec)
@ 1667988639 [2022-11-09 10:10:39 UTC] mgd start
Creating initial configuration: ...
mgd: commit complete
@ 1667988717 [2022-11-09 10:11:57 UTC] mgd done
Lock Manager
RDM Embedded 7 [04-Aug-2006]
http://www.birdstep.comCopyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.
Unix Domain sockets Lock manager
Lock manager 'lockmgr' started successfully.
Database Initialization Utility
RDM Embedded 7 [04-Aug-2006]
http://www.birdstep.comCopyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.
Profile database initialized
Enhanced arp scale is disabled
/etc/rc: WARNING: No dump device. Savecore not run.
Prefetching /usr/sbin/rpd ...
Prefetching /usr/sbin/lacpd ...
Prefetching /usr/sbin/chassisd ...
@ 1667988728 [2022-11-09 10:12:08 UTC] mountlater start
@ 1667988736 [2022-11-09 10:12:16 UTC] mountlater done
Starting jlaunchhelperd.
Starting cron.
Nov 9 10:12:18 jlaunchd 13111 - - inet-process (PID 13133) started
Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13133(inet-process): new process
Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): exec_command
Nov 9 10:12:18 jlaunchd 13111 - - sntpsync (PID 13136) started
Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13136(sntpsync): new process
Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command
Nov 9 10:12:18 jlaunchd 13111 - - internal-routing-service (PID 13137) started
Nov 9 10:12:18 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process
Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): exec_command
Nov 9 10:12:19 jlaunchd 13111 - - pfe-manager (PID 13148) started
Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13148(pfe-manager): new process
Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): exec_command
Nov 9 10:12:19 jlaunchd 13111 - - license-service (PID 13150) started
Nov 9 10:12:19 jlaunchd 13111 - - Registered PID 13150(license-service): new process
Nov 9 10:12:19 jlaunchd 13111 - - can not access /usr/sbin/sdk-mgmtd: No such file or directory
Nov 9 10:12:19 jlaunchd 13111 - - Starting of initial processes complete
Wed Nov 9 10:12:24 UTC 2022
ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
umass1: at uhub1, port 4, addr 4 (disconnected)
da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
da1: <Kingston DataTraveler 3.0 > s/n 08606E6D402EF1C0B70118A8 detached
(da1:umass-sim1:1:0:0): Periph destroyed
umass1: detached
FLASH bank: 1
checkboard
Board: EX2300-48P
Base MAC: 68F38E1EE5BE
TOP_UC_TAP_WRITE_DATA = 0xbfbbffff
arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz
DDR Tuning Complete
Net: Registering eth
Broadcom BCM IPROC Ethernet driver 0.1
Using GMAC0 (0x18042000)
et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1
bcmiproc_eth-0
Last Reset Reason: 8
Hit ^C to stop autoboot: 0
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
device 0 offset 0x3c0000, size 0x10000
SF: 65536 bytes @ 0x3c0000 Read: OK
## Checking Image at 61000000 ...
Legacy image found
Image Name: Juniper U-Boot Script File
Image Type: ARM Unknown OS Script (uncompressed)
Data Size: 1900 Bytes = 1.9 KiB
Load Address: 00000000
Entry Point: 00000000
Contents:
Image 0: 1892 Bytes = 1.8 KiB
Verifying Checksum ... OK
## Executing script at 61000000
Setting bus to 0
sleep - delay execution for some time
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
device 0 offset 0x140000, size 0x140000
SF: 1310720 bytes @ 0x140000 Read: OK
sleep - delay execution for some time
7313fffc: 5a6d1cc7 ..mZ
crc32 for 73000000 ... 7313ffff ==> c71c6d5a
Total of 1 word(s) were the same
starting USB...
USB0: USB EHCI 1.00
scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
unable to get device descriptor (error=-1)
3 USB Device(s) found
scanning usb for storage devices... 1 Storage Device(s) found
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
## Starting application at 0x00000074 ...
Consoles: U-Boot console
FreeBSD/armv6 U-Boot loader, Revision 1.2
(
fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)
DRAM: 2048MB
Number of U-Boot devices: 2
U-Boot env: loaderdev not set, will probe all devices.
Found U-Boot device: disk
Probing all disk devices...
Checking unit=0 slice=<auto> partition=<auto>... good.
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Main Menu
1. Boot [J]unos volume
2. Boot Junos volume in [S]afe mode
3. [R]eboot
4. [B]oot menu
5. [M]ore options
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice:
Attempting to boot from USB ...
No USB media found
Boot Menu
1. Boot [P]revious installed Junos packages
2. Boot Junos in [S]ingle user mode
3. Boot from [R]ecovery snapshot
4. Boot from [U]SB
5. Boot to [O]AM shell
6. Snapshot [B]oot menu
7. [M]ain menu
Choice: FLASH bank: 1
checkboard
Board: EX2300-48P
Base MAC: 68F38E1EE5BE
TOP_UC_TAP_WRITE_DATA = 0xbfbbffff
arm_clk=1250MHz, axi_clk=400MHz, apb_clk=100MHz, arm_periph_clk=625MHz
DDR Tuning Complete
Net: Registering eth
Broadcom BCM IPROC Ethernet driver 0.1
Using GMAC0 (0x18042000)
et0: ethHw_chipAttach: Chip ID: 0xb064; phyaddr: 0x1
bcmiproc_eth-0
Last Reset Reason: 8
Hit ^C to stop autoboot: 0
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
device 0 offset 0x3c0000, size 0x10000
SF: 65536 bytes @ 0x3c0000 Read: OK
## Checking Image at 61000000 ...
Legacy image found
Image Name: Juniper U-Boot Script File
Image Type: ARM Unknown OS Script (uncompressed)
Data Size: 1900 Bytes = 1.9 KiB
Load Address: 00000000
Entry Point: 00000000
Contents:
Image 0: 1892 Bytes = 1.8 KiB
Verifying Checksum ... OK
## Executing script at 61000000
Setting bus to 0
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB
device 0 offset 0x140000, size 0x140000
SF: 1310720 bytes @ 0x140000 Read: OK
7313fffc: 5a6d1cc7 ..mZ
crc32 for 73000000 ... 7313ffff ==> c71c6d5a
Total of 1 word(s) were the same
starting USB...
USB0: USB EHCI 1.00
scanning bus 0 for devices... EHCI timed out on TD - token=0x80008c80
unable to get device descriptor (error=-1)
3 USB Device(s) found
scanning usb for storage devices... 1 Storage Device(s) found
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000005
## Starting application at 0x00000074 ...
Consoles: U-Boot console
FreeBSD/armv6 U-Boot loader, Revision 1.2
(
fbsd-builder@svl-bsdx-05.juniper.net, Fri Aug 26 11:13:00 PDT 2016)
DRAM: 2048MB
Number of U-Boot devices: 2
U-Boot env: loaderdev not set, will probe all devices.
Found U-Boot device: disk
Probing all disk devices...
Checking unit=0 slice=<auto> partition=<auto>... good.
Booting from Junos volume ...
|
/packages/sets/active/boot/os-kernel/kernel data=0xebf7bc+0x5c844 syms=[0x4+0x76400+0x4+0x80b99]
/packages/sets/active/boot/os-kernel/ex2300.dtb size=0x1fb7
/packages/sets/active/boot/junos-modules/fips_core.ko text=0x1458 data=0x2a4+0x4 syms=[0x4+0x6b0+0x4+0x479]
loading required module 'netstack'
/packages/sets/active/boot/netstack/netstack.ko text=0xa513c4 data=0x36850+0x127884 syms=[0x4+0xe6330+0x4+0xba4de]
/packages/sets/active/boot/junos-modules/mac_sdk.ko text=0x1adc data=0x698+0x14 syms=[0x4+0xa20+0x4+0x73e]
/packages/sets/active/boot/junos-modules/sdk_core.ko text=0xa5a0 data=0x694+0x12c syms=[0x4+0x1da0+0x4+0x1602]
/packages/sets/active/boot/junos-modules/junosprocfs.ko text=0xdd8 data=0x394 syms=[0x4+0x8a0+0x4+0x654]
/packages/sets/active/boot/junos-modules/mac_fips.ko text=0x5c0 data=0x6ac syms=[0x4+0x530+0x4+0x43c]
/packages/sets/active/boot/junos-net-platform/dcp_re.ko text=0x264a4 data=0x73a0+0xd78 syms=[0x4+0x6690+0x4+0x6580]
loading required module 'pvi_db'
/packages/sets/active/boot/netstack/pvi_db.ko text=0x2c90 data=0x3c0+0x30 syms=[0x4+0x8c0+0x4+0x617]
loading required module 'devrt'
/packages/sets/active/boot/junos-modules-ex/devrt.ko text=0x201a0 data=0xaaf4+0x838c syms=[0x4+0x4730+0x4+0x3b81]
/packages/sets/active/boot/os-kernel/if_gmac.ko text=0xbdb4 data=0x698+0xc syms=[0x4+0x1c90+0x4+0x15a6]
loading required module 'miibus'
/packages/sets/active/boot/os-kernel/miibus.ko text=0x19f38 data=0x10d0+0x78 syms=[0x4+0x51f0+0x4+0x3491]
/packages/sets/active/boot/os-crypto/crypto.ko text=0x419f8 data=0xe64+0x2a4 syms=[0x4+0x4740+0x4+0x2ba5]
/packages/sets/active/boot/os-kernel/contents.izo size=0x993800
/packages/sets/active/boot/os-kernel/iflib.ko text=0x11f28 data=0x91c+0x58 syms=[0x4+0x2b10+0x4+0x2194]
/packages/sets/active/boot/junos-modules-ex/poe.ko text=0x2a30 data=0x450+0x34 syms=[0x4+0x9a0+0x4+0x747]
/packages/sets/active/boot/junos-modules-ex/bmeb.ko text=0x20384 data=0x185c+0x61c syms=[0x4+0x3860+0x4+0x2aa8]
/packages/sets/active/boot/junos-modules-ex/if_vcp.ko text=0x9468 data=0x3dc+0x14 syms=[0x4+0xe70+0x4+0xb94]
/packages/sets/active/boot/junos-modules-ex/peertype_fxpc.ko text=0x1bcc data=0x254+0xc syms=[0x4+0x680+0x4+0x4bf]
Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB, mapped at 00000088
Booting [/packages/sets/active/boot/os-kernel/kernel]...
Using DTB from loaded file '/packages/sets/active/boot/os-kernel/ex2300.dtb'.
Kernel entry at 0xc1000180...
Kernel args: (null)
---<<BOOT>>---
GDB: no debug ports present
KDB: debugger backends: ddb ndb
KDB: current backend: ddb
Copyright (c) 1992-2020 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD JNPR-12.1-20220221.2b3c81a_builder_stable_12_221 #0 r356482+2b3c81a16b4(stable/12_221): Mon Feb 21 00:29:47 PST 2022
builder@feyrith.juniper.net:/volume/build/junos/occam/llvm-10.0/sandbox-221-20220218/freebsd/stable_12_221/20220218.184313_builder_stable_12_221.2b3c81a/obj/arm/juniper/kernels/JNPR-ARM-PRD/kernel arm
Juniper clang version 10.0.1 (
git@eng-gitlab.juniper.net:tools-tot/llvm 477a470596099ea324b061842debb3f9707ee902)
module rtc already present!
module wdog already present!
module resetpfe already present!
module crypto already present!
arm unwind: module 'crypto.ko' not on list at unload time
sysctl_warn_reuse: can't re-use a leaf (hw.re.nssu_upgraded)!
CPU: ARM Cortex-A9 r4p1 (ECO: 0x00000000)
CPU Features:
Multiprocessing, Thumb2, Security, VMSAv7, Coherent Walk
Optional instructions:
UMULL, SMULL, SIMD(ext)
LoUU:2 LoC:2 LoUIS:2
Cache level 1:
32KB/32B 4-way data cache WB Read-Alloc Write-Alloc
32KB/32B 4-way instruction cache Read-Alloc
real memory = 2147483648 (2048 MB)
avail memory = 1985765376 (1893 MB)
arc4random: no preloaded entropy cache
Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
Security policy loaded: Junos MAC/fips (mac_fips)
Security policy loaded: MAC/veriexec (mac_veriexec)
Security policy loaded: MAC/grantbylabel (mac_grantbylabel)
Security policy loaded: Junos MAC/SDK (mac_sdk)
MAC/veriexec fingerprint module loaded: SHA384
MAC/veriexec fingerprint module loaded: SHA1
MAC/veriexec fingerprint module loaded: SHA256
rescue: initialized
netisr_init: forcing maxthreads from 4 to 1
random: entropy device external interface
Initializing DCF platform properties ..
Calling dcf_ng_hw_init for platform hw vecs initialization
ofwbus0: <Open Firmware Device Tree>
simplebus0: <Flattened device tree simple bus> on ofwbus0
ihost_armpll0: <Broadcom iHost ARM PLL> mem 0-0xfff on simplebus0
simplebus1: <Flattened device tree simple bus> on ofwbus0
bcmidm0: <Broadcom Interconnect Device Management (IDM)> mem 0x100000-0x1fffff on simplebus1
l2cache0: <PL310 L2 cache controller> mem 0x22000-0x22fff on simplebus0
l2cache0: cannot allocate IRQ, not using interrupt
l2cache0: Part number: 0x3, release: 0x9 (r3p3)
l2cache0: L2 Cache enabled: 256KB/32B 16 ways
bcmcru0: <Broadcom BCM56XXX cru> mem 0xe000-0xefff on simplebus1
gic0: <ARM Generic Interrupt Controller> mem 0x21000-0x21fff,0x20100-0x201ff on simplebus0
gic0: pn 0x39, arch 0x1, rev 0x2, implementer 0x43b irqs 256
mp_tmr0: <ARM MPCore Timers> mem 0x20200-0x202ff irq 1 on simplebus0
Timecounter "MPCore" frequency 625000000 Hz quality 800
mp_tmr1: <ARM MPCore Timers> mem 0x20600-0x2061f irq 2 on simplebus0
Event timer "MPCore" frequency 625000000 Hz quality 1000
cpulist0: <Open Firmware CPU Group> on ofwbus0
cpu0: <Open Firmware CPU> on cpulist0
cmic0: <Broadcom CMIC> mem 0x3200000-0x32fffff irq 0 on ofwbus0
cmic0: called :bcm_cmic_attach,Dev Chip Id is 0x1b064:
cmicbus0: <CMIC Functions> on cmic0
cmicmdio0: <Broadcom CMIC MDIO> on cmicbus0
epcmic0: <Broadcom,epcmic> mem 0x20000000-0x200fffff on ofwbus0
epccg0: <Broadcom,epccg> mem 0x20800000-0x20807fff on ofwbus0
ccgmdio0: <Broadcom BCM56060 CCG-MDIO> mem 0x2000-0x20ff on simplebus1
gpio0: <Broadcom BCM56XXX GPIO controller> mem 0xa000-0xa0ff irq 4 on simplebus1
gpiobus0: <GPIO bus> on gpio0
gpioc0: <GPIO controller> on gpio0
iichb0: <Broadcom iProc SMBus Controller> mem 0x8000-0x8fff irq 5 on simplebus1
iicbus0: <OFW I2C bus> on iichb0
iic0: <I2C generic I/O> on iicbus0
iicswitch0: <I2C Switch/Multiplexer> at addr 0xe0 on iicbus0
poe0: <POE> on iicswitch0
poe reset failed
rtc8564je_rtc0: <EPSON 8564JE Real Time Clock(RTC)> on iicswitch0
rtc8564je_rtc0: registered as a time-of-day clock, resolution 1.000000s
cpld0: <Juniper CPLD for iProc> at addr 0x62 on iicbus0
cpldbus0: <CPLD Functions> on cpld0
wdog0: <CPLD Watchdog Timer for iProc> on cpldbus0
oamctl0: <OAM Control using CPLD for iProc> on cpldbus0
fan0: <CPLD fan controller> on cpldbus0
fan1: <CPLD fan controller> on cpldbus0
resetctrl0: <I2C switch reset driver> on cpldbus0
resetpfe0: <Reset EP PFE> on cpldbus0
resetphy0: <CPLD PHY Reset for iProc> on cpldbus0
bcmdmu0: <Broadcom BCM56XXX dmu> mem 0xf000-0xffff on simplebus1
paxb0: <Broadcom,PAXB> mem 0x12000-0x12fff on simplebus1
uart0: <16750 or compatible> mem 0x20000-0x200ff irq 6 on simplebus1
uart0: [GIANT-LOCKED]
uart1: <16750 or compatible> mem 0x21000-0x210ff irq 7 on simplebus1
uart1: console (9600,n,8,1)
uart1: [GIANT-LOCKED]
bcmrng0: <Broadcom RBG200 RNG> mem 0x32000-0x32fff on simplebus1
random: registering fast source Broadcom RBG200 RNG
bcm560xgmac0: <Broadcom-56xxx GMAC> mem 0x42000-0x42fff irq 8 on simplebus1
bcmidm0: chip dev id :0x1b064 sc :0xc9109120 dev:0xc7954b80
miibus0: <MII bus> on bcm560xgmac0
brgphy0: <BCM54616S 10/100/1000baseTX PHY> PHY 1 on miibus0
brgphy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseT, 1000baseT-master, 1000baseT-FDX, 1000baseT-FDX-master, auto
ehci0: <BCMIPROC-USB-EHCI> mem 0x48000-0x49fff irq 9 on simplebus1
ehci0: called :bcmusb_ehci_attach,Dev Chip Id is 0x1b064:
usbus0: EHCI version 1.0
usbus0 on ehci0
spi0: <Broadcom BCM56XXX SPI> mem 0x47000-0x47fff irq 10 on simplebus1
spibus0: <OFW SPI bus> on spi0
mx25l0: <M25Pxx Flash Family> at cs 0 mode 0 on spibus0
mx25l0: device type mx25ll64, size 8192K in 128 sectors of 64K, erase size 64K
cryptosoft0: <software crypto>
Initializing product: 169 ..
JUNOS procfs is initialized.
Timecounters tick every 10.000 msec
tcp_ip_smp_supp_chk_product: jnx_product_type: 169 support: 0
Registering tcp_platform_dependent = tcp_handle_special_ports
md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 10041344 bytes at 0xc2f3a000
usbus0: 480Mbps High Speed USB v2.0
paxb0: PCIe PHY Link Status :0x1c
paxb0: PCIe PHY-DL Link up :0x1c
ugen0.1: <Broadcom EHCI root HUB> at usbus0
uhub0: <Broadcom EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
Trying to mount root from cd9660:/dev/md0.uzip []...
uhub0: 3 ports with 3 removable, self powered
ugen0.2: <vendor 0x05e3 USB2.0 Hub> at usbus0
uhub1 on uhub0
uhub1: <vendor 0x05e3 USB2.0 Hub, class 9/0, rev 2.00/85.37, addr 2> on usbus0
Entropy start-up health tests performed on 256 samples passed.
random: unblocking device.
uhub1: 4 ports with 3 removable, self powered
ugen0.3: <vendor 0x13fe USB DISK 2.0> at usbus0
umass0 on uhub1
umass0: <vendor 0x13fe USB DISK 2.0, class 0/0, rev 2.00/1.00, addr 3> on usbus0
umass0: SCSI over Bulk-Only; quirks = 0x8100
umass0:0:0: Attached to scbus0
da0 at umass-sim0 bus 0 scbus0 target 0 lun 0
da0: < USB DISK 2.0 PMAP> Removable Direct Access SPC-4 SCSI device
da0: Serial Number 65001641D960D081
da0: 40.000MB/s transfers
da0: 1910MB (3911680 512 byte sectors)
da0: quirks=0x3<NO_SYNC_CACHE,NO_6_BYTE>
random: unblocking device.
usb_alloc_device: set address 4 failed (USB_ERR_IOERROR, ignored)
** /dev/gpt/junos
** Last Mounted on /.mount
** Phase 1 - Check Blocks and Sizes
INCORRECT BLOCK COUNT I=136828 (40 should be 0)
CORRECT? yes
** Phase 2 - Check Pathnames
** Phase 3 - Check Connectivity
** Phase 4 - Check Reference Counts
** Phase 5 - Check Cyl groups
6764 files, 125797 used, 223767 free (191 frags, 27947 blocks, 0.1% fragmentation)
***** FILE SYSTEM MARKED CLEAN *****
***** FILE SYSTEM WAS MODIFIED *****
@ 1667990872 [2022-11-09 10:47:52] preboot
Initializing Verified Exec:
Verified os-kernel-prd-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
usbd_setup_device_desc: getting device descriptor at addr 4 failed, USB_ERR_IOERROR
ugen0.4: <Kingston DataTraveler 3.0> at usbus0
umass1 on uhub1
umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
umass1: SCSI over Bulk-Only; quirks = 0xc100
umass1:1:1: Attached to scbus1
ugen0.4: <Kingston DataTraveler 3.0> at usbus0 (disconnected)
umass1: at uhub1, port 4, addr 4 (disconnected)
(probe0:umass-sim1:1:0:0): REPORT LUNS. CDB: a0 00 00 00 00 00 00 00 00 10 00 00
(probe0:umass-sim1:1:0:0): CAM status: CCB request completed with an error
(probe0:umass-sim1:1:0:0): Retrying command, 4 more tries remain
(da1:umass-sim1:1:0:0): got CAM status 0xa
(da1:umass-sim1:1:0:0): fatal error, failed to attach to device
umass1: detached
Enforcing Verified Exec:
ugen0.4: <Kingston DataTraveler 3.0> at usbus0
umass1 on uhub1
umass1: <Kingston DataTraveler 3.0, class 0/0, rev 2.10/0.01, addr 4> on usbus0
umass1: SCSI over Bulk-Only; quirks = 0xc100
umass1:1:1: Attached to scbus1
da1 at umass-sim1 bus 1 scbus1 target 0 lun 0
da1: <Kingston DataTraveler 3.0 > Removable Direct Access SPC-4 SCSI device
da1: Serial Number 08606E6D402EF1C0B70118A8
da1: 40.000MB/s transfers
da1: 7377MB (15109516 512 byte sectors, DIF type 8)
da1: quirks=0x2<NO_6_BYTE>
Verified os-libs-12-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-libs-12-arm-32-20220221.2b3c81a_builder_stable_12_221
Verified os-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-runtime-arm-32-20220221.2b3c81a_builder_stable_12_221
@ 1667990894 [2022-11-09 10:48:14 UTC] mount start
@ 1667990895 [2022-11-09 10:48:15 UTC] junos 22.1R1.10
Verified os-zoneinfo-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-zoneinfo-20220221.2b3c81a_builder_stable_12_221
Verified py-extensions-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting py-extensions-arm-32-20220316.080819_builder_junos_221_r1
Verified py-base-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting py-base-arm-32-20220316.080819_builder_junos_221_r1
Verified os-crypto-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting os-crypto-arm-32-20220221.2b3c81a_builder_stable_12_221
Verified junos-net-prd-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-net-prd-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-libs-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-libs-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-runtime-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-runtime-arm-32-20220316.080819_builder_junos_221_r1
Starting watchdog daemon ...
Verified jail-runtime-arm-32-20220221 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Verified na-telemetry-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting na-telemetry-arm-32-22.1R1.10
Verified jweb-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jweb-ex-arm-32-20220316.080819_builder_junos_221_r1
chown: nobody: illegal group name
Verified junos-runtime-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-runtime-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-routing-aggregated-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-routing-aggregated-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-probe-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-probe-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-platform-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-platform-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-openconfig-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-openconfig-arm-32-22.1R1.10
Verified junos-modules-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-modules-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-modules-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-modules-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-libs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-libs-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-dp-crypto-support-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-dp-crypto-support-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified junos-daemons-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting junos-daemons-arm-32-20220316.080819_builder_junos_221_r1
Verified jsdn-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jsdn-arm-32-22.1R1.10
Verified jsd-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jsd-arm-32-22.1R1.10-jet-1
Verified jphone-home-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jphone-home-arm-32-20220316.080819_builder_junos_221_r1
mount_nullfs: /mfs/var: No such file or directory
mount_nullfs: /mfs/var: No such file or directory
Verified jpfe-EX34XX-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jpfe-EX34XX-arm-32-20220316.080819_builder_junos_221_r1
Verified jdocs-ex-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting jdocs-ex-arm-32-20220316.080819_builder_junos_221_r1
Verified fips-mode-arm-32-20220316 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting fips-mode-arm-32-20220316.080819_builder_junos_221_r1
Verified dsa-arm-32-22.1R1 signed by PackageProductionECP256_2022 method ECDSA256+SHA256
Mounting dsa-arm-32-22.1R1.10
@ 1667990991 [2022-11-09 10:49:51 UTC] mount done
Removing /etc/malloc.conf
Checking platform support for: pvi:ex2300-48p
@ 1667990999 [2022-11-09 10:49:59 UTC] mountlate start
@ 1667991004 [2022-11-09 10:50:04 UTC] mountlate done
kern.module_path: /packages/sets/active/boot/junos-modules-ex/;/packages/sets/active/boot/os-kernel/;/packages/sets/active/boot/os-crypto/;/packages/sets/active/boot/netstack/;/packages/sets/active/boot/junos-net-platform/;/packages/sets/active/boot/junos-modules/ -> /modules;/modules/ifpfe_drv;/modules/peertype;/modules/platform
IPsec: Initialized Security Association Processing.
link_elf: symbol in_cksum undefined
kldload: can't load nfsd.ko: No such file or directory
sysctl_warn_reuse: can't re-use a leaf (net.hw_tok_log)!
sysctl_warn_reuse: can't re-use a leaf (hw.product.fxseries_simulation)!
sysctl_warn_reuse: can't re-use a leaf (net.dcf_ng_hw_tokens)!
Calling dcf_ng_hw_init for platform hw vecs initialization
Loading the CHMIC module
Loading the DC Platform NETPFE module
bcmsdk_5_9_x kld
Loading BCMSDK module.....
Junosprocfs mounted on /junosproc.
loader.name="FreeBSD/armv6 U-Boot loader"
loader.version="1.2"
FreeBSD/armv6 U-Boot loader
1.2
972+0 records in
972+0 records out
505440 bytes transferred in 0.040014 secs (12631458 bytes/sec)
@ 1667991041 [2022-11-09 10:50:41 UTC] mgd start
Creating initial configuration: ...
mgd: commit complete
@ 1667991120 [2022-11-09 10:52:00 UTC] mgd done
Lock Manager
RDM Embedded 7 [04-Aug-2006]
http://www.birdstep.comCopyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.
Unix Domain sockets Lock manager
Lock manager 'lockmgr' started successfully.
Database Initialization Utility
RDM Embedded 7 [04-Aug-2006]
http://www.birdstep.comCopyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.
Profile database initialized
Enhanced arp scale is disabled
/etc/rc: WARNING: No dump device. Savecore not run.
Prefetching /usr/sbin/rpd ...
Prefetching /usr/sbin/lacpd ...
Prefetching /usr/sbin/chassisd ...
@ 1667991131 [2022-11-09 10:52:11 UTC] mountlater start
@ 1667991139 [2022-11-09 10:52:19 UTC] mountlater done
Starting jlaunchhelperd.
Starting cron.
Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): exec_command
Nov 9 10:52:21 jlaunchd 13111 - - sntpsync (PID 13134) started
Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13134(sntpsync): new process
Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): exec_command
Nov 9 10:52:21 jlaunchd 13111 - - internal-routing-service (PID 13137) started
Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13137(internal-routing-service): new process
Nov 9 10:52:21 jlaunchd 13111 - - Found pid 13105 for already running process: eventd
Nov 9 10:52:21 jlaunchd 13111 - - Registered PID 13105(event-processing): new process
Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): exec_command
Nov 9 10:52:22 jlaunchd 13111 - - virtual-chassis-control (PID 13138) started
Nov 9 10:52:22 jlaunchd 13111 - - Registered PID 13138(virtual-chassis-control): new process
Wed Nov 9 10:52:26 UTC 2022
Nov 9 10:52:30 jlaunchd 13111 - - Registered PID 13204(pfed): exec_command
------------------------------
BALAZS KISS
------------------------------
Original Message:
Sent: 11-09-2022 11:41
From: BALAZS KISS
Subject: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it
Hi,
Thanks for your answer.
I would like to try, but I don't get to the login screen, it freeze down before it, I attached the log file.
------------------------------
BALAZS KISS
Original Message:
Sent: 11-09-2022 11:31
From: PAUL PETERSON
Subject: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it
You could try "request system zeroize".
That would restore the switch back to factory.
------------------------------
PAUL PETERSON
Original Message:
Sent: 11-09-2022 11:25
From: BALAZS KISS
Subject: EX2300-48P junos collapse after configuration delete and I unable to reconfigure or reinstall it
Hi,
I configured an EX2300-48P for a customer, it worked properly. Customer was unhappy with the config so send a replacement config to me to apply. It starts like this:
configure
delete
yes
Obviously this deleted the complete configuration.
After this I setup the password, wanted to commit it, but it never finish commiting, always drop out from CLI to the login screen. I login again with the new password, starts again, but it keeps dropping me out, sometime I don't even reach the configuration menu.
I tried to reinstall junos from recovery partition / usb, but before the login screen it freeze down completely, I don't get access to CLI. I could press anything, wait hours, nothing happens.
I tried the password recovery guide - no success
I tried the reinstall / format guide for this device - no success, if I choose boot from usb in the boot menu, nothing happens.
Does anyone idea what should I do with this device to work it again?
Thanks for your help.
------------------------------
BALAZS KISS
------------------------------