0% found this document useful (0 votes)
1K views12 pages

Boot Procedure For RE

The document details the boot process of a Juniper device. It shows the system rebooting, loading modules, initializing hardware including network interfaces, mounting file systems and completing the boot.
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
Download as txt, pdf, or txt
0% found this document useful (0 votes)
1K views12 pages

Boot Procedure For RE

The document details the boot process of a Juniper device. It shows the system rebooting, loading modules, initializing hardware including network interfaces, mounting file systems and completing the boot.
Copyright
© © All Rights Reserved
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1/ 12

labroot> request system reboot both-routing-engines

Reboot the system ? [yes,no] (no) yes

error: Could not connect to re0 : No route to host


error: Couldn't connect to re re0
Shutdown NOW!
[pid 4968]

*** FINAL System shutdown message from labroot@ ***

System going down IMMEDIATELY

Stopping cron.
Waiting for PIDS: 4573.
.
Apr 14 13:34:43 jlaunchd: kernel-replication (PID 4601) terminate signal 15 sent
Apr 14 13:34:43 jlaunchd: interface-control (PID 4643) terminate signal 15 sent
Apr 14 13:34:47 jlaunchd: subscriber-management (PID 4611) exited with status=0
Normal Exit
Waiting (max 60 seconds) for system process `vnlru' to stop...done
Waiting (max 60 seconds) for system process `bufdaemon' to stop...done
Waiting (max 60 seconds) for system process `syncer' to stop...
Syncing disks, vnodes remaining...0 0 0 0 done
All buffers synced.
Uptime: 10m13s
besw0: 4 Broadcom SDK kernel threads killed
Khelp module "jsocket" can't unload until its refcount drops from 2 to 0.

B2

B2
B2

B2
Version 2.00.1201. Copyright (C) 2009 American Megatrends, Inc.
KONTRON RE2027 Firmware Version 1.18
Press <DEL> or <F2> to enter setup.

WARNING: History shows a reset caused by ,J09 debugger prompt ,JXX, JNX reboot,
Bit set: 2 ,JXX, JNX reboot, Bit set: 3 reset.

Will try to boot from


USB Flash Drive
Compact Flash
Solid State Drive 1
Solid State Drive 2
Network

Trying to boot from Compact Flash

Consoles: serial port


BIOS drive C: is disk0
BIOS drive D: is disk1
BIOS 622kB/3391368kB available memory

FreeBSD/x86 bootstrap loader, Revision 1.1


(builder@basith.juniper.net, Wed Nov 30 00:22:02 PST 2016)
/
Main Menu

1. Boot [J]unos volume


2. Boot Junos volume in [S]afe mode

3. [R]eboot

4. [B]oot menu
5. [M]ore options

Choice:
Booting from Junos volume ...
/
/packages/sets/active/boot/os-kernel/kernel text=0x3d5960 data=0x8b898+0x15eb98
syms=[0x8+0x93a08+0x8+0xaab0d]
/packages/sets/active/boot/junos-modules/fips_core.ko size 0x6330 at 0xaff000
loading required module 'netstack'
/packages/sets/active/boot/netstack/netstack.ko size 0x11b5948 at 0xb06000
loading required module 'crypto'
/packages/sets/active/boot/os-crypto/crypto.ko size 0x2e990 at 0x1cbc000
/packages/sets/active/boot/junos-modules/hmac_drbg.ko size 0x8b10 at 0x1ceb000
/packages/sets/active/boot/junos-modules/mac_sdk.ko size 0x11f40 at 0x1cf4000
/packages/sets/active/boot/junos-modules/sdk_core.ko size 0x24870 at 0x1d06000
/packages/sets/active/boot/junos-modules/junosprocfs.ko size 0x56c0 at 0x1d2b000
/packages/sets/active/boot/junos-modules/mac_fips.ko size 0x5688 at 0x1d31000
/packages/sets/active/boot/netstack/pvi_db.ko size 0x6e10 at 0x1d37000
/packages/sets/active/boot/os-kernel/miibus.ko size 0x41ca0 at 0x1d3e000
/packages/sets/active/boot/os-kernel/if_em.ko size 0x80ca0 at 0x1d80000
/packages/sets/active/boot/os-kernel/if_fxp.ko size 0x13e28 at 0x1e01000
/packages/sets/active/boot/netstack/mtx_re.ko size 0x115d58 at 0x1e15000
can't find 'hdkcb'
/packages/sets/active/boot/netstack/ptxfabsw.ko size 0x6170 at 0x1f2b000
can't find 'ixgbe'
/packages/sets/active/boot/os-kernel/if_igb.ko size 0x6bb18 at 0x1f32000
/packages/sets/active/boot/os-kernel/if_ixlv.ko size 0x30188 at 0x1f9e000
can't find 'virtio'
can't find 'virtio_pci'
can't find 'if_vtnet'
/packages/sets/active/boot/os-kernel/contents.izo size=0x776400
can't find 'verifiedmnt'
Hit [Enter] to boot immediately, or any other key for command prompt.
Booting [/packages/sets/active/boot/os-kernel/kernel]...
GDB: debug ports: uart
GDB: current port: uart
KDB: debugger backends: ddb gdb ndb
KDB: current backend: ddb
Copyright (c) 1992-2016 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
FreeBSD JNPR-10.3-20161130.340898_builder_stable_10 #0: Wed Nov 30 00:24:53 PST
2016

builder@basith.juniper.net:/volume/build/junos/occam/freebsd/stable_10/20161130.bui
lder.340898/obj/amd64/juniper/kernels/JNPR-AMD64-PRD/kernel amd64
gcc version 4.2.1 (for JUNOS)
VT(vga): resolution 640x480
sysctl: OID number(10) is already in use for 'option_Q_maxlen'
sysctl: OID number(18) is already in use for 'nd6_debug'
CPU: Intel(R) Xeon(R) CPU C5518 @ 1.73GHz (1729.14-MHz K8-class CPU)
Origin="GenuineIntel" Id=0x106e4 Family=0x6 Model=0x1e Stepping=4

Features=0xbfebfbff<FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,P
AT,PSE36,CLFLUSH,DTS,ACPI,MMX,FXSR,SSE,SSE2,SS,HTT,TM,PBE>

Features2=0x9ce3bd<SSE3,DTES64,MON,DS_CPL,VMX,EST,TM2,SSSE3,CX16,xTPR,PDCM,DCA,SSE4
.1,SSE4.2,POPCNT>
AMD Features=0x28100800<SYSCALL,NX,RDTSCP,LM>
AMD Features2=0x1<LAHF>
VT-x: PAT,HLT,MTF,PAUSE,EPT,VPID
TSC: P-state invariant, performance statistics
real memory = 34359738368 (32768 MB)
avail memory = 33271169024 (31729 MB)
mtx_platform_early_bootinit: M/T/EX Series Early Boot Initialization
Event timer "LAPIC" quality 400
ACPI APIC Table: <ALASKA A M I>
FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs
FreeBSD/SMP: 1 package(s) x 4 core(s)
cpu0 (BSP): APIC ID: 0
cpu1 (AP): APIC ID: 2
cpu2 (AP): APIC ID: 4
cpu3 (AP): APIC ID: 6
random: <Software, Yarrow> initialized
Security policy loaded: Junos MAC/fips (mac_fips)
Security policy loaded: MAC/veriexec (mac_veriexec)
Security policy loaded: Junos MAC/SDK (mac_sdk)
Security policy loaded: JUNOS MAC/privcheck (mac_privcheck)
MAC/veriexec fingerprint module loaded: SHA256
MAC/veriexec fingerprint module loaded: SHA1
ACPI BIOS Warning (bug): 32/64X FACS address mismatch in FADT:
0xCF261F40/0x00000000CF261F80, using 64-bit address (20150515/tbfadt-309)
ioapic0 <Version 2.0> irqs 0-23 on motherboard
ioapic1 <Version 2.0> irqs 24-47 on motherboard
netisr_init: !debug_mpsafenet, forcing maxthreads from 4 to 1
Initializing M/T/EX platform properties ..
rts_sysconf_ifstate_init: registerd rtcb osd: slotid 2
ofwbus0: <Open Firmware Device Tree> on motherboard
fdtio0: <FDT I/O port space> on ofwbus0
fpga0: <RE system controller> port 0x191-0x198 on fdtio0
cryptosoft0: <software crypto> on motherboard
acpi0: <ALASKA A M I> on motherboard
acpi0: Power Button (fixed)
cpu0: <ACPI CPU> on acpi0
cpu1: <ACPI CPU> on acpi0
cpu2: <ACPI CPU> on acpi0
cpu3: <ACPI CPU> on acpi0
attimer0: <AT timer> port 0x40-0x43 irq 0 on acpi0
Timecounter "i8254" frequency 1193182 Hz quality 0
Event timer "i8254" frequency 1193182 Hz quality 100
atrtc0: <AT realtime clock> port 0x70-0x71 irq 8 on acpi0
Event timer "RTC" frequency 32768 Hz quality 0
Timecounter "ACPI-fast" frequency 3579545 Hz quality 900
acpi_timer0: <24-bit timer at 3.579545MHz> port 0x408-0x40b on acpi0
pcib0: <ACPI Host-PCI bridge> port 0xcf8-0xcff on acpi0
pci0: <ACPI PCI bus> on pcib0
pcib1: <ACPI PCI-PCI bridge> mem 0xfb900000-0xfb90ffff irq 24 at device 3.0 on pci0
pci3: <ACPI PCI bus> on pcib1
em0: <Intel(R) PRO/1000 Network Connection 7.6.1-k> port 0x4000-0x401f mem
0xfbd00000-0xfbd1ffff,0xfbd20000-0xfbd23fff irq 24 at device 0.0 on pci3
em0: Using an MSI interrupt
if_initname: em
pcib2: <ACPI PCI-PCI bridge> irq 32 at device 4.0 on pci0
pci4: <ACPI PCI bus> on pcib2
em1: <Intel(R) PRO/1000 Network Connection 7.6.1-k> port 0x3000-0x301f mem
0xfbc00000-0xfbc1ffff,0xfbc20000-0xfbc23fff irq 32 at device 0.0 on pci4
em1: Using an MSI interrupt
if_initname: em
pcib3: <ACPI PCI-PCI bridge> irq 35 at device 5.0 on pci0
pci5: <ACPI PCI bus> on pcib3
em2: <Intel(R) PRO/1000 Network Connection 7.6.1-k> port 0x2000-0x201f mem
0xfbb00000-0xfbb1ffff,0xfbb20000-0xfbb23fff irq 35 at device 0.0 on pci5
em2: Using an MSI interrupt
if_initname: em
pcib4: <ACPI PCI-PCI bridge> irq 38 at device 6.0 on pci0
pci6: <ACPI PCI bus> on pcib4
pcib5: <PCI-PCI bridge> irq 38 at device 0.0 on pci6
pci7: <PCI bus> on pcib5
acb0: <Atlas Enhanced Control Subsystem V2> mem 0xfba10000-0xfba103ff irq 39 at
device 13.0 on pci7
acb0: acb: softc at 0xfffff8000b559680, fpga regs at 0xfffff800fba10000
spi: zl30143 clock initialized to 19.44 MHz
spi: zl30130 clock module initialized
pci7: <network> at device 14.0 (no driver attached)
ehci0: <Intel PCH USB 2.0 controller USB-A> mem 0xfbe21000-0xfbe213ff irq 23 at
device 29.0 on pci0
usbus0: EHCI version 1.0
usbus0 on ehci0
pcib6: <ACPI PCI-PCI bridge> at device 30.0 on pci0
pci25: <ACPI PCI bus> on pcib6
gpio0: <GPIO controller> at device 31.0 on pci0
gpio_lpc_dev_init, Found bios device: 0x3b148086
atapci0: <Intel 5 Series/3400 Series PCH SATA300 controller> port 0x1f0-
0x1f7,0x3f6,0x170-0x177,0x376,0x5090-0x509f,0x5080-0x508f irq 19 at device 31.2 on
pci0
ata0: <ATA channel> at channel 0 on atapci0
ata1: <ATA channel> at channel 1 on atapci0
ichsmb0: <Intel PCH SMBus controller> port 0x5000-0x501f mem 0xfbe20000-0xfbe200ff
irq 18 at device 31.3 on pci0
atapci1: <Intel 5 Series/3400 Series PCH SATA300 controller> port 0x5070-
0x5077,0x5060-0x5063,0x5050-0x5057,0x5040-0x5043,0x5030-0x503f,0x5020-0x502f irq 19
at device 31.5 on pci0
ata2: <ATA channel> at channel 0 on atapci1
ata3: <ATA channel> at channel 1 on atapci1
acpi_button0: <Power Button> on acpi0
uart0: <Non-standard ns8250 class UART with FIFOs> port 0x3f8-0x3ff irq 4 on acpi0
uart0: console (9600,n,8,1)
uart0: [GIANT-LOCKED]
uart1: <Non-standard ns8250 class UART with FIFOs> port 0x2e8-0x2ef irq 7 on acpi0
uart1: [GIANT-LOCKED]
uart2: <Non-standard ns8250 class UART with FIFOs> port 0x3e8-0x3ef irq 5 on acpi0
uart2: [GIANT-LOCKED]
uart3: <Non-standard ns8250 class UART with FIFOs> port 0x2f8-0x2ff irq 3 on acpi0
uart3: [GIANT-LOCKED]
est0: <Enhanced SpeedStep Frequency Control> on cpu0
p4tcc0: <CPU Frequency Thermal Control> on cpu0
est1: <Enhanced SpeedStep Frequency Control> on cpu1
p4tcc1: <CPU Frequency Thermal Control> on cpu1
est2: <Enhanced SpeedStep Frequency Control> on cpu2
p4tcc2: <CPU Frequency Thermal Control> on cpu2
est3: <Enhanced SpeedStep Frequency Control> on cpu3
p4tcc3: <CPU Frequency Thermal Control> on cpu3
virtual chassis member-id = 255
virtual chassis mode = 0
virtual chassis fpc-slots = 255
virtual chassis effective fpc-slots = 12
virtual chassis ifstate revert = 1
Initializing Kernel PVIDB.
Initializing product: 48 ..
Setting up M/T interface operations and attributes
md0: Preloaded image </packages/sets/active/boot/os-kernel/contents.izo> 7824384
bytes at 0xffffffff81fce188
random: unblocking device.
usbus0: 480Mbps High Speed USB v2.0
acb: acb_late_attach: Initializing silabs clocks to drive 8727 external phy
JUNOS procfs is initialized.
Timecounters tick every 1.000 msec
Loading Redundant LT driver
Loading Redundant Virtual Interface driver
rvt_ifd_attach: Error setting driver API's for family = 81
Registered AMT tunnel Encap with UDP Tunnel!
rts_init: registered inrtsock osd: slotid 3
###PCB Group initialized for udppcbgroup
###PCB Group initialized for tcppcbgroup
Registering tcp_platform_dependent = tcp_handle_special_ports
ugen0.1: <Intel> at usbus0
uhub0: <Intel EHCI root HUB, class 9/0, rev 2.00/1.00, addr 1> on usbus0
uhub0: 1 port with 1 removable, self powered
ugen0.2: <vendor 0x8087> at usbus0
uhub1: <vendor 0x8087 product 0x0020, class 9/0, rev 2.00/0.00, addr 2> on usbus0
ada0 at ata0 bus 0 scbus0 target 0 lun 0
uhub1: 8 ports with 8 removable, self powered
ada0: <UGB94BPH32H0S2-KCI 2034> ATA8-ACS SATA 2.x device
ada0: Serial Number 11000181365
ada0: 300.000MB/s transfers (SATA 2.x, UDMA5, PIO 512bytes)
ada0: 28843MB (59071696 512 byte sectors)
ada0: Previously was known as ad0
ada1 at ata0 bus 0 scbus0 target 1 lun 0
ada1: <UGB30SFA4000T2 2010108C> ATA-7 device
ada1: Serial Number SFA4000T2 00001705
ada1: 300.000MB/s transfers (SATA 2.x, UDMA5, PIO 512bytes)
ada1: 3831MB (7847280 512 byte sectors)
ada1: Previously was known as ad1
Kernel thread "wkupdaemon" (pid 24) exited prematurely.
SMP: AP CPU #2 Launched!
SMP: AP CPU #1 Launched!
SMP: AP CPU #3 Launched!
Timecounter "TSC" frequency 1729137468 Hz quality 1000
Trying to mount root from cd9660:/dev/md0.uzip []...
** /dev/gpt/junos
** Last Mounted on /.mount
** Phase 1 - Check Blocks and Sizes
** Phase 2 - Check Pathnames
** Phase 3 - Check Connectivity
** Phase 4 - Check Reference Counts
** Phase 5 - Check Cyl groups
5561 files, 505201 used, 4615510 free (558 frags, 576869 blocks, 0.0%
fragmentation)

***** FILE SYSTEM IS CLEAN *****


@ 1492176957 [2017-04-14 13:35:57] preboot
Initializing Verified Exec:
Verified os-kernel-prd-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Enforcing Verified Exec:
Verified os-libs-10-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Mounting os-libs-10-x86-64-20161130.340898_builder_stable_10
Verified os-runtime-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Mounting os-runtime-x86-64-20161130.340898_builder_stable_10
@ 1492176959 [2017-04-14 13:35:59 UTC] verify active ...
Verified jdocs-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified fips-mode-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jpfe-X960-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jpfe-wrlinux-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jpfe-common-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jsd-x86-32-16.3-jet-1 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jsdn-x86-32-16.3 signed by PackageProductionEc_2016 method ECDSA256+SHA256
Verified jservices-appid-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-alg-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-aacl-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-bgf-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-cpcd-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-cos-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-hcm-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-crypto-base-x86-32-20161214 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified jservices-idp-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-ids-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-jdpi-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-ipsec-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-jflow-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-mobile-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-llpdf-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-lrf-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-nat-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-mss-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-rpm-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-pcef-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-ptsp-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-sfw-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-ssl-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified jservices-traffic-dird-x86-32-20161214 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified junos-daemons-mx-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-daemons-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-dp-crypto-support-mtx-x86-32-20161214 signed by
PackageProductionEc_2016 method ECDSA256+SHA256
Verified jservices-voice-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-dp-crypto-support-x86-32-20161214 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified junos-libs-compat32-mx-x86-64-20161214 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified junos-libs-mx-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-libs-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-modules-mx-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-libs-compat32-x86-64-20161214 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified junos-runtime-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-modules-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-runtime-mx-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-net-prd-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-platform-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-compat32-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-kernel-prd-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-libs-10-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-crypto-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-libs-compat32-10-x86-64-20161130 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified py-base-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-runtime-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified py-extensions-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-zoneinfo-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
@ 1492176963 [2017-04-14 13:36:03 UTC] verify done
@ 1492176963 [2017-04-14 13:36:03 UTC] mount start
Mounting os-zoneinfo-x86-64-20161130.340898_builder_stable_10
Mounting os-libs-compat32-10-x86-64-20161130.340898_builder_stable_10
Mounting os-compat32-x86-64-20161130.340898_builder_stable_10
Mounting py-extensions-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting py-base-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting os-crypto-x86-64-20161130.340898_builder_stable_10
Mounting junos-net-prd-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-modules-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-modules-mx-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-libs-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-libs-compat32-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-runtime-x86-32-20161214.150526_builder_junos_161_r3_s1
Verified junos-net-prd-x86-64-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified junos-platform-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-compat32-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-kernel-prd-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-libs-10-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-crypto-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-libs-compat32-10-x86-64-20161130 signed by PackageProductionEc_2016
method ECDSA256+SHA256
Verified py-base-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-runtime-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified py-extensions-x86-32-20161214 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
Verified os-zoneinfo-x86-64-20161130 signed by PackageProductionEc_2016 method
ECDSA256+SHA256
@ 1492176963 [2017-04-14 13:36:03 UTC] verify done
@ 1492176963 [2017-04-14 13:36:03 UTC] mount start
Mounting os-zoneinfo-x86-64-20161130.340898_builder_stable_10
Mounting os-libs-compat32-10-x86-64-20161130.340898_builder_stable_10
Mounting os-compat32-x86-64-20161130.340898_builder_stable_10
Mounting py-extensions-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting py-base-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting os-crypto-x86-64-20161130.340898_builder_stable_10
Mounting junos-net-prd-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-modules-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-modules-mx-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-libs-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-libs-compat32-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-runtime-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting junos-libs-compat32-mx-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-runtime-mx-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting junos-platform-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting junos-libs-mx-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-dp-crypto-support-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting junos-dp-crypto-support-mtx-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting junos-daemons-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting junos-daemons-mx-x86-64-20161214.150526_builder_junos_161_r3_s1
Mounting jsdn-x86-32-16.1R3-S1.3
Mounting jsd-x86-32-16.1R3-S1.3-jet-1
Mounting jpfe-wrlinux-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting jpfe-X960-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting jpfe-common-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting jdocs-x86-32-20161214.150526_builder_junos_161_r3_s1
Mounting fips-mode-x86-32-20161214.150526_builder_junos_161_r3_s1
@ 1492176991 [2017-04-14 13:36:31 UTC] mount done
Checking platform support for: mx240
kenv: unable to get boot_recover_volume
kern.module_path: /packages/sets/active/boot/os-
kernel;/packages/sets/active/boot/os-
crypto;/packages/sets/active/boot/netstack;/packages/sets/active/boot/junos-modules
->
/modules;/modules/dev;/modules/ifpfe_drv;/modules/ifpfe_media;/modules/jam_core;/mo
dules/jam_plugin;/modules/peertypbesw0: <Broadcom BCM56680 GigE Switch> mem
0xfba00000-0xfba0ffff irq 40 at device 14.0 on pci7
e;/modules/platform
hw.re.gres_sync_other: 0 ->
Loading BCMSDK module.....
bcm_sdk_init(): DevID = 0xb680, RevID = 0x12
bcm_sdk_init: device ID: dev: 0xb680, rev: 0x12
bcm_sdk_init: device unit no: 0
bcm_soc_cm_device_init: device unit no: 0
1
bcore_init: after soc_reset_init
bcore_init: after soc_misc_init
bcore_init: after soc_mmu_init
bcore_init: before bcm_init
PHY8706/8726 reset failed: u=0 p=29
8706: p=29 SPI-ROM load didn't complete (0xffff)
PHY8706/8726 reset failed: u=0 p=31
8706: p=31 SPI-ROM load didn't complete (0xffff)
bcore_init: before port stuff
bcore_init: after port stuff
bcore_init: link scan interval is (soc_property): 4000000
bcore_mxseries_init: Finished mxseries port configuration
bcore_init: Finished platform specific initialization
bcm_sdk_init: Done sdk init
Loading JUNOS chassis module
chassis_init_hw_chassis_startup_time: chassis startup time 0.000000
IPsec: Initialized Security Association Processing.
Loading the CHMIC module
Loading POS driver
Loading Aggregate sonet driver
if_pfe_sa_attach: Error setting driver API's for family = 81
Loading the IMA Link Media Layer; Attaching to media services layer
Loading the IMA Group Media Layer; Attaching to media services layer
Loading the SONET Media Layer; Attaching to media services layer
Loading the Protobuf-C module
Loading the JAM-Core module
Loading the JAM-Core module - succeeded
Loading Multilink Services PICs module.
Loading the M&T Platform NETPFE module
MTX Platform JAM-Core module - load success
MPC NG 2E/3E JAM Plugin: load succeeded
can't re-use a leaf (slotid)!
Junosprocfs mounted on /junosproc.
@ 1492177001 [2017-04-14 13:36:41 UTC] mgd start
Creating initial configuration: ...
mgd: Running FIPS Self-tests
veriexec: no signatures for device. file='/sbin/kats/cannot-exec' fsid=192
fileid=51404 gen=1 uid=0 pid=3195
mgd: FIPS Self-tests Passed
mgd: commit complete
@ 1492177007 [2017-04-14 13:36:47 UTC] mgd done

Lock Manager
RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.
Unix Domain sockets Lock manager
Lock manager 'lockmgr' started successfully.

Database Initialization Utility


RDM Embedded 7 [04-Aug-2006] http://www.birdstep.com
Copyright (c) 1992-2006 Birdstep Technology, Inc. All Rights Reserved.

/var/pdb/profile_db initialized

Profile database initialized


Set Enhanced BBE Default...
Enhanced BBE Default for mx240 set to... 2
Set Enhanced BBElag enhanced disabled 0
Support to 2
No core dumps found.
prefetching /usr/sbin/rpd
prefetching /usr/libexec64/rpd
@ 1492177013 [2017-04-14 13:36:53 UTC] mountlate start
@ 1492177014 [2017-04-14 13:36:54 UTC] mountlate done
Starting jlaunchhelperd.
/etc/rc: WARNING: run_rc_command: cannot run
Starting cron.

Fri Apr 14 13:36:54 UTC 2017

FreeBSD/amd64 (Amnesiac) (ttyu0)

login: Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/eventd (PID 4518) started


Apr 14 13:36:54 jlaunchd: event-processing (PID 4518) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/clksyncd (PID 4519) started
Apr 14 13:36:54 jlaunchd: clksyncd-service (PID 4519) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/smid (PID 4520) started
Apr 14 13:36:54 jlaunchd: subscriber-management (PID 4520) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/stats-agentd (PID 4521) started
Apr 14 13:36:54 jlaunchd: stats-agent (PID 4521) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/shm-rtsdbd (PID 4522) started
Apr 14 13:36:54 jlaunchd: shm-rtsdbd (PID 4522) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/gstatd (PID 4523) started
Apr 14 13:36:54 jlaunchd: gstatd (PID 4523) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/transportd (PID 4524) started
Apr 14 13:36:54 jlaunchd: transport-control (PID 4524) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/inetd (PID 4525) started
Apr 14 13:36:54 jlaunchd: ftp-inet-process (PID 4525) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/alarm-mgmtd (PID 4526) started
Apr 14 13:36:54 jlaunchd: alarm-management (PID 4526) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/pmond (PID 4527) started
Apr 14 13:36:54 jlaunchd: process-monitor (PID 4527) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/bbe-smgd (PID 4528) started
Apr 14 13:36:54 jlaunchd: smg-service (PID 4528) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/appidd (PID 4529) started
Apr 14 13:36:54 jlaunchd: application-identification (PID 4529) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/rmpsd (PID 4530) started
Apr 14 13:36:54 jlaunchd: resource-management (PID 4530) started
Apr 14 13:36:54 jlaunchd: exec_command: /usr/sbin/charged (PID 4531) started
Apr 14 13:36:54 jlaunchd: chApr 14 13:36:58 jlaunchd: exec_command: /usr/sbin/snmpd
(PID 4553) started
Apr 14 13:36:58 jlaunchd: snmp (PID 4553) started
Apr 14 13:36:58 jlaunchd: sntp (PID 4502) terminated by signal number 15!
Apr 14 13:36:58 jlaunchd: exec_command: /usr/sbin/tnp.sntpd (PID 4554) started
Apr 14 13:36:58 jlaunchd: sntp (PID 4554) started
Apr 14 13:36:58 jlaunchd: sntpsync (PID 4504) terminated by signal number 15!
Apr 14 13:36:58 jlaunchd: exec_command: /usr/sbin/tnp.sntpc (PID 4555) started
Apr 14 13:36:58 jlaunchd: sntpsync (PID 4555) started
Apr 14 13:36:58 jlaunchd: internal-routing-service (PID 4513) exited with status=0
Normal Exit
Apr 14 13:36:58 jlaunchd: exec_command: /usr/sbin/irsd (PID 4556) started
Apr 14 13:36:58 jlaunchd: internal-routing-service (PID 4556) started
Apr 14 13:36:58 jlaunchd: alarm-management (PID 4526) terminated by signal number
15!
Apr 14 13:36:58 jlaunchd: exec_command: /usr/sbin/alarm-mgmtd (PID 4557) started
Apr 14 13:36:58 jlaunchd: alarm-management (PID 4557) started
Apr 14 13:36:58 jlaunchd: stats-agent (PID 4521) exited with status=0 Normal Exit
Apr 14 13:36:58 jlaunchd: exec_command: /usr/sbin/stats-agentd (PID 4558) started
Apr 14 13:36:58 jlaunchd: stats-agent (PID 4558) started
Apr 14 13:36:58 jlaunchd: pfed (PID 4505) exited with status=0 Normal Exit

FreeBSD/amd64 (Amnesiac) (ttyu0)

login:

You might also like