On Tuesday i had an rommon issue with a RSP720 in a 7600. One of the things i tried on a spare SUP720 (i didn't have any spare RSP720) in order to check for possible solutions, was to remove the NVRAM battery for a while and then reinsert it. As it proved out, i found a nice way to "debug" the booting process. Probably config-register changed to a factory default value (different than the usual 0x2102), causing all these messages to be displayed on console.
System Bootstrap, Version 8.4(2) Release
Copyright (c) 1994-2005 by cisco Systems, Inc.
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower memory for cache initialization
Clearing bss
Clearing autoboot state machine
melody_present_reg: 1st read w/ 0xffff
melody_present_reg: 2nd read w/ 0xffff, reversed: 0x0
melody_present_reg: 1st read w/ 0xffff
melody_present_reg: 2nd read w/ 0xffff, reversed: 0x0
Bootdisk adapter not detected, use bootflash instead.
Reading monitor variables from NVRAM
Reset reason for CPU board 0xffff , BaseBoard 0x280ffff, display 0x20000System Reset by Software.
Enabling interrupts
Initializing TLB
Initializing cache
Initializing required TLB entries
Initializing main memory
Sizing NVRAM
Initializing PCMCIA controller
Exiting init
Cat6k-Sup720/SP processor with 1048576 Kbytes of main memory
rommon 1 > boot disk0:c7600s72033-advipservicesk9-mz.122-33.SRD2.bin
Loading image, please wait ...
Stack pointer : 0x8FFFFF80
monstack : 0x800FFFC0
monra : 0xBFC26794
edata : 0x801097A0
magic : 0xFEEDFACE
memsize : 0x10000000
uncomp_size : 0x07EC9400
comp_size : 0x07EC9400
comp_checksum : 0xEC6D779E
uncomp_checksum : 0xEC6D779E
CZIP_MEM_BASE : 0x80000000
_end : 0x8010CC40
Self extracting the image...
IOS compressed src copy is : 0x801097B4
czip + IOS tar size is :0x00B2BB2C
czip + IOS Tar image is now :0x801099B4
cptr is now :0x8010CD40
IOS compressed dest copy is : 0x8010CD40
[OK]
image_entry :0x80100000
image_entry :0x80100000
__start : 0x80100000
tar_avail_size is now :0x0739D600
Tar image address is : 0x80C38940
tar_size is : 0x0739D200
cpu type : 0x00000019
uncomp_size : 0x07EC9400
monstack : 0x800FFFC0
image_info.entry_point = 0x80100000
image_info.section_count = 0x00000005
image_info.monstack = 0x800FFFC0
image_info.monra = 0xBFC26794
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x800068D8
image_info.param3 = 0x80100000
image_info.reg_k0 = 0x80C38940
image_info.reg_k1 = 0x0739D200
Section Index = 0x00000000
source = 0x8010CE5C
dest = 0x80100000
bytes = 0x00010000
Section Index = 0x00000001
source = 0x8011CE5C
dest = 0x80110000
bytes = 0x00001940
Section Index = 0x00000002
source = 0x8011E79C
dest = 0x80111940
bytes = 0x00000020
Section Index = 0x00000003
source = 0x8011E7BC
dest = 0x80111960
bytes = 0x00B1A094
Section Index = 0x00000004
source = 0x80C38850
dest = 0x80C2B9F4
bytes = 0x00000000
reg_v0: 0x00000000
reg_k0: 0x80C38940
reg_k1: 0x0739D200
tar_start: 0x00000000
tar_size: 0x00000000
Tar image address is : 0x80C38940
tar size is :0x009CD42A
Tar magic : ustar Tar filename : C2LC memsize : 0x10000000
Tar gid : 035231Tar uncomp_size : 0x009CD42A
Tar mtime : 11205304144 Tar username : ciiTar comp_checksum : 0x00001200
Tar group name : buildTar prefix : tar_size in czip : 0x0739D200
Stack pointer : 0x8FFFFF80
monstack : 0x800FFFC0
monra : 0xBFC26794
edata : 0x80111960
magic : 0xFEEDFACE
memsize : 0x10000000
uncomp_size : 0x0209842C
comp_size : 0x00B1A07F
comp_checksum : 0x8FE686D4
uncomp_checksum : 0xB44EFA0C
Compressed IOS src copy is : 0x80111974
tar_dest is :0x88C5A600
tar_size is :0x0739D200
Compressed IOS dest copy is : 0x88140580
Tar src before IOS decompression is : 0x80C38940
Tar dest before IOS decompression is : 0x88C5A600
compressed IOS src is : 0x88140580
IOS uncompressed dest copy is : 0x8013D3E0
Self decompressing the image : ####################################################################################
####################################################################################
# [OK]
e_shoff :
0x0209829C
e_flags : 0x10001001
e_phnum :
0x00000001
Source elf_hdr->e_shnum = 0x0000000A
Setting up to copy ELF section 0x00000001
to image_info section 0x00000000
sh_name = 0x0000000B
sh_type = 0x00000001
sh_flags = 0x00000007
sh_addr = 0x80100000
sh_offset = 0x00000060
sh_size = 0x01CA8000
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000002
to image_info section 0x00000001
sh_name = 0x00000011
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81DA8000
sh_offset = 0x01CA8060
sh_size = 0x002A46E0
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000003
to image_info section 0x00000002
sh_name = 0x00000017
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x8204C6E0
sh_offset = 0x01F4C740
sh_size = 0x00040ECC
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000004
to image_info section 0x00000003
sh_name = 0x00000024
sh_type = 0x00000001
sh_flags = 0x10000003
sh_addr = 0x8208D5AC
sh_offset = 0x01F8D60C
sh_size = 0x00004034
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000010
sh_entsize = 0x00000000
sh_type = 0x00000008
sh_flags = 0x10000003
sh_addr = 0x820915E0
sh_offset = 0x01F91640
sh_size = 0x000009E0
sh_type = 0x00000008
sh_flags = 0x00000003
sh_addr = 0x82091FC0
sh_offset = 0x01F91640
sh_size = 0x021EB140
tar file start = 0x8428A070
cpu type : 0x00000019
uncomp_size : 0x0209842C
monstack : 0x800FFFC0
image_info.entry_point = 0x80100000
image_info.section_count = 0x00000005
image_info.monstack = 0x800FFFC0
image_info.monra = 0xBFC26794
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x800068D8
image_info.param3 = 0x80100000
image_info.reg_k0 = 0x8428A070
image_info.reg_k1 = 0x0739D200
Section Index = 0x00000000
source = 0x8013D440
dest = 0x80100000
bytes = 0x01CA8000
Section Index = 0x00000001
source = 0x81DE5440
dest = 0x81DACF70
bytes = 0x002A46E0
Section Index = 0x00000002
source = 0x82089B20
dest = 0x82051650
bytes = 0x00040ECC
Section Index = 0x00000003
source = 0x820CA9EC
dest = 0x8209251C
bytes = 0x00004034
Section Index = 0x00000004
source = 0x88C5A600
dest = 0x8428A070
bytes = 0x0739D200
data_size in czip : 0x00008000
bss end of IOS is : 0x84282070
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, c7600s72033_sp Software (c7600s72033_sp-ADVIPSERVICESK9-M), Version 12.2(33)SRD2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2009 by Cisco Systems, Inc.
Compiled Thu 21-May-09 09:55 by prod_rel_team
Image text-base: 0x401012B8, data-base: 0x41DACF70
*Jan 1 00:00:11.983: %SYS-SP-3-LOGGER_FLUSHING: System pausing to ensure console debugging output.
*Jan 1 00:00:09.523: %PFREDUN-6-ACTIVE: Initializing as ACTIVE processor
*Jan 1 00:00:11.983: %OIR-SP-6-CONSOLE: Changing console ownership to route processor
System Bootstrap, Version 12.2(17r)SX5, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2006 by cisco Systems, Inc.
Cat6k-Sup720/RP platform with 1048576 Kbytes of main memory
Download Start
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Download Completed! Booting the image.
Self decompressing the image : ####################################################################################
####################################################################################
####################################################################################
####################################################################################
######## [OK]
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, c7600s72033_rp Software (c7600s72033_rp-ADVIPSERVICESK9-M), Version 12.2(33)SRD2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2009 by Cisco Systems, Inc.
Compiled Thu 21-May-09 09:42 by prod_rel_team
Image text-base: 0x401012B8, data-base: 0x4412DDF0
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco CISCO7609 (R7000) processor (revision 1.2) with 983008K/65536K bytes of memory.
Processor board ID XXX
SR71000 CPU at 600Mhz, Implementation 0x504, Rev 1.2, 512KB L2 Cache
Last reset from s/w reset
1 Virtual Ethernet interface
76 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
1917K bytes of non-volatile configuration memory.
8192K bytes of packet buffer memory.
Press RETURN to get started!
Setting the config-register back to 0x2102 stopped the above messages from being displayed while booting. You have to re-upgrade (or re-enable) the rommon too.
any rca found.
ReplyDeleteIf you happened to redo the test, could you do a show ver and get the config-register before putting it back into 0x2102. Might be useful to know and could be shared among your readers :)
ReplyDeleteNick Rolland
IP Network operator
Hi,
ReplyDeleteJust enable diagnostics in the rommon.
type confreg in rommon and answer the questions, when it asks: Enable diagnostic 'something'? just go for Y.