06-23-2019 03:45 PM
Issue 1: a student has wiped all data from the Cisco 4221 device, boots into rommon all the time
here is the issues
rommon 2 > boot bootflash:isr4200-universalk9_ias.16.11.01a.SPA.bin
Located isr4200-universalk9_ias.16.11.01a.SPA.bin
###################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
Package header rev 3 structure detected
IsoSize = 511098880
Calculating SHA-1 hash...Validate package: SHA-1 hash:
calculated 7E3D1143:F9D6B768:461DD45F:7BB5A324:859C90EF
expected 7E3D1143:F9D6B768:461DD45F:7BB5A324:859C90EF
RSA Signed RELEASE Image Signature Verification Successful.
Image validated
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software [Gibraltar], ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9_IAS-M), Version 16.11.1a, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2019 by Cisco Systems, Inc.
Compiled Fri 12-Apr-19 00:13 by mcpre
This software version supports only Smart Licensing as the software licensing mechanism.
PLEASE READ THE FOLLOWING TERMS CAREFULLY. INSTALLING THE LICENSE OR
LICENSE KEY PROVIDED FOR ANY CISCO SOFTWARE PRODUCT, PRODUCT FEATURE,
AND/OR SUBSEQUENTLY PROVIDED SOFTWARE FEATURES (COLLECTIVELY, THE
"SOFTWARE"), AND/OR USING SUCH SOFTWARE CONSTITUTES YOUR FULL
ACCEPTANCE OF THE FOLLOWING TERMS. YOU MUST NOT PROCEED FURTHER IF YOU
ARE NOT WILLING TO BE BOUND BY ALL THE TERMS SET FORTH HEREIN.
Your use of the Software is subject to the Cisco End User License Agreement
(EULA) and any relevant supplemental terms (SEULA) found at
http://www.cisco.com/c/en/us/about/legal/cloud-and-software/software-terms.html.
You hereby acknowledge and agree that certain Software and/or features are
licensed for a particular term, that the license to such Software and/or
features is valid only for the applicable term and that such Software and/or
features may be shut down or otherwise terminated by Cisco after expiration
of the applicable license term (e.g., 90-day trial period). Cisco reserves
the right to terminate any such Software feature electronically or by any
other means available. While Cisco may provide alerts, it is your sole
responsibility to monitor your usage of any such term Software feature to
ensure that your systems and networks are prepared for a shutdown of the
Software feature.
cisco ISR4221/K9 (1RU) processor with 1777948K/3071K bytes of memory.
Processor board ID FGL224190DA
2 Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
6598655K bytes of flash memory at bootflash:.
15295488K bytes of USB flash at usb0:.
0K bytes of WebUI ODM Files at webui:.
%INIT: waited 0 seconds for NVRAM to be available
WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type
WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type%Warning:Use P2P interface for routemap setinterface clause
Exception to IOS Thread:
Frame pointer 0x7FC1C1446350, PC = 0x7FC276457117
UNIX-EXT-SIGNAL: Segmentation fault(11), Process = Init
-Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 iosd_shr_m_uk9_ias_SANET_Core_crb:7FC27629F000+1B8117 :55619F42B000+5E3C269 iosd_shr_m_uk9_ias_AAA_Core_crb:7FC274BFB000+82AA98
Fastpath Thread backtrace:
-Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 c:7FC20C038000+EE073
Packet Thread backtrace:
-Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 c:7FC20C038000+EE073 prelib:7FC27316F000+3ADF prelib:7FC27316F000+3ADF
Auxiliary Thread backtrace:
-Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 pthread:7FC20A3A9000+D1C5
RAX = 0000000000000000 RBX = 00007FC1C9EAF418
RCX = 00000000DFFFFEFF RDX = 0000000000000000
RSP = 00007FC1C1446350 RBP = 00007FC1C1446A10
RSI = 0000000000000001 RDI = 0000000000000000
R8 = 00007FC20CB42108 R9 = 0000000002000000
R10 = 0000000000000007 R11 = 00007FC20C8A1970
R12 = 8000000000000000 R13 = 8000000000000000
R14 = 7FFFFFFFFFFFFFFF R15 = 80007FC1C1446350
RFL = 0000000000010246 RIP = 00007FC276457117
CS = 0033 FS = 0000 GS = 0000
ST0 = 0000 0000000000000000 ST1 = 0000 0000000000000000
ST2 = 0000 0000000000000000 ST3 = 0000 0000000000000000
ST4 = 0000 0000000000000000 ST5 = 0000 0000000000000000
ST6 = 401D BA1FFC1C00000000 ST7 = 4003 B000000000000000
X87CW = 037F X87SW = 0000 X87TG = 0000 X87OP = 055D
X87IP = 00007FC20C0E4124 X87DP = 00007FC1C1445ED8
XMM0 = 00000000000000000000000000000000
XMM1 = 00000000000000000000000000000000
XMM2 = 00000000000000000000000000000000
XMM3 = 00000000000000000000000000000000
XMM4 = 00000000FF0000000000000000000000
XMM5 = 6D6D617261705F687475616265775F74
XMM6 = 730074726F705F73707474685F70616D
XMM7 = 00000000000000000000000000000000
XMM8 = A97CD39E6A88B3A3C56CD089B4FB16C3
XMM9 = 00000008000000080000000800000008
XMM10 = 0000000C0000000C0000000C0000000C
XMM11 = 00000010000000100000001000000010
XMM12 = 00000000000000000000000000000000
XMM13 = 000000FF000000FF000000FF000000FF
XMM14 = 000000FF000000FF000000FF00000080
XMM15 = C25F78CB5585DFFF8189448BF7703726
MXCSR = 00001FA0
Writing crashinfo to bootflash:crashinfo_RP_00_00_20190623-223308-UTC
Buffered messages:
Queued messages:
*Jun 23 22:33:11.674: %SYS-3-LOGGER_FLUSHING: System pausing to ensure console debugging output.
*Jun 23 22:32:49.947: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowed
*Jun 23 22:32:50.768: %ISR_THROUGHPUT-6-LEVEL: Throughput level has been set to 35000 kbps
*Jun 23 22:32:53.671: %IOSD_INFRA-6-IFS_DEVICE_OIR: Device usb0 addedesg switch eventq crimson DB not initialized
*Jun 23 22:32:55.023: %SMART_LIC-6-AGENT_READY: Smart Agent for Licensing is initialized
*Jun 23 22:32:55.023: %SMART_LIC-6-AGENT_ENABLED: Smart Agent for Licensing is enabled
*Jun 23 22:32:55.023: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowed
*Jun 23 22:33:01.154: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
*Jun 23 22:33:02.020: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up
*Jun 23 22:33:02.021: %LINK-3-UPDOWN: Interface EOBC0, changed state to up
*Jun 23 22:33:02.022: %LINK-3-UPDOWN: Interface LIIN0, changed state to up
*Jun 23 22:33:02.259: %SMART_LIC-6-HA_ROLE_CHANGED: Smart Agent HA role changed to Active.
*Jun 23 22:31:46.229: %CMRP_PFU-6-FANASSY_INSERTED: R0/0: cmand: Fan Assembly is inserted.
*Jun 23 22:31:46.280: %CMRP-3-PFU_INITIALIZATION: R0/0: cmand: The RP has failed to initialize a Power Supply/Fan module controller because the idprom is empty for slot 2
*Jun 23 22:31:46.229: %CMRP_PFU-6-FANASSY_INSERTED: F0: cmand: Fan Assembly is inserted.
*Jun 23 22:31:46.280: %CMRP-3-PFU_INITIALIZATION: F0: cmand: The RP has failed to initialize a Power Supply/Fan module controller because the idprom is empty for slot 2
*Jun 23 22:31:46.229: %CMRP_PFU-6-FANASSY_INSERTED: SIP0: cmand: Fan Assembly is inserted.
*Jun 23 22:31:46.280: %CMRP-3-PFU_INITIALIZATION: SIP0: cmand: The RP has failed to initialize a Power Supply/Fan module controller because the idprom is empty for slot 2
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329170.841:93): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329170.841:93): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329170.841:93): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329171.902:95): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329171.902:95): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.907: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329171.902:95): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.907: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:51.907: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:32:55.946: %CMLIB-6-THROUGHPUT_VALUE: R0/0: cmand: Throughput license found, throughput set to 35000 kbps
*Jun 23 22:32:55.946: %CMLIB-6-THROUGHPUT_VALUE: F0: cmand: Throughput license found, throughput set to 35000 kbps
*Jun 23 22:32:55.946: %CMLIB-6-THROUGHPUT_VALUE: SIP0: cmand: Throughput license found, throughput set to 35000 kbps
*Jun 23 22:33:02.174: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329182.171:97): avc: denied { getattr } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { write } for pid=26279 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { open } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:02.174: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329182.171:97): avc: denied { getattr } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { write } for pid=26279 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:02.174: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329182.171:97): avc: denied { getattr } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { write } for pid=26279 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { open } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:03.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up
*Jun 23 22:33:03.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up
*Jun 23 22:33:03.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up
*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { open } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1
*Jun 23 22:33:03.605: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Base was enabled by Default
*Jun 23 22:33:07.491: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-1584976319 has been generated or imported by crypto config
*Jun 23 22:33:07.605: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type
*Jun 23 22:33:07.700: %AAA-5-USER_RESET: User admin failed attempts reset by vty0
*Jun 23 22:33:07.702: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type
*Jun 23 22:33:08.010: %SYS-5-CONFIG_I: Configured from memory by console
*Jun 23 22:33:08.046: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled
*Jun 23 22:33:08.059: %SPA_OIR-6-OFFLINECARD: SPA (ISR4221-2x1GE) offline in subslot 0/0
*Jun 23 22:33:08.295: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0
*Jun 23 22:33:08.295: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0
*Jun 23 22:33:08.384: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 0
*Jun 23 22:33:08.467: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0
IOSD RP: 1 messages not written to btrace log fileJun 23 22:33:48.316: %PMAN-3-PROCHOLDDOWN: R0/0: The process linux_iosd-image has been helddown (rc 139)
Jun 23 22:33:48.701: %PMAN-0-PROCFAILCRIT: R0/0: pvp: A critical process linux_iosd_image has failed (rc 139)
Jun 23 22:33:51.098: %PMAN-5-EXITACTION: R0/0: pvp: Process manager
Initializing Hardware ...
Checking for PCIe device presence...done
System integrity status: 0x610
Rom image verified correctly
System Bootstrap, Version 16.7(3r), RELEASE SOFTWARE
Copyright (c) 1994-2017 by cisco Systems, Inc.
Current image running: Boot ROM0
Last reset cause: LocalSoft
ISR4221/K9 platform with 4194304 Kbytes of main memory
06-23-2019 06:20 PM
Hi,
You could be hitting a software bug
Have you tried another IOS version like isr4200-universalk9_ias.16.09.03.SPA.bin?
Thanks
John
06-23-2019 11:37 PM
Hi,
This seems like your software image is having a bug so change the image and try again.
Regards,
Deepak Kumar
06-23-2019 11:46 PM
06-24-2019 12:05 AM
fixed it now by upgrading Rommon and Suggestions above
how to stop is looping back into Rommon after it reboots
06-24-2019 12:30 AM
Set the boot variable :
dir
note the image file in the flash - and location of the file
config t
boot system flash bootflash:isr-XXXXXXXXXXX.SPA.bin <<-- make sure you change the correct bin file name here
end
wr
test and advise
06-24-2019 12:40 AM
Hi,
Set the boot variable to fix this issue.
config t
boot system flash bootflash:XXXXXXXXXXX.bin <<-- XXXXXXXXX is the ISO file name with file extension.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide