04-17-2002 04:48 AM - edited 03-01-2019 09:20 PM
Hi all,
I am facing a very strange problem. I have 2600 which i didnt use it for a long time and now when i switched on the router i found its restarting again and again. Moreover i had to upgrade the IOS . so i downloaded the IOS and tried to load the IOS from the rommon mode using tftpdnld command. After i did and restarted it is still rebooting again and again. i tried to reboot from the rommon mode using "boot flash:ios_file_name.bin" But no luck. Below is the message i am getting on the console continuously... Please note that i am getting a exception while rebooting "*** System received a SegV exception ***". I have to make this up as early as possible . Please guide me in recovering this...
thanks in advance...
Ashok Pawar
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization
Clearing bss
Reading monitor variables from NVRAM
Enabling interrupts
Enabling instruction cache
Reading cookie
Initializing main memory
Sizing NVRAM
Initializing PCI subsystem
Exiting init
C2600 platform with 32768 Kbytes of main memory
program load complete, entry point: 0x80008000, size: 0x702010
Stack pointer : 0x02000000
monstack : 0x8000613C
monra : 0x00000000
edata : 0x8000BECC
magic : 0xFEEDFACE
memsize : 0x02000000
uncomp_size : 0x01231250
comp_size : 0x006FE12F
comp_checksum : 0xB3A8BBF9
uncomp_checksum : 0x17777A1A
Self decompressing the image : #################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
####################################################### [OK]
Source elf_hdr->e_shnum = 0x0000000A
Setting up to copy ELF section 0x00000001
to image_info section 0x00000000
sh_name = 0x0000001B
sh_type = 0x00000001
sh_flags = 0x00000006
sh_addr = 0x80008000
sh_offset = 0x00000060
sh_size = 0x00C5C51C
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000020
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000002
to image_info section 0x00000001
sh_name = 0x00000021
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x80C6451C
sh_offset = 0x00C5C57C
sh_size = 0x005258AA
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000003
to image_info section 0x00000002
sh_name = 0x00000029
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x81189DC6
sh_offset = 0x01181E26
sh_size = 0x00000002
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000004
to image_info section 0x00000003
sh_name = 0x00000031
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81189DC8
sh_offset = 0x01181E28
sh_size = 0x000AEF30
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000005
to image_info section 0x00000004
sh_name = 0x00000037
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238CF8
sh_offset = 0x01230D58
sh_size = 0x00000010
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000004
Setting up to copy ELF section 0x00000006
to image_info section 0x00000005
sh_name = 0x0000003C
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238D08
sh_offset = 0x01230D68
sh_size = 0x00000308
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
cpu type : 0x0000002B
uncomp_size : 0x01231250
monstack : 0x8000613C
image_info.entry_point = 0x80008000
image_info.section_count = 0x00000006
image_info.monstack = 0x8000613C
image_info.monra = 0x00000000
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x00000000
image_info.param3 = 0x00000000
Section Index = 0x00000000
source = 0x800344B8
dest = 0x80008000
bytes = 0x00C5C51C
Section Index = 0x00000001
source = 0x80C909D4
dest = 0x80C6451C
bytes = 0x005258AA
Section Index = 0x00000002
source = 0x811B627E
dest = 0x81189DC6
bytes = 0x00000002
Section Index = 0x00000003
source = 0x811B6280
dest = 0x81189DC8
bytes = 0x000AEF30
Section Index = 0x00000004
source = 0x812651B0
dest = 0x81238CF8
bytes = 0x00000010
Section Index = 0x00000005
source = 0x812651C0
dest = 0x81238D08
bytes = 0x00000308
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL
EASE SOFTWARE (fc1)
TAC:Home:SW:IOS:Specials for info
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Sat 09-Feb-02 18:37 by nmasa
Image text-base: 0x80008088, data-base: 0x80C6451C
*** System received a SegV exception ***
signal= 0xb, code= 0x100, context= 0x8131bc08
PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization
Clearing bss
Reading monitor variables from NVRAM
Enabling interrupts
Enabling instruction cache
Reading cookie
Initializing main memory
Sizing NVRAM
Initializing PCI subsystem
Exiting init
C2600 platform with 32768 Kbytes of main memory
program load complete, entry point: 0x80008000, size: 0x702010
Stack pointer : 0x02000000
monstack : 0x8000613C
monra : 0x00000000
edata : 0x8000BECC
magic : 0xFEEDFACE
memsize : 0x02000000
uncomp_size : 0x01231250
comp_size : 0x006FE12F
comp_checksum : 0xB3A8BBF9
uncomp_checksum : 0x17777A1A
Self decompressing the image : #################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
####################################################### [OK]
Source elf_hdr->e_shnum = 0x0000000A
Setting up to copy ELF section 0x00000001
to image_info section 0x00000000
sh_name = 0x0000001B
sh_type = 0x00000001
sh_flags = 0x00000006
sh_addr = 0x80008000
sh_offset = 0x00000060
sh_size = 0x00C5C51C
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000020
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000002
to image_info section 0x00000001
sh_name = 0x00000021
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x80C6451C
sh_offset = 0x00C5C57C
sh_size = 0x005258AA
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000003
to image_info section 0x00000002
sh_name = 0x00000029
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x81189DC6
sh_offset = 0x01181E26
sh_size = 0x00000002
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000004
to image_info section 0x00000003
sh_name = 0x00000031
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81189DC8
sh_offset = 0x01181E28
sh_size = 0x000AEF30
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000005
to image_info section 0x00000004
sh_name = 0x00000037
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238CF8
sh_offset = 0x01230D58
sh_size = 0x00000010
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000004
Setting up to copy ELF section 0x00000006
to image_info section 0x00000005
sh_name = 0x0000003C
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238D08
sh_offset = 0x01230D68
sh_size = 0x00000308
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
cpu type : 0x0000002B
uncomp_size : 0x01231250
monstack : 0x8000613C
image_info.entry_point = 0x80008000
image_info.section_count = 0x00000006
image_info.monstack = 0x8000613C
image_info.monra = 0x00000000
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x00000000
image_info.param3 = 0x00000000
Section Index = 0x00000000
source = 0x800344B8
dest = 0x80008000
bytes = 0x00C5C51C
Section Index = 0x00000001
source = 0x80C909D4
dest = 0x80C6451C
bytes = 0x005258AA
Section Index = 0x00000002
source = 0x811B627E
dest = 0x81189DC6
bytes = 0x00000002
Section Index = 0x00000003
source = 0x811B6280
dest = 0x81189DC8
bytes = 0x000AEF30
Section Index = 0x00000004
source = 0x812651B0
dest = 0x81238CF8
bytes = 0x00000010
Section Index = 0x00000005
source = 0x812651C0
dest = 0x81238D08
bytes = 0x00000308
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL
EASE SOFTWARE (fc1)
TAC:Home:SW:IOS:Specials for info
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Sat 09-Feb-02 18:37 by nmasa
Image text-base: 0x80008088, data-base: 0x80C6451C
*** System received a SegV exception ***
signal= 0xb, code= 0x100, context= 0x8131bc08
PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization
Clearing bss
Reading monitor variables from NVRAM
Enabling interrupts
Enabling instruction cache
Reading cookie
Initializing main memory
Sizing NVRAM
Initializing PCI subsystem
Exiting init
C2600 platform with 32768 Kbytes of main memory
PC = 0xfff0a530, Vector = 0x500, SP = 0x80004864
monitor: command "boot" aborted due to user interrupt
rommon 1 >
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization
Clearing bss
Reading monitor variables from NVRAM
Enabling interrupts
Enabling instruction cache
Reading cookie
Initializing main memory
Sizing NVRAM
Initializing PCI subsystem
Exiting init
C2600 platform with 32768 Kbytes of main memory
program load complete, entry point: 0x80008000, size: 0x702010
Stack pointer : 0x02000000
monstack : 0x8000613C
monra : 0x00000000
edata : 0x8000BECC
magic : 0xFEEDFACE
memsize : 0x02000000
uncomp_size : 0x01231250
comp_size : 0x006FE12F
comp_checksum : 0xB3A8BBF9
uncomp_checksum : 0x17777A1A
Self decompressing the image : #################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
####################################################### [OK]
Source elf_hdr->e_shnum = 0x0000000A
Setting up to copy ELF section 0x00000001
to image_info section 0x00000000
sh_name = 0x0000001B
sh_type = 0x00000001
sh_flags = 0x00000006
sh_addr = 0x80008000
sh_offset = 0x00000060
sh_size = 0x00C5C51C
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000020
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000002
to image_info section 0x00000001
sh_name = 0x00000021
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x80C6451C
sh_offset = 0x00C5C57C
sh_size = 0x005258AA
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000003
to image_info section 0x00000002
sh_name = 0x00000029
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x81189DC6
sh_offset = 0x01181E26
sh_size = 0x00000002
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000004
to image_info section 0x00000003
sh_name = 0x00000031
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81189DC8
sh_offset = 0x01181E28
sh_size = 0x000AEF30
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000005
to image_info section 0x00000004
sh_name = 0x00000037
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238CF8
sh_offset = 0x01230D58
sh_size = 0x00000010
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000004
Setting up to copy ELF section 0x00000006
to image_info section 0x00000005
sh_name = 0x0000003C
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238D08
sh_offset = 0x01230D68
sh_size = 0x00000308
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
cpu type : 0x0000002B
uncomp_size : 0x01231250
monstack : 0x8000613C
image_info.entry_point = 0x80008000
image_info.section_count = 0x00000006
image_info.monstack = 0x8000613C
image_info.monra = 0x00000000
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x00000000
image_info.param3 = 0x00000000
Section Index = 0x00000000
source = 0x800344B8
dest = 0x80008000
bytes = 0x00C5C51C
Section Index = 0x00000001
source = 0x80C909D4
dest = 0x80C6451C
bytes = 0x005258AA
Section Index = 0x00000002
source = 0x811B627E
dest = 0x81189DC6
bytes = 0x00000002
Section Index = 0x00000003
source = 0x811B6280
dest = 0x81189DC8
bytes = 0x000AEF30
Section Index = 0x00000004
source = 0x812651B0
dest = 0x81238CF8
bytes = 0x00000010
Section Index = 0x00000005
source = 0x812651C0
dest = 0x81238D08
bytes = 0x00000308
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL
EASE SOFTWARE (fc1)
TAC:Home:SW:IOS:Specials for info
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Sat 09-Feb-02 18:37 by nmasa
Image text-base: 0x80008088, data-base: 0x80C6451C
*** System received a SegV exception ***
signal= 0xb, code= 0x100, context= 0x8131bc08
PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization
Clearing bss
Reading monitor variables from NVRAM
Enabling interrupts
Enabling instruction cache
Reading cookie
Initializing main memory
Sizing NVRAM
Initializing PCI subsystem
Exiting init
C2600 platform with 32768 Kbytes of main memory
program load complete, entry point: 0x80008000, size: 0x702010
Stack pointer : 0x02000000
monstack : 0x8000613C
monra : 0x00000000
edata : 0x8000BECC
magic : 0xFEEDFACE
memsize : 0x02000000
uncomp_size : 0x01231250
comp_size : 0x006FE12F
comp_checksum : 0xB3A8BBF9
uncomp_checksum : 0x17777A1A
Self decompressing the image : #################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
################################################################################
####################################################### [OK]
Source elf_hdr->e_shnum = 0x0000000A
Setting up to copy ELF section 0x00000001
to image_info section 0x00000000
sh_name = 0x0000001B
sh_type = 0x00000001
sh_flags = 0x00000006
sh_addr = 0x80008000
sh_offset = 0x00000060
sh_size = 0x00C5C51C
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000020
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000002
to image_info section 0x00000001
sh_name = 0x00000021
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x80C6451C
sh_offset = 0x00C5C57C
sh_size = 0x005258AA
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000003
to image_info section 0x00000002
sh_name = 0x00000029
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x81189DC6
sh_offset = 0x01181E26
sh_size = 0x00000002
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000004
to image_info section 0x00000003
sh_name = 0x00000031
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81189DC8
sh_offset = 0x01181E28
sh_size = 0x000AEF30
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000005
to image_info section 0x00000004
sh_name = 0x00000037
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238CF8
sh_offset = 0x01230D58
sh_size = 0x00000010
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000004
Setting up to copy ELF section 0x00000006
to image_info section 0x00000005
sh_name = 0x0000003C
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x81238D08
sh_offset = 0x01230D68
sh_size = 0x00000308
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
cpu type : 0x0000002B
uncomp_size : 0x01231250
monstack : 0x8000613C
image_info.entry_point = 0x80008000
image_info.section_count = 0x00000006
image_info.monstack = 0x8000613C
image_info.monra = 0x00000000
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x00000000
image_info.param3 = 0x00000000
Section Index = 0x00000000
source = 0x800344B8
dest = 0x80008000
bytes = 0x00C5C51C
Section Index = 0x00000001
source = 0x80C909D4
dest = 0x80C6451C
bytes = 0x005258AA
Section Index = 0x00000002
source = 0x811B627E
dest = 0x81189DC6
bytes = 0x00000002
Section Index = 0x00000003
source = 0x811B6280
dest = 0x81189DC8
bytes = 0x000AEF30
Section Index = 0x00000004
source = 0x812651B0
dest = 0x81238CF8
bytes = 0x00000010
Section Index = 0x00000005
source = 0x812651C0
dest = 0x81238D08
bytes = 0x00000308
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL
EASE SOFTWARE (fc1)
TAC:Home:SW:IOS:Specials for info
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Sat 09-Feb-02 18:37 by nmasa
Image text-base: 0x80008088, data-base: 0x80C6451C
*** System received a SegV exception ***
signal= 0xb, code= 0x100, context= 0x8131bc08
PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8
System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)
Copyright (c) 1999 by cisco Systems, Inc.
TAC:Home:SW:IOS:Specials for info
Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization
Clearing bss
Reading monitor variables from NVRAM
Enabling interrupts
Enabling instruction cache
Reading cookie
Initializing main memory
Sizing NVRAM
Initializing PCI subsystem
Exiting init
C2600 platform with 32768 Kbytes of main memory
PC = 0xfff0a530, Vector = 0x500, SP = 0x80004864
monitor: command "boot" aborted due to user interrupt
rommon 1 >
04-17-2002 05:36 AM
I would suspect a memory fault.
04-17-2002 05:42 AM
Seg V Exceptions are usually IOS bugs but not when the router is continually rebooting and also you seem to have ruled this out by upgrading the IOS. This seems to point towards a hardware problem. Start off by taking out any modules that maybe inserted in this router and then see if the router boots up. If it does you then know you have a problem with one of the modules. If not, swap out the DRAM and if possibly the flash. If this doesn't help then you are probably looking at a chassis fault. I hope this helps. Out of all of them, I would guess it is a DRAM fault.
04-17-2002 07:55 PM
i do not have any spare modules to swap, have to purchase new one and test it out...anyway thanks for your quick response...
Ashok Pawar
04-18-2002 09:49 AM
Check the config register setting.
04-19-2002 07:23 PM
I do not know if this will help because an upgrade did not help but this was my situation.
System returned to ROM by error - a SegV exception, PC 0x802938F0
System image file is "flash:c1700-y-mz.120-7.T"
This error was returned only when a default route was configured and a redistributed default route was recieved from another router. The 1700 would reboot endlessly until we shut the interface of the router redistributing the default route. This version of code was defered for memory configuration issues, so my best guess is it might be code or memory allocation related.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide