I am having a problem booting a 2600. Attached message
shows the messages it displays at boot up. Concerning
the hardware, I am sure the flash and memory are OK.
At least, they worked on another system.

Regards,
Ukairo

__________________________________________________
Do You Yahoo!?
Make a great connection at Yahoo! Personals.
http://personals.yahoo.com
System Bootstrap, Version 12.1(3r)T2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.

Testing lower main memory - data equals address
Testing lower main memory - checkerboard
Testing lower main memory - inverse checkerboard
Clearing lower 4K memory for cache initialization 
Clearing bss 

Reading monitor variables from NVRAM 

Enabling interrupts 

Enabling instruction cache 

Reading cookie 

Initializing main memory 

Sizing NVRAM 

Initializing PCI subsystem 

Exiting init

C2600 platform with 32768 Kbytes of main memory


program load complete, entry point: 0x80008000, size: 0x403b9c

Stack pointer       : 0x02000000

monstack            : 0x8000615C

monra               : 0x00000000

edata : 0x8000BE74

magic : 0xFEEDFACE

memsize             : 0x02000000

uncomp_size         : 0x00A532B8

comp_size           : 0x003FFD12

comp_checksum       : 0xAB9CCFFE

uncomp_checksum     : 0xD091E16A

Self decompressing the image :
###################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################
 [OK]

Source elf_hdr->e_shnum = 0x0000000A

Setting up to copy ELF section 0x00000001

 to image_info section 0x00000000

 sh_name = 0x0000001B

 sh_type = 0x00000001

 sh_flags = 0x00000006

 sh_addr = 0x80008000

 sh_offset = 0x00000060

 sh_size = 0x007A2F70

 sh_link = 0x00000000

 sh_info = 0x00000000

 sh_addralign = 0x00000020

 sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000002

 to image_info section 0x00000001

 sh_name = 0x00000021

 sh_type = 0x00000001

 sh_flags = 0x00000002

 sh_addr = 0x807AAF70

 sh_offset = 0x007A2FD0

 sh_size = 0x0029450E

 sh_link = 0x00000000

 sh_info = 0x00000000

 sh_addralign = 0x00000008

 sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000003

 to image_info section 0x00000002

 sh_name = 0x00000029

 sh_type = 0x00000001

 sh_flags = 0x00000002

 sh_addr = 0x80A3F47E

 sh_offset = 0x00A374DE

 sh_size = 0x00000002

 sh_link = 0x00000000

 sh_info = 0x00000000

 sh_addralign = 0x00000004

 sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000004

 to image_info section 0x00000003

 sh_name = 0x00000031

 sh_type = 0x00000001

 sh_flags = 0x00000003

 sh_addr = 0x80A3F480

 sh_offset = 0x00A374E0

 sh_size = 0x0001BBE8

 sh_link = 0x00000000

 sh_info = 0x00000000

 sh_addralign = 0x00000008

 sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000005

 to image_info section 0x00000004

 sh_name = 0x00000037

 sh_type = 0x00000001

 sh_flags = 0x00000003

 sh_addr = 0x80A5B068

 sh_offset = 0x00A530C8

 sh_size = 0x00000010

 sh_link = 0x00000000

 sh_info = 0x00000000

 sh_addralign = 0x00000004

 sh_entsize = 0x00000004

cpu type                   : 0x0000002B

uncomp_size                : 0x00A532B8

monstack                   : 0x8000615C

image_info.entry_point   = 0x80008000

image_info.section_count = 0x00000005

image_info.monstack      = 0x8000615C

image_info.monra         = 0x00000000

image_info.param0        = 0x00000002

image_info.param1        = 0x00000000

image_info.param2        = 0x00000000

image_info.param3        = 0x00000000

Section Index = 0x00000000

    source    = 0x80034460

    dest      = 0x80008000

    bytes     = 0x007A2F70

Section Index = 0x00000001

    source    = 0x807D73D0

    dest      = 0x807AAF70

    bytes     = 0x0029450E

Section Index = 0x00000002

    source    = 0x80A6B8DE

    dest      = 0x80A3F47E

    bytes     = 0x00000002

Section Index = 0x00000003

    source    = 0x80A6B8E0

    dest      = 0x80A3F480

    bytes     = 0x0001BBE8

Section Index = 0x00000004

    source    = 0x80A874C8

    dest      = 0x80A5B068

    bytes     = 0x00000010
              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706



Cisco Internetwork Operating System Software 
IOS (tm) C2600 Software (C2600-I-M), Version 12.0(7)T,  RELEASE SOFTWARE
(fc2)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Tue 07-Dec-99 02:12 by phanguye
Image text-base: 0x80008088, data-base: 0x807AAF70

cisco 2621 (MPC860) processor (revision 0x200) with 26624K/6144K bytes of
memory.
Processor board ID JAD05200EUL (139774460)
M860 processor: part number 0, mask 49
Bridging software.
X.25 software, Version 3.0.0.
2 FastEthernet/IEEE 802.3 interface(s)
32K bytes of non-volatile configuration memory.
8192K bytes of processor board System flash (Read/Write)



         --- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]:




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=23343&t=23343
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to