Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Community Member

Router rebooting continuously

Hi all,

I am facing a very strange problem. I have 2600 which i didnt use it for a long time and now when i switched on the router i found its restarting again and again. Moreover i had to upgrade the IOS . so i downloaded the IOS and tried to load the IOS from the rommon mode using tftpdnld command. After i did and restarted it is still rebooting again and again. i tried to reboot from the rommon mode using "boot flash:ios_file_name.bin" But no luck. Below is the message i am getting on the console continuously... Please note that i am getting a exception while rebooting "*** System received a SegV exception ***". I have to make this up as early as possible . Please guide me in recovering this...

thanks in advance...

Ashok Pawar

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Copyright (c) 1999 by cisco Systems, Inc.

TAC:Home:SW:IOS:Specials for info

Testing lower main memory - data equals address

Testing lower main memory - checkerboard

Testing lower main memory - inverse checkerboard

Clearing lower 4K memory for cache initialization

Clearing bss

Reading monitor variables from NVRAM

Enabling interrupts

Enabling instruction cache

Reading cookie

Initializing main memory

Sizing NVRAM

Initializing PCI subsystem

Exiting init

C2600 platform with 32768 Kbytes of main memory

program load complete, entry point: 0x80008000, size: 0x702010

Stack pointer : 0x02000000

monstack : 0x8000613C

monra : 0x00000000

edata : 0x8000BECC

magic : 0xFEEDFACE

memsize : 0x02000000

uncomp_size : 0x01231250

comp_size : 0x006FE12F

comp_checksum : 0xB3A8BBF9

uncomp_checksum : 0x17777A1A

Self decompressing the image : #################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

####################################################### [OK]

Source elf_hdr->e_shnum = 0x0000000A

Setting up to copy ELF section 0x00000001

to image_info section 0x00000000

sh_name = 0x0000001B

sh_type = 0x00000001

sh_flags = 0x00000006

sh_addr = 0x80008000

sh_offset = 0x00000060

sh_size = 0x00C5C51C

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000020

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000002

to image_info section 0x00000001

sh_name = 0x00000021

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x80C6451C

sh_offset = 0x00C5C57C

sh_size = 0x005258AA

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000003

to image_info section 0x00000002

sh_name = 0x00000029

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x81189DC6

sh_offset = 0x01181E26

sh_size = 0x00000002

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000004

to image_info section 0x00000003

sh_name = 0x00000031

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81189DC8

sh_offset = 0x01181E28

sh_size = 0x000AEF30

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000005

to image_info section 0x00000004

sh_name = 0x00000037

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238CF8

sh_offset = 0x01230D58

sh_size = 0x00000010

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000004

Setting up to copy ELF section 0x00000006

to image_info section 0x00000005

sh_name = 0x0000003C

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238D08

sh_offset = 0x01230D68

sh_size = 0x00000308

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

cpu type : 0x0000002B

uncomp_size : 0x01231250

monstack : 0x8000613C

image_info.entry_point = 0x80008000

image_info.section_count = 0x00000006

image_info.monstack = 0x8000613C

image_info.monra = 0x00000000

image_info.param0 = 0x00000002

image_info.param1 = 0x00000000

image_info.param2 = 0x00000000

image_info.param3 = 0x00000000

Section Index = 0x00000000

source = 0x800344B8

dest = 0x80008000

bytes = 0x00C5C51C

Section Index = 0x00000001

source = 0x80C909D4

dest = 0x80C6451C

bytes = 0x005258AA

Section Index = 0x00000002

source = 0x811B627E

dest = 0x81189DC6

bytes = 0x00000002

Section Index = 0x00000003

source = 0x811B6280

dest = 0x81189DC8

bytes = 0x000AEF30

Section Index = 0x00000004

source = 0x812651B0

dest = 0x81238CF8

bytes = 0x00000010

Section Index = 0x00000005

source = 0x812651C0

dest = 0x81238D08

bytes = 0x00000308

Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.

170 West Tasman Drive

San Jose, California 95134-1706

Cisco Internetwork Operating System Software

IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL

EASE SOFTWARE (fc1)

TAC:Home:SW:IOS:Specials for info

Copyright (c) 1986-2002 by cisco Systems, Inc.

Compiled Sat 09-Feb-02 18:37 by nmasa

Image text-base: 0x80008088, data-base: 0x80C6451C

*** System received a SegV exception ***

signal= 0xb, code= 0x100, context= 0x8131bc08

PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Copyright (c) 1999 by cisco Systems, Inc.

TAC:Home:SW:IOS:Specials for info

Testing lower main memory - data equals address

Testing lower main memory - checkerboard

Testing lower main memory - inverse checkerboard

Clearing lower 4K memory for cache initialization

Clearing bss

Reading monitor variables from NVRAM

Enabling interrupts

Enabling instruction cache

Reading cookie

Initializing main memory

Sizing NVRAM

Initializing PCI subsystem

Exiting init

C2600 platform with 32768 Kbytes of main memory

program load complete, entry point: 0x80008000, size: 0x702010

Stack pointer : 0x02000000

monstack : 0x8000613C

monra : 0x00000000

edata : 0x8000BECC

magic : 0xFEEDFACE

memsize : 0x02000000

uncomp_size : 0x01231250

comp_size : 0x006FE12F

comp_checksum : 0xB3A8BBF9

uncomp_checksum : 0x17777A1A

Self decompressing the image : #################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

####################################################### [OK]

Source elf_hdr->e_shnum = 0x0000000A

Setting up to copy ELF section 0x00000001

to image_info section 0x00000000

sh_name = 0x0000001B

sh_type = 0x00000001

sh_flags = 0x00000006

sh_addr = 0x80008000

sh_offset = 0x00000060

sh_size = 0x00C5C51C

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000020

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000002

to image_info section 0x00000001

sh_name = 0x00000021

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x80C6451C

sh_offset = 0x00C5C57C

sh_size = 0x005258AA

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000003

to image_info section 0x00000002

sh_name = 0x00000029

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x81189DC6

sh_offset = 0x01181E26

sh_size = 0x00000002

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000004

to image_info section 0x00000003

sh_name = 0x00000031

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81189DC8

sh_offset = 0x01181E28

sh_size = 0x000AEF30

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000005

to image_info section 0x00000004

sh_name = 0x00000037

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238CF8

sh_offset = 0x01230D58

sh_size = 0x00000010

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000004

Setting up to copy ELF section 0x00000006

to image_info section 0x00000005

sh_name = 0x0000003C

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238D08

sh_offset = 0x01230D68

sh_size = 0x00000308

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

cpu type : 0x0000002B

uncomp_size : 0x01231250

monstack : 0x8000613C

image_info.entry_point = 0x80008000

image_info.section_count = 0x00000006

image_info.monstack = 0x8000613C

image_info.monra = 0x00000000

image_info.param0 = 0x00000002

image_info.param1 = 0x00000000

image_info.param2 = 0x00000000

image_info.param3 = 0x00000000

Section Index = 0x00000000

source = 0x800344B8

dest = 0x80008000

bytes = 0x00C5C51C

Section Index = 0x00000001

source = 0x80C909D4

dest = 0x80C6451C

bytes = 0x005258AA

Section Index = 0x00000002

source = 0x811B627E

dest = 0x81189DC6

bytes = 0x00000002

Section Index = 0x00000003

source = 0x811B6280

dest = 0x81189DC8

bytes = 0x000AEF30

Section Index = 0x00000004

source = 0x812651B0

dest = 0x81238CF8

bytes = 0x00000010

Section Index = 0x00000005

source = 0x812651C0

dest = 0x81238D08

bytes = 0x00000308

Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.

170 West Tasman Drive

San Jose, California 95134-1706

Cisco Internetwork Operating System Software

IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL

EASE SOFTWARE (fc1)

TAC:Home:SW:IOS:Specials for info

Copyright (c) 1986-2002 by cisco Systems, Inc.

Compiled Sat 09-Feb-02 18:37 by nmasa

Image text-base: 0x80008088, data-base: 0x80C6451C

*** System received a SegV exception ***

signal= 0xb, code= 0x100, context= 0x8131bc08

PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Copyright (c) 1999 by cisco Systems, Inc.

TAC:Home:SW:IOS:Specials for info

Testing lower main memory - data equals address

Testing lower main memory - checkerboard

Testing lower main memory - inverse checkerboard

Clearing lower 4K memory for cache initialization

Clearing bss

Reading monitor variables from NVRAM

Enabling interrupts

Enabling instruction cache

Reading cookie

Initializing main memory

Sizing NVRAM

Initializing PCI subsystem

Exiting init

C2600 platform with 32768 Kbytes of main memory

PC = 0xfff0a530, Vector = 0x500, SP = 0x80004864

monitor: command "boot" aborted due to user interrupt

rommon 1 >

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Copyright (c) 1999 by cisco Systems, Inc.

TAC:Home:SW:IOS:Specials for info

Testing lower main memory - data equals address

Testing lower main memory - checkerboard

Testing lower main memory - inverse checkerboard

Clearing lower 4K memory for cache initialization

Clearing bss

Reading monitor variables from NVRAM

Enabling interrupts

Enabling instruction cache

Reading cookie

Initializing main memory

Sizing NVRAM

Initializing PCI subsystem

Exiting init

C2600 platform with 32768 Kbytes of main memory

program load complete, entry point: 0x80008000, size: 0x702010

Stack pointer : 0x02000000

monstack : 0x8000613C

monra : 0x00000000

edata : 0x8000BECC

magic : 0xFEEDFACE

memsize : 0x02000000

uncomp_size : 0x01231250

comp_size : 0x006FE12F

comp_checksum : 0xB3A8BBF9

uncomp_checksum : 0x17777A1A

Self decompressing the image : #################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

####################################################### [OK]

Source elf_hdr->e_shnum = 0x0000000A

Setting up to copy ELF section 0x00000001

to image_info section 0x00000000

sh_name = 0x0000001B

sh_type = 0x00000001

sh_flags = 0x00000006

sh_addr = 0x80008000

sh_offset = 0x00000060

sh_size = 0x00C5C51C

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000020

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000002

to image_info section 0x00000001

sh_name = 0x00000021

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x80C6451C

sh_offset = 0x00C5C57C

sh_size = 0x005258AA

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000003

to image_info section 0x00000002

sh_name = 0x00000029

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x81189DC6

sh_offset = 0x01181E26

sh_size = 0x00000002

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000004

to image_info section 0x00000003

sh_name = 0x00000031

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81189DC8

sh_offset = 0x01181E28

sh_size = 0x000AEF30

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000005

to image_info section 0x00000004

sh_name = 0x00000037

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238CF8

sh_offset = 0x01230D58

sh_size = 0x00000010

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000004

Setting up to copy ELF section 0x00000006

to image_info section 0x00000005

sh_name = 0x0000003C

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238D08

sh_offset = 0x01230D68

sh_size = 0x00000308

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

cpu type : 0x0000002B

uncomp_size : 0x01231250

monstack : 0x8000613C

image_info.entry_point = 0x80008000

image_info.section_count = 0x00000006

image_info.monstack = 0x8000613C

image_info.monra = 0x00000000

image_info.param0 = 0x00000002

image_info.param1 = 0x00000000

image_info.param2 = 0x00000000

image_info.param3 = 0x00000000

Section Index = 0x00000000

source = 0x800344B8

dest = 0x80008000

bytes = 0x00C5C51C

Section Index = 0x00000001

source = 0x80C909D4

dest = 0x80C6451C

bytes = 0x005258AA

Section Index = 0x00000002

source = 0x811B627E

dest = 0x81189DC6

bytes = 0x00000002

Section Index = 0x00000003

source = 0x811B6280

dest = 0x81189DC8

bytes = 0x000AEF30

Section Index = 0x00000004

source = 0x812651B0

dest = 0x81238CF8

bytes = 0x00000010

Section Index = 0x00000005

source = 0x812651C0

dest = 0x81238D08

bytes = 0x00000308

Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.

170 West Tasman Drive

San Jose, California 95134-1706

Cisco Internetwork Operating System Software

IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL

EASE SOFTWARE (fc1)

TAC:Home:SW:IOS:Specials for info

Copyright (c) 1986-2002 by cisco Systems, Inc.

Compiled Sat 09-Feb-02 18:37 by nmasa

Image text-base: 0x80008088, data-base: 0x80C6451C

*** System received a SegV exception ***

signal= 0xb, code= 0x100, context= 0x8131bc08

PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Copyright (c) 1999 by cisco Systems, Inc.

TAC:Home:SW:IOS:Specials for info

Testing lower main memory - data equals address

Testing lower main memory - checkerboard

Testing lower main memory - inverse checkerboard

Clearing lower 4K memory for cache initialization

Clearing bss

Reading monitor variables from NVRAM

Enabling interrupts

Enabling instruction cache

Reading cookie

Initializing main memory

Sizing NVRAM

Initializing PCI subsystem

Exiting init

C2600 platform with 32768 Kbytes of main memory

program load complete, entry point: 0x80008000, size: 0x702010

Stack pointer : 0x02000000

monstack : 0x8000613C

monra : 0x00000000

edata : 0x8000BECC

magic : 0xFEEDFACE

memsize : 0x02000000

uncomp_size : 0x01231250

comp_size : 0x006FE12F

comp_checksum : 0xB3A8BBF9

uncomp_checksum : 0x17777A1A

Self decompressing the image : #################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

################################################################################

####################################################### [OK]

Source elf_hdr->e_shnum = 0x0000000A

Setting up to copy ELF section 0x00000001

to image_info section 0x00000000

sh_name = 0x0000001B

sh_type = 0x00000001

sh_flags = 0x00000006

sh_addr = 0x80008000

sh_offset = 0x00000060

sh_size = 0x00C5C51C

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000020

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000002

to image_info section 0x00000001

sh_name = 0x00000021

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x80C6451C

sh_offset = 0x00C5C57C

sh_size = 0x005258AA

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000003

to image_info section 0x00000002

sh_name = 0x00000029

sh_type = 0x00000001

sh_flags = 0x00000002

sh_addr = 0x81189DC6

sh_offset = 0x01181E26

sh_size = 0x00000002

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000004

to image_info section 0x00000003

sh_name = 0x00000031

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81189DC8

sh_offset = 0x01181E28

sh_size = 0x000AEF30

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

Setting up to copy ELF section 0x00000005

to image_info section 0x00000004

sh_name = 0x00000037

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238CF8

sh_offset = 0x01230D58

sh_size = 0x00000010

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000004

sh_entsize = 0x00000004

Setting up to copy ELF section 0x00000006

to image_info section 0x00000005

sh_name = 0x0000003C

sh_type = 0x00000001

sh_flags = 0x00000003

sh_addr = 0x81238D08

sh_offset = 0x01230D68

sh_size = 0x00000308

sh_link = 0x00000000

sh_info = 0x00000000

sh_addralign = 0x00000008

sh_entsize = 0x00000000

cpu type : 0x0000002B

uncomp_size : 0x01231250

monstack : 0x8000613C

image_info.entry_point = 0x80008000

image_info.section_count = 0x00000006

image_info.monstack = 0x8000613C

image_info.monra = 0x00000000

image_info.param0 = 0x00000002

image_info.param1 = 0x00000000

image_info.param2 = 0x00000000

image_info.param3 = 0x00000000

Section Index = 0x00000000

source = 0x800344B8

dest = 0x80008000

bytes = 0x00C5C51C

Section Index = 0x00000001

source = 0x80C909D4

dest = 0x80C6451C

bytes = 0x005258AA

Section Index = 0x00000002

source = 0x811B627E

dest = 0x81189DC6

bytes = 0x00000002

Section Index = 0x00000003

source = 0x811B6280

dest = 0x81189DC8

bytes = 0x000AEF30

Section Index = 0x00000004

source = 0x812651B0

dest = 0x81238CF8

bytes = 0x00000010

Section Index = 0x00000005

source = 0x812651C0

dest = 0x81238D08

bytes = 0x00000308

Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.

170 West Tasman Drive

San Jose, California 95134-1706

Cisco Internetwork Operating System Software

IOS (tm) C2600 Software (C2600-IK2S-M), Version 12.0(5)XK2, EARLY DEPLOYMENT REL

EASE SOFTWARE (fc1)

TAC:Home:SW:IOS:Specials for info

Copyright (c) 1986-2002 by cisco Systems, Inc.

Compiled Sat 09-Feb-02 18:37 by nmasa

Image text-base: 0x80008088, data-base: 0x80C6451C

*** System received a SegV exception ***

signal= 0xb, code= 0x100, context= 0x8131bc08

PC = 0x8002f70c, Vector = 0x100, SP = 0x814119e8

System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Copyright (c) 1999 by cisco Systems, Inc.

TAC:Home:SW:IOS:Specials for info

Testing lower main memory - data equals address

Testing lower main memory - checkerboard

Testing lower main memory - inverse checkerboard

Clearing lower 4K memory for cache initialization

Clearing bss

Reading monitor variables from NVRAM

Enabling interrupts

Enabling instruction cache

Reading cookie

Initializing main memory

Sizing NVRAM

Initializing PCI subsystem

Exiting init

C2600 platform with 32768 Kbytes of main memory

PC = 0xfff0a530, Vector = 0x500, SP = 0x80004864

monitor: command "boot" aborted due to user interrupt

rommon 1 >

5 REPLIES
Community Member

Re: Router rebooting continuously

I would suspect a memory fault.

Community Member

Re: Router rebooting continuously

Seg V Exceptions are usually IOS bugs but not when the router is continually rebooting and also you seem to have ruled this out by upgrading the IOS. This seems to point towards a hardware problem. Start off by taking out any modules that maybe inserted in this router and then see if the router boots up. If it does you then know you have a problem with one of the modules. If not, swap out the DRAM and if possibly the flash. If this doesn't help then you are probably looking at a chassis fault. I hope this helps. Out of all of them, I would guess it is a DRAM fault.

Community Member

Re: Router rebooting continuously

i do not have any spare modules to swap, have to purchase new one and test it out...anyway thanks for your quick response...

Ashok Pawar

Community Member

Re: Router rebooting continuously

Check the config register setting.

Community Member

Re: Router rebooting continuously

I do not know if this will help because an upgrade did not help but this was my situation.

System returned to ROM by error - a SegV exception, PC 0x802938F0

System image file is "flash:c1700-y-mz.120-7.T"

This error was returned only when a default route was configured and a redistributed default route was recieved from another router. The 1700 would reboot endlessly until we shut the interface of the router redistributing the default route. This version of code was defered for memory configuration issues, so my best guess is it might be code or memory allocation related.

170
Views
0
Helpful
5
Replies
CreatePlease to create content