BootROM - 1.78
Booting from SPI flash, Secure mode
BootROM: RSA Public key verification PASSED
BootROM: CSK block signature verification PASSED
BootROM: Boot header signature verification PASSED
BootROM: Box ID verification PASSED
BootROM: JTAG is disabled
General initialization - Version: 1.0.0
Detected Device ID 6920
Master bootloder version 1.44
High speed PHY - Version: 2.0
BoardId = 0x21board SerDes lanes topology details:
| Lane # | Speed| Type |
------------------------------|
| 1 | 0 | SGMII1 |
| 2 | 5 | PCIe1 |
| 4 | 5 | PCIe2 |
| 5 | 0 | SGMII2 |
-------------------------------
:** Link is Gen1, check the EP capability
PCIe, Idx 1: Link upgraded to Gen2 based on client cpabilities
:** Link is Gen1, check the EP capability
PCIe, Idx 2: Link upgraded to Gen2 based on client cpabilities
High speed PHY - Ended Successfully
DDR4 Training Sequence - Ver TIP-0.23.(Sublib 0.8)0
DDR4 Training Sequence - Switching XBAR Window to FastPath Window
DDR4 Training Sequence - Ended Successfully
BootROM: Image checksum verification PASSED
BootROM: Boot image signature verification PASSED
____ _
/ ___|(_) ___ ___ ___
| | | |/ __| / __|/ _
| |___ | |__ | (__| (_) |
____||_||___/ ___|___/
_ _ ____ _
| | | | | __ ) ___ ___ | |_
| | | |___| _ / _ / _ | __|
| |_| |___| |_) | (_) | (_) | |_
___/ |____/ ___/ ___/ __|
** LOADER **
U-Boot 2013.01-g2ee3a18aa (Jun 03 2022 - 11:27:17) SDK version: 2015_T2.0p10
Board: Barbados-2K
SoC: MV88F6920 Rev A1
running 2 CPUs
CPU: ARM Cortex A9 MPCore (Rev 1) LE
CPU 0
CPU @ 1800 [MHz]
L2 @ 900 [MHz]
TClock @ 250 [MHz]
DDR4 @ 900 [MHz]
DDR4 32 Bit Width,FastPath Memory Access, DLB Enabled, ECC Disabled
DRAM: 1 GiB
RST I2C0
NAND: ECC 4bits, 256 MiB
SF: Detected S25FL032P with page size 64 KiB, total 4 MiB
PCI-e 1 (IF 0 - bus 0) Root Complex Interface, Detected Link X1, GEN 2.0
PCI-e 2 (IF 1 - bus 1) Root Complex Interface, Detected Link X1, GEN 2.0
Map: Code: 0x3fed8000:0x3ffae448
BSS: 0x3ffeff0c
Stack: 0x3f9c7f20
Heap: 0x3f9c8000:0x3fed8000
U-Boot Environment: 0x00100000:0x00110000 (SPI)
Board configuration:
| port | Interface | PHY address |
|--------|------------|--------------|
| egiga1 | SGMII | 0x01 |
| egiga2 | SGMII | 0x00 |
Net: , egiga1, egiga2 [PRIME]
Hit ESC key to stop autoboot: 0
Creating 1 MTD partitions on "nand0":
0x000000200000-0x000010000000 : "mtd=2"
UBI: attaching mtd1 to ubi0
UBIFS: mounted UBI device 0, volume 0, name "part1"
Loading file 'part1/part.bin' to addr 0x02000000 with size 6877237 (0x0068f035)...
Done
SF: Detected S25FL032P with page size 64 KiB, total 4 MiB
Checking image signing.
Image signing verification success, continue to run...
## Booting kernel from Legacy Image at 02000000 ...
Image Name: Barbados Firmware Image
Created: 2023-03-08 6:18:24 UTC
Image Type: ARM Linux Multi-File Image (uncompressed)
Data Size: 6876229 Bytes = 6.6 MiB
Load Address: 00008000
Entry Point: 00008000
Contents:
Image 0: 4202864 Bytes = 4 MiB
Image 1: 2657210 Bytes = 2.5 MiB
Image 2: 16137 Bytes = 15.8 KiB
Verifying Checksum ... OK
## Loading init Ramdisk from multi component Legacy Image at 02000000 ...
## Flattened Device Tree from multi component Image at 02000000
Booting using the fdt at 0x0268ad7c
Loading Multi-File Image ... OK
OK
reserving fdt memory region: addr=0 size=4000
Loading Device Tree to 01ff9000, end 01ffff08 ... OK
Starting Device Tree update ('fdt_skip_update' = no)
Limit DDR size at 3GB due to power of 2 requirement of Address decoding
Updating device tree successful
Starting kernel ...
[01/01/1970 00:00:00.0000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 260096
[01/01/1970 00:00:00.0000] Memory: 1025280K/1048576K available (5743K kernel code, 411K rwdata, 2480K rodata, 359K init, 496K bss, 23296K reserved, 0K highmem)
[01/01/1970 00:00:00.1200] CPU1: Booted secondary processor
[01/01/1970 00:00:01.5900] buginf tty flushing thread started, ttyport=be902000
[01/01/1970 00:00:01.7100] m25p80 spi1.0: found s25sl032p, expected n25q032
[*01/01/1970 00:00:02.8195] buginf() enabled.
[*01/01/1970 00:00:02.8302] Made it into bootsh: Mar 8 2023 06:10:15 T-824d9257bac45ad02762abfc76a2fdf79610cab5-g824d9257-aut
[*01/01/1970 00:00:11.0230] bootsh mini ramfs booted /bootpart/part1/ramfs_data_cisco.cpio.lzma
Welcome to Cisco.
Usage of this device is governed by Cisco's End User License Agreement,
available at:
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to
restrictions as set forth in subparagraph (c) of the Commercial
Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
If you require further assistance please contact us by sending email to
This product contains some software licensed under the
"GNU General Public License, version 2" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
This product contains some software licensed under the
"GNU Library General Public License, version 2" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Library
General Public License, version 2", available here:
This product contains some software licensed under the
"GNU Lesser General Public License, version 2.1" provided
with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser
General Public License, version 2.1", available here:
This product contains some software licensed under the
"GNU General Public License, version 3" provided with
ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
This product contains some software licensed under the
"GNU Affero General Public License, version 3" provided
with ABSOLUTELY NO WARRANTY under the terms of
"GNU Affero General Public License, version 3", available here:
[ OK ] Created slice -.slice.
[ OK ] Created slice system.slice.
[ OK ] Created slice system-serialx2dgetty.slice.
[ OK ] Created slice system-sshdx2dkeygen.slice.
[ OK ] Listening on Delayed Shutdown Socket.
[ OK ] Listening on udev Kernel Socket.
Starting Cisco UBIFS reformat/mount...
[ OK ] Reached target Timers.
[ OK ] Listening on udev Control Socket.
Starting udev Kernel Device Manager...
Starting udev Coldplug all Devices...
[ OK ] Reached target Cisco File Systems (Pre).
[ OK ] Reached target Sockets.
[ OK ] Reached target Slices.
[ OK ] Started udev Kernel Device Manager.
[ OK ] Started Cisco UBIFS reformat/mount.
Starting Cisco early mount...
[ OK ] Started Cisco early mount.
[ OK ] Reached target Local File Systems (Pre).
Starting Cisco fips check...
Starting Cisco seed generation...
Starting Cisco system time setup...
Starting Cisco platform file generation...
[ OK ] Started Cisco system time setup.
[ OK ] Started Cisco seed generation.
[*04/16/2019 23:59:59.0867] Last reload time: Apr 16 23:59:59 2019
[*03/08/2023 06:12:56.0018] Setting system time Wed Mar 8 06:12:56 UTC 2023
[ OK ] Started Cisco fips check.
[ OK ] Started udev Coldplug all Devices.
[ OK ] Started Cisco platform file generation.
Starting Cisco btldr service...
[ OK ] Started Cisco btldr service.
[ OK ] Reached target Local File Systems.
Starting Cisco pkg install service...
Starting Cisco S10 boot service...
[*03/08/2023 06:12:57.1205] GCM-128 POST passed
[*03/08/2023 06:12:57.1206] GCM-256 POST passed
Starting Cisco act2 check...
[ OK ] Started Cisco system time saving.
Starting Cisco s[03/08/2023 06:13:00.3100] audit_printk_skb: 18 callbacks suppressed
ystem time saving...
[*03/08/2023 06:13:00.3163] 0
[03/08/2023 06:13:01.0400] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
[03/08/2023 06:13:01.1200] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
[ *** ] (2 of 3) A start job is running for...10 boot service (14s / 1min 37s)[*03/08/2023 06:13:00.5980] Active version: 17.9.3.50
[*03/08/2023 06:13:00.6008] Backup version: 0.0.0.0
[*03/08/2023 06:13:00.8232] device wired0 entered promiscuous mode
[*03/08/2023 06:13:01.2162] wifi0: Initializing TX ring
[*03/08/2023 06:13:01.2252] wifi0: prepare firmware downloading
[*03/08/2023 06:13:02.0604] wifi0: Firmware downloading
[*03/08/2023 06:13:03.3411] 0;
[*03/08/2023 06:13:03.7857]
[*03/08/2023 06:13:03.7857]
[*03/08/2023 06:13:03.7857]
[*03/08/2023 06:13:03.785[03/08/2023 06:13:07.6900] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
7] Authenticatin[03/08/2023 06:13:07.7800] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
g ACT2 ID:AP2800
[*03/08/2023 06:13:03.7857] Authenticating SN:FOC23150RT1
[*03/08/2023 06:13:03.7861]
[*03/08/2023 06:13:03.7861] (ACT2Boot) Hardware is Cisco (c) authentic :-)
[*03/08/2023 06:13:03.7861]
[*03/08/2023 06:13:03.7919] Seeding /dev/urandom from ACT2
[*03/08/2023 06:13:04.0294] 0;0;0;Reading ACT2 SUDI certificates
[*03/08/2023 06:13:05.9631] 0;0;
[*03/08/2023 06:13:07.0913] Firmware download complete
[*03/08/2023 06:13:07.2891] wifi0: Getting HW specs. Retrying for 3
[*03/08/2023 06:13:07.2895] Mac_Init
[*03/08/2023 06:13:07.2898] Preparing to set HW specs
[*03/08/2023 06:13:07.2901] FIPS enc aes-ccmp Verified
[*03/08/2023 06:13:07.2902] FIPS dec aes-ccmp Verified
[*03/08/2023 06:13:07.2903] FIPS enc aes-ccmp-256 Verified
[*03/08/2023 06:13:07.2904] FIPS dec aes-ccmp-256 Verified
[*03/08/2023 06:13:07.2905] FIPS enc aes-gcmp Verified
[*03/08/2023 06:13:07.2906] FIPS dec aes-gcmp Verified
[*03/08/2023 06:13:07.2907] FIPS enc aes-gcmp-256 Verified
[*03/08/2023 06:13:07.2908] FIPS dec aes-gcmp-256 Verified
[*03/08/2023 06:13:07.8936] wifi1: Initializing TX ring
[*03/08/2023 06:13:07.9025] wifi1: prepare firmware downloading
[*03/08/2023 06:13:08.7360] wifi1: Firmware downloading
[ OK ] Started Cisco act2 check.
[03/08/2023 06:13:10.7200] audit_printk_skb: 33 callbacks suppressed
[ OK ] Started Cisco pkg install service.
[ OK ] Started Cisco S10 boot service.
Starting Cisco nss service...
[*03/08/2023 06:13:10.1211] 0;0;<30>systemd[1]: Started Cisco pkg install service.
Starting Cisco watchdog...
Starting Cisco nolan service...
[ OK ] Started Cisco watchdog.
[ OK ] Started Cisco nolan service.
Starting Cisco nolan USB service...
[ OK ] Started Cisco nolan USB service.
[ OK ] Started Cisco pre-PoE negotiation.
Starting Cisco pre-PoE negotiation...
[ OK ] Started Cisco nss service.
Starting Cisco S15platform...
Starting Cisco Kclick...
[03/08/2023 06:13:18.5500] Disabling lock debugging due to kernel taint
[ OK ] Started Cisco S15platform.
[ OK ] Started Cisco Kclick.
Starting Cisco Kclick...
Starting Cisco Sku service...
[*03/08/2023 06:13:18.8804] NTKM - ntkm_init - Nitro KM loaded
[*03/08/2023 06:13:21.8564] SKU to radio FW
[*03/08/2023 06:13:21.9100] wifi2 no private ioctls.
[*03/08/2023 06:13:21.9100]
Starting Cisco certificate create service...
Starting Cisco sysctl service...
Starting Cisco ME service...
[ OK ] Started Cisco Sku service.
[ OK ] Started Cisco sysctl service.
[ OK ] Started Cisco ME service.
[ OK ] Started Cisco certificate create service.
[ OK ] Started Tam server.
[*03/08/2023 06:13:22.8391] Create symlink /dev/mic_cert result 0
[*03/08/2023 06:13:22.8391] Loading certificates from storage...
[*03/08/2023 06:13:22.8832] barbados /tmp/SC4_1dbm.txt
Starting Tam server...
Starting Cisco certtime service...
Starting Cisco Tam service...
[ OK ] Started Cisco Tam service.
[ OK ] Started Cisco Kclick.
Starting Cisco syslog service...
Starting rsyslog client...
Starting Cisco S16platfomm...
[ OK ] Started Cisco syslog service.
[ OK ] Started rsyslog client.
[ OK ] Started Cisco S16platfomm.
Starting Cisco synclogd...
[ OK ] Started Cisco synclogd.
[ *** ] A start job is running for Cisco certtime service (1min 4s / 2min 30s)[*03/08/2023 06:13:28.5291]
[*03/08/2023 06:13:28.5291] Click sched monitor: schedulers = 1
[*03/08/2023 06:13:56.8297] starting tam services using ACT2...
[*03/08/2023 06:13:56.8297]
[*03/08/2023 06:13:56.8297] TAM init done
[ OK ] Started Cisco certtime service.
[ OK ] Reached target System Initialization.
[ OK ] Reached target Paths.
[ OK ] Reached target Basic System.
Starting Cisco printkd...
Starting RSYNC User Key Generation...
[ OK ] Started System Monitor service.
Starting System Monitor service...
Starting Cisco brain service...
Starting Cisco kexec...
Starting Fast CGI daemon...
Starting Cisco klogd...
Starting Marvell Forwarding daemon...
Starting Cisco rtd service...
Starting Security Auditing Service...
Starting Clean Air daemon...
Starting Hostapd process...
Starting Cisco led service...
Starting Cisco image/firmware updater service...
[ OK ] Started Serial Getty on ttyS0.
Starting Serial Getty on ttyS0...
[ OK ] Reached target Login Prompts.
Starting WCPD process...
[ OK ] Started NTP_PROC daemon.
Starting NTP_PROC daemon...
Starting AP Trace daemon...
Starting capwapd...
[ OK ] Started Cisco printkd.
[ OK ] Started Cisco kexec.
[ OK ] Started Cisco klogd.
[ OK ] Started Cisco image/firmware updater service.
[ OK ] Started Cisco led service.
[ OK ] Started Fast CGI daemon.
[ OK ] Started Cisco rtd service.
[ OK ] Started AP Trace daemon.
Starting ntp file watcher...
[*03/08/2023 06:13:59.7873] No valid NTP source
[*03/08/2023 06:13:59.7873] No valid ntp server info file. Stop NTP!
[*03/08/2023 06:13:59.8096] hostapd:Hostapd: DCDS not init cloud=0 webauth=255 255 init=0
[*03/08/2023 06:13:59.8097]
[ OK ] Started Hostapd process.
Starting ntp watcher...
[ OK ] Started ntp file watcher.
[03/08/2023 06:14:00.2300] wired0 emac 2: link up
[03/08/2023 06:14:00.3000] wired0: link up
[ OK ] Started Cisco brain service.
[ OK ] Started ntp watcher.
[ OK ] Started RSYNC User Key Generation.
[ OK ] Reached target sshd-keygen.target.
Starting OpenSSH server daemon...
[ OK ] Started OpenSSH server daemon.
User Access Verification
Username: