Guest

Preview Tool

Cisco Bug: CSCuj67855 - sessmgr Asrt mme_pdn_fsm.c:505 mme_pdn_fsm_connect_pending_misc_pdn_evt

Last Modified

Jan 30, 2017

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

14.0(41)

Description (partial)

Symptom:
session manager crash - Assertion failure at sess/mme/mme-app/app/mme_pdn_fsm.c:505

Conditions:
During an inbound S1 Handover-based relocation from another MME, the UE sends a TAU Request, followed immediately by a TAU Complete before the MME sends a TAU Accept.  This causes the MME call's state to be changed prematurely, and the Modify Bearer Response received as part of the S1 Handover is handled incorrectly, leading to the assertion.

Assertion failure at sess/mme/mme-app/app/mme_pdn_fsm.c:505
  Function: mme_pdn_fsm_connect_pending_misc_pdn_evt()
  Expression: pdn_ctxt->upc_mpl
  Proclet: sessmgr (f=87000,i=5)
  Process: card=13 cpu=0 arch=X pid=8182 cpu=~19% argv0=sessmgr
  Crash time: 2013-Oct-03+02:35:22 UTC
  Recent errno: 11 Resource temporarily unavailable
  Stack (59560@0xfffef000):
    [f7e285a1/X] libc.so.6/kill() sp=0xfffef8e8
    [0a18d487/X] sn_assert() sp=0xfffef918
    [070e6b44/X] mme_pdn_fsm_connect_pending_misc_pdn_evt() sp=0xfffef968
    [07033629/X] mme_fsm_event_handler() sp=0xfffefdc8
    [0707130e/X] mme_disp_handle_pdn_evt() sp=0xfffefea8
    [07079227/X] mme_disp_attached_handle_s11_msg() sp=0xffff0048
    [07033629/X] mme_fsm_event_handler() sp=0xffff04a8
    [070cbb79/X] mme_app_handle_events_from_egtpc_app() sp=0xffff12d8
    [06d736ce/X] egtpc_sap_dispatch_routine() sp=0xffff1308
    [06d114e5/X] egtpc_send_cfm_evt() sp=0xffff1888
    [06d33224/X] egtpc_handle_modify_bearer_rsp_msg() sp=0xffff1d28
    [06ce6374/X] egtpc_handle_tun_n_mob_mgmt_message() sp=0xffff1ea8
    [06cde579/X] egtpc_handle_gtp_message() sp=0xffffa6b8
    [03bac09b/X] sessmgr_egtp_handle_gtpc_message() sp=0xffffafc8
    [03bab64c/X] sessmgr_egtp_dmed_rx_cb() sp=0xffffb068
    [058bb61d/X] sessmgr_receive_ipv4udp_packets() sp=0xffffb098
    [058d7411/X] sessmgr_med_data_receive() sp=0xffffd2c8
    [0a2039c7/X] sn_loop_run() sp=0xffffd858
    [0a02b344/X] main() sp=0xffffd898
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.