Guest

Preview Tool

Cisco Bug: CSCum74231 - 15.0.52633, Degradation of SGs link on MME after process crash

Last Modified

Dec 25, 2016

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

15.0(16)

Description (partial)

Symptom:
(1)	a sessmgr crash occurred at 2014-Jan-21+20:02:01 UTC. 
(2)	At this time  impact was seen on SGs link. pcap taken at this time also shows MME sending SCTP ABORT to vlr.
(3)	pcap also shows VLRAssocDown at this time.
(4)	The MME lost its associations to eNodeBs
(5)	20140121_PharMME_15_MajorDegradation 
(6)	We do see ?MME Service id is invalid or service not started? errors right after the session manager crash those were reported to sessmgrs that were NOT affected by the session manager crash.
(7)	MMES1AssocFail were reported for various S1 associations right after the crash.
(8)	Multiple MMENewConnectionsAllowed / MMENewConnectionsDisallowed reported on the chasiss.

Assertion failure at sess/mme/mme-app/app/mme_fw.c:639
  Function: mme_start_procedure()
  Expression: ((mme_ue_ctxt_t *) hdl)->muc_mpl[procedure->mpr_class] == 0
  Proclet: sessmgr (f=87000,i=4)
  Process: card=3 cpu=0 arch=X pid=17483 cpu=~5% argv0=sessmgr
  Crash time: 2014-Jan-21+20:02:01 UTC
  Recent errno: 11 Resource temporarily unavailable
  Stack (64472@0xfffee000):
    [f7e285a1/X] libc.so.6/kill() sp=0xfffeeaf8
    [0a9cfcf3/X] sn_assert() sp=0xfffeeb28
    [07693168/X] mme_start_procedure() sp=0xfffeeb78
    [07726422/X] mme_im_exit_complete() sp=0xfffeeca8
    [07729dd9/X] mme_im_exit_state_awt_s11_handle_s11_mod_rsp() sp=0xfffeef08
    [07692709/X] mme_fsm_event_handler() sp=0xfffef368
    [0772b7da/X] mme_event_handler_im_exit_procedure() sp=0xfffef3a8
    [07693924/X] mme_procedure_handle_event() sp=0xfffef3e8
    [076d2cf5/X] mme_disp_handle_emm_evt() sp=0xfffef4c8
    [076d9ac6/X] mme_disp_attached_handle_s11_msg() sp=0xfffef668
    [07692709/X] mme_fsm_event_handler() sp=0xfffefac8
    [0772e679/X] mme_app_handle_events_from_egtpc_app() sp=0xffff08f8
    [073b2c2e/X] egtpc_sap_dispatch_routine() sp=0xffff0928
    [0733d9b0/X] egtpc_send_cfm_evt() sp=0xffff0f88
    [0736b0bf/X] egtpc_handle_modify_bearer_rsp_msg() sp=0xffff1428
    [0730a6a7/X] egtpc_handle_tun_n_mob_mgmt_message() sp=0xffff15c8
    [07301f55/X] egtpc_handle_gtp_message() sp=0xffffaa28
    [03f064e1/X] sessmgr_egtp_handle_gtpc_message() sp=0xffffb338
    [03f05a5c/X] sessmgr_egtp_dmed_rx_cb() sp=0xffffb3d8
    [05d3835d/X] sessmgr_receive_ipv4udp_packets() sp=0xffffb408
    [05d54ff5/X] sessmgr_med_data_receive() sp=0xffffd5f8
    [0aa60611/X] sn_loop_run() sp=0xffffdb88
    [0a8497b4/X] main() sp=0xffffdbc8

Conditions:
Unknown
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.