Guest

Preview Tool

Cisco Bug: CSCut02954 - ASR5K sessmgr reloads at "sn_memblock_memcache_free" in 16.1 release.

Last Modified

Dec 25, 2016

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

16.1.7.58770 18.2.0.59754 19.0.M0.60241

Description (partial)

Symptom:
ASR5K sessmgr reloads at function "sn_memblock_memcache_free" in 16.1 release.

13 2015-Jan-12+19:49:31 ipsecmgr 02/0/04016 14.0(53764) SAD1702009U/SAD1704004P
14 2015-Feb-15+23:09:00 sessmgr  02/0/05863 14.0(53764) SAD1702009U/SAD1704004P
15 2015-Feb-17+02:16:06 hnbmgr   01/0/22353 14.0(53764) SAD1702009U/PLB37108227
16 2015-Feb-17+02:16:27 sessmgr  04/0/04334 14.0(53764) SAD1702009U/SAD170300KB
17 2015-Feb-17+02:16:29 sessmgr  05/0/04390 14.0(53764) SAD1702009U/SAD1701002P
18 2015-Feb-19+01:32:59 sessmgr  04/0/04715 16.1(58770) SAD1702009U/SAD170300KB
19 2015-Feb-19+01:33:09 sessmgr  02/0/05175 16.1(58770) SAD1702009U/SAD1704004P
20 2015-Feb-19+01:33:09 sessmgr  03/0/04646 16.1(58770) SAD1702009U/SAD170400KR
21 2015-Feb-19+01:33:17 kernel   05/0/NA    16.1(NA)    SAD1702009U/SAD1701002P
22 2015-Feb-19+01:33:24 sessmgr  04/0/04720 16.1(58770) SAD1702009U/SAD170300KB
23 2015-Feb-19+01:33:24 sessmgr  03/0/04644 16.1(58770) SAD1702009U/SAD170400KR
24 2015-Feb-19+01:33:34 sessmgr  03/0/04950 16.1(58770) SAD1702009U/SAD170400KR
25 2015-Feb-19+01:33:45 sessmgr  03/0/05028 16.1(58770) SAD1702009U/SAD170400KR
26 2015-Feb-19+01:38:07 sessmgr  06/0/05587 16.1(58770) SAD1702009U/SAD1701001G
27 2015-Feb-19+01:47:02 sessmgr  06/0/18914 16.1(58770) SAD1702009U/SAD1701001G
28 2015-Feb-19+02:00:00 sessmgr  03/0/17657 16.1(58770) SAD1702009U/SAD170400KR
29 2015-Feb-19+02:00:10 sessmgr  04/0/16704 16.1(58770) SAD1702009U/SAD170300KB
30 2015-Feb-19+02:00:11 sessmgr  03/0/27791 16.1(58770) SAD1702009U/SAD170400KR
31 2015-Feb-19+02:00:15 sessmgr  03/0/16631 16.1(58770) SAD1702009U/SAD170400KR
32 2015-Feb-19+02:00:20 sessmgr  04/0/16706 16.1(58770) SAD1702009U/SAD170300KB
33 2015-Feb-19+02:00:25 sessmgr  03/0/17731 16.1(58770) SAD1702009U/SAD170400KR
34 2015-Feb-19+02:00:35 sessmgr  02/0/16418 16.1(58770) SAD1702009U/SAD1704004P
35 2015-Feb-19+02:00:35 sessmgr  03/0/17658 16.1(58770) SAD1702009U/SAD170400KR
36 2015-Feb-19+02:01:00 sessmgr  02/0/17082 16.1(58770) SAD1702009U/SAD1704004P
37 2015-Feb-19+02:01:00 sessmgr  02/0/17302 16.1(58770) SAD1702009U/SAD1704004P
38 2015-Feb-19+02:01:10 sessmgr  02/0/17886 16.1(58770) SAD1702009U/SAD1704004P

********************* CRASH #38 ***********************
SW Version          : 16.1(58770)
Similar Crash Count : 42
Time of First Crash : 2015-Feb-19+01:32:49

Fatal Signal 6: Aborted
  PC: [0abbd527/X] sn_memblock_memcache_free()
  Signal from: sitmain pid=3763 uid=0
  Process: card=2 cpu=0 arch=X pid=17886 cpu=~100% argv0=sessmgr
  Crash time: 2015-Feb-19+01:01:10 UTC
  Recent errno: 104 Connection reset by peer
  Stack (11032@0xffffb000):
    [0abbd527/X] sn_memblock_memcache_free() sp=0xffffb7c8
    [0abbd995/X] sn_memblock_cache_free_new() sp=0xffffb838
    [08003fa2/X] SN_cmFree() sp=0xffffbc88
    [08013abb/X] SFree() sp=0xffffbcc8
    [07ffeba4/X] SPutMsg() sp=0xffffbd18
    [0c98e401/X] sbDbDelAll() sp=0xffffbd98
    [0c9af018/X] sbAsAbortAssoc() sp=0xffffbe58
    [0c9bcd41/X] sbAsRcvAbort() sp=0xffffc0e8
    [0c9a193c/X] sbCmDemux() sp=0xffffc228
    [0c9a4232/X] sbVaDatInd() sp=0xffffc318
    [0c98b436/X] SbLiHitUDatInd() sp=0xffffc3b8
    [07510074/X] hnbapp_rx_sctp_pdu() sp=0xffffc4c8
    [07543590/X] hnbapp_layer_handle_rx_sctp_pdu() sp=0xffffcde8
    [040bae71/X] hnbgw_rx_sctp_pdu() sp=0xffffce48
    [040bb445/X] sessmgr_hnbgw_ipsec_process_user_pkt() sp=0xffffd358
    [05fdaedb/X] sessmgr_med_pdif_ipsec_data_receive() sp=0xffffd3f8
    [060099c4/X] sessmgr_med_data_receive() sp=0xffffd598
    [0ac5e01c/X] sn_epoll_run_events() sp=0xffffd5e8
    [0ac62718/X] sn_loop_run() sp=0xffffda98
    [0aa053dd/X] main() sp=0xffffdb08

Conditions:
This happens during paging storm, when large number of HNBs are configured under one LAC/RAC.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.