Cisco Blog » The Platform

2015年7月1日星期三

Cisco Notification Alert -Cisco 2900 Series Router-01-Jul-2015 16:48 GMT

 

 

 

 

 

 

 


Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c2900-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c2900-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2921 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c2900-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c2900-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2901 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c2951-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c2951-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2951 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.1T2
Release Date:
02-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.5.2T1
Release Date:
28-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.2T2
Alert Type:
Software Advisory
File Name:
c2900-universalk9-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL

Software Advisory Date:
25-JUN-2015
Alert Type:
Software Advisory
File Name:
c2900-universalk9_npe-mz.SPA.154-2.T2.bin
File Description:

UNIVERSAL - NO PAYLOAD ENCRYPTION

Software Advisory Date:
25-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Alert Type:
New Release
Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Release Version:
15.4.3M3
Release Date:
07-JUN-2015

Software Updates for 2900 Series Integrated Services Routers

Product Name:
2911 Integrated Services Router
Software Type:
IOS Software
Alert Type:
 
Suggested:
Previously Suggested:

Find additional information in Software Downloads index.

Known Bugs - 2900 Series Integrated Services Routers

Bug Id:
CSCtz27137
Title:
Installing S640 Signature Package Causes Crash Loop
Description:

Symptoms: An upgrade to the S639 or later signature package may cause a Cisco IOS router to crash.

Conditions: This symptom is observed in a Cisco 1841, 1941, and 2911 router
running one of the following Cisco IOS versions:

- Cisco IOS Release 12.4(24)T4
- Cisco IOS Release 15.0(1)M4
- Cisco IOS Release 15.0(1)M8
- Cisco IOS Release 15.2(3)T

Workaround: Update the signature package to anything less than S639. If already
updated with any package larger than or equal to S639, follow the
below steps to disable IPS:

- Access the router via the console.
- Enter break sequence to access ROMmon mode.
- Change the config-register value to 0x2412.
- Boot the router to bypass the startup-configuration.
- Configure the basic IP parameters.
- TFTP a modified configuration to the router's running-configuration with
Cisco IOS IPS disabled.
- Reset the config-register to 0x2102.
- Enter the write memory command and reload.

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
03-JUN-2015
Known Affected Releases:
12.4(24)T4, 15.0(1)M3, 15.0(1)M4, 15.0(1)M8, 15.2(3)T
Known Fixed Releases:
12.4(24)T10, 12.4(24)T11, 12.4(24)T12, 12.4(24)T8, 12.4(24)T9, 15.0(1)M10, 15.0(1)M8.11, 15.0(1)M9, 15.1(3)T4, 15.1(4)GC1
Bug Id:
CSCuh36583
Title:
ISRG2 - DSP Crash due to Backplane Switch Lockup During T1 Errors
Description:

Symptom:
An ISR G2 router using a PVDM3 may experience simultaneous failure on several DSPs. Eg:

DSPRM-3-DSPALARMINFO Device (0/1) Host GIGE ack timeout
DSPRM-3-DSPALARMINFO DSP (0/7) Host keepalive timeout

Conditions:
May be seen when T1 errors cause the router's backplane switch to hang, preventing proper function of the DSPs.

Workaround:
Attempt to fix any T1 clock source misconfig.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
08-JUN-2015
Known Affected Releases:
15.1(4)M4
Known Fixed Releases:
15.1(4)M10, 15.4(3)M3, 15.5(2.10)T
Bug Id:
CSCud06180
Title:
CWAN_SHIM/SDK crash EHWIC-4G-LTE-V
Description:

Symptoms: Periodically, the Cisco EHWIC-4G-LTE-V would stop passing traffic. The user would execute "test cellular 0/1/0 mod-power-cycle" to restore service.

Conditions: This symptom is observed during temporary network outage.

Workaround: There is no workaround.









Status:
Fixed
Severity:
2 Severe
Last Modified:
09-JUN-2015
Known Affected Releases:
15.1(4)M4, 15.1(4)M5
Known Fixed Releases:
15.1(4)M5.14, 15.1(4)M6, 15.2(1.2.6)PI22, 15.2(4)M2.4, 15.2(4)M3, 15.2(4)XB11, 15.3(1)T0.1, 15.3(1)T1, 15.3(1.11)T, 15.3(1.13.1)PIH21
Bug Id:
CSCub14145
Title:
ISM-VPN Spurious Error command and counters show wrong values.
Description:

Symptoms: A Cisco ISR-G2 with VPN-ISM logs output similar to:

!! Cannot find ISM-VPN counters struct for flowid: 0x44000084

Conditions: The symptom is observed when using a VPN-ISM in an IPsec deployment
with images from the Cisco IOS 15.2 train.

Workaround: There is no workaround.

Further Problem Description: The issue is cosmetic in nature while the VPN-ISM
is queried for counters (e.g.: show commands).

Status:
Fixed
Severity:
2 Severe
Last Modified:
15-JUN-2015
Known Affected Releases:
15.2T
Known Fixed Releases:
15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M2.6, 15.2(4)M3, 15.2(4)M4, 15.2(4)M5, 15.2(4)M6, 15.2(4)M6a
Bug Id:
CSCup43333
Title:
Crash due to avl_search
Description:

Symptom:
We see the avl_search function could be included in the main traceback of the crash or in previous tracebacks. Sometimes we can see CPU Hogs.

Conditions:
This symptom is observed when ISM is used.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.2(4)M6
Known Fixed Releases:
15.2(4)M8, 15.3(3)M4, 15.4(3)M2.2, 15.4(3)M3, 15.5(0.9)T, 15.5(1.2.1a)GB
Bug Id:
CSCud96075
Title:
IOS crash due to DSP crash when Transcoder is activated
Description:

Symptom:
A router running Cisco IOS Release 15.2(4)M2 will reload with a bus
error soon after the DSP reloads when there is a live transcoding session.

Conditions:
This symptom is observed with Cisco IOS Release 15.2(4)M2.

Workaround:
There is no workaround.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
15.2(4)M2
Known Fixed Releases:
15.1(4)M7.4, 15.1(4)M8, 15.1(4)M9, 15.2(1.2.3)PI22, 15.2(4)GC, 15.2(4)GC1, 15.2(4)GC2, 15.2(4)M3.4, 15.2(4)M4, 15.2(4)M5
Bug Id:
CSCut86321
Title:
Tx hang on 2951`s GigabitEthernet IF
Description:

Symptom:
2951`s Gi interface is hung. the output rate drop to 0 and the output queue got stuck at 40/40.

Conditions:
- hardware is PQ3_TSEC
- with duplex half
- Output queue got 40/40

Workaround:
"shut/no shut" the IF

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
16-JUN-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCus91250
Title:
Basic call in Conference block scenarios fail with 15.5(1.23)T0.2
Description:

Symptom:
Basic call in conference block scenarios fail

Conditions:
Issue is observed in 15.5(1.23)T0.2

Workaround:
No workaround

Further Problem Description:

Status:
Fixed
Severity:
1 Catastrophic
Last Modified:
17-JUN-2015
Known Affected Releases:
15.5(1.18)S0.10, 15.5(1.23)T, 15.5(2)T, 15.5(2.2)S, 15.5(2.2)T, 15.5(3)S
Known Fixed Releases:
15.4(2)S2.19, 15.4(2)S3, 15.4(2)T2.1, 15.4(2)T3, 15.5(1.18)S0.11, 15.5(1.23)T0.3, 15.5(2)S, 15.5(2)T, 15.5(2.12)S, 15.5(2.4)T
Bug Id:
CSCtz51773
Title:
ISM-VPN crashing due to an assert in IPSec classification code
Description:

Symptoms: High CPU seen on routers equipped with an ISM-VPN module. The output
of show process cpu shows that the process "REVT
Background" is using around 70% of the CPU cycles.

The ISM-VPN module is not visible in show diag, and the
output of show crypto engine configuration indicates that
the module status is DEAD.

Conditions: The symptom is observed with an ISM VPN with a few IPSec tunnels.
This can take between a day and a week.

Workaround 1: Reload the router.

Workaround 2: For a longer-run workaround and if the traffic volume is not too
high, switch to the onboard crypto hardware using the configuration no
crypto engine slot 0.



Status:
Fixed
Severity:
2 Severe
Last Modified:
18-JUN-2015
Known Affected Releases:
15.2(1)T1, 15.2(2)T1, 15.2(3)T1
Known Fixed Releases:
15.2(1)T2.13, 15.2(1.2.3)PI22, 15.2(2)T1.12, 15.2(3.16)M0.4, 15.2(4)XB10, 15.3(0.5)T
Bug Id:
CSCus56080
Title:
Memory leak in using ISM-VPN module at pse2_ge_rx_interrupt
Description:

Symptom:
While passing multicas traffic with ISM-VPN module enabled, we can see a memory leak in the I/O pool
Specifically Normal buffers

Normal buffers, 1548 bytes (total 10257, permanent 3840):
0 in free list (128 min, 4096 max allowed)
13709 hits, 6843 misses, 0 trims, 6417 created
4510 failures (5750 no memory)

Conditions:
Multicast traffic
ISM-VPN module enabled

Workaround:
TBD

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
22-JUN-2015
Known Affected Releases:
15.5(1)T
Known Fixed Releases:
Bug Id:
CSCuj86253
Title:
2900 w/ Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's drops 50% multicast
Description:

Symptom: Cisco 2900 with Multiple EHWIC-4ESG-P's and L2TPv3 via SVI's (one per SVI) drops 50% multicast on pre-existing and working L2TPv3 sessions when attempting to establish a new L2TPv3 tunnel to a new destination that is not yet reachable/configured.
Conditions: Cisco 2900 with Multiple EHWIC-4ESG-P's

pseudowire-class L2TP
encapsulation l2tpv3
interworking ethernet
ip local interface Loopback100
!
interface GigabitEthernet0/0/0
switchport access vlan 101
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/1
switchport access vlan 102
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/2
switchport access vlan 103
no ip address
shutdown
spanning-tree portfast
!
interface Vlan101
no ip address
xconnect 192.168.1.181 101 pw-class L2TP
!
interface Vlan102
no ip address
xconnect 192.168.1.182 102 pw-class L2TP
!
interface Vlan103
no ip address
xconnect 192.168.1.183 103 pw-class L2TP
Workaround: Physically cable EHWIC-4ESG-P to the onboard c2900 GigE interface and tie L2TPv3 tunnels to dot1q sub interfaces:

pseudowire-class L2TP
encapsulation l2tpv3
interworking ethernet
ip local interface Loopback100
!
interface GigabitEthernet0/1
no ip address
!
interface GigabitEthernet0/1.101
encapsulation dot1Q 101
xconnect 192.168.255.2 101 pw-class L2TP
!
interface GigabitEthernet0/1.102
encapsulation dot1Q 102
xconnect 192.168.255.3 102 pw-class L2TP
!
interface GigabitEthernet0/1.103
encapsulation dot1Q 103
xconnect 192.168.255.4 104 pw-class L2TP
!
interface GigabitEthernet0/0/0
switchport access vlan 101
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/1
switchport access vlan 102
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/2
switchport access vlan 103
no ip address
spanning-tree portfast
!
interface GigabitEthernet0/0/3
switchport mode trunk
no ip address

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.2(4)M2, 15.4(2)T1
Known Fixed Releases:
Bug Id:
CSCut45177
Title:
CWS HTTPs traffic fails to load on ISR configured with NVI
Description:

Symptom:When Cloud Web Security and NAT Virtual Interface are configured on the same box, CWS will fail to load HTTPS traffic on any client that is subject to redirection to CWS. HTTP traffic will display correctly in the browser as expected.

NAT Virtual Interfaces are required to be used in VRF-lite configurations if the inside and outside interfaces are both in two different VRFs.

Conditions:CWS and NVI (NAT Virtual Interface) need to be configured together on the ISR.

Workaround:Use traditonal Nat to identify the NAT inside and outside interface in VRF-Lite setups where only one interface is in a VRF and another interface is in global.

If when using VRF-Lite and both interfaces are in different VRFs then there is no workarounds at this time.

More Info:


Status:
Open
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.4(3)M, 15.5(1)T
Known Fixed Releases:
Bug Id:
CSCuu95643
Title:
CISCO2921/K9 with Call Manager XML client crashes
Description:

Symptom:
You can see cmapp_xml_get_attr_value as the latest trace in crashinfo. TLB (load or instruction fetch) exception is reported:

15:10:10 UTC Mon Jun 8 2015: TLB (load or instruction fetch) exception, CPU signal 10, PC = 0x351F58BC

Conditions:
Call manager configured
Other conditions are under investigation

Workaround:
None

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
23-JUN-2015
Known Affected Releases:
15.4(3)
Known Fixed Releases:
Bug Id:
CSCuq36627
Title:
WAAS Express:Failed to create SSL session. (no available resources)
Description:

Symptom:
WAAS-X SSL error message seen when SSL-AO is enabled
Failed to create SSL session. (no available resources)

Conditions:
The problem is seen if there are too many Aborts of the SSL session when packets are in flight.

Workaround:
Disable SSL-AO and only use TDL

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
24-JUN-2015
Known Affected Releases:
15.2(4.0.1)
Known Fixed Releases:
12.2(33)CX, 12.2(33)IRC, 12.2(33)MRA, 12.2(33)SB14, 12.2(33)SB15, 12.2(33)SB16, 12.2(33)SB17, 12.2(33)SB4, 12.2(33)SB6a, 12.2(33)SB6aa
Bug Id:
CSCuh29880
Title:
CPUHOG watchdog crash shdsl_efm background
Description:

Symptom:
Device crashes with similar logs:

SYS-2-WATCHDOG Process aborted on watchdog timeout, process = shdsl_efm background

-Traceback= 0x48A7DB8z 0x48A8B94z 0x48C54F8z 0x48A3C0Cz 0x48A35D4z 0x48A37D0z 0x4899EC8z 0x489A7ECz 0x4C4157Cz 0x4C268F0z

Conditions:
hwic-4shdsl-e

Workaround:
Unknown

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.2(4)M1
Known Fixed Releases:
Bug Id:
CSCuv01607
Title:
Invalid spi, Attempt to use contiguous buffer as scattered, Full queue
Description:

Symptom:
Traceback & buffer error:

%CRYPTO-4-RECVD_PKT_INV_SPI: decaps: rec'd IPSEC packet has invalid spi for destaddr=X.X.X.X, prot=50, spi=0x410D57F3(1091393523), srcaddr=Y.Y.Y.Y, input interface=GigabitEthernet0/1
Jun 16 12:31:00.744: %SYS-2-BADBUFFER: Attempt to use contiguous buffer as scattered src, ptr= 3DE47CB4, pool= 3DE47634 -Process= "", ipl= 1
-Traceback= 300BE43Cz 37116CF8z 37108568z 30402C18z 304037E0z 30406CE4z 37108BDCz 300C04ECz 300BFE30z 3002A23Cz 30F4D278z

Interfaces associated with tunnels get wedged shortly - input queue full.

Conditions:

Workaround:

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
25-JUN-2015
Known Affected Releases:
15.5(1)T
Known Fixed Releases:
Bug Id:
CSCuu98467
Title:
FNF stops working after a few hours
Description:

Symptom:
The FNF stops working after few hours

Conditions:
FNF configured on the router

Workaround:
Reload the router or re-apply the FNF config.

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.3(0.1)
Known Fixed Releases:
Bug Id:
CSCut55649
Title:
Bender c2951 router crashes with 15.5(2.6)T Image
Description:

Symptom:
When router loaded with "c2951-universalk9-mz.SSA.155-2.6.T" image, In the process of session Embedded service engine we are getting traceback with immediate continous reloads.

Conditions:
When router loaded with "c2951-universalk9-mz.SSA.155-2.6.T" image, In the process of session Embedded service engine we are getting traceback with immediate continous reloads.

Workaround:
unknown

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
29-JUN-2015
Known Affected Releases:
15.5(2.14)T, 15.5(2.6)T
Known Fixed Releases:
15.5(2)T1, 15.5(2.25)M0.1, 15.6(0.1)T
Bug Id:
CSCuv07808
Title:
BSTUN async-generic combining input frames
Description:

Symptom:
BSTUN asyn-generic is combining input frames that are properly seperated by 100ms gap.

Conditions:
Applies to BSTUN async-generic only

Workaround:
None.

Further Problem Description:
None.

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
n/a
Known Fixed Releases:
Bug Id:
CSCus38556
Title:
ISM-VPN: DTLS Traffic fails when crypto map is applied on SSLVPN intf
Description:

Symptom:
IOS Router with ISM module stops pass-through DTLS traffic from Anyconnect client, when crypto map is applied on SSLVPN interface. We can ping Router's interfaces but could not ping anything connected on LAN side

Conditions:
DTLS enabled Anyconnect VPN client connected IOS Router with ISM module and crypto map is applied on SSLVPN interface

Workaround:
Disable DTLS

Example:

Config t
webvpn context GLOBAL
gateway PERTH_AIRPORT domain GLOBAL
!
ssl authenticate verify all
!
policy group GLOBAL
no svc dtls
exit

OR

Disable ISM module

no crypto engine slot 0

OR

Remove crypto map from SSL VPN interface

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M6, 15.5(1)T
Known Fixed Releases:
15.3(3)M5.2, 15.5(1.20)T, 15.5(1.21)PI28a
Bug Id:
CSCus95226
Title:
Compact Flash corruption due to call-home directory being created
Description:

Symptom:
A cisco 2911 router fails to boot due to a corrupted compact flash. When the problem occurs, the following messages will be displayed on the console:

*Jan 31 09:42:22.419: %SYS-4-CHUNKSIBLINGSEXCEED: Number of siblings in a chunk has gone above the threshold. Threshold:10000 Sibling-Count:15189 Chunk:0x21A03EC4 Name:FDNODE -Process= "Init", ipl= 4, pid= 3
-Traceback= 3051B2C4z 3051B538z 30522B54z 30521E0Cz 3052C320z 305356ECz 3210D498z 3210EC18z 32108E60z 30BC73E8z 30BC94F0z 3069E94Cz 3069FD34z 3067E734z 302F49ACz 3067F430z

Removing the compact flash and reading it on a PC shows a directory called "call-home" that is corrupted (the directory size is 1.2gb even though the actual size of the flash is only 256mb). Manually deleting the "call-home" directory results in the router correctly booting from the flash

Conditions:

Workaround:
Manually delete the call-home directory on the flash then reinstall the flash card in the router.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.3(3)M4
Known Fixed Releases:
15.3(3)M5.2, 15.4(3)M2.1, 15.4(3)M3, 15.4(3)S2.10, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1, 15.5(2)S0.3, 15.5(2)T0.1
Bug Id:
CSCuu73697
Title:
ISM drops fragmented traffic if virtual-reassembly configured
Description:

Symptom:
ISM-VPN drops fragmented IPsec packets when decrypting

Conditions:
o ISM-VPN module enabled
o ip virtual-reassembly enabled on the crypto interface

Workaround:
o disable virtual-reassembly
o disable ISM module

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M, 15.3(3)M4
Known Fixed Releases:
Bug Id:
CSCuq99888
Title:
2900/ISM-VPN: IPv6 Egress ACL Intermittently Misclassifies ESP packets
Description:

Symptom:
Intermittent misclassification of IPv6 ESP traffic in egress interface access-lists

Conditions:
This issue was seen when running debug images with the fix for CSCuq17550 based on 15.2(4)M_latest

Workaround:
n/a

Further Problem Description:
n/a

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.4(3)M
Known Fixed Releases:
15.3(3)M5.2, 15.4(3)M0.4, 15.4(3)M1, 15.5(1.10.1)GB, 15.5(1.6)T
Bug Id:
CSCuu33351
Title:
Input queue Wedge due pool_grow_cache
Description:

Symptom:
Input queue Wedge due pool_grow_cache

Conditions:
NA

Workaround:
Router Reload

Further Problem Description:

Status:
Open
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M6
Known Fixed Releases:
Bug Id:
CSCuj06856
Title:
Memory leak in Normal Buffers @if_hdlc32_rx_isr
Description:

Symptom:
Memory leak of normal buffers.

Conditions:
Cisco 2900 series routers with a VWIC2-xMFT-T1/E1 installed, with TDM clocking (clock source line
or clock source internal)

Workaround:
To configure the command "clock source line independent' under channel-group.

Further Problem Description:

Status:
Terminated
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M4.3
Known Fixed Releases:
Bug Id:
CSCur70959
Title:
Memory leak @ sipContentObjPvtSetBody
Description:

Symptom:
Memory leak on processor pool occurs when SIP phones register via a register pool (e.g. voice register pool 60) using TCP.

The leak is reflected as the "CCSIP_SPI_CONTROL" and "Dialog Manager" processes:

Head Total(b) Used(b) Free(b) Lowest(b) Largest(b)
Processor 129E0FDC 1844461672 926816936 917644736 695680236 641408232
I/O 3D000000 50331648 32294840 18036808 17988704 15203772

PID TTY Allocated Freed Holding Getbufs Retbufs Process
307 0 635342772 306024464 320536812 0 0 Dialog Manager
384 0 107120680 107902680 221925672 0 0 CCSIP_SPI_CONTRO
0 0 347781848 163431556 176266660 0 0 *Init*
0 0 0 0 142589620 0 0 *MallocLite*

PC Total Count Name
0x0897CE54 198191196 90251 CCSIP_SPI_CONTROL
0x088E2864 81210960 90268 CCSIP_SPI_CONTROL
0x088E2824 81207048 90256 Dialog Manager
0x0469D474 48614232 39588 *Packet Header*

Conditions:
Registration method must be via a voice registration pool with TCP.

Workaround:
Use UDP in the pools to register SIP phones.

Further Problem Description:

Status:
Fixed
Severity:
2 Severe
Last Modified:
30-JUN-2015
Known Affected Releases:
15.2(4)M6.1
Known Fixed Releases:
15.2(4)M8, 15.3(3)M5.2, 15.3(3)S5.8, 15.4(3)M2.2, 15.4(3)M3, 15.4(3)S2.11, 15.4(3)S3, 15.5(1)S1.1, 15.5(1)S2, 15.5(1)S2.1

Find additional information in Bug Search index.

 

2013 Cisco and/or its affiliates. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

 

没有评论:

发表评论