Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Attachments:1
Added by Dan Rautio, last edited by Dan Rautio on May 31, 2013 (view change)
PR- Bellini :: "jtree memory free using dup of PR-562719 early warning from
534336 incorrect value 2 correct 0" systest on i-chip
observed while testing VPLS over platform
AE
PR- Jtree corruption and SRchip wedge It's not always an error if we don't find the HAL related 10.2+
587369 after ae lacp bundle activation on entry corresponding to provided arguments.
remote side So one should let the caller handle the
failure. This error message wasn't there in
pre-HAL code, and that's the right way.
PR- Jtree corruption and SRchip wedge Indexed nexthop (CBF) related
548436 after ae lacp bundle activation on
remote side
PR- Need to generate appropriate alarm Improve jtree corruption reporting and
665872 upon RKME errors alarming
PR- NH HAL: Topo-walk frees context This is a day-1 bug in HAL code. HALP HAL related 10.2+
558645 before doing a back propagate context is freed before doing a topo change
event back propagation. This affects
Indirect, Unilist, Composites which depend
on the HALP state.
PR- "show jtree [0] debug ip check on-
665191 chip [table]" might corrupt shadow
copy
PR- JTREE corruption on multiple fpc This is a duplicate of PR-558645 HAL related 10.2+
665194 and RCHIP wedge
PR- jtree memory corruption when the This is day one problem with HAL code. HAL related 10.2+.
707453 interface flaps Got surfaced with ECMP-64 knob. rchip rchip version of PR-
specific fix 743323
PR- jtree memory corruption when the This is day one problem with HAL code. HAL related 10.2+.
743323 interface flaps at ICHIP FPC Got surfaced with ECMP-64 knob. I-chip I-chip version of
specific fix PR-707453
PR- Multiple free errors were seen this bug was introduced as a result of the
676021 during route change event for fix for 597941
VPLS routes.
PR- Jtree corruption with log fpc4 RT: Dup PR/832414 likely fixed
858886 %PFE-3: Failed prefix change by PR/730686
IPv4 & jt_change failed for ifl 0 ,PR/710702
on FE 0, rt_jtree_change() , PR/738922
,PR/695366
LCC0-EGFPC5(flame-lcc0-re0 vty)#
if you have jtree corruption, you might get some "Detected error nexthop" syslogs.
use Josef's document to decode the packet.
Or see my detected error nexthop cheat sheet )
here are some examples:
jtac-bbuild01: /volume/CSdata/kmuthuswamy/cases/vz/vz-t/2011-0621-
0876/log/sfc-re0>zmore messages.4.gz | grep lcc0-fpc5
Jun 21 19:42:51 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: Detected error
nexthop:
Jun 21 19:42:51 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: notif[ 0]: 38080034
00128050 7dfffdff 0cd2d279
Jun 21 19:42:51 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: notif[ 4]: 00000000
00000000 00000000 00000000
Jun 21 19:42:51 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: notif[ 8]: 00000000
Jun 21 19:42:52 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: packet[ 0]: 45 00 00
28 40 aa 00 00 1d 06 31 ad 47 f0 df 2c
Jun 21 19:42:52 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: packet[16]: ad d2 56
8a 08 4c 0d 3d 23 1e a0 1a c5 bf b2 51
Jun 21 19:42:52 RES-BB-RTR1 lcc0-master lcc0-fpc5 PFE: packet[32]: 50 10 78
00 bb 87 00 00
notif[1] = 0x00128050
0000 0000 0001 0010 1000 0000 0101 0000
<-------iif---------->
iif = 74 = 0x4a
packet:
45 - version
00 - tos
00 28 - total length
40 aa - id
00 00 - flags <-
1d - ttl <- 29
06 - protocol <- tcp
31 ad - checksum
47 f0 df 2c - source address <- 71.240.223.44
ad d2 56 8a - destination address <- 173.210.86.138
08 4c - tcp source port <- 2124
0d 3d - tcp destination port <- 3389
23 1e a0 1a - tcp seq number
c5 bf 50 10 - tcp ack number
jtac-bbuild01: /volume/CSdata/kmuthuswamy/cases/vz/vz-t/2011-0621-
0876/log/sfc-re0>zmore messages.4.gz | grep lcc1-fpc1
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: Detected error
nexthop:
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: notif[ 0]: 39080034
00200050 fdfffdff 0d62fe95
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: notif[ 4]: 00000000
00000000 00000000 00000000
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: notif[ 8]: 00000000
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: packet[ 0]: 45 00 00
28 19 cf 40 00 3d 06 ba 86 4a 6b 52 c8
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: packet[16]: cc d1 ff
75 07 87 00 50 b2 31 2c 98 1d 17 9e b6
Jun 21 19:42:51 RES-BB-RTR1 lcc1-master lcc1-fpc1 PFE: packet[32]: 50 10 80
00 23 eb 00 00
notif[1] = 0x00200050
0000 0000 0010 0000 0000 0000 0101 0000
<-------iif---------->
iif = 128 = 0x80
packet:
45 - version
00 - tos
00 28 - total length
19 cf - id
40 00 - flags <- don't fragment
3d - ttl <- 61
06 - protocol <- tcp
ba 86 - checksum
4a 6b 52 c8 - source address <- 74.107.82.200
cc d1 ff 75 - destination address <- 204.209.255.117
07 87 - tcp source port <- 1927
00 50 - tcp destination port <- 80
b2 31 2c 98 - tcp seq number
1d 17 9e b6 - tcp ack number
Use the above information to plug into jsim (both on-chip and shadow copy) and run on
the FPC before rebooting it
from a different example, the "Detected error nexthop" messages were decoded and were found
to be:
$route $iFPC/$PFE $intf $iif
38.251.140.24 FPC0/0 xe-0/0/0 93
194.6.182.149 FPC1/0 xe-1/0/0 112
69.212.198.149 FPC1/1 xe-1/1/0 116
169.181.194.109 FPC2/1 xe-2/1/0 130
now use the above information and run jsim on the affected fpc:
# for each of the row in above table, could you run below commands:
In addition, it is very important to know the topology chain the prefix is using. follow the
topology chain in the PFE:
# for each of the row in above table, could you run below commands:
here is an example
Route: 173.210.86.138
too long#
Nexthop Status:
Index: 0 (0x0), Slot: Unspecified
Destination (0x100): RE Chip8
Topo link: 0x35eecec3 0x8be986c3
Refcount: 53714, Interface: 68, Nexthop Flags: 0x0
Routing-table id: 0
need to also get the nh info for all the unicast nhs:
too long# show nhdb id 795 ext
too long# show nhdb id 796 ext
too long# show nhdb id 797 ext
too long# show nhdb id 798 ext
too long# show nhdb id 799 ext
Nexthop Status:
Index: 0 (0x0), Slot: Unspecified
Destination (0x100): RE Chip8
Topo link: 0x35ee7ec3 0x8be90ec3
Refcount: 36340, Interface: 69, Nexthop Flags: 0x0
Routing-table id: 0
need to also get the nh info for all the unicast nhs:
Topology Neighbors:
41.218.192/18-> nh(Unilist,2097957)
213.185.80/20-+
46.182.52/22-+
143.86.8/24-+
209.136.29/24-+
209.136.30/24-+
144.104.96/20-+
[..]
Added by Siddharth Sudhakar, last edited by Siddharth Sudhakar on Jul 22, 2009 (view change)