Guest

Cisco Catalyst 4000 Series Switches

Field Notice: WS-C2948G May Crash if Upgraded to CatOS Version 6.3(6), 6.3(7), or 6.3(8)


October 21, 2002


Products Affected

Product

Comments

cat4000.6-3-6.bin

Catalyst 4000 Image version 6.3(6)

cat4000.6-3-7.bin

Catalyst 4000 Image version 6.3(7)

cat4000.6-3-8.bin

Catalyst 4000 Image version 6.3(8)

WS-C2848G

Catalyst 2948G Switch,48 10/100TX(RJ-45)+ 2 1000X GBIC Slots

Problem Description

The WS-C2948G switch belonging to the Catalyst 4000 family may crash within an hour of booting up if upgraded to CatOS version 6.3(6), 6.3(7), or 6.3(8). There is no known workaround for these CatOS versions. Note that the system will crash regardless of whether the switch is passing traffic or not, and regardless of any configuration (even a just cleared configuration). This does not occur on all WS-C2948G switches but has been seen in a small percentage of these switches.

If the boot parameters are set to do so, the switch will boot after crashing. In this case there would not be a hung switch, but a switch that crashes and resets itself. The crashdump would have to be checked to verify this because no message will be generated. To a user, it looks like the switch just resets itself. The default boot field value is 0x10F, for additional boot parameters please refer to Modifying the Switch Boot Configuration.

This problem can be resolved by upgrading to CatOS version 6.3(9).

Note: This has not been seen on any Catalyst 4000 modular chassis with Supervisor I or Supervisor II. This problem will not show up on every WS-C2948G switch with the mentioned software releases but has only been seeh on a very small percentage of these switches.

Background

A Catalyst WS-C2948G switch may crash within an hour of booting up if upgraded to CatOS version 6.3(6), 6.3(7) or 6.3(8). There is no known workaround for these CatOS versions.

This problem can be resolved by upgrading to CatOS version 6.3(9). See the release notes for 6.3(9), DDTS CSCdy37636 under resolved caveats.

Problem Symptoms

Verify the customer is having this crash failure.

The best way to verify this is the crash decode which will point to ScxSingleK1SwitchMan. If you run into a crash which points to the above function with 6.3(6), 6.3(7) or 6.3(8), the customer is running into this symptom.

6.3(6) Crash Example

Dump of assembler code from 0x100b0a2c to 0x100b0a4c:
 0x100b0a2c ScxSingleK1SwitchManUiG14HalScxPdtEntry+396>: ld $ra,72($sp)
 0x100b0a30 ScxSingleK1SwitchManUiG14HalScxPdtEntry+400>: ld $s4,64($sp)
 0x100b0a34 ScxSingleK1SwitchManUiG14HalScxPdtEntry+404>: ld $s3,56($sp)
 0x100b0a38 ScxSingleK1SwitchManUiG14HalScxPdtEntry+408>: ld $s2,48($sp)
 0x100b0a3c ScxSingleK1SwitchManUiG14HalScxPdtEntry+412>: ld $s1,40($sp)
 0x100b0a40 ScxSingleK1SwitchManUiG14HalScxPdtEntry+416>: ld $s0,32($sp)
 0x100b0a44 ScxSingleK1SwitchManUiG14HalScxPdtEntry+420>: addiu $sp,$sp,80
 0x100b0a48 ScxSingleK1SwitchManUiG14HalScxPdtEntry+424>: jr $ra
 End of assembler dump.

Workaround/Solution

This does not occur on all WS-C2948G switches upgraded to CatOS 6.3(6), 6.3(7), or 6.3(8) releases. It has only been seen in a small percentage of these switches. If the WS-C2948G switch is experiencing this crash symptom with CatOS 6.3(6), 6.3(7) or 6.3(8) releases, do not submit a return materials authorization (RMA) for the board.

This problem can be resolved by upgrading to 6.3(9). See release notes for 6.3(9) DDTS CSCdy37636 under resolved caveats.

In the released software, this issue is seen only in CatOS version 6.3(6), 6.3(7) and 6.3(8). It is not seen in 5.5.x.

DDTS

To view Cisco bug ID CSCdy37636 (registered customers only) and the detailed bug information, you must be a registered user and you must be logged in.

For More Information

If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:

Receive Email Notification For New Field Notices

Product Alert Tool - Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.