Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

BUG 1500 decode help. Please?

Status
Not open for further replies.

westcoaster

Technical User
Sep 26, 2002
218
CA
Hi,
Have a problem, users complaining conference calls getting cut off. I log into the switch and find these bug errors. While they are not coming fast and furious, they are at a steady pace.

BUG1500
Parameters to NUM_DN_MEMBERS do not identify a valid SL-1
DNBLOCK. Procedure NUM_DN_MEMBERS

Ok, that doesn't really tell me much...

While repairing the bug messages may have nothing to do with my conference call problem, I figure it's a pretty good place to start.

I'm looking for a little assistance in decoding the bug messages and a gentle push in the right direction.

Thanks,




BUG1500
BUG1500 : 053A1DFE 0000000B 07782C96 00000600 00000218 00001508 00000028 0 0000
0000 00000000 00000000 0 5740 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 306183E9 30613BBC 306114F0
BUG1500 + 305FC3B0 30831886 31906211 31906155 31905825
BUG1500 + 319024EA 318FD126 318FCAFB 318FC09E 3064D486
BUG1500 + 3062901B 306269F9 3065F3C2 3065E9EF 31796BF9
BUG1500 + 3179698B 31796874 316C3F9C 30D6580D

BUG1500
BUG1500 : 053A1DFE 0000000B 07782C96 00000600 00000218 00001508 00000028 0 0000
0000 00000000 00000000 0 5740 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 306183E9 306175CE 306115A5
BUG1500 + 305FC3B0 30831886 3190624E 31906155 31905825
BUG1500 + 319024EA 318FD126 318FCAFB 318FC09E 3064D486
BUG1500 + 3062901B 306269F9 3065F3C2 3065E9EF 31796BF9
BUG1500 + 3179698B 31796874 316C3F9C 30D6580D

BUG1500
BUG1500 : 053A1DFE 0000000B 07782C96 00000600 00000200 00000000 00000028 0 0000
0000 00000000 00000000 0 5740 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 319262E9 31925B11 300D5636
BUG1500 + 300D544B 300D52C8 300D4A00 300DE286 300C877D
BUG1500 + 30031071 3002DC96 307B654F 307B44E9 3079FA0D
BUG1500 + 3079EDC0 3079A7D6 319FA32E 31066A03 3105C94F
BUG1500 + 3105C002 3108C8F5 3108C429 3108C383 31089EAE
BUG1500 + 31089E09 30871678 3086DE8D 3086DA70 3179D4A2
BUG1500 + 317967EA 316C3F9C 30D6580D
 
New Information:
I call the main pilot number and get the following two BUG1500 outputs.


BUG1500
BUG1500 : 053A1E02 0000000B 0737986B 00000600 00000218 00001504 0000002A 0 0000
0000 00000000 00000000 0 5700 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 306183E9 30613BBC 306114F0
BUG1500 + 305FC3B0 30831886 31906211 31906155 31905825
BUG1500 + 319024EA 318FD126 318FCAFB 318FC09E 3064D486
BUG1500 + 3062901B 306269F9 3065F3C2 3065E9EF 31796BF9
BUG1500 + 3179698B 31796874 316C3F9C 30D6580D

BUG1500
BUG1500 : 053A1E02 0000000B 0737986B 00000600 00000218 00001504 0000002A 0 0000
0000 00000000 00000000 0 5700 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 306183E9 306175CE 306115A5
BUG1500 + 305FC3B0 30831886 3190624E 31906155 31905825
BUG1500 + 319024EA 318FD126 318FCAFB 318FC09E 3064D486
BUG1500 + 3062901B 306269F9 3065F3C2 3065E9EF 31796BF9
BUG1500 + 3179698B 31796874 316C3F9C 30D6580D

I listen to the AA menu prompt and hang up the telephone. I then get the next three BUG1500 output.

>
BUG1500
BUG1500 : 053A1E02 0000000B 0737986B 00000600 00000200 00000000 0000002A 0 0000
0000 00000000 00000000 0 5700 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 319262E9 31925B11 300D5636
BUG1500 + 300D544B 300D52C8 300D4A00 300DE286 300C877D
BUG1500 + 30031071 3002DC96 307B654F 307B44E9 3079FA0D
BUG1500 + 3079EDC0 3079A7D6 319FA32E 31066A03 3105C94F
BUG1500 + 3105C002 3108C8F5 3108C429 3108C383 31089EAE
BUG1500 + 31089E09 30871678 3086DE8D 3086DA70 3179D4A2
BUG1500 + 317967EA 316C3F9C 30D6580D

BUG1500
BUG1500 : 053A1E02 0000000B 0737986B 00000600 00000200 00000000 0000002A 0 0000
0000 00000000 00000000 0 5700 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 306183E9 30613BBC 306114C9
BUG1500 + 305FC3B0 30831886 31925DFE 300D5636 300D544B
BUG1500 + 300D52C8 300D4A00 300DE286 300C877D 30031071
BUG1500 + 3002DC96 307B654F 307B44E9 3079FA0D 3079EDC0
BUG1500 + 3079A7D6 319FA32E 31066A03 3105C94F 3105C002
BUG1500 + 3108C8F5 3108C429 3108C383 31089EAE 31089E09
BUG1500 + 30871678 3086DE8D 3086DA70 3179D4A2 317967EA
BUG1500 + 316C3F9C 30D6580D

BUG1500
BUG1500 : 053A1E02 0000000B 0737986B 00000600 00000200 00000000 0000002A 0 0000
0000 00000000 00000000 0 5700 00000084 0000AA87 00000000 00000000 00000000 00000
000 00000000
BUG1500 + 307E36FA 3192AA64 306183E9 30613BBC 3061180D
BUG1500 + 305FC3B0 30831886 31925ECF 300D5636 300D544B
BUG1500 + 300D52C8 300D4A00 300DE286 300C877D 30031071
BUG1500 + 3002DC96 307B654F 307B44E9 3079FA0D 3079EDC0
BUG1500 + 3079A7D6 319FA32E 31066A03 3105C94F 3105C002
BUG1500 + 3108C8F5 3108C429 3108C383 31089EAE 31089E09
BUG1500 + 30871678 3086DE8D 3086DA70 3179D4A2 317967EA
BUG1500 + 316C3F9C 30D6580D

 
I found this patch mplr30789 below for release 7.00Q

CS1000E rls 7.00Q using CLID table to convert a DN to E.164 number

BUG1500 printed very frequently, e.g.
*% BUG1500
*% BUG1500 : 00000000 0EF20698 00000300 22120084 00006804 00000000 6 00000001 0EDA
*% 9E78 00000000 0 4628 8264 0 0 0 0 0
*% BUG1500 + 00B07AA2 01E34C6C 00953DD1 0095348B 0093B578
*% BUG1500 + 00946C17 009437C1 0092BC6C 00B57492 01E2FEEC
*% BUG1500 + 00AC7775 00AC5C60 00AC2633 00AC13EA 00ABCCB4
*% BUG1500 + 01EFE991 01E092DB 01E080FE 01E079AD 01E06F56
*% BUG1500 + 01E69B33 01E6931C 01E62010 01E5D39A 01CBDA96
*% BUG1500 + 01CBD5A1 01CBD511 01CB8FBD 01CB1C1E 0119C9EA


rds from rptbug DIAG100:
pdt> rdgo 1214
[1214] 17/03/2011 11:37:12 DIAG0100 Diagnostic - Detailed stack trace: BUG1500
pdt> rds 7
[1214] 17/03/2011 11:37:12 DIAG0100 Diagnostic - Detailed stack trace: BUG1500
edi = 0235e000 esi = 01500064 ebp = 02c96b48 esp = 02c96b18
ebx = 02c96b20 edx = 00000000 ecx = 000005dc eax = 000005dc
eflags = 00000202 pc = 019efc04

Return Address Stack:
00b07a49 (BUG_PARMS+71)
01e34c6c (NUM_DN_MEMBERS+dc)
00953dd1 (CSAI_HANDLER$CONVERT_E164_DN$GET_OCS_CLID+85)
0095348b (CSAI_HANDLER$CONVERT_E164_DN+a7)
0093b578 (CSAI_HANDLER$INSERT_XFER_IE+49c)
Stack (top = 0x2c96b18):
02c96b18: 02377b54 0235e5f0 0235e000 01500064 02c96b48 02c96b18 02c96b20 00000000
02c96b38: 000005dc 000005dc 00000202 019efc04 02c96b84 00b07a49 01500064 000005dc
02c96b58: 00000000 00000000 00000000 00000000 00000000 08f2221b 0f1a7351 00000000
02c96b78: 0235e000 0235e5f0 02377b54 02c96ba4 01e34c6c 000005dc 0024e305 0024e2ec
02c96b98: 0235e000 0235e5f0 02377b54 02c96bcc 00953dd1 00000000 0235e5f0 02377b58
02c96bb8: 00000000 011b3749 0235e000 02377b54 02377b58 02c96c44 0095348b 02c96c48
02c96bd8: 02c96f64 02c96c48 0235e5f0 00000000 02c96bf0 00000000 00000013 00000000
02c96bf8: 00006804 0f19649f 08f31a6a 0f19655a 08f31a1a 0f1965c5 08f14e7e 08f14bd5
02c96c18: 00003501 0f1a7351 08f2221b 0f1a73d6 08f22211 0f1a73f8 08f221c1 08f219d2
02c96c38: 0235e000 02c96f64 02c96f64 02c96d30 0093b578 02c96f64 0024e335 00000010
02c96c58: 00003501 00000000 02c96ccc 02c96cd0 00000001 0ee5b238 0024e37e 0000004f
02c96c78: 00000001 0024e333 00000002 0ee5b238 0024e37e 0000004d 00000002 0024e330
02c96c98: 00000001 00003501 00000000 00000000 0024e335 0024e333 08f31a6a 02c96cf4

[1215] 17/03/2011 11:37:12 DIAG0100 (cont'd)

Return Address Stack:
00946c17 (CSAI_HANDLER$CSL_ONOFF_DISC+1d77)
Stack (top = 0x2c96cb8):
02c96cb8: 0ef1a110 0024e335 00003501 00000000 00000000 00000009 00000004 0000a261
02c96cd8: 0000013f 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02c96cf8: 00000000 00000000 0235e000 00000000 02c96f64 02c96d30 00953244 000000f7
02c96d18: 08f31a6a 00000000 02c96d34 0235e000 0ef20698 02c96f64 02c96e9c 00946c17
02c96d38: 02c96f64 00000001 02c96df8 00000076 00003d20 00000000 00000000 00000004
02c96d58: 00000000 00006804 0f19649f 08f31a6a 0f19655a 08f31a1a 0f1965c5 08f14e7e
02c96d78: 08f14bd5 00000000 00000000 00000000 0024e373 02c96db4 02c96da4 00000001
02c96d98: 0235e000 02c96e9c 02c96fd8 00000001 00000000 00000000 00000000 00000003
02c96db8: 00aae637 00000008 00006804 0024e373 00000000 00000000 00006804 00000011
02c96dd8: 00000000 0024e373 00006804 00000000 00000001 0235e000 02c96e74 00000006
02c96df8: 00000044 00000012 00000000 00000468 00000076 00003d20 00000000 00000000
02c96e18: 08f31a6a 0f19655a 08f31a1a 0f1965c5 0ef20698 08f14bd5 0024e384 00000001
02c96e38: 00000020 00000000 02c96e6c ffffffff 02c96e70 02c96e9c 00006804 00000000

[1216] 17/03/2011 11:37:12 DIAG0100 (cont'd)

Return Address Stack:
009437c1 (CSAI_HANDLER$CSL_USTS_MSG+229)
0092bc6c (CSAI_HANDLER+20c)
00b57492 (CSAI+b6)
01e2feec (LINKS_LAMPS+3dc)
Stack (top = 0x2c96e58):
02c96e58: 0ef20698 00000003 0235e000 02c96e9c 00000000 02c96e98 01fe2203 02c96e9c
02c96e78: 0000003f 00000005 0024e3b7 0ef20698 00000003 0235e000 02c96f64 02c96f64
02c96e98: 02c96fd8 02c96ef4 009437c1 02c96f64 00000005 00000000 00006804 00000011
02c96eb8: 00006804 0f19649f 08f31a6a 0f19655a 08f31a1a 0f1965c5 08f14e7e 08f14bd5
02c96ed8: 00000003 00006804 00000011 00000000 0235e000 02c96f64 02c96fd8 02c96f60
02c96ef8: 0092bc6c 02c96f64 00000005 0000000e ffffffff 00000001 00000010 08f31ab2
02c96f18: 08f11291 08f11299 0235e000 0235e5f0 00000000 02c96f58 01c2832f 08f5f9fd
02c96f38: 0000000b 0000000a 00000011 0000000a 00000000 ffffffff 00000000 0235e000
02c96f58: 0235e5f0 02c96fd8 02c96fd4 00b57492 0000001b 00000005 00000000 00006804
02c96f78: 00000011 00000000 0ef20698 00000000 00000011 00000000 0000a512 02c96fa8
02c96f98: 011b3749 0f19649f 02c96fb4 00000000 0235e000 02c96fe8 00000000 02c96fe4
02c96fb8: 00b84511 00006d0c 00000000 0ef20698 0235e000 02c97094 08f152a7 02c97090
02c96fd8: 01e2feec 0000001b 00000005 00000000 00006804 00000011 00000000 0ef20698

[1217] 17/03/2011 11:37:12 DIAG0100 (cont'd)

Return Address Stack:
00ac7775 (DISCONNECT$IDLESTATION$IDLE_BCS_STATION+bbd)
00ac5c60 (DISCONNECT$IDLESTATION+b8)
00ac2633 (DISCONNECT$REST_DISC_1$REST_DISC_2+ab7)
Stack (top = 0x2c96ff8):
02c96ff8: 00000011 00000000 00000000 00000000 00000000 00000010 00000000 00000000
02c97018: 00000002 0f19653a 00000000 00000000 00000000 00000000 00000003 08f7248b
02c97038: 00000000 08f71870 00000000 00006804 0f19649f 08f31a6a 0f19655a 00000000
02c97058: 00000000 08f14e7e 08f14bd5 00000001 00000000 00000001 00000000 00000001
02c97078: 00000000 00000000 00000000 0235e000 02c970e4 00000011 02c970e0 00ac7775
02c97098: 00000011 00000000 0024e4ac 00000000 00000000 00000000 08f70b42 08f70b5a
02c970b8: 0f182657 08f146d5 08f146ac ffffffff ffffffff 00000000 00000000 0235e000
02c970d8: 02c97138 02c97348 02c97134 00ac5c60 02c97138 02c97348 0f19649f 02c97144
02c970f8: 022bd5e7 00006804 0f19649f 00000000 0f19655a 02c97134 009df77a 0ef1a110
02c97118: 00000000 02c9714c 00000011 0235e000 0235e000 08f31a6a 02c97348 02c971f0
02c97138: 00ac2633 02c97348 0024e4ac 02c97174 022bd6d9 02c971f4 0235e5f0 00000000
02c97158: 02c29260 033c0000 00000001 21583150 00000000 023548c1 02c97190 02c971f0
02c97178: 02c29238 02c971a4 009df77a 00000000 00000000 022cb0a0 00000000 02c97348

[1218] 17/03/2011 11:37:12 DIAG0100 (cont'd)

Return Address Stack:
00ac13ea (DISCONNECT$REST_DISC_1+1272)
00abccb4 (DISCONNECT+10b0)
Stack (top = 0x2c97198):
02c97198: 00000000 00000000 02c971f0 02c971ec 02c971d4 01e3cc4a 08f11291 08f31aa9
02c971b8: 08f11291 08f11295 00000000 00000002 00000000 0235e5f0 02c97348 02c971f4
02c971d8: 00000000 000000f6 00006804 0235e000 0235e5f0 00000000 02c97240 00ac13ea
02c971f8: 02c97244 02c97348 02c97244 02362800 01c2832f 02c97348 00000002 02c9723c
02c97218: 009df77a 0ef20698 00000000 0235e000 00000002 00000000 0235e000 0235e000
02c97238: 0000017c 02c97348 02c97344 00abccb4 02c97348 00000000 00000000 00000000
02c97258: 00000000 00000000 00000000 00006804 00000000 00000000 00000000 00006446
02c97278: 00000000 00000000 00000001 00000002 00000000 00006446 00000004 00000002
02c97298: 02c9733c 00000000 04a0d505 00000000 00000000 08f60150 00006804 0f19649f
02c972b8: 08f31a6a 0f19655a 08f31a1a 0f1965c5 08f14e7e 08f14bd5 00006804 0f19649f
02c972d8: 08f31a6a 0f19655a 08f31a1a 0f1965c5 08f14e7e 08f14bd5 08f14bd5 00000000
02c972f8: 00000000 02c973d0 00000000 00000000 00000000 00000000 00000000 00000000
02c97318: 00006804 0f19649f 08f31a6a 0f19655a 08f31a1a 0f1965c5 08f14e7e 08f14bd5

[1219] 17/03/2011 11:37:12 DIAG0100 (cont'd)

Return Address Stack:
01efe991 (ONHOOK+1581)
01e092db (SL1_FUNCTION$RELEASE_KEY+92f)
01e080fe (SL1_FUNCTION$GET_FUNCTION$BCS_KEY_FUNC+1ae)
01e079ad (SL1_FUNCTION$GET_FUNCTION+a0d)
01e06f56 (SL1_FUNCTION+66)
01e69b33 (TCM_INPUT_MSG$HARD_KEY_RLS+19f)
01e6931c (TCM_INPUT_MSG$FIXED_KEY+25c)
01e62010 (TCM_INPUT_MSG$HANDLE_B1+2bc)
Stack (top = 0x2c97338):
02c97338: 0235e000 0235e5f0 02c973d0 02c973cc 01efe991 02c973d0 0235e5f0 02c9737c
02c97358: 00af90a5 02c973c4 00000128 0235e5f0 02c973c8 02c97394 00000001 00000000
02c97378: 0235e5f0 02c973c0 00af78c3 02c973c4 00000000 00000000 00000000 0235e5f0
02c97398: 00000000 00000000 01e3c2ae 08f31a6a 00000010 08f11291 08f112c3 0235e000
02c973b8: 00000000 00000000 0235e000 08f31a6a 00000300 02c973fc 01e092db 00000000
02c973d8: 00006804 0f19649f 08f31a6a 0f19655a 08f31a1a 00000010 0235e000 0235e5f0
02c973f8: 0235e5f0 02c97420 01e080fe 02c97484 08f31a1a 0f1965c5 00000000 0235e000
02c97418: 02c97464 00000000 02c97460 01e079ad 02c97464 02c97484 00000000 00000000
02c97438: 00000000 02c9747c 00000000 00000000 0ef20698 00000000 08f31aa9 02c97484
02c97458: 02c974a0 00000000 02c97480 01e06f56 02c97484 00000000 00000000 0235e000
02c97478: 02c974a0 00000000 02c9749c 01e69b33 00000000 02c97524 0235e000 02c974bc
02c97498: 00000000 02c974b8 01e6931c 02c97524 00000000 0235e000 02c97524 00000000
02c974b8: 02c974d8 01e62010 02c97524 00000000 00000001 0235e000 02c97524 00000000

[1220] 17/03/2011 11:37:12 DIAG0100 (cont'd)

Return Address Stack:
01cbda96 (WORKSHED$NTWK_VALID_INPUT$TCM_INPUT+16)
01cbd5a1 (WORKSHED$NTWK_VALID_INPUT+85)
01cbd511 (WORKSHED$NTWK_INPUT+1d9)
01cb8fbd (WORKSHED$INPUT_TASK+3d)
01cb1c1e (WORKSHED+132)
0119c9ea (sl1Main+38a)
021f836c (vxTaskEntry+c)
Stack (top = 0x2c974d8):
02c974d8: 02c97520 01e5d39a 02c97524 00000000 0235e000 033c4b20 02c97564 02c97530
02c974f8: 01fd40fd 00000000 00000000 00000000 02c97518 0119531e 00000000 0235e000
02c97518: 0235e5f0 02c97564 02c97538 01cbda96 00001800 0235e000 0235e5f0 02c97564
02c97538: 02c97560 01cbd5a1 02c97564 02c975b4 0024e554 00000000 00000000 0235e000
02c97558: 02c975b4 023843c0 02c9757c 01cbd511 02c975b4 00000001 0235e000 02c975b4
02c97578: 00000000 02c97598 01cb8fbd 02c975b4 0000002d 0235e000 02c975b4 00000000
02c97598: 02c975b0 01cb1c1e 02c975b4 00000000 00000000 00000000 02c975c0 0119c9ea
02c975b8: 00000000 00000000 00000000 021f836c 00000000 00000000 00000000 00000000
02c975d8: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000068
02c975f8: 0000002f 06478e40 00000000 00000000 00000000 00000000 20342032 30315343
02c97618: 5f453030 43414e49 39312054 36312e32 34322e38 0a322e31 00000000 00000000
02c97638: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
02c97658: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000


mplr30789 stops the BUG1500s



Firebird Scrambler
Nortel Meridian 1 / Succession and BCM / Norstar Programmer in the UK
Advance knowledge on BCM support
 
This is on a Linux cppm 6.0 system.

Tried to find the exterminator bug decoder, but that doesn't seem to be around any longer.

 
I sure would appreciate it....

I have a google mail account. westcoasterz is the handle.
 
Performed a restart on the system today.
No change.
Still get a bug error on PRI setup and teardown of a call.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top