Preview Tool

Cisco Bug: CSCun36536 - sessmgr Assertion egtpc_interface.c:134 egtpc_handle_user_sap_event()

Last Modified

Jan 29, 2017

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

15.0(17) 15.0(933)

Description (partial)

********************* CRASH #01 ***********************
SW Version          : 15.0(53496)
Similar Crash Count : 1
Time of First Crash : 2014-Feb-25+08:56:54

Assertion failure at sess/egtp/egtpc/egtpc_interface.c:134
  Note: Re-entering EGTPC application is currently blocked.The previous event sent by EGTPC application does not allow the application user to issue any further events.
  Function: egtpc_handle_user_sap_event()
  Expression: 0
  Code: CRASH
  Proclet: sessmgr (f=87000,i=127)
  Process: card=16 cpu=0 arch=X pid=8207 cpu=~7% argv0=sessmgr
  Crash time: 2014-Feb-25+07:56:54 UTC
  Recent errno: 11 Resource temporarily unavailable
  Stack (64440@0xfffee000):
    [f7e285a1/X] sp=0xfffee848
    [0aa52423/X] sn_assert() sp=0xfffee878
    [0736b6e4/X] egtpc_handle_user_sap_event() sp=0xfffeeea8
    [0779c9ef/X] mme_app_send_egtp_msg() sp=0xfffeeed8
    [0773ff2f/X] mme_disp_handle_brr_mod_cmd() sp=0xffffaa68
    [077bcaa3/X] mme_x2_ho_complete() sp=0xffffb578
    [077c05b7/X] mme_abort_x2_ho_procedure() sp=0xffffb9e8
    [0770036e/X] mme_abort_procedure() sp=0xffffba28
    [07740d5a/X] mme_disp_handle_emm_evt() sp=0xffffbb08
    [077487bf/X] mme_disp_attached_handle_s11_msg() sp=0xffffbca8
    [076ff6d9/X] mme_fsm_event_handler() sp=0xffffc108
    [0779d42c/X] mme_app_handle_events_from_egtpc_app() sp=0xffffcf38
    [0741ed8e/X] egtpc_sap_dispatch_routine() sp=0xffffcf68
    [073b2561/X] egtpc_tun_abort() sp=0xffffd2b8
    [073b318a/X] egtpc_nlp_tun_abort_hndler() sp=0xffffd498
    [03f81ef6/X] sessmgr_nlp_mqueue_timer_handler() sp=0xffffd4e8
    [051e8eda/X] tlib_serv() sp=0xffffd528
    [051e8bfb/X] tlib_tmr_tick() sp=0xffffd558
    [046c9a3f/X] snx_timer_service() sp=0xffffd578
    [046c83df/X] snx_fast_service() sp=0xffffd5a8
    [05ca3f84/X] sessmgr_snx_tick_callback() sp=0xffffd5d8
    [0aae2236/X] sn_loop_run() sp=0xffffdb68
    [0a8cbee4/X] main() sp=0xffffdba8

- Handover from peer-mme/sgsn (SRNS)
- TAU request
- Path switch request (x2 handover)
- MBR/Rsp
- Path failure on s11 interface
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.