Guest

Preview Tool

Cisco Bug: CSCup05232 - Sessmgr crash: Assertion failure at sess/ggsn/app/ggsnapp_gtpu.c:51

Last Modified

Jan 28, 2017

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

14.0(110)

Description (partial)

Symptom:
Assertion failure at sess/ggsn/app/ggsnapp_gtpu.c:51

    Note: Unhandled event: 10 from EGTPU-APP
    Function: ggsnapp_handle_events_from_egtpu_app()
     Expression: 0
    Code: CRASH
    Proclet: sessmgr (f=87000,i=262)
    Process: card=2 cpu=1 arch=X pid=4960 cpu=~22% argv0=sessmgr
    Crash time: 2014-May-20+19:26:39 UTC
    Recent errno: 11 Resource temporarily unavailable
    Stack (131071@0xfffbb000, probably truncated):
      [f7e285a1/X] libc.so.6/kill() sp=0xfffbb098
      [0a177367/X] sn_assert() sp=0xfffbb0c8
      [07197ad9/X] ggsnapp_handle_events_from_egtpu_app() sp=0xfffbb528
      [06dcae45/X] egtpu_sap_dispatch_routine() sp=0xfffbb558
      [06dc1173/X] egtpu_handle_end_marker_msg() sp=0xfffbb608
      [03bb4000/X] sessmgr_gtpumgr_handle_gtpu_msg() sp=0xfffbbb08
    Last Bounce:
      Src: sessmgr (f=87000,i=262)
      Dst:  (f=110000,i=5,m=110993)
      ID:  0x13600201532945e9
      Input:  sn_diameter_appl_proxy_control_msg_t
      Output: sn_diameter_proxy_appl_control_msg_t
      Callback: [09c4a230/X] diam_proxy_handle_appl_control_msg_cb()
      Class: MEDIUM
      Flavour: NONBLOCKING REMOTE UNICAST 
      TCP: connct=0 elapsed=0ms code=NS_MISSING (Peer is not present)
      Nameservice: valid=0 age=0 card=0 cpu=0 pid=0 debug=0
    Registers:
            gs       fs       es       ds
      00000000 00000000 0000002b 0000002b
           edi      esi      ebp      esp
      0f0d45e0 fffbb100 fffbb098 fffbb07c
           ebx      edx      ecx      eax
      00001360 f7f05958 00000006 00000000
         trap      err      eip       cs
     00000000 00000000 f7e285a1 00000023
          efl     uesp       ss
     00000217 fffbb07c 0000002b
   Recent inbound med header (40@0xea6a2048):
        0: 404f00ac0001d966 0102c121f0000050 @O.....f ...!...P
       16: 0000000000000000 0000000000000000 ........ ........
       32: 0000000000000000                  ........         
   Recent inbound med packet (132@0xea6a2070):
        0: 6808680848000000 0100000004000000 h.h.H... ........
       16: 0e9f7cd100000000 0000000000000000 ..|..... ........
       32: 04000000d4f989a6 b8adffff27e5e206 ........ ....'...
       48: 480de9f606c112a2 ab2c8034b2fe0040 H....... .,.4...@
       64: a212c10675a10000 4500003c17ad0000 ....u... E..<....
       80: ff11c01f0a410788 ac1a2601e9300035 .....A.. ..&..0.5
       96: 0028c26c859c0100 0001000000000000 .(.l.... ........
      112: 0470757368056170 706c6503636f6d00 .push.ap ple.com.
      128: 00100001                          ....             
   Address Map:
     boxer                    0x00048000    0x0fee6234
     libstdc++.so.5           0xf7f2d000    0xf7fc82d0
     libm.so.6                0xf7f0c000    0xf7f2b4b3
     libc.so.6                0xf7e09000    0xf7f02be8
     ld-linux.so.2            0xf7fec000    0xf7ffd000
      libgcc_s.so.1            0xf7e01000    0xf7e07844
      libp2p-1.50.53636.so     0xf4075000    0xf416ff58

Conditions:
na
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.