Preview Tool

Cisco Bug: CSCuq50780 - BGP generates tracebacks when "bg:bd" exceeds 64 chars

Last Modified

Sep 12, 2019

Products (1)

  • Cisco ASR 9000 Series Aggregation Services Routers

Known Affected Releases


Description (partial)

When <bg + bd> string exceeds 64 characters, BGP process begins to throw log messages with the following tracebacks:

RP/0/RSP1/CPU0:Aug 21 11:41:17.911 BRGMT: bgp[1049]: %ROUTING-BGP-3-BUF_TOO_SHORT : [18] :
A string buffer was too short during a string print operation (string "TBL:HSI_VPLS_IIG01_BHE01_40078:HSI_VPLS_IIG01_BHE01_40078 (25/6" truncated)  :
pkg/bin/bgp : (PID=3617117) :  -Traceback= d07a9af ab7865c ab4f806 ad4192c ad43b8b cea3033 c3fdd0b 904d315 904e0e8 904d459 822605f 82242b2 d079c48 ad3b9b9 828e020

The symptom is observed when configuring <bg + bd> exceeds 64 characters and every time a Bridge Group is configured.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.