Guest

Preview Tool

Cisco Bug: CSCvs20803 - Sessmgr restart is seen with Segmentation fault_tfIpIncomingPacket()

Last Modified

Mar 04, 2020

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases

21.12.9

Description (partial)

Symptom:
Customer hit below sessmgr restart  on staros version 21.12.9 with stack

  Stack (15816@0x0xffcf7000):
    [74656b63/X] <unknown>() sp=0xffcf75b8
    [09ce5a26/X] tfFreePacket() sp=0xffcf75d8
    [09d0e62a/X] tfTcpVectClose() sp=0xffcf7618
    [09d0d371/X] tfTcpStateMachine() sp=0xffcf7708
    [09d1c875/X] tfTcpIncomingPacket() sp=0xffcf78c8
   [09cfa0b8/X] tfIpIncomingPacket() sp=0xffcf7978
    [09cfdcb0/X] tfNullLinkRecv() sp=0xffcf7998
    [09ce6113/X] tfRecvInterface() sp=0xffcf79d8
    [09d203a9/X] usertcp_dataindication() sp=0xffcf79f8
    [093beacd/X] acsmgr_proxy_incoming_packet_to_user_stack() sp=0xffcf7a78
    [09848b6a/X] acsmgr_submit_tcp_packet_to_tcp_proxy() sp=0xffcf7f78
    [09893c7c/X] acsmgr_do_tcp_proxy_related_handling() sp=0xffcf8018
    [0989472a/X] acsmgr_tcp_proxy_handling_after_process_packet() sp=0xffcf8088
    [0991e886/X] acs_process_tcp_packet_normal_path() sp=0xffcf80d8
    [0991e9af/X] acs_tcp_analyzer() sp=0xffcf8158
    [09852354/X] do_acsmgr_process_packet() sp=0xffcf8258
    [09852849/X] acsmgr_process_packet() sp=0xffcf82e8
    [098f7f3a/X] acs_ip_normal_path() sp=0xffcf8388
    [0975b149/X] acsmgr_data_receive_merge_mode() sp=0xffcf8858
    [0975ee56/X] acs_handle_datapath_events_from_sm_interface() sp=0xffcf8888
    [0395397d/X] sessmgr_sef_initiate_data_packet_ind() sp=0xffcf89e8
    [03953b01/X] sessmgr_pcc_intf_send_data_packet_ind() sp=0xffcf8a88
    [0653aefe/X] sessmgr_pcc_fwd_packet() sp=0xffcf8af8

Conditions:
Customer hit below sessmgr restart  on staros version 21.12.9 with stack

  Stack (15816@0x0xffcf7000):
    [74656b63/X] <unknown>() sp=0xffcf75b8
    [09ce5a26/X] tfFreePacket() sp=0xffcf75d8
    [09d0e62a/X] tfTcpVectClose() sp=0xffcf7618
    [09d0d371/X] tfTcpStateMachine() sp=0xffcf7708
    [09d1c875/X] tfTcpIncomingPacket() sp=0xffcf78c8
   [09cfa0b8/X] tfIpIncomingPacket() sp=0xffcf7978
    [09cfdcb0/X] tfNullLinkRecv() sp=0xffcf7998
    [09ce6113/X] tfRecvInterface() sp=0xffcf79d8
    [09d203a9/X] usertcp_dataindication() sp=0xffcf79f8
    [093beacd/X] acsmgr_proxy_incoming_packet_to_user_stack() sp=0xffcf7a78
    [09848b6a/X] acsmgr_submit_tcp_packet_to_tcp_proxy() sp=0xffcf7f78
    [09893c7c/X] acsmgr_do_tcp_proxy_related_handling() sp=0xffcf8018
    [0989472a/X] acsmgr_tcp_proxy_handling_after_process_packet() sp=0xffcf8088
    [0991e886/X] acs_process_tcp_packet_normal_path() sp=0xffcf80d8
    [0991e9af/X] acs_tcp_analyzer() sp=0xffcf8158
    [09852354/X] do_acsmgr_process_packet() sp=0xffcf8258
    [09852849/X] acsmgr_process_packet() sp=0xffcf82e8
    [098f7f3a/X] acs_ip_normal_path() sp=0xffcf8388
    [0975b149/X] acsmgr_data_receive_merge_mode() sp=0xffcf8858
    [0975ee56/X] acs_handle_datapath_events_from_sm_interface() sp=0xffcf8888
    [0395397d/X] sessmgr_sef_initiate_data_packet_ind() sp=0xffcf89e8
    [03953b01/X] sessmgr_pcc_intf_send_data_packet_ind() sp=0xffcf8a88
    [0653aefe/X] sessmgr_pcc_fwd_packet() sp=0xffcf8af8
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.