Guest

Preview Tool

Cisco Bug: CSCvs73915 - Fix has been provided for the crash in whatsapp,

Last Modified

Apr 24, 2020

Products (2)

  • Cisco ASR 5000 Series
  • Cisco ASR 5500

Known Affected Releases

21.12.9

Description (partial)

Symptom:
SW Version          : 21.12.9
Similar Crash Count : 1
Time of First Crash : 2019-Dec-28+16:21:21

Fatal Signal 11: Segmentation fault
  PC: [f30ae318/X] libp2p-2.41.1091.so/ipoque_search_whatsapp()
  Faulty address: 0xd4b3ba5d
  Signal from: kernel
  Signal detail: address not mapped to object
  Process: card=1 cpu=0 arch=X pid=10003 cpu=~29% argv0=sessmgr
  Crash time: 2019-Dec-28+15:21:21 UTC
  Recent errno: 11 Resource temporarily unavailable
  Build_number: 72306
  Stack (15960@0x0xffbd5000):
    [f30ae318/X] libp2p-2.41.1091.so/ipoque_search_whatsapp() sp=0xffbd57f8
    [f2f9a23c/X] libp2p-2.41.1091.so/ipoque_detection_process_packet_slowpath() sp=0xffbd5988
    [f2f9d20b/X] libp2p-2.41.1091.so/ipoque_detection_process_packet() sp=0xffbd59c8
    [f3134db1/X] libp2p-2.41.1091.so/plugin_p2p_api_inspect.isra.72() sp=0xffbd5a38
    [09a0e0ea/X] acs_p2p_pkt_inspection() sp=0xffbd5b78
    [0989c5eb/X] acsmgr_process_p2p_post_tcp_dpi() sp=0xffbd5be8
    [09917792/X] acsmgr_process_tcp_packet() sp=0xffbd6118
    [0991e810/X] acs_process_tcp_packet_normal_path() sp=0xffbd6168
    [0991e9af/X] acs_tcp_analyzer() sp=0xffbd61e8
    [09852354/X] do_acsmgr_process_packet() sp=0xffbd62e8
    [09852849/X] acsmgr_process_packet() sp=0xffbd6378
    [098f7f3a/X] acs_ip_normal_path() sp=0xffbd6418
    [0975b149/X] acsmgr_data_receive_merge_mode() sp=0xffbd68e8
    [0975ee56/X] acs_handle_datapath_events_from_sm_interface() sp=0xffbd6918
    [0395397d/X] sessmgr_sef_initiate_data_packet_ind() sp=0xffbd6a78
    [03953b01/X] sessmgr_pcc_intf_send_data_packet_ind() sp=0xffbd6b18
    [0653aefe/X] sessmgr_pcc_fwd_packet() sp=0xffbd6b88
    [065f6043/X] sessmgr_ipv4_process_user_pkt_pgw_ggsn.isra.290() sp=0xffbd7188
    [044b5a43/X] sessmgr_pgw_handle_inbound_data_packet() sp=0xffbd7268
    [064f0b16/X] sessmgr_egtpu_collapsed_receive_gtpu_packet() sp=0xffbd76f8
    [0437fd35/X] sessmgr_egtpu_collapsed_dispatch_routine() sp=0xffbd7b18
    [08574a8d/X] egtpu_process_user_data_packet() sp=0xffbd7c28
    [04242b0a/X] sessmgr_sgw_egtpu_dispatch() sp=0xffbd7ed8
    [064ec3c7/X] sessmgr_egtpu_receive_gtpu_packet() sp=0xffbd8368
  Last Bounce:
    Src: sessmgr (f=87000,i=5037)
    Dst:  (f=79000,i=10,m=335686)
    ID:  0x21cd01005d776685
    Input:  SN_MSG_TYPE_NONE
    Output: cf_status_rsp
    Callback: [09409e80/X] tsi_cf_status_cb()
    Class: MEDIUM
    Flavour: NONBLOCKING REMOTE UNICAST 
    TCP: connct=0 elapsed=0ms code=NS_MISSING (Peer is not present)
    Nameservice: valid=0 age=0 card=0 cpu=0 pid=0 debug=0
  Registers:
          gs       fs       es       ds
    00000063 00000000 0000002b 0000002b
         edi      esi      ebp      esp
    d829947a 00000000 ffbd57f8 ffbd5720
         ebx      edx      ecx      eax
    f319ca98 f2ee6008 00000008 d4b3ba5d
        trap      err      eip       cs
    0000000e 00000004 f30ae318 00000023
         efl     uesp       ss
    00210202 ffbd5720 0000002b
  Recent inbound med header (40@0x0xec22310c):
       0: 4000019405064180 0001c36e01a34b15 @.....A. ...n..K.
      16: 0100000000020b00 0000000000000000 ........ ........
      32: 0000000000000000                  ........         
  Recent inbound med packet (364@0x0xec223134):
       0: 4500016c35a90000 f9114dfa0ae815d2 E..l5... ..M.....
      16: 0a18120c08680868 0158000030ff0148 .....h.h .X..0..H
      32: 820f635345000148 2a6540004006ab82 ..cSE..H *e@.@...
      48: 64409f491f0d4132 92920050d643b0c4 d@.I..A2 ...P.C..
      64: 58e6d7fa8018013f 620700000101080a X......? b.......
      80: 01759cd1d5f86cfd 3130640d0a454400 .u....l. 10d..ED.
      96: 0100000408080805 574103000000fb12 ........ WA......
     112: f8010a20813d742b cd4f59af30a454a1 ... .=t+ .OY.0.T.
     128: 3cc8abec7c18f881 9ee2bbf6636089fa <...|... ....c`..
     144: 335a557312307b2a 4f81022d0aadbd21 3ZUs.0{* O..-...!
     160: 373b8294fbb0c382 ae23b08fcb482e64 7;...... .#...H.d
     176: 90bc65db3b8888c8 24217bb0dd44eb4a ..e.;... $!{..D.J
     192: 98ab0b8c99ca1aa1 011ac987ca7d2fe7 ........ .....}/.
     208: 704ea60bd9563234 7f9eb70b0ea1ad6a pN...V24 .......j
     224: fc880397bbd53a33 ab3444b8b4a7445c ......:3 .4D...D\
     240: 8c08abe83dcfcf9d 2ba4d0e7b2f12b82 ....=... +.....+.
     256: 58167284d43c6bd6 c2c719ee46df890a X.r..<k. ....F...
     272: ac39157c8fbabafe 6cde4d2c813a9011 .9.|.... l.M,.:..
     288: f79822e0ac77011b 5e8c58f9fb74446b .."..w.. ^.X..tDk
     304: 76bd19f4702fa314 2a31105d42141c00 v...p/.. *1.]B...
     320: 710a9a174eb75210 b0f28bf92a511d52 q...N.R. ....*Q.R
     336: e4b5c95c53606e42 889037e3539ebde8 ...\S`nB ..7.S...
     352: 076786c48b5dcc82 a8e00d0a         .g...].. ....

Conditions:
Unknown
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.