Loading...
Loading...
Router#sh processes cpu sorted CPU utilization for five seconds: 100%/1%; one minute: 99%; five minutes: 98% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 131 764804355 736609615 1038 92.69% 84.84% 83.05% 0 IOSXE-RP Punt Se
After enabling ipv6 on his environment customer observed high CPU on the device. Following that we can see that IOSXE-RP Punt Service has been overutilizing the CPU, sometimes reaching over 90% for an extended period.
There is no known workaround.
From the outputs of the device we can see that there is no ipv6 interface enabled and we believe that the traffic might be punted to the CPU with no use hence overloading it. Collecting a packet capture showed us that on 130k packets collected only 5% of those were ipv6 and almost all of them were ICMPv6 with ?packet_too_big?message. The question is if those packets are causing that high CPU or if there could be something else that we are missing cause we don’t see any unexpected behavior on ipv6 packets. It’s important to note that once CU disabled ipv6 CPU utilization went back to normal levels (under 20%). PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels. If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Cisco Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.