Solaris 10 Update 10 system can panic if snoop and rcp commands are executed

(Doc ID 1638727.1)

Last updated on MARCH 24, 2014

Applies to:

Solaris SPARC Operating System - Version 10 8/11 U10 to 10 8/11 U10 [Release 10.0]
Oracle Solaris on x86-64 (64-bit)
Oracle Solaris on SPARC (64-bit)

Symptoms

Systems running Solaris 10 update 10 may panic with a panic messages similar to the following:

 

panic[cpu34]/thread=30091a11c20:
BAD TRAP: type=31 rp=2a1006b69d0 addr=0 mmu_fsr=0 occurred in module "dls" due to a NULL pointer dereference


bpbkar:
trap type = 0x31
pid=3052, pc=0x7bbe0100, sp=0x2a1006b6271, tstate=0x811001603, context=0xc
g1-g7: 7bbe5d88, 1, 30018cf1c38, b, 7bbde800, 10, 30091a11c20

000002a1006b66f0 unix:die+78 (31, 2a1006b69d0, 0, 0, 2a1006b67b0, 10a4c00)
  %l0-3: 0000000000001fff 0000000000000031 0000000001000000 0000000000002000
  %l4-7: 000000000183a368 000000000183a000 0000000000000000 0000000000000001
000002a1006b67d0 unix:trap+9e0 (2a1006b69d0, 0, 1fff, 5, 0, 1)
  %l0-3: 0000000000000000 000006008f80a508 0000000000000031 0000000000001c00
  %l4-7: 0000000000000000 0000000000000001 ffffffffffffe000 0000000000000005
000002a1006b6920 unix:ktl0+48 (0, 300f4e59bc0, 2a1006b6c50, 1, 0, 3002c14b2c0)
  %l0-3: 0000000000000004 0000000000001400 0000000811001603 000000000101c924
  %l4-7: 0000000000000000 00000000018eb340 0000000000000000 000002a1006b69d0
000002a1006b6a70 nxge:nxge_send+e0 (30018cc9788, 300f4e59bc0, 2a1006b6c50, 6, 300177a8420, 0)
  %l0-3: 000000007013f000 0000000000000058 000000000000000b 0000000000000005
  %l4-7: 00000300177a8450 0000030022711980 0000030018cf1a10 0000000000003a10
000002a1006b6b20 dls:i_dls_link_rx_common+60 (30018cc9788, 0, 300f4e59bc0, 7bbdec28, 8100, 2a1006b6c50)
  %l0-3: 0000000000000000 000002a1006b6c30 0000000000000000 0000000000000000
  %l4-7: 0000000000000001 0000030018cc98c0 0000000000000000 0000000000000000
000002a1006b6c80 mac:mac_txloop+ac (30018c39738, 0, 7bbdfa98, 1, 8, 1)
  %l0-3: 0000000000000000 0000000000000000 0000030018c39838 0000000000000000
  %l4-7: 000000007b25095c 000000007013f148 00000600899646e0 00000300f4e59bc0
000002a1006b6d30 aggr:aggr_m_tx+60 (300189e98c8, 300ef853780, 0, 1, 30018add2d8, 0)
  %l0-3: 0000000000000000 00000300189e9b60 0000000000000001 0000000000000002
  %l4-7: 000000007bbe5cdc 0000030018c39898 0000030018c32dc0 0000000000000008
000002a1006b6de0 dld:dld_tx_single+18 (300189ebaa0, 300ef853780, 0, 30018c395c8, 300189ebaa0, 0)
  %l0-3: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
  %l4-7: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
000002a1006b6e90 ip:tcp_send_data+890 (30038207368, 3003688e040, 1, 300f25aa0f4, 0, 3001426e000)
  %l0-3: 0000000000000038 0000030038207368 0000000000000000 00000300f25aa040
  %l4-7: 00000300ef853780 000000007bbdbce8 0000030018cd6000 0000030038207368
000002a1006b6fa0 ip:tcp_send+dec (4, 300b44291c0, 11b9, 0, 30014256000, 2a1006b7258)
  %l0-3: 0000000045023633 000002a1006b724c 000002a1006b725c 000002a1006b7250
  %l4-7: 00000300ef853780 00000300f25aa0f4 0000000000000000 0000000000000000
000002a1006b7160 ip:tcp_wput_data+7f0 (300b44291c0, 7fffffff, 45023633, fffffffffff647d8, 0, 20)
  %l0-3: 0000000000000034 00000000000022f4 0000000000000000 000006005bc95060
  %l4-7: 000002a1006b7258 000002a1006b724c 000002a1006b7250 00000000018bd1fc
000002a1006b7260 ip:tcp_rput_data+31ec (40000, 22f4, 0, 0, 30106d3f4c0, 0)
  %l0-3: 000000001464671d 0000000000002000 0000030014256000 00000300b44291c0
  %l4-7: 000006005a84fb80 00000000000647d8 00000000000647d8 0000000000000010
000002a1006b7440 ip:squeue_drain+130 (30106d3f4c0, 10, 41d246035a138, 300c3073d40, 30018cd6238, 0)
  %l0-3: 0000000000000011 0000000000000003 0000000000000000 0000000045023633
  %l4-7: 0000000000000000 00000300b4428fc0 00000300bb3ba440 000000007baca890
000002a1006b7500 ip:squeue_enter+348 (300c3073d40, 300bb3ba440, 7bad1afc, 300b4428fc0, 7, 0)
  %l0-3: 00000300b44291c0 0000000000000000 000000007bab3210 000000007bad1800
  %l4-7: 0000030106d3f4c0 0000000000000003 0000000000000002 0000000000000000
000002a1006b75b0 unix:putnext+218 (6005bc95158, 6005bc95060, 300bb3ba440, 100, 300b7f8bdf8, 0)
  %l0-3: 0000000000000000 0000000000000000 0000000000000000 0000000000005660
  %l4-7: 000000000000010d 00000000019ccd38 000000007bad2f20 fffffd5eff94e000
000002a1006b7660 genunix:strput+1d8 (6005a88f7f0, 0, 2a1006b7a98, 2a1006b7920, 0, 0)
  %l0-3: 00000300b7f8bdf8 0000000000000000 0000000000000000 0000000000000000
  %l4-7: 000000002024402e 000006005bc95060 0000000000000000 0000000000000000
000002a1006b7860 genunix:strwrite_common+21c (600664b7840, 2a1006b7a98, 10000, 0, 0, 1000000)
  %l0-3: 00000300b7f8bdf8 0000000000000003 0000000000000850 000002a1006b7920
  %l4-7: 0000000000000000 000006005a88f870 000006005a88f7f0 0000000000000005
000002a1006b7930 genunix:fop_write+20 (600664b7840, 2a1006b7a98, 0, 30091752f38, 0, 7bfa6a40)
  %l0-3: 0000000000080000 0000000000002420 0000000000002000 0000000000000009
  %l4-7: 0000030012304b00 0000030012304080 0000030012304568 0000000161e945ba
000002a1006b79e0 genunix:write+268 (1, 8058, 300b572bd88, 80000, 3, 1)
  %l0-3: 0000000000000000 00000600664b7840 0000000000000000 000000000000bb87
  %l4-7: 0000000000080000 0000005d8b5d0068 0000000000000000 0000000000000003

Changes

This issue might occur on Solaris 10 Update 10 system without bug 15729702 fix if snoop and rcp commands are run simultaneously.

Cause

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms