My Oracle Support Banner

Solaris 10 Update 10 system can panic if snoop and rcp commands are executed (Doc ID 1638727.1)

Last updated on FEBRUARY 04, 2019

Applies to:

Solaris Operating System - Version 10 8/11 U10 to 10 8/11 U10 [Release 10.0]
Oracle Solaris on x86-64 (64-bit)
Oracle Solaris on SPARC (64-bit)

Symptoms

Systems running Solaris 10 update 10 may panic with a panic messages similar to the following:

 

panic[cpu34]/thread=30091a11c20:
BAD TRAP: type=31 rp=2a1006b69d0 addr=0 mmu_fsr=0 occurred in module "dls" due to a NULL pointer dereference


bpbkar:
trap type = 0x31
pid=3052, pc=0x7bbe0100, sp=0x2a1006b6271, tstate=0x811001603, context=0xc
g1-g7: 7bbe5d88, 1, 30018cf1c38, b, 7bbde800, 10, 30091a11c20

000002a1006b66f0 unix:die+78 (31, 2a1006b69d0, 0, 0, 2a1006b67b0, 10a4c00)
  %l0-3: 0000000000001fff 0000000000000031 0000000001000000 0000000000002000
  %l4-7: 000000000183a368 000000000183a000 0000000000000000 0000000000000001
000002a1006b67d0 unix:trap+9e0 (2a1006b69d0, 0, 1fff, 5, 0, 1)
  %l0-3: 0000000000000000 000006008f80a508 0000000000000031 0000000000001c00
  %l4-7: 0000000000000000 0000000000000001 ffffffffffffe000 0000000000000005
000002a1006b6920 unix:ktl0+48 (0, 300f4e59bc0, 2a1006b6c50, 1, 0, 3002c14b2c0)
  %l0-3: 0000000000000004 0000000000001400 0000000811001603 000000000101c924
  %l4-7: 0000000000000000 00000000018eb340 0000000000000000 000002a1006b69d0
000002a1006b6a70 nxge:nxge_send+e0 (30018cc9788, 300f4e59bc0, 2a1006b6c50, 6, 300177a8420, 0)
  %l0-3: 000000007013f000 0000000000000058 000000000000000b 0000000000000005
  %l4-7: 00000300177a8450 0000030022711980 0000030018cf1a10 0000000000003a10
000002a1006b6b20 dls:i_dls_link_rx_common+60 (30018cc9788, 0, 300f4e59bc0, 7bbdec28, 8100, 2a1006b6c50)
  %l0-3: 0000000000000000 000002a1006b6c30 0000000000000000 0000000000000000
  %l4-7: 0000000000000001 0000030018cc98c0 0000000000000000 0000000000000000
000002a1006b6c80 mac:mac_txloop+ac (30018c39738, 0, 7bbdfa98, 1, 8, 1)
  %l0-3: 0000000000000000 0000000000000000 0000030018c39838 0000000000000000
  %l4-7: 000000007b25095c 000000007013f148 00000600899646e0 00000300f4e59bc0
000002a1006b6d30 aggr:aggr_m_tx+60 (300189e98c8, 300ef853780, 0, 1, 30018add2d8, 0)
  %l0-3: 0000000000000000 00000300189e9b60 0000000000000001 0000000000000002
  %l4-7: 000000007bbe5cdc 0000030018c39898 0000030018c32dc0 0000000000000008
000002a1006b6de0 dld:dld_tx_single+18 (300189ebaa0, 300ef853780, 0, 30018c395c8, 300189ebaa0, 0)
  %l0-3: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
  %l4-7: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
000002a1006b6e90 ip:tcp_send_data+890 (30038207368, 3003688e040, 1, 300f25aa0f4, 0, 3001426e000)
  %l0-3: 0000000000000038 0000030038207368 0000000000000000 00000300f25aa040
  %l4-7: 00000300ef853780 000000007bbdbce8 0000030018cd6000 0000030038207368
000002a1006b6fa0 ip:tcp_send+dec (4, 300b44291c0, 11b9, 0, 30014256000, 2a1006b7258)
  %l0-3: 0000000045023633 000002a1006b724c 000002a1006b725c 000002a1006b7250
  %l4-7: 00000300ef853780 00000300f25aa0f4 0000000000000000 0000000000000000
000002a1006b7160 ip:tcp_wput_data+7f0 (300b44291c0, 7fffffff, 45023633, fffffffffff647d8, 0, 20)
  %l0-3: 0000000000000034 00000000000022f4 0000000000000000 000006005bc95060
  %l4-7: 000002a1006b7258 000002a1006b724c 000002a1006b7250 00000000018bd1fc
000002a1006b7260 ip:tcp_rput_data+31ec (40000, 22f4, 0, 0, 30106d3f4c0, 0)
  %l0-3: 000000001464671d 0000000000002000 0000030014256000 00000300b44291c0
  %l4-7: 000006005a84fb80 00000000000647d8 00000000000647d8 0000000000000010
000002a1006b7440 ip:squeue_drain+130 (30106d3f4c0, 10, 41d246035a138, 300c3073d40, 30018cd6238, 0)
  %l0-3: 0000000000000011 0000000000000003 0000000000000000 0000000045023633
  %l4-7: 0000000000000000 00000300b4428fc0 00000300bb3ba440 000000007baca890
000002a1006b7500 ip:squeue_enter+348 (300c3073d40, 300bb3ba440, 7bad1afc, 300b4428fc0, 7, 0)
  %l0-3: 00000300b44291c0 0000000000000000 000000007bab3210 000000007bad1800
  %l4-7: 0000030106d3f4c0 0000000000000003 0000000000000002 0000000000000000
000002a1006b75b0 unix:putnext+218 (6005bc95158, 6005bc95060, 300bb3ba440, 100, 300b7f8bdf8, 0)
  %l0-3: 0000000000000000 0000000000000000 0000000000000000 0000000000005660
  %l4-7: 000000000000010d 00000000019ccd38 000000007bad2f20 fffffd5eff94e000
000002a1006b7660 genunix:strput+1d8 (6005a88f7f0, 0, 2a1006b7a98, 2a1006b7920, 0, 0)
  %l0-3: 00000300b7f8bdf8 0000000000000000 0000000000000000 0000000000000000
  %l4-7: 000000002024402e 000006005bc95060 0000000000000000 0000000000000000
000002a1006b7860 genunix:strwrite_common+21c (600664b7840, 2a1006b7a98, 10000, 0, 0, 1000000)
  %l0-3: 00000300b7f8bdf8 0000000000000003 0000000000000850 000002a1006b7920
  %l4-7: 0000000000000000 000006005a88f870 000006005a88f7f0 0000000000000005
000002a1006b7930 genunix:fop_write+20 (600664b7840, 2a1006b7a98, 0, 30091752f38, 0, 7bfa6a40)
  %l0-3: 0000000000080000 0000000000002420 0000000000002000 0000000000000009
  %l4-7: 0000030012304b00 0000030012304080 0000030012304568 0000000161e945ba
000002a1006b79e0 genunix:write+268 (1, 8058, 300b572bd88, 80000, 3, 1)
  %l0-3: 0000000000000000 00000600664b7840 0000000000000000 000000000000bb87
  %l4-7: 0000000000080000 0000005d8b5d0068 0000000000000000 0000000000000003

Changes

 snoop and rcp commands are run simultaneously.

Cause

To view full details, sign in with your My Oracle Support account.

Don't have a My Oracle Support account? Click to get started!


In this Document
Symptoms
Changes
Cause
Solution
References


My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.