From: SourceForge.net <no...@so...> - 2010-06-21 09:14:16
|
Bugs item #3018963, was opened at 2010-06-21 11:14 Message generated for change (Tracker Item Submitted) made by johje349 You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=112694&aid=3018963&group_id=12694 Please note that this message will contain a full copy of the comment thread, including the initial issue submission, for this request, not just the latest update. Category: agent Group: solaris Status: Open Resolution: None Priority: 5 Private: No Submitted By: johje349 (johje349) Assigned to: Nobody/Anonymous (nobody) Summary: Solaris kernel panic in module "ip" Initial Comment: A host running Solaris on SPARC suddenly rebooted. Unable to reproduce the problem, it has happened twice in the last month. Net-snmp version: 5.4.2.1 Solaris version: SunOS 5.10 Generic_142900-06 sun4v sparc SUNW,Sun-Fire-T200 Solaris distribution: Solaris 10 10/09 s10s_u8wos_08a SPARC Message buffer: panic[cpu15]/thread=3000ae7b280: BAD TRAP: type=31 rp=2a10160f1b0 addr=c mmu_fsr=0 occurred in module "ip" due to a NULL pointer dereference snmpd: trap type = 0x31 addr=0xc pid=318, pc=0x7baec800, sp=0x2a10160ea51, tstate=0x4480001602, context=0x1c g1-g7: 2, 41, 14a, 14c1, 4, 0, 3000ae7b280 000002a10160eed0 unix:die+78 (31, 2a10160f1b0, c, 0, 2a10160ef90, 10ae000) %l0-3: 0000000000000000 0000000000000031 0000000001000000 0000000000002000 %l4-7: 00000000018323a8 0000000001832000 0000000000000005 0000000000000001 000002a10160efb0 unix:trap+9e4 (2a10160f1b0, 0, 5, 1c00, 0, 1) %l0-3: 0000000000000000 000006002da050e8 0000000000000031 0000000000000000 %l4-7: ffffffffffffe000 0000000000000000 0000000000000005 0000000000000001 000002a10160f100 unix:ktl0+64 (6002fddfb40, 0, 2000000, 60025334c50, 10d0, 2) %l0-3: 00000300051ec000 0000000000000078 0000004480001602 000000000101fa84 %l4-7: 0000000000000c50 0000000000000000 0000000000000000 000002a10160f1b0 000002a10160f250 ip:udp_snmp_get+188 (14, 30, 6002fddfb40, 0, 2, 0) %l0-3: 0000060025334c50 00000000000000c5 00000300277f6a40 000003001adc7300 %l4-7: 0000000000000c50 0000000000000000 0000000000000009 0000000000000000 000002a10160f3e0 ip:snmpcom_req+350 (6002d9050c8, 3001660e740, 300149345c0, 7baec650, 16, 0) %l0-3: 000000000000000c 0000000000000001 0000000000000001 0000000000000000 %l4-7: 000003002c81d970 0000000000000020 0000000000000010 0000000000000000 000002a10160f490 ip:ip_snmpmod_wput+e4 (6002d9050c8, 3001660e740, 7bad0000, 7baec400, 7baecc00, 600214100b8) %l0-3: 00000300279c5cc0 000000000000001c 00000300279c5d4c 0000000000000009 %l4-7: 000006002594ba40 0000000000020004 0000000000040000 fffffd5efe9f6000 000002a10160f540 unix:putnext+218 (6002d9051c0, 6002d9050c8, 3001660e740, 100, 600273988c0, 0) %l0-3: 0000000000000000 0000000000000000 0000000000000000 00000000000055f0 %l4-7: 000000000000010d 000000000197b160 000000007ba0b3e0 fffffd5efe9f6000 000002a10160f5f0 genunix:strput+1d8 (600275c3c30, 3001660e740, 13e, 3001660e740, 6002c1927d0, 0) %l0-3: 00000600273988c0 0000000000000004 0000000000000000 0000000000000000 %l4-7: 00000300279c5cc0 000006002da050e8 0000000000000000 0000000000000000 000002a10160f7f0 genunix:strputmsg+2d4 (1c, 2a10160f9e8, 2a10160f9c8, 0, 2a10160f8c8, 3) %l0-3: 000002a10160f8d0 0000000000000000 00000600275c3cb0 0000000000000004 %l4-7: 0000000000000000 00000600273988c0 00000600275c3c30 000002a10160f8a8 000002a10160f900 genunix:msgio32+354 (6, 4, 3, 2a10160fad8, 60025cd0af8, 2a10160fadf) %l0-3: 0000000000000000 000000000000a000 000000000000001c 00000000010513ac %l4-7: 0000000000000004 0000000000000002 0000060025c9a300 000006002c982ec0 000002a10160fa10 genunix:putmsg32+98 (6, ffbf55b0, 0, 0, 4, 2a10160fad4) %l0-3: 000000000100954c 000002a10160fb90 000006002c982ec0 00000000010513ac %l4-7: 00000000018a7708 0000000000000001 000003000ae7b280 000002a10160fb90 syncing file systems... done dumping to /dev/zvol/dsk/rpool/dump, offset 65536, content: kernel Stack trace: 000002a10160ea51 udp_snmp_get+0x1b0(14, 30, 6002fddfb40, 0, 2, 0) 000002a10160ebe1 snmpcom_req+0x350(6002d9050c8, 3001660e740, 300149345c0, 7baec650, 16, 0) 000002a10160ec91 ip_snmpmod_wput+0xe4(6002d9050c8, 3001660e740, 7bad0000, 7baec400, 7baecc00, 600214100b8) 000002a10160ed41 putnext+0x218(6002d9051c0, 6002d9050c8, 3001660e740, 100, 600273988c0, 0) 000002a10160edf1 strput+0x1d8(600275c3c30, 3001660e740, 13e, 3001660e740, 6002c1927d0, 0) 000002a10160eff1 strputmsg+0x2d4(1c, 2a10160f9e8, 2a10160f9c8, 0, 2a10160f8c8, 3) 000002a10160f101 msgio32+0x354(6, 4, 3, 2a10160fad8, 60025cd0af8, 2a10160fadf) 000002a10160f211 putmsg32+0x98(6, ffbf55b0, 0, 0, 4, 2a10160fad4) 000002a10160f2e1 syscall_trap32+0xcc(6, 1ffbf55b0, 0, 0, ff28e7e8, ffbff770) ---------------------------------------------------------------------- You can respond by visiting: https://sourceforge.net/tracker/?func=detail&atid=112694&aid=3018963&group_id=12694 |