On Feb 10, 2014, at 1:17 PM, Richard PALO <richard.p...@free.fr> wrote:

> This is the first time I've come across this:
>> panic[cpu1]/thread=ffffff02e79e7880:
>> assertion failed: !IN6_IS_ADDR_V4MAPPED(dst_addr), file: 
>> ../../common/inet/ip/ip6.c, line: 1984
>> 
>> 
>> ffffff0010671340 genunix:process_type+162480 ()
>> ffffff0010671440 ip:ip_set_destination_v6+4a9 ()
>> ffffff0010671500 ip:ip_attr_connect+147 ()
>> ffffff00106715c0 ip:conn_connect+10f ()
>> ffffff0010671650 ip:tcp_set_destination+70 ()
>> ffffff0010671720 ip:tcp_input_listener+c1a ()
>> ffffff00106717c0 ip:squeue_enter+963 ()
>> ffffff0010671880 ip:ip_fanout_v6+97f ()
>> ffffff0010671b00 ip:ire_send_local_v6+44c ()
>> ffffff0010671b80 ip:conn_ip_output+2bc ()
>> ffffff0010671bb0 ip:tcp_send_data+80 ()
>> ffffff0010671c60 ip:tcp_do_connect+430 ()
>> ffffff0010671d40 ip:tcp_connect+c9 ()
>> ffffff0010671de0 sockfs:so_connect+fe ()
>> ffffff0010671e30 sockfs:socket_connect+3c ()
>> ffffff0010671eb0 sockfs:connect+b1 ()
>> ffffff0010671f00 unix:brand_sys_syscall32+272 ()
>> 

This stack trace is from a connect(3xn/3c/3socket) call.  You can/should be 
able to figure out the process and to which destination from the core dump.

Are you running a DEBUG kernel or at least a DEBUG IP module?  You must be for 
an ASSERT() to trip...

>> 
>>      ill_t           *ill = NULL;
>>      boolean_t       multirt = B_FALSE;
>> 
>>      ASSERT(!IN6_IS_ADDR_V4MAPPED(dst_addr));
>> 
>>      ASSERT(!(ixa->ixa_flags & IXAF_IS_IPV4));
> 
> Any clues on what to look for?  Anything new in this area that might be 
> suspect?

I'd be very interested to know what the destination IP was, etc. etc.

Dan



-------------------------------------------
illumos-discuss
Archives: https://www.listbox.com/member/archive/182180/=now
RSS Feed: https://www.listbox.com/member/archive/rss/182180/21175430-2e6923be
Modify Your Subscription: 
https://www.listbox.com/member/?member_id=21175430&id_secret=21175430-6a77cda4
Powered by Listbox: http://www.listbox.com

Reply via email to