Sun System Handbook - ISO 3.4 June 2011 Internal/Partner Edition | |||
|
|
Solution Type Sun Alert Sure Solution 1000860.1 : Certain SAN Switches May Reboot Following "break" Sequences Received on the Serial Port
PreviouslyPublishedAs 201141 Product Sun StorageTek 3900 Series Bug Id <SUNBUG: 6238769> Date of Workaround Release 16-MAY-2005 Date of Resolved Release 31-Mar-2008 Certain Brocade switches (listed below) that are running Fabric Operating System (FOS) version 4.x or 5.x may reboot ... see below for details: 1. Impact Certain Brocade switches (listed below) that are running Fabric Operating System (FOS) version 4.x or 5.x may reboot when a "break'" sequence followed by an ascii character is issued on the switch serial port. Plugging the serial console port of the switch into a terminal server may also cause a "break" and character sequence interpreted by the switch, leading to temporary loss of connectivity to SAN devices. 2. Contributing Factors This issue can occur on any hardware platforms connected to the following Brocade switch models:
Note: Brocade SilkWorm switches running FOS 2.x or 3.x are not affected by this issue. 3. Symptoms If the described issue occurs, the switch will reboot resulting in temporary loss of connectivity to SAN devices. 4. Workaround Depending on the break sequence sent to the switch, the switch may automatically reboot. This should complete normally, however it is possible that the boot sequence may be interrupted by the receipt of an "escape" character on the serial port. This will result in the following interactive menu to be entered: Press escape within 4 seconds to enter boot interface. 1) Start system. 2) Recover password. 3) Enter command shell. Option? Should the above menu be entered (following "escape" key used during reboot), select option 1. To work around the described issue, one of the following options may be used: Option 1: Login as root and issue the following command: # echo "0" > /proc/sys/kernel/sysrq For the 12000 and 24000 switches, the workaround must be applied to both CP boards. This workaround is not persistent across reboots and will need to be reapplied if required. Option 2: Disconnect the serial port following the initial switch IP configuration. Use LAN/IP for subsequent configuration, monitoring and management. 5. Resolution There are no further updates planned for this Sun Alert document. If
Modification History 31-Mar-2008: no further updates. Resolved. 25-MAY-2006: Updated Contributing Factors section Previously Published As 101685 Internal Comments The Silkworm switches on FabOS 4.x/5.x run the Linux operating system. An optional part of the Linux kernel is the "CONFIG_MAGIC_SYSRQ" feature which enables a diagnostic facility. When the "break" character sequence that matches one of the "CONFIG_MAGIC_SYSRQ" definitions is received by the switch, the switch will execute that function. Other operating systems have similar concepts (Solaris Stop-A) which can normally be disabled either by HW or SW/configuration. See the appropriate bug ref for more information. Internal Contributor/submitter brian.austin@sun.com Internal Eng Business Unit Group NWS (Network Storage) Internal Eng Responsible Engineer brian.austin@sun.com Internal Services Knowledge Engineer jeff.folla@sun.com Internal Escalation ID 1-7189660 Internal Sun Alert Kasp Legacy ID 101685, 57778 (Sun Alert) Internal Sun Alert & FAB Admin Info Critical Category: Availability ==> Pervasive Significant Change Date: 2005-05-16 Avoidance: Workaround Responsible Manager: Karl-Heinz.Wegener@Sun.COM Original Admin Info: [WF 01-Nov-2005, Jeff Folla: Changed audience from contract to free.] This document has been imported from KMS Creator and may need adjustment before re-publishing. This imported document has been reviewed/adjusted by: Review Name: Review Date: Original KMS Creator attributes below: --- PLEASE DO NOT MAKE ANY CHANGES BELOW THIS LINE! --- Sun Alert ID: 57778 Synopsis: Certain SAN Switches May Reboot Following "break" Sequences Received on the Serial Port Category: Availability Product: Brocade SilkWorm Switches 3250/3850/3900/4100/12000/24000 BugIDs: 6238769 Avoidance: Workaround State: Committed Date Released: 16-May-2005 Date Closed: Date Modified: Escalation IDs: 1-718966 Pending Patches: Resolution Patches: FIN: FCO: Date Submitted: 19-Apr-2005 Submitter: brian.austin@sun.com Responsible Engineer: brian.austin@sun.com Responsible Manager: Karl-Heinz.Wegener@Sun.COM CTE group: NWS Responsible Writer: jeff.folla@sun.com Distribution: Contract SunSolve Workflow History: WF State: Issued, 16-May-2005, Jeff Folla WF Note: Received Brocade approval. Sending for release. WF State: Draft, 10-May-2005, Jeff Folla WF Note: 5/10: Sent follow-up e-mail to Jerry requesting status on brocades approval. WF State: Draft, 10-May-2005, Jeff Folla WF Note: 5/3 : Jerry Chen who reviews the Brocade Sun Alerts informed me that Brocade had some questions they wanted to ask the Responsible Engineer. He will let me know once this is approved by Brocade. WF State: Draft, 03-May-2005, Jeff Folla WF Note: Awaiting Brocade approval WF State: Draft, 29-Apr-2005, Jeff Folla WF Note: Sent for brocade approval WF State: Draft, 29-Apr-2005, Jeff Folla WF Note: Sent for review on 4/28 WF State: Draft, 27-Apr-2005, Jeff Folla WF Note: Sent to submitter for review. WF State: Draft, 26-Apr-2005, Jeff Folla WF Note: Article created. Exported from KMS Creator Sat May 21 09:18:09 2005 GMT, olaf.reineke@sun.com Product_uuid 04ccc2c2-16a1-11d7-9f9a-f83fdd2e2f1b|Sun StorageTek 3900 Series Attachments This solution has no attachment |
||||||||||||
|