John Hardin wrote:

Wes Hardaker wrote:

On Mon, 02 May 2005 13:12:47 -0700, John Hardin <[EMAIL PROTECTED]> said:


John> It looks like the agent then segfaults when the snmpbulkget retries.


This code should have been executed in that case.  Did you see this
message in your log:

if (request || var) {
/*
* ack, this is bad. The # of varbinds don't match and
* there is no way to fix the problem */
if (pdu)
snmp_free_pdu(pdu);
snmp_log(LOG_ERR,
"response to proxy request illegal. We're screwed.\n");
netsnmp_set_request_error(cache->reqinfo, requests,
SNMP_ERR_GENERR);
}





Yes, I do see this.  (It's there in my perhaps overly lengthy 1st msg.)
I've been looking at this code for something left in a strange state but
I don't see anything yet.

I again but without using the bulkget.  Instead I sent an SNMPv1
getnext for the same two OIDs to snmpd.  Same problem.  Here's a
trace from just before the "we're screwed" log:

trace: proxy_got_response(): ucd-snmp/proxy.c, 519:
proxy: got response... SNMPv2-SMI::enterprises.3495.1.1.1.0
response to proxy request illegal.  We're screwed.
trace: _sess_read(): snmp_api.c, 5289:
sess_read: not reading 8 (fdset 0xbfffe0f0 set 0)
trace: _sess_read(): snmp_api.c, 5289:
sess_read: not reading 6 (fdset 0xbfffe0f0 set 0)
trace: _sess_read(): snmp_api.c, 5289:
sess_read: not reading 4 (fdset 0xbfffe0f0 set 0)
trace: snmp_sess_select_info(): snmp_api.c, 5701:
sess_select: for all sessions: 12 10 11 8 6 4
sess_select: next alarm -1073750920.1075483508 sec
sess_select: blocking:no session requests or alarms.
trace: receive(): snmpd.c, 1114:
snmpd/select: select( numfds=13, ..., tvp=(nil))
trace: receive(): snmpd.c, 1119:
snmpd/select: returned, count = 1
trace: netsnmp_udp_recv(): snmpUDPDomain.c, 132:
netsnmp_udp: recvfrom fd 12 got 61 bytes (from UDP: [127.0.0.1]:32776)
trace: _sess_process_packet(): snmp_api.c, 4971:
sess_process_packet: session 0x8100940 fd 12 pkt 0x81267b0 length 61

Received 61 bytes from UDP: [127.0.0.1]:32776
0000: 30 3B 02 01  00 04 06 70  75 62 6C 69  63 A1 2E 02    0;.....public...
0016: 04 47 CD 03  D5 02 01 00  02 01 00 30  20 30 0E 06    .G.........0 0..
0032: 0A 2B 06 01  04 01 9B 27  01 01 01 05  00 30 0E 06    .+.....'.....0..
0048: 0A 2B 06 01  04 01 9B 27  01 01 02 05  00             .+.....'.....

Received SNMP packet(s) from UDP: [127.0.0.1]:32776
dumpx_recv:02 01 00

dumpv_recv:  Integer:   0 (0x00)
trace: _snmp_parse(): snmp_api.c, 4024:
snmp_api: Parsing SNMPv1 message...
trace: _snmp_parse(): snmp_api.c, 4031:
dumph_recv: SNMPv1 message

trace: snmp_comstr_parse(): snmp_auth.c, 132:
dumph_recv:   SNMP version
dumpx_recv:    02 01 00

dumpv_recv:      Integer:       0 (0x00)
trace: snmp_comstr_parse(): snmp_auth.c, 144:
dumph_recv:   community string
dumpx_recv:    04 06 70 75 62 6C 69 63

dumpv_recv:      String:        public
trace: _snmp_parse(): snmp_api.c, 4074:
dumph_recv:   PDU
trace: snmp_pdu_parse(): snmp_api.c, 4260:
dumph_recv:     request_id
dumpx_recv:      02 04 47 CD 03 D5

dumpv_recv:        Integer:     1204618197 (0x47CD03D5)
trace: snmp_pdu_parse(): snmp_api.c, 4271:
dumph_recv:     error status
dumpx_recv:      02 01 00

dumpv_recv:        Integer:     0 (0x00)
trace: snmp_pdu_parse(): snmp_api.c, 4282:
dumph_recv:     error index
dumpx_recv:      02 01 00

dumpv_recv:        Integer:     0 (0x00)
trace: snmp_pdu_parse(): snmp_api.c, 4300:
dumph_recv:     VarBindList
trace: snmp_pdu_parse(): snmp_api.c, 4330:
dumph_recv:       VarBind
trace: snmp_parse_var_op(): snmp.c, 166:
dumph_recv:         Name
dumpx_recv:          06 0A 2B 06 01 04 01 9B 27 01 01 01

dumpv_recv:            ObjID: SNMPv2-SMI::enterprises.3495.1.1.1
trace: snmp_pdu_parse(): snmp_api.c, 4339:
dumph_recv:         Value
trace: snmp_pdu_parse(): snmp_api.c, 4330:
dumph_recv:       VarBind
trace: snmp_parse_var_op(): snmp.c, 166:
dumph_recv:         Name
dumpx_recv:          06 0A 2B 06 01 04 01 9B 27 01 01 02

dumpv_recv:            ObjID: SNMPv2-SMI::enterprises.3495.1.1.2
trace: snmp_pdu_parse(): snmp_api.c, 4339:
dumph_recv:         Value
 GETNEXT message
   -- SNMPv2-SMI::enterprises.3495.1.1.1
   -- SNMPv2-SMI::enterprises.3495.1.1.2
trace: init_agent_snmp_session(): snmp_agent.c, 1244:
snmp_agent: agent_sesion 0x80f18c0 created
Segmentation fault



-------------------------------------------------------
This SF.Net email is sponsored by: NEC IT Guy Games.
Get your fingers limbered up and give it your best shot. 4 great events, 4
opportunities to win big! Highest score wins.NEC IT Guy Games. Play to
win an NEC 61 plasma display. Visit http://www.necitguy.com/?r=20
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to