John Hardin wrote:
Wes Hardaker wrote:
On Mon, 02 May 2005 13:12:47 -0700, John Hardin
<[EMAIL PROTECTED]> said:
John> It looks like the agent then segfaults when the snmpbulkget
retries.
This code should have been executed in that case. Did you see this
message in your log:
if (request || var) {
/*
* ack, this is bad. The # of varbinds don't match and
* there is no way to fix the problem */
if (pdu)
snmp_free_pdu(pdu);
snmp_log(LOG_ERR,
"response to proxy request illegal. We're
screwed.\n");
netsnmp_set_request_error(cache->reqinfo, requests,
SNMP_ERR_GENERR);
}
Yes, I do see this. (It's there in my perhaps overly lengthy 1st msg.)
I've been looking at this code for something left in a strange state but
I don't see anything yet.
I again but without using the bulkget. Instead I sent an SNMPv1
getnext for the same two OIDs to snmpd. Same problem. Here's a
trace from just before the "we're screwed" log:
trace: proxy_got_response(): ucd-snmp/proxy.c, 519:
proxy: got response... SNMPv2-SMI::enterprises.3495.1.1.1.0
response to proxy request illegal. We're screwed.
trace: _sess_read(): snmp_api.c, 5289:
sess_read: not reading 8 (fdset 0xbfffe0f0 set 0)
trace: _sess_read(): snmp_api.c, 5289:
sess_read: not reading 6 (fdset 0xbfffe0f0 set 0)
trace: _sess_read(): snmp_api.c, 5289:
sess_read: not reading 4 (fdset 0xbfffe0f0 set 0)
trace: snmp_sess_select_info(): snmp_api.c, 5701:
sess_select: for all sessions: 12 10 11 8 6 4
sess_select: next alarm -1073750920.1075483508 sec
sess_select: blocking:no session requests or alarms.
trace: receive(): snmpd.c, 1114:
snmpd/select: select( numfds=13, ..., tvp=(nil))
trace: receive(): snmpd.c, 1119:
snmpd/select: returned, count = 1
trace: netsnmp_udp_recv(): snmpUDPDomain.c, 132:
netsnmp_udp: recvfrom fd 12 got 61 bytes (from UDP: [127.0.0.1]:32776)
trace: _sess_process_packet(): snmp_api.c, 4971:
sess_process_packet: session 0x8100940 fd 12 pkt 0x81267b0 length 61
Received 61 bytes from UDP: [127.0.0.1]:32776
0000: 30 3B 02 01 00 04 06 70 75 62 6C 69 63 A1 2E 02 0;.....public...
0016: 04 47 CD 03 D5 02 01 00 02 01 00 30 20 30 0E 06 .G.........0 0..
0032: 0A 2B 06 01 04 01 9B 27 01 01 01 05 00 30 0E 06 .+.....'.....0..
0048: 0A 2B 06 01 04 01 9B 27 01 01 02 05 00 .+.....'.....
Received SNMP packet(s) from UDP: [127.0.0.1]:32776
dumpx_recv:02 01 00
dumpv_recv: Integer: 0 (0x00)
trace: _snmp_parse(): snmp_api.c, 4024:
snmp_api: Parsing SNMPv1 message...
trace: _snmp_parse(): snmp_api.c, 4031:
dumph_recv: SNMPv1 message
trace: snmp_comstr_parse(): snmp_auth.c, 132:
dumph_recv: SNMP version
dumpx_recv: 02 01 00
dumpv_recv: Integer: 0 (0x00)
trace: snmp_comstr_parse(): snmp_auth.c, 144:
dumph_recv: community string
dumpx_recv: 04 06 70 75 62 6C 69 63
dumpv_recv: String: public
trace: _snmp_parse(): snmp_api.c, 4074:
dumph_recv: PDU
trace: snmp_pdu_parse(): snmp_api.c, 4260:
dumph_recv: request_id
dumpx_recv: 02 04 47 CD 03 D5
dumpv_recv: Integer: 1204618197 (0x47CD03D5)
trace: snmp_pdu_parse(): snmp_api.c, 4271:
dumph_recv: error status
dumpx_recv: 02 01 00
dumpv_recv: Integer: 0 (0x00)
trace: snmp_pdu_parse(): snmp_api.c, 4282:
dumph_recv: error index
dumpx_recv: 02 01 00
dumpv_recv: Integer: 0 (0x00)
trace: snmp_pdu_parse(): snmp_api.c, 4300:
dumph_recv: VarBindList
trace: snmp_pdu_parse(): snmp_api.c, 4330:
dumph_recv: VarBind
trace: snmp_parse_var_op(): snmp.c, 166:
dumph_recv: Name
dumpx_recv: 06 0A 2B 06 01 04 01 9B 27 01 01 01
dumpv_recv: ObjID: SNMPv2-SMI::enterprises.3495.1.1.1
trace: snmp_pdu_parse(): snmp_api.c, 4339:
dumph_recv: Value
trace: snmp_pdu_parse(): snmp_api.c, 4330:
dumph_recv: VarBind
trace: snmp_parse_var_op(): snmp.c, 166:
dumph_recv: Name
dumpx_recv: 06 0A 2B 06 01 04 01 9B 27 01 01 02
dumpv_recv: ObjID: SNMPv2-SMI::enterprises.3495.1.1.2
trace: snmp_pdu_parse(): snmp_api.c, 4339:
dumph_recv: Value
GETNEXT message
-- SNMPv2-SMI::enterprises.3495.1.1.1
-- SNMPv2-SMI::enterprises.3495.1.1.2
trace: init_agent_snmp_session(): snmp_agent.c, 1244:
snmp_agent: agent_sesion 0x80f18c0 created
Segmentation fault
-------------------------------------------------------
This SF.Net email is sponsored by: NEC IT Guy Games.
Get your fingers limbered up and give it your best shot. 4 great events, 4
opportunities to win big! Highest score wins.NEC IT Guy Games. Play to
win an NEC 61 plasma display. Visit http://www.necitguy.com/?r=20
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users