We are using cross compiled <wrl_linux 2.6.10> snmpd(5.4) in our product. While doing random testing, we see following crash in snmpd. Can any one see this kind of issue before. If so can you please let me know is there any fix/work around available for the same.
gdb snmpd /mnt/sda2/core.26710.snmpd Core was generated by `snmpd -I -ipAddressTable -f -C -c /mnt/sda2/platform_manager/etc/snmpd.conf'. Program terminated with signal 11, Segmentation fault. isdelegated=0) at agent_handler.c:752 752 agent_handler.c: No such file or directory. in agent_handler.c (gdb) bt #0 netsnmp_handler_mark_requests_as_delegated (requests=0x82010401, isdelegated=0) at agent_handler.c:752 #1 0xb7eb31fe in agentx_got_response (operation=135561640, session=0x821e9b0, reqid=1525334, pdu=0x8131bf8, magic=0x85adb00) at mibgroup/agentx/master.c:260 #2 0xb7e124c0 in snmp_sess_timeout (sessp=0x81481a8) at snmp_api.c:6213 #3 0xb7e12649 in snmp_timeout () at snmp_api.c:6025 #4 0x0804bf92 in main (argc=7, argv=0xbfffd834) at snmpd.c:1178 (gdb) print requests $1 = (netsnmp_request_info *) 0x82010401 (gdb) print *requests Cannot access memory at address 0x82010401 (gdb) frame 1 #1 0xb7eb31fe in agentx_got_response (operation=135561640, session=0x821e9b0, reqid=1525334, pdu=0x8131bf8, magic=0x85adb00) at mibgroup/agentx/master.c:260 (gdb) print session $2 = (netsnmp_session *) 0x821e9b0 (gdb) print *session $3 = {version = 193, retries = 2, timeout = 10000000, flags = 384, subsession = 0x897c558, next = 0x0, peername = 0x81017d0 "", remote_port = 0, localname = 0x0, local_port = 705, authenticator = 0, callback = 0xb7ec6ea0 <handle_master_agentx_packet>, callback_magic = 0x0, s_errno = 0, s_snmp_errno = 0, sessid = 31, community = 0x92b4360 "", community_len = 0, rcvMsgMaxSize = 2147483647, sndMsgMaxSize = 0, isAuthoritative = 0 '\0', contextEngineID = 0x0, contextEngineIDLen = 0, engineBoots = 0, engineTime = 0, contextName = 0x985c9c8 "", contextNameLen = 0, securityEngineID = 0x0, securityEngineIDLen = 0, securityName = 0x0, securityNameLen = 0, securityAuthProto = 0x8112090, securityAuthProtoLen = 10, securityAuthKey = '\0' <repeats 31 times>, securityAuthKeyLen = 0, securityAuthLocalKey = 0x0, securityAuthLocalKeyLen = 0, securityPrivProto = 0x8dda3a0, securityPrivProtoLen = 10, securityPrivKey = '\0' <repeats 31 times>, securityPrivKeyLen = 0, securityPrivLocalKey = 0x0, securityPrivLocalKeyLen = 0, securityModel = 3, securityLevel = 1, paramName = 0x0, securityInfo = 0x0, myvoid = 0x846d5d8} (gdb) print *pdu $4 = {version = 193, command = 5, reqid = 1525334, msgid = 1665052935, transid = 1525333, sessid = 32, errstat = -1, errindex = -1, time = 0, flags = 512, securityModel = -1, securityLevel = 0, msgParseModel = 0, transport_data = 0x0, transport_data_length = 0, tDomain = 0x0, tDomainLen = 0, variables = 0x8131c90, community = 0x0, community_len = 0, enterprise = 0x0, enterprise_length = 0, trap_type = 0, specific_type = 0, agent_addr = "\000\000\000", contextEngineID = 0x0, contextEngineIDLen = 0, contextName = 0x0, contextNameLen = 0, securityEngineID = 0x0, securityEngineIDLen = 0, securityName = 0x0, securityNameLen = 0, priority = 0, range_subid = 0, securityStateRef = 0x0} ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ _______________________________________________ Net-snmp-coders mailing list Net-snmp-coders@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/net-snmp-coders