We are using cross compiled <wrl_linux 2.6.10> snmpd(5.4) in our
product. While doing random testing, we see following crash in snmpd.
Can any one see this kind of issue before. If so can you please let me
know is there any fix/work around available for the same.


gdb snmpd /mnt/sda2/core.26710.snmpd
Core was generated by `snmpd -I -ipAddressTable -f -C
-c /mnt/sda2/platform_manager/etc/snmpd.conf'.
Program terminated with signal 11, Segmentation fault.
    isdelegated=0) at agent_handler.c:752
752     agent_handler.c: No such file or directory.
        in agent_handler.c
(gdb) bt
#0  netsnmp_handler_mark_requests_as_delegated (requests=0x82010401,
    isdelegated=0) at agent_handler.c:752
#1  0xb7eb31fe in agentx_got_response (operation=135561640,
session=0x821e9b0,
    reqid=1525334, pdu=0x8131bf8, magic=0x85adb00)
    at mibgroup/agentx/master.c:260
#2  0xb7e124c0 in snmp_sess_timeout (sessp=0x81481a8) at snmp_api.c:6213
#3  0xb7e12649 in snmp_timeout () at snmp_api.c:6025
#4  0x0804bf92 in main (argc=7, argv=0xbfffd834) at snmpd.c:1178
(gdb) print requests
$1 = (netsnmp_request_info *) 0x82010401
(gdb) print *requests
Cannot access memory at address 0x82010401
(gdb) frame 1
#1  0xb7eb31fe in agentx_got_response (operation=135561640,
session=0x821e9b0,
    reqid=1525334, pdu=0x8131bf8, magic=0x85adb00)
    at mibgroup/agentx/master.c:260
(gdb) print session
$2 = (netsnmp_session *) 0x821e9b0
(gdb) print *session
$3 = {version = 193, retries = 2, timeout = 10000000, flags = 384,
  subsession = 0x897c558, next = 0x0, peername = 0x81017d0 "",
  remote_port = 0, localname = 0x0, local_port = 705, authenticator = 0,
  callback = 0xb7ec6ea0 <handle_master_agentx_packet>, callback_magic =
0x0,
  s_errno = 0, s_snmp_errno = 0, sessid = 31, community = 0x92b4360 "",
  community_len = 0, rcvMsgMaxSize = 2147483647, sndMsgMaxSize = 0,
  isAuthoritative = 0 '\0', contextEngineID = 0x0, contextEngineIDLen =
0,
  engineBoots = 0, engineTime = 0, contextName = 0x985c9c8 "",
  contextNameLen = 0, securityEngineID = 0x0, securityEngineIDLen = 0,
  securityName = 0x0, securityNameLen = 0, securityAuthProto =
0x8112090,
  securityAuthProtoLen = 10, securityAuthKey = '\0' <repeats 31 times>,
  securityAuthKeyLen = 0, securityAuthLocalKey = 0x0,
  securityAuthLocalKeyLen = 0, securityPrivProto = 0x8dda3a0,
  securityPrivProtoLen = 10, securityPrivKey = '\0' <repeats 31 times>,
  securityPrivKeyLen = 0, securityPrivLocalKey = 0x0,
  securityPrivLocalKeyLen = 0, securityModel = 3, securityLevel = 1,
  paramName = 0x0, securityInfo = 0x0, myvoid = 0x846d5d8}
(gdb) print *pdu
$4 = {version = 193, command = 5, reqid = 1525334, msgid = 1665052935,
  transid = 1525333, sessid = 32, errstat = -1, errindex = -1, time = 0,
  flags = 512, securityModel = -1, securityLevel = 0, msgParseModel = 0,
  transport_data = 0x0, transport_data_length = 0, tDomain = 0x0,
  tDomainLen = 0, variables = 0x8131c90, community = 0x0, community_len
= 0,
  enterprise = 0x0, enterprise_length = 0, trap_type = 0, specific_type
= 0,
  agent_addr = "\000\000\000", contextEngineID = 0x0, contextEngineIDLen
= 0,
  contextName = 0x0, contextNameLen = 0, securityEngineID = 0x0,
  securityEngineIDLen = 0, securityName = 0x0, securityNameLen = 0,
  priority = 0, range_subid = 0, securityStateRef = 0x0}


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Net-snmp-coders mailing list
Net-snmp-coders@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to