John Hardin wrote:
Wes Hardaker wrote:
On Mon, 02 May 2005 13:12:47 -0700, John Hardin <[EMAIL PROTECTED]> said:
John> It looks like the agent then segfaults when the snmpbulkget retries.
This code should have been executed in that case. Did you see this message in your log:
if (request || var) {
/*
* ack, this is bad. The # of varbinds don't match and
* there is no way to fix the problem */
if (pdu)
snmp_free_pdu(pdu);
snmp_log(LOG_ERR,
"response to proxy request illegal. We're screwed.\n");
netsnmp_set_request_error(cache->reqinfo, requests,
SNMP_ERR_GENERR);
}
Yes, I do see this. (It's there in my perhaps overly lengthy 1st msg.) I've been looking at this code for something left in a strange state but I don't see anything yet.
I again but without using the bulkget. Instead I sent an SNMPv1 getnext for the same two OIDs to snmpd. Same problem. Here's a trace from just before the "we're screwed" log:
trace: proxy_got_response(): ucd-snmp/proxy.c, 519: proxy: got response... SNMPv2-SMI::enterprises.3495.1.1.1.0 response to proxy request illegal. We're screwed. trace: _sess_read(): snmp_api.c, 5289: sess_read: not reading 8 (fdset 0xbfffe0f0 set 0) trace: _sess_read(): snmp_api.c, 5289: sess_read: not reading 6 (fdset 0xbfffe0f0 set 0) trace: _sess_read(): snmp_api.c, 5289: sess_read: not reading 4 (fdset 0xbfffe0f0 set 0) trace: snmp_sess_select_info(): snmp_api.c, 5701: sess_select: for all sessions: 12 10 11 8 6 4 sess_select: next alarm -1073750920.1075483508 sec sess_select: blocking:no session requests or alarms. trace: receive(): snmpd.c, 1114: snmpd/select: select( numfds=13, ..., tvp=(nil)) trace: receive(): snmpd.c, 1119: snmpd/select: returned, count = 1 trace: netsnmp_udp_recv(): snmpUDPDomain.c, 132: netsnmp_udp: recvfrom fd 12 got 61 bytes (from UDP: [127.0.0.1]:32776) trace: _sess_process_packet(): snmp_api.c, 4971: sess_process_packet: session 0x8100940 fd 12 pkt 0x81267b0 length 61
Received 61 bytes from UDP: [127.0.0.1]:32776 0000: 30 3B 02 01 00 04 06 70 75 62 6C 69 63 A1 2E 02 0;.....public... 0016: 04 47 CD 03 D5 02 01 00 02 01 00 30 20 30 0E 06 .G.........0 0.. 0032: 0A 2B 06 01 04 01 9B 27 01 01 01 05 00 30 0E 06 .+.....'.....0.. 0048: 0A 2B 06 01 04 01 9B 27 01 01 02 05 00 .+.....'.....
Received SNMP packet(s) from UDP: [127.0.0.1]:32776 dumpx_recv:02 01 00
dumpv_recv: Integer: 0 (0x00) trace: _snmp_parse(): snmp_api.c, 4024: snmp_api: Parsing SNMPv1 message... trace: _snmp_parse(): snmp_api.c, 4031: dumph_recv: SNMPv1 message
trace: snmp_comstr_parse(): snmp_auth.c, 132: dumph_recv: SNMP version dumpx_recv: 02 01 00
dumpv_recv: Integer: 0 (0x00) trace: snmp_comstr_parse(): snmp_auth.c, 144: dumph_recv: community string dumpx_recv: 04 06 70 75 62 6C 69 63
dumpv_recv: String: public trace: _snmp_parse(): snmp_api.c, 4074: dumph_recv: PDU trace: snmp_pdu_parse(): snmp_api.c, 4260: dumph_recv: request_id dumpx_recv: 02 04 47 CD 03 D5
dumpv_recv: Integer: 1204618197 (0x47CD03D5) trace: snmp_pdu_parse(): snmp_api.c, 4271: dumph_recv: error status dumpx_recv: 02 01 00
dumpv_recv: Integer: 0 (0x00) trace: snmp_pdu_parse(): snmp_api.c, 4282: dumph_recv: error index dumpx_recv: 02 01 00
dumpv_recv: Integer: 0 (0x00) trace: snmp_pdu_parse(): snmp_api.c, 4300: dumph_recv: VarBindList trace: snmp_pdu_parse(): snmp_api.c, 4330: dumph_recv: VarBind trace: snmp_parse_var_op(): snmp.c, 166: dumph_recv: Name dumpx_recv: 06 0A 2B 06 01 04 01 9B 27 01 01 01
dumpv_recv: ObjID: SNMPv2-SMI::enterprises.3495.1.1.1 trace: snmp_pdu_parse(): snmp_api.c, 4339: dumph_recv: Value trace: snmp_pdu_parse(): snmp_api.c, 4330: dumph_recv: VarBind trace: snmp_parse_var_op(): snmp.c, 166: dumph_recv: Name dumpx_recv: 06 0A 2B 06 01 04 01 9B 27 01 01 02
dumpv_recv: ObjID: SNMPv2-SMI::enterprises.3495.1.1.2 trace: snmp_pdu_parse(): snmp_api.c, 4339: dumph_recv: Value GETNEXT message -- SNMPv2-SMI::enterprises.3495.1.1.1 -- SNMPv2-SMI::enterprises.3495.1.1.2 trace: init_agent_snmp_session(): snmp_agent.c, 1244: snmp_agent: agent_sesion 0x80f18c0 created Segmentation fault
------------------------------------------------------- This SF.Net email is sponsored by: NEC IT Guy Games. Get your fingers limbered up and give it your best shot. 4 great events, 4 opportunities to win big! Highest score wins.NEC IT Guy Games. Play to win an NEC 61 plasma display. Visit http://www.necitguy.com/?r=20 _______________________________________________ Net-snmp-users mailing list [email protected] Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users
