[prev in list] [next in list] [prev in thread] [next in thread] 

List:       net-snmp-bugs
Subject:    [ net-snmp-Bugs-1779526 ] SIOCGIFNETMASK ioctl fails for an interface
From:       "SourceForge.net" <noreply () sourceforge ! net>
Date:       2007-11-05 14:48:32
Message-ID: E1Ip3Fg-0006rC-MF () sc8-sf-web23 ! sourceforge ! net
[Download RAW message or body]

Bugs item #1779526, was opened at 2007-08-22 17:41
Message generated for change (Comment added) made by jsafranek
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=112694&aid=1779526&group_id=12694

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: agent
Group: linux
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: Nobody/Anonymous (nobody)
Assigned to: Nobody/Anonymous (nobody)
Summary: SIOCGIFNETMASK ioctl fails for an interface alias

Initial Comment:
I keep getting this error after I ifup an interface alias on my gentoo
2007.0 box running 64bitlinux-2.6.20-gentoo-r8 kernel. relevant log
entries with debug mode turned on is at the bottom.

10:47:58 snmpd[344]: error getting netmask for interface 1
10:48:28 snmpd[344]: error getting netmask for interface 1
10:48:58 snmpd[344]: error getting netmask for interface 1
10:49:28 snmpd[344]: error getting netmask for interface 1
10:49:58 snmpd[344]: error getting netmask for interface 1
10:50:28 snmpd[344]: error getting netmask for interface 1
10:50:58 snmpd[344]: error getting netmask for interface 1

# uname -a
Linux platform64 2.6.20-gentoo-r8 #1 SMP Wed Aug 1 00:31:13 EDT 2007 x86_64 Intel(R) \
Xeon(TM) CPU 3.80GHz GenuineIntel GNU/Linux

# sbin/snmpd -v

NET-SNMP version: 5.4
Web: http://www.net-snmp.org/
Email: net-snmp-coders@li...

# cat etc/snmpd.conf
rouser public noauth
rocommunity public
syslocation someplace
syscontact not_me

# ifconfig
eth0 Link encap:Ethernet HWaddr 00:E0:81:47:59:0E
inet addr:10.158.100.41 Bcast:10.158.255.255 Mask:255.255.0.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:262682 errors:0 dropped:0 overruns:0 frame:0
TX packets:53048 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:122596020 (116.9 MiB) TX bytes:5109427 (4.8 MiB)
Base address:0x2000 Memory:dd200000-dd220000

eth1 Link encap:Ethernet HWaddr 00:E0:81:47:59:0F
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:12892 errors:0 dropped:0 overruns:0 frame:0
TX packets:19132 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:929682 (907.8 KiB) TX bytes:1353558 (1.2 MiB)
Base address:0x2040 Memory:dd220000-dd240000

eth1:1 Link encap:Ethernet HWaddr 00:E0:81:47:59:0F
inet addr:10.100.162.4 Bcast:10.100.162.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
Base address:0x2040 Memory:dd220000-dd240000

lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:12184 errors:0 dropped:0 overruns:0 frame:0
TX packets:12184 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1399031 (1.3 MiB) TX bytes:1399031 (1.3 MiB)


*** debug log ***
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: _netsnmp_ioctl_ipaddress_container_load_v4():
ip-mib/data_access/ipaddress_ioctl.c, 159:
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: interface 0, eth0
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: netsnmp_access_interface_ioctl_ifindex_get():
if-mib/data_access/interface_ioctl.c, 402:
13:31:56 snmpd[344]: access:interface:ioctl:
13:31:56 snmpd[344]: mtu_get
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: _ioctl_get(): if-mib/data_access/interface_ioctl.c, 49:
13:31:56 snmpd[344]: verbose:access:interface:ioctl:
13:31:56 snmpd[344]: ioctl 35123 for eth0
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: if 0: addr len 4, index 0x1
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: address 0x12964c80a
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: flags 0x1043
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: interface is up
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: broadcast address valid
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: resources allocated
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: Supports multicast
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: _netsnmp_ioctl_ipaddress_container_load_v4():
ip-mib/data_access/ipaddress_ioctl.c, 159:
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: interface 1, eth1:1
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: netsnmp_access_interface_ioctl_ifindex_get():
if-mib/data_access/interface_ioctl.c, 402:
13:31:56 snmpd[344]: access:interface:ioctl:
13:31:56 snmpd[344]: mtu_get
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: _ioctl_get(): if-mib/data_access/interface_ioctl.c, 49:
13:31:56 snmpd[344]: verbose:access:interface:ioctl:
13:31:56 snmpd[344]: ioctl 35123 for eth1
13:31:56 snmpd[344]: error getting netmask for interface 1
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: _netsnmp_ioctl_ipaddress_container_load_v4():
ip-mib/data_access/ipaddress_ioctl.c, 159:
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: interface 2, lo
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: netsnmp_access_interface_ioctl_ifindex_get():
if-mib/data_access/interface_ioctl.c, 402:
13:31:56 snmpd[344]: access:interface:ioctl:
13:31:56 snmpd[344]: mtu_get
13:31:56 snmpd[344]: trace:
13:31:56 snmpd[344]: _ioctl_get(): if-mib/data_access/interface_ioctl.c, 49:
13:31:56 snmpd[344]: verbose:access:interface:ioctl:
13:31:56 snmpd[344]: ioctl 35123 for lo
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: if 2: addr len 4, index 0x3
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: address 0x30100007f
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: flags 0x49
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: interface is up
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: is a loopback net
13:31:56 snmpd[344]: access:ipaddress:container:
13:31:56 snmpd[344]: resources allocated


----------------------------------------------------------------------

Comment By: Jan Safranek (jsafranek)
Date: 2007-11-05 15:48

Message:
Logged In: YES 
user_id=1784238
Originator: NO

Hi,

I uploaded patch #1826088, which should fix this bug.

----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=112694&aid=1779526&group_id=12694

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Net-snmp-bugs mailing list
Net-snmp-bugs@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-bugs


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic