[prev in list] [next in list] [prev in thread] [next in thread] 

List:       net-snmp-bugs
Subject:    [ net-snmp-Bugs-3556588 ] snmpd crashes during initial startup after boot on Solaris
From:       SourceForge.net <noreply () sourceforge ! net>
Date:       2012-08-14 20:28:19
Message-ID: E1T1Niv-00020w-Jt () sfs-ml-4 ! v29 ! ch3 ! sourceforge ! com
[Download RAW message or body]

Bugs item #3556588, was opened at 2012-08-12 01:35
Message generated for change (Comment added) made by nba
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=112694&aid=3556588&group_id=12694

Please note that this message will contain a full copy of the comment thread,
including the initial issue submission, for this request,
not just the latest update.
Category: agent
Group: solaris
Status: Open
Resolution: None
Priority: 5
Private: No
Submitted By: drook (drook)
> Assigned to: Niels Baggesen (nba)
Summary: snmpd crashes during initial startup after boot on Solaris

Initial Comment:
Reproduceable. Always crashes.

Bt follows:

dbx /usr/local/net-snmp/sbin/snmpd core
For information about new features see `help changes'
To remove this message, put `dbxenv suppress_startup_message 7.7' in your .dbxrc
Reading snmpd
core file header read successfully
Reading ld.so.1
Reading libnetsnmpagent.so.20.0.1
Reading libnetsnmphelpers.so.20.0.1
Reading libnetsnmpmibs.so.20.0.1
Reading libkvm.so.1
Reading libnetsnmp.so.20.0.1
Reading libadm.so.1
Reading libkstat.so.1
Reading libcrypto.so.0.9.7
Reading libnsl.so.1
Reading libsocket.so.1
Reading libelf.so.1
Reading libm.so.2
Reading libc.so.1
Reading libgcc_s.so.1
Reading libcrypto_extra.so.0.9.7
Reading ru_RU.UTF-8.so.3
Reading methods_unicode.so.3
program terminated by signal SEGV (no mapping at the fault address)
0xfffffd7ffebf188b: _private_memcpy+0x0a0b:     movdqu   (%rdx),%xmm0
(dbx) where
=>[1] _private_memcpy(0xfffffd7fffdf8710, 0x7300000000000007, 0x7300000000000007, \
0xfffffd7fffdf8710, 0x9c, 0x600000), at 0xfffffd7ffebf188b  [2] getMibstat(0x0, 0x0, \
0x0, 0x0, 0x0, 0x0), at 0xfffffd7fff2185ed  [3] var_ipRouteEntry(0x0, 0x0, 0x0, 0x0, \
0x0, 0x0), at 0xfffffd7fff21bf32  [4] netsnmp_old_api_helper(0x0, 0x0, 0x0, 0x0, 0x0, \
0x0), at 0xfffffd7fff2f3197  [5] netsnmp_call_handler(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), \
at 0xfffffd7fff351e93  [6] netsnmp_call_next_handler(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), \
at 0xfffffd7fff3523c3  [7] netsnmp_bulk_to_next_helper(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), \
at 0xfffffd7fff2edbcd  [8] netsnmp_call_handler(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff351e93  [9] netsnmp_call_handlers(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff35225d  [10] handle_var_requests(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff345dab  [11] handle_getnext_loop(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff346a7b  [12] handle_pdu(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff3474d8  [13] netsnmp_handle_request(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff346fed  [14] handle_snmp_packet(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff34433a  [15] _sess_process_packet(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff0c31a8  [16] _sess_read(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff0c4815  [17] snmp_sess_read2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff0c48be  [18] snmp_read2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at \
0xfffffd7fff0c3395  [19] receive(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0x40536e
  [20] main(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0x404c26

Workaround: start by hand after entering multiuser.

----------------------------------------------------------------------

> Comment By: Niels Baggesen (nba)
Date: 2012-08-14 13:28

Message:
Could you try starting it with -Dkernel_sunos5?

----------------------------------------------------------------------

Comment By: drookie (drookie)
Date: 2012-08-12 23:35

Message:
Yeah, sorry...

First core:

[root@avdesk1 /home/emz/snmp.cores]# uname -a
SunOS avdesk1.enaza.ru 5.10 Generic_142910-17 i86pc i386 i86pc

version - 5.5.1

Second core:

[root@avdesk2 /home/emz/snmpd.cores]# uname -a
SunOS avdesk2.enaza.ru 5.10 Generic_142910-17 i86pc i386 i86pc

version - 5.7.1

global zone both.

----------------------------------------------------------------------

Comment By: Niels Baggesen (nba)
Date: 2012-08-12 12:54

Message:
What version of Net-SNMP?
What version of Solaris?
Physical machine? Virtual? Zone?

----------------------------------------------------------------------

Comment By: drook (drook)
Date: 2012-08-12 01:38

Message:
Another backtrace from similar machine:

# dbx /usr/local/net-snmp/sbin/snmpd core.5                                
        For information about new features see `help changes'              
                                                    To remove this message,
put `dbxenv suppress_startup_message 7.7' in your .dbxrc                   
                    Reading snmpd                                          
                                                                core file
header read successfully                                                   
                                  Reading ld.so.1                          
                                                                           
  Reading libnetsnmpagent.so.30.0.1                                        
                                              Reading
libnetsnmpmibs.so.30.0.1                                                   
                                    Reading libkvm.so.1                    
                                                                           
    Reading libnetsnmp.so.30.0.1                                           
                                                Reading libadm.so.1        
                                                                           
                Reading libkstat.so.1                                      
                                                            Reading
libcrypto.so.0.9.7                                                         
                                    Reading libnsl.so.1                    
                                                                           
    Reading libsocket.so.1                                                 
                                                Reading libelf.so.1        
                                                                           
                Reading libm.so.2                                          
                                                            Reading
libc.so.1                                                                  
                                    Reading libgcc_s.so.1                  
                                                                           
    Reading libcrypto_extra.so.0.9.7                                       
                                                Reading ru_RU.UTF-8.so.3   
                                                                           
                Reading methods_unicode.so.3                               
                                                            program
terminated by signal SEGV (no mapping at the fault address)                
                                    0xfffffd7ffec0188b:
_private_memcpy+0x0a0b:     movdqu   (%rdx),%xmm0                          
                        Current function is getMibstat                     
                                                                      760  
            memcpy(resp, ep, entrysize);                                   
                                    (dbx) where                            
                                                                           
      [1] _private_memcpy(0xfffffd7fffdf8720, 0x7300000000000007,
0x7300000000000007, 0xfffffd7fffdf8720, 0x9c, 0x100000), at
0xfffffd7ffec0188b                                                         
                                          =>[2] getMibstat(grid =
MIB_IP_ROUTE, resp = 0xfffffd7fffdf8720, entrysize = 156U, req_type =
GET_FIRST, comp = 0xfffffd7fff2302de =
&`libnetsnmpmibs.so.30.0.1`var_route.c`IP_Cmp_Route(void *addr, void *ep),
arg = 0xfffffd7fffdf87c0), line 760 in "kernel_sunos5.c"                   
                                                                           
  [3] var_ipRouteEntry(vp = 0xfffffd7fffdf8eb0, name = 0xfffffd7fffdf8a60,
length = 0xfffffd7fffdf8e68, exact = 0, var_len = 0xfffffd7fffdf8e70,
write_method = 0xfffffd7fffdf8e78), line 767 in "var_route.c"              
                     [4] netsnmp_old_api_helper(handler = 0x4372a0, reginfo
= 0x43aeb0, reqinfo = 0x5e6960, requests = 0x469030), line 320 in
"old_api.c"                                                                
                                           [5]
netsnmp_call_handler(next_handler = 0x4372a0, reginfo = 0x43aeb0, reqinfo =
0x5e6960, requests = 0x469030), line 526 in "agent_handler.c"              
                                                                           
        [6] netsnmp_call_next_handler(current = 0x437c50, reginfo =
0x43aeb0, reqinfo = 0x5e6960, requests = 0x469030), line 640 in
"agent_handler.c"                                                          
                                        [7]
netsnmp_bulk_to_next_helper(handler = 0x437c50, reginfo = 0x43aeb0, reqinfo
= 0x5e6960, requests = 0x469030), line 110 in "bulk_to_next.c"
  [8] netsnmp_call_handler(next_handler = 0x437c50, reginfo = 0x43aeb0,
reqinfo = 0x5e6960, requests = 0x469030), line 526 in "agent_handler.c"
  [9] netsnmp_call_handlers(reginfo = 0x43aeb0, reqinfo = 0x5e6960,
requests = 0x469030), line 611 in "agent_handler.c"
  [10] handle_var_requests(asp = 0x60e0e0), line 2676 in "snmp_agent.c"
  [11] handle_getnext_loop(asp = 0x60e0e0), line 3122 in "snmp_agent.c"
  [12] handle_pdu(asp = 0x60e0e0), line 3499 in "snmp_agent.c"
  [13] netsnmp_handle_request(asp = 0x60e0e0, status = 0), line 3278 in
"snmp_agent.c"
  [14] handle_snmp_packet(op = 1, session = 0x606bd0, reqid = 1922347659,
pdu = 0x46b8c0, magic = (nil)), line 1987 in "snmp_agent.c"
  [15] _sess_process_packet(sessp = 0x5e6450, sp = 0x606bd0, isp =
0x5a50d0, transport = 0x606910, opaque = 0x575b40, olength = 36, packetptr
= 0x46d2c0 "0.^B^A^A^D\nenaza-snmp ¥^]^B^Dr\x94 ²\x8b^B^A", length = 48),
line 5400 in "snmp_api.c"
  [16] _sess_read(sessp = 0x5e6450, fdset = 0xfffffd7fffdfdbc0), line 5829
in "snmp_api.c"
  [17] snmp_sess_read2(sessp = 0x5e6450, fdset = 0xfffffd7fffdfdbc0), line
5861 in "snmp_api.c"
  [18] snmp_read2(fdset = 0xfffffd7fffdfdbc0), line 5463 in "snmp_api.c"
  [19] receive(), line 1315 in "snmpd.c"
  [20] main(argc = 1, argv = 0xfffffd7fffdffd48), line 1105 in "snmpd.c"


----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=112694&aid=3556588&group_id=12694

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Net-snmp-bugs mailing list
Net-snmp-bugs@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-bugs


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic