From owner-freebsd-hackers@FreeBSD.ORG Mon Aug 25 20:05:19 2008 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BA57710656BF for ; Mon, 25 Aug 2008 20:05:19 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from server.baldwin.cx (bigknife-pt.tunnel.tserv9.chi1.ipv6.he.net [IPv6:2001:470:1f10:75::2]) by mx1.freebsd.org (Postfix) with ESMTP id 4FDDC8FC1C for ; Mon, 25 Aug 2008 20:05:19 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from localhost.corp.yahoo.com (john@localhost [IPv6:::1]) (authenticated bits=0) by server.baldwin.cx (8.14.2/8.14.2) with ESMTP id m7PK4Y8Q043991; Mon, 25 Aug 2008 16:05:13 -0400 (EDT) (envelope-from jhb@freebsd.org) From: John Baldwin To: freebsd-hackers@freebsd.org Date: Mon, 25 Aug 2008 11:22:23 -0400 User-Agent: KMail/1.9.7 References: In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200808251122.23325.jhb@freebsd.org> X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-2.0.2 (server.baldwin.cx [IPv6:::1]); Mon, 25 Aug 2008 16:05:13 -0400 (EDT) X-Virus-Scanned: ClamAV 0.93.1/8087/Mon Aug 25 14:40:37 2008 on server.baldwin.cx X-Virus-Status: Clean X-Spam-Status: No, score=-2.3 required=4.2 tests=AWL,BAYES_00, DATE_IN_PAST_03_06,NO_RELAYS autolearn=ham version=3.1.3 X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on server.baldwin.cx Cc: vasanth raonaik Subject: Re: netstat: kvm_read: Bad address X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 25 Aug 2008 20:05:19 -0000 On Monday 25 August 2008 08:09:52 am vasanth raonaik wrote: > Hello Hackers, > > I am facing with this Issue. Though netstat -a does show some output but the > error is consistently seen. Does any one has some pointers to the cause and > fix for the same. Some parts of netstat still use direct kvm access to read kernel variables instead of sysctls for live kernels. If it tries to walk a linked list while the list is being changed, then it can end up following a free'd pointer and get this error. Is the system doing something like adding and deleting lots of psuedo-interfaces, addresses, etc.? -- John Baldwin