From owner-freebsd-bugs Sat May 12 2:40:13 2001 Delivered-To: freebsd-bugs@hub.freebsd.org Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id A94D337B423 for ; Sat, 12 May 2001 02:40:05 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.11.1/8.11.1) id f4C9e5P74892; Sat, 12 May 2001 02:40:05 -0700 (PDT) (envelope-from gnats) Date: Sat, 12 May 2001 02:40:05 -0700 (PDT) Message-Id: <200105120940.f4C9e5P74892@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Peter Pentchev Subject: Re: i386/27280: netstat -rn prints "kvm_read: Bad Address" Reply-To: Peter Pentchev Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR i386/27280; it has been noted by GNATS. From: Peter Pentchev To: kar_alerts@mglorysb.com Cc: freebsd-gnats-submit@FreeBSD.org Subject: Re: i386/27280: netstat -rn prints "kvm_read: Bad Address" Date: Sat, 12 May 2001 12:34:14 +0300 On Sat, May 12, 2001 at 02:15:43AM -0700, kar_alerts@mglorysb.com wrote: > > >Number: 27280 > >Category: i386 > >Synopsis: netstat -rn prints "kvm_read: Bad Address" > >Originator: Karthik > >Release: 4.3-STABLE > >Organization: > MGSB > >Environment: > FreeBSD svr.mgsb.domain 4.3-STABLE FreeBSD 4.3-STABLE #0: Fri May 11 22:41:02 GM > T 2001 root@svr.mgsb.domain:/usr/src/sys/compile/SVRFW i386 > >Description: > when i give "netstat -rn", the system prints: > > inet4 section: > > *** -- message start -- **** > Routing tables > > Internet: > Destination Gateway Flags Refs Use Netif Expire > default 161.142.113.3 UGSc 54 993 tun0 > 127.0.0.1 127.0.0.1 UH 0 947 lo0 > 161.142.113.3 202.187.194.33 UH 52 0 tun0 > 192.168 link#1 UC 0 0 xl0 => > netstat: kvm_read: Bad address > 192.168.0.1 0:50:4:d2:ec:5 UHLW 2 918 lo0 > netstat: kvm_read: Bad address > 192.168.0.101 0:10:a4:e8:45:3 UHLW 5 521930 xl0 999 > netstat: kvm_read: Bad address > 192.168.0.102 0:0:b4:85:a2:f6 UHLW 0 1481 xl0 610 > netstat: kvm_read: Bad address > 192.168.0.201 0:0:b4:9d:5:4a UHLW 1 1473 xl0 465 > netstat: kvm_read: Bad address > 192.168.0.202 0:50:4:b8:16:f3 UHLW 1 2015523 xl0 55 > netstat: kvm_read: Bad address > 192.168.0.255 ff:ff:ff:ff:ff:ff UHLWb 2 39 xl0 > > *** -- message end -- **** > > please note the message "netstat: kvm_read: Bad address" in the above output. Confirmed here, on a 4.3-STABLE system rebuilt yesterday. Can you try the attached patch and see if it helps? G'luck, Peter -- I've heard that this sentence is a rumor. Index: src/usr.bin/netstat/route.c =================================================================== RCS file: /home/ncvs/src/usr.bin/netstat/route.c,v retrieving revision 1.41.2.6 diff -u -r1.41.2.6 route.c --- src/usr.bin/netstat/route.c 2001/05/10 08:26:46 1.41.2.6 +++ src/usr.bin/netstat/route.c 2001/05/12 09:33:20 @@ -591,7 +591,7 @@ /* * Don't print protocol-cloned routes unless -a. */ - if (rt->rt_flags & RTF_WASCLONED && !aflag) { + if (rt->rt_flags & RTF_WASCLONED && rt->rt_parent != NULL && !aflag) { kget(rt->rt_parent, parent); if (parent.rt_flags & RTF_PRCLONING) return; To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message