From owner-freebsd-alpha@FreeBSD.ORG Wed May 7 23:22:27 2003 Return-Path: Delivered-To: freebsd-alpha@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E528A37B401 for ; Wed, 7 May 2003 23:22:27 -0700 (PDT) Received: from freebie.xs4all.nl (freebie.xs4all.nl [213.84.32.253]) by mx1.FreeBSD.org (Postfix) with ESMTP id C5B6143FD7 for ; Wed, 7 May 2003 23:22:26 -0700 (PDT) (envelope-from wkb@freebie.xs4all.nl) Received: from freebie.xs4all.nl (localhost [127.0.0.1]) by freebie.xs4all.nl (8.12.9/8.12.9) with ESMTP id h486MPO9096484 for ; Thu, 8 May 2003 08:22:25 +0200 (CEST) (envelope-from wkb@freebie.xs4all.nl) Received: (from wkb@localhost) by freebie.xs4all.nl (8.12.9/8.12.9/Submit) id h486MPE6096483 for freebsd-alpha@freebsd.org; Thu, 8 May 2003 08:22:25 +0200 (CEST) Date: Thu, 8 May 2003 08:22:25 +0200 From: Wilko Bulte To: freebsd-alpha@freebsd.org Message-ID: <20030508062225.GA96462@freebie.xs4all.nl> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.4i X-OS: FreeBSD 4.8-STABLE X-PGP: finger wilko@freebsd.org Subject: access violation panic? X-BeenThere: freebsd-alpha@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Porting FreeBSD to the Alpha List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 May 2003 06:22:28 -0000 Grmbl.. I was building a 5.1-BETA release kit using make -j4 release when I found the following panic on the console the next morning. No dump, this box has 2G of RAM now and the disk swap partition is well too small :( W/ FreeBSD/alpha (rawhide.wbnet) (ttyd0) login: fatal kernel trap: trap entry = 0x2 (memory management fault) cpuid = 0 faulting va = 0xfffffe0033e2c030 type = access violation cause = load instructon pc = 0xfffffc00003c5db8 ra = 0xfffffc00003c5e44 sp = 0xfffffe0039cbb790 usp = 0x11ffefd0 curthread = 0xfffffc00095ddbc0 pid = 2780, comm = groff Stopped at elf64_load_file+0x338: ldl t0,0(t2) <0xfffffe0033e2c030> db> trace elf64_load_file() at elf64_load_file+0x338 exec_elf64_imgact() at exec_elf64_imgact+0x478 kern_execve() at kern_execve+0x484 execve() at execve+0x28 syscall() at syscall+0x3a8 XentSys() at XentSys+0x64 --- syscall (59, FreeBSD ELF64, execve) --- --- user mode --- db> -- | / o / /_ _ wilko@FreeBSD.org |/|/ / / /( (_) Bulte