From owner-freebsd-arm@FreeBSD.ORG Fri Sep 13 19:51:48 2013 Return-Path: Delivered-To: freebsd-arm@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id D2B6DCB0; Fri, 13 Sep 2013 19:51:48 +0000 (UTC) (envelope-from ian@FreeBSD.org) Received: from mho-02-ewr.mailhop.org (mho-02-ewr.mailhop.org [204.13.248.72]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id A694B2DD1; Fri, 13 Sep 2013 19:51:48 +0000 (UTC) Received: from c-24-8-230-52.hsd1.co.comcast.net ([24.8.230.52] helo=damnhippie.dyndns.org) by mho-02-ewr.mailhop.org with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from ) id 1VKZP9-0006Kd-9k; Fri, 13 Sep 2013 19:51:47 +0000 Received: from [172.22.42.240] (revolution.hippie.lan [172.22.42.240]) by damnhippie.dyndns.org (8.14.3/8.14.3) with ESMTP id r8DJphEG009757; Fri, 13 Sep 2013 13:51:43 -0600 (MDT) (envelope-from ian@FreeBSD.org) X-Mail-Handler: Dyn Standard SMTP by Dyn X-Originating-IP: 24.8.230.52 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1+Fm7Ydmd2UdL0yfky/hJPo Subject: Re: Panic while building perl on sheevaplug/armv5 freebsd 10. From: Ian Lepore To: Adrian Chadd In-Reply-To: References: <1379080987.1111.637.camel@revolution.hippie.lan> <0D9A93F9-E4F1-4D78-BA8B-809169AE450D@bsdimp.com> Content-Type: text/plain; charset="us-ascii" Date: Fri, 13 Sep 2013 13:51:43 -0600 Message-ID: <1379101903.1111.644.camel@revolution.hippie.lan> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit Cc: "freebsd-arm@freebsd.org" , Ronald Klop X-BeenThere: freebsd-arm@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting FreeBSD to the StrongARM Processor List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 13 Sep 2013 19:51:48 -0000 On Fri, 2013-09-13 at 12:44 -0700, Adrian Chadd wrote: > .. don't we have a guard page on ARM/MIPS so we can trap out whenever that > occurs? > > That way we can at least try to identify where people have made some "huh > we're running on amd64, stack space is cheap huh" assumptions? > A "page-not-mapped" fault with a stack-looking address (0xddf9d000) is what happened -- my theory is that we hit the guard page. -- Ian