Manfred,
Could you send the 10 lines surrounding the address 0xc014a79a
from the output of "nm -n /this_kernel" ?
In message <[EMAIL PROTECTED]>, Manfred Antar writes:
>Mike
>I get a panic on current smp-kernel with the new version
>of vfs_conf.c .
>The system is current as of this morning
>If I back out to version 1.44 it boots fine.
>It seems to panic at the swapon part of the boot process.
>I get :
>Fatal trap 12: page fault while in kernel mode
>mp_lock = 01000002; cpuid = 1; lapic.id = 0c000000
>fault virtual address = 0x2b
>fault code = supervisor read, page not present
>instruction pointer = 0x8:0xc014a79a
>stack pointer = 0x10:0xc0311f34
>frame pointer = 0x10:0xc0311f34
>code segment = base 0x0, limit 0xfffff, type 0x1b
> = DPL 0, pres 1, def32 1, gran 1
>processor eflags = interrupt enabled, resume, IOPL = 0
>current process = 0 (swapper)
>interrupt mask = none <- SMP: XXX
>trap number = 12
>panic: page fault
>mp_lock = 01000002; cpuid = 1; lapic.id = 0c000000
>boot() callled on cpu#1
>
>syncing disks ......
>=====================
>|| [EMAIL PROTECTED] ||
>|| Ph. (415) 681-6235 ||
>=====================
>
>
>
>To Unsubscribe: send mail to [EMAIL PROTECTED]
>with "unsubscribe freebsd-current" in the body of the message
>
--
Poul-Henning Kamp FreeBSD coreteam member
[EMAIL PROTECTED] "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message