Hi folks,
does anyone have an idea where this could come from? I used the same wicked
patchset as usual when building this 2.6.16-rc6 custom tree a few days ago, but
the thing oopses on me all the time. The funny part is that a -rc5 built exactly
the same way did not indulge in such inappropriate behaviour, so I figured the
gurus should have a chance of a look at this.
I have to admit that I played with some more recent compiler flags that came
with gcc-4.1, and am yet trying to narrow it down by cutting down the number of
patches added to vanilla, leaving cflag mods out altogether for the time being.
But, as stated above, same insanity added to -rc5 was perfectly smooth, -rc6 and
release 2.6.16 (plus my wicked patches) screw up.
This is the log excerpt from the last time my laptop became unusable because of
this, I merely switched from X to console and tried to login:
-snip-
login(pam_unix)[10265]: session opened for user ctrefzer by (uid=0)
release_dev: driver.table[6] not tty for (tty7)
Warning: dev (tty7) tty->count(1) != #fd's(0) in do_tty_hangup
Unable to handle kernel paging request at virtual address 0000e22e
printing eip:
c0197f99
*pde = 07960067
*pte = 00000000
Oops: 0000 [#1]
PREEMPT
Modules linked in: parport_pc parport 8250_pnp 8250 serial_core floppy snd_nm256 snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd_page_alloc snd soundcore rtl8150 uhci_hcd pcmcia firmware_class yenta_socket rsrc_nonstatic pcmcia_core intel_agp agpgart usbcore xfs exportfs ext2 sg sr_mod cdrom evdev psmouse i8k rtc tun reiser4 dm_mod ata_piix libata sd_mod scsi_mod unix
CPU: 0
EIP: 0060:[<c0197f99>] Not tainted VLI
EFLAGS: 00010202 (2.6.16 #1)
EIP is at 0xc0197f99
eax: c6775400 ebx: 0000e17a ecx: c662aeec edx: 00000000
esi: c7f0b600 edi: c02b9460 ebp: 00000001 esp: c662aea0
ds: 007b es: 007b ss: 0068
Process X (pid: 10350, threadinfo=c662a000 task=c7b9d0b0)
Stack: <0>c6e54ba0 c662aeec 00000000 c71bcd60 c662a000 c662af50 ffffffe9 c662af50
c015c524 c6acc000 00000287 c7f0b600 c71bcd60 c02b9460 00000001 c019a908
00400000 00000001 00000000 c01569b2 00000000 c71bcd60 c02b9460 00000000
Call Trace:
[<c0101135>] syscall_call+0x7/0xb
Code: c0 89 c7 74 14 8b 53 20 85 d2 0f 84 f8 00 00 00 89 d8 ff d2 e9 ef 00 00 00 8b 44 24 0c e8 76 f5 ff ff 89 d8 e8 6f f5 ff ff eb 47 <8b> 83 b4 00 00 00 84 c0 78 4a 81 7e 74 04 00 01 00 75 15 83 bb
-snap-
Any further info required I'll gladly provide. Thanks a bunch for your time!
Chris