Hi folks, does anyone have an idea where this could come from? I used the same wicked patchset as usual when building this 2.6.16-rc6 custom tree a few days ago, but the thing oopses on me all the time. The funny part is that a -rc5 built exactly the same way did not indulge in such inappropriate behaviour, so I figured the gurus should have a chance of a look at this. I have to admit that I played with some more recent compiler flags that came with gcc-4.1, and am yet trying to narrow it down by cutting down the number of patches added to vanilla, leaving cflag mods out altogether for the time being. But, as stated above, same insanity added to -rc5 was perfectly smooth, -rc6 and release 2.6.16 (plus my wicked patches) screw up. This is the log excerpt from the last time my laptop became unusable because of this, I merely switched from X to console and tried to login: -snip- login(pam_unix)[10265]: session opened for user ctrefzer by (uid=0) release_dev: driver.table[6] not tty for (tty7) Warning: dev (tty7) tty->count(1) != #fd's(0) in do_tty_hangup Unable to handle kernel paging request at virtual address 0000e22e printing eip: c0197f99 *pde = 07960067 *pte = 00000000 Oops: 0000 [#1] PREEMPT Modules linked in: parport_pc parport 8250_pnp 8250 serial_core floppy snd_nm256 snd_ac97_codec snd_ac97_bus snd_pcm snd_timer snd_page_alloc snd soundcore rtl8150 uhci_hcd pcmcia firmware_class yenta_socket rsrc_nonstatic pcmcia_core intel_agp agpgart usbcore xfs exportfs ext2 sg sr_mod cdrom evdev psmouse i8k rtc tun reiser4 dm_mod ata_piix libata sd_mod scsi_mod unix CPU: 0 EIP: 0060:[<c0197f99>] Not tainted VLI EFLAGS: 00010202 (2.6.16 #1) EIP is at 0xc0197f99 eax: c6775400 ebx: 0000e17a ecx: c662aeec edx: 00000000 esi: c7f0b600 edi: c02b9460 ebp: 00000001 esp: c662aea0 ds: 007b es: 007b ss: 0068 Process X (pid: 10350, threadinfo=c662a000 task=c7b9d0b0) Stack: <0>c6e54ba0 c662aeec 00000000 c71bcd60 c662a000 c662af50 ffffffe9 c662af50 c015c524 c6acc000 00000287 c7f0b600 c71bcd60 c02b9460 00000001 c019a908 00400000 00000001 00000000 c01569b2 00000000 c71bcd60 c02b9460 00000000 Call Trace: [<c0101135>] syscall_call+0x7/0xb Code: c0 89 c7 74 14 8b 53 20 85 d2 0f 84 f8 00 00 00 89 d8 ff d2 e9 ef 00 00 00 8b 44 24 0c e8 76 f5 ff ff 89 d8 e8 6f f5 ff ff eb 47 <8b> 83 b4 00 00 00 84 c0 78 4a 81 7e 74 04 00 01 00 75 15 83 bb -snap- Any further info required I'll gladly provide. Thanks a bunch for your time! Chris
Attachment:
pgpjXOEql5HCN.pgp
Description: PGP signature
- Prev by Date: Re: Question regarding to store file system metadata in database
- Next by Date: Re: Who uses the 'nodev' flag in /proc/filesystems ???
- Previous by thread: Re: sata_promise does not see hardware RAID arrays on Fasttrak TX4000
- Next by thread: Mouse problems, kernel issue?
- Index(es):