On 24.03.21 16:22, Jan Engelhardt wrote:

On Wednesday 2021-03-24 14:57, Frank Scheiner wrote:

(gdb) l *(sys_mount+0x114/0x1e0)
0x6c6380 is in __se_sys_mount (fs/namespace.c:3390).

/0x1e0 does not normally belong there. Just

        l *(sys_mount+0x114)


I guess this comes from my log on [1]:

```
[...]
[   20.089289] RPC: <kfree+0x3ac/0x420>
[   20.089415] l0: ffff8001f8885cc8 l1: ffff8001f8881380 l2:
ffff8001ec434558 l3: 0000000000201db0
[   20.089586] l4: 000000000000029c l5: ffff80010000c1a0 l6:
ffff8001ec79c000 l7: 00000000006c6380
[   20.089802] i0: 0000000000001000 i1: ffff8001ec436000 i2:
00000000006c6494 i3: ffff8001ec436000
[   20.089877] i4: ffff800008405340 i5: 00006000045396c0 i6:
ffff8001ec79f561 i7: 00000000006c6494
[   20.090051] I7: <sys_mount+0x114/0x1e0>
[   20.090186] Call Trace:
[   20.090279] [<00000000006c6494>] sys_mount+0x114/0x1e0
[   20.090338] [<00000000006c6454>] sys_mount+0xd4/0x1e0
[   20.090499] [<0000000000406274>] linux_sparc_syscall+0x34/0x44
[   20.090697] Disabling lock debugging due to kernel taint
[   20.090770] Caller[00000000006c6494]: sys_mount+0x114/0x1e0
[   20.090926] Caller[00000000006c6454]: sys_mount+0xd4/0x1e0
[   20.091133] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44
[   20.091196] Caller[0000000000100aa8]: 0x100aa8
[...]
```

[1]: https://pastebin.com/ApPYsMcu

Here the result for the suggested command:
```
root@t1000:~/mnt/torvalds-linux# gdb -q vmlinux
Reading symbols from vmlinux...
(gdb) l *(sys_mount+0x114)
0x6c6494 is in __se_sys_mount (fs/namespace.c:3415).
3410            if (IS_ERR(options))
3411                    goto out_data;
3412
3413            ret = do_mount(kernel_dev, dir_name, kernel_type, flags, 
options);
3414
3415            kfree(options);
3416    out_data:
3417            kfree(kernel_dev);
3418    out_dev:
3419            kfree(kernel_type);
(gdb)
```

Cheers,
Frank

Reply via email to