On Wed, Mar 24, 2021 at 04:58:39PM +0100, Frank Scheiner wrote: > [ 20.090279] [<00000000006c6494>] sys_mount+0x114/0x1e0 > [ 20.090338] [<00000000006c6454>] sys_mount+0xd4/0x1e0 > [ 20.090499] [<0000000000406274>] linux_sparc_syscall+0x34/0x44 > [ 20.090697] Disabling lock debugging due to kernel taint > [ 20.090770] Caller[00000000006c6494]: sys_mount+0x114/0x1e0 > [ 20.090926] Caller[00000000006c6454]: sys_mount+0xd4/0x1e0 > [ 20.091133] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44 > [ 20.091196] Caller[0000000000100aa8]: 0x100aa8 > [...] > ``` > > [1]: https://pastebin.com/ApPYsMcu > > Here the result for the suggested command:
Thanks. And very strange, as i can't find what would free options before. Does the system boot if you comment out that kfree in line 3415 (even if that casues a memleak elsewhere).