On 24.03.21 17:33, Frank Scheiner wrote:
On 24.03.21 17:10, Christoph Hellwig wrote:
On Wed, Mar 24, 2021 at 04:58:39PM +0100, Frank Scheiner wrote:
[   20.090279] [<00000000006c6494>] sys_mount+0x114/0x1e0
[   20.090338] [<00000000006c6454>] sys_mount+0xd4/0x1e0
[   20.090499] [<0000000000406274>] linux_sparc_syscall+0x34/0x44
[   20.090697] Disabling lock debugging due to kernel taint
[   20.090770] Caller[00000000006c6494]: sys_mount+0x114/0x1e0
[   20.090926] Caller[00000000006c6454]: sys_mount+0xd4/0x1e0
[   20.091133] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44
[   20.091196] Caller[0000000000100aa8]: 0x100aa8
[...]
```

[1]: https://pastebin.com/ApPYsMcu

Here the result for the suggested command:

Thanks.  And very strange, as i can't find what would free options
before.  Does the system boot if you comment out that kfree in line
3415 (even if that casues a memleak elsewhere).

Unfortunately not, the result with the kfree() commented in
fs/namespace.c:3415 looks pretty similar in my eyes.

Actually on second view the result looks different. :-/

Reply via email to