On 24.03.21 17:10, Christoph Hellwig wrote:
On Wed, Mar 24, 2021 at 04:58:39PM +0100, Frank Scheiner wrote:
[ 20.090279] [<00000000006c6494>] sys_mount+0x114/0x1e0
[ 20.090338] [<00000000006c6454>] sys_mount+0xd4/0x1e0
[ 20.090499] [<0000000000406274>] linux_sparc_syscall+0x34/0x44
[ 20.090697] Disabling lock debugging due to kernel taint
[ 20.090770] Caller[00000000006c6494]: sys_mount+0x114/0x1e0
[ 20.090926] Caller[00000000006c6454]: sys_mount+0xd4/0x1e0
[ 20.091133] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44
[ 20.091196] Caller[0000000000100aa8]: 0x100aa8
[...]
```
[1]: https://pastebin.com/ApPYsMcu
Here the result for the suggested command:
Thanks. And very strange, as i can't find what would free options
before. Does the system boot if you comment out that kfree in line
3415 (even if that casues a memleak elsewhere).
Unfortunately not, the result with the kfree() commented in
fs/namespace.c:3415 looks pretty similar in my eyes. Log is on [2]
[1]: https://pastebin.com/zmSFpv3R
Cheers,
Frank