On Wed, Mar 24, 2021 at 04:58:39PM +0100, Frank Scheiner wrote:
> [   20.090279] [<00000000006c6494>] sys_mount+0x114/0x1e0
> [   20.090338] [<00000000006c6454>] sys_mount+0xd4/0x1e0
> [   20.090499] [<0000000000406274>] linux_sparc_syscall+0x34/0x44
> [   20.090697] Disabling lock debugging due to kernel taint
> [   20.090770] Caller[00000000006c6494]: sys_mount+0x114/0x1e0
> [   20.090926] Caller[00000000006c6454]: sys_mount+0xd4/0x1e0
> [   20.091133] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44
> [   20.091196] Caller[0000000000100aa8]: 0x100aa8
> [...]
> ```
>
> [1]: https://pastebin.com/ApPYsMcu
>
> Here the result for the suggested command:

Thanks.  And very strange, as i can't find what would free options
before.  Does the system boot if you comment out that kfree in line
3415 (even if that casues a memleak elsewhere).

Reply via email to