On Wed, Oct 28, 2020 at 04:36:11PM -0700, Andrew Morton wrote:
(switched to email. Please respond via emailed reply-to-all, not via the
bugzilla web interface).
On Wed, 28 Oct 2020 15:49:15 +0000 bugzilla-daemon@xxxxxxxxxxxxxxxxxxx wrote:
[ 984.279683] Call Trace:
[ 984.282581] __check_heap_object+0xe0/0x110
[ 984.287405] __check_object_size+0x136/0x150
[ 984.292347] proc_sys_call_handler+0x167/0x250
[ 984.297565] new_sync_read+0x108/0x180
[ 984.302082] vfs_read+0x174/0x1d0
[ 984.306126] ksys_read+0x58/0xd0
[ 984.310022] do_syscall_64+0x33/0x40
[ 984.314277] entry_SYSCALL_64_after_hwframe+0x44/0xa9
Can we determine which /proc/sys entries these are?
Colin Ian King narrowed it down to
/proc/sys/kernel/sched_domain/cpu0/domain0/flags
and commit 5b9f8ff7b320a34af3dbcf04edb40d9b04f22f4a.
He has a proposed patch, too, that he'll be sending to the list soon.
See https://bugzilla.kernel.org/show_bug.cgi?id=209919#c9
Thanks for the quick debugging, Colin!
--
Jeff Bastian
Kernel QE - Hardware Enablement
Red Hat