Hello Colin, I can see this issue with 5.0 kernel (5.0.0-47.51~18.04.1) as well, with the same node hotdog-kernel. Do you think if we should fix this in 5.0 as well? Thanks sysfs FAILED (kernel oopsed) [ 1108.615397] Unable to handle kernel paging request at virtual address ffff000046afa6a6 [ 1108.617127] Unable to handle kernel paging request at virtual address ffff000046afd2d7 [ 1108.623317] Mem abort info: [ 1108.627466] Unable to handle kernel paging request at virtual address ffff000046affffd [ 1108.627469] Mem abort info: [ 1108.627470] ESR = 0x96000021 [ 1108.627473] Exception class = DABT (current EL), IL = 32 bits [ 1108.627477] SET = 0, FnV = 0 [ 1108.627480] EA = 0, S1PTW = 0 [ 1108.627482] Data abort info: [ 1108.627485] ISV = 0, ISS = 0x00000021 [ 1108.627487] CM = 0, WnR = 0 [ 1108.627490] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000 [ 1108.627495] [ffff000046affffd] pgd=000000bffcfff003, pud=0000009f28e05003, pmd=0000009de53f9003, pte=006800008028f703 [ 1108.627507] Internal error: Oops: 96000021 [#1] SMP [ 1108.627515] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio cuse hci_vhci bluetooth ecdh_generic vfio_iommu_type1 vfio uhid vhost_vsock vmw_vsock_virtio_transport_common vsock vhost_net vhost tap dccp_ipv4 dccp atm algif_rng aegis128 aegis128l aegis256 morus1280 morus640 algif_aead anubis fcrypt khazad seed sm4_generic tea crc32_generic md4 michael_mic nhpoly1305_neon nhpoly1305 poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 wp512 algif_hash blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic chacha_neon chacha_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif joydev input_leds ipmi_devintf ipmi_msghandler thunderx2_pmu sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 [ 1108.627576] async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear i2c_smbus aes_ce_blk aes_ce_cipher uas ast i2c_algo_bit ttm drm_kms_helper syscopyarea crct10dif_ce usb_storage ghash_ce sysfillrect qede sha2_ce sysimgblt mpt3sas fb_sys_fops qed sha256_arm64 sha1_ce raid_class drm scsi_transport_sas ahci crc8 gpio_xlp i2c_xlp9xx hid_generic usbhid hid aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64 [ 1108.627607] Process stress-ng-sysfs (pid: 203940, stack limit = 0x0000000047d7ff87) [ 1108.627612] CPU: 93 PID: 203940 Comm: stress-ng-sysfs Not tainted 5.0.0-47-generic #51~18.04.1-Ubuntu [ 1108.627614] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019 [ 1108.627616] pstate: 80400009 (Nzcv daif +PAN -UAO) [ 1108.627623] pc : __memcpy+0x9c/0x180 [ 1108.627629] lr : memory_read_from_buffer+0x64/0x88 [ 1108.627630] sp : ffff000059933c90 [ 1108.627631] x29: ffff000059933c90 x28: ffff809e4d35ac40 [ 1108.627634] x27: 0000000000000000 x26: 0000000000000000 [ 1108.627636] x25: 0000000056000000 x24: ffff000046af0000 [ 1108.627637] x23: ffff809ee6fad000 x22: 0000000000000003 [ 1108.627639] x21: ffff000059933d08 x20: 0000000000000003 [ 1108.627640] x19: 0000000000010000 x18: 0000000000000000 [ 1108.627641] x17: 0000000000000000 x16: 0000000000000000 [ 1108.627643] x15: 0000000000000000 x14: 0000000000000000 [ 1108.627644] x13: 0000000000000000 x12: 0000000000000000 [ 1108.627645] x11: 0000000000000000 x10: 0000000000000000 [ 1108.627647] x9 : 0000000000000000 x8 : 0000000000000000 [ 1108.627648] x7 : ffff0000106cd1d8 x6 : ffff809ee6fad000 [ 1108.627650] x5 : 0000000000000003 x4 : 0000000000010000 [ 1108.627651] x3 : ffff000046af0000 x2 : 0000000000000003 [ 1108.627653] x1 : ffff000046affffd x0 : ffff809ee6fad000 [ 1108.627655] Call trace: [ 1108.627657] __memcpy+0x9c/0x180 [ 1108.627661] acpi_data_show+0x54/0x80 [ 1108.627664] sysfs_kf_bin_read+0x6c/0xa8 [ 1108.627669] kernfs_fop_read+0xa8/0x228 [ 1108.627674] __vfs_read+0x48/0x80 [ 1108.627676] vfs_read+0x94/0x150 [ 1108.627678] ksys_read+0x74/0xf0 [ 1108.627680] __arm64_sys_read+0x24/0x30 [ 1108.627686] el0_svc_common+0x88/0x180 [ 1108.627688] el0_svc_handler+0x38/0x78 [ 1108.627692] el0_svc+0x8/0xc [ 1108.627695] Code: 36100062 b8404423 b80044c3 36080062 (78402423) [ 1108.627698] ---[ end trace 3ac0a382f7e22655 ]--- [ 1108.631236] Mem abort info: [ 1108.634018] ESR = 0x96000021 [ 1108.634020] Exception class = DABT (current EL), IL = 32 bits [ 1108.634021] SET = 0, FnV = 0 [ 1108.634025] EA = 0, S1PTW = 0 [ 1108.641929] ESR = 0x96000021 [ 1108.641930] Exception class = DABT (current EL), IL = 32 bits [ 1108.641931] SET = 0, FnV = 0 [ 1108.641934] EA = 0, S1PTW = 0 [ 1108.644717] Data abort info: [ 1108.644718] ISV = 0, ISS = 0x00000021 [ 1108.644719] CM = 0, WnR = 0 [ 1108.644720] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000 [ 1108.644724] [ffff000046afa6a6] pgd=000000bffcfff003, pud=0000009f28e05003, pmd=0000009de53f9003, pte=006800008028a703 [ 1108.647767] Data abort info: [ 1108.647768] ISV = 0, ISS = 0x00000021 [ 1108.647769] CM = 0, WnR = 0 [ 1108.647773] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000 [ 1108.653681] Internal error: Oops: 96000021 [#2] SMP [ 1108.653684] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio cuse hci_vhci bluetooth ecdh_generic vfio_iommu_type1 vfio uhid vhost_vsock vmw_vsock_virtio_transport_common vsock vhost_net vhost tap dccp_ipv4 dccp atm algif_rng aegis128 aegis128l aegis256 morus1280 morus640 algif_aead anubis fcrypt khazad seed sm4_generic tea crc32_generic md4 michael_mic nhpoly1305_neon nhpoly1305 poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 wp512 algif_hash blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic chacha_neon chacha_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif joydev input_leds ipmi_devintf ipmi_msghandler thunderx2_pmu sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 [ 1108.653717] async_raid6_recov [ 1108.656728] [ffff000046afd2d7] pgd=000000bffcfff003 [ 1108.659851] async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear i2c_smbus aes_ce_blk aes_ce_cipher uas ast i2c_algo_bit ttm drm_kms_helper syscopyarea crct10dif_ce usb_storage ghash_ce sysfillrect qede sha2_ce sysimgblt mpt3sas fb_sys_fops qed sha256_arm64 sha1_ce raid_class drm scsi_transport_sas ahci crc8 gpio_xlp i2c_xlp9xx hid_generic usbhid hid aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64 [ 1108.662734] , pud=0000009f28e05003, pmd=0000009de53f9003, pte=006800008028d703 [ 1108.666553] Process stress-ng-sysfs (pid: 203926, stack limit = 0x00000000279f28a6) [ 1108.666556] CPU: 91 PID: 203926 Comm: stress-ng-sysfs Tainted: G D 5.0.0-47-generic #51~18.04.1-Ubuntu [ 1108.666557] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019 [ 1108.666558] pstate: 80400009 (Nzcv daif +PAN -UAO) [ 1108.666562] pc : __memcpy+0x90/0x180 [ 1108.666567] lr : memory_read_from_buffer+0x64/0x88 [ 1108.840632] Unable to handle kernel paging request at virtual address ffff000046af8aed [ 1108.842368] Unable to handle kernel paging request at virtual address ffff000046af171f [ 1108.842372] Mem abort info: [ 1108.842373] ESR = 0x96000021 [ 1108.842376] Exception class = DABT (current EL), IL = 32 bits [ 1108.842378] SET = 0, FnV = 0 [ 1108.842380] EA = 0, S1PTW = 0 [ 1108.842384] Data abort info: [ 1108.842386] ISV = 0, ISS = 0x00000021 [ 1108.842390] CM = 0, WnR = 0 [ 1108.842395] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000 [ 1108.842398] [ffff000046af171f] pgd=000000bffcfff003, pud=0000009f28e05003, pmd=0000009de53f9003, pte=0068000080281703 [ 1108.845483] sp : ffff00004a093c90 [ 1108.845484] x29: ffff00004a093c90 x28: ffff809e4d358ec0 [ 1108.845486] x27: 0000000000000000 x26: 0000000000000000 [ 1108.845487] x25: 0000000056000000 x24: ffff000046af0000 [ 1108.845489] x23: ffff809d53f70600 x22: 0000000000000007 [ 1108.845490] x21: ffff00004a093d08 x20: 0000000000000007 [ 1108.845492] x19: 000000000000a6ad x18: 0000000000000000 [ 1108.850277] Mem abort info: [ 1108.853833] x17: 0000000000000000 x16: 0000000000000000 [ 1108.858628] ESR = 0x96000021 [ 1108.861909] x15: 0000000000000000 x14: 0000000000000000 [ 1108.867216] Exception class = DABT (current EL), IL = 32 bits [ 1108.872503] x13: 0000000000000000 x12: 0000000000000000 [ 1108.872504] x11: 0000000000000000 x10: 0000000000000000 [ 1108.872506] x9 : 0000000000000000 x8 : 0000000000000000 [ 1108.872507] x7 : ffff0000106cd1d8 x6 : ffff809d53f70600 [ 1108.872508] x5 : 0000000000000007 x4 : 0000000000010000 [ 1108.872510] x3 : ffff000046af0000 x2 : 0000000000000007 [ 1108.872514] x1 : ffff000046afa6a6 x0 : ffff809d53f70600 [ 1108.877816] SET = 0, FnV = 0 [ 1108.883108] Call trace: [ 1108.883113] __memcpy+0x90/0x180 [ 1108.883116] acpi_data_show+0x54/0x80 [ 1108.883119] sysfs_kf_bin_read+0x6c/0xa8 [ 1108.883124] kernfs_fop_read+0xa8/0x228 [ 1108.888421] EA = 0, S1PTW = 0 [ 1108.893718] __vfs_read+0x48/0x80 [ 1108.893719] vfs_read+0x94/0x150 [ 1108.893721] ksys_read+0x74/0xf0 [ 1108.893722] __arm64_sys_read+0x24/0x30 [ 1108.893727] el0_svc_common+0x88/0x180 [ 1108.893728] el0_svc_handler+0x38/0x78 [ 1108.893731] el0_svc+0x8/0xc [ 1108.893736] Code: 36180062 f8408423 f80084c3 36100062 (b8404423) [ 1108.899039] Data abort info: [ 1108.904332] ---[ end trace 3ac0a382f7e22656 ]---