Hello Colin, I can see this issue with 5.0 kernel (5.0.0-47.51~18.04.1)
as well, with the same node hotdog-kernel.

Do you think if we should fix this in 5.0 as well?
Thanks

 sysfs FAILED (kernel oopsed)
 [ 1108.615397] Unable to handle kernel paging request at virtual address 
ffff000046afa6a6
 [ 1108.617127] Unable to handle kernel paging request at virtual address 
ffff000046afd2d7
 [ 1108.623317] Mem abort info:
 [ 1108.627466] Unable to handle kernel paging request at virtual address 
ffff000046affffd
 [ 1108.627469] Mem abort info:
 [ 1108.627470]   ESR = 0x96000021
 [ 1108.627473]   Exception class = DABT (current EL), IL = 32 bits
 [ 1108.627477]   SET = 0, FnV = 0
 [ 1108.627480]   EA = 0, S1PTW = 0
 [ 1108.627482] Data abort info:
 [ 1108.627485]   ISV = 0, ISS = 0x00000021
 [ 1108.627487]   CM = 0, WnR = 0
 [ 1108.627490] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000
 [ 1108.627495] [ffff000046affffd] pgd=000000bffcfff003, pud=0000009f28e05003, 
pmd=0000009de53f9003, pte=006800008028f703
 [ 1108.627507] Internal error: Oops: 96000021 [#1] SMP
 [ 1108.627515] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device 
snd_timer snd soundcore userio cuse hci_vhci bluetooth ecdh_generic 
vfio_iommu_type1 vfio uhid vhost_vsock vmw_vsock_virtio_transport_common vsock 
vhost_net vhost tap dccp_ipv4 dccp atm algif_rng aegis128 aegis128l aegis256 
morus1280 morus640 algif_aead anubis fcrypt khazad seed sm4_generic tea 
crc32_generic md4 michael_mic nhpoly1305_neon nhpoly1305 poly1305_generic 
rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 
wp512 algif_hash blowfish_generic blowfish_common cast5_generic des_generic 
salsa20_generic chacha_neon chacha_generic camellia_generic cast6_generic 
cast_common serpent_generic twofish_generic twofish_common algif_skcipher 
af_alg nls_iso8859_1 ipmi_ssif joydev input_leds ipmi_devintf ipmi_msghandler 
thunderx2_pmu sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp 
libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs 
zstd_compress raid10 raid456
 [ 1108.627576]  async_raid6_recov async_memcpy async_pq async_xor async_tx xor 
xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear i2c_smbus aes_ce_blk 
aes_ce_cipher uas ast i2c_algo_bit ttm drm_kms_helper syscopyarea crct10dif_ce 
usb_storage ghash_ce sysfillrect qede sha2_ce sysimgblt mpt3sas fb_sys_fops qed 
sha256_arm64 sha1_ce raid_class drm scsi_transport_sas ahci crc8 gpio_xlp 
i2c_xlp9xx hid_generic usbhid hid aes_neon_bs aes_neon_blk crypto_simd cryptd 
aes_arm64
 [ 1108.627607] Process stress-ng-sysfs (pid: 203940, stack limit = 
0x0000000047d7ff87)
 [ 1108.627612] CPU: 93 PID: 203940 Comm: stress-ng-sysfs Not tainted 
5.0.0-47-generic #51~18.04.1-Ubuntu
 [ 1108.627614] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL027 07/01/2019
 [ 1108.627616] pstate: 80400009 (Nzcv daif +PAN -UAO)
 [ 1108.627623] pc : __memcpy+0x9c/0x180
 [ 1108.627629] lr : memory_read_from_buffer+0x64/0x88
 [ 1108.627630] sp : ffff000059933c90
 [ 1108.627631] x29: ffff000059933c90 x28: ffff809e4d35ac40 
 [ 1108.627634] x27: 0000000000000000 x26: 0000000000000000 
 [ 1108.627636] x25: 0000000056000000 x24: ffff000046af0000 
 [ 1108.627637] x23: ffff809ee6fad000 x22: 0000000000000003 
 [ 1108.627639] x21: ffff000059933d08 x20: 0000000000000003 
 [ 1108.627640] x19: 0000000000010000 x18: 0000000000000000 
 [ 1108.627641] x17: 0000000000000000 x16: 0000000000000000 
 [ 1108.627643] x15: 0000000000000000 x14: 0000000000000000 
 [ 1108.627644] x13: 0000000000000000 x12: 0000000000000000 
 [ 1108.627645] x11: 0000000000000000 x10: 0000000000000000 
 [ 1108.627647] x9 : 0000000000000000 x8 : 0000000000000000 
 [ 1108.627648] x7 : ffff0000106cd1d8 x6 : ffff809ee6fad000 
 [ 1108.627650] x5 : 0000000000000003 x4 : 0000000000010000 
 [ 1108.627651] x3 : ffff000046af0000 x2 : 0000000000000003 
 [ 1108.627653] x1 : ffff000046affffd x0 : ffff809ee6fad000 
 [ 1108.627655] Call trace:
 [ 1108.627657]  __memcpy+0x9c/0x180
 [ 1108.627661]  acpi_data_show+0x54/0x80
 [ 1108.627664]  sysfs_kf_bin_read+0x6c/0xa8
 [ 1108.627669]  kernfs_fop_read+0xa8/0x228
 [ 1108.627674]  __vfs_read+0x48/0x80
 [ 1108.627676]  vfs_read+0x94/0x150
 [ 1108.627678]  ksys_read+0x74/0xf0
 [ 1108.627680]  __arm64_sys_read+0x24/0x30
 [ 1108.627686]  el0_svc_common+0x88/0x180
 [ 1108.627688]  el0_svc_handler+0x38/0x78
 [ 1108.627692]  el0_svc+0x8/0xc
 [ 1108.627695] Code: 36100062 b8404423 b80044c3 36080062 (78402423) 
 [ 1108.627698] ---[ end trace 3ac0a382f7e22655 ]---
 [ 1108.631236] Mem abort info:
 [ 1108.634018]   ESR = 0x96000021
 [ 1108.634020]   Exception class = DABT (current EL), IL = 32 bits
 [ 1108.634021]   SET = 0, FnV = 0
 [ 1108.634025]   EA = 0, S1PTW = 0
 [ 1108.641929]   ESR = 0x96000021
 [ 1108.641930]   Exception class = DABT (current EL), IL = 32 bits
 [ 1108.641931]   SET = 0, FnV = 0
 [ 1108.641934]   EA = 0, S1PTW = 0
 [ 1108.644717] Data abort info:
 [ 1108.644718]   ISV = 0, ISS = 0x00000021
 [ 1108.644719]   CM = 0, WnR = 0
 [ 1108.644720] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000
 [ 1108.644724] [ffff000046afa6a6] pgd=000000bffcfff003, pud=0000009f28e05003, 
pmd=0000009de53f9003, pte=006800008028a703
 [ 1108.647767] Data abort info:
 [ 1108.647768]   ISV = 0, ISS = 0x00000021
 [ 1108.647769]   CM = 0, WnR = 0
 [ 1108.647773] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000
 [ 1108.653681] Internal error: Oops: 96000021 [#2] SMP
 [ 1108.653684] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device 
snd_timer snd soundcore userio cuse hci_vhci bluetooth ecdh_generic 
vfio_iommu_type1 vfio uhid vhost_vsock vmw_vsock_virtio_transport_common vsock 
vhost_net vhost tap dccp_ipv4 dccp atm algif_rng aegis128 aegis128l aegis256 
morus1280 morus640 algif_aead anubis fcrypt khazad seed sm4_generic tea 
crc32_generic md4 michael_mic nhpoly1305_neon nhpoly1305 poly1305_generic 
rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 
wp512 algif_hash blowfish_generic blowfish_common cast5_generic des_generic 
salsa20_generic chacha_neon chacha_generic camellia_generic cast6_generic 
cast_common serpent_generic twofish_generic twofish_common algif_skcipher 
af_alg nls_iso8859_1 ipmi_ssif joydev input_leds ipmi_devintf ipmi_msghandler 
thunderx2_pmu sch_fq_codel ib_iser rdma_cm iw_cm ib_cm ib_core iscsi_tcp 
libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs 
zstd_compress raid10 raid456
 [ 1108.653717]  async_raid6_recov
 [ 1108.656728] [ffff000046afd2d7] pgd=000000bffcfff003
 [ 1108.659851]  async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq 
libcrc32c raid1 raid0 multipath linear i2c_smbus aes_ce_blk aes_ce_cipher uas 
ast i2c_algo_bit ttm drm_kms_helper syscopyarea crct10dif_ce usb_storage 
ghash_ce sysfillrect qede sha2_ce sysimgblt mpt3sas fb_sys_fops qed 
sha256_arm64 sha1_ce raid_class drm scsi_transport_sas ahci crc8 gpio_xlp 
i2c_xlp9xx hid_generic usbhid hid aes_neon_bs aes_neon_blk crypto_simd cryptd 
aes_arm64
 [ 1108.662734] , pud=0000009f28e05003, pmd=0000009de53f9003, 
pte=006800008028d703
 [ 1108.666553] Process stress-ng-sysfs (pid: 203926, stack limit = 
0x00000000279f28a6)
 [ 1108.666556] CPU: 91 PID: 203926 Comm: stress-ng-sysfs Tainted: G      D     
      5.0.0-47-generic #51~18.04.1-Ubuntu
 [ 1108.666557] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL027 07/01/2019
 [ 1108.666558] pstate: 80400009 (Nzcv daif +PAN -UAO)
 [ 1108.666562] pc : __memcpy+0x90/0x180
 [ 1108.666567] lr : memory_read_from_buffer+0x64/0x88
 [ 1108.840632] Unable to handle kernel paging request at virtual address 
ffff000046af8aed
 [ 1108.842368] Unable to handle kernel paging request at virtual address 
ffff000046af171f
 [ 1108.842372] Mem abort info:
 [ 1108.842373]   ESR = 0x96000021
 [ 1108.842376]   Exception class = DABT (current EL), IL = 32 bits
 [ 1108.842378]   SET = 0, FnV = 0
 [ 1108.842380]   EA = 0, S1PTW = 0
 [ 1108.842384] Data abort info:
 [ 1108.842386]   ISV = 0, ISS = 0x00000021
 [ 1108.842390]   CM = 0, WnR = 0
 [ 1108.842395] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000815ac000
 [ 1108.842398] [ffff000046af171f] pgd=000000bffcfff003, pud=0000009f28e05003, 
pmd=0000009de53f9003, pte=0068000080281703
 [ 1108.845483] sp : ffff00004a093c90
 [ 1108.845484] x29: ffff00004a093c90 x28: ffff809e4d358ec0 
 [ 1108.845486] x27: 0000000000000000 x26: 0000000000000000 
 [ 1108.845487] x25: 0000000056000000 x24: ffff000046af0000 
 [ 1108.845489] x23: ffff809d53f70600 x22: 0000000000000007 
 [ 1108.845490] x21: ffff00004a093d08 x20: 0000000000000007 
 [ 1108.845492] x19: 000000000000a6ad x18: 0000000000000000 
 [ 1108.850277] Mem abort info:
 [ 1108.853833] x17: 0000000000000000 x16: 0000000000000000 
 [ 1108.858628]   ESR = 0x96000021
 [ 1108.861909] x15: 0000000000000000 x14: 0000000000000000 
 [ 1108.867216]   Exception class = DABT (current EL), IL = 32 bits
 [ 1108.872503] x13: 0000000000000000 x12: 0000000000000000 
 [ 1108.872504] x11: 0000000000000000 x10: 0000000000000000 
 [ 1108.872506] x9 : 0000000000000000 x8 : 0000000000000000 
 [ 1108.872507] x7 : ffff0000106cd1d8 x6 : ffff809d53f70600 
 [ 1108.872508] x5 : 0000000000000007 x4 : 0000000000010000 
 [ 1108.872510] x3 : ffff000046af0000 x2 : 0000000000000007 
 [ 1108.872514] x1 : ffff000046afa6a6 x0 : ffff809d53f70600 
 [ 1108.877816]   SET = 0, FnV = 0
 [ 1108.883108] Call trace:
 [ 1108.883113]  __memcpy+0x90/0x180
 [ 1108.883116]  acpi_data_show+0x54/0x80
 [ 1108.883119]  sysfs_kf_bin_read+0x6c/0xa8
 [ 1108.883124]  kernfs_fop_read+0xa8/0x228
 [ 1108.888421]   EA = 0, S1PTW = 0
 [ 1108.893718]  __vfs_read+0x48/0x80
 [ 1108.893719]  vfs_read+0x94/0x150
 [ 1108.893721]  ksys_read+0x74/0xf0
 [ 1108.893722]  __arm64_sys_read+0x24/0x30
 [ 1108.893727]  el0_svc_common+0x88/0x180
 [ 1108.893728]  el0_svc_handler+0x38/0x78
 [ 1108.893731]  el0_svc+0x8/0xc
 [ 1108.893736] Code: 36180062 f8408423 f80084c3 36100062 (b8404423) 
 [ 1108.899039] Data abort info:
 [ 1108.904332] ---[ end trace 3ac0a382f7e22656 ]---

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1866772

Title:
  Sys oopsed with sysfs test in ubuntu_stress_smoke_test on X-hwe ARM64

Status in Stress-ng:
  New
Status in ubuntu-kernel-tests:
  In Progress
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Fix Released

Bug description:
  == SRU Request [ BIONIC, EOAN, FOCAL ] ==

  Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte
  offset will cause an oops.  This is because the source address is I/O
  mapped and this needs to be read with an I/O memcpy rather than an
  memcpy.

  == Fix ==

  The fix is upstream (linux-next) commit that will land in 5.7, the
  backport to bionic, eoan and focal is just a minor context wiggle.

  commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
  Author: Colin Ian King <colin.k...@canonical.com>
  Date:   Thu Mar 12 11:13:45 2020 +0000

      ACPI: sysfs: copy ACPI data using io memory copying

  == Test ==

  Running on hotdog with the reproducer below (run as root):

  #include <sys/types.h>
  #include <sys/stat.h>
  #include <fcntl.h>
  #include <unistd.h>
  #include <errno.h>
  #include <stdio.h>
  #include <string.h>

  int main(void)
  {
          int fd;
          char buffer[3];
          ssize_t n;

          fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
          if (fd < 0) {
                  fprintf(stderr, "open failed: %d (%s)\n", errno, 
strerror(errno));
                  return -1;
          }
          do {
                  n = read(fd, buffer, sizeof(buffer));
          } while (n > 0);

          return 0;
  }

  Without the fix it will oops. With the fix it works OK.

  == Regession Potential ==

  This only affects the reading of the ACPI BERT table from /sys as root
  so it is limited in scope to just a very narrow use case. Normally the
  BERT table is just handled by the kernel, so access to this table is
  just for debugging purposes.

  -----------------------

  Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
  Failed 2 of 2 attempts.

  Test suite HEAD SHA1: 3f43e81

   sysfs STARTING
   sysfs RETURNED 0
   sysfs FAILED (kernel oopsed)
   [ 1075.760640] Unable to handle kernel paging request at virtual address 
ffff00004a70072a
   [ 1075.763319] Unable to handle kernel paging request at virtual address 
ffff00004a70e4ba
   [ 1075.768563] Mem abort info:
   [ 1075.768566]   ESR = 0x96000021
   [ 1075.768568]   Exception class = DABT (current EL), IL = 32 bits
   [ 1075.768569]   SET = 0, FnV = 0
   [ 1075.768570]   EA = 0, S1PTW = 0
   [ 1075.768571] Data abort info:
   [ 1075.768577]   ISV = 0, ISS = 0x00000021
   [ 1075.776489] Mem abort info:
   [ 1075.776491]   ESR = 0x96000021
   [ 1075.776493]   Exception class = DABT (current EL), IL = 32 bits
   [ 1075.776494]   SET = 0, FnV = 0
   [ 1075.776495]   EA = 0, S1PTW = 0
   [ 1075.776496] Data abort info:
   [ 1075.776500]   ISV = 0, ISS = 0x00000021
   [ 1075.779284]   CM = 0, WnR = 0
   [ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
   [ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, 
*pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
   [ 1075.782342]   CM = 0, WnR = 0
   [ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
   [ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, 
*pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
   [ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
   [ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq 
snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci 
bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common 
vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc 
algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic 
poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 
wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic 
blowfish_common cast5_generic des_generic salsa20_generic camellia_generic 
cast6_generic cast_common serpent_generic twofish_generic twofish_common 
algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds 
ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm 
ib_core
   [ 1075.942470]  iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 
btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede 
ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core 
syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed 
drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs 
aes_neon_blk crypto_simd cryptd aes_arm64
   [ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 
0x000000009cb607b8)
   [ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G      D  
        4.15.0-91-generic #92~16.04.1-Ubuntu
   [ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL027 07/01/2019
   [ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
   [ 1076.023096] pc : __memcpy+0x84/0x180
   [ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
   [ 1076.031441] sp : ffff00003ea2bd10
   [ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
   [ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
   [ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
   [ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
   [ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
   [ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
   [ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
   [ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
   [ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
   [ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
   [ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
   [ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
   [ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
   [ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
   [ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
   [ 1076.114231] Call trace:
   [ 1076.116668]  __memcpy+0x84/0x180
   [ 1076.119887]  acpi_data_show+0x54/0x80
   [ 1076.123541]  sysfs_kf_bin_read+0x6c/0xa8
   [ 1076.127451]  kernfs_fop_read+0xa4/0x1e0
   [ 1076.131274]  __vfs_read+0x48/0x90
   [ 1076.134577]  vfs_read+0x94/0x150
   [ 1076.137792]  SyS_read+0x74/0xf0
   [ 1076.140923]  el0_svc_naked+0x30/0x34
   [ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
   [ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
   [ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
   [ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq 
snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci 
bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common 
vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc 
algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic 
poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 
wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic 
blowfish_common cast5_generic des_generic salsa20_generic camellia_generic 
cast6_generic cast_common serpent_generic twofish_generic twofish_common 
algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds 
ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm 
ib_core
   [ 1076.230688]  iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 
btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede 
ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core 
syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed 
drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs 
aes_neon_blk crypto_simd cryptd aes_arm64
   [ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 
0x00000000081889d7)
   [ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G      D  
        4.15.0-91-generic #92~16.04.1-Ubuntu
   [ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL027 07/01/2019
   [ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
   [ 1076.311319] pc : __memcpy+0x84/0x180
   [ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
   [ 1076.319667] sp : ffff00003eea3d10
   [ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
   [ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
   [ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
   [ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
   [ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
   [ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
   [ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
   [ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
   [ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
   [ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
   [ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
   [ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
   [ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
   [ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
   [ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
   [ 1076.402463] Call trace:
   [ 1076.404901]  __memcpy+0x84/0x180
   [ 1076.408125]  acpi_data_show+0x54/0x80
   [ 1076.411785]  sysfs_kf_bin_read+0x6c/0xa8
   [ 1076.415696]  kernfs_fop_read+0xa4/0x1e0
   [ 1076.419520]  __vfs_read+0x48/0x90
   [ 1076.422823]  vfs_read+0x94/0x150
   [ 1076.426038]  SyS_read+0x74/0xf0
   [ 1076.429171]  el0_svc_naked+0x30/0x34
   [ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
   [ 1076.438818] ---[ end trace 496ae41e9716bef3 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/stress-ng/+bug/1866772/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to