From owner-freebsd-bugs@freebsd.org Tue Nov 13 09:22:32 2018 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ABF89110B302 for ; Tue, 13 Nov 2018 09:22:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 24AF27AEDF for ; Tue, 13 Nov 2018 09:22:32 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id DDBA4110B2FF; Tue, 13 Nov 2018 09:22:31 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BBB2F110B2FC for ; Tue, 13 Nov 2018 09:22:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 41E367AED9 for ; Tue, 13 Nov 2018 09:22:31 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 785BFF27 for ; Tue, 13 Nov 2018 09:22:30 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wAD9MUMi026112 for ; Tue, 13 Nov 2018 09:22:30 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wAD9MUo0026101 for bugs@FreeBSD.org; Tue, 13 Nov 2018 09:22:30 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 233193] Reproducible vm panic with AMD Ryzen 3 2200G Date: Tue, 13 Nov 2018 09:22:30 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: johalun0@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter attachments.mimetype attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: 24AF27AEDF X-Spamd-Result: default: False [-105.90 / 200.00]; FORGED_RECIPIENTS_FORWARDING(0.00)[]; ALLOW_DOMAIN_WHITELIST(-100.00)[freebsd.org]; FORWARDED(0.00)[bugs@mailman.ysv.freebsd.org]; SPF_FAIL_FORWARDING(0.00)[]; TO_DN_NONE(0.00)[]; HAS_XAW(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; XAW_SERVICE_ACCT(1.00)[]; RCVD_IN_DNSWL_MED(-0.20)[5.0.0.0.0.5.0.0.0.0.0.0.0.0.0.0.a.6.0.2.4.5.2.2.0.0.9.1.1.0.0.2.list.dnswl.org : 127.0.9.2]; MX_GOOD(-0.01)[cached: mx66.freebsd.org]; NEURAL_HAM_SHORT(-1.00)[-1.000,0]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; IP_SCORE(-3.69)[ip: (-9.85), ipnet: 2001:1900:2254::/48(-4.79), asn: 10310(-3.72), country: US(-0.09)]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]; FORGED_RECIPIENTS(0.00)[bugs@FreeBSD.org,freebsd-bugs@freebsd.org]; TO_DOM_EQ_FROM_DOM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; FROM_NO_DN(0.00)[]; RCVD_COUNT_SEVEN(0.00)[7] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Nov 2018 09:22:33 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233193 Bug ID: 233193 Summary: Reproducible vm panic with AMD Ryzen 3 2200G Product: Base System Version: CURRENT Hardware: amd64 OS: Any Status: New Severity: Affects Many People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: johalun0@gmail.com Attachment #199200 text/plain mime type: Created attachment 199200 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D199200&action= =3Dedit dmesg My setup that I've had a few months have been very unstable (Ubuntu, Windows and FreeBSD) from start. After I've managed to run Windows update without crashes, Windows 10 is now stable on this machine. I've found a way to reproduce the panics with stress from sysutils/stress # stress --vm 1 will cause panic reboot or lockup.=20 All software is up to date and cpu microcode updates enabled. I have checked for BIOS updates regularly since purchase but nothing so far= .=20 Ubuntu memtest passes without problems. Hardware: ASRock A320M-HDV QUMOX 4GB DDR4 2133 2133MHz PC4-17000 PC-17000 (288 PIN) DIMM MEMORY 4GB AMD YD2200C5FBBOX Ryzen 3 2200G CPU with Wraith Stealth Cooler and RX Vega Graphics dmesg output attached. Backtraces from a few panics: BT 1: ----- Unread portion of the kernel message buffer: panic: page 0xfffff800b636d630 has object cpuid =3D 1 time =3D 1542033179 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe002a97f= 620 vpanic() at vpanic+0x1a3/frame 0xfffffe002a97f680 panic() at panic+0x43/frame 0xfffffe002a97f6e0 vm_page_alloc_check() at vm_page_alloc_check+0x81/frame 0xfffffe002a97f6f0 vm_page_alloc_domain_after() at vm_page_alloc_domain_after+0x295/frame 0xfffffe002a97f770 vm_page_alloc() at vm_page_alloc+0x74/frame 0xfffffe002a97f7d0 vm_fault_hold() at vm_fault_hold+0x12c2/frame 0xfffffe002a97f910 vm_fault() at vm_fault+0x60/frame 0xfffffe002a97f950 trap_pfault() at trap_pfault+0x188/frame 0xfffffe002a97f9a0 trap() at trap+0x45a/frame 0xfffffe002a97fab0 calltrap() at calltrap+0x8/frame 0xfffffe002a97fab0 --- trap 0xc, rip =3D 0x204860, rsp =3D 0x7fffffffda00, rbp =3D 0x7fffffffd= a90 --- BT 2: ----- Unread portion of the kernel message buffer: Kernel page fault with the following non-sleepable locks held: shared rw vm object (vm object) r =3D 0 (0xfffff80012e17900) locked @ /usr/src/sys/vm/vm_fault.c:628 stack backtrace: #0 0xffffffff8072e5a3 at witness_debugger+0x73 #1 0xffffffff8072f4ef at witness_warn+0x43f #2 0xffffffff80a50dc3 at trap_pfault+0x53 #3 0xffffffff80a503fa at trap+0x2ba #4 0xffffffff80a2ab75 at calltrap+0x8 #5 0xffffffff809f6081 at vm_fault_hold+0xd01 #6 0xffffffff809f5330 at vm_fault+0x60 #7 0xffffffff80a50ef8 at trap_pfault+0x188 #8 0xffffffff80a5059a at trap+0x45a #9 0xffffffff80a2ab75 at calltrap+0x8 Fatal trap 12: page fault while in kernel mode cpuid =3D 2; apic id =3D 02 fault virtual address =3D 0x2c0a fault code =3D supervisor read data, page not present instruction pointer =3D 0x20:0xffffffff80a19bfc stack pointer =3D 0x0:0xfffffe002a8e97d0 frame pointer =3D 0x0:0xfffffe002a8e97d0 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 762 (vmstat) trap number =3D 12 panic: page fault cpuid =3D 2 time =3D 1542033089 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe002a8e9= 490 vpanic() at vpanic+0x1a3/frame 0xfffffe002a8e94f0 panic() at panic+0x43/frame 0xfffffe002a8e9550 trap_fatal() at trap_fatal+0x35f/frame 0xfffffe002a8e95a0 trap_pfault() at trap_pfault+0x62/frame 0xfffffe002a8e95f0 trap() at trap+0x2ba/frame 0xfffffe002a8e9700 calltrap() at calltrap+0x8/frame 0xfffffe002a8e9700 --- trap 0xc, rip =3D 0xffffffff80a19bfc, rsp =3D 0xfffffe002a8e97d0, rbp = =3D 0xfffffe002a8e97d0 --- vm_radix_lookup() at vm_radix_lookup+0x2c/frame 0xfffffe002a8e97d0 vm_fault_hold() at vm_fault_hold+0xd01/frame 0xfffffe002a8e9910 vm_fault() at vm_fault+0x60/frame 0xfffffe002a8e9950 trap_pfault() at trap_pfault+0x188/frame 0xfffffe002a8e99a0 trap() at trap+0x45a/frame 0xfffffe002a8e9ab0 calltrap() at calltrap+0x8/frame 0xfffffe002a8e9ab0 --- trap 0xc, rip =3D 0x80026d7a0, rsp =3D 0x7fffffffd1b0, rbp =3D 0x7fffff= ffd1b0 --- BT 3: ----- Unread portion of the kernel message buffer: panic: page 0xfffff800b5528f20 is allocated and unlocked cpuid =3D 3 time =3D 1542033030 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe002a885= 5f0 vpanic() at vpanic+0x1a3/frame 0xfffffe002a885650 panic() at panic+0x43/frame 0xfffffe002a8856b0 vm_page_dequeue() at vm_page_dequeue+0x24e/frame 0xfffffe002a8856f0 vm_page_alloc_domain_after() at vm_page_alloc_domain_after+0x28d/frame 0xfffffe002a885770 vm_page_alloc() at vm_page_alloc+0x74/frame 0xfffffe002a8857d0 vm_fault_hold() at vm_fault_hold+0x12c2/frame 0xfffffe002a885910 vm_fault() at vm_fault+0x60/frame 0xfffffe002a885950 trap_pfault() at trap_pfault+0x188/frame 0xfffffe002a8859a0 trap() at trap+0x45a/frame 0xfffffe002a885ab0 calltrap() at calltrap+0x8/frame 0xfffffe002a885ab0 --- trap 0xc, rip =3D 0x204860, rsp =3D 0x7fffffffda00, rbp =3D 0x7fffffffd= a90 --- --=20 You are receiving this mail because: You are the assignee for the bug.=