From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.9 required=3.0 tests=GAPPY_SUBJECT, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8ECF8C433DF for ; Thu, 4 Jun 2020 06:43:51 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5A75720820 for ; Thu, 4 Jun 2020 06:43:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726744AbgFDGnu convert rfc822-to-8bit (ORCPT ); Thu, 4 Jun 2020 02:43:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:39846 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726248AbgFDGnu (ORCPT ); Thu, 4 Jun 2020 02:43:50 -0400 From: bugzilla-daemon@bugzilla.kernel.org To: kvm@vger.kernel.org Subject: [Bug 208047] New: KVM - random guest hangs if dual channel memory enabled. (probably A.G.E.S.A. bug) Date: Thu, 04 Jun 2020 06:43:47 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: AssignedTo virtualization_kvm@kernel-bugs.osdl.org X-Bugzilla-Product: Virtualization X-Bugzilla-Component: kvm X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: high X-Bugzilla-Who: itemcode@mail.ru X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: virtualization_kvm@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version cf_kernel_version rep_platform op_sys cf_tree bug_status bug_severity priority component assigned_to reporter cf_regression Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org https://bugzilla.kernel.org/show_bug.cgi?id=208047 Bug ID: 208047 Summary: KVM - random guest hangs if dual channel memory enabled. (probably A.G.E.S.A. bug) Product: Virtualization Version: unspecified Kernel Version: 5.5.x (5.6.x) Hardware: Other OS: Linux Tree: Mainline Status: NEW Severity: high Priority: P1 Component: kvm Assignee: virtualization_kvm@kernel-bugs.osdl.org Reporter: itemcode@mail.ru Regression: No Hi. After my deep testing in various combinations of hardware, i can confirm that there is a bug, when using the dual-channel memory mode, which leads to guest (win10, win 8.1 in my case) freezes on systems with B350, B450 chipset. Tested on Gigabyte A320M-S2H, Gigabyte B450i AORUS Pro Wifi, Asus B450 Strix I Gaming with Ryzen 5 2400 (3400G) and Kingston, Corsair, Noname memory in various combinations. This problem solved by installing different memory modules of different sizes (8G+4G) and (or) modules with different timings (this disables dual channel mode) And now... Steps to reproduce: 1. Check your memory worked in dual-channel mode. 2. Install Ubuntu(20.04), ArchLinux (kernel 5.6.15 in my case, with ACS patch), Manjaro KDE (19.x), it does not matter... 3. Install libvirt, qemu, ovmf and other virtualization stuff. 4. Configure configs: /etc/default/grub: GRUB_CMDLINE_LINUX_DEFAULT="audit=0 loglevel=3 quiet amd_iommu=on amd_iommu=pt pcie_acs_override=downstream,multifunction isolcpus=2,6,3,7 default_hugepagesz=1G hugepagesz=1G hugepages=8" /etc/modprobe.d/avic.conf: options kvm-amd nested=0 avic=1 npt=1 /etc/modprobe.d/kvm.conf: options kvm halt_poll_ns=0 options kvm report_ignored_msrs=0 options kvm ignore_msrs=1 options vfio_iommu_type1 allow_unsafe_interrupts=1 /etc/modprobe.d/kvm.conf: softdep amdgpu pre: vfio-pci softdep snd_hda_intel pre: vfio-pci options vfio-pci ids=1002:67ff,1002:aae0,1022:15e0,1022:15e1 options vfio-pci disable_vga=1 /etc/libvirt/qemu/win10.xml win10 b33a0bec-cd23-4cfb-b4fe 8388608 8388608 4 hvm /usr/share/ovmf/x64/OVMF_CODE-pure-efi.fd /usr/share/ovmf/x64/OVMF_VARS-pure-efi-1280x1024.fd destroy restart destroy /usr/bin/qemu-system-x86_64