Jump to content

ds1414

Members
  • Posts

    8
  • Joined

  • Last visited

ds1414's Achievements

Noob

Noob (1/14)

0

Reputation

  1. HI, You are probably right, it might be coincidental, I though I would post the findings here. I am hoping it does not crash, if it stays stable for more than a week and survives a few restarts and still stable I will be happy.
  2. So I solved the problem with the server. After the five days as posted in the previous post, we had to cut electricity to the house for some electrical work. After restoring power the server would not make it over 24 hours. It was very frustrating I have become depended on a new apps running there for my daily work. So I upgraded the BIOS to the latest version, as per everyone's suggestion. Unfortunately that did not solve the issue. In desperation I decided to swap the mother board with an intel one hoping that would work. Due to motherboard limitation I could not do it. So since all suggests where pointing towards motherboard power, I swapped the system power supply. It has been two days now and it is running smoothly. I will post again in a few more days on the progress. DS
  3. Hello , I used the recommendation from the above post and so far it has been running stable for that last five days. I will reboot the server at some point the next couple of days and post the changes I made in the Asus motherboard .
  4. Hi, I looked through there as well and I could not see any eye pocking things, I though maybe someone with more experience than me would spot something. Anyway, thanks for the help on this. I will take your advice and try to pinpoint the error using safemode. I will post findings in a few days time. Take care
  5. Hi, Yes before I posted here I disabled c states as per these instructions I found on the forum. I will reboot the server later and look for the bios setting. /////////////////////////////// You have a first gen Ryzen, which UnRAID doesn't like to play nice with due to sleep states. Make your /config/go file look like this: #!/bin/bash # Start the Management Utility /usr/local/sbin/zenstates --c6-disable /usr/local/sbin/emhttp & ///////////////////////////////////////
  6. Hi, I had the syslog enabled for a few days now and it went through a couple of crashes. That's why I posted it. We can deleted it and start over and wait for another crash. The most recent data I have is what was originally posted and I had the live log on the screen. I was able to get it because it was in the browser . Tanks
  7. Hello, Thanks for the quick replies. Attached are the logs and diagnostics as requested. Thanks unraid1-diagnostics-20221005-1819.zip syslog-192.168.1.115.log
  8. Hello, I have been using Uraid for the past year and it has been a pleasure. However this month or so it started crashing almost every couple of days, I would restart hoping it was a transient thing. Unfortunately it keeps coming back, today it happened twice. As a first step I disabled the VM manager to see if that had anything to do with it. Below is the log dump during the time of the crash, I would appreciate it if anyone could point me in the right direction in solving this. ////////////////// Oct 5 14:36:16 unraid1 webGUI: Successful login user root from 192.168.1.174 Oct 5 14:45:09 unraid1 kernel: docker0: port 6(veth6499aa1) entered blocking state Oct 5 14:45:09 unraid1 kernel: docker0: port 6(veth6499aa1) entered disabled state Oct 5 14:45:09 unraid1 kernel: device veth6499aa1 entered promiscuous mode Oct 5 14:45:11 unraid1 kernel: eth0: renamed from vethf05059e Oct 5 14:45:11 unraid1 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth6499aa1: link becomes ready Oct 5 14:45:11 unraid1 kernel: docker0: port 6(veth6499aa1) entered blocking state Oct 5 14:45:11 unraid1 kernel: docker0: port 6(veth6499aa1) entered forwarding state Oct 5 14:45:13 unraid1 avahi-daemon[26200]: Joining mDNS multicast group on interface veth6499aa1.IPv6 with address fe80::740e:a9ff:fef8:370b. Oct 5 14:45:13 unraid1 avahi-daemon[26200]: New relevant interface veth6499aa1.IPv6 for mDNS. Oct 5 14:45:13 unraid1 avahi-daemon[26200]: Registering new address record for fe80::740e:a9ff:fef8:370b on veth6499aa1.*. Oct 5 15:12:15 unraid1 kernel: BUG: unable to handle page fault for address: ffff88883f37ce90 Oct 5 15:12:15 unraid1 kernel: #PF: supervisor read access in kernel mode Oct 5 15:12:15 unraid1 kernel: #PF: error_code(0x0000) - not-present page Oct 5 15:12:15 unraid1 kernel: PGD 2801067 P4D 2801067 PUD 2804067 PMD 0 Oct 5 15:12:15 unraid1 kernel: Oops: 0000 [#1] PREEMPT SMP NOPTI Oct 5 15:12:15 unraid1 kernel: CPU: 10 PID: 17042 Comm: sh Tainted: G S 5.19.9-Unraid #1 Oct 5 15:12:15 unraid1 kernel: Hardware name: System manufacturer System Product Name/TUF GAMING X570-PLUS (WI-FI), BIOS 3402 01/13/2021 Oct 5 15:12:15 unraid1 kernel: RIP: 0010:__free_one_page+0x1f6/0x285 Oct 5 15:12:15 unraid1 kernel: Code: ef 48 c1 e7 06 4c 01 f7 e8 8f e8 ff ff 4c 8b 44 24 08 48 85 c0 75 98 49 6b d7 68 48 c1 e3 04 48 8d 84 13 00 01 00 00 48 01 d3 <49> 8b 8c 1c 00 01 00 00 4c 01 e0 4c 89 41 08 49 89 4e 08 49 89 46 Oct 5 15:12:15 unraid1 kernel: RSP: 0018:ffffc9000234fc40 EFLAGS: 00010002 Oct 5 15:12:15 unraid1 kernel: RAX: 0000000010000110 RBX: 0000000010000010 RCX: 00000000f0000080 Oct 5 15:12:15 unraid1 kernel: RDX: 0000000000000000 RSI: 00000000004b6e7e RDI: 00000000004b6e7c Oct 5 15:12:15 unraid1 kernel: RBP: 0000000000000000 R08: ffffea0012db9f88 R09: 0000000000000000 Oct 5 15:12:15 unraid1 kernel: R10: ffff8880c479e540 R11: 0000000000000000 R12: ffff88882f37cd80 Oct 5 15:12:15 unraid1 kernel: R13: 00000000004b6e7e R14: ffffea0012db9f80 R15: 0000000000000000 Oct 5 15:12:15 unraid1 kernel: FS: 0000000000000000(0000) GS:ffff88880ea80000(0000) knlGS:0000000000000000 Oct 5 15:12:15 unraid1 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Oct 5 15:12:15 unraid1 kernel: CR2: ffff88883f37ce90 CR3: 000000025533a000 CR4: 0000000000350ee0 Oct 5 15:12:15 unraid1 kernel: Call Trace: Oct 5 15:12:15 unraid1 kernel: <TASK> Oct 5 15:12:15 unraid1 kernel: free_pcppages_bulk+0x158/0x1d2 Oct 5 15:12:15 unraid1 kernel: free_unref_page+0x8d/0xa9 Oct 5 15:12:15 unraid1 kernel: __mmdrop+0x4b/0x104 Oct 5 15:12:15 unraid1 kernel: begin_new_exec+0x6f7/0x945 Oct 5 15:12:15 unraid1 kernel: load_elf_binary+0x22c/0x12ae Oct 5 15:12:15 unraid1 kernel: ? __kernel_read+0x100/0x145 Oct 5 15:12:15 unraid1 kernel: ? __kernel_read+0x100/0x145 Oct 5 15:12:15 unraid1 kernel: bprm_execve+0x23a/0x52b Oct 5 15:12:15 unraid1 kernel: do_execveat_common.isra.0+0x1a9/0x1d2 Oct 5 15:12:15 unraid1 kernel: __x64_sys_execve+0x38/0x44 Oct 5 15:12:15 unraid1 kernel: do_syscall_64+0x6b/0x81 Oct 5 15:12:15 unraid1 kernel: entry_SYSCALL_64_after_hwframe+0x63/0xcd Oct 5 15:12:15 unraid1 kernel: RIP: 0033:0x1483c12b0e47 Oct 5 15:12:15 unraid1 kernel: Code: Unable to access opcode bytes at RIP 0x1483c12b0e1d. Oct 5 15:12:15 unraid1 kernel: RSP: 002b:00007fff815b6198 EFLAGS: 00000202 ORIG_RAX: 000000000000003b Oct 5 15:12:15 unraid1 kernel: RAX: ffffffffffffffda RBX: 000000000054cd30 RCX: 00001483c12b0e47 Oct 5 15:12:15 unraid1 kernel: RDX: 000000000054c010 RSI: 0000000000541b10 RDI: 000000000054f150 Oct 5 15:12:15 unraid1 kernel: RBP: 000000000054f150 R08: 0000000000541b10 R09: 00706572672f6e69 Oct 5 15:12:15 unraid1 kernel: R10: 0000000000000005 R11: 0000000000000202 R12: 000000000054f150 Oct 5 15:12:15 unraid1 kernel: R13: 0000000000541b10 R14: 000000000054c010 R15: 000000000052a5e4 Oct 5 15:12:15 unraid1 kernel: </TASK> Oct 5 15:12:15 unraid1 kernel: Modules linked in: dm_mod dax xt_CHECKSUM ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat iptable_mangle vhost_net tun vhost vhost_iotlb tap tcp_diag udp_diag inet_diag cmac cifs asn1_decoder cifs_arc4 cifs_md4 oid_registry dns_resolver ipvlan veth xt_nat xt_tcpudp xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter xfs md_mod iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi wireguard curve25519_x86_64 libcurve25519_generic libchacha20poly1305 chacha_x86_64 poly1305_x86_64 ip6_udp_tunnel udp_tunnel libchacha ip6table_filter ip6_tables iptable_filter ip_tables x_tables af_packet 8021q garp mrp bridge stp llc bonding tls ipv6 btusb btrtl btbcm edac_mce_amd edac_core wmi_bmof kvm_amd kvm crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel btintel aesni_intel crypto_simd cryptd bluetooth mpt3sas rapl input_leds led_class joydev nvme i2c_piix4 Oct 5 15:12:15 unraid1 kernel: r8169 k10temp ahci i2c_core cdc_acm ecdh_generic raid_class nvme_core ecc libahci ccp realtek scsi_transport_sas wmi tpm_crb tpm_tis tpm_tis_core tpm button acpi_cpufreq unix Oct 5 15:12:15 unraid1 kernel: CR2: ffff88883f37ce90 Oct 5 15:12:15 unraid1 kernel: ---[ end trace 0000000000000000 ]--- Oct 5 15:12:15 unraid1 kernel: RIP: 0010:__free_one_page+0x1f6/0x285 Oct 5 15:12:15 unraid1 kernel: Code: ef 48 c1 e7 06 4c 01 f7 e8 8f e8 ff ff 4c 8b 44 24 08 48 85 c0 75 98 49 6b d7 68 48 c1 e3 04 48 8d 84 13 00 01 00 00 48 01 d3 <49> 8b 8c 1c 00 01 00 00 4c 01 e0 4c 89 41 08 49 89 4e 08 49 89 46 Oct 5 15:12:15 unraid1 kernel: RSP: 0018:ffffc9000234fc40 EFLAGS: 00010002 Oct 5 15:12:15 unraid1 kernel: RAX: 0000000010000110 RBX: 0000000010000010 RCX: 00000000f0000080 Oct 5 15:12:15 unraid1 kernel: RDX: 0000000000000000 RSI: 00000000004b6e7e RDI: 00000000004b6e7c //////////////// System information: Model:Custom M/B:ASUSTeK COMPUTER INC. TUF GAMING X570-PLUS (WI-FI) Version Rev X.0x BIOS:American Megatrends Inc. Version 3402. Dated: 01/13/2021 CPU:AMD Ryzen 7 3700X 8-Core @ 3600 MHz HVM:Enabled IOMMU:Enabled Cache:512 KiB, 4 MB, 32 MB Memory:32 GiB DDR4 (max. installable capacity 128 GiB) Network:bond0: fault-tolerance (active-backup), mtu 1500 Kernel:Linux 5.19.9-Unraid x86_64 OpenSSL:1.1.1q Uptime:
×
×
  • Create New...