Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IntelMCHMonitor kernel panic on GA-Z490 on Monterey #16

Open
milmber opened this issue Oct 31, 2021 · 1 comment
Open

IntelMCHMonitor kernel panic on GA-Z490 on Monterey #16

milmber opened this issue Oct 31, 2021 · 1 comment

Comments

@milmber
Copy link

milmber commented Oct 31, 2021

Seeing kernel panics on my Gigabyte GA-Z490 Gaming X when using the IntelMCHMonitor.kext on MacOS 12.0.1 Monterey.

This worked without issue on Big Sur 11.6.1 and earlier.

Motherboard: Gigabyte GA-Z490M Gaming X
Bootloader: OpenCore 0.6.7
OS: MacOS 12.0.1
FakeSMC3 version: 3.5.3
IntelMCHMonitor version: 1.0.0d1 
Kexts loaded: AppleALC.kext , FakeSMC.kext, ITEIT87x.kext, IntelCPUMonitor.kext, IntelMausi.kext, IntelMCHMonitor.kext , Lilu.kext, NVMeFix.kext, RadeonMonitor.kext, USBMap.kext, WhateverGreen.kext

Kernel Panic Output

panic(cpu 4 caller 0xffffff80061e5b53): Kernel trap at 0xffffff800a018c01, type 14=page fault, registers:
CR0: 0x0000000080010033, CR2: 0xffffffd05e6aa8b0, CR3: 0x00000006c06e2164, CR4: 0x00000000003626e0
RAX: 0x0000000000000000, RBX: 0xffffff92c480dcf0, RCX: 0xffffffd05e6a5000, RDX: 0x0000000000000002
RSP: 0xffffffd038e1b760, RBP: 0xffffffd038e1b7a0, RSI: 0x0000000000000000, RDI: 0xffffff854c46ce10
R8:  0x000000000000ffff, R9:  0x00000000ffffffff, R10: 0x0000000000000001, R11: 0xffffff92c5065b00
R12: 0x00000000e00002c2, R13: 0xffffff92c480d1e0, R14: 0x0000000000000000, R15: 0xffffff92c4c4ef00
RFL: 0x0000000000010246, RIP: 0xffffff800a018c01, CS:  0x0000000000000008, SS:  0x0000000000000010
Fault CR2: 0xffffffd05e6aa8b0, Error code: 0x0000000000000000, Fault CPU: 0x4, PL: 0, VF: 1

Panicked task 0xffffff855d9f6120: 24 threads: pid 651: iStat Menus Stat
Backtrace (CPU 4), panicked thread: 0xffffff855d9e88b0, Frame : Return Address
0xffffffd038e1b190 : 0xffffff800609c00d mach_kernel : _handle_debugger_trap + 0x41d
0xffffffd038e1b1e0 : 0xffffff80061f5d85 mach_kernel : _kdp_i386_trap + 0x145
0xffffffd038e1b220 : 0xffffff80061e5763 mach_kernel : _kernel_trap + 0x533
0xffffffd038e1b270 : 0xffffff800603ba60 mach_kernel : _return_from_trap + 0xe0
0xffffffd038e1b290 : 0xffffff800609c3dd mach_kernel : _DebuggerTrapWithState + 0xad
0xffffffd038e1b3b0 : 0xffffff800609bb96 mach_kernel : _panic_trap_to_debugger + 0x2b6
0xffffffd038e1b410 : 0xffffff8006918649 mach_kernel : _panic + 0x54
0xffffffd038e1b480 : 0xffffff80061e5b53 mach_kernel : _sync_iss_to_iks + 0x2c3
0xffffffd038e1b600 : 0xffffff80061e5838 mach_kernel : _kernel_trap + 0x608
0xffffffd038e1b650 : 0xffffff800603ba60 mach_kernel : _return_from_trap + 0xe0
0xffffffd038e1b670 : 0xffffff800a018c01 org.slice.IntelMCHMonitor : __ZN15IntelMCHMonitor20callPlatformFunctionEPK8OSSymbolbPvS3_S3_S3_ + 0x123
0xffffffd038e1b7a0 : 0xffffff8006828bf6 mach_kernel : __ZN9IOService20callPlatformFunctionEPKcbPvS2_S2_S2_ + 0x56
0xffffffd038e1b7f0 : 0xffffff8009fc7153 org.netkas.FakeSMC : __ZN10FakeSMCKey8getValueEv + 0x39
0xffffffd038e1b810 : 0xffffff8009fc7e13 org.netkas.FakeSMC : __ZN13FakeSMCDevice18applesmc_fill_dataEP14AppleSMCStatus + 0x65
0xffffffd038e1b850 : 0xffffff8009fc7ae5 org.netkas.FakeSMC : __ZN13FakeSMCDevice23applesmc_io_data_writebEPvjj + 0x65
0xffffffd038e1b890 : 0xffffff80078347fd com.apple.driver.AppleSMC : __ZN8AppleSMC13smcWriteData8Eh + 0x18d
0xffffffd038e1b8c0 : 0xffffff8007835612 com.apple.driver.AppleSMC : __ZN8AppleSMC14smcReadKeyPMIOEjhyPv + 0x15c
0xffffffd038e1b910 : 0xffffff8007834b90 com.apple.driver.AppleSMC : __ZN8AppleSMC20smcReadKeyPMIOStaticEP8OSObjectPvS2_S2_S2_ + 0x56
0xffffffd038e1b940 : 0xffffff800685ce00 mach_kernel : __ZN13IOCommandGate9runActionEPFiP8OSObjectPvS2_S2_S2_ES2_S2_S2_S2_ + 0xb0
0xffffffd038e1b9a0 : 0xffffff8007834a1a com.apple.driver.AppleSMC : __ZN8AppleSMC17smcReadKeyWithSMCEjhyPv + 0x62
0xffffffd038e1b9f0 : 0xffffff800783d56e com.apple.driver.AppleSMC : __ZN14AppleSMCFamily17smcHandleYPCEventEP14SMCParamStructS1_jPy + 0xa8
0xffffffd038e1ba40 : 0xffffff800783a467 com.apple.driver.AppleSMC : __ZN14AppleSMCClient16smcYPCEventCheckEP14SMCParamStructS1_jPy + 0x5db
0xffffffd038e1bab0 : 0xffffff800688fb80 mach_kernel : _shim_io_connect_method_structureI_structureO + 0x1b0
0xffffffd038e1bb00 : 0xffffff800688de97 mach_kernel : __ZN12IOUserClient14externalMethodEjP25IOExternalMethodArgumentsP24IOExternalMethodDispatchP8OSObjectPv + 0x337
0xffffffd038e1bb50 : 0xffffff8006897feb mach_kernel : _is_io_connect_method + 0x3db
0xffffffd038e1bcb0 : 0xffffff800619f614 mach_kernel : _iokit_server_routine + 0x4e84
0xffffffd038e1bdc0 : 0xffffff8006076cf9 mach_kernel : _ipc_kmsg_send + 0x449
0xffffffd038e1be50 : 0xffffff800608dd89 mach_kernel : _mach_msg_overwrite_trap + 0x2d9
0xffffffd038e1bee0 : 0xffffff80061caaf2 mach_kernel : _mach_call_munger64 + 0x272
0xffffffd038e1bfa0 : 0xffffff800603c246 mach_kernel : _hndl_mach_scall64 + 0x16
      Kernel Extensions in backtrace:
         com.apple.driver.AppleSMC(3.1.9)[06C65E2A-865E-3A8B-916E-1DF59209CCE7]@0xffffff800782c000->0xffffff8007844fff
            dependency: com.apple.driver.watchdog(1)[D8D49004-8AE1-3589-A538-FE74937F8838]@0xffffff8009505000->0xffffff8009507fff
            dependency: com.apple.iokit.IOACPIFamily(1.4)[7EF77A11-B2B8-3CCF-9188-597E1279EDAC]@0xffffff8008748000->0xffffff8008749fff
            dependency: com.apple.iokit.IOPCIFamily(2.9)[5E1B0BE0-4B73-35F5-9126-EB05FBB8BAF5]@0xffffff8008bee000->0xffffff8008c18fff
         org.netkas.FakeSMC(3.5.3)[503675DF-E091-38F2-AE0C-5A1F93D84E15]@0xffffff8009fc5000->0xffffff8009fd5fff
            dependency: com.apple.iokit.IOACPIFamily(1.4)[7EF77A11-B2B8-3CCF-9188-597E1279EDAC]@0xffffff8008748000->0xffffff8008749fff
         org.slice.IntelMCHMonitor(1.0d1)[A877EB7A-4A40-3475-B99E-E8B7CE81ED91]@0xffffff800a018000->0xffffff800a01efff
            dependency: com.apple.iokit.IOPCIFamily(2.9)[5E1B0BE0-4B73-35F5-9126-EB05FBB8BAF5]@0xffffff8008bee000->0xffffff8008c18fff
            dependency: org.netkas.FakeSMC(3.5.3)[503675DF-E091-38F2-AE0C-5A1F93D84E15]@0xffffff8009fc5000->0xffffff8009fd5fff

Process name corresponding to current thread (0xffffff855d9e88b0): iStat Menus Status
Boot args: -v keepsyms=1 debug=0x100 alcid=1 shikigva=80 agdpmod=pikera chunklist-security-epoch=0 -chunklist-no-rev2-dev chunklist-security-epoch=0 -chunklist-no-rev2-dev

Mac OS version:
21A559

Kernel version:
Darwin Kernel Version 21.1.0: Wed Oct 13 17:33:23 PDT 2021; root:xnu-8019.41.5~1/RELEASE_X86_64
@SergeySlice
Copy link
Collaborator

Will take it into account.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants