From nobody Thu Sep 14 07:22:55 2023 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4RmTLS3fK2z4tgqZ for ; Thu, 14 Sep 2023 07:22:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4RmTLS2dW1z3X01 for ; Thu, 14 Sep 2023 07:22:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1694676176; a=rsa-sha256; cv=none; b=GCyJcVyidwo+VXdyq5LmHPd7USJNvkOlxb3hlYoooYMhLsuwlYluFNWgMVizPTqLhhvS2U rJ44xX2Z8wU5s4b005eeqS2DWzh80w7Cxx/GCzNvhddRVyHYQn5eoCGCO52un7Kph7+Y9N mHnTX0mG6N01ovYgxjmvH71DRoEBi8F+b5sXnaFZz62bfx6Vxusggrs8LVvNIE8y159Onx +2dzUonRZcauiudgrODtecZv5wFswaoNbf956lDMZVax4oFroAoA9bLxKRbEc5QorEpVfX ykftS/LmcucXczhFSB2wmphkOJlIKAH3gX+Ur2QMf9c/861AoQoGJ86WWnjYeQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1694676176; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=pHWy9NFTPHivIeXqu1YWLyxRL1hdgjbjXEjgmt90SKo=; b=Zu/wxRS3yxOb259+XUhklrzqDLZycnC3K7Z4adNJwaaDajACLeoSqkquQfMhaumN7yOXLJ Rn1y5XHYrnAQdc4eZshHhzwVRjdCXRR727NVjg+tsgrdPZ1hfHbrV9QV7bx3o2tmKaFgF4 cAdP4gMKzCFkQWl/8m3eUjZp7PQ78bqtLlrYmHLoqiL9CeHWd/ZHTIrp37L2hkibDAAnix glnx6tpNzrThwgFMWhGhhyJXpRtQOnxsVz+aN5l1jAvmcN+b+Q5Yc0G39z66NJvPTz5le0 VPhOQ+f/bLbEnB/ZHyeTFOLT01uV8OqM2HsviNNdpHquUeoJjm6ydPbim+Q12g== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4RmTLS1hvJznk5 for ; Thu, 14 Sep 2023 07:22:56 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 38E7Mu1K053088 for ; Thu, 14 Sep 2023 07:22:56 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 38E7MuVL053087 for net@FreeBSD.org; Thu, 14 Sep 2023 07:22:56 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 272666] FreeBSD arm64 Azure panic in add_route Date: Thu, 14 Sep 2023 07:22:55 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: arm X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-arm@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272666 --- Comment #13 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3De7a9817b8d328dda04069b65944ce2ed6= f54c6f0 commit e7a9817b8d328dda04069b65944ce2ed6f54c6f0 Author: Souradeep Chakrabarti AuthorDate: 2023-09-14 07:11:25 +0000 Commit: Wei Hu CommitDate: 2023-09-14 07:11:25 +0000 Hyper-V: vmbus: implementat bus_get_dma_tag in vmbus In ARM64 Hyper-V UFS filesystem is getting corruption and those corruptions are consistently happening just after hitting a page boundary. It is unable to correctly read disk blocks into buffers that are not aligned to 512-byte boundaries. It happens because storvsc needs physically contiguous memory which may not be the case when bus_dma needs to create a bounce buffer. This can happen when the destination is not cache-line aligned. Hyper-V VMs have VMbus synthetic devices and PCI pass-thru devices that are added dynamically via the VMbus protocol and are not represented in the ACPI DSDT. Only the top level VMbus node exists in the DSDT. As such, on ARM64 these devices don't pick up coherence information and default to not hardware coherent. PR: 267654, 272666 Reviewed by: andrew, whu Tested by: lwhsu MFC after: 3 days Sponsored by: Microsoft Differential Revision: https://reviews.freebsd.org/D41728 sys/dev/hyperv/vmbus/vmbus.c | 33 +++++++++++++++++++++++++++++++++ sys/dev/hyperv/vmbus/vmbus_var.h | 1 + 2 files changed, 34 insertions(+) --=20 You are receiving this mail because: You are on the CC list for the bug.=