From nobody Mon Sep 18 10:39:14 2023 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Rq1W720mHz4syWp for ; Mon, 18 Sep 2023 10:39:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Rq1W70yDnz3YNF for ; Mon, 18 Sep 2023 10:39:15 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1695033555; a=rsa-sha256; cv=none; b=AYeVtFh7D7H2EysMPhdfA+bdj3P3llkcS/mmAgnGNNDLSD+xzBYcSOaqNPfGCIY8qWjrrU 5nQPhsDA2bMpCgDUa2SSc7fcMNTSXhJ1bSad/wQKF9FuRF7X1XXDm2jK9+V8gaC+2zXTKg +WCD/j0wUUHfsVpRF+8yMHUamITzB9St+ceqO53ZpxDOQs4Z7ePUplJeWpdq+sIH9V+vfK fgSlZeNzQQFF3wpUGdzajQi+dwZ3SI7MYUb+Xz7uC6m24QnwxuMUtG+l2Gcz/lV+dnBGI1 MjQ2ihlg0vmpLV1bt6R2/UGL+fsliqSXy39hNqoCxdDBHFHvyxQE9MBBvTWWrg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1695033555; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2ulOdJbBPoxsb0KXu9q+40Di2ysCRCNNgiQ83osd37g=; b=bjbwJo3S1N6zs2AbaRFVK/3zr4tc70rN0FpXtQP6lfSP1bV1UXK4iMW8cdAE4soZKq40Zp 4pcw2vuxqOr+aL0U3AkPRsEEzc/+F2fu5PUAEeMb0xCF0J/b1iE9Le++CsnbLrtSebRlJG MjGA/SL9b6yVOnDH1FxY8bYznwny7Giia7/BPRfcitknOhNpQAKVZY7A7ZtmKFtqLlaIkv aWWZ8iSAHF9wZ9QwmaP2MoV2AkzgfD3o+RWXM+KEuEB0VYGddCHWwG3X5N4CRjZYZmoo/1 baAj+N3jSCIGBnhnnpugb+3xDTGLZKVRps1AR8WU/kTig2YdV3jeJ9mbvPvgyA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Rq1W6735nzClp for ; Mon, 18 Sep 2023 10:39:14 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 38IAdEsm073968 for ; Mon, 18 Sep 2023 10:39:14 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 38IAdEwb073967 for net@FreeBSD.org; Mon, 18 Sep 2023 10:39:14 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 272666] FreeBSD arm64 Azure panic in add_route Date: Mon, 18 Sep 2023 10:39:14 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: arm X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-arm@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272666 --- Comment #14 from commit-hook@FreeBSD.org --- A commit in branch stable/14 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D85bc81352e4b0d0a9da251bacec35eec1= 30eee49 commit 85bc81352e4b0d0a9da251bacec35eec130eee49 Author: Souradeep Chakrabarti AuthorDate: 2023-09-14 07:11:25 +0000 Commit: Wei Hu CommitDate: 2023-09-18 10:26:59 +0000 Hyper-V: vmbus: implementat bus_get_dma_tag in vmbus In ARM64 Hyper-V UFS filesystem is getting corruption and those corruptions are consistently happening just after hitting a page boundary. It is unable to correctly read disk blocks into buffers that are not aligned to 512-byte boundaries. It happens because storvsc needs physically contiguous memory which may not be the case when bus_dma needs to create a bounce buffer. This can happen when the destination is not cache-line aligned. Hyper-V VMs have VMbus synthetic devices and PCI pass-thru devices that are added dynamically via the VMbus protocol and are not represented in the ACPI DSDT. Only the top level VMbus node exists in the DSDT. As such, on ARM64 these devices don't pick up coherence information and default to not hardware coherent. PR: 267654, 272666 Reviewed by: andrew, whu Tested by: lwhsu MFC after: 3 days Sponsored by: Microsoft Differential Revision: https://reviews.freebsd.org/D41728 (cherry picked from commit e7a9817b8d328dda04069b65944ce2ed6f54c6f0) sys/dev/hyperv/vmbus/vmbus.c | 33 +++++++++++++++++++++++++++++++++ sys/dev/hyperv/vmbus/vmbus_var.h | 1 + 2 files changed, 34 insertions(+) --=20 You are receiving this mail because: You are on the CC list for the bug.=