From nobody Mon Sep 18 15:00:07 2023 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Rq7J92YFCz4tKWw for ; Mon, 18 Sep 2023 15:00:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Rq7J91XMNz3Bn8 for ; Mon, 18 Sep 2023 15:00:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1695049209; a=rsa-sha256; cv=none; b=iGfkwSZzo8DoQJmq/+sUIbcHx/rHMJejufEjDE9pkz3yFzgoH9hXkd9uqTZSMAj9WSTsQx qdFjEWDre3HtNF4e4fxHp1C0QeBZCayO2jL1AyrTXjDsAyzMd6MtYdmIMuPZS7uKl+KuBw FgCJFNcSy2RBx/tzgWRZsMaGO+XgsvskKOpcO3ialRy/kVVvGKf62m7yrMsMwmvFH+NUOV e+QC2ZfYA3xtreUpyIFvAJfHhWjOA7yfHhlz2eT6qOYc80aw2QtZeZfCULJ2jLIlCzydYN UwH0gRxQ0jda1g9hTqpB1Q8etbwQBR54Rl+RkBGdPlbWIfN1kedkHlWIKgAE/A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1695049209; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tQSc47+u8RMGUlozOfpM7uZWzIVAix9GMEyd1Z+X3r8=; b=uVnwDA9qM9iEuS98A7Z5Drx0tSHAGJc9sCDO/8XaQAZPA57xZDE0qV7eOjcf1uVZI1PmVz 9y+MtVElW6223VkirnLnSb7ZykLgnq3fdyWVMYa3hzPZdYUSL1+AgQtcTHpyRIiLVH2y+x uPrDt2eqXJpFS7qU/5UhC8OxcEoSCN++T1ziJXD1EzLKBra+NzJKfmG0R/K5meykW2GKL+ KZotKnu5Ccbk0ZJGx70SjgT5Ae2FsLtUE/erYX3jpxsCQ8Zr0CRhdvs3cdjvCnqJiyNE5I PIoYUAYu9jNnfy62A6QTHIEitDsjkNjX/3DAdiRqBQVHsmcMXb5U8tUikyvdMw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Rq7J90fcFzb2H for ; Mon, 18 Sep 2023 15:00:09 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 38IF09UI055336 for ; Mon, 18 Sep 2023 15:00:09 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 38IF09S6055335 for net@FreeBSD.org; Mon, 18 Sep 2023 15:00:09 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 272666] FreeBSD arm64 Azure panic in add_route Date: Mon, 18 Sep 2023 15:00:07 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: arm X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: commit-hook@FreeBSD.org X-Bugzilla-Status: Closed X-Bugzilla-Resolution: FIXED X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-arm@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D272666 --- Comment #15 from commit-hook@FreeBSD.org --- A commit in branch releng/14.0 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D48a799af88c0c77963ffb23eba797f85f= 86751dd commit 48a799af88c0c77963ffb23eba797f85f86751dd Author: Souradeep Chakrabarti AuthorDate: 2023-09-14 07:11:25 +0000 Commit: Wei Hu CommitDate: 2023-09-18 14:57:57 +0000 Hyper-V: vmbus: implementat bus_get_dma_tag in vmbus In ARM64 Hyper-V UFS filesystem is getting corruption and those corruptions are consistently happening just after hitting a page boundary. It is unable to correctly read disk blocks into buffers that are not aligned to 512-byte boundaries. It happens because storvsc needs physically contiguous memory which may not be the case when bus_dma needs to create a bounce buffer. This can happen when the destination is not cache-line aligned. Hyper-V VMs have VMbus synthetic devices and PCI pass-thru devices that are added dynamically via the VMbus protocol and are not represented in the ACPI DSDT. Only the top level VMbus node exists in the DSDT. As such, on ARM64 these devices don't pick up coherence information and default to not hardware coherent. Approved by: re (gjb) PR: 267654, 272666 Reviewed by: andrew, whu Tested by: lwhsu Sponsored by: Microsoft Differential Revision: https://reviews.freebsd.org/D41728 (cherry picked from commit e7a9817b8d328dda04069b65944ce2ed6f54c6f0) (cherry picked from commit 85bc81352e4b0d0a9da251bacec35eec130eee49) sys/dev/hyperv/vmbus/vmbus.c | 33 +++++++++++++++++++++++++++++++++ sys/dev/hyperv/vmbus/vmbus_var.h | 1 + 2 files changed, 34 insertions(+) --=20 You are receiving this mail because: You are on the CC list for the bug.=