[Kernel-packages] [Bug 2028197] [NEW] rshim console truncates dmesg output due to tmfifo issue
Public bug reported: SRU Justification: [Impact] mlxbf_tmfifo driver does not always schedule work for VIRTIO CONSOLE nottification. The result is with rshim console, the dmesg output would be cut off or simply cat a big text file to stdout. [Fix] * Make sure TM_TX_LWM_IRQ bit is set when there is a notification of virtio console event. [Test Case] * Compare the output of dmesg from rshim console and ssh session. Make sure both are the same. * Issue is reproduced w/o fix and compare the same dmesg output from the same as above. [Regression Potential] The changes affect only virtio console event handling only and been tested fully. [Others] This issue is the same on focal and Jammy. ** Affects: linux-bluefield (Ubuntu) Importance: Undecided Status: New ** Description changed: SRU Justification: [Impact] mlxbf_tmfifo driver does not always schedule work for VIRTIO CONSOLE nottification. The result is with rshim console, the dmesg output would be cut off or simply cat a big text file to stdout. [Fix] * Make sure TM_TX_LWM_IRQ bit is set when there is a notification of virtio console event. [Test Case] * Compare the output of dmesg from rshim console and ssh session. Make sure both are the same. - * Issue is reproduced w/o fix and compare the same dmesg output from the same as above. + * Issue is reproduced w/o fix and compare the same dmesg output from the same as above. [Regression Potential] The changes affect only virtio console event handling only and been tested fully. + + [Others] + This issue is the same on focal and Jammy. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2028197 Title: rshim console truncates dmesg output due to tmfifo issue Status in linux-bluefield package in Ubuntu: New Bug description: SRU Justification: [Impact] mlxbf_tmfifo driver does not always schedule work for VIRTIO CONSOLE nottification. The result is with rshim console, the dmesg output would be cut off or simply cat a big text file to stdout. [Fix] * Make sure TM_TX_LWM_IRQ bit is set when there is a notification of virtio console event. [Test Case] * Compare the output of dmesg from rshim console and ssh session. Make sure both are the same. * Issue is reproduced w/o fix and compare the same dmesg output from the same as above. [Regression Potential] The changes affect only virtio console event handling only and been tested fully. [Others] This issue is the same on focal and Jammy. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2028197/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2015292] [NEW] Missing ACPI device info in mlxbf_pka module
Public bug reported: Config regarding BF ACPI devices and Window RAM is missing. ** Affects: linux-bluefield (Ubuntu) Importance: Undecided Assignee: Shih-Yi Chen (shihyic) Status: In Progress ** Changed in: linux-bluefield (Ubuntu) Assignee: (unassigned) => Shih-Yi Chen (shihyic) ** Changed in: linux-bluefield (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2015292 Title: Missing ACPI device info in mlxbf_pka module Status in linux-bluefield package in Ubuntu: In Progress Bug description: Config regarding BF ACPI devices and Window RAM is missing. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2015292/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2012976] [NEW] OpenSSL 3.0.2 on Jammy failure on RSA speed test with async_jobs
Public bug reported: Issue opened with OpenSSL. https://github.com/openssl/openssl/pull/20616 RSA verification failed when all loopargs[] share the same EVP_PKEY rsa_key. Tested and reproduced on openssl-3.0 branch $ apps/openssl speed -engine pka -async_jobs 8 rsa2048 Engine "pka" set. Doing 2048 bits private rsa's for 10s: 46554 2048 bits private RSA's in 3.70s RSA verify setup failure. No RSA verify will be done. 20B0B281:error:028A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75: 20B0B281:error:0272:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:606: 20B0B281:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:833: version: 3.0.9-dev built on: Mon Mar 27 13:48:54 2023 UTC options: bn(64,64) compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG CPUINFO: OPENSSL_armcap=0xbd Tested w/ changes $ apps/openssl speed -engine pka -async_jobs 8 rsa2048 Engine "pka" set. Doing 2048 bits private rsa's for 10s: 49465 2048 bits private RSA's in 3.96s Doing 2048 bits public rsa's for 10s: 333008 2048 bits public RSA's in 7.61s version: 3.0.9-dev built on: Mon Mar 27 13:48:54 2023 UTC options: bn(64,64) compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG CPUINFO: OPENSSL_armcap=0xbd sign verify sign/s verify/s rsa 2048 bits 0.80s 0.23s 12491.2 43759.3 version: 3.0.9-dev built on: Mon Mar 27 13:48:54 2023 UTC options: bn(64,64) compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG CPUINFO: OPENSSL_armcap=0xbd ** Affects: linux-bluefield (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2012976 Title: OpenSSL 3.0.2 on Jammy failure on RSA speed test with async_jobs Status in linux-bluefield package in Ubuntu: New Bug description: Issue opened with OpenSSL. https://github.com/openssl/openssl/pull/20616 RSA verification failed when all loopargs[] share the same EVP_PKEY rsa_key. Tested and reproduced on openssl-3.0 branch $ apps/openssl speed -engine pka -async_jobs 8 rsa2048 Engine "pka" set. Doing 2048 bits private rsa's for 10s: 46554 2048 bits private RSA's in 3.70s RSA verify setup failure. No RSA verify will be done. 20B0B281:error:028A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75: 20B0B281:error:0272:rsa routines:rsa_ossl_public_decrypt:padding check failed:crypto/rsa/rsa_ossl.c:606: 20B0B281:error:1C880004:Provider routines:rsa_verify:RSA lib:providers/implementations/signature/rsa_sig.c:833: version: 3.0.9-dev built on: Mon Mar 27 13:48:54 2023 UTC options: bn(64,64) compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG CPUINFO: OPENSSL_armcap=0xbd Tested w/ changes $ apps/openssl speed -engine pka -async_jobs 8 rsa2048 Engine "pka" set. Doing 2048 bits private rsa's for 10s: 49465 2048 bits private RSA's in 3.96s Doing 2048 bits public rsa's for 10s: 333008 2048 bits public RSA's in 7.61s version: 3.0.9-dev built on: Mon Mar 27 13:48:54 2023 UTC options: bn(64,64) compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG CPUINFO: OPENSSL_armcap=0xbd sign verify sign/s verify/s rsa 2048 bits 0.80s 0.23s 12491.2 43759.3 version: 3.0.9-dev built on: Mon Mar 27 13:48:54 2023 UTC options: bn(64,64) compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG CPUINFO: OPENSSL_armcap=0xbd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2012976/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2001564] Re: Kernel crash due to Bluefield pka TRNG ioctl call
** Tags removed: verification-needed-focal ** Tags added: verification-done-focal -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2001564 Title: Kernel crash due to Bluefield pka TRNG ioctl call Status in linux-bluefield package in Ubuntu: Invalid Status in linux-bluefield source package in Focal: Fix Committed Status in linux-bluefield source package in Jammy: Fix Committed Bug description: SRU Justification [Impact] Bluefield 3 on Ubuntu 22.04 and OpenSSL 3.0.2, encounters kernel crash/oops when HTTPS client uses OpenSSL with PKA engine during TLS handshake. The issue is with TRNG ioctl call. The kernel logs show the following errors. Unable to handle kernel access to user memory outside uaccess routines at virtual address ce65d328 BF3 on Ubuntu 22.04, OpenSSl 3.0.2 [Fix] * Change RNG ioctl kernel handler code to copy data from user to kernel space. [Test Case] openssl rand -engine pka 512 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2001564/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2001564] Re: Kernel crash due to Bluefield pka TRNG ioctl call
** Description changed: - Reproducible with TLS/HTTPS client initiates TLS handshake on BF3 with - Ubuntu 22.04, OpenSSL 3.0.2. + SRU Justification - wget https://google.com + [Impact] + Bluefield 3 on Ubuntu 22.04 and OpenSSL 3.0.2, encounters kernel crash/oops when HTTPS client uses OpenSSL with PKA engine during TLS handshake. The issue is with TRNG ioctl call. The kernel logs show the following errors. - kernel will crash with the following logs. + Unable to handle kernel access to user memory outside uaccess routines + at virtual address ce65d328 - [ 1126.234077] Unable to handle kernel access to user memory outside uaccess routines at virtual address ce65d328 - [ 1126.255579] Mem abort info: - [ 1126.261186] ESR = 0x960f - [ 1126.267319] EC = 0x25: DABT (current EL), IL = 32 bits - [ 1126.277968] SET = 0, FnV = 0 - [ 1126.284081] EA = 0, S1PTW = 0 - [ 1126.290367] FSC = 0x0f: level 3 permission fault - [ 1126.299964] Data abort info: - [ 1126.305727] ISV = 0, ISS = 0x000f - [ 1126.313411] CM = 0, WnR = 0 - [ 1126.319349] user pgtable: 4k pages, 48-bit VAs, pgdp=000154bf1000 - [ 1126.332259] [ce65d328] pgd=08011927a003, p4d=08011927a003, pud=080103a97003, pmd=080156cba003, pte=00e8000115a3ff43 - [ 1126.357360] Internal error: Oops: 960f [#1] PREEMPT SMP + BF3 on Ubuntu 22.04, OpenSSl 3.0.2 + + [Fix] + * Change RNG ioctl kernel handler code to copy data from user to kernel space. + + [Test Case] + openssl rand -engine pka 512 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2001564 Title: Kernel crash due to Bluefield pka TRNG ioctl call Status in linux-bluefield package in Ubuntu: New Bug description: SRU Justification [Impact] Bluefield 3 on Ubuntu 22.04 and OpenSSL 3.0.2, encounters kernel crash/oops when HTTPS client uses OpenSSL with PKA engine during TLS handshake. The issue is with TRNG ioctl call. The kernel logs show the following errors. Unable to handle kernel access to user memory outside uaccess routines at virtual address ce65d328 BF3 on Ubuntu 22.04, OpenSSl 3.0.2 [Fix] * Change RNG ioctl kernel handler code to copy data from user to kernel space. [Test Case] openssl rand -engine pka 512 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2001564/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 2001564] [NEW] Kernel crash due to Bluefield pka TRNG ioctl call
Public bug reported: Reproducible with TLS/HTTPS client initiates TLS handshake on BF3 with Ubuntu 22.04, OpenSSL 3.0.2. wget https://google.com kernel will crash with the following logs. [ 1126.234077] Unable to handle kernel access to user memory outside uaccess routines at virtual address ce65d328 [ 1126.255579] Mem abort info: [ 1126.261186] ESR = 0x960f [ 1126.267319] EC = 0x25: DABT (current EL), IL = 32 bits [ 1126.277968] SET = 0, FnV = 0 [ 1126.284081] EA = 0, S1PTW = 0 [ 1126.290367] FSC = 0x0f: level 3 permission fault [ 1126.299964] Data abort info: [ 1126.305727] ISV = 0, ISS = 0x000f [ 1126.313411] CM = 0, WnR = 0 [ 1126.319349] user pgtable: 4k pages, 48-bit VAs, pgdp=000154bf1000 [ 1126.332259] [ce65d328] pgd=08011927a003, p4d=08011927a003, pud=080103a97003, pmd=080156cba003, pte=00e8000115a3ff43 [ 1126.357360] Internal error: Oops: 960f [#1] PREEMPT SMP ** Affects: linux-bluefield (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-bluefield in Ubuntu. https://bugs.launchpad.net/bugs/2001564 Title: Kernel crash due to Bluefield pka TRNG ioctl call Status in linux-bluefield package in Ubuntu: New Bug description: Reproducible with TLS/HTTPS client initiates TLS handshake on BF3 with Ubuntu 22.04, OpenSSL 3.0.2. wget https://google.com kernel will crash with the following logs. [ 1126.234077] Unable to handle kernel access to user memory outside uaccess routines at virtual address ce65d328 [ 1126.255579] Mem abort info: [ 1126.261186] ESR = 0x960f [ 1126.267319] EC = 0x25: DABT (current EL), IL = 32 bits [ 1126.277968] SET = 0, FnV = 0 [ 1126.284081] EA = 0, S1PTW = 0 [ 1126.290367] FSC = 0x0f: level 3 permission fault [ 1126.299964] Data abort info: [ 1126.305727] ISV = 0, ISS = 0x000f [ 1126.313411] CM = 0, WnR = 0 [ 1126.319349] user pgtable: 4k pages, 48-bit VAs, pgdp=000154bf1000 [ 1126.332259] [ce65d328] pgd=08011927a003, p4d=08011927a003, pud=080103a97003, pmd=080156cba003, pte=00e8000115a3ff43 [ 1126.357360] Internal error: Oops: 960f [#1] PREEMPT SMP To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2001564/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp