[Kernel-packages] [Bug 2028197] [NEW] rshim console truncates dmesg output due to tmfifo issue

2023-07-19 Thread Shih-Yi Chen
Public bug reported:

SRU Justification:

[Impact]

mlxbf_tmfifo driver does not always schedule work for VIRTIO CONSOLE
nottification. The result is with rshim console, the dmesg output would
be cut off or simply cat a big text file to stdout.

[Fix]

* Make sure TM_TX_LWM_IRQ bit is set when there is a notification of
virtio console event.

[Test Case]

* Compare the output of dmesg from rshim console and ssh session. Make sure 
both are the same.
* Issue is reproduced w/o fix and compare the same dmesg output from the same 
as above.

[Regression Potential]

The changes affect only virtio console event handling only and been
tested fully.

[Others]
This issue is the same on focal and Jammy.

** Affects: linux-bluefield (Ubuntu)
 Importance: Undecided
 Status: New

** Description changed:

  SRU Justification:
  
  [Impact]
  
  mlxbf_tmfifo driver does not always schedule work for VIRTIO CONSOLE
  nottification. The result is with rshim console, the dmesg output would
  be cut off or simply cat a big text file to stdout.
  
  [Fix]
  
  * Make sure TM_TX_LWM_IRQ bit is set when there is a notification of
  virtio console event.
  
  [Test Case]
  
  * Compare the output of dmesg from rshim console and ssh session. Make sure 
both are the same.
- * Issue is reproduced w/o fix and compare the same dmesg output from the same 
as above. 
+ * Issue is reproduced w/o fix and compare the same dmesg output from the same 
as above.
  
  [Regression Potential]
  
  The changes affect only virtio console event handling only and been
  tested fully.
+ 
+ [Others]
+ This issue is the same on focal and Jammy.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2028197

Title:
  rshim console truncates dmesg output due to tmfifo issue

Status in linux-bluefield package in Ubuntu:
  New

Bug description:
  SRU Justification:

  [Impact]

  mlxbf_tmfifo driver does not always schedule work for VIRTIO CONSOLE
  nottification. The result is with rshim console, the dmesg output
  would be cut off or simply cat a big text file to stdout.

  [Fix]

  * Make sure TM_TX_LWM_IRQ bit is set when there is a notification of
  virtio console event.

  [Test Case]

  * Compare the output of dmesg from rshim console and ssh session. Make sure 
both are the same.
  * Issue is reproduced w/o fix and compare the same dmesg output from the same 
as above.

  [Regression Potential]

  The changes affect only virtio console event handling only and been
  tested fully.

  [Others]
  This issue is the same on focal and Jammy.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2028197/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2015292] [NEW] Missing ACPI device info in mlxbf_pka module

2023-04-04 Thread Shih-Yi Chen
Public bug reported:

Config regarding BF ACPI devices and Window RAM is missing.

** Affects: linux-bluefield (Ubuntu)
 Importance: Undecided
 Assignee: Shih-Yi Chen (shihyic)
 Status: In Progress

** Changed in: linux-bluefield (Ubuntu)
 Assignee: (unassigned) => Shih-Yi Chen (shihyic)

** Changed in: linux-bluefield (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2015292

Title:
  Missing ACPI device info in mlxbf_pka module

Status in linux-bluefield package in Ubuntu:
  In Progress

Bug description:
  Config regarding BF ACPI devices and Window RAM is missing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2015292/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2012976] [NEW] OpenSSL 3.0.2 on Jammy failure on RSA speed test with async_jobs

2023-03-27 Thread Shih-Yi Chen
Public bug reported:

Issue opened with OpenSSL.

https://github.com/openssl/openssl/pull/20616

RSA verification failed when all loopargs[] share the same EVP_PKEY
rsa_key.

Tested and reproduced on openssl-3.0 branch

$ apps/openssl speed -engine pka -async_jobs 8 rsa2048
Engine "pka" set.
Doing 2048 bits private rsa's for 10s: 46554 2048 bits private RSA's in 3.70s
RSA verify setup failure. No RSA verify will be done.
20B0B281:error:028A:rsa 
routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
20B0B281:error:0272:rsa routines:rsa_ossl_public_decrypt:padding 
check failed:crypto/rsa/rsa_ossl.c:606:
20B0B281:error:1C880004:Provider routines:rsa_verify:RSA 
lib:providers/implementations/signature/rsa_sig.c:833:
version: 3.0.9-dev
built on: Mon Mar 27 13:48:54 2023 UTC
options: bn(64,64)
compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE 
-DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG
CPUINFO: OPENSSL_armcap=0xbd

Tested w/ changes

$ apps/openssl speed -engine pka -async_jobs 8 rsa2048

Engine "pka" set.
Doing 2048 bits private rsa's for 10s: 49465 2048 bits private RSA's in 3.96s
Doing 2048 bits public rsa's for 10s: 333008 2048 bits public RSA's in 7.61s
version: 3.0.9-dev
built on: Mon Mar 27 13:48:54 2023 UTC
options: bn(64,64)
compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE 
-DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG
CPUINFO: OPENSSL_armcap=0xbd
sign verify sign/s verify/s
rsa 2048 bits 0.80s 0.23s 12491.2 43759.3
version: 3.0.9-dev
built on: Mon Mar 27 13:48:54 2023 UTC
options: bn(64,64)
compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 -DOPENSSL_USE_NODELETE 
-DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG
CPUINFO: OPENSSL_armcap=0xbd

** Affects: linux-bluefield (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2012976

Title:
  OpenSSL 3.0.2 on Jammy failure on RSA speed test with async_jobs

Status in linux-bluefield package in Ubuntu:
  New

Bug description:
  Issue opened with OpenSSL.

  https://github.com/openssl/openssl/pull/20616

  RSA verification failed when all loopargs[] share the same EVP_PKEY
  rsa_key.

  Tested and reproduced on openssl-3.0 branch

  $ apps/openssl speed -engine pka -async_jobs 8 rsa2048
  Engine "pka" set.
  Doing 2048 bits private rsa's for 10s: 46554 2048 bits private RSA's in 3.70s
  RSA verify setup failure. No RSA verify will be done.
  20B0B281:error:028A:rsa 
routines:RSA_padding_check_PKCS1_type_1:invalid padding:crypto/rsa/rsa_pk1.c:75:
  20B0B281:error:0272:rsa routines:rsa_ossl_public_decrypt:padding 
check failed:crypto/rsa/rsa_ossl.c:606:
  20B0B281:error:1C880004:Provider routines:rsa_verify:RSA 
lib:providers/implementations/signature/rsa_sig.c:833:
  version: 3.0.9-dev
  built on: Mon Mar 27 13:48:54 2023 UTC
  options: bn(64,64)
  compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 
-DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG
  CPUINFO: OPENSSL_armcap=0xbd

  Tested w/ changes

  $ apps/openssl speed -engine pka -async_jobs 8 rsa2048

  Engine "pka" set.
  Doing 2048 bits private rsa's for 10s: 49465 2048 bits private RSA's in 3.96s
  Doing 2048 bits public rsa's for 10s: 333008 2048 bits public RSA's in 7.61s
  version: 3.0.9-dev
  built on: Mon Mar 27 13:48:54 2023 UTC
  options: bn(64,64)
  compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 
-DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG
  CPUINFO: OPENSSL_armcap=0xbd
  sign verify sign/s verify/s
  rsa 2048 bits 0.80s 0.23s 12491.2 43759.3
  version: 3.0.9-dev
  built on: Mon Mar 27 13:48:54 2023 UTC
  options: bn(64,64)
  compiler: gcc -fPIC -pthread -Wa,--noexecstack -Wall -O3 
-DOPENSSL_USE_NODELETE -DOPENSSL_PIC -DOPENSSL_BUILDING_OPENSSL -DNDEBUG
  CPUINFO: OPENSSL_armcap=0xbd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2012976/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2001564] Re: Kernel crash due to Bluefield pka TRNG ioctl call

2023-02-08 Thread Shih-Yi Chen
** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2001564

Title:
  Kernel crash due to Bluefield pka TRNG ioctl call

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Focal:
  Fix Committed
Status in linux-bluefield source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]
  Bluefield 3 on Ubuntu 22.04 and OpenSSL 3.0.2, encounters kernel crash/oops 
when HTTPS client uses OpenSSL with PKA engine during TLS handshake. The issue 
is with TRNG ioctl call. The kernel logs show the following errors.

  Unable to handle kernel access to user memory outside uaccess routines
  at virtual address ce65d328

  BF3 on Ubuntu 22.04, OpenSSl 3.0.2

  [Fix]
  * Change RNG ioctl kernel handler code to copy data from user to kernel space.

  [Test Case]
  openssl rand -engine pka 512

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2001564/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2001564] Re: Kernel crash due to Bluefield pka TRNG ioctl call

2023-01-03 Thread Shih-Yi Chen
** Description changed:

- Reproducible with TLS/HTTPS client initiates TLS handshake on BF3 with
- Ubuntu 22.04, OpenSSL 3.0.2.
+ SRU Justification
  
- wget https://google.com
+ [Impact]
+ Bluefield 3 on Ubuntu 22.04 and OpenSSL 3.0.2, encounters kernel crash/oops 
when HTTPS client uses OpenSSL with PKA engine during TLS handshake. The issue 
is with TRNG ioctl call. The kernel logs show the following errors.
  
- kernel will crash with the following logs.
+ Unable to handle kernel access to user memory outside uaccess routines
+ at virtual address ce65d328
  
- [ 1126.234077] Unable to handle kernel access to user memory outside uaccess 
routines at virtual address ce65d328
- [ 1126.255579] Mem abort info:
- [ 1126.261186]   ESR = 0x960f
- [ 1126.267319]   EC = 0x25: DABT (current EL), IL = 32 bits
- [ 1126.277968]   SET = 0, FnV = 0
- [ 1126.284081]   EA = 0, S1PTW = 0
- [ 1126.290367]   FSC = 0x0f: level 3 permission fault
- [ 1126.299964] Data abort info:
- [ 1126.305727]   ISV = 0, ISS = 0x000f
- [ 1126.313411]   CM = 0, WnR = 0
- [ 1126.319349] user pgtable: 4k pages, 48-bit VAs, pgdp=000154bf1000
- [ 1126.332259] [ce65d328] pgd=08011927a003, p4d=08011927a003, 
pud=080103a97003, pmd=080156cba003, pte=00e8000115a3ff43
- [ 1126.357360] Internal error: Oops: 960f [#1] PREEMPT SMP
+ BF3 on Ubuntu 22.04, OpenSSl 3.0.2
+ 
+ [Fix]
+ * Change RNG ioctl kernel handler code to copy data from user to kernel space.
+ 
+ [Test Case]
+ openssl rand -engine pka 512

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2001564

Title:
  Kernel crash due to Bluefield pka TRNG ioctl call

Status in linux-bluefield package in Ubuntu:
  New

Bug description:
  SRU Justification

  [Impact]
  Bluefield 3 on Ubuntu 22.04 and OpenSSL 3.0.2, encounters kernel crash/oops 
when HTTPS client uses OpenSSL with PKA engine during TLS handshake. The issue 
is with TRNG ioctl call. The kernel logs show the following errors.

  Unable to handle kernel access to user memory outside uaccess routines
  at virtual address ce65d328

  BF3 on Ubuntu 22.04, OpenSSl 3.0.2

  [Fix]
  * Change RNG ioctl kernel handler code to copy data from user to kernel space.

  [Test Case]
  openssl rand -engine pka 512

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2001564/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2001564] [NEW] Kernel crash due to Bluefield pka TRNG ioctl call

2023-01-03 Thread Shih-Yi Chen
Public bug reported:

Reproducible with TLS/HTTPS client initiates TLS handshake on BF3 with
Ubuntu 22.04, OpenSSL 3.0.2.

wget https://google.com

kernel will crash with the following logs.

[ 1126.234077] Unable to handle kernel access to user memory outside uaccess 
routines at virtual address ce65d328
[ 1126.255579] Mem abort info:
[ 1126.261186]   ESR = 0x960f
[ 1126.267319]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 1126.277968]   SET = 0, FnV = 0
[ 1126.284081]   EA = 0, S1PTW = 0
[ 1126.290367]   FSC = 0x0f: level 3 permission fault
[ 1126.299964] Data abort info:
[ 1126.305727]   ISV = 0, ISS = 0x000f
[ 1126.313411]   CM = 0, WnR = 0
[ 1126.319349] user pgtable: 4k pages, 48-bit VAs, pgdp=000154bf1000
[ 1126.332259] [ce65d328] pgd=08011927a003, p4d=08011927a003, 
pud=080103a97003, pmd=080156cba003, pte=00e8000115a3ff43
[ 1126.357360] Internal error: Oops: 960f [#1] PREEMPT SMP

** Affects: linux-bluefield (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/2001564

Title:
  Kernel crash due to Bluefield pka TRNG ioctl call

Status in linux-bluefield package in Ubuntu:
  New

Bug description:
  Reproducible with TLS/HTTPS client initiates TLS handshake on BF3 with
  Ubuntu 22.04, OpenSSL 3.0.2.

  wget https://google.com

  kernel will crash with the following logs.

  [ 1126.234077] Unable to handle kernel access to user memory outside uaccess 
routines at virtual address ce65d328
  [ 1126.255579] Mem abort info:
  [ 1126.261186]   ESR = 0x960f
  [ 1126.267319]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1126.277968]   SET = 0, FnV = 0
  [ 1126.284081]   EA = 0, S1PTW = 0
  [ 1126.290367]   FSC = 0x0f: level 3 permission fault
  [ 1126.299964] Data abort info:
  [ 1126.305727]   ISV = 0, ISS = 0x000f
  [ 1126.313411]   CM = 0, WnR = 0
  [ 1126.319349] user pgtable: 4k pages, 48-bit VAs, pgdp=000154bf1000
  [ 1126.332259] [ce65d328] pgd=08011927a003, p4d=08011927a003, 
pud=080103a97003, pmd=080156cba003, pte=00e8000115a3ff43
  [ 1126.357360] Internal error: Oops: 960f [#1] PREEMPT SMP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/2001564/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp