[PATCH] BRCMNAND: Fix reporting of uncorrectable errors on subpages during page read

2021-12-20 Thread Joel Peshkin
Previously, a subpage with an uncorrectable error followed by a subpage with a correctable error would return an erroneous correctable status. Signed-off-by: Joel Peshkin Cc: Simon Glass --- drivers/mtd/nand/raw/brcmnand/brcmnand.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

Re: [PATCH v9] Add support for stack-protector

2021-04-09 Thread Joel Peshkin
Hi Heinrich, Has there been any progress in getting the EFI erors fixed so that this can be committed? There seems to be little point in my refreshing this patch until that is done. Thanks, -Joel On Mon, Mar 22, 2021 at 10:37 AM Heinrich Schuchardt wrote: > On 09.02.21 04:36, Joel Pesh

Re: Locking down U-Boot env with ENV_WRITEABLE_LIST

2021-04-06 Thread Joel Peshkin
I've been using bootstopkeysha256 and, if I want to make it completely impossible to enter, just setting it to an impossible value. To do this, I do have an additional patch to common/autoboot.c that calls the password mechanism one last time after a bootcmd fails and loops until reset if it isn'

Re: [PATCH v2 1/1] efi_loader: fix get_last_capsule()

2021-03-03 Thread Joel Peshkin
Hi Takahiro Akashi, The issue here is causing a failure in the EFI tests whenever the compiler is checking to make sure the code is not overrunning the stack. Fixing it is absolutely necessary. To see this problem, please apply https://patchwork.ozlabs.org/project/uboot/patch/20210209033607.70

[PATCH v9] Add support for stack-protector

2021-02-08 Thread Joel Peshkin
Add support for stack protector for UBOOT, SPL, and TPL as well as new pytest for stackprotector Signed-off-by: Joel Peshkin --- Cc: Simon Glass Cc: Heinrich Schuchardt Changes for v9: - Fix pytest script post-test reboot Changes for v8: - Fix commit message - Force canary to UL type

[PATCH v8] Add support for stack-protector

2021-01-14 Thread Joel Peshkin
Add support for stack protector for UBOOT, SPL, and TPL as well as new pytest for stackprotector Signed-off-by: Joel Peshkin --- Cc: Simon Glass Cc: Heinrich Schuchardt Changes for v8: - Fix commit message - Force canary to UL type Changes for v7: - Fix commit message - add

[PATCH v7] Add support for stack-protector

2021-01-14 Thread Joel Peshkin
Add support for stack protector for UBOOT, SPL, and TPL as well as new pytest for stackprotector Signed-off-by: Joel Peshkin Cc: Simon Glass Cc: Heinrich Schuchardt Changes for v7: - Fix commit message - add __builtin_extract_return_addr() calls Changes for v6: - Fix commit message

Re: [PATCH] Add fixdefconfig script to update lists of defconfig files from savedefconfig

2021-01-13 Thread Joel Peshkin
No worries. As long as there is a mechanism that will work OK. On Wed, Jan 13, 2021 at 12:16 PM Tom Rini wrote: > On Wed, Jan 13, 2021 at 09:10:41AM -0700, Simon Glass wrote: > > > Hi Joel, > > > > On Mon, 11 Jan 2021 at 20:01, Joel Peshkin > wrote: > >

[PATCH v6] Add support for stack-protector

2021-01-12 Thread Joel Peshkin
Cc: Simon Glass Cc: Heinrich Schuchardt Signed-off-by: Joel Peshkin Add support for stack protector for UBOOT, SPL, and TPL as well as new pytest for stackprotector Changes for v6: - Fix commit message Changes for v5: - Rebase Changes for v4: - Exclude EFI from stackprotector

[PATCH] Add fixdefconfig script to update lists of defconfig files from savedefconfig

2021-01-11 Thread Joel Peshkin
Cc: Simon Glass Cc: Heinrich Schuchardt --- scripts/fixdefconfig | 25 + 1 file changed, 25 insertions(+) create mode 100755 scripts/fixdefconfig diff --git a/scripts/fixdefconfig b/scripts/fixdefconfig new file mode 100755 index 000..7f36762 --- /dev/null +++ b/scr

[PATCH v5] Add support for stack-protector

2021-01-11 Thread Joel Peshkin
Cc: Joel Peshkin , Simon Glass , Bin Meng , Jagan Teki , Kever Yang , Heinrich Schuchardt , AKASHI Takahiro , Usama Arif , Sam Protsenko , Masahiro Yamada , Philippe Reynes , Eugeniu Rosca , Jan Kiszka

[PATCH v4] Add support for stack-protector

2021-01-11 Thread Joel Peshkin
Cc: Simon Glass Cc: Bin Meng Cc: Jagan Teki Cc: Kever Yang Cc: Heinrich Schuchardt Cc: AKASHI Takahiro Cc: Usama Arif Cc: Sam Protsenko Cc: Masahiro Yamada Cc: Philippe Reynes Cc: Eugeniu Rosca Cc: Jan Kiszka Signed-off-by: Joel Peshkin Changes for v4: - Exclude EFI from

[PATCH v3] Add support for stack-protector

2021-01-11 Thread Joel Peshkin
Cc: Simon Glass Cc: Bin Meng Cc: Jagan Teki Cc: Kever Yang Cc: Heinrich Schuchardt Cc: AKASHI Takahiro Cc: Usama Arif Cc: Sam Protsenko Cc: Masahiro Yamada Cc: Philippe Reynes Cc: Eugeniu Rosca Cc: Jan Kiszka Signed-off-by: Joel Peshkin Changes for v3: - Move test command to cmd

Re: [PATCH] Add support for stack-protector

2021-01-10 Thread Joel Peshkin
Hi Alex, Yeah, I think I'll wind up with some ifdef code for the static init. In the case of arm (32-bit), there is actually a GCC bug that causes it to use the address of the canary value instead of the canary value itself. GCC upstream just fixed that a few days ago, but it may be a year or

[PATCH v2] Add support for stack-protector

2021-01-10 Thread Joel Peshkin
Cc: Simon Glass Cc: Bin Meng Cc: Jagan Teki Cc: Kever Yang Cc: Heinrich Schuchardt Cc: AKASHI Takahiro Cc: Usama Arif Cc: Sam Protsenko Cc: Masahiro Yamada Cc: Philippe Reynes Cc: Eugeniu Rosca Cc: Jan Kiszka Signed-off-by: Joel Peshkin Changes for v2: - Add test command and

Re: [PATCH] Add support for stack-protector

2021-01-10 Thread Joel Peshkin
Hi Heinrich, Thank you for your comments. I have 2 questions about how to proceed 1) Unit test I can add a function that can be used to trigger an overrun, but I am not sure where to include it as the stack protector prints the error message and then resets uboot so it wouldn't fir in a

[PATCH] Add support for stack-protector

2021-01-10 Thread Joel Peshkin
Cc: Simon Glass Cc: Bin Meng Cc: Jagan Teki Cc: Kever Yang Cc: Heinrich Schuchardt Cc: AKASHI Takahiro Cc: Usama Arif Cc: Sam Protsenko Cc: Masahiro Yamada Cc: Philippe Reynes Cc: Eugeniu Rosca Cc: Jan Kiszka Signed-off-by: Joel Peshkin --- Makefile | 4 common

[PATCH v3] Add optional salt to AUTOBOOT_STOP_STR_SHA256

2020-11-21 Thread Joel Peshkin
Adds an optional SALT value to AUTOBOOT_STOP_STR_SHA256. If a string followed by a ":" is prepended to the sha256, the portion to the left of the colon will be used as a salt and the password will be appended to the salt before the sha256 is computed and compared. Signed-off-by: Jo

Re: [PATCH v2] Add optional salt to AUTOBOOT_STOP_STR_SHA256

2020-11-20 Thread Joel Peshkin
) and the actual password (as opposed to its sha256) is unlikely to be more than 15 characters. Regards, Joel On Fri, Nov 20, 2020 at 10:05 AM Joel Peshkin wrote: > From: Joel Peshkin > > Adds an optional SALT value to AUTOBOOT_STOP_STR_SHA256. If a string > followed by a &quo

[RFC] regarding Uboot AUTOBOOT_STOP_STR_SHA256

2020-11-20 Thread Joel Peshkin
10 characters long, then the user doesn't time out as long as they start typing within the 5 seconds and average one character per second. Would this be something that needs to be configurable in Kconfig or would it be OK to specify the added 1 second time in a #define ?? Thank You,

[PATCH v2] Add optional salt to AUTOBOOT_STOP_STR_SHA256

2020-11-20 Thread Joel Peshkin
From: Joel Peshkin Adds an optional SALT value to AUTOBOOT_STOP_STR_SHA256. If a string followed by a ":" is prepended to the sha256, the portion to the left of the colon will be used as a salt and the password will be appended to the salt before the sha256 is computed and compare

[PATCH] Add optional salt to AUTOBOOT_STOP_STR_SHA256

2020-11-19 Thread Joel Peshkin
From: Joel Peshkin Adds an optional SALT value to AUTOBOOT_STOP_STR_SHA256. If a string followed by a ":" is prepended to the sha256, the portion to the left of the colon will be used as a salt and the password will be appended to the salt before the sha256 is computed and compare

Re: [U-Boot] Buffer overrun risk in UBI SPL for secure boot

2019-09-09 Thread Joel Peshkin
ation except to caution people implementing secure boot environments to be aware of their surroundings. Regards, Joel Peshkin ___ U-Boot mailing list U-Boot@lists.denx.de https://lists.denx.de/listinfo/u-boot

Re: [U-Boot] Buffer overrun risk in UBI SPL for secure boot

2019-09-04 Thread Joel Peshkin
) before calling a new ubispl_load_volumes_bounded() function. Which do you prefer? Do I presume correctly that your denx.de email address implies that an approach you approve will be acceptable if correctly implemented? Thanks, Joel Peshkin On Wed, Sep 4, 2019 at 6:01 AM Heiko Schocher

[U-Boot] Buffer overrun risk in UBI SPL for secure boot

2019-09-03 Thread Joel Peshkin
It seems that, in the process of doing any sort of secure boot chain of trust, anything loading a UBI volume in preparation to authenticate it, will load a volume of unknown size into a buffer prior to checking the signature of that volume. Has anyone considered a solution for this? Should all im

[U-Boot] Announcement -- Upstreaming of U-Boot support for Broadcom router devices

2019-08-01 Thread Joel Peshkin
pe to contribute. Several team members at Broadcom will be making contributions in this effort. We are a bit light on U-Boot development experience, so feedback and advice will be appreciated. We will begin distinct threads on this list for specific related topics. -Joel Pe