From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from phobos.denx.de (phobos.denx.de [85.214.62.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 4C7ECC433EF for ; Fri, 15 Jul 2022 14:01:12 +0000 (UTC) Received: from h2850616.stratoserver.net (localhost [IPv6:::1]) by phobos.denx.de (Postfix) with ESMTP id B339380C75; Fri, 15 Jul 2022 16:01:09 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de Authentication-Results: phobos.denx.de; dkim=pass (1024-bit key; unprotected) header.d=nxp.com header.i=@nxp.com header.b="Z2u1DR0w"; dkim-atps=neutral Received: by phobos.denx.de (Postfix, from userid 109) id 7FD5C810EA; Fri, 15 Jul 2022 16:01:08 +0200 (CEST) Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2089.outbound.protection.outlook.com [40.107.22.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by phobos.denx.de (Postfix) with ESMTPS id 163FD80909 for ; Fri, 15 Jul 2022 16:01:04 +0200 (CEST) Authentication-Results: phobos.denx.de; dmarc=pass (p=none dis=none) header.from=nxp.com Authentication-Results: phobos.denx.de; spf=pass smtp.mailfrom=gaurav.jain@nxp.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ebEntjQlSWQOtznUZ17HOM2LjKps7mSpS785basUzru/9/d54zz4uvqvm2MdCq9OeqjIJnA/rkdZYMN0BTNw0FVYlkcafvBimn7/UWXV1FRB+XltVvLPF0IY9i1Vhpm6Pf9+ndIjEkswG9H+UWevqXhV/cEHLBFwEkmfc9nH3M3S6LwL0g9KZHrNrEeyGu1A3874KwTiJLYsIhPvQuzz1gcO1XEAozOZu7hjKjz2YaQcG9GsD8YUMEh0skEqC8/ttHGz0y9PcAE3TNxgE8UxIFRG0kYm8BTTJ14ZiDs6tnqCrjYsSibRwFQ7tv0BUdBv6cImcpazTO3CtXbLu+TZ/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cJkgbPfouZUH9fj/C6pgQiBqOJxnmVVXKeerEBd6HRk=; b=I0BRzZY9kqqjUyQAVPwF5zWJW/LUZ86N4qk4TGss9MhQecUUvVgWYRcsz5CApfdF0EXvQom1CeeEKP+wyR2om6Zvet2p6cUhYNfCBichVFkM6YM4PwI4MLW74hOrLhtYngZVLzvUEIPTmusTdLtKWFV9NTui53HLKfo+uIlBAj5BLvf/rBgYk+6H6bT+kUl7AxwFenl+iqhm8lEFUvSWiscNHZ/vOwlUInkmWIc/xk1HCeIWgGmtB3Q+mDFScp8sne7CcLiElTgYJEa/w8Oi6BJUSbYFurT/LEegp9CUHqztZFhNR3Ex9OYI7xu+ad2RhVMjvJ3Fqg8YUv9euxXwNA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nxp.com; dmarc=pass action=none header.from=nxp.com; dkim=pass header.d=nxp.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nxp.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cJkgbPfouZUH9fj/C6pgQiBqOJxnmVVXKeerEBd6HRk=; b=Z2u1DR0wippDzLPuqB5o/tHg4PXAV3BniwtAF3XIzUpXrj8ZKQ8RLk6gd1Iy3jGu5y/QnDOGZytvzgYviGv0+kBNwJ3gpQfcQx8NiikM5Qdo9wF8D8MFyNe3LM8OX8tdIjK1CHVX+U71YmLuTVRADIlfc1ZYqRw6H8hmQ217MJA= Received: from VI1PR04MB5342.eurprd04.prod.outlook.com (2603:10a6:803:46::16) by DU2PR04MB8631.eurprd04.prod.outlook.com (2603:10a6:10:2de::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5438.14; Fri, 15 Jul 2022 14:01:02 +0000 Received: from VI1PR04MB5342.eurprd04.prod.outlook.com ([fe80::7478:5e4e:81cb:af90]) by VI1PR04MB5342.eurprd04.prod.outlook.com ([fe80::7478:5e4e:81cb:af90%6]) with mapi id 15.20.5438.015; Fri, 15 Jul 2022 14:01:02 +0000 From: Gaurav Jain To: ZHIZHIKIN Andrey CC: "u-boot@lists.denx.de" , "festevam@denx.de" , "sbabic@denx.de" , Michael Walle , Tommaso Merciai , Michael Trimarchi , Marek Vasut , Simon Glass , Patrick Delaunay , Stefan Roese , Horia Geanta , Pankaj Gupta , Varun Sethi , Ye Li , dl-uboot-imx Subject: RE: [EXT] [REGRESSION]: v2022.07: SHA256 hash is broken on imx8m series with CAAM enabled Thread-Topic: [EXT] [REGRESSION]: v2022.07: SHA256 hash is broken on imx8m series with CAAM enabled Thread-Index: AdiYRL2Y4fgFZGuAS++10Rw4CfZbwgABUsEgAAFfPtAAALSZQA== Date: Fri, 15 Jul 2022 14:01:02 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nxp.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: a1994f33-2143-43ea-5ef2-08da666a740b x-ms-traffictypediagnostic: DU2PR04MB8631:EE_ x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR04MB5342.eurprd04.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(39860400002)(366004)(136003)(396003)(376002)(346002)(44832011)(9686003)(38100700002)(45080400002)(38070700005)(5660300002)(52536014)(54906003)(186003)(316002)(8936002)(6862004)(66446008)(66556008)(122000001)(4326008)(64756008)(7416002)(83380400001)(76116006)(66946007)(33656002)(66476007)(478600001)(86362001)(71200400001)(53546011)(26005)(55236004)(8676002)(6506007)(7696005)(2906002)(55016003)(966005)(41300700001)(32563001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?pQZNl04Z7phMNGdUbMRT8e28FXA40xj+BYusNKkf0VqV/SG5ahYQk22X+qEL?= =?us-ascii?Q?9Irbf0rEfAEk53cHzx9NAjY94NPvYG7PAz/pO0Ylt1rZU+PSNzS2ozyvQT5X?= =?us-ascii?Q?/aRM6GzmpCGa2HcnhMm3C9AA8wTNe1XfeoApVq0I0mQRl7lGHd4PX5o4K8PF?= =?us-ascii?Q?V07YbT86pPqfNvzROHoX/RKJyCM6pDTzK9gb/v6nBSV/Xp0rWueT0frzjXej?= =?us-ascii?Q?UJMLF3OrwDp8p9u07YlOQLBL+E9vl9NaZfxUYj5XXW2VvwF+0pjBOAVuo/tv?= =?us-ascii?Q?I8f3h9ShHQyokgt8JQIkWTG4mcBN1zU9PsVkZsXMFCzUang+UZzzvqTn1x4H?= =?us-ascii?Q?UdWqoi3SvNqFcMfZXzLrErAVbX25is5oHnnC9Rrp4F7y01muHitZMT5RghfI?= =?us-ascii?Q?rmKUd0TWSKx/6VyXecS9/R3t3dQlmJNHTfLvexJQFt2XYDK8hlzet6Yodrwy?= =?us-ascii?Q?SihjrRftdkvN36mFNPK5+2lJxeRNFB8ER836vkpHIVK40osQiyq9KEMyi5Nc?= =?us-ascii?Q?naQwIXbddhfm9Wq1oOZdrMlzoXHatzusybpK0/qgS7vt1UYrs8leKDHfeujw?= =?us-ascii?Q?B1Ye3sAoR0wPbj6p/Wyujki2aQK6akg7sJ8FUteI0nlVtacmKaaPOZ+kV+NP?= =?us-ascii?Q?asRKNG7qCkUstZ7OMYdqu93hl1WeNJcOW+diDrlmXuCS1FgKFVrcZNTJUi8s?= =?us-ascii?Q?+6Gf+FeJ+/MBxQiaTbUhLksOcxHpTLHVpyw2xT3TIsLSXWYrzeLIORPjEh24?= =?us-ascii?Q?EOgCAwtYfndsEzD2fDjei2I4Yj4MEcaM0CqrlVmCokTt/eVdyQFVUs5oYkY7?= =?us-ascii?Q?Nfa6w6DJKPOnffNA+tHKuq09egHvX/+vHFbH5JvjnryYt0WzTYH68fj78ZID?= =?us-ascii?Q?wCb9xHhoMpP6kr85mbfriaz6eMda5DrInCM+LANhZSf1Q51t8ISyUJPr4Jml?= =?us-ascii?Q?KxcIWwxT32J6MP/n9tSG0lsCIJAQ3hl3b29575s8DOlP9cwyWr88IOFh5i1b?= =?us-ascii?Q?o5jGJOBz92tzuHcpK0ogrLQRkNVbwxJyogtm9pmj235s7TmbJ89lBdyeiYN5?= =?us-ascii?Q?hyA3D1qhbQDSItJDElSdFY6qr1Jp7h7bOU7GhKEp0BkWcruDuDQWC/H4/ZKS?= =?us-ascii?Q?iER1UsnV7k9hqXHpxn6v+ZP9r7Ht1KD5e9b9SjjymfOsC6znnyNqbXaMI8k9?= =?us-ascii?Q?KRiNEcfasMI8rGB7fX2TH+MYs6tf9dzJVJ+bNIlGASeuFOfM9UIzsNU3szKD?= =?us-ascii?Q?+h3XzyzGtzqccebgWrFQpJOhbQ5utiCANjbVTVwAVXXYcrkzPC721WFu2ZZX?= =?us-ascii?Q?0HqUxmblzXXv2yr+Xkeq3X30tr1QwCNjqPo7HAJv08YNyPOQ7CZ8XF6er9q5?= =?us-ascii?Q?DHDhFx51Mo5xr+6JEWca2YUtGH7ewL/nmdesBe18sVww7F7PQQEyg9vnCJJ4?= =?us-ascii?Q?zDgvRB/dmA4cH4h6Vw6301Ko2phKql3dRvfFg2Kb5s9oFNPLG9mQB/0NX9JE?= =?us-ascii?Q?tAuDx5CA+jbQfvCyAgZeKeE3J3LG78HLd919/Fs/V1U0m3iez/gR6ahEFVpW?= =?us-ascii?Q?YCLQ1io2kCIs16hpPeVGfwCPFoiyBj2JYp9rJado?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: VI1PR04MB5342.eurprd04.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a1994f33-2143-43ea-5ef2-08da666a740b X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Jul 2022 14:01:02.5190 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: zwRj/6WwK1PlKbZb4jR/Cm4d4BF7WOQ2qrYX7VCjicXDCjUX3nXOdkluTRhSZZXpkHanJ8bZXKESkc2GVQwj2Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR04MB8631 X-BeenThere: u-boot@lists.denx.de X-Mailman-Version: 2.1.39 Precedence: list List-Id: U-Boot discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: u-boot-bounces@lists.denx.de Sender: "U-Boot" X-Virus-Scanned: clamav-milter 0.103.6 at phobos.denx.de X-Virus-Status: Clean Hello Andrey Right now I am not sure what could cause the issue. As per our previous discussions, JR0 can not be used in uboot, so you need = to mark it as disabled until kernel device tree is not sync. To debug more, can you run hash command with HASH_VERIFY. Regards Gaurav Jain > -----Original Message----- > From: ZHIZHIKIN Andrey > Sent: Friday, July 15, 2022 7:04 PM > To: Gaurav Jain > Cc: u-boot@lists.denx.de; festevam@denx.de; sbabic@denx.de; Michael > Walle ; Tommaso Merciai > ; Michael Trimarchi > ; Marek Vasut ; Simon > Glass ; Patrick Delaunay > ; Stefan Roese ; Horia Geanta > ; Pankaj Gupta ; Varun > Sethi ; Ye Li ; dl-uboot-imx imx@nxp.com> > Subject: RE: [EXT] [REGRESSION]: v2022.07: SHA256 hash is broken on imx8m > series with CAAM enabled >=20 > Caution: EXT Email >=20 > Hello Gaurav, >=20 > > -----Original Message----- > > From: U-Boot On Behalf Of Gaurav Jain > > Sent: Friday, July 15, 2022 2:56 PM > > To: ZHIZHIKIN Andrey > > Cc: u-boot@lists.denx.de; festevam@denx.de; sbabic@denx.de; Michael > > Walle ; Tommaso Merciai > > ; > > Michael Trimarchi ; Marek Vasut > > ; Simon Glass ; Patrick Delaunay > > ; Stefan Roese ; Horia > > Geanta ; Pankaj Gupta ; > > Varun Sethi ; Ye Li ; dl- uboot-imx > > > > Subject: RE: [EXT] [REGRESSION]: v2022.07: SHA256 hash is broken on > > imx8m series with CAAM enabled > > > > Hello Andrey > > > > There is a patch in review related caam hash. > > Please check if it fixes your problem. > > https://eur01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fpatc= h > > > work.ozlabs.org%2Fproject%2Fuboot%2Fpatch%2F20220616101009.809953- > 1-&a > > > mp;data=3D05%7C01%7Cgaurav.jain%40nxp.com%7C4e78116cfe2b4487fdc208 > da6666 > > > aa79%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C637934888408 > 633266%7 > > > CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB > TiI6Ik1 > > > haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3DDwe%2FOgeLeH > mWD7tKcmmJbV > > %2F0D5cOZvH3kpCx%2FO%2FvMRg%3D&reserved=3D0 > > gaurav.jain@nxp.com/ >=20 > No, unfortunately this patch did not solve the issue, behavior is still t= he same. >=20 > > > > Regards > > Gaurav Jain > > > > > -----Original Message----- > > > From: ZHIZHIKIN Andrey > > > Sent: Friday, July 15, 2022 6:11 PM > > > To: Gaurav Jain > > > Cc: u-boot@lists.denx.de; festevam@denx.de; sbabic@denx.de; Michael > > > Walle ; Tommaso Merciai > > > ; Michael Trimarchi > > > ; Marek Vasut ; > Simon > > > Glass ; Patrick Delaunay > > > ; Stefan Roese ; Horia > > > Geanta ; Pankaj Gupta > ; > > > Varun Sethi ; Ye Li ; dl-uboot-imx > > > > > > Subject: [EXT] [REGRESSION]: v2022.07: SHA256 hash is broken on > > > imx8m series with CAAM enabled > > > > > > Caution: EXT Email > > > > > > Hello Gaurav, > > > > > > In the new v2022.07, I've stumbled upon the issue with calculating > > > the > > > SHA256 of memory blocks with CAAM hashing. This causes the FIT image > > > not to pass the hash validation, and also `sha256` command not operab= le. > > > > > > I'm also wondering if any i.MX8M-based board maintainers have seen > > > the same issues at their end? > > > > > > I've made a small test executing the following command sequence > > > (with corresponding serial output): > > > > > > U-Boot 2022.07 (Jul 15 2022 - 14:36:00 +0200) > > > > > > CPU: Freescale i.MX8MMQ rev1.0 at 1200 MHz > > > Reset cause: POR > > > Model: FSL i.MX8MM EVK board > > > DRAM: 2 GiB > > > Core: 153 devices, 19 uclasses, devicetree: separate > > > WDT: Started watchdog@30280000 with servicing (60s timeout) > > > MMC: FSL_SDHC: 1, FSL_SDHC: 2 > > > Loading Environment from MMC... *** Warning - bad CRC, using default > > > environment > > > > > > In: serial@30890000 > > > Out: serial@30890000 > > > Err: serial@30890000 > > > SEC0: RNG instantiated > > > Net: eth0: ethernet@30be0000 > > > Hit any key to stop autoboot: 0 > > > u-boot=3D> mw.b ${kernel_addr_r} DE 100 u-boot=3D> md.b ${kernel_addr= _r} > > > 100 > > > 40480000: dededede dededede dededede dededede ................ > > > 40480010: dededede dededede dededede dededede ................ > > > 40480020: dededede dededede dededede dededede ................ > > > 40480030: dededede dededede dededede dededede ................ > > > 40480040: dededede dededede dededede dededede ................ > > > 40480050: dededede dededede dededede dededede ................ > > > 40480060: dededede dededede dededede dededede ................ > > > 40480070: dededede dededede dededede dededede ................ > > > 40480080: dededede dededede dededede dededede ................ > > > 40480090: dededede dededede dededede dededede ................ > > > 404800a0: dededede dededede dededede dededede ................ > > > 404800b0: dededede dededede dededede dededede ................ > > > 404800c0: dededede dededede dededede dededede ................ > > > 404800d0: dededede dededede dededede dededede ................ > > > 404800e0: dededede dededede dededede dededede ................ > > > 404800f0: dededede dededede dededede dededede ................ > > > > > > u-boot=3D> hash sha256 ${kernel_addr_r} 100 CAAM was not setup > > > properly or it is faulty > > > sha256 for 40480000 ... 404800ff =3D=3D> > > > > 736372697074616464727d0a626f6f745f6566695f62696e6172793d6c6f6164 > > > > > > Running `sha256` commands several times in a row also produces > > > different Results, sometimes it comes out as all 0's. > > > > > > For comparison purposes, I've did similar on the desktop: > > > $ while true ; do printf "\xDE"; done | dd of=3D./test_data bs=3D1 > > > count=3D256 > > > 256+0 records in > > > 256+0 records out > > > 256 bytes copied, 0.000484 s, 529 kB/s > > > > > > $ hexdump -C -v ./test_data > > > 00000000 de de de de de de de de de de de de de de de de > > > |................| > > > 00000010 de de de de de de de de de de de de de de de de > > > |................| > > > 00000020 de de de de de de de de de de de de de de de de > > > |................| > > > 00000030 de de de de de de de de de de de de de de de de > > > |................| > > > 00000040 de de de de de de de de de de de de de de de de > > > |................| > > > 00000050 de de de de de de de de de de de de de de de de > > > |................| > > > 00000060 de de de de de de de de de de de de de de de de > > > |................| > > > 00000070 de de de de de de de de de de de de de de de de > > > |................| > > > 00000080 de de de de de de de de de de de de de de de de > > > |................| > > > 00000090 de de de de de de de de de de de de de de de de > > > |................| > > > 000000a0 de de de de de de de de de de de de de de de de > > > |................| > > > 000000b0 de de de de de de de de de de de de de de de de > > > |................| > > > 000000c0 de de de de de de de de de de de de de de de de > > > |................| > > > 000000d0 de de de de de de de de de de de de de de de de > > > |................| > > > 000000e0 de de de de de de de de de de de de de de de de > > > |................| > > > 000000f0 de de de de de de de de de de de de de de de de > > > |................| > > > 00000100 > > > > > > $ sha256sum ./test_data > > > > 8b11bcdc65d5f1af0fa1edfa7b5db089dba40d4e8d29b455295d58ab2b314e76 > > > ./test_data > > > > > > As one can see, the SHA256 has a totally different value, with > > > desktop produces a rather correct one. > > > > > > Since the CAAM is enabled per default for all i.MX8M derivatives, > > > there is no way to target SHA hash calculations back to SW > > > implementation, therefore it blocks a lot of people to boot FIT image= s > that has `hash` nodes in them. > > > > > > Looking a bit deeper into why it fails, I saw that the JR used for > > > hash calculations is hard-coded to `0` in run_descriptor_jr() call, > > > which is now reserved in S-World for HAB operations. But changing it > > > to `1` did not change the behavior, the SHA256 is still not calculate= d > proper. > > > > > > Can you please advise how this can be solved? > > > > > > And more conceptually: why is SHA hashing now hardwired to HW CAAM > > > module, while it was perfectly executed in SW via `lib/sha.c`? > > > > > > Thanks a lot! > > > > > > Regards, > > > Andrey >=20 > -- andrey