lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1413899608-3911-1-git-send-email-rogerq@ti.com>
Date:	Tue, 21 Oct 2014 16:53:26 +0300
From:	Roger Quadros <rogerq@...com>
To:	<computersforpeace@...il.com>, <dwmw2@...radead.org>
CC:	<akinobu.mita@...il.com>, <linux-mtd@...ts.infradead.org>,
	<linux-kernel@...r.kernel.org>, Roger Quadros <rogerq@...com>
Subject: [PATCH 0/2] mtd: oobtest: Add parameter to ignore bitflip errors within specified limit

Hi,

The oobtest case uses raw NAND read/writes to OOB area bypassing the error correction
mechanism and hence is bound to be affected by bitflip errors which are normal
in NAND memories. (e.g. we can never get DRA7-evm's NAND to fully pass
mtd_oobtest).

In these patches we add a module parameter "bitflip_limit" to specify how many
bitflips per page are tolerable. Not specifiing the parameter defaults to old
behaviour (i.e. zero bitflips tolerated).
Specifying bitflip_limit=1 makes us pass on DRA7-evm with 0 errors.

Introduce a new memcmpshow() function that shows the data byte where comparison failed.
This is useful for debugging. The same function is also used to calculate number of
bitflip errors over the data block.

cheers,
-roger

Roger Quadros (2):
  mtd: mtd_oobtest: Show the verification error location and data
  mtd: mtd_oobtest: add bitflip_limit parameter

 drivers/mtd/tests/oobtest.c | 77 +++++++++++++++++++++++++++++++++++++--------
 1 file changed, 64 insertions(+), 13 deletions(-)

-- 
1.8.3.2

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ