Re: [PATCH] mtd: spi-nor: mt25qu: Ignore 6th ID byte
From: Michael Walle
Date: Tue Nov 23 2021 - 03:14:24 EST
Hi,
Am 2021-11-23 08:45, schrieb Alexander Sverdlin:
On 22/11/2021 16:05, Michael Walle wrote:
Ignore 6th ID byte, secure version of mt25qu256a has 0x73 as 6th
byte.
You don't have the non-security part by chance?
Unfortunately no. And this is exactly the trigger for this patch:
one can get "secure" parts from Micron even though these "features" are
not
required.
Mh, I'm undecided whether we should just duplicate the entry or if we
should ignore the last byte ("Device configuration information", where
00h
is standard). The commit which introduced the flash was 7f412111e276b.
Vingesh?
Some people ask themselves why this table keeps growing if there is
SFDP...
I see the point in fixups, but maybe at some point we will be able to
support
some devices just out of the box?
Are these features detectable by SFDP? Without knowing anything, as you
ignored
my former question, I'd say no. So there will be two flashes, one with
these
features and one without, both presumably have the same SFDP. Thus we'd
need
these two entries anyway if we ever support these features. I get that
this
might be under NDA, but then talk to Micron; I for myself can't get a
complete
picture here.
Can you elaborate on the 0x73? Is that a bitmask? If it was an
enumeration,
I'd assumed it would be 01h (or some smaller value).
This "security addendum" where one need NDA just says "73h = Secure".
There is no explanation for it and no other variants.
Ok.
I'd really suggest to try to autodetect whatever features are going to
be
supported from this chip and only duplicate the entry if this
auto-detection
fails.
There is a bigger patch series [1] from Tudor which you can try. You'd
need to
respin your patch against that anyway.
-michael
[1]
https://lore.kernel.org/linux-mtd/20211122095020.393346-1-tudor.ambarus@xxxxxxxxxxxxx/