Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3693990yba; Tue, 9 Apr 2019 02:48:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqwf6Eb/Gjv7kxxyQmmUbc/ZbsRoc2Q/bTf15qHXEGsNKE8IqdzmK4rI8AUxvKdLc+Kd1JqD X-Received: by 2002:a63:5c43:: with SMTP id n3mr31284197pgm.163.1554803316594; Tue, 09 Apr 2019 02:48:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554803316; cv=none; d=google.com; s=arc-20160816; b=SzbLrOpNk/acdvTFCcNbTW0V23M9nYkWlhOPB5i6pRfJvl499QZDOILlWJLSxJzME3 wnxzlsW32hok0Gv9PZISlymi6WVgnBDsYOHc7GGRK/mPCHiYoUVzHxHFptoHE9dE31Qg zFpU6eTv7ZMHbHyNuFdd4OlX3TJ/Z43G7AhJXdIXQESHvX/JkZ/zKV6XdMtAAR/LJcqw rD3Id07Xxf2EMzworlIe2oXR+d7a/ert+eHTqmi3o76xtVdDzGGFY80RT0muCQNhMGj4 hNjN/0JcbQ2p4U+cAyeMuIgitL20m3rmN7/Pv9SQ7WfO4N8MGPNemeeOVi0gXADdlZkI oKaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=Fsw1xJvC114sxuv+YRIA+K7spPcK21o1CaXKUTF2w7M=; b=Sutjca4/9XXHEul+GmgU74RhQCtJaqBq7qlZu0tb6rUarW2D8bXgeNrdKHuqbWVvl7 jNMCh4BigEvmXHyOxlTLMrvP6d/EaL31hPKXlP0Nh44Bo1KzjORWBRlRq9uASd2X1TnL 2pVgJ6Ol/2OKsiSzRAHAYpXoFwE32KIiXpVgecYG9Nm3W+e9d8VJJsd1wKX9V97DUA90 3G0bDLkCg2WaMQmVpu8v1qBuA30woS+Aal0fK/OMCz4QtvjTa2DK5dO7/fEygPDOcnJP Ceph8dgIo1xY948otFHtbYAwN9hdo1gczsxf1c7vL/pxrxP28mGw+8K/MsHlFXCtMawA yhJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v5si26901410pgr.121.2019.04.09.02.48.19; Tue, 09 Apr 2019 02:48:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726800AbfDIJrH (ORCPT + 99 others); Tue, 9 Apr 2019 05:47:07 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:49182 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726001AbfDIJrG (ORCPT ); Tue, 9 Apr 2019 05:47:06 -0400 Received: from localhost (unknown [IPv6:2a01:e0a:2c:6930:5cf4:84a1:2763:fe0d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: bbrezillon) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 1DDF22820C8; Tue, 9 Apr 2019 10:47:05 +0100 (BST) Date: Tue, 9 Apr 2019 11:47:01 +0200 From: Boris Brezillon To: masonccyang@mxic.com.tw Cc: bbrezillon@kernel.org, computersforpeace@gmail.com, dwmw2@infradead.org, juliensu@mxic.com.tw, linux-kernel@vger.kernel.org, linux-mtd@lists.infradead.org, marek.vasut@gmail.com, miquel.raynal@bootlin.com, richard@nod.at, zhengxunli@mxic.com.tw Subject: Re: [PATCH] mtd: rawnand: Add Macronix NAND read retry and randomizer support Message-ID: <20190409114701.744c2c8c@collabora.com> In-Reply-To: References: <1554780172-23111-1-git-send-email-masonccyang@mxic.com.tw> <20190409090427.22de9917@collabora.com> Organization: Collabora X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 9 Apr 2019 17:35:39 +0800 masonccyang@mxic.com.tw wrote: > > > + > > > +static const struct kobj_attribute sysfs_mxic_nand = > > > + __ATTR(nand_random, S_IRUGO | S_IWUSR, > > > + mxic_nand_rand_type_show, > > > + mxic_nand_rand_type_store); > > > > No, we don't want to expose that through a sysfs file, especially since > > changing the randomizer config means making the NAND unreadable for > > those that have used it before the change. > > > > Our on-die randomizer is still readable from user after the function > is enabled. You mean the memory is still readable no matter the randomizer state. Not sure how that's possible, but okay. > This randomizer is just like a internal memory cell > reliability enhanced. Why don't you enable it by default then? > It could be enable at any time with OTP bit function and that's why > we patch it by sys-fs. Sorry, but that's not a good reason to expose that through sysfs.