Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5639957yba; Thu, 11 Apr 2019 02:30:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqzozIbVctxqTsMWTQnUeTeCWISeTPaixL1w8ZdjFtJ5YLlSwfOdUym/T8jJU86iqXyJO7IK X-Received: by 2002:a63:3dc8:: with SMTP id k191mr45742899pga.286.1554975048543; Thu, 11 Apr 2019 02:30:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554975048; cv=none; d=google.com; s=arc-20160816; b=0opRUBIJdncJqgeotp+J9y+DxaN58c40G33hcDdNHrpA6+cVxAd2a3ItNNn3m2Di9B UAAMZ5fFV6oP+QELkY7/cjObeVLB+z2u2FBkmE5F+M/3UwHq5ZVtsIB8/6jdNF+BMneQ 31gpCWyaUBfgV3/CdZiFO3N3h1Q+lSlZUHWqkRuGkkF9jLtQ1wLqrI9VBFYh3YywFNRf 49WmS28HCuXGZY7bZpqfOA5ueKvak60AMnNZATzQbDVCnCkkNeRsGPOGQhir7Sb0nQxc 1bJ0DRHepgWkm24sZAylnGNwfWQgaaPYwJAaUfVRZFr01nQKWoU0twpDRhv2b+63EODH 262g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=sXEjd5HT806JiLtJrI2oSS5n01GahZjFc2eA/ygLnN8=; b=Twkc5PVVkiVIWCJU3UbjM8QWc4NWsR0Q+NGtFm2I3qhunE04YY9POM7lea9aDWMQMM BEYDFeTFd1ajIjMF/f+pzCGSc1SRrUiH5ZB7OZ74Wtr4tgIbEpa9RLL1oQtqOfx02pyf XEOcJI7Dff3Zs0UrXuU8WUGzs1w3dDMpTZ0i7UG2/lVo+xOzd8SFpFwGamHo4lVGs+iX XQCiZDdL5X7q3+nnc996vgGKpE8gMdewwWBAUuvgBxe3n+1ScVBvPx6bN4uARpyUDXnb SfrGT4XZlQ7H2Hw5eGYBT7EB7T8cQo9vAiWEKSfiNeQwmbBd4K4vlyoZbJVuoEiLmyy+ E1Ng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r80si35175872pfa.128.2019.04.11.02.30.32; Thu, 11 Apr 2019 02:30:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726902AbfDKJ3t (ORCPT + 99 others); Thu, 11 Apr 2019 05:29:49 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:57830 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726106AbfDKJ3s (ORCPT ); Thu, 11 Apr 2019 05:29:48 -0400 Received: from localhost (unknown [IPv6:2a01:e0a:2c:6930:5cf4:84a1:2763:fe0d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: bbrezillon) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 7A106260764; Thu, 11 Apr 2019 10:29:46 +0100 (BST) Date: Thu, 11 Apr 2019 11:29:43 +0200 From: Boris Brezillon To: masonccyang@mxic.com.tw Cc: bbrezillon@kernel.org, computersforpeace@gmail.com, dwmw2@infradead.org, juliensu@mxic.com.tw, linux-kernel@vger.kernel.org, linux-mtd@lists.infradead.org, marek.vasut@gmail.com, miquel.raynal@bootlin.com, richard@nod.at, zhengxunli@mxic.com.tw Subject: Re: [PATCH] mtd: rawnand: Add Macronix NAND read retry and randomizer support Message-ID: <20190411112943.1fecfa69@collabora.com> In-Reply-To: References: <1554780172-23111-1-git-send-email-masonccyang@mxic.com.tw> <20190409090427.22de9917@collabora.com> <20190409114701.744c2c8c@collabora.com> <20190410092258.332ef399@collabora.com> <20190411085353.4c1af008@collabora.com> Organization: Collabora X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 11 Apr 2019 17:24:09 +0800 masonccyang@mxic.com.tw wrote: > Hi Boris, > > > > > > > > Subject > > > > > > > > > > > > Re: [PATCH] mtd: rawnand: Add Macronix NAND read retry and > > > randomizer > > > > > support > > > > > > > > > > > > On Tue, 9 Apr 2019 17:35:39 +0800 > > > > > > masonccyang@mxic.com.tw wrote: > > > > > > > > > > > > > > > + > > > > > > > > > +static const struct kobj_attribute sysfs_mxic_nand = > > > > > > > > > + __ATTR(nand_random, S_IRUGO | S_IWUSR, > > > > > > > > > + mxic_nand_rand_type_show, > > > > > > > > > + mxic_nand_rand_type_store); > > > > > > > > > > > > > > > > No, we don't want to expose that through a sysfs file, > > > especially > > > > > since > > > > > > > > changing the randomizer config means making the NAND > unreadable > > > for > > > > > > > > those that have used it before the change. > > > > > > > > > > > > > > > > > > > > > > Our on-die randomizer is still readable from user after the > > > function > > > > > > > is enabled. > > > > > > > > > > > > You mean the memory is still readable no matter the randomizer > > > state. > > > > > > Not sure how that's possible, but okay. > > > > > > > > > > > > > This randomizer is just like a internal memory cell > > > > > > > reliability enhanced. > > > > > > > > > > > > Why don't you enable it by default then? > > > > > > > > > > The penalty of randomizer is read/write performance down. > > > > > i.e,. tPROG 300 us to 340 us (randomizer enable) > > > > > therefore, disable it by default. > > > > > > > > I'm a bit puzzled. On the NAND I've seen that required data > > > > randomization it's not something you'd want to disable as this > implied > > > > poor data retention. What's the use case here? Are we talking about > SLC > > > > or MLC NANDs? Should we enable this feature once we start seeing > that > > > > the NAND starts being less reliable (basically when read-retry > happens > > > > more often)? I really think this is something you should decide > kernel > > > > side, because users have no clue when it's appropriate to switch > this > > > > feature on/off. > > > > > > > > > > It's SLC NAND and seems to has nothing to do with read-retry happens. > > > later, I will get more information for your concerns. > > > > Well, this feature is optional, and can be enabled to improve > > reliability. Sounds like a good reason to enable it when your NAND > > device starts showing reliability issues, and the number of read_retry > > attempts reflects the wear level pretty well. Alternatively, you could > > use the number of bitflips, but, in any case, don't expect the user to > > take this decision, because almost nobody knows what the randomizer > > is needed for. > > > > > > > > > > > > > > > > > > > > > > > It could be enable at any time with OTP bit function and > that's > > > why > > > > > > > we patch it by sys-fs. > > > > > > > > > > > > Sorry, but that's not a good reason to expose that through > sysfs. > > > > > > > > > > Any good way to expose randomizer function for user ? > > > > > > > > Don't expose it :P. > > > > > > oh, okay, I will remove sys-fs randomizer. > > > > > > Is it OK to keep set/get features for randomizer ? > > > > I don't think it's a good idea to have dead code, so no. But I'm pretty > > sure we'll find a way to use/expose this feature. > > okay, great! > Looking forward to hearing this feature use/expose. But for that to happen we are waiting for inputs about when this is supposed to be used...