Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2858974ybx; Sun, 3 Nov 2019 05:28:40 -0800 (PST) X-Google-Smtp-Source: APXvYqxDBSx9dz1Io5ZZ9YGCjxo455o6Ot7VMD+T8za/6Ih+EiKFkYxwccRFD9FP65F7j2rKs49X X-Received: by 2002:a50:9b43:: with SMTP id a3mr23774442edj.73.1572787719980; Sun, 03 Nov 2019 05:28:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572787719; cv=none; d=google.com; s=arc-20160816; b=qNR1rfr3KJM1e6cWOHV1RkpifIt47MQamrmtHDf/N2WZd14vy6LPao3XuFCBXTuGLe heSjD4tittHFlH9NqsRmPqnNH2R6pRZ5rg6pwzK9I01azsUVfgglsMk7tBhnf7kuzClw BEWNNpx9kVKVJBE7jIipCUcDblyLKVFZL8COA81D64m4yB7CI3IIHqPi0fW9VP7kX3oc IbzeEQDo1xipbs5X5T0zg6sEnytiQRAqsm7aVKSXpNhjcwtRWabSeNopsrcqJGGGpveN zzHv1kmffi+6vFXO+yKxnEAasG+ldKnKzsWHBnzIuad3GW3u1KusNkLOWXPw5u+KvwNc rEvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=BY5QsWnMXQvXdX7OvO9HZhdCNrGhyinAQ/dH+b6zZmk=; b=TLWE5Pq3U+AUVwxkjT2L1oAfcDTIOHHoeGCHBGoyFeL4UY1hh0Ufi3/z+h1edSBlnD JgckAleOEoC+sbAJjLHiRmzlUcaDFCGeCx8Qz9JNRGEjW/vV2FoYJr3AT0IoeFWR8S95 0sLl/srOLSz8GKKaf4rdduOWisNDI44F/inqAb5Z0hmAnRwycyUdo6dX3qN38FI9j5Kr UefoPMC/QrqvFr1qdEZ/wns85A4TB7/V/2OiaHeOYdspOWkoaWHsNuLxsdcEDwI0qQ70 CdgMcWLuXBTA8F3UvHdqz+tgJrzSp4baoJK6oajGp1KV1UmB1ewOkzJbUadxCRsn/DIC d+pg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q6si4559952edr.194.2019.11.03.05.28.16; Sun, 03 Nov 2019 05:28:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727613AbfKCN1t (ORCPT + 99 others); Sun, 3 Nov 2019 08:27:49 -0500 Received: from bhuna.collabora.co.uk ([46.235.227.227]:52296 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727425AbfKCN1s (ORCPT ); Sun, 3 Nov 2019 08:27:48 -0500 Received: from localhost (unknown [IPv6:2a01:e0a:2c:6930:b93f:9fae:b276:a89a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: bbrezillon) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 9D80A28A619; Sun, 3 Nov 2019 13:27:46 +0000 (GMT) Date: Sun, 3 Nov 2019 14:27:41 +0100 From: Boris Brezillon To: Chuanhong Guo Cc: Miquel Raynal , linux-mtd@lists.infradead.org, Jeff Kletsky , Richard Weinberger , David Woodhouse , Brian Norris , Vignesh Raghavendra , Frieder Schrempf , Boris Brezillon , Stefan Roese , open list Subject: Re: [PATCH][RFC] mtd: spinand: fix detection of GD5FxGQ4xA flash Message-ID: <20191103142741.7b2a2bf0@collabora.com> In-Reply-To: References: <20191016013845.23508-1-gch981213@gmail.com> <20191028174131.65c3d580@xps13> Organization: Collabora X-Mailer: Claws Mail 3.17.4 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 3 Nov 2019 20:03:21 +0800 Chuanhong Guo wrote: > Hi! > > On Tue, Oct 29, 2019 at 12:41 AM Miquel Raynal > wrote: > > > > Hello, > > > > Chuanhong Guo wrote on Wed, 16 Oct 2019 09:38:24 > > +0800: > > > > > GD5FxGQ4xA didn't follow the SPI spec to keep MISO low while slave is > > > reading, and instead MISO is kept high. As a result, the first byte > > > of id becomes 0xFF. > > > Since the first byte isn't supposed to be checked at all, this patch > > > just removed that check. > > > > > > While at it, redo the comment above to better explain what's happening. > > > > > > Fixes: cfd93d7c908e ("mtd: spinand: Add support for GigaDevice GD5F1GQ4UFxxG") > > > Signed-off-by: Chuanhong Guo > > > CC: Jeff Kletsky > > > --- > > > RFC: > > > I doubt whether this patch is a proper fix for the underlying problem: > > > The actual problem is that we have two different implementation of read id > > > command: One replies immediately after master sending 0x9f and the other > > > need to send 0x9f and an offset byte (found in winbond and early GD flashes.) > > Correction: Only early GigaDevice nand chips uses this implementation. > Winbond chips uses a dummy byte instead of an address byte so there's > no problem for Winbond chips. > > > > Current code only works if SPI master is properly implemented (i.e. keep MOSI > > > low while reading.) > > > > I am not entirely against the fix, but this is a SPI host controller > > issue, right? Can you try to fix the controller driver instead? > > I think this is a spi nand framework issue. GigaDevice uses an unusual > READ ID implementation, and as a result, both host controller and chip > are reading during the first byte after 0x9f command: chip is reading > the address/offset byte and host is expecting the first ID byte. > Here lies two problems: > 1. According to the sequence diagram in their datasheet, MISO pin is > in High-Z state during the 0x9f command and the offset byte, and host > could read anything during this time instead of a fixed 0x0 or 0xff > byte, so the check of first byte should be removed. This is what this > patch is doing. > 2. If there's a buggy SPI host controller that didn't keep MOSI low > during reading operation, the chip will get 0xff as ID offset, causing > the read vendor/device ID to be swapped. I never met such a controller > so far, but if there is one, it will be a silicon bug that can't be > fixed by software. To fix this one, we'll have to make a second > read-id implementation in spi nand framework. I realize how fragile this ID-based detection is when manufacturers decide to not follow the standard READID semantic (one 0x9f command byte followed by 1 or more input cycles encoding the ID). Let's imagine you have a valid manuf ID byte in ID[0], and the device ID (ID[1]) matches the Winbond or Gigadevice manufacturer ID, and ID[3] (extended Device ID byte?) matches a valid Winbond/Gigadevice device ID. If you skip the check on ID[0] you might erroneously detect a Winbond or Gigadevice NAND, while it's actually something else. Note that I don't really have a solution to make this detection more robust. > > The second problem only exist in theory, so my preference is to apply > this patch and fix only the first problem for now. I think we should fix that problem now. Maybe by doing a 3 steps detection: 1/ READID + ID[] 2/ READID + DUMMY + ID[] 3/ READID + ADDR + ID[] At each step we would check if the returned ID matches a valid NAND, and if it does, stop there.