Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp4456510ybv; Sun, 16 Feb 2020 23:00:02 -0800 (PST) X-Google-Smtp-Source: APXvYqxEszBi+zS1Y1QnuR1jOLhHZEqqDSzjXx6BMqNp/f6r70Ly6OYyZQxCI6/JqKclnbK0aywu X-Received: by 2002:aca:190b:: with SMTP id l11mr9479343oii.65.1581922801984; Sun, 16 Feb 2020 23:00:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581922801; cv=none; d=google.com; s=arc-20160816; b=pSf3CkPUH75NMzRHRSLm9KRDoRFMdUvTSRYC/Yv0b4fOR+41twIci0L9+XCIAsHp6W 4MeVlzcp0UUk0c3Ej2b/fmfdB3vJToN2QpCSJIKK6Pr+ILovl0t+vtFDRGxnCz1XmTSG vZACnUcY8aecSEGoSWd07tuFPA8bnReIP9h3IwOZ8h0Q45fDxUSYyefaZ4itKons1YXd F/sP3dpZi0QEIFJWu9NYIaRU5uPZrKqEMfuOeN7f3gI4ThIcdIbgefoU8mByYqGmPkU2 YwpY5phxVcbGCQwGVD6FtPH2JqeiclUV6Z3hV8hq2ZlB4DsEw3xvIXYhVt4ESBReYgOS 64Xw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=2rhXggNVaAzWtfHjr8t3ZuJlHKHrEDKaJbuPWg/qw4U=; b=jPTm64gNbuaFi7omX3vbUgjaP2zoxGReOB7YKMl9NttZMIocRHrGSB68yxBazo2g2F 0c0WuUFqTxWkRQ6knII18mhmT5q3GIBSBVW0wlIk0FurRbH66RDcEKf2B4JK2q0BWf33 ooS11v+pdnjW6vC8ELLLALN9Cvcq54/PQlttXhpB4+7hxuPdjEkXLs7fWcD6Nz5WKsfZ 71ld7916njd/WSuo5bq09lWqYCPIr7G292aHePxLNSO+NUnyJhwS/1V8eRTRlcn67jjB oqV95e2wZ6CK/BLtJ4dti/9CnBrfnr0s3pqvTr8TdPlmjAtMYsBx8rHL0n5ODhOIDn+z ySMA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e26si6084245oii.88.2020.02.16.22.59.48; Sun, 16 Feb 2020 23:00:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726558AbgBQG6R (ORCPT + 99 others); Mon, 17 Feb 2020 01:58:17 -0500 Received: from twhmllg3.macronix.com ([122.147.135.201]:57636 "EHLO TWHMLLG3.macronix.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725873AbgBQG6P (ORCPT ); Mon, 17 Feb 2020 01:58:15 -0500 Received: from localhost.localdomain ([172.17.195.96]) by TWHMLLG3.macronix.com with ESMTP id 01H6ug7Q005796; Mon, 17 Feb 2020 14:56:43 +0800 (GMT-8) (envelope-from masonccyang@mxic.com.tw) From: Mason Yang To: miquel.raynal@bootlin.com, richard@nod.at, vigneshr@ti.com, robh+dt@kernel.org, mark.rutland@arm.com Cc: devicetree@vger.kernel.org, tglx@linutronix.de, juliensu@mxic.com.tw, frieder.schrempf@kontron.de, allison@lohutok.net, linux-kernel@vger.kernel.org, linux-mtd@lists.infradead.org, yuehaibing@huawei.com, Mason Yang Subject: [PATCH v5 1/2] mtd: rawnand: Add support for Macronix NAND randomizer Date: Mon, 17 Feb 2020 14:56:39 +0800 Message-Id: <1581922600-25461-2-git-send-email-masonccyang@mxic.com.tw> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1581922600-25461-1-git-send-email-masonccyang@mxic.com.tw> References: <1581922600-25461-1-git-send-email-masonccyang@mxic.com.tw> X-MAIL: TWHMLLG3.macronix.com 01H6ug7Q005796 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Macronix NANDs support randomizer operation for user data scrambled, which can be enabled with a SET_FEATURE. User data written to the NAND device without randomizer is still readable after randomizer function enabled. The penalty of randomizer are subpage accesses prohibited and more time period is needed in program operation and entering deep power-down mode. i.e., tPROG 300us to 340us(randomizer enabled) For more high-reliability concern, if subpage write not available with hardware ECC and then to enable randomizer is recommended by default. Driver checks byte 167 of Vendor Blocks in ONFI parameter page table to see if this high-reliability function is supported. By adding a new specific DT property in children nodes to enable randomizer function. Signed-off-by: Mason Yang Reviewed-by: Miquel Raynal --- drivers/mtd/nand/raw/nand_macronix.c | 81 ++++++++++++++++++++++++++++++++++++ 1 file changed, 81 insertions(+) diff --git a/drivers/mtd/nand/raw/nand_macronix.c b/drivers/mtd/nand/raw/nand_macronix.c index 3ff7ce0..0a2fe25 100644 --- a/drivers/mtd/nand/raw/nand_macronix.c +++ b/drivers/mtd/nand/raw/nand_macronix.c @@ -11,6 +11,19 @@ #define MACRONIX_READ_RETRY_BIT BIT(0) #define MACRONIX_NUM_READ_RETRY_MODES 6 +#define ONFI_FEATURE_ADDR_MXIC_RANDOMIZER 0xB0 +#define MACRONIX_RANDOMIZER_BIT BIT(1) +#define MACRONIX_RANDOMIZER_ENPGM BIT(0) +#define MACRONIX_RANDOMIZER_RANDEN BIT(1) +#define MACRONIX_RANDOMIZER_RANDOPT BIT(2) +#define MACRONIX_RANDOMIZER_MODE_ENTER \ + (MACRONIX_RANDOMIZER_ENPGM | \ + MACRONIX_RANDOMIZER_RANDEN | \ + MACRONIX_RANDOMIZER_RANDOPT) +#define MACRONIX_RANDOMIZER_MODE_EXIT \ + (MACRONIX_RANDOMIZER_RANDEN | \ + MACRONIX_RANDOMIZER_RANDOPT) + struct nand_onfi_vendor_macronix { u8 reserved; u8 reliability_func; @@ -29,15 +42,83 @@ static int macronix_nand_setup_read_retry(struct nand_chip *chip, int mode) return nand_set_features(chip, ONFI_FEATURE_ADDR_READ_RETRY, feature); } +static int macronix_nand_randomizer_check_enable(struct nand_chip *chip) +{ + u8 feature[ONFI_SUBFEATURE_PARAM_LEN]; + int ret; + + ret = nand_get_features(chip, ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, + feature); + if (ret < 0) + return ret; + + if (feature[0]) + return feature[0]; + + feature[0] = MACRONIX_RANDOMIZER_MODE_ENTER; + ret = nand_set_features(chip, ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, + feature); + if (ret < 0) + return ret; + + /* RANDEN and RANDOPT OTP bits are programmed */ + feature[0] = 0x0; + ret = nand_prog_page_op(chip, 0, 0, feature, 1); + if (ret < 0) + return ret; + + ret = nand_get_features(chip, ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, + feature); + if (ret < 0) + return ret; + + feature[0] &= MACRONIX_RANDOMIZER_MODE_EXIT; + ret = nand_set_features(chip, ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, + feature); + if (ret < 0) + return ret; + + return 0; +} + static void macronix_nand_onfi_init(struct nand_chip *chip) { struct nand_parameters *p = &chip->parameters; struct nand_onfi_vendor_macronix *mxic; + struct device_node *dn = nand_get_flash_node(chip); + int rand_otp = 0; + int ret; if (!p->onfi) return; + if (of_find_property(dn, "mxic,enable-randomizer-otp", NULL)) + rand_otp = 1; + mxic = (struct nand_onfi_vendor_macronix *)p->onfi->vendor; + /* Subpage write is prohibited in randomizer operatoin */ + if (rand_otp && chip->options & NAND_NO_SUBPAGE_WRITE && + mxic->reliability_func & MACRONIX_RANDOMIZER_BIT) { + if (p->supports_set_get_features) { + bitmap_set(p->set_feature_list, + ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, 1); + bitmap_set(p->get_feature_list, + ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, 1); + ret = macronix_nand_randomizer_check_enable(chip); + if (ret < 0) { + bitmap_clear(p->set_feature_list, + ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, + 1); + bitmap_clear(p->get_feature_list, + ONFI_FEATURE_ADDR_MXIC_RANDOMIZER, + 1); + pr_info("Macronix NAND randomizer failed\n"); + } else { + pr_info("Macronix NAND randomizer enabled\n"); + } + } + } + if ((mxic->reliability_func & MACRONIX_READ_RETRY_BIT) == 0) return; -- 1.9.1