[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e9589af968d7b9dafbce17325dbf8472@walle.cc>
Date: Mon, 22 Nov 2021 16:05:56 +0100
From: Michael Walle <michael@...le.cc>
To: Alexander Sverdlin <alexander.sverdlin@...ia.com>
Cc: linux-mtd@...ts.infradead.org,
Tudor Ambarus <tudor.ambarus@...rochip.com>,
Pratyush Yadav <p.yadav@...com>,
Miquel Raynal <miquel.raynal@...tlin.com>,
Richard Weinberger <richard@....at>,
Vignesh Raghavendra <vigneshr@...com>,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] mtd: spi-nor: mt25qu: Ignore 6th ID byte
Hi,
Am 2021-11-22 08:06, schrieb Alexander Sverdlin:
> On 19/11/2021 22:19, Michael Walle wrote:
>>> Ignore 6th ID byte, secure version of mt25qu256a has 0x73 as 6th
>>> byte.
>>
>> What is the secure version? What is the difference? Do you have some
>> links to datasheets for both?
>
> For instance:
> https://www.micron.com/products/nor-flash/serial-nor-flash/part-catalog/mt25qu256aba1ew7-0sit
> https://media-www.micron.com/-/media/client/global/documents/products/data-sheet/nor-flash/serial-nor/mt25q/die-rev-a/mt25q_qljs_u_256_aba_0.pdf?rev=594079234c1b496496b062c21ce162d6
>
> https://www.micron.com/products/nor-flash/serial-nor-flash/part-catalog/mt25qu256aba8e12-1sit
> https://media-www.micron.com/-/media/client/global/documents/products/data-sheet/nor-flash/serial-nor/mt25q/die-rev-a/mt25q_qljs_u_256_aba_0.pdf?rev=594079234c1b496496b062c21ce162d6
>
> But the differences are in "MT25Q Security Addendum":
> "The additional protection features available on the secure MT25Q
> device include a
> lock status register bit, top/bottom block address protection lock,
> volatile
> configuration lock register at power up, protection management register
> lock,
> and a nonvolatile configuration lock register."
> This is only available under NDA from Micron.
So I take a wild guess here. There are lock bits (either in OTP or
maybe until the next power cycle), to lock the corresponding
top/bottom, block protection bits, right?
> However as long as one doesn't use these security features, it appears
> compatible with
> non-secure version. That's why just ignoring the non-standard
> configuration allows
> to support it.
But if we ever support it, then we have to distiguish them. Thus,
I was asking.
>> Also please provide the SFDP data for this flash, see [1].
>
> sfdp:
> 53464450060101ff00060110300000ff84000102800000ffffffffffffff
> ffffffffffffffffffffffffffffffffffffe520fbffffffff0f29eb276b
> 273b27bbffffffffffff27bbffff29eb0c2010d80f520000244a99008b8e
> 03d4ac0127387a757a75fbbdd55c4a0f82ff81bd3d36ffffffffffffffff
> ffffffffffffffffffe7ffff21dcffff
>
> md5sum:
> 5ea738216f68c9f98987bb3725699a32
>
> jedec_id:
> 20bb191044
>
> partname:
> mt25qu256a
>
> manufacturer:
> st
>
> (But last 3 do not make sense to me, as they come from the table I
> modify,
> not from the chip itself). Further, I don't have 512Mbit chip to
> provide
> SFDP for it.
Thanks, so that's the SFDP data for the mt25qu256aba8e12-1sit part. and
the
jedec id is 20bb19104473, correct?
You don't have the non-security part by chance?
Mh, I'm undecided whether we should just duplicate the entry or if we
should ignore the last byte ("Device configuration information", where
00h
is standard). The commit which introduced the flash was 7f412111e276b.
Vingesh?
Can you elaborate on the 0x73? Is that a bitmask? If it was an
enumeration,
I'd assumed it would be 01h (or some smaller value).
-michael
Powered by blists - more mailing lists