lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <176978280934.304421.7518416316302221266.b4-ty@bootlin.com>
Date: Fri, 30 Jan 2026 15:20:09 +0100
From: Miquel Raynal <miquel.raynal@...tlin.com>
To: Richard Weinberger <richard@....at>, 
 Vignesh Raghavendra <vigneshr@...com>, 
 Tudor Ambarus <tudor.ambarus@...aro.org>, 
 Martin Kurbanov <mmkurbanov@...utedevices.com>, 
 Mikhail Kshevetskiy <mikhail.kshevetskiy@...sys.eu>, 
 Cheng Ming Lin <chengminglin@...c.com.tw>, 
 Pratyush Yadav <pratyush@...nel.org>, linux-mtd@...ts.infradead.org, 
 linux-kernel@...r.kernel.org, David LaPorte <dalaport@...zon.com>
Cc: Gunnar Kudrjavets <gunnarku@...zon.com>
Subject: Re: [PATCH v2] mtd: spinand: Disable continuous read during probe

On Thu, 29 Jan 2026 17:33:22 -0800, David LaPorte wrote:
> Macronix serial NAND devices with continuous read support do not
> clear the configuration register on soft reset and lack a hardware
> reset pin. When continuous read is interrupted (e.g., during reboot),
> the feature remains enabled at the device level.
> 
> With continuous read enabled, the OOB area becomes inaccessible and
> all reads are instead directed to the main area. As a result, during
> partition allocation as part of MTD device registration, the first two
> bytes of the main area for the master block are read and indicate that
> the block is bad. This process repeats for every subsequent block for
> the partition.
> 
> [...]

Applied to nand/next, thanks!

[1/1] mtd: spinand: Disable continuous read during probe
      commit: d47034c840c3965cc51572d69ecf634c908e8fac

Patche(s) should be available on mtd/linux.git and will be
part of the next PR (provided that no robot complains by then).

Kind regards,
Miquèl


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ