[PATCH v4 2/5] mtd: rawnand: meson: move OOB to non-protected ECC area
Miquel Raynal
miquel.raynal at bootlin.com
Tue May 30 00:44:20 PDT 2023
Hi Arseniy,
> >>>> -static void meson_nfc_get_user_byte(struct nand_chip *nand, u8 *oob_buf)
> >>>> -{
> >>>> - struct meson_nfc_nand_chip *meson_chip = to_meson_nand(nand);
> >>>> - __le64 *info;
> >>>> - int i, count;
> >>>> + int i;
> >>>>
> >>>> - for (i = 0, count = 0; i < nand->ecc.steps; i++, count += 2) {
> >>>> + for (i = 0; i < nand->ecc.steps; i++) {
> >>>> info = &meson_chip->info_buf[i];
> >>>> - oob_buf[count] = *info;
> >>>> - oob_buf[count + 1] = *info >> 8;
> >>>> + /* Always ignore user bytes programming. */
> >>>
> >>> Why?
> >>
> >> I think comment message is wrong a little bit. Here "user bytes" are
> >> user bytes protected by ECC (e.g. location of these bytes differs from new
> >> OOB layout introduced by this patch). During page write this hardware
> >> always writes these bytes along with data. But, new OOB layout always ignores
> >> these 4 bytes, so set them to 0xFF always.
> >
> > When performing page reads/writes, you need to take the data as it's
> > been provided. You may move the data around in the buffer provided to
> > the controller, so that it get the ECC data at the right location, and
> > you need of course to reorganize the data when reading as well, so that
> > the user sees XkiB of data + YB of OOB. That's all you need to do in
> > these helpers.
> >
>
> I think there is some misunderstanding about these "user bytes" above: there are 4
> bytes which this NAND controller always writes to page in ECC mode - it was free OOB
> bytes covered by ECC. Controller grabs values from DMA buffer (second DMA buffer which
> doesn't contains page data) and writes it along with data and ECC codes. Idea of this
> change is to always suppress this write by setting them to 0xFF (may be there is some
> command option to not write it, but I don't have doc), because all of them (4 bytes)
> become unavailable to reader/writer.
At the NAND controller level, I would rather avoid doing things like
that.
I believe you can just update the ooblayout so that protected OOB bytes
are not exposed to the user as free bytes. Then your buffers should
already contain 0xffffff at the problematic location.
Thanks,
Miquèl
More information about the linux-arm-kernel
mailing list