[PATCH 0/2] mtd: spi-nor: Fix Quad Enable method for MX25L12835F

Heiko Thiery heiko.thiery at gmail.com
Tue Mar 1 06:13:57 PST 2022


Hi,

Am Di., 1. März 2022 um 11:54 Uhr schrieb <Tudor.Ambarus at microchip.com>:
>
> On 3/1/22 12:29, Heiko Thiery wrote:
> > EXTERNAL EMAIL: Do not click links or open attachments unless you know the content is safe
> >
> > Hi Tudor,
> >
> > Am Di., 1. März 2022 um 10:56 Uhr schrieb Tudor Ambarus
> > <tudor.ambarus at microchip.com>:
> >>
> >> Hi, Heiko,
> >>
> >> Would you please apply this patch set on top of:
> >> https://lore.kernel.org/linux-mtd/20220228134505.203270-1-tudor.ambarus@microchip.com/
> >
> > When applying that series the flash will be properly detected.
> >
> > [    1.322655] spi-nor spi0.0: mx25l12835f (16384 Kbytes)
> >
>
> Cool. I'll resubmit a new series where I'll add your tested by tag. I'll also
> reword the commit messages.
>
> Also, can you run such a script to verify erase-write-read?
> #!/bin/sh
>
> dd if=/dev/urandom of=./qspi_test bs=1M count=6
> mtd_debug erase /dev/mtd5 0 6291456
> mtd_debug write /dev/mtd5 0 6291456 qspi_test
> mtd_debug read /dev/mtd5 0 6291456 qspi_read
> sha1sum qspi_test qspi_read

Here is the output:

# sh verify_erase_write_read.sh
dd if=/dev/urandom of=./qspi_test bs=1M count=6
6+0 records in
6+0 records out
time mtd_debug erase /dev/mtd0 0 6291456
Erased 6291456 bytes from address 0x00000000 in flash
real 0m 43.24s
user 0m 0.00s
sys 0m 24.37s
time mtd_debug write /dev/mtd0 0 6291456 qspi_test
Copied 6291456 bytes from qspi_test to address 0x00000000 in flash
real 0m 14.42s
user 0m 0.00s
sys 0m 7.82s
time mtd_debug read /dev/mtd0 0 6291456 qspi_read
Copied 6291456 bytes from address 0x00000000 in flash to qspi_read
real 0m 0.53s
user 0m 0.00s
sys 0m 0.39s
sha1sum qspi_test qspi_read
c7fbc59b26f913ed96f0e7134657c0f9076c40bb  qspi_test
c7fbc59b26f913ed96f0e7134657c0f9076c40bb  qspi_read


>
> Thanks!
> ta



More information about the linux-mtd mailing list