162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * SPI NOR Software Write Protection logic.
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (C) 2005, Intec Automation Inc.
662306a36Sopenharmony_ci * Copyright (C) 2014, Freescale Semiconductor, Inc.
762306a36Sopenharmony_ci */
862306a36Sopenharmony_ci#include <linux/mtd/mtd.h>
962306a36Sopenharmony_ci#include <linux/mtd/spi-nor.h>
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci#include "core.h"
1262306a36Sopenharmony_ci
1362306a36Sopenharmony_cistatic u8 spi_nor_get_sr_bp_mask(struct spi_nor *nor)
1462306a36Sopenharmony_ci{
1562306a36Sopenharmony_ci	u8 mask = SR_BP2 | SR_BP1 | SR_BP0;
1662306a36Sopenharmony_ci
1762306a36Sopenharmony_ci	if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6)
1862306a36Sopenharmony_ci		return mask | SR_BP3_BIT6;
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci	if (nor->flags & SNOR_F_HAS_4BIT_BP)
2162306a36Sopenharmony_ci		return mask | SR_BP3;
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_ci	return mask;
2462306a36Sopenharmony_ci}
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_cistatic u8 spi_nor_get_sr_tb_mask(struct spi_nor *nor)
2762306a36Sopenharmony_ci{
2862306a36Sopenharmony_ci	if (nor->flags & SNOR_F_HAS_SR_TB_BIT6)
2962306a36Sopenharmony_ci		return SR_TB_BIT6;
3062306a36Sopenharmony_ci	else
3162306a36Sopenharmony_ci		return SR_TB_BIT5;
3262306a36Sopenharmony_ci}
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_cistatic u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor)
3562306a36Sopenharmony_ci{
3662306a36Sopenharmony_ci	unsigned int bp_slots, bp_slots_needed;
3762306a36Sopenharmony_ci	u8 mask = spi_nor_get_sr_bp_mask(nor);
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_ci	/* Reserved one for "protect none" and one for "protect all". */
4062306a36Sopenharmony_ci	bp_slots = (1 << hweight8(mask)) - 2;
4162306a36Sopenharmony_ci	bp_slots_needed = ilog2(nor->info->n_sectors);
4262306a36Sopenharmony_ci
4362306a36Sopenharmony_ci	if (bp_slots_needed > bp_slots)
4462306a36Sopenharmony_ci		return nor->info->sector_size <<
4562306a36Sopenharmony_ci			(bp_slots_needed - bp_slots);
4662306a36Sopenharmony_ci	else
4762306a36Sopenharmony_ci		return nor->info->sector_size;
4862306a36Sopenharmony_ci}
4962306a36Sopenharmony_ci
5062306a36Sopenharmony_cistatic void spi_nor_get_locked_range_sr(struct spi_nor *nor, u8 sr, loff_t *ofs,
5162306a36Sopenharmony_ci					uint64_t *len)
5262306a36Sopenharmony_ci{
5362306a36Sopenharmony_ci	struct mtd_info *mtd = &nor->mtd;
5462306a36Sopenharmony_ci	u64 min_prot_len;
5562306a36Sopenharmony_ci	u8 mask = spi_nor_get_sr_bp_mask(nor);
5662306a36Sopenharmony_ci	u8 tb_mask = spi_nor_get_sr_tb_mask(nor);
5762306a36Sopenharmony_ci	u8 bp, val = sr & mask;
5862306a36Sopenharmony_ci
5962306a36Sopenharmony_ci	if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3_BIT6)
6062306a36Sopenharmony_ci		val = (val & ~SR_BP3_BIT6) | SR_BP3;
6162306a36Sopenharmony_ci
6262306a36Sopenharmony_ci	bp = val >> SR_BP_SHIFT;
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	if (!bp) {
6562306a36Sopenharmony_ci		/* No protection */
6662306a36Sopenharmony_ci		*ofs = 0;
6762306a36Sopenharmony_ci		*len = 0;
6862306a36Sopenharmony_ci		return;
6962306a36Sopenharmony_ci	}
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci	min_prot_len = spi_nor_get_min_prot_length_sr(nor);
7262306a36Sopenharmony_ci	*len = min_prot_len << (bp - 1);
7362306a36Sopenharmony_ci
7462306a36Sopenharmony_ci	if (*len > mtd->size)
7562306a36Sopenharmony_ci		*len = mtd->size;
7662306a36Sopenharmony_ci
7762306a36Sopenharmony_ci	if (nor->flags & SNOR_F_HAS_SR_TB && sr & tb_mask)
7862306a36Sopenharmony_ci		*ofs = 0;
7962306a36Sopenharmony_ci	else
8062306a36Sopenharmony_ci		*ofs = mtd->size - *len;
8162306a36Sopenharmony_ci}
8262306a36Sopenharmony_ci
8362306a36Sopenharmony_ci/*
8462306a36Sopenharmony_ci * Return true if the entire region is locked (if @locked is true) or unlocked
8562306a36Sopenharmony_ci * (if @locked is false); false otherwise.
8662306a36Sopenharmony_ci */
8762306a36Sopenharmony_cistatic bool spi_nor_check_lock_status_sr(struct spi_nor *nor, loff_t ofs,
8862306a36Sopenharmony_ci					 uint64_t len, u8 sr, bool locked)
8962306a36Sopenharmony_ci{
9062306a36Sopenharmony_ci	loff_t lock_offs, lock_offs_max, offs_max;
9162306a36Sopenharmony_ci	uint64_t lock_len;
9262306a36Sopenharmony_ci
9362306a36Sopenharmony_ci	if (!len)
9462306a36Sopenharmony_ci		return true;
9562306a36Sopenharmony_ci
9662306a36Sopenharmony_ci	spi_nor_get_locked_range_sr(nor, sr, &lock_offs, &lock_len);
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_ci	lock_offs_max = lock_offs + lock_len;
9962306a36Sopenharmony_ci	offs_max = ofs + len;
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	if (locked)
10262306a36Sopenharmony_ci		/* Requested range is a sub-range of locked range */
10362306a36Sopenharmony_ci		return (offs_max <= lock_offs_max) && (ofs >= lock_offs);
10462306a36Sopenharmony_ci	else
10562306a36Sopenharmony_ci		/* Requested range does not overlap with locked range */
10662306a36Sopenharmony_ci		return (ofs >= lock_offs_max) || (offs_max <= lock_offs);
10762306a36Sopenharmony_ci}
10862306a36Sopenharmony_ci
10962306a36Sopenharmony_cistatic bool spi_nor_is_locked_sr(struct spi_nor *nor, loff_t ofs, uint64_t len,
11062306a36Sopenharmony_ci				 u8 sr)
11162306a36Sopenharmony_ci{
11262306a36Sopenharmony_ci	return spi_nor_check_lock_status_sr(nor, ofs, len, sr, true);
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_cistatic bool spi_nor_is_unlocked_sr(struct spi_nor *nor, loff_t ofs,
11662306a36Sopenharmony_ci				   uint64_t len, u8 sr)
11762306a36Sopenharmony_ci{
11862306a36Sopenharmony_ci	return spi_nor_check_lock_status_sr(nor, ofs, len, sr, false);
11962306a36Sopenharmony_ci}
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_ci/*
12262306a36Sopenharmony_ci * Lock a region of the flash. Compatible with ST Micro and similar flash.
12362306a36Sopenharmony_ci * Supports the block protection bits BP{0,1,2}/BP{0,1,2,3} in the status
12462306a36Sopenharmony_ci * register
12562306a36Sopenharmony_ci * (SR). Does not support these features found in newer SR bitfields:
12662306a36Sopenharmony_ci *   - SEC: sector/block protect - only handle SEC=0 (block protect)
12762306a36Sopenharmony_ci *   - CMP: complement protect - only support CMP=0 (range is not complemented)
12862306a36Sopenharmony_ci *
12962306a36Sopenharmony_ci * Support for the following is provided conditionally for some flash:
13062306a36Sopenharmony_ci *   - TB: top/bottom protect
13162306a36Sopenharmony_ci *
13262306a36Sopenharmony_ci * Sample table portion for 8MB flash (Winbond w25q64fw):
13362306a36Sopenharmony_ci *
13462306a36Sopenharmony_ci *   SEC  |  TB   |  BP2  |  BP1  |  BP0  |  Prot Length  | Protected Portion
13562306a36Sopenharmony_ci *  --------------------------------------------------------------------------
13662306a36Sopenharmony_ci *    X   |   X   |   0   |   0   |   0   |  NONE         | NONE
13762306a36Sopenharmony_ci *    0   |   0   |   0   |   0   |   1   |  128 KB       | Upper 1/64
13862306a36Sopenharmony_ci *    0   |   0   |   0   |   1   |   0   |  256 KB       | Upper 1/32
13962306a36Sopenharmony_ci *    0   |   0   |   0   |   1   |   1   |  512 KB       | Upper 1/16
14062306a36Sopenharmony_ci *    0   |   0   |   1   |   0   |   0   |  1 MB         | Upper 1/8
14162306a36Sopenharmony_ci *    0   |   0   |   1   |   0   |   1   |  2 MB         | Upper 1/4
14262306a36Sopenharmony_ci *    0   |   0   |   1   |   1   |   0   |  4 MB         | Upper 1/2
14362306a36Sopenharmony_ci *    X   |   X   |   1   |   1   |   1   |  8 MB         | ALL
14462306a36Sopenharmony_ci *  ------|-------|-------|-------|-------|---------------|-------------------
14562306a36Sopenharmony_ci *    0   |   1   |   0   |   0   |   1   |  128 KB       | Lower 1/64
14662306a36Sopenharmony_ci *    0   |   1   |   0   |   1   |   0   |  256 KB       | Lower 1/32
14762306a36Sopenharmony_ci *    0   |   1   |   0   |   1   |   1   |  512 KB       | Lower 1/16
14862306a36Sopenharmony_ci *    0   |   1   |   1   |   0   |   0   |  1 MB         | Lower 1/8
14962306a36Sopenharmony_ci *    0   |   1   |   1   |   0   |   1   |  2 MB         | Lower 1/4
15062306a36Sopenharmony_ci *    0   |   1   |   1   |   1   |   0   |  4 MB         | Lower 1/2
15162306a36Sopenharmony_ci *
15262306a36Sopenharmony_ci * Returns negative on errors, 0 on success.
15362306a36Sopenharmony_ci */
15462306a36Sopenharmony_cistatic int spi_nor_sr_lock(struct spi_nor *nor, loff_t ofs, uint64_t len)
15562306a36Sopenharmony_ci{
15662306a36Sopenharmony_ci	struct mtd_info *mtd = &nor->mtd;
15762306a36Sopenharmony_ci	u64 min_prot_len;
15862306a36Sopenharmony_ci	int ret, status_old, status_new;
15962306a36Sopenharmony_ci	u8 mask = spi_nor_get_sr_bp_mask(nor);
16062306a36Sopenharmony_ci	u8 tb_mask = spi_nor_get_sr_tb_mask(nor);
16162306a36Sopenharmony_ci	u8 pow, val;
16262306a36Sopenharmony_ci	loff_t lock_len;
16362306a36Sopenharmony_ci	bool can_be_top = true, can_be_bottom = nor->flags & SNOR_F_HAS_SR_TB;
16462306a36Sopenharmony_ci	bool use_top;
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_ci	ret = spi_nor_read_sr(nor, nor->bouncebuf);
16762306a36Sopenharmony_ci	if (ret)
16862306a36Sopenharmony_ci		return ret;
16962306a36Sopenharmony_ci
17062306a36Sopenharmony_ci	status_old = nor->bouncebuf[0];
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	/* If nothing in our range is unlocked, we don't need to do anything */
17362306a36Sopenharmony_ci	if (spi_nor_is_locked_sr(nor, ofs, len, status_old))
17462306a36Sopenharmony_ci		return 0;
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_ci	/* If anything below us is unlocked, we can't use 'bottom' protection */
17762306a36Sopenharmony_ci	if (!spi_nor_is_locked_sr(nor, 0, ofs, status_old))
17862306a36Sopenharmony_ci		can_be_bottom = false;
17962306a36Sopenharmony_ci
18062306a36Sopenharmony_ci	/* If anything above us is unlocked, we can't use 'top' protection */
18162306a36Sopenharmony_ci	if (!spi_nor_is_locked_sr(nor, ofs + len, mtd->size - (ofs + len),
18262306a36Sopenharmony_ci				  status_old))
18362306a36Sopenharmony_ci		can_be_top = false;
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	if (!can_be_bottom && !can_be_top)
18662306a36Sopenharmony_ci		return -EINVAL;
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_ci	/* Prefer top, if both are valid */
18962306a36Sopenharmony_ci	use_top = can_be_top;
19062306a36Sopenharmony_ci
19162306a36Sopenharmony_ci	/* lock_len: length of region that should end up locked */
19262306a36Sopenharmony_ci	if (use_top)
19362306a36Sopenharmony_ci		lock_len = mtd->size - ofs;
19462306a36Sopenharmony_ci	else
19562306a36Sopenharmony_ci		lock_len = ofs + len;
19662306a36Sopenharmony_ci
19762306a36Sopenharmony_ci	if (lock_len == mtd->size) {
19862306a36Sopenharmony_ci		val = mask;
19962306a36Sopenharmony_ci	} else {
20062306a36Sopenharmony_ci		min_prot_len = spi_nor_get_min_prot_length_sr(nor);
20162306a36Sopenharmony_ci		pow = ilog2(lock_len) - ilog2(min_prot_len) + 1;
20262306a36Sopenharmony_ci		val = pow << SR_BP_SHIFT;
20362306a36Sopenharmony_ci
20462306a36Sopenharmony_ci		if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3)
20562306a36Sopenharmony_ci			val = (val & ~SR_BP3) | SR_BP3_BIT6;
20662306a36Sopenharmony_ci
20762306a36Sopenharmony_ci		if (val & ~mask)
20862306a36Sopenharmony_ci			return -EINVAL;
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci		/* Don't "lock" with no region! */
21162306a36Sopenharmony_ci		if (!(val & mask))
21262306a36Sopenharmony_ci			return -EINVAL;
21362306a36Sopenharmony_ci	}
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_ci	status_new = (status_old & ~mask & ~tb_mask) | val;
21662306a36Sopenharmony_ci
21762306a36Sopenharmony_ci	/*
21862306a36Sopenharmony_ci	 * Disallow further writes if WP# pin is neither left floating nor
21962306a36Sopenharmony_ci	 * wrongly tied to GND (that includes internal pull-downs).
22062306a36Sopenharmony_ci	 * WP# pin hard strapped to GND can be a valid use case.
22162306a36Sopenharmony_ci	 */
22262306a36Sopenharmony_ci	if (!(nor->flags & SNOR_F_NO_WP))
22362306a36Sopenharmony_ci		status_new |= SR_SRWD;
22462306a36Sopenharmony_ci
22562306a36Sopenharmony_ci	if (!use_top)
22662306a36Sopenharmony_ci		status_new |= tb_mask;
22762306a36Sopenharmony_ci
22862306a36Sopenharmony_ci	/* Don't bother if they're the same */
22962306a36Sopenharmony_ci	if (status_new == status_old)
23062306a36Sopenharmony_ci		return 0;
23162306a36Sopenharmony_ci
23262306a36Sopenharmony_ci	/* Only modify protection if it will not unlock other areas */
23362306a36Sopenharmony_ci	if ((status_new & mask) < (status_old & mask))
23462306a36Sopenharmony_ci		return -EINVAL;
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci	return spi_nor_write_sr_and_check(nor, status_new);
23762306a36Sopenharmony_ci}
23862306a36Sopenharmony_ci
23962306a36Sopenharmony_ci/*
24062306a36Sopenharmony_ci * Unlock a region of the flash. See spi_nor_sr_lock() for more info
24162306a36Sopenharmony_ci *
24262306a36Sopenharmony_ci * Returns negative on errors, 0 on success.
24362306a36Sopenharmony_ci */
24462306a36Sopenharmony_cistatic int spi_nor_sr_unlock(struct spi_nor *nor, loff_t ofs, uint64_t len)
24562306a36Sopenharmony_ci{
24662306a36Sopenharmony_ci	struct mtd_info *mtd = &nor->mtd;
24762306a36Sopenharmony_ci	u64 min_prot_len;
24862306a36Sopenharmony_ci	int ret, status_old, status_new;
24962306a36Sopenharmony_ci	u8 mask = spi_nor_get_sr_bp_mask(nor);
25062306a36Sopenharmony_ci	u8 tb_mask = spi_nor_get_sr_tb_mask(nor);
25162306a36Sopenharmony_ci	u8 pow, val;
25262306a36Sopenharmony_ci	loff_t lock_len;
25362306a36Sopenharmony_ci	bool can_be_top = true, can_be_bottom = nor->flags & SNOR_F_HAS_SR_TB;
25462306a36Sopenharmony_ci	bool use_top;
25562306a36Sopenharmony_ci
25662306a36Sopenharmony_ci	ret = spi_nor_read_sr(nor, nor->bouncebuf);
25762306a36Sopenharmony_ci	if (ret)
25862306a36Sopenharmony_ci		return ret;
25962306a36Sopenharmony_ci
26062306a36Sopenharmony_ci	status_old = nor->bouncebuf[0];
26162306a36Sopenharmony_ci
26262306a36Sopenharmony_ci	/* If nothing in our range is locked, we don't need to do anything */
26362306a36Sopenharmony_ci	if (spi_nor_is_unlocked_sr(nor, ofs, len, status_old))
26462306a36Sopenharmony_ci		return 0;
26562306a36Sopenharmony_ci
26662306a36Sopenharmony_ci	/* If anything below us is locked, we can't use 'top' protection */
26762306a36Sopenharmony_ci	if (!spi_nor_is_unlocked_sr(nor, 0, ofs, status_old))
26862306a36Sopenharmony_ci		can_be_top = false;
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_ci	/* If anything above us is locked, we can't use 'bottom' protection */
27162306a36Sopenharmony_ci	if (!spi_nor_is_unlocked_sr(nor, ofs + len, mtd->size - (ofs + len),
27262306a36Sopenharmony_ci				    status_old))
27362306a36Sopenharmony_ci		can_be_bottom = false;
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_ci	if (!can_be_bottom && !can_be_top)
27662306a36Sopenharmony_ci		return -EINVAL;
27762306a36Sopenharmony_ci
27862306a36Sopenharmony_ci	/* Prefer top, if both are valid */
27962306a36Sopenharmony_ci	use_top = can_be_top;
28062306a36Sopenharmony_ci
28162306a36Sopenharmony_ci	/* lock_len: length of region that should remain locked */
28262306a36Sopenharmony_ci	if (use_top)
28362306a36Sopenharmony_ci		lock_len = mtd->size - (ofs + len);
28462306a36Sopenharmony_ci	else
28562306a36Sopenharmony_ci		lock_len = ofs;
28662306a36Sopenharmony_ci
28762306a36Sopenharmony_ci	if (lock_len == 0) {
28862306a36Sopenharmony_ci		val = 0; /* fully unlocked */
28962306a36Sopenharmony_ci	} else {
29062306a36Sopenharmony_ci		min_prot_len = spi_nor_get_min_prot_length_sr(nor);
29162306a36Sopenharmony_ci		pow = ilog2(lock_len) - ilog2(min_prot_len) + 1;
29262306a36Sopenharmony_ci		val = pow << SR_BP_SHIFT;
29362306a36Sopenharmony_ci
29462306a36Sopenharmony_ci		if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3)
29562306a36Sopenharmony_ci			val = (val & ~SR_BP3) | SR_BP3_BIT6;
29662306a36Sopenharmony_ci
29762306a36Sopenharmony_ci		/* Some power-of-two sizes are not supported */
29862306a36Sopenharmony_ci		if (val & ~mask)
29962306a36Sopenharmony_ci			return -EINVAL;
30062306a36Sopenharmony_ci	}
30162306a36Sopenharmony_ci
30262306a36Sopenharmony_ci	status_new = (status_old & ~mask & ~tb_mask) | val;
30362306a36Sopenharmony_ci
30462306a36Sopenharmony_ci	/* Don't protect status register if we're fully unlocked */
30562306a36Sopenharmony_ci	if (lock_len == 0)
30662306a36Sopenharmony_ci		status_new &= ~SR_SRWD;
30762306a36Sopenharmony_ci
30862306a36Sopenharmony_ci	if (!use_top)
30962306a36Sopenharmony_ci		status_new |= tb_mask;
31062306a36Sopenharmony_ci
31162306a36Sopenharmony_ci	/* Don't bother if they're the same */
31262306a36Sopenharmony_ci	if (status_new == status_old)
31362306a36Sopenharmony_ci		return 0;
31462306a36Sopenharmony_ci
31562306a36Sopenharmony_ci	/* Only modify protection if it will not lock other areas */
31662306a36Sopenharmony_ci	if ((status_new & mask) > (status_old & mask))
31762306a36Sopenharmony_ci		return -EINVAL;
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci	return spi_nor_write_sr_and_check(nor, status_new);
32062306a36Sopenharmony_ci}
32162306a36Sopenharmony_ci
32262306a36Sopenharmony_ci/*
32362306a36Sopenharmony_ci * Check if a region of the flash is (completely) locked. See spi_nor_sr_lock()
32462306a36Sopenharmony_ci * for more info.
32562306a36Sopenharmony_ci *
32662306a36Sopenharmony_ci * Returns 1 if entire region is locked, 0 if any portion is unlocked, and
32762306a36Sopenharmony_ci * negative on errors.
32862306a36Sopenharmony_ci */
32962306a36Sopenharmony_cistatic int spi_nor_sr_is_locked(struct spi_nor *nor, loff_t ofs, uint64_t len)
33062306a36Sopenharmony_ci{
33162306a36Sopenharmony_ci	int ret;
33262306a36Sopenharmony_ci
33362306a36Sopenharmony_ci	ret = spi_nor_read_sr(nor, nor->bouncebuf);
33462306a36Sopenharmony_ci	if (ret)
33562306a36Sopenharmony_ci		return ret;
33662306a36Sopenharmony_ci
33762306a36Sopenharmony_ci	return spi_nor_is_locked_sr(nor, ofs, len, nor->bouncebuf[0]);
33862306a36Sopenharmony_ci}
33962306a36Sopenharmony_ci
34062306a36Sopenharmony_cistatic const struct spi_nor_locking_ops spi_nor_sr_locking_ops = {
34162306a36Sopenharmony_ci	.lock = spi_nor_sr_lock,
34262306a36Sopenharmony_ci	.unlock = spi_nor_sr_unlock,
34362306a36Sopenharmony_ci	.is_locked = spi_nor_sr_is_locked,
34462306a36Sopenharmony_ci};
34562306a36Sopenharmony_ci
34662306a36Sopenharmony_civoid spi_nor_init_default_locking_ops(struct spi_nor *nor)
34762306a36Sopenharmony_ci{
34862306a36Sopenharmony_ci	nor->params->locking_ops = &spi_nor_sr_locking_ops;
34962306a36Sopenharmony_ci}
35062306a36Sopenharmony_ci
35162306a36Sopenharmony_cistatic int spi_nor_lock(struct mtd_info *mtd, loff_t ofs, uint64_t len)
35262306a36Sopenharmony_ci{
35362306a36Sopenharmony_ci	struct spi_nor *nor = mtd_to_spi_nor(mtd);
35462306a36Sopenharmony_ci	int ret;
35562306a36Sopenharmony_ci
35662306a36Sopenharmony_ci	ret = spi_nor_prep_and_lock(nor);
35762306a36Sopenharmony_ci	if (ret)
35862306a36Sopenharmony_ci		return ret;
35962306a36Sopenharmony_ci
36062306a36Sopenharmony_ci	ret = nor->params->locking_ops->lock(nor, ofs, len);
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_ci	spi_nor_unlock_and_unprep(nor);
36362306a36Sopenharmony_ci	return ret;
36462306a36Sopenharmony_ci}
36562306a36Sopenharmony_ci
36662306a36Sopenharmony_cistatic int spi_nor_unlock(struct mtd_info *mtd, loff_t ofs, uint64_t len)
36762306a36Sopenharmony_ci{
36862306a36Sopenharmony_ci	struct spi_nor *nor = mtd_to_spi_nor(mtd);
36962306a36Sopenharmony_ci	int ret;
37062306a36Sopenharmony_ci
37162306a36Sopenharmony_ci	ret = spi_nor_prep_and_lock(nor);
37262306a36Sopenharmony_ci	if (ret)
37362306a36Sopenharmony_ci		return ret;
37462306a36Sopenharmony_ci
37562306a36Sopenharmony_ci	ret = nor->params->locking_ops->unlock(nor, ofs, len);
37662306a36Sopenharmony_ci
37762306a36Sopenharmony_ci	spi_nor_unlock_and_unprep(nor);
37862306a36Sopenharmony_ci	return ret;
37962306a36Sopenharmony_ci}
38062306a36Sopenharmony_ci
38162306a36Sopenharmony_cistatic int spi_nor_is_locked(struct mtd_info *mtd, loff_t ofs, uint64_t len)
38262306a36Sopenharmony_ci{
38362306a36Sopenharmony_ci	struct spi_nor *nor = mtd_to_spi_nor(mtd);
38462306a36Sopenharmony_ci	int ret;
38562306a36Sopenharmony_ci
38662306a36Sopenharmony_ci	ret = spi_nor_prep_and_lock(nor);
38762306a36Sopenharmony_ci	if (ret)
38862306a36Sopenharmony_ci		return ret;
38962306a36Sopenharmony_ci
39062306a36Sopenharmony_ci	ret = nor->params->locking_ops->is_locked(nor, ofs, len);
39162306a36Sopenharmony_ci
39262306a36Sopenharmony_ci	spi_nor_unlock_and_unprep(nor);
39362306a36Sopenharmony_ci	return ret;
39462306a36Sopenharmony_ci}
39562306a36Sopenharmony_ci
39662306a36Sopenharmony_ci/**
39762306a36Sopenharmony_ci * spi_nor_try_unlock_all() - Tries to unlock the entire flash memory array.
39862306a36Sopenharmony_ci * @nor:	pointer to a 'struct spi_nor'.
39962306a36Sopenharmony_ci *
40062306a36Sopenharmony_ci * Some SPI NOR flashes are write protected by default after a power-on reset
40162306a36Sopenharmony_ci * cycle, in order to avoid inadvertent writes during power-up. Backward
40262306a36Sopenharmony_ci * compatibility imposes to unlock the entire flash memory array at power-up
40362306a36Sopenharmony_ci * by default.
40462306a36Sopenharmony_ci *
40562306a36Sopenharmony_ci * Unprotecting the entire flash array will fail for boards which are hardware
40662306a36Sopenharmony_ci * write-protected. Thus any errors are ignored.
40762306a36Sopenharmony_ci */
40862306a36Sopenharmony_civoid spi_nor_try_unlock_all(struct spi_nor *nor)
40962306a36Sopenharmony_ci{
41062306a36Sopenharmony_ci	int ret;
41162306a36Sopenharmony_ci
41262306a36Sopenharmony_ci	if (!(nor->flags & SNOR_F_HAS_LOCK))
41362306a36Sopenharmony_ci		return;
41462306a36Sopenharmony_ci
41562306a36Sopenharmony_ci	dev_dbg(nor->dev, "Unprotecting entire flash array\n");
41662306a36Sopenharmony_ci
41762306a36Sopenharmony_ci	ret = spi_nor_unlock(&nor->mtd, 0, nor->params->size);
41862306a36Sopenharmony_ci	if (ret)
41962306a36Sopenharmony_ci		dev_dbg(nor->dev, "Failed to unlock the entire flash memory array\n");
42062306a36Sopenharmony_ci}
42162306a36Sopenharmony_ci
42262306a36Sopenharmony_civoid spi_nor_set_mtd_locking_ops(struct spi_nor *nor)
42362306a36Sopenharmony_ci{
42462306a36Sopenharmony_ci	struct mtd_info *mtd = &nor->mtd;
42562306a36Sopenharmony_ci
42662306a36Sopenharmony_ci	if (!nor->params->locking_ops)
42762306a36Sopenharmony_ci		return;
42862306a36Sopenharmony_ci
42962306a36Sopenharmony_ci	mtd->_lock = spi_nor_lock;
43062306a36Sopenharmony_ci	mtd->_unlock = spi_nor_unlock;
43162306a36Sopenharmony_ci	mtd->_is_locked = spi_nor_is_locked;
43262306a36Sopenharmony_ci}
433