162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * SPI NOR Software Write Protection logic. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 2005, Intec Automation Inc. 662306a36Sopenharmony_ci * Copyright (C) 2014, Freescale Semiconductor, Inc. 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci#include <linux/mtd/mtd.h> 962306a36Sopenharmony_ci#include <linux/mtd/spi-nor.h> 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include "core.h" 1262306a36Sopenharmony_ci 1362306a36Sopenharmony_cistatic u8 spi_nor_get_sr_bp_mask(struct spi_nor *nor) 1462306a36Sopenharmony_ci{ 1562306a36Sopenharmony_ci u8 mask = SR_BP2 | SR_BP1 | SR_BP0; 1662306a36Sopenharmony_ci 1762306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6) 1862306a36Sopenharmony_ci return mask | SR_BP3_BIT6; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_4BIT_BP) 2162306a36Sopenharmony_ci return mask | SR_BP3; 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci return mask; 2462306a36Sopenharmony_ci} 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic u8 spi_nor_get_sr_tb_mask(struct spi_nor *nor) 2762306a36Sopenharmony_ci{ 2862306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_SR_TB_BIT6) 2962306a36Sopenharmony_ci return SR_TB_BIT6; 3062306a36Sopenharmony_ci else 3162306a36Sopenharmony_ci return SR_TB_BIT5; 3262306a36Sopenharmony_ci} 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_cistatic u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor) 3562306a36Sopenharmony_ci{ 3662306a36Sopenharmony_ci unsigned int bp_slots, bp_slots_needed; 3762306a36Sopenharmony_ci u8 mask = spi_nor_get_sr_bp_mask(nor); 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_ci /* Reserved one for "protect none" and one for "protect all". */ 4062306a36Sopenharmony_ci bp_slots = (1 << hweight8(mask)) - 2; 4162306a36Sopenharmony_ci bp_slots_needed = ilog2(nor->info->n_sectors); 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_ci if (bp_slots_needed > bp_slots) 4462306a36Sopenharmony_ci return nor->info->sector_size << 4562306a36Sopenharmony_ci (bp_slots_needed - bp_slots); 4662306a36Sopenharmony_ci else 4762306a36Sopenharmony_ci return nor->info->sector_size; 4862306a36Sopenharmony_ci} 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_cistatic void spi_nor_get_locked_range_sr(struct spi_nor *nor, u8 sr, loff_t *ofs, 5162306a36Sopenharmony_ci uint64_t *len) 5262306a36Sopenharmony_ci{ 5362306a36Sopenharmony_ci struct mtd_info *mtd = &nor->mtd; 5462306a36Sopenharmony_ci u64 min_prot_len; 5562306a36Sopenharmony_ci u8 mask = spi_nor_get_sr_bp_mask(nor); 5662306a36Sopenharmony_ci u8 tb_mask = spi_nor_get_sr_tb_mask(nor); 5762306a36Sopenharmony_ci u8 bp, val = sr & mask; 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3_BIT6) 6062306a36Sopenharmony_ci val = (val & ~SR_BP3_BIT6) | SR_BP3; 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_ci bp = val >> SR_BP_SHIFT; 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci if (!bp) { 6562306a36Sopenharmony_ci /* No protection */ 6662306a36Sopenharmony_ci *ofs = 0; 6762306a36Sopenharmony_ci *len = 0; 6862306a36Sopenharmony_ci return; 6962306a36Sopenharmony_ci } 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci min_prot_len = spi_nor_get_min_prot_length_sr(nor); 7262306a36Sopenharmony_ci *len = min_prot_len << (bp - 1); 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci if (*len > mtd->size) 7562306a36Sopenharmony_ci *len = mtd->size; 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_SR_TB && sr & tb_mask) 7862306a36Sopenharmony_ci *ofs = 0; 7962306a36Sopenharmony_ci else 8062306a36Sopenharmony_ci *ofs = mtd->size - *len; 8162306a36Sopenharmony_ci} 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci/* 8462306a36Sopenharmony_ci * Return true if the entire region is locked (if @locked is true) or unlocked 8562306a36Sopenharmony_ci * (if @locked is false); false otherwise. 8662306a36Sopenharmony_ci */ 8762306a36Sopenharmony_cistatic bool spi_nor_check_lock_status_sr(struct spi_nor *nor, loff_t ofs, 8862306a36Sopenharmony_ci uint64_t len, u8 sr, bool locked) 8962306a36Sopenharmony_ci{ 9062306a36Sopenharmony_ci loff_t lock_offs, lock_offs_max, offs_max; 9162306a36Sopenharmony_ci uint64_t lock_len; 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ci if (!len) 9462306a36Sopenharmony_ci return true; 9562306a36Sopenharmony_ci 9662306a36Sopenharmony_ci spi_nor_get_locked_range_sr(nor, sr, &lock_offs, &lock_len); 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci lock_offs_max = lock_offs + lock_len; 9962306a36Sopenharmony_ci offs_max = ofs + len; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci if (locked) 10262306a36Sopenharmony_ci /* Requested range is a sub-range of locked range */ 10362306a36Sopenharmony_ci return (offs_max <= lock_offs_max) && (ofs >= lock_offs); 10462306a36Sopenharmony_ci else 10562306a36Sopenharmony_ci /* Requested range does not overlap with locked range */ 10662306a36Sopenharmony_ci return (ofs >= lock_offs_max) || (offs_max <= lock_offs); 10762306a36Sopenharmony_ci} 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_cistatic bool spi_nor_is_locked_sr(struct spi_nor *nor, loff_t ofs, uint64_t len, 11062306a36Sopenharmony_ci u8 sr) 11162306a36Sopenharmony_ci{ 11262306a36Sopenharmony_ci return spi_nor_check_lock_status_sr(nor, ofs, len, sr, true); 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_cistatic bool spi_nor_is_unlocked_sr(struct spi_nor *nor, loff_t ofs, 11662306a36Sopenharmony_ci uint64_t len, u8 sr) 11762306a36Sopenharmony_ci{ 11862306a36Sopenharmony_ci return spi_nor_check_lock_status_sr(nor, ofs, len, sr, false); 11962306a36Sopenharmony_ci} 12062306a36Sopenharmony_ci 12162306a36Sopenharmony_ci/* 12262306a36Sopenharmony_ci * Lock a region of the flash. Compatible with ST Micro and similar flash. 12362306a36Sopenharmony_ci * Supports the block protection bits BP{0,1,2}/BP{0,1,2,3} in the status 12462306a36Sopenharmony_ci * register 12562306a36Sopenharmony_ci * (SR). Does not support these features found in newer SR bitfields: 12662306a36Sopenharmony_ci * - SEC: sector/block protect - only handle SEC=0 (block protect) 12762306a36Sopenharmony_ci * - CMP: complement protect - only support CMP=0 (range is not complemented) 12862306a36Sopenharmony_ci * 12962306a36Sopenharmony_ci * Support for the following is provided conditionally for some flash: 13062306a36Sopenharmony_ci * - TB: top/bottom protect 13162306a36Sopenharmony_ci * 13262306a36Sopenharmony_ci * Sample table portion for 8MB flash (Winbond w25q64fw): 13362306a36Sopenharmony_ci * 13462306a36Sopenharmony_ci * SEC | TB | BP2 | BP1 | BP0 | Prot Length | Protected Portion 13562306a36Sopenharmony_ci * -------------------------------------------------------------------------- 13662306a36Sopenharmony_ci * X | X | 0 | 0 | 0 | NONE | NONE 13762306a36Sopenharmony_ci * 0 | 0 | 0 | 0 | 1 | 128 KB | Upper 1/64 13862306a36Sopenharmony_ci * 0 | 0 | 0 | 1 | 0 | 256 KB | Upper 1/32 13962306a36Sopenharmony_ci * 0 | 0 | 0 | 1 | 1 | 512 KB | Upper 1/16 14062306a36Sopenharmony_ci * 0 | 0 | 1 | 0 | 0 | 1 MB | Upper 1/8 14162306a36Sopenharmony_ci * 0 | 0 | 1 | 0 | 1 | 2 MB | Upper 1/4 14262306a36Sopenharmony_ci * 0 | 0 | 1 | 1 | 0 | 4 MB | Upper 1/2 14362306a36Sopenharmony_ci * X | X | 1 | 1 | 1 | 8 MB | ALL 14462306a36Sopenharmony_ci * ------|-------|-------|-------|-------|---------------|------------------- 14562306a36Sopenharmony_ci * 0 | 1 | 0 | 0 | 1 | 128 KB | Lower 1/64 14662306a36Sopenharmony_ci * 0 | 1 | 0 | 1 | 0 | 256 KB | Lower 1/32 14762306a36Sopenharmony_ci * 0 | 1 | 0 | 1 | 1 | 512 KB | Lower 1/16 14862306a36Sopenharmony_ci * 0 | 1 | 1 | 0 | 0 | 1 MB | Lower 1/8 14962306a36Sopenharmony_ci * 0 | 1 | 1 | 0 | 1 | 2 MB | Lower 1/4 15062306a36Sopenharmony_ci * 0 | 1 | 1 | 1 | 0 | 4 MB | Lower 1/2 15162306a36Sopenharmony_ci * 15262306a36Sopenharmony_ci * Returns negative on errors, 0 on success. 15362306a36Sopenharmony_ci */ 15462306a36Sopenharmony_cistatic int spi_nor_sr_lock(struct spi_nor *nor, loff_t ofs, uint64_t len) 15562306a36Sopenharmony_ci{ 15662306a36Sopenharmony_ci struct mtd_info *mtd = &nor->mtd; 15762306a36Sopenharmony_ci u64 min_prot_len; 15862306a36Sopenharmony_ci int ret, status_old, status_new; 15962306a36Sopenharmony_ci u8 mask = spi_nor_get_sr_bp_mask(nor); 16062306a36Sopenharmony_ci u8 tb_mask = spi_nor_get_sr_tb_mask(nor); 16162306a36Sopenharmony_ci u8 pow, val; 16262306a36Sopenharmony_ci loff_t lock_len; 16362306a36Sopenharmony_ci bool can_be_top = true, can_be_bottom = nor->flags & SNOR_F_HAS_SR_TB; 16462306a36Sopenharmony_ci bool use_top; 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci ret = spi_nor_read_sr(nor, nor->bouncebuf); 16762306a36Sopenharmony_ci if (ret) 16862306a36Sopenharmony_ci return ret; 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_ci status_old = nor->bouncebuf[0]; 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci /* If nothing in our range is unlocked, we don't need to do anything */ 17362306a36Sopenharmony_ci if (spi_nor_is_locked_sr(nor, ofs, len, status_old)) 17462306a36Sopenharmony_ci return 0; 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci /* If anything below us is unlocked, we can't use 'bottom' protection */ 17762306a36Sopenharmony_ci if (!spi_nor_is_locked_sr(nor, 0, ofs, status_old)) 17862306a36Sopenharmony_ci can_be_bottom = false; 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci /* If anything above us is unlocked, we can't use 'top' protection */ 18162306a36Sopenharmony_ci if (!spi_nor_is_locked_sr(nor, ofs + len, mtd->size - (ofs + len), 18262306a36Sopenharmony_ci status_old)) 18362306a36Sopenharmony_ci can_be_top = false; 18462306a36Sopenharmony_ci 18562306a36Sopenharmony_ci if (!can_be_bottom && !can_be_top) 18662306a36Sopenharmony_ci return -EINVAL; 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci /* Prefer top, if both are valid */ 18962306a36Sopenharmony_ci use_top = can_be_top; 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci /* lock_len: length of region that should end up locked */ 19262306a36Sopenharmony_ci if (use_top) 19362306a36Sopenharmony_ci lock_len = mtd->size - ofs; 19462306a36Sopenharmony_ci else 19562306a36Sopenharmony_ci lock_len = ofs + len; 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_ci if (lock_len == mtd->size) { 19862306a36Sopenharmony_ci val = mask; 19962306a36Sopenharmony_ci } else { 20062306a36Sopenharmony_ci min_prot_len = spi_nor_get_min_prot_length_sr(nor); 20162306a36Sopenharmony_ci pow = ilog2(lock_len) - ilog2(min_prot_len) + 1; 20262306a36Sopenharmony_ci val = pow << SR_BP_SHIFT; 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3) 20562306a36Sopenharmony_ci val = (val & ~SR_BP3) | SR_BP3_BIT6; 20662306a36Sopenharmony_ci 20762306a36Sopenharmony_ci if (val & ~mask) 20862306a36Sopenharmony_ci return -EINVAL; 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci /* Don't "lock" with no region! */ 21162306a36Sopenharmony_ci if (!(val & mask)) 21262306a36Sopenharmony_ci return -EINVAL; 21362306a36Sopenharmony_ci } 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci status_new = (status_old & ~mask & ~tb_mask) | val; 21662306a36Sopenharmony_ci 21762306a36Sopenharmony_ci /* 21862306a36Sopenharmony_ci * Disallow further writes if WP# pin is neither left floating nor 21962306a36Sopenharmony_ci * wrongly tied to GND (that includes internal pull-downs). 22062306a36Sopenharmony_ci * WP# pin hard strapped to GND can be a valid use case. 22162306a36Sopenharmony_ci */ 22262306a36Sopenharmony_ci if (!(nor->flags & SNOR_F_NO_WP)) 22362306a36Sopenharmony_ci status_new |= SR_SRWD; 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci if (!use_top) 22662306a36Sopenharmony_ci status_new |= tb_mask; 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_ci /* Don't bother if they're the same */ 22962306a36Sopenharmony_ci if (status_new == status_old) 23062306a36Sopenharmony_ci return 0; 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci /* Only modify protection if it will not unlock other areas */ 23362306a36Sopenharmony_ci if ((status_new & mask) < (status_old & mask)) 23462306a36Sopenharmony_ci return -EINVAL; 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci return spi_nor_write_sr_and_check(nor, status_new); 23762306a36Sopenharmony_ci} 23862306a36Sopenharmony_ci 23962306a36Sopenharmony_ci/* 24062306a36Sopenharmony_ci * Unlock a region of the flash. See spi_nor_sr_lock() for more info 24162306a36Sopenharmony_ci * 24262306a36Sopenharmony_ci * Returns negative on errors, 0 on success. 24362306a36Sopenharmony_ci */ 24462306a36Sopenharmony_cistatic int spi_nor_sr_unlock(struct spi_nor *nor, loff_t ofs, uint64_t len) 24562306a36Sopenharmony_ci{ 24662306a36Sopenharmony_ci struct mtd_info *mtd = &nor->mtd; 24762306a36Sopenharmony_ci u64 min_prot_len; 24862306a36Sopenharmony_ci int ret, status_old, status_new; 24962306a36Sopenharmony_ci u8 mask = spi_nor_get_sr_bp_mask(nor); 25062306a36Sopenharmony_ci u8 tb_mask = spi_nor_get_sr_tb_mask(nor); 25162306a36Sopenharmony_ci u8 pow, val; 25262306a36Sopenharmony_ci loff_t lock_len; 25362306a36Sopenharmony_ci bool can_be_top = true, can_be_bottom = nor->flags & SNOR_F_HAS_SR_TB; 25462306a36Sopenharmony_ci bool use_top; 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci ret = spi_nor_read_sr(nor, nor->bouncebuf); 25762306a36Sopenharmony_ci if (ret) 25862306a36Sopenharmony_ci return ret; 25962306a36Sopenharmony_ci 26062306a36Sopenharmony_ci status_old = nor->bouncebuf[0]; 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci /* If nothing in our range is locked, we don't need to do anything */ 26362306a36Sopenharmony_ci if (spi_nor_is_unlocked_sr(nor, ofs, len, status_old)) 26462306a36Sopenharmony_ci return 0; 26562306a36Sopenharmony_ci 26662306a36Sopenharmony_ci /* If anything below us is locked, we can't use 'top' protection */ 26762306a36Sopenharmony_ci if (!spi_nor_is_unlocked_sr(nor, 0, ofs, status_old)) 26862306a36Sopenharmony_ci can_be_top = false; 26962306a36Sopenharmony_ci 27062306a36Sopenharmony_ci /* If anything above us is locked, we can't use 'bottom' protection */ 27162306a36Sopenharmony_ci if (!spi_nor_is_unlocked_sr(nor, ofs + len, mtd->size - (ofs + len), 27262306a36Sopenharmony_ci status_old)) 27362306a36Sopenharmony_ci can_be_bottom = false; 27462306a36Sopenharmony_ci 27562306a36Sopenharmony_ci if (!can_be_bottom && !can_be_top) 27662306a36Sopenharmony_ci return -EINVAL; 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_ci /* Prefer top, if both are valid */ 27962306a36Sopenharmony_ci use_top = can_be_top; 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_ci /* lock_len: length of region that should remain locked */ 28262306a36Sopenharmony_ci if (use_top) 28362306a36Sopenharmony_ci lock_len = mtd->size - (ofs + len); 28462306a36Sopenharmony_ci else 28562306a36Sopenharmony_ci lock_len = ofs; 28662306a36Sopenharmony_ci 28762306a36Sopenharmony_ci if (lock_len == 0) { 28862306a36Sopenharmony_ci val = 0; /* fully unlocked */ 28962306a36Sopenharmony_ci } else { 29062306a36Sopenharmony_ci min_prot_len = spi_nor_get_min_prot_length_sr(nor); 29162306a36Sopenharmony_ci pow = ilog2(lock_len) - ilog2(min_prot_len) + 1; 29262306a36Sopenharmony_ci val = pow << SR_BP_SHIFT; 29362306a36Sopenharmony_ci 29462306a36Sopenharmony_ci if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3) 29562306a36Sopenharmony_ci val = (val & ~SR_BP3) | SR_BP3_BIT6; 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_ci /* Some power-of-two sizes are not supported */ 29862306a36Sopenharmony_ci if (val & ~mask) 29962306a36Sopenharmony_ci return -EINVAL; 30062306a36Sopenharmony_ci } 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_ci status_new = (status_old & ~mask & ~tb_mask) | val; 30362306a36Sopenharmony_ci 30462306a36Sopenharmony_ci /* Don't protect status register if we're fully unlocked */ 30562306a36Sopenharmony_ci if (lock_len == 0) 30662306a36Sopenharmony_ci status_new &= ~SR_SRWD; 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_ci if (!use_top) 30962306a36Sopenharmony_ci status_new |= tb_mask; 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_ci /* Don't bother if they're the same */ 31262306a36Sopenharmony_ci if (status_new == status_old) 31362306a36Sopenharmony_ci return 0; 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_ci /* Only modify protection if it will not lock other areas */ 31662306a36Sopenharmony_ci if ((status_new & mask) > (status_old & mask)) 31762306a36Sopenharmony_ci return -EINVAL; 31862306a36Sopenharmony_ci 31962306a36Sopenharmony_ci return spi_nor_write_sr_and_check(nor, status_new); 32062306a36Sopenharmony_ci} 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_ci/* 32362306a36Sopenharmony_ci * Check if a region of the flash is (completely) locked. See spi_nor_sr_lock() 32462306a36Sopenharmony_ci * for more info. 32562306a36Sopenharmony_ci * 32662306a36Sopenharmony_ci * Returns 1 if entire region is locked, 0 if any portion is unlocked, and 32762306a36Sopenharmony_ci * negative on errors. 32862306a36Sopenharmony_ci */ 32962306a36Sopenharmony_cistatic int spi_nor_sr_is_locked(struct spi_nor *nor, loff_t ofs, uint64_t len) 33062306a36Sopenharmony_ci{ 33162306a36Sopenharmony_ci int ret; 33262306a36Sopenharmony_ci 33362306a36Sopenharmony_ci ret = spi_nor_read_sr(nor, nor->bouncebuf); 33462306a36Sopenharmony_ci if (ret) 33562306a36Sopenharmony_ci return ret; 33662306a36Sopenharmony_ci 33762306a36Sopenharmony_ci return spi_nor_is_locked_sr(nor, ofs, len, nor->bouncebuf[0]); 33862306a36Sopenharmony_ci} 33962306a36Sopenharmony_ci 34062306a36Sopenharmony_cistatic const struct spi_nor_locking_ops spi_nor_sr_locking_ops = { 34162306a36Sopenharmony_ci .lock = spi_nor_sr_lock, 34262306a36Sopenharmony_ci .unlock = spi_nor_sr_unlock, 34362306a36Sopenharmony_ci .is_locked = spi_nor_sr_is_locked, 34462306a36Sopenharmony_ci}; 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_civoid spi_nor_init_default_locking_ops(struct spi_nor *nor) 34762306a36Sopenharmony_ci{ 34862306a36Sopenharmony_ci nor->params->locking_ops = &spi_nor_sr_locking_ops; 34962306a36Sopenharmony_ci} 35062306a36Sopenharmony_ci 35162306a36Sopenharmony_cistatic int spi_nor_lock(struct mtd_info *mtd, loff_t ofs, uint64_t len) 35262306a36Sopenharmony_ci{ 35362306a36Sopenharmony_ci struct spi_nor *nor = mtd_to_spi_nor(mtd); 35462306a36Sopenharmony_ci int ret; 35562306a36Sopenharmony_ci 35662306a36Sopenharmony_ci ret = spi_nor_prep_and_lock(nor); 35762306a36Sopenharmony_ci if (ret) 35862306a36Sopenharmony_ci return ret; 35962306a36Sopenharmony_ci 36062306a36Sopenharmony_ci ret = nor->params->locking_ops->lock(nor, ofs, len); 36162306a36Sopenharmony_ci 36262306a36Sopenharmony_ci spi_nor_unlock_and_unprep(nor); 36362306a36Sopenharmony_ci return ret; 36462306a36Sopenharmony_ci} 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_cistatic int spi_nor_unlock(struct mtd_info *mtd, loff_t ofs, uint64_t len) 36762306a36Sopenharmony_ci{ 36862306a36Sopenharmony_ci struct spi_nor *nor = mtd_to_spi_nor(mtd); 36962306a36Sopenharmony_ci int ret; 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci ret = spi_nor_prep_and_lock(nor); 37262306a36Sopenharmony_ci if (ret) 37362306a36Sopenharmony_ci return ret; 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci ret = nor->params->locking_ops->unlock(nor, ofs, len); 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci spi_nor_unlock_and_unprep(nor); 37862306a36Sopenharmony_ci return ret; 37962306a36Sopenharmony_ci} 38062306a36Sopenharmony_ci 38162306a36Sopenharmony_cistatic int spi_nor_is_locked(struct mtd_info *mtd, loff_t ofs, uint64_t len) 38262306a36Sopenharmony_ci{ 38362306a36Sopenharmony_ci struct spi_nor *nor = mtd_to_spi_nor(mtd); 38462306a36Sopenharmony_ci int ret; 38562306a36Sopenharmony_ci 38662306a36Sopenharmony_ci ret = spi_nor_prep_and_lock(nor); 38762306a36Sopenharmony_ci if (ret) 38862306a36Sopenharmony_ci return ret; 38962306a36Sopenharmony_ci 39062306a36Sopenharmony_ci ret = nor->params->locking_ops->is_locked(nor, ofs, len); 39162306a36Sopenharmony_ci 39262306a36Sopenharmony_ci spi_nor_unlock_and_unprep(nor); 39362306a36Sopenharmony_ci return ret; 39462306a36Sopenharmony_ci} 39562306a36Sopenharmony_ci 39662306a36Sopenharmony_ci/** 39762306a36Sopenharmony_ci * spi_nor_try_unlock_all() - Tries to unlock the entire flash memory array. 39862306a36Sopenharmony_ci * @nor: pointer to a 'struct spi_nor'. 39962306a36Sopenharmony_ci * 40062306a36Sopenharmony_ci * Some SPI NOR flashes are write protected by default after a power-on reset 40162306a36Sopenharmony_ci * cycle, in order to avoid inadvertent writes during power-up. Backward 40262306a36Sopenharmony_ci * compatibility imposes to unlock the entire flash memory array at power-up 40362306a36Sopenharmony_ci * by default. 40462306a36Sopenharmony_ci * 40562306a36Sopenharmony_ci * Unprotecting the entire flash array will fail for boards which are hardware 40662306a36Sopenharmony_ci * write-protected. Thus any errors are ignored. 40762306a36Sopenharmony_ci */ 40862306a36Sopenharmony_civoid spi_nor_try_unlock_all(struct spi_nor *nor) 40962306a36Sopenharmony_ci{ 41062306a36Sopenharmony_ci int ret; 41162306a36Sopenharmony_ci 41262306a36Sopenharmony_ci if (!(nor->flags & SNOR_F_HAS_LOCK)) 41362306a36Sopenharmony_ci return; 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci dev_dbg(nor->dev, "Unprotecting entire flash array\n"); 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci ret = spi_nor_unlock(&nor->mtd, 0, nor->params->size); 41862306a36Sopenharmony_ci if (ret) 41962306a36Sopenharmony_ci dev_dbg(nor->dev, "Failed to unlock the entire flash memory array\n"); 42062306a36Sopenharmony_ci} 42162306a36Sopenharmony_ci 42262306a36Sopenharmony_civoid spi_nor_set_mtd_locking_ops(struct spi_nor *nor) 42362306a36Sopenharmony_ci{ 42462306a36Sopenharmony_ci struct mtd_info *mtd = &nor->mtd; 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci if (!nor->params->locking_ops) 42762306a36Sopenharmony_ci return; 42862306a36Sopenharmony_ci 42962306a36Sopenharmony_ci mtd->_lock = spi_nor_lock; 43062306a36Sopenharmony_ci mtd->_unlock = spi_nor_unlock; 43162306a36Sopenharmony_ci mtd->_is_locked = spi_nor_is_locked; 43262306a36Sopenharmony_ci} 433