xref: /kernel/linux/linux-6.6/drivers/mtd/spi-nor/swp.c (revision 62306a36)
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * SPI NOR Software Write Protection logic.
4 *
5 * Copyright (C) 2005, Intec Automation Inc.
6 * Copyright (C) 2014, Freescale Semiconductor, Inc.
7 */
8#include <linux/mtd/mtd.h>
9#include <linux/mtd/spi-nor.h>
10
11#include "core.h"
12
13static u8 spi_nor_get_sr_bp_mask(struct spi_nor *nor)
14{
15	u8 mask = SR_BP2 | SR_BP1 | SR_BP0;
16
17	if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6)
18		return mask | SR_BP3_BIT6;
19
20	if (nor->flags & SNOR_F_HAS_4BIT_BP)
21		return mask | SR_BP3;
22
23	return mask;
24}
25
26static u8 spi_nor_get_sr_tb_mask(struct spi_nor *nor)
27{
28	if (nor->flags & SNOR_F_HAS_SR_TB_BIT6)
29		return SR_TB_BIT6;
30	else
31		return SR_TB_BIT5;
32}
33
34static u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor)
35{
36	unsigned int bp_slots, bp_slots_needed;
37	u8 mask = spi_nor_get_sr_bp_mask(nor);
38
39	/* Reserved one for "protect none" and one for "protect all". */
40	bp_slots = (1 << hweight8(mask)) - 2;
41	bp_slots_needed = ilog2(nor->info->n_sectors);
42
43	if (bp_slots_needed > bp_slots)
44		return nor->info->sector_size <<
45			(bp_slots_needed - bp_slots);
46	else
47		return nor->info->sector_size;
48}
49
50static void spi_nor_get_locked_range_sr(struct spi_nor *nor, u8 sr, loff_t *ofs,
51					uint64_t *len)
52{
53	struct mtd_info *mtd = &nor->mtd;
54	u64 min_prot_len;
55	u8 mask = spi_nor_get_sr_bp_mask(nor);
56	u8 tb_mask = spi_nor_get_sr_tb_mask(nor);
57	u8 bp, val = sr & mask;
58
59	if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3_BIT6)
60		val = (val & ~SR_BP3_BIT6) | SR_BP3;
61
62	bp = val >> SR_BP_SHIFT;
63
64	if (!bp) {
65		/* No protection */
66		*ofs = 0;
67		*len = 0;
68		return;
69	}
70
71	min_prot_len = spi_nor_get_min_prot_length_sr(nor);
72	*len = min_prot_len << (bp - 1);
73
74	if (*len > mtd->size)
75		*len = mtd->size;
76
77	if (nor->flags & SNOR_F_HAS_SR_TB && sr & tb_mask)
78		*ofs = 0;
79	else
80		*ofs = mtd->size - *len;
81}
82
83/*
84 * Return true if the entire region is locked (if @locked is true) or unlocked
85 * (if @locked is false); false otherwise.
86 */
87static bool spi_nor_check_lock_status_sr(struct spi_nor *nor, loff_t ofs,
88					 uint64_t len, u8 sr, bool locked)
89{
90	loff_t lock_offs, lock_offs_max, offs_max;
91	uint64_t lock_len;
92
93	if (!len)
94		return true;
95
96	spi_nor_get_locked_range_sr(nor, sr, &lock_offs, &lock_len);
97
98	lock_offs_max = lock_offs + lock_len;
99	offs_max = ofs + len;
100
101	if (locked)
102		/* Requested range is a sub-range of locked range */
103		return (offs_max <= lock_offs_max) && (ofs >= lock_offs);
104	else
105		/* Requested range does not overlap with locked range */
106		return (ofs >= lock_offs_max) || (offs_max <= lock_offs);
107}
108
109static bool spi_nor_is_locked_sr(struct spi_nor *nor, loff_t ofs, uint64_t len,
110				 u8 sr)
111{
112	return spi_nor_check_lock_status_sr(nor, ofs, len, sr, true);
113}
114
115static bool spi_nor_is_unlocked_sr(struct spi_nor *nor, loff_t ofs,
116				   uint64_t len, u8 sr)
117{
118	return spi_nor_check_lock_status_sr(nor, ofs, len, sr, false);
119}
120
121/*
122 * Lock a region of the flash. Compatible with ST Micro and similar flash.
123 * Supports the block protection bits BP{0,1,2}/BP{0,1,2,3} in the status
124 * register
125 * (SR). Does not support these features found in newer SR bitfields:
126 *   - SEC: sector/block protect - only handle SEC=0 (block protect)
127 *   - CMP: complement protect - only support CMP=0 (range is not complemented)
128 *
129 * Support for the following is provided conditionally for some flash:
130 *   - TB: top/bottom protect
131 *
132 * Sample table portion for 8MB flash (Winbond w25q64fw):
133 *
134 *   SEC  |  TB   |  BP2  |  BP1  |  BP0  |  Prot Length  | Protected Portion
135 *  --------------------------------------------------------------------------
136 *    X   |   X   |   0   |   0   |   0   |  NONE         | NONE
137 *    0   |   0   |   0   |   0   |   1   |  128 KB       | Upper 1/64
138 *    0   |   0   |   0   |   1   |   0   |  256 KB       | Upper 1/32
139 *    0   |   0   |   0   |   1   |   1   |  512 KB       | Upper 1/16
140 *    0   |   0   |   1   |   0   |   0   |  1 MB         | Upper 1/8
141 *    0   |   0   |   1   |   0   |   1   |  2 MB         | Upper 1/4
142 *    0   |   0   |   1   |   1   |   0   |  4 MB         | Upper 1/2
143 *    X   |   X   |   1   |   1   |   1   |  8 MB         | ALL
144 *  ------|-------|-------|-------|-------|---------------|-------------------
145 *    0   |   1   |   0   |   0   |   1   |  128 KB       | Lower 1/64
146 *    0   |   1   |   0   |   1   |   0   |  256 KB       | Lower 1/32
147 *    0   |   1   |   0   |   1   |   1   |  512 KB       | Lower 1/16
148 *    0   |   1   |   1   |   0   |   0   |  1 MB         | Lower 1/8
149 *    0   |   1   |   1   |   0   |   1   |  2 MB         | Lower 1/4
150 *    0   |   1   |   1   |   1   |   0   |  4 MB         | Lower 1/2
151 *
152 * Returns negative on errors, 0 on success.
153 */
154static int spi_nor_sr_lock(struct spi_nor *nor, loff_t ofs, uint64_t len)
155{
156	struct mtd_info *mtd = &nor->mtd;
157	u64 min_prot_len;
158	int ret, status_old, status_new;
159	u8 mask = spi_nor_get_sr_bp_mask(nor);
160	u8 tb_mask = spi_nor_get_sr_tb_mask(nor);
161	u8 pow, val;
162	loff_t lock_len;
163	bool can_be_top = true, can_be_bottom = nor->flags & SNOR_F_HAS_SR_TB;
164	bool use_top;
165
166	ret = spi_nor_read_sr(nor, nor->bouncebuf);
167	if (ret)
168		return ret;
169
170	status_old = nor->bouncebuf[0];
171
172	/* If nothing in our range is unlocked, we don't need to do anything */
173	if (spi_nor_is_locked_sr(nor, ofs, len, status_old))
174		return 0;
175
176	/* If anything below us is unlocked, we can't use 'bottom' protection */
177	if (!spi_nor_is_locked_sr(nor, 0, ofs, status_old))
178		can_be_bottom = false;
179
180	/* If anything above us is unlocked, we can't use 'top' protection */
181	if (!spi_nor_is_locked_sr(nor, ofs + len, mtd->size - (ofs + len),
182				  status_old))
183		can_be_top = false;
184
185	if (!can_be_bottom && !can_be_top)
186		return -EINVAL;
187
188	/* Prefer top, if both are valid */
189	use_top = can_be_top;
190
191	/* lock_len: length of region that should end up locked */
192	if (use_top)
193		lock_len = mtd->size - ofs;
194	else
195		lock_len = ofs + len;
196
197	if (lock_len == mtd->size) {
198		val = mask;
199	} else {
200		min_prot_len = spi_nor_get_min_prot_length_sr(nor);
201		pow = ilog2(lock_len) - ilog2(min_prot_len) + 1;
202		val = pow << SR_BP_SHIFT;
203
204		if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3)
205			val = (val & ~SR_BP3) | SR_BP3_BIT6;
206
207		if (val & ~mask)
208			return -EINVAL;
209
210		/* Don't "lock" with no region! */
211		if (!(val & mask))
212			return -EINVAL;
213	}
214
215	status_new = (status_old & ~mask & ~tb_mask) | val;
216
217	/*
218	 * Disallow further writes if WP# pin is neither left floating nor
219	 * wrongly tied to GND (that includes internal pull-downs).
220	 * WP# pin hard strapped to GND can be a valid use case.
221	 */
222	if (!(nor->flags & SNOR_F_NO_WP))
223		status_new |= SR_SRWD;
224
225	if (!use_top)
226		status_new |= tb_mask;
227
228	/* Don't bother if they're the same */
229	if (status_new == status_old)
230		return 0;
231
232	/* Only modify protection if it will not unlock other areas */
233	if ((status_new & mask) < (status_old & mask))
234		return -EINVAL;
235
236	return spi_nor_write_sr_and_check(nor, status_new);
237}
238
239/*
240 * Unlock a region of the flash. See spi_nor_sr_lock() for more info
241 *
242 * Returns negative on errors, 0 on success.
243 */
244static int spi_nor_sr_unlock(struct spi_nor *nor, loff_t ofs, uint64_t len)
245{
246	struct mtd_info *mtd = &nor->mtd;
247	u64 min_prot_len;
248	int ret, status_old, status_new;
249	u8 mask = spi_nor_get_sr_bp_mask(nor);
250	u8 tb_mask = spi_nor_get_sr_tb_mask(nor);
251	u8 pow, val;
252	loff_t lock_len;
253	bool can_be_top = true, can_be_bottom = nor->flags & SNOR_F_HAS_SR_TB;
254	bool use_top;
255
256	ret = spi_nor_read_sr(nor, nor->bouncebuf);
257	if (ret)
258		return ret;
259
260	status_old = nor->bouncebuf[0];
261
262	/* If nothing in our range is locked, we don't need to do anything */
263	if (spi_nor_is_unlocked_sr(nor, ofs, len, status_old))
264		return 0;
265
266	/* If anything below us is locked, we can't use 'top' protection */
267	if (!spi_nor_is_unlocked_sr(nor, 0, ofs, status_old))
268		can_be_top = false;
269
270	/* If anything above us is locked, we can't use 'bottom' protection */
271	if (!spi_nor_is_unlocked_sr(nor, ofs + len, mtd->size - (ofs + len),
272				    status_old))
273		can_be_bottom = false;
274
275	if (!can_be_bottom && !can_be_top)
276		return -EINVAL;
277
278	/* Prefer top, if both are valid */
279	use_top = can_be_top;
280
281	/* lock_len: length of region that should remain locked */
282	if (use_top)
283		lock_len = mtd->size - (ofs + len);
284	else
285		lock_len = ofs;
286
287	if (lock_len == 0) {
288		val = 0; /* fully unlocked */
289	} else {
290		min_prot_len = spi_nor_get_min_prot_length_sr(nor);
291		pow = ilog2(lock_len) - ilog2(min_prot_len) + 1;
292		val = pow << SR_BP_SHIFT;
293
294		if (nor->flags & SNOR_F_HAS_SR_BP3_BIT6 && val & SR_BP3)
295			val = (val & ~SR_BP3) | SR_BP3_BIT6;
296
297		/* Some power-of-two sizes are not supported */
298		if (val & ~mask)
299			return -EINVAL;
300	}
301
302	status_new = (status_old & ~mask & ~tb_mask) | val;
303
304	/* Don't protect status register if we're fully unlocked */
305	if (lock_len == 0)
306		status_new &= ~SR_SRWD;
307
308	if (!use_top)
309		status_new |= tb_mask;
310
311	/* Don't bother if they're the same */
312	if (status_new == status_old)
313		return 0;
314
315	/* Only modify protection if it will not lock other areas */
316	if ((status_new & mask) > (status_old & mask))
317		return -EINVAL;
318
319	return spi_nor_write_sr_and_check(nor, status_new);
320}
321
322/*
323 * Check if a region of the flash is (completely) locked. See spi_nor_sr_lock()
324 * for more info.
325 *
326 * Returns 1 if entire region is locked, 0 if any portion is unlocked, and
327 * negative on errors.
328 */
329static int spi_nor_sr_is_locked(struct spi_nor *nor, loff_t ofs, uint64_t len)
330{
331	int ret;
332
333	ret = spi_nor_read_sr(nor, nor->bouncebuf);
334	if (ret)
335		return ret;
336
337	return spi_nor_is_locked_sr(nor, ofs, len, nor->bouncebuf[0]);
338}
339
340static const struct spi_nor_locking_ops spi_nor_sr_locking_ops = {
341	.lock = spi_nor_sr_lock,
342	.unlock = spi_nor_sr_unlock,
343	.is_locked = spi_nor_sr_is_locked,
344};
345
346void spi_nor_init_default_locking_ops(struct spi_nor *nor)
347{
348	nor->params->locking_ops = &spi_nor_sr_locking_ops;
349}
350
351static int spi_nor_lock(struct mtd_info *mtd, loff_t ofs, uint64_t len)
352{
353	struct spi_nor *nor = mtd_to_spi_nor(mtd);
354	int ret;
355
356	ret = spi_nor_prep_and_lock(nor);
357	if (ret)
358		return ret;
359
360	ret = nor->params->locking_ops->lock(nor, ofs, len);
361
362	spi_nor_unlock_and_unprep(nor);
363	return ret;
364}
365
366static int spi_nor_unlock(struct mtd_info *mtd, loff_t ofs, uint64_t len)
367{
368	struct spi_nor *nor = mtd_to_spi_nor(mtd);
369	int ret;
370
371	ret = spi_nor_prep_and_lock(nor);
372	if (ret)
373		return ret;
374
375	ret = nor->params->locking_ops->unlock(nor, ofs, len);
376
377	spi_nor_unlock_and_unprep(nor);
378	return ret;
379}
380
381static int spi_nor_is_locked(struct mtd_info *mtd, loff_t ofs, uint64_t len)
382{
383	struct spi_nor *nor = mtd_to_spi_nor(mtd);
384	int ret;
385
386	ret = spi_nor_prep_and_lock(nor);
387	if (ret)
388		return ret;
389
390	ret = nor->params->locking_ops->is_locked(nor, ofs, len);
391
392	spi_nor_unlock_and_unprep(nor);
393	return ret;
394}
395
396/**
397 * spi_nor_try_unlock_all() - Tries to unlock the entire flash memory array.
398 * @nor:	pointer to a 'struct spi_nor'.
399 *
400 * Some SPI NOR flashes are write protected by default after a power-on reset
401 * cycle, in order to avoid inadvertent writes during power-up. Backward
402 * compatibility imposes to unlock the entire flash memory array at power-up
403 * by default.
404 *
405 * Unprotecting the entire flash array will fail for boards which are hardware
406 * write-protected. Thus any errors are ignored.
407 */
408void spi_nor_try_unlock_all(struct spi_nor *nor)
409{
410	int ret;
411
412	if (!(nor->flags & SNOR_F_HAS_LOCK))
413		return;
414
415	dev_dbg(nor->dev, "Unprotecting entire flash array\n");
416
417	ret = spi_nor_unlock(&nor->mtd, 0, nor->params->size);
418	if (ret)
419		dev_dbg(nor->dev, "Failed to unlock the entire flash memory array\n");
420}
421
422void spi_nor_set_mtd_locking_ops(struct spi_nor *nor)
423{
424	struct mtd_info *mtd = &nor->mtd;
425
426	if (!nor->params->locking_ops)
427		return;
428
429	mtd->_lock = spi_nor_lock;
430	mtd->_unlock = spi_nor_unlock;
431	mtd->_is_locked = spi_nor_is_locked;
432}
433