Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2988501ybl; Sun, 25 Aug 2019 06:24:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqx3WPt1UgADFbFqRw2WX0VRiY3kL1faozyWjJE9/Kc4cKs20D5Rcj6MWCEbwvOxI0Ku+MLm X-Received: by 2002:a63:3112:: with SMTP id x18mr12201842pgx.385.1566739456690; Sun, 25 Aug 2019 06:24:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566739456; cv=none; d=google.com; s=arc-20160816; b=Cf72wS9Y0Z3Y2JvFDZIH8QU6/1diIEtsEUZZkvuB8ZPEgNf7SrvcNbbKcsuziyi995 xj1BSsRux2pziWy77rSnlTvdZAGTs5jMBBwbFfcR+YhQ3hejeiD7NEi0VHpj2xc8btzY ZNDtJsvzhCbo4MqVOOAYLNtiw9tsDOso8A83+sAEMlxyz7RoLzoAVf3OpJ00sAH9Hmns iB1ofcLqNKByQZzr8XTydkxQyCpI5XiHM0gjPpc3aayO92ERoO86xDcNR4S+eYYONbIH 8YyEag+ha36txMUjfZ3mdPbj0KV+SzlmKC+CBRbw0AS3YpfUKaGE5sgDviNDVwHZO7Pr Beeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=6RXGEMj6MBgvvBQKG0glgkqRix8DVRYeaXxu3IJQOJw=; b=VsRCXOqh/sBDNrBG9ZOiMsqKhgnROAF4ZeJlPo/D0HfTA1KG0Km+Ws1wHL/RbYAwhe XXakOsGyGXM8MCD4jp1/R0VQyozorWCX7y2bObLW6pDdxSI7VKJuu6kgh1y8SJjx4lwD qqMActmeUV4R8NkRVHUrRIW9PXx1OGke7fzhfW6AE4eGutkf23U6H9W0+AkZf5vPO04J l/d3RTAytPRngbyhnfKAg2XMfm6iamWc+ib+Onmhwf80rcDAXLTJRXvdKHXOTxJyyE6o 2Ci8ZNMzjSEUxcpW5GeuIxlZWABnfoS3CE1dGVMzik1nUrd/5NfpUdfXw+bE/Eaqau2R zv3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n9si6332488pgq.240.2019.08.25.06.24.01; Sun, 25 Aug 2019 06:24:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728333AbfHYNWg (ORCPT + 99 others); Sun, 25 Aug 2019 09:22:36 -0400 Received: from bhuna.collabora.co.uk ([46.235.227.227]:38362 "EHLO bhuna.collabora.co.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726977AbfHYNWg (ORCPT ); Sun, 25 Aug 2019 09:22:36 -0400 Received: from localhost (unknown [IPv6:2a01:e0a:2c:6930:5cf4:84a1:2763:fe0d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: bbrezillon) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 1067E289C85; Sun, 25 Aug 2019 14:22:34 +0100 (BST) Date: Sun, 25 Aug 2019 15:22:31 +0200 From: Boris Brezillon To: Cc: , , , , , Subject: Re: [PATCH v2 7/7] mtd: spi-nor: Rework the disabling of block write protection Message-ID: <20190825152231.165de3d7@collabora.com> In-Reply-To: <836fcecd-766c-c7e3-74aa-06a148b146f8@microchip.com> References: <20190824120027.14452-1-tudor.ambarus@microchip.com> <20190824120027.14452-8-tudor.ambarus@microchip.com> <20190825142421.35d31a9b@collabora.com> <836fcecd-766c-c7e3-74aa-06a148b146f8@microchip.com> Organization: Collabora X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 25 Aug 2019 12:57:35 +0000 wrote: > On 08/25/2019 03:24 PM, Boris Brezillon wrote: > > On Sat, 24 Aug 2019 12:00:48 +0000 > > wrote: > > > >> From: Tudor Ambarus > >> > >> Get rid of MFR handling and implement specific manufacturer > >> default_init() fixup hooks. > >> > >> Signed-off-by: Tudor Ambarus > >> --- > >> drivers/mtd/spi-nor/spi-nor.c | 30 ++++++++++++++++++++---------- > >> 1 file changed, 20 insertions(+), 10 deletions(-) > >> > >> diff --git a/drivers/mtd/spi-nor/spi-nor.c b/drivers/mtd/spi-nor/spi-nor.c > >> index fc9e14777212..f4e9fcca619f 100644 > >> --- a/drivers/mtd/spi-nor/spi-nor.c > >> +++ b/drivers/mtd/spi-nor/spi-nor.c > >> @@ -4146,6 +4146,16 @@ static int spi_nor_parse_sfdp(struct spi_nor *nor, > >> return err; > >> } > >> > >> +static void atmel_set_default_init(struct spi_nor *nor) > >> +{ > >> + nor->params.disable_block_protection = spi_nor_clear_sr_bp; > >> +} > >> + > >> +static void intel_set_default_init(struct spi_nor *nor) > >> +{ > >> + nor->params.disable_block_protection = spi_nor_clear_sr_bp; > > > > That's weird: you can unlock blocks but locking is not > > explicitly flagged as supported (SNOR_F_HAS_LOCK is not set). Is that > > expected? > > Yes. Manufacturers have different methods for locking/unlocking blocks of > memory. Right now we support just the stm/sr locking operations. sst26vf064b for > example, uses dedicated registers for reading/writing which blocks are > protected, and not the Status Register. > > The reason for having disable_block_protection(), is that some spi-nor flashes > are write protected by default after a power-on reset cycle, in order to avoid > inadvertent writes during power-up. Backward compatibility imposes to disable > the write block protection at power-up by default, so that you can erase/write > the memory without having to send an unlock-all command. Which is bad in my > opinion and that's why I proposed https://patchwork.ozlabs.org/patch/1133278/. > > Even if sst26vf064b does not yet have the lock ops implemented (SNOR_F_HAS_LOCK > is not set), I would like to be able to interact with it, so to disable the > block protection at power-up. This flash, and others, support a Global Unlock > Command which unlocks the entire memory array in a single cycle. We can't > determine who supports this command purely by manufacturer type, and it's not > discoverable through SFDP, so we'll have to add a nor->info flag for it: > UNLOCK_GLOBAL_BLOCK (see https://patchwork.ozlabs.org/patch/1152606/). > > In conclusion, even if SNOR_F_HAS_LOCK is not set (the locking ops are not > implemented), we can still have disable_block_protection() mechanisms to unlock > the entire flash at power-up. Hm, okay, but what about those atmel/intel chips that support SR_BP-based global unlock? Shouldn't they also support SR_BP-based locking/unlocking? > > > > >> +} > >> + > >> static void macronix_set_default_init(struct spi_nor *nor) > >> { > >> nor->params.quad_enable = macronix_quad_enable; > >> @@ -4173,6 +4183,14 @@ static void spi_nor_manufacturer_init_params(struct spi_nor *nor) > >> { > >> /* Init flash parameters based on MFR */ > >> switch (JEDEC_MFR(nor->info)) { > >> + case SNOR_MFR_ATMEL: > >> + atmel_set_default_init(nor); > >> + break; > >> + > >> + case SNOR_MFR_INTEL: > >> + intel_set_default_init(nor); > >> + break; > >> + > >> case SNOR_MFR_MACRONIX: > >> macronix_set_default_init(nor); > >> break; > >> @@ -4760,18 +4778,10 @@ int spi_nor_scan(struct spi_nor *nor, const char *name, > >> if (info->flags & SPI_S3AN) > >> nor->flags |= SNOR_F_READY_XSR_RDY; > >> > >> - if (info->flags & SPI_NOR_HAS_LOCK) > >> + if (info->flags & SPI_NOR_HAS_LOCK) { > > > > If this flag implies SR_BP-based locking we should really rename it into > > SPI_NOR_HAS_SR_BP_LOCK to avoid any confusion. > > Not only SR-based locking, should be a general flag that indicates that locking > ops are supported whichever they are. I would keep the SPI_NOR_HAS_LOCK and let > the manufacturer set its locking ops using the ->default_init() hook. Okay, sounds good as long as the locking scheme is selected on a per-manufacturer basis, not a per-chip basis. > > > > >> nor->flags |= SNOR_F_HAS_LOCK; > >> - > >> - /* > >> - * Atmel, SST, Intel/Numonyx, and others serial NOR tend to power up > >> - * with the software protection bits set. > >> - */ > >> - if (JEDEC_MFR(nor->info) == SNOR_MFR_ATMEL || > >> - JEDEC_MFR(nor->info) == SNOR_MFR_INTEL || > >> - JEDEC_MFR(nor->info) == SNOR_MFR_SST || > >> - nor->info->flags & SPI_NOR_HAS_LOCK) > >> nor->params.disable_block_protection = spi_nor_clear_sr_bp; > >> + } > >> > >> /* Init flash parameters based on flash_info struct and SFDP */ > >> spi_nor_init_params(nor); > > > >