Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1440056pxj; Fri, 21 May 2021 14:29:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzjWftktoQJ35qTD63SR6UhoAmgrCg1CEwWdqIm7gx4X7mLl7oj7St/PUBea0AJnCZ1xDAw X-Received: by 2002:a5d:818b:: with SMTP id u11mr961096ion.36.1621632556826; Fri, 21 May 2021 14:29:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621632556; cv=none; d=google.com; s=arc-20160816; b=TVF1XJRGFo4ed5Isfi+dR+ZkccKskl04ZXR2YIWyc+gvD/GCauu5GxZ271SNqBHVM6 PX3ubWwdyE5ou9xc262prrV8sWj2x0Li7eUPWdtuTIojxSkwKAqU/eu8x01Yd468KTYZ gMgX0cP24IpXU60AlDEdjMzrYPH5ep4m30sCP013MfpejznLkYythbxpEjiMpIImTWpr mCFnGjwXZ7R5YAApRZODworCCBan3W59E8lukpvHDbBlRDEDSOzAh8GGKMiEt6P481O/ 3BmJUIZjc7sSRhIHEdBKcJHEduQntynRPmCrlRlSHcuUWtxH7sEA1bm5R3jG4DAPCE4M HmdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=r9EOgof/4lK//WY39jfP7hj+JMl3wDeko5f+nE6V++s=; b=W0d5WM8COCXNrOlEmNUoQ2YC6Q4Q3hbs7I/LsiX+hquemxkmcg8GMboUMLFqYhePBA g1eu78mp2+AryxzUZvUIY0Vs2z0zhgEXmCUnl/N3tGfxmQiwNgtKmRWR/zy4BzkjAtqR rcgSMm1JdzgbpNbQnyEkOzb3QcmjjLDUu7b3Ua+4veIAcE/JcqostzBmTUnqbNErWI+W aDwL+7wJXJfBG02eS73bHZekphwd9zNphhcDFRC/EYaw01/35F8ORPrRkCQl2AHtUPzL aFVDah1DH3RppopmKtHrwZR0U3j9/OkYsKk/IgyMRuQurkikH4NHCKEPgiYhmoUATOK8 A0DQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=YZDF0wHB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a14si8421789ilm.103.2021.05.21.14.29.04; Fri, 21 May 2021 14:29:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@walle.cc header.s=mail2016061301 header.b=YZDF0wHB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237078AbhEUTmF (ORCPT + 99 others); Fri, 21 May 2021 15:42:05 -0400 Received: from ssl.serverraum.org ([176.9.125.105]:48847 "EHLO ssl.serverraum.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232298AbhEUTmE (ORCPT ); Fri, 21 May 2021 15:42:04 -0400 Received: from mwalle01.fritz.box (ip4d17858c.dynamic.kabel-deutschland.de [77.23.133.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ssl.serverraum.org (Postfix) with ESMTPSA id DF51322235; Fri, 21 May 2021 21:40:39 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=walle.cc; s=mail2016061301; t=1621626040; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=r9EOgof/4lK//WY39jfP7hj+JMl3wDeko5f+nE6V++s=; b=YZDF0wHBnKSf8WYJ50W7Oj+8ECwVjhfEbraaBtLMP/RGdhZSkAHuJ56EFHFHDbKkWxja9f uqvYYcMcBPgxb2AvqOdkJ5xsSwSLD5erLj8FAEnix4AhdC+MLaG11Me86u7vSTGQ5NR0Hl 7ZiUr5Wu2Pw/FZqs8qHmSV/9csROcDw= From: Michael Walle To: linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org Cc: Tudor Ambarus , Michael Walle , Pratyush Yadav , Miquel Raynal , Richard Weinberger , Vignesh Raghavendra Subject: [PATCH v4 1/4] mtd: spi-nor: otp: fix access to security registers in 4 byte mode Date: Fri, 21 May 2021 21:40:31 +0200 Message-Id: <20210521194034.15249-2-michael@walle.cc> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210521194034.15249-1-michael@walle.cc> References: <20210521194034.15249-1-michael@walle.cc> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The security registers either take a 3 byte or a 4 byte address offset, depending on the address mode of the flash. Thus just leave the nor->addr_width as is. Fixes: cad3193fe9d1 ("mtd: spi-nor: implement OTP support for Winbond and similar flashes") Signed-off-by: Michael Walle Acked-by: Pratyush Yadav --- drivers/mtd/spi-nor/otp.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/mtd/spi-nor/otp.c b/drivers/mtd/spi-nor/otp.c index 61036c716abb..91a4c510ed51 100644 --- a/drivers/mtd/spi-nor/otp.c +++ b/drivers/mtd/spi-nor/otp.c @@ -40,7 +40,6 @@ int spi_nor_otp_read_secr(struct spi_nor *nor, loff_t addr, size_t len, u8 *buf) rdesc = nor->dirmap.rdesc; nor->read_opcode = SPINOR_OP_RSECR; - nor->addr_width = 3; nor->read_dummy = 8; nor->read_proto = SNOR_PROTO_1_1_1; nor->dirmap.rdesc = NULL; @@ -84,7 +83,6 @@ int spi_nor_otp_write_secr(struct spi_nor *nor, loff_t addr, size_t len, wdesc = nor->dirmap.wdesc; nor->program_opcode = SPINOR_OP_PSECR; - nor->addr_width = 3; nor->write_proto = SNOR_PROTO_1_1_1; nor->dirmap.wdesc = NULL; -- 2.20.1