Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3003763pxj; Sun, 6 Jun 2021 22:48:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzNuYA9W01X/F/eTWw6mVwa7vn1Xdiui9icqP83jhU/rQCAfHY+1Uyxp7M0Llyum+eyjEqb X-Received: by 2002:a17:906:7b4f:: with SMTP id n15mr15921916ejo.220.1623044881637; Sun, 06 Jun 2021 22:48:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623044881; cv=none; d=google.com; s=arc-20160816; b=d6+K1AUttUwWTayZkJOC5bH1b5OLQofkzKEV9/GNJlpzfDGWGKJMflQY0ugp9N58t0 DsSJcke8gxAx8R+cL8OMcAqnxhYnxDk98OKahG1W3EEuNWhKekthBbuGNUWBFTqPRGa0 /7j0B+Kwu5QTFlPpPC8ftf3kvQX4drOqvd9va0GCUOKmQdoiPn5fPXa4FrrMZqq80i/S C5fdt70Y3Ogo/WzktMWGlnsHtcj0zTCisuDuTdM01FouhdFw7O/SbnPhTnP9fQmcmPMi zfcx9rKqAaAUGDu0wBlTME3kDBVJPlDEIiZopOhK1UYEKcsHtWcfJBxWnQcI+yNJoJ1/ izhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=b3YribPsLsUNBcVX/uBU0uUtAjN0H/Dr6M1HW8UYZKg=; b=BsWe5sMlSovbhsi5eWu4/KeyhqXgepqy08Vi6jpHOSyRUAzHaWEHUM/ykeNyqigeiY VnBzz4xKbwAP/iUpYxTUasbyVzg4ZjteyE8TwSfw08s/YtQ4Srcfr/s8acUbMhT7ZkMN WLBRKn8kaLbqRzn93XBgOy/jxjsgz6kUQa6AYuxdMVP1eC1f5jfFf+LcUdEq94VxSE3k 3IjvzZdyKm5CPXiiT/tlEDS5W1xGQrEXODGa24MWXWJaNBbrdqIV/ae9AzEGPivOkX7y EP18ZXjNhoxbrKrTGeKDizEqTJsbXfkyRQbAcTIJDT4sx7s/OVXUC3kj9pY+Ev/9zSS1 2jwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=Rmu6Kxld; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 7si6724707ejk.640.2021.06.06.22.47.38; Sun, 06 Jun 2021 22:48:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=Rmu6Kxld; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229545AbhFGFsV (ORCPT + 99 others); Mon, 7 Jun 2021 01:48:21 -0400 Received: from fllv0015.ext.ti.com ([198.47.19.141]:49986 "EHLO fllv0015.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229436AbhFGFsV (ORCPT ); Mon, 7 Jun 2021 01:48:21 -0400 Received: from lelv0265.itg.ti.com ([10.180.67.224]) by fllv0015.ext.ti.com (8.15.2/8.15.2) with ESMTP id 1575kBLg005472; Mon, 7 Jun 2021 00:46:11 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1623044771; bh=b3YribPsLsUNBcVX/uBU0uUtAjN0H/Dr6M1HW8UYZKg=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=Rmu6KxldSL3T4RDaoN0NsYS+xvbdRRySK3B9EF9dwUXuFSLe7Wao3hpmkudAxDvXj QIj8bhXEUlL4q6ELOVBbrrGxsMOedRR/kGI60ALuLsqfqKD3KUUmGctEipKKN4UK2N q1QIJoKWuy56VwePeBFtsXY+0lIvl3U8TGepuEOA= Received: from DFLE105.ent.ti.com (dfle105.ent.ti.com [10.64.6.26]) by lelv0265.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 1575kB1H106501 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 7 Jun 2021 00:46:11 -0500 Received: from DFLE110.ent.ti.com (10.64.6.31) by DFLE105.ent.ti.com (10.64.6.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2176.2; Mon, 7 Jun 2021 00:46:11 -0500 Received: from fllv0039.itg.ti.com (10.64.41.19) by DFLE110.ent.ti.com (10.64.6.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2176.2 via Frontend Transport; Mon, 7 Jun 2021 00:46:11 -0500 Received: from [10.250.234.148] (ileax41-snat.itg.ti.com [10.172.224.153]) by fllv0039.itg.ti.com (8.15.2/8.15.2) with ESMTP id 1575k8o2089338; Mon, 7 Jun 2021 00:46:09 -0500 Subject: Re: [PATCH v5 3/5] mtd: spi-nor: otp: return -EROFS if region is read-only To: Michael Walle , CC: , , , , References: <20210604100252.9975-1-michael@walle.cc> <20210604100252.9975-4-michael@walle.cc> From: Vignesh Raghavendra Message-ID: <1549db61-500a-e5df-9303-823b41457861@ti.com> Date: Mon, 7 Jun 2021 11:16:07 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/4/21 6:45 PM, Michael Walle wrote: > Am 2021-06-04 15:07, schrieb Tudor.Ambarus@microchip.com: >> On 6/4/21 1:02 PM, Michael Walle wrote: >>> EXTERNAL EMAIL: Do not click links or open attachments unless you >>> know the content is safe >>> >>> SPI NOR flashes will just ignore program commands if the OTP region is >>> locked. Thus, a user might not notice that the intended write didn't end >>> up in the flash. Return -EROFS to the user in this case. From what I can >>> tell, chips/cfi_cmdset_0001.c also return this error code. >>> >>> One could optimize spi_nor_mtd_otp_range_is_locked() to read the status >>> register only once and not for every OTP region, but for that we would >>> need some more invasive changes. Given that this is >>> one-time-programmable memory and the normal access mode is reading, we >>> just live with the small overhead. >>> >>> Fixes: 069089acf88b ("mtd: spi-nor: add OTP support") >>> Signed-off-by: Michael Walle >>> Reviewed-by: Pratyush Yadav >>> --- >>>  drivers/mtd/spi-nor/otp.c | 36 ++++++++++++++++++++++++++++++++++++ >>>  1 file changed, 36 insertions(+) >>> >>> diff --git a/drivers/mtd/spi-nor/otp.c b/drivers/mtd/spi-nor/otp.c >>> index 3898ed67ba1c..063f8fb68649 100644 >>> --- a/drivers/mtd/spi-nor/otp.c >>> +++ b/drivers/mtd/spi-nor/otp.c >>> @@ -249,6 +249,32 @@ static int spi_nor_mtd_otp_info(struct mtd_info >>> *mtd, size_t len, >>>         return ret; >>>  } >>> >>> +static int spi_nor_mtd_otp_range_is_locked(struct spi_nor *nor, >>> loff_t ofs, >>> +                                          size_t len) >>> +{ >>> +       const struct spi_nor_otp_ops *ops = nor->params->otp.ops; >>> +       unsigned int region; >>> +       int locked; >>> + >>> +       if (!len) >>> +               return 0; >>> + >> >> You won't need this if you put patch 4/5 before this one. With this: > > This patch will get backported to the stable kernels. Patch 4 on the > other hand does not. > I don't see why 4/5 cannot be marked for backport too as it makes 3/5 much cleaner? Regards Vignesh