From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp14.infineon.com (smtp14.infineon.com [217.10.52.160]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0620E284B3B; Fri, 10 Apr 2026 04:39:30 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.10.52.160 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775795973; cv=none; b=A7b384noG1619VCOO+leBB0/6nAFWHz9q6fl4kaIP0jznrKYW6WO/9Di4pRlHPwgxy0ItuZlEfeqx92w9td0sh4NU+RakYw61hit5Zwm6qqkZZ5f9VTGOAN4JTEvbm2KFpQlRIYMIJII7W333FsvHXCZY2M+AeC97Rh0HdmFhPI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775795973; c=relaxed/simple; bh=sjGWn7+fy9yPuoagO7nCCICEsLk1p9rQMDNZOLFAsWc=; h=From:To:CC:Subject:Date:Message-ID:References:In-Reply-To: Content-Type:MIME-Version; b=TFM54cHrZgBauDXMQagVpmFTr5SUO6kQXy45tpgRMQvJ2bPCk6OtjHinl7X9TRpd7BVykJvwWnsp9ftTq6s0Boq72N4e9ufU03QLdD9YJnKP9VmKkOHO7cKs+bzJOwXZTCVvOtWD9mdXPAitN/S4iBafVnLN+HrR+CHELco+s7Q= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=infineon.com; spf=pass smtp.mailfrom=infineon.com; dkim=pass (1024-bit key) header.d=infineon.com header.i=@infineon.com header.b=EYK5QeLE; arc=none smtp.client-ip=217.10.52.160 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=infineon.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=infineon.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=infineon.com header.i=@infineon.com header.b="EYK5QeLE" DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=infineon.com; i=@infineon.com; q=dns/txt; s=IFXMAIL; t=1775795972; x=1807331972; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=sjGWn7+fy9yPuoagO7nCCICEsLk1p9rQMDNZOLFAsWc=; b=EYK5QeLEUxqbKqcxZMaklYopa2zQPSlW+54151ULJUIzIsJlw3XRfdNK mZpHD0uYp8sJLm3lMspSFLZuPlvy5bNIafYxPYBpiRgTyzJSBlDRjpIu1 igydb4Pk2sOQVrjoXAlDYJGaw9O5ZmYvvkjZEo2RkE8gPPwJ8I6QyaIWm 0=; X-CSE-ConnectionGUID: vCb3euiaRpmJ27qRWl8dQw== X-CSE-MsgGUID: 12F2J5gTRHOi5SmBW2dqzA== X-IronPort-AV: E=McAfee;i="6800,10657,11754"; a="125399480" X-IronPort-AV: E=Sophos;i="6.23,170,1770591600"; d="scan'208";a="125399480" X-Amp-Result: SKIPPED(no attachment in message) Received: from unknown (HELO MUCSE812.infineon.com) ([172.23.29.38]) by smtp14.infineon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Apr 2026 06:39:24 +0200 Received: from MUCSE815.infineon.com (172.23.29.41) by MUCSE812.infineon.com (172.23.29.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.37; Fri, 10 Apr 2026 06:39:22 +0200 Received: from MUCSE815.infineon.com (172.23.29.41) by MUCSE815.infineon.com (172.23.29.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.37; Fri, 10 Apr 2026 06:39:22 +0200 Received: from MUCSE815.infineon.com ([fe80::b54c:c0bd:546c:c9be]) by MUCSE815.infineon.com ([fe80::b54c:c0bd:546c:c9be%12]) with mapi id 15.02.2562.037; Fri, 10 Apr 2026 06:39:22 +0200 From: To: , , , , , CC: , , , , , Subject: RE: [PATCH v4 17/27] mtd: spi-nor: debugfs: Add locking support Thread-Topic: [PATCH v4 17/27] mtd: spi-nor: debugfs: Add locking support Thread-Index: AQHcw4RelEXg6NHRDkGFCIUYpLBcj7XXwIdw Date: Fri, 10 Apr 2026 04:39:22 +0000 Message-ID: References: <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-0-833dab5e7288@bootlin.com> <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-17-833dab5e7288@bootlin.com> In-Reply-To: <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-17-833dab5e7288@bootlin.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Precedence: bulk X-Mailing-List: linux-doc@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 PiBUaGUgaW9jdGwgb3V0cHV0IG1heSBiZSBjb3VudGVyIGludHVpdGl2ZSBpbiBzb21lIGNhc2Vz LiBBc2tpbmcgZm9yIGENCj4gImxvY2tlZCBzdGF0dXMiIG92ZXIgYSByZWdpb24gdGhhdCBpcyBv bmx5IHBhcnRpYWxseSBsb2NrZWQgd2lsbCByZXR1cm4NCj4gInVubG9ja2VkIiB3aGVyZWFzIGlu IHByYWN0aWNlIG1heWJlIHRoZSBiaWdnZXN0IHBhcnQgaXMgYWN0dWFsbHkNCj4gbG9ja2VkLg0K PiANCj4gS25vd2luZyB3aGF0IGlzIHRoZSByZWFsIHNvZnR3YXJlIGxvY2tpbmcgc3RhdGUgdGhy b3VnaCBkZWJ1Z2ZzIHdvdWxkIGJlDQo+IHZlcnkgY29udmVuaWVudCBmb3IgZGV2ZWxvcG1lbnQv ZGVidWdnaW5nIHB1cnBvc2VzLCBoZW5jZSB0aGlzIHByb3Bvc2FsDQo+IGZvciBhZGRpbmcgYW4g ZXh0cmEgYmxvY2sgYXQgdGhlIGVuZCBvZiB0aGUgZmlsZTogYSAibG9ja2VkIHNlY3RvcnMiDQo+ IGFycmF5IHdoaWNoIGxpc3RzIGV2ZXJ5IHNlY3Rpb24sIGlmIGl0IGlzIGxvY2tlZCBvciBub3Qs IHNob3dpbmcgYm90aA0KPiB0aGUgYWRkcmVzcyByYW5nZXMgYW5kIHRoZSBzaXplcyBpbiBudW1i ZXJzIG9mIGJsb2Nrcy4NCj4gDQo+IEhlcmUgaXMgYW4gZXhhbXBsZSBvZiBvdXRwdXQsIHdoYXQg aXMgYWZ0ZXIgdGhlICJzZWN0b3IgbWFwIiBpcyBuZXcuDQo+IA0KPiAkIGNhdCAvc3lzL2tlcm5l bC9kZWJ1Zy9zcGktbm9yL3NwaTAuMC9wYXJhbXMNCj4gbmFtZSAgICAgICAgICAgIChudWxsKQ0K PiBpZCAgICAgICAgICAgICAgZWYgYTAgMjAgMDAgMDAgMDANCj4gc2l6ZSAgICAgICAgICAgIDY0 LjAgTWlCDQo+IHdyaXRlIHNpemUgICAgICAxDQo+IHBhZ2Ugc2l6ZSAgICAgICAyNTYNCj4gYWRk cmVzcyBuYnl0ZXMgIDQNCj4gZmxhZ3MgICAgICAgICAgIEhBU19TUl9UQiB8IDRCX09QQ09ERVMg fCBIQVNfNEJBSVQgfCBIQVNfTE9DSyB8IEhBU18xNkJJVF9TUiB8IEhBU19TUl9UQl9CSVQ2IHwg SEFTXzRCSVRfQlAgfA0KPiBTT0ZUX1JFU0VUIHwgTk9fV1ANCj4gDQo+IG9wY29kZXMNCj4gIHJl YWQgICAgICAgICAgIDB4ZWMNCj4gICBkdW1teSBjeWNsZXMgIDYNCj4gIGVyYXNlICAgICAgICAg IDB4ZGMNCj4gIHByb2dyYW0gICAgICAgIDB4MzQNCj4gIDhEIGV4dGVuc2lvbiAgIG5vbmUNCj4g DQo+IHByb3RvY29scw0KPiAgcmVhZCAgICAgICAgICAgMVMtNFMtNFMNCj4gIHdyaXRlICAgICAg ICAgIDFTLTFTLTRTDQo+ICByZWdpc3RlciAgICAgICAxUy0xUy0xUw0KPiANCj4gZXJhc2UgY29t bWFuZHMNCj4gIDIxICg0LjAwIEtpQikgWzFdDQo+ICBkYyAoNjQuMCBLaUIpIFszXQ0KPiAgYzcg KDY0LjAgTWlCKQ0KPiANCj4gc2VjdG9yIG1hcA0KPiAgcmVnaW9uIChpbiBoZXgpICAgfCBlcmFz ZSBtYXNrIHwgb3ZlcmxhaWQNCj4gIC0tLS0tLS0tLS0tLS0tLS0tLSstLS0tLS0tLS0tLS0rLS0t LS0tLS0tDQo+ICAwMDAwMDAwMC0wM2ZmZmZmZiB8ICAgICBbICAgM10gfCBubw0KPiANCj4gbG9j a2VkIHNlY3RvcnMNCj4gIHJlZ2lvbiAoaW4gaGV4KSAgIHwgc3RhdHVzICAgfCAjYmxvY2tzDQo+ ICAtLS0tLS0tLS0tLS0tLS0tLS0rLS0tLS0tLS0tLSstLS0tLS0tLQ0KPiAgMDAwMDAwMDAtMDNm ZmZmZmYgfCB1bmxvY2tlZCB8IDEwMjQNCj4gDQo+IFNpZ25lZC1vZmYtYnk6IE1pcXVlbCBSYXlu YWwgPG1pcXVlbC5yYXluYWxAYm9vdGxpbi5jb20+DQo+IC0tLQ0KPiBIZXJlIGFyZSBiZWxvdyBt b3JlIGV4YW1wbGVzIG9mIG91dHB1dCB3aXRoIHZhcmlvdXMgc2l0dWF0aW9ucy4gVGhlIGZ1bGwN Cj4gb3V0cHV0IG9mIHRoZSAicGFyYW1zIiBjb250ZW50IGhhcyBiZWVuIG1hbnVhbGx5IHJlbW92 ZWQgdG8gb25seSBzaG93DQo+IHdoYXQgaGFzIGJlZW4gYWRkZWQgYW5kIGhvdyBpdCBiZWhhdmVz Lg0KPiANCj4gJCBmbGFzaF9sb2NrIC1sIC9kZXYvbXRkMCAweDNmMDAwMDAgMTYNCj4gJCBjYXQg L3N5cy9rZXJuZWwvZGVidWcvc3BpLW5vci9zcGkwLjAvcGFyYW1zDQo+IGxvY2tlZCBzZWN0b3Jz DQo+ICByZWdpb24gKGluIGhleCkgICB8IHN0YXR1cyAgIHwgI2Jsb2Nrcw0KPiAgLS0tLS0tLS0t LS0tLS0tLS0tKy0tLS0tLS0tLS0rLS0tLS0tLS0NCj4gIDAwMDAwMDAwLTAzZWZmZmZmIHwgdW5s b2NrZWQgfCAxMDA4DQo+ICAwM2YwMDAwMC0wM2ZmZmZmZiB8ICAgbG9ja2VkIHwgMTYNCj4gJA0K PiAkIGZsYXNoX2xvY2sgLXUgL2Rldi9tdGQwIDB4M2YwMDAwMCA4DQo+ICQgY2F0IC9zeXMva2Vy bmVsL2RlYnVnL3NwaS1ub3Ivc3BpMC4wL3BhcmFtcw0KPiBsb2NrZWQgc2VjdG9ycw0KPiAgcmVn aW9uIChpbiBoZXgpICAgfCBzdGF0dXMgICB8ICNibG9ja3MNCj4gIC0tLS0tLS0tLS0tLS0tLS0t LSstLS0tLS0tLS0tKy0tLS0tLS0tDQo+ICAwMDAwMDAwMC0wM2Y3ZmZmZiB8IHVubG9ja2VkIHwg MTAxNg0KPiAgMDNmODAwMDAtMDNmZmZmZmYgfCAgIGxvY2tlZCB8IDgNCj4gJA0KPiAkIGZsYXNo X2xvY2sgLXUgL2Rldi9tdGQwDQo+ICQgY2F0IC9zeXMva2VybmVsL2RlYnVnL3NwaS1ub3Ivc3Bp MC4wL3BhcmFtcw0KPiBsb2NrZWQgc2VjdG9ycw0KPiAgcmVnaW9uIChpbiBoZXgpICAgfCBzdGF0 dXMgICB8ICNibG9ja3MNCj4gIC0tLS0tLS0tLS0tLS0tLS0tLSstLS0tLS0tLS0tKy0tLS0tLS0t DQo+ICAwMDAwMDAwMC0wM2ZmZmZmZiB8IHVubG9ja2VkIHwgMTAyNA0KPiAkDQo+ICQgZmxhc2hf bG9jayAtbCAvZGV2L210ZDANCj4gJCBjYXQgL3N5cy9rZXJuZWwvZGVidWcvc3BpLW5vci9zcGkw LjAvcGFyYW1zDQo+IGxvY2tlZCBzZWN0b3JzDQo+ICByZWdpb24gKGluIGhleCkgICB8IHN0YXR1 cyAgIHwgI2Jsb2Nrcw0KPiAgLS0tLS0tLS0tLS0tLS0tLS0tKy0tLS0tLS0tLS0rLS0tLS0tLS0N Cj4gIDAwMDAwMDAwLTAzZmZmZmZmIHwgICBsb2NrZWQgfCAxMDI0DQo+ICQNCj4gJCBmbGFzaF9s b2NrIC11IC9kZXYvbXRkMCAweDIwMDAwIDEwMjINCj4gJCBjYXQgL3N5cy9rZXJuZWwvZGVidWcv c3BpLW5vci9zcGkwLjAvcGFyYW1zDQo+IGxvY2tlZCBzZWN0b3JzDQo+ICByZWdpb24gKGluIGhl eCkgICB8IHN0YXR1cyAgIHwgI2Jsb2Nrcw0KPiAgLS0tLS0tLS0tLS0tLS0tLS0tKy0tLS0tLS0t LS0rLS0tLS0tLS0NCj4gIDAwMDAwMDAwLTAwMDFmZmZmIHwgICBsb2NrZWQgfCAyDQo+ICAwMDAy MDAwMC0wM2ZmZmZmZiB8IHVubG9ja2VkIHwgMTAyMg0KPiAtLS0NCj4gIGRyaXZlcnMvbXRkL3Nw aS1ub3IvY29yZS5oICAgIHwgIDUgKysrKysNCj4gIGRyaXZlcnMvbXRkL3NwaS1ub3IvZGVidWdm cy5jIHwgMjcgKysrKysrKysrKysrKysrKysrKysrKysrKysrDQo+ICBkcml2ZXJzL210ZC9zcGkt bm9yL3N3cC5jICAgICB8IDE2ICsrKysrKysrKysrKy0tLS0NCj4gIDMgZmlsZXMgY2hhbmdlZCwg NDQgaW5zZXJ0aW9ucygrKSwgNCBkZWxldGlvbnMoLSkNCj4gDQo+IGRpZmYgLS1naXQgYS9kcml2 ZXJzL210ZC9zcGktbm9yL2NvcmUuaCBiL2RyaXZlcnMvbXRkL3NwaS1ub3IvY29yZS5oDQo+IGlu ZGV4IDA5MWViOTM0YWJlNC4uODcxN2EwYWQ5MGYwIDEwMDY0NA0KPiAtLS0gYS9kcml2ZXJzL210 ZC9zcGktbm9yL2NvcmUuaA0KPiArKysgYi9kcml2ZXJzL210ZC9zcGktbm9yL2NvcmUuaA0KPiBA QCAtNjczLDYgKzY3Myw3IEBAIGludCBzcGlfbm9yX3Bvc3RfYmZwdF9maXh1cHMoc3RydWN0IHNw aV9ub3IgKm5vciwNCj4gICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjb25zdCBzdHJ1Y3Qg c2ZkcF9iZnB0ICpiZnB0KTsNCj4gDQo+ICB2b2lkIHNwaV9ub3JfaW5pdF9kZWZhdWx0X2xvY2tp bmdfb3BzKHN0cnVjdCBzcGlfbm9yICpub3IpOw0KPiArYm9vbCBzcGlfbm9yX2hhc19kZWZhdWx0 X2xvY2tpbmdfb3BzKHN0cnVjdCBzcGlfbm9yICpub3IpOw0KPiAgdm9pZCBzcGlfbm9yX3RyeV91 bmxvY2tfYWxsKHN0cnVjdCBzcGlfbm9yICpub3IpOw0KPiAgdm9pZCBzcGlfbm9yX2NhY2hlX3Ny X2xvY2tfYml0cyhzdHJ1Y3Qgc3BpX25vciAqbm9yLCB1OCAqc3IpOw0KPiAgdm9pZCBzcGlfbm9y X3NldF9tdGRfbG9ja2luZ19vcHMoc3RydWN0IHNwaV9ub3IgKm5vcik7DQo+IEBAIC03MDcsNiAr NzA4LDEwIEBAIHN0YXRpYyBpbmxpbmUgYm9vbCBzcGlfbm9yX25lZWRzX3NmZHAoY29uc3Qgc3Ry dWN0IHNwaV9ub3IgKm5vcikNCj4gICAgICAgICByZXR1cm4gIW5vci0+aW5mby0+c2l6ZTsNCj4g IH0NCj4gDQo+ICt1NjQgc3BpX25vcl9nZXRfbWluX3Byb3RfbGVuZ3RoX3NyKHN0cnVjdCBzcGlf bm9yICpub3IpOw0KPiArdm9pZCBzcGlfbm9yX2dldF9sb2NrZWRfcmFuZ2Vfc3Ioc3RydWN0IHNw aV9ub3IgKm5vciwgY29uc3QgdTggKnNyLCBsb2ZmX3QgKm9mcywgdTY0ICpsZW4pOw0KPiArYm9v bCBzcGlfbm9yX2lzX2xvY2tlZF9zcihzdHJ1Y3Qgc3BpX25vciAqbm9yLCBsb2ZmX3Qgb2ZzLCB1 NjQgbGVuLCBjb25zdCB1OCAqc3IpOw0KPiArDQo+ICAjaWZkZWYgQ09ORklHX0RFQlVHX0ZTDQo+ ICB2b2lkIHNwaV9ub3JfZGVidWdmc19yZWdpc3RlcihzdHJ1Y3Qgc3BpX25vciAqbm9yKTsNCj4g IHZvaWQgc3BpX25vcl9kZWJ1Z2ZzX3NodXRkb3duKHZvaWQpOw0KPiBkaWZmIC0tZ2l0IGEvZHJp dmVycy9tdGQvc3BpLW5vci9kZWJ1Z2ZzLmMgYi9kcml2ZXJzL210ZC9zcGktbm9yL2RlYnVnZnMu Yw0KPiBpbmRleCBkMDE5MWViOWY4NzkuLjI5OGNlM2Q5ZTkwNSAxMDA2NDQNCj4gLS0tIGEvZHJp dmVycy9tdGQvc3BpLW5vci9kZWJ1Z2ZzLmMNCj4gKysrIGIvZHJpdmVycy9tdGQvc3BpLW5vci9k ZWJ1Z2ZzLmMNCj4gQEAgLTEsNiArMSw3IEBADQo+ICAvLyBTUERYLUxpY2Vuc2UtSWRlbnRpZmll cjogR1BMLTIuMA0KPiANCj4gICNpbmNsdWRlIDxsaW51eC9kZWJ1Z2ZzLmg+DQo+ICsjaW5jbHVk ZSA8bGludXgvbWF0aDY0Lmg+DQo+ICAjaW5jbHVkZSA8bGludXgvbXRkL3NwaS1ub3IuaD4NCj4g ICNpbmNsdWRlIDxsaW51eC9zcGkvc3BpLmg+DQo+ICAjaW5jbHVkZSA8bGludXgvc3BpL3NwaS1t ZW0uaD4NCj4gQEAgLTc3LDEwICs3OCwxMiBAQCBzdGF0aWMgdm9pZCBzcGlfbm9yX3ByaW50X2Zs YWdzKHN0cnVjdCBzZXFfZmlsZSAqcywgdW5zaWduZWQgbG9uZyBmbGFncywNCj4gIHN0YXRpYyBp bnQgc3BpX25vcl9wYXJhbXNfc2hvdyhzdHJ1Y3Qgc2VxX2ZpbGUgKnMsIHZvaWQgKmRhdGEpDQo+ ICB7DQo+ICAgICAgICAgc3RydWN0IHNwaV9ub3IgKm5vciA9IHMtPnByaXZhdGU7DQo+ICsgICAg ICAgdW5zaWduZWQgaW50IG1pbl9wcm90X2xlbiA9IHNwaV9ub3JfZ2V0X21pbl9wcm90X2xlbmd0 aF9zcihub3IpOw0KPiAgICAgICAgIHN0cnVjdCBzcGlfbm9yX2ZsYXNoX3BhcmFtZXRlciAqcGFy YW1zID0gbm9yLT5wYXJhbXM7DQo+ICAgICAgICAgc3RydWN0IHNwaV9ub3JfZXJhc2VfbWFwICpl cmFzZV9tYXAgPSAmcGFyYW1zLT5lcmFzZV9tYXA7DQo+ICAgICAgICAgc3RydWN0IHNwaV9ub3Jf ZXJhc2VfcmVnaW9uICpyZWdpb24gPSBlcmFzZV9tYXAtPnJlZ2lvbnM7DQo+ICAgICAgICAgY29u c3Qgc3RydWN0IGZsYXNoX2luZm8gKmluZm8gPSBub3ItPmluZm87DQo+ICsgICAgICAgbG9mZl90 IGxvY2tfc3RhcnQsIGxvY2tfbGVuZ3RoOw0KPiAgICAgICAgIGNoYXIgYnVmWzE2XSwgKnN0cjsN Cj4gICAgICAgICB1bnNpZ25lZCBpbnQgaTsNCj4gDQo+IEBAIC0xNTksNiArMTYyLDMwIEBAIHN0 YXRpYyBpbnQgc3BpX25vcl9wYXJhbXNfc2hvdyhzdHJ1Y3Qgc2VxX2ZpbGUgKnMsIHZvaWQgKmRh dGEpDQo+ICAgICAgICAgICAgICAgICAgICAgICAgICAgIHJlZ2lvbltpXS5vdmVybGFpZCA/ICJ5 ZXMiIDogIm5vIik7DQo+ICAgICAgICAgfQ0KPiANCj4gKyAgICAgICBpZiAoIXNwaV9ub3JfaGFz X2RlZmF1bHRfbG9ja2luZ19vcHMobm9yKSkNCj4gKyAgICAgICAgICAgICAgIHJldHVybiAwOw0K PiArDQo+ICsgICAgICAgc2VxX3B1dHMocywgIlxubG9ja2VkIHNlY3RvcnNcbiIpOw0KPiArICAg ICAgIHNlcV9wdXRzKHMsICIgcmVnaW9uIChpbiBoZXgpICAgfCBzdGF0dXMgICB8ICNibG9ja3Nc biIpOw0KPiArICAgICAgIHNlcV9wdXRzKHMsICIgLS0tLS0tLS0tLS0tLS0tLS0tKy0tLS0tLS0t LS0rLS0tLS0tLS1cbiIpOw0KPiArDQo+ICsgICAgICAgc3BpX25vcl9nZXRfbG9ja2VkX3Jhbmdl X3NyKG5vciwgbm9yLT5kZnNfc3JfY2FjaGUsICZsb2NrX3N0YXJ0LCAmbG9ja19sZW5ndGgpOw0K PiArICAgICAgIGlmICghbG9ja19sZW5ndGggfHwgbG9ja19sZW5ndGggPT0gcGFyYW1zLT5zaXpl KSB7DQo+ICsgICAgICAgICAgICAgICBzZXFfcHJpbnRmKHMsICIgJTA4bGx4LSUwOGxseCB8ICVz IHwgJWxsdVxuIiwgMFVMTCwgcGFyYW1zLT5zaXplIC0gMSwNCj4gKyAgICAgICAgICAgICAgICAg ICAgICAgICAgbG9ja19sZW5ndGggPyAiICBsb2NrZWQiIDogInVubG9ja2VkIiwNCj4gKyAgICAg ICAgICAgICAgICAgICAgICAgICAgZGl2X3U2NChwYXJhbXMtPnNpemUsIG1pbl9wcm90X2xlbikp Ow0KPiArICAgICAgIH0gZWxzZSBpZiAoIWxvY2tfc3RhcnQpIHsNCj4gKyAgICAgICAgICAgICAg IHNlcV9wcmludGYocywgIiAlMDhsbHgtJTA4bGx4IHwgJXMgfCAlbGx1XG4iLCAwVUxMLCBsb2Nr X2xlbmd0aCAtIDEsDQo+ICsgICAgICAgICAgICAgICAgICAgICAgICAgICIgIGxvY2tlZCIsIGRp dl91NjQobG9ja19sZW5ndGgsIG1pbl9wcm90X2xlbikpOw0KPiArICAgICAgICAgICAgICAgc2Vx X3ByaW50ZihzLCAiICUwOGxseC0lMDhsbHggfCAlcyB8ICVsbHVcbiIsIGxvY2tfbGVuZ3RoLCBw YXJhbXMtPnNpemUgLSAxLA0KPiArICAgICAgICAgICAgICAgICAgICAgICAgICAidW5sb2NrZWQi LCBkaXZfdTY0KHBhcmFtcy0+c2l6ZSAtIGxvY2tfbGVuZ3RoLCBtaW5fcHJvdF9sZW4pKTsNCj4g KyAgICAgICB9IGVsc2Ugew0KPiArICAgICAgICAgICAgICAgc2VxX3ByaW50ZihzLCAiICUwOGxs eC0lMDhsbHggfCAlcyB8ICVsbHVcbiIsIDBVTEwsIGxvY2tfc3RhcnQgLSAxLA0KPiArICAgICAg ICAgICAgICAgICAgICAgICAgICAidW5sb2NrZWQiLCBkaXZfdTY0KGxvY2tfc3RhcnQsIG1pbl9w cm90X2xlbikpOw0KPiArICAgICAgICAgICAgICAgc2VxX3ByaW50ZihzLCAiICUwOGxseC0lMDhs bHggfCAlcyB8ICVsbHVcbiIsIGxvY2tfc3RhcnQsIHBhcmFtcy0+c2l6ZSAtIDEsDQo+ICsgICAg ICAgICAgICAgICAgICAgICAgICAgICIgIGxvY2tlZCIsIGRpdl91NjQobG9ja19sZW5ndGgsIG1p bl9wcm90X2xlbikpOw0KPiArICAgICAgIH0NCj4gKw0KPiAgICAgICAgIHJldHVybiAwOw0KPiAg fQ0KPiAgREVGSU5FX1NIT1dfQVRUUklCVVRFKHNwaV9ub3JfcGFyYW1zKTsNCj4gZGlmZiAtLWdp dCBhL2RyaXZlcnMvbXRkL3NwaS1ub3Ivc3dwLmMgYi9kcml2ZXJzL210ZC9zcGktbm9yL3N3cC5j DQo+IGluZGV4IDdhNmMyYjhlZjkyMS4uZDc1ZWQ4M2ViNzg3IDEwMDY0NA0KPiAtLS0gYS9kcml2 ZXJzL210ZC9zcGktbm9yL3N3cC5jDQo+ICsrKyBiL2RyaXZlcnMvbXRkL3NwaS1ub3Ivc3dwLmMN Cj4gQEAgLTMyLDcgKzMyLDcgQEAgc3RhdGljIHU4IHNwaV9ub3JfZ2V0X3NyX3RiX21hc2soc3Ry dWN0IHNwaV9ub3IgKm5vcikNCj4gICAgICAgICAgICAgICAgIHJldHVybiBTUl9UQl9CSVQ1Ow0K PiAgfQ0KPiANCj4gLXN0YXRpYyB1NjQgc3BpX25vcl9nZXRfbWluX3Byb3RfbGVuZ3RoX3NyKHN0 cnVjdCBzcGlfbm9yICpub3IpDQo+ICt1NjQgc3BpX25vcl9nZXRfbWluX3Byb3RfbGVuZ3RoX3Ny KHN0cnVjdCBzcGlfbm9yICpub3IpDQo+ICB7DQo+ICAgICAgICAgdW5zaWduZWQgaW50IGJwX3Ns b3RzLCBicF9zbG90c19uZWVkZWQ7DQo+ICAgICAgICAgLyoNCj4gQEAgLTUzLDggKzUzLDggQEAg c3RhdGljIHU2NCBzcGlfbm9yX2dldF9taW5fcHJvdF9sZW5ndGhfc3Ioc3RydWN0IHNwaV9ub3Ig Km5vcikNCj4gICAgICAgICAgICAgICAgIHJldHVybiBzZWN0b3Jfc2l6ZTsNCj4gIH0NCj4gDQo+ IC1zdGF0aWMgdm9pZCBzcGlfbm9yX2dldF9sb2NrZWRfcmFuZ2Vfc3Ioc3RydWN0IHNwaV9ub3Ig Km5vciwgY29uc3QgdTggKnNyLCBsb2ZmX3QgKm9mcywNCj4gLSAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAgICAgIHU2NCAqbGVuKQ0KPiArdm9pZCBzcGlfbm9yX2dldF9sb2NrZWRf cmFuZ2Vfc3Ioc3RydWN0IHNwaV9ub3IgKm5vciwgY29uc3QgdTggKnNyLCBsb2ZmX3QgKm9mcywN Cj4gKyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdTY0ICpsZW4pDQo+ICB7DQo+ICAg ICAgICAgdTY0IG1pbl9wcm90X2xlbjsNCj4gICAgICAgICB1OCBicF9tYXNrID0gc3BpX25vcl9n ZXRfc3JfYnBfbWFzayhub3IpOw0KPiBAQCAtMTEyLDcgKzExMiw3IEBAIHN0YXRpYyBib29sIHNw aV9ub3JfY2hlY2tfbG9ja19zdGF0dXNfc3Ioc3RydWN0IHNwaV9ub3IgKm5vciwgbG9mZl90IG9m cywNCj4gICAgICAgICAgICAgICAgIHJldHVybiAob2ZzID49IGxvY2tfb2Zmc19tYXgpIHx8IChv ZmZzX21heCA8PSBsb2NrX29mZnMpOw0KPiAgfQ0KPiANCj4gLXN0YXRpYyBib29sIHNwaV9ub3Jf aXNfbG9ja2VkX3NyKHN0cnVjdCBzcGlfbm9yICpub3IsIGxvZmZfdCBvZnMsIHU2NCBsZW4sIGNv bnN0IHU4ICpzcikNCj4gK2Jvb2wgc3BpX25vcl9pc19sb2NrZWRfc3Ioc3RydWN0IHNwaV9ub3Ig Km5vciwgbG9mZl90IG9mcywgdTY0IGxlbiwgY29uc3QgdTggKnNyKQ0KPiAgew0KPiAgICAgICAg IHJldHVybiBzcGlfbm9yX2NoZWNrX2xvY2tfc3RhdHVzX3NyKG5vciwgb2ZzLCBsZW4sIHNyLCB0 cnVlKTsNCj4gIH0NCj4gQEAgLTQxMCw2ICs0MTAsOSBAQCBzdGF0aWMgaW50IHNwaV9ub3Jfc3Jf aXNfbG9ja2VkKHN0cnVjdCBzcGlfbm9yICpub3IsIGxvZmZfdCBvZnMsIHU2NCBsZW4pDQo+ICAg KiAtaXNfbG9ja2VkKCk6IENoZWNrcyBpZiB0aGUgcmVnaW9uIGlzICpmdWxseSogbG9ja2VkLCBy ZXR1cm5zIGZhbHNlIG90aGVyd2lzZS4NCj4gICAqICAgICAgICAgICAgICAgVGhpcyBmZWViYWNr IG1heSBiZSBtaXNsZWFkaW5nIGJlY2F1c2UgdXNlcnMgbWF5IGdldCBhbiAidW5sb2NrZWQiDQo+ ICAgKiAgICAgICAgICAgICAgIHN0YXR1cyBldmVuIHRob3VnaCBhIHN1YnBhcnQgb2YgdGhlIHJl Z2lvbiBpcyBlZmZlY3RpdmVseSBsb2NrZWQuDQo+ICsgKg0KPiArICogSWYgaW4gZG91YnQgZHVy aW5nIGRldmVsb3BtZW50LCBjaGVjay1vdXQgdGhlIGRlYnVnZnMgb3V0cHV0IHdoaWNoIHRyaWVz IHRvDQo+ICsgKiBiZSBtb3JlIHVzZXIgZnJpZW5kbHkuDQo+ICAgKi8NCj4gIHN0YXRpYyBjb25z dCBzdHJ1Y3Qgc3BpX25vcl9sb2NraW5nX29wcyBzcGlfbm9yX3NyX2xvY2tpbmdfb3BzID0gew0K PiAgICAgICAgIC5sb2NrID0gc3BpX25vcl9zcl9sb2NrLA0KPiBAQCAtNDIyLDYgKzQyNSwxMSBA QCB2b2lkIHNwaV9ub3JfaW5pdF9kZWZhdWx0X2xvY2tpbmdfb3BzKHN0cnVjdCBzcGlfbm9yICpu b3IpDQo+ICAgICAgICAgbm9yLT5wYXJhbXMtPmxvY2tpbmdfb3BzID0gJnNwaV9ub3Jfc3JfbG9j a2luZ19vcHM7DQo+ICB9DQo+IA0KPiArYm9vbCBzcGlfbm9yX2hhc19kZWZhdWx0X2xvY2tpbmdf b3BzKHN0cnVjdCBzcGlfbm9yICpub3IpDQo+ICt7DQo+ICsgICAgICAgcmV0dXJuIG5vci0+cGFy YW1zLT5sb2NraW5nX29wcyA9PSAmc3BpX25vcl9zcl9sb2NraW5nX29wczsNCj4gK30NCj4gKw0K PiAgc3RhdGljIGludCBzcGlfbm9yX2xvY2soc3RydWN0IG10ZF9pbmZvICptdGQsIGxvZmZfdCBv ZnMsIHU2NCBsZW4pDQo+ICB7DQo+ICAgICAgICAgc3RydWN0IHNwaV9ub3IgKm5vciA9IG10ZF90 b19zcGlfbm9yKG10ZCk7DQo+IA0KPiAtLQ0KPiAyLjUzLjANCg0KUmV2aWV3ZWQtYnk6IFRha2Fo aXJvIEt1d2FubyA8dGFrYWhpcm8ua3V3YW5vQGluZmluZW9uLmNvbT4NCg0KVGhhbmtzLA0KVGFr YWhpcm8NCg0K From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 30777F36BAA for ; Fri, 10 Apr 2026 04:39:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:In-Reply-To:References: Message-ID:Date:Subject:CC:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=p4hz1hwORRHZxPnPHTXoNOSfQii12a1K5E9oYmdEhSI=; b=xp3PJpAIeUUCd/ 1k5/JCGBiG6CRFzHJ9tY2GHykjUvp4dpe9in5vOKeMXh5JF6W7D3bobvb9IC7QlJZmvPxuZL0BvNe RCjz12USfd7fF1T1D7imEjUtBa8HA/WPrA5Eyt0Wj+Q/B8ls9Jtv4dTyY5MwcD/qbS6v6VZb5PLaV W3YFyglPcZoo/EoCRxtY5oepzAx4Ar8nd6+WF2PvWXKsT5IH8V2EXfBbiEH3dqbCSn9O+h3rMUtQK I9ACEz1HX1m7zijm/+1kNuNYnl/rdXkBn0/4WBOztgnDNuTPpOIAAKWgV8bVv/3eVHHtOuUjLj7Vr 4/1sCGRaSBc8/iuHEPoQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1wB3eV-0000000Bb37-3nyZ; Fri, 10 Apr 2026 04:39:31 +0000 Received: from smtp14.infineon.com ([2a00:18f0:1e00:4::6]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1wB3eR-0000000Bb2T-3xHH for linux-mtd@lists.infradead.org; Fri, 10 Apr 2026 04:39:29 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=infineon.com; i=@infineon.com; q=dns/txt; s=IFXMAIL; t=1775795968; x=1807331968; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=sjGWn7+fy9yPuoagO7nCCICEsLk1p9rQMDNZOLFAsWc=; b=DV0g6W4itW68p3b1yAbwzBKHTV2NamOwMrZ1UZp74Oiffn9Owh8S+ZuB pBecWczJzg4gxPfbk9aWPdxDFfTsLlLfqs8q7tuXghIGv6SwKFLdbZ1Ly kuCdJDbQAcPdVlJqUViQtPNo/Z9HRcVv3EKUsWvtlDSSh9fM/2W1jQ9QQ A=; X-CSE-ConnectionGUID: vCb3euiaRpmJ27qRWl8dQw== X-CSE-MsgGUID: 12F2J5gTRHOi5SmBW2dqzA== X-IronPort-AV: E=McAfee;i="6800,10657,11754"; a="125399480" X-IronPort-AV: E=Sophos;i="6.23,170,1770591600"; d="scan'208";a="125399480" X-Amp-Result: SKIPPED(no attachment in message) Received: from unknown (HELO MUCSE812.infineon.com) ([172.23.29.38]) by smtp14.infineon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Apr 2026 06:39:24 +0200 Received: from MUCSE815.infineon.com (172.23.29.41) by MUCSE812.infineon.com (172.23.29.38) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.37; Fri, 10 Apr 2026 06:39:22 +0200 Received: from MUCSE815.infineon.com (172.23.29.41) by MUCSE815.infineon.com (172.23.29.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.37; Fri, 10 Apr 2026 06:39:22 +0200 Received: from MUCSE815.infineon.com ([fe80::b54c:c0bd:546c:c9be]) by MUCSE815.infineon.com ([fe80::b54c:c0bd:546c:c9be%12]) with mapi id 15.02.2562.037; Fri, 10 Apr 2026 06:39:22 +0200 From: To: , , , , , CC: , , , , , Subject: RE: [PATCH v4 17/27] mtd: spi-nor: debugfs: Add locking support Thread-Topic: [PATCH v4 17/27] mtd: spi-nor: debugfs: Add locking support Thread-Index: AQHcw4RelEXg6NHRDkGFCIUYpLBcj7XXwIdw Date: Fri, 10 Apr 2026 04:39:22 +0000 Message-ID: References: <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-0-833dab5e7288@bootlin.com> <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-17-833dab5e7288@bootlin.com> In-Reply-To: <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-17-833dab5e7288@bootlin.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.161.6.196] MIME-Version: 1.0 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20260409_213928_453781_B2AB543B X-CRM114-Status: GOOD ( 30.36 ) X-BeenThere: linux-mtd@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Linux MTD discussion mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-mtd" Errors-To: linux-mtd-bounces+linux-mtd=archiver.kernel.org@lists.infradead.org > The ioctl output may be counter intuitive in some cases. Asking for a > "locked status" over a region that is only partially locked will return > "unlocked" whereas in practice maybe the biggest part is actually > locked. > > Knowing what is the real software locking state through debugfs would be > very convenient for development/debugging purposes, hence this proposal > for adding an extra block at the end of the file: a "locked sectors" > array which lists every section, if it is locked or not, showing both > the address ranges and the sizes in numbers of blocks. > > Here is an example of output, what is after the "sector map" is new. > > $ cat /sys/kernel/debug/spi-nor/spi0.0/params > name (null) > id ef a0 20 00 00 00 > size 64.0 MiB > write size 1 > page size 256 > address nbytes 4 > flags HAS_SR_TB | 4B_OPCODES | HAS_4BAIT | HAS_LOCK | HAS_16BIT_SR | HAS_SR_TB_BIT6 | HAS_4BIT_BP | > SOFT_RESET | NO_WP > > opcodes > read 0xec > dummy cycles 6 > erase 0xdc > program 0x34 > 8D extension none > > protocols > read 1S-4S-4S > write 1S-1S-4S > register 1S-1S-1S > > erase commands > 21 (4.00 KiB) [1] > dc (64.0 KiB) [3] > c7 (64.0 MiB) > > sector map > region (in hex) | erase mask | overlaid > ------------------+------------+--------- > 00000000-03ffffff | [ 3] | no > > locked sectors > region (in hex) | status | #blocks > ------------------+----------+-------- > 00000000-03ffffff | unlocked | 1024 > > Signed-off-by: Miquel Raynal > --- > Here are below more examples of output with various situations. The full > output of the "params" content has been manually removed to only show > what has been added and how it behaves. > > $ flash_lock -l /dev/mtd0 0x3f00000 16 > $ cat /sys/kernel/debug/spi-nor/spi0.0/params > locked sectors > region (in hex) | status | #blocks > ------------------+----------+-------- > 00000000-03efffff | unlocked | 1008 > 03f00000-03ffffff | locked | 16 > $ > $ flash_lock -u /dev/mtd0 0x3f00000 8 > $ cat /sys/kernel/debug/spi-nor/spi0.0/params > locked sectors > region (in hex) | status | #blocks > ------------------+----------+-------- > 00000000-03f7ffff | unlocked | 1016 > 03f80000-03ffffff | locked | 8 > $ > $ flash_lock -u /dev/mtd0 > $ cat /sys/kernel/debug/spi-nor/spi0.0/params > locked sectors > region (in hex) | status | #blocks > ------------------+----------+-------- > 00000000-03ffffff | unlocked | 1024 > $ > $ flash_lock -l /dev/mtd0 > $ cat /sys/kernel/debug/spi-nor/spi0.0/params > locked sectors > region (in hex) | status | #blocks > ------------------+----------+-------- > 00000000-03ffffff | locked | 1024 > $ > $ flash_lock -u /dev/mtd0 0x20000 1022 > $ cat /sys/kernel/debug/spi-nor/spi0.0/params > locked sectors > region (in hex) | status | #blocks > ------------------+----------+-------- > 00000000-0001ffff | locked | 2 > 00020000-03ffffff | unlocked | 1022 > --- > drivers/mtd/spi-nor/core.h | 5 +++++ > drivers/mtd/spi-nor/debugfs.c | 27 +++++++++++++++++++++++++++ > drivers/mtd/spi-nor/swp.c | 16 ++++++++++++---- > 3 files changed, 44 insertions(+), 4 deletions(-) > > diff --git a/drivers/mtd/spi-nor/core.h b/drivers/mtd/spi-nor/core.h > index 091eb934abe4..8717a0ad90f0 100644 > --- a/drivers/mtd/spi-nor/core.h > +++ b/drivers/mtd/spi-nor/core.h > @@ -673,6 +673,7 @@ int spi_nor_post_bfpt_fixups(struct spi_nor *nor, > const struct sfdp_bfpt *bfpt); > > void spi_nor_init_default_locking_ops(struct spi_nor *nor); > +bool spi_nor_has_default_locking_ops(struct spi_nor *nor); > void spi_nor_try_unlock_all(struct spi_nor *nor); > void spi_nor_cache_sr_lock_bits(struct spi_nor *nor, u8 *sr); > void spi_nor_set_mtd_locking_ops(struct spi_nor *nor); > @@ -707,6 +708,10 @@ static inline bool spi_nor_needs_sfdp(const struct spi_nor *nor) > return !nor->info->size; > } > > +u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor); > +void spi_nor_get_locked_range_sr(struct spi_nor *nor, const u8 *sr, loff_t *ofs, u64 *len); > +bool spi_nor_is_locked_sr(struct spi_nor *nor, loff_t ofs, u64 len, const u8 *sr); > + > #ifdef CONFIG_DEBUG_FS > void spi_nor_debugfs_register(struct spi_nor *nor); > void spi_nor_debugfs_shutdown(void); > diff --git a/drivers/mtd/spi-nor/debugfs.c b/drivers/mtd/spi-nor/debugfs.c > index d0191eb9f879..298ce3d9e905 100644 > --- a/drivers/mtd/spi-nor/debugfs.c > +++ b/drivers/mtd/spi-nor/debugfs.c > @@ -1,6 +1,7 @@ > // SPDX-License-Identifier: GPL-2.0 > > #include > +#include > #include > #include > #include > @@ -77,10 +78,12 @@ static void spi_nor_print_flags(struct seq_file *s, unsigned long flags, > static int spi_nor_params_show(struct seq_file *s, void *data) > { > struct spi_nor *nor = s->private; > + unsigned int min_prot_len = spi_nor_get_min_prot_length_sr(nor); > struct spi_nor_flash_parameter *params = nor->params; > struct spi_nor_erase_map *erase_map = ¶ms->erase_map; > struct spi_nor_erase_region *region = erase_map->regions; > const struct flash_info *info = nor->info; > + loff_t lock_start, lock_length; > char buf[16], *str; > unsigned int i; > > @@ -159,6 +162,30 @@ static int spi_nor_params_show(struct seq_file *s, void *data) > region[i].overlaid ? "yes" : "no"); > } > > + if (!spi_nor_has_default_locking_ops(nor)) > + return 0; > + > + seq_puts(s, "\nlocked sectors\n"); > + seq_puts(s, " region (in hex) | status | #blocks\n"); > + seq_puts(s, " ------------------+----------+--------\n"); > + > + spi_nor_get_locked_range_sr(nor, nor->dfs_sr_cache, &lock_start, &lock_length); > + if (!lock_length || lock_length == params->size) { > + seq_printf(s, " %08llx-%08llx | %s | %llu\n", 0ULL, params->size - 1, > + lock_length ? " locked" : "unlocked", > + div_u64(params->size, min_prot_len)); > + } else if (!lock_start) { > + seq_printf(s, " %08llx-%08llx | %s | %llu\n", 0ULL, lock_length - 1, > + " locked", div_u64(lock_length, min_prot_len)); > + seq_printf(s, " %08llx-%08llx | %s | %llu\n", lock_length, params->size - 1, > + "unlocked", div_u64(params->size - lock_length, min_prot_len)); > + } else { > + seq_printf(s, " %08llx-%08llx | %s | %llu\n", 0ULL, lock_start - 1, > + "unlocked", div_u64(lock_start, min_prot_len)); > + seq_printf(s, " %08llx-%08llx | %s | %llu\n", lock_start, params->size - 1, > + " locked", div_u64(lock_length, min_prot_len)); > + } > + > return 0; > } > DEFINE_SHOW_ATTRIBUTE(spi_nor_params); > diff --git a/drivers/mtd/spi-nor/swp.c b/drivers/mtd/spi-nor/swp.c > index 7a6c2b8ef921..d75ed83eb787 100644 > --- a/drivers/mtd/spi-nor/swp.c > +++ b/drivers/mtd/spi-nor/swp.c > @@ -32,7 +32,7 @@ static u8 spi_nor_get_sr_tb_mask(struct spi_nor *nor) > return SR_TB_BIT5; > } > > -static u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor) > +u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor) > { > unsigned int bp_slots, bp_slots_needed; > /* > @@ -53,8 +53,8 @@ static u64 spi_nor_get_min_prot_length_sr(struct spi_nor *nor) > return sector_size; > } > > -static void spi_nor_get_locked_range_sr(struct spi_nor *nor, const u8 *sr, loff_t *ofs, > - u64 *len) > +void spi_nor_get_locked_range_sr(struct spi_nor *nor, const u8 *sr, loff_t *ofs, > + u64 *len) > { > u64 min_prot_len; > u8 bp_mask = spi_nor_get_sr_bp_mask(nor); > @@ -112,7 +112,7 @@ static bool spi_nor_check_lock_status_sr(struct spi_nor *nor, loff_t ofs, > return (ofs >= lock_offs_max) || (offs_max <= lock_offs); > } > > -static bool spi_nor_is_locked_sr(struct spi_nor *nor, loff_t ofs, u64 len, const u8 *sr) > +bool spi_nor_is_locked_sr(struct spi_nor *nor, loff_t ofs, u64 len, const u8 *sr) > { > return spi_nor_check_lock_status_sr(nor, ofs, len, sr, true); > } > @@ -410,6 +410,9 @@ static int spi_nor_sr_is_locked(struct spi_nor *nor, loff_t ofs, u64 len) > * -is_locked(): Checks if the region is *fully* locked, returns false otherwise. > * This feeback may be misleading because users may get an "unlocked" > * status even though a subpart of the region is effectively locked. > + * > + * If in doubt during development, check-out the debugfs output which tries to > + * be more user friendly. > */ > static const struct spi_nor_locking_ops spi_nor_sr_locking_ops = { > .lock = spi_nor_sr_lock, > @@ -422,6 +425,11 @@ void spi_nor_init_default_locking_ops(struct spi_nor *nor) > nor->params->locking_ops = &spi_nor_sr_locking_ops; > } > > +bool spi_nor_has_default_locking_ops(struct spi_nor *nor) > +{ > + return nor->params->locking_ops == &spi_nor_sr_locking_ops; > +} > + > static int spi_nor_lock(struct mtd_info *mtd, loff_t ofs, u64 len) > { > struct spi_nor *nor = mtd_to_spi_nor(mtd); > > -- > 2.53.0 Reviewed-by: Takahiro Kuwano Thanks, Takahiro ______________________________________________________ Linux MTD discussion mailing list http://lists.infradead.org/mailman/listinfo/linux-mtd/