From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pg1-f176.google.com (mail-pg1-f176.google.com [209.85.215.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 77E5D34EF0C for ; Mon, 23 Feb 2026 10:17:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.215.176 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771841869; cv=none; b=C8aqNbhk25gTUrYrZRjHvsJieBtAg0bv3kxBvGahEbXfQNIn+8wCH1NPGCQLgnKewhlHY14pZurvprXjSoRfR+23Sf6mnz7CX2kgAtQPR+aHuo8Sj5XGpX55PGO+3SeDm+X2i+MC01yjyId9kvYtawBrhYur89XEUW5rvISvJVg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771841869; c=relaxed/simple; bh=kPoRVNxNpO3Z50WxHXMMyqAvSb7QbpFQJukqGhW/z/A=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=bnjLAIGet7D0jlj+Bmr0RxTkAYYMxDRunrhOvtAF3vCcNn+vXSF4oCySl1bFX1Z7Nx3sPsM/U+ju61Wo5rAbVq6QY4jF1CApuLEYrTViJnRuZwInKm3g+NGeQyiti25Ogmiyf8ihKpmYZQ2QHiRwxLoDTIJGDfRs/ckfUnV0hxA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=FZ4NRp74; arc=none smtp.client-ip=209.85.215.176 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="FZ4NRp74" Received: by mail-pg1-f176.google.com with SMTP id 41be03b00d2f7-c6e2355739dso1410337a12.2 for ; Mon, 23 Feb 2026 02:17:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1771841868; x=1772446668; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=68kFT9M+v1YFr8fLxiUdg7OyCK95BGAep7GJPhPQZJ0=; b=FZ4NRp74IAvPu8rwJR61Zyz7ImSvEqWC1Y2//oSxQMiCiMmR3Wgl67PA/aqkki7SDj rgV2Fxrm1mhQgmbwPGND6P4lzglHuey/NAxCvahNFZnH4aHnl+KM1auziRe7/yrGHekF MgxICmGZvzmR3ymZoVuHDWZ59wnqvIucqe3B5ZDNSLuXuCfsFO5WiPCZ5athgem+n8BT mhzTwfbFYvOBCEiBlYdqekd3X2PPtG8E/CaCbpriwkuIj++IiF6hmQttoBz/AuRAlawj YAJfuMWBqou6B0zv6uJb6WI1Tndxunw8T5r2SYHbJhibTdPpjj/0Z5ZdfKdNtzDHMxPa kTDQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771841868; x=1772446668; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=68kFT9M+v1YFr8fLxiUdg7OyCK95BGAep7GJPhPQZJ0=; b=LE1f3zr4D92LXgr6Y8uH/V/iDo37/MwJUf2iQY86yB7GxMDR095b4i6CeigWCy5Nb2 Uxy/DyCOEOYIM+lzAxST6c3zdNK2zNFj8HSpXDLmHGRf1rgX6vFFPZJmS32XAtJlY6+6 UqmSuNwMi0iGjOTx7vvSy55ufeBGynQyTfG+7zrMx4xVJ7AwWkildm+6zBfX02GuDGRh T9qk85xHlpEDizYB7ns6BmRnKi11o8VSEMX3cCEasgee04opL2NH4iD5m/v/QvA7+OpS AcuHOX6gjPbcuGrIor8gjuLcIKcFyJbOZucgRC0b/VBoABRD2sUvu7wBGSS8WnlBTQeY oSGw== X-Gm-Message-State: AOJu0YwtDek9A/Y3IwtkGN7f/RZxM5/zvY2uai1cfGVmW+NZ40cHv5Gi ZfbIQSUJGEFz1xrfsEALOu6M3sXcoJVRPMiwbcfDnpr5l3obS23Ghsf1 X-Gm-Gg: ATEYQzxQlczkV7e4Oar71Nl3yoJvBSDurvz/8p5CQp6spLXBQzi2/GMCc2osHoMn0Qq Maz/X4uDCvHdqJ6x0Wair+sU02ngmYusPaW6FeV6j08//MvS1rJQsZUw29CVGka/JxSbzfqYWzO R4noBdn9a4BBoZu7tNewlAWS9S2SAkQB2gCtze+7Om1DzuxnPFytLOF2bqoqe7X7DUbb2M1Cwud lcoq3hTSGr/WZeD5w+s68TQrpwoE95W8RUPAreGafFuL2GKq1/1706saNJIL14LVIr/wCgjAh3p FWkdOljsKYt7dFYUYc1tsKI461XkgftozWveDcdn/v3sIJIC2Uw/uEyE7dR1UWtFBIyaIbpj8gj m7sAWqdx7ozwIC0qS1BxkEhrp3/YkrK/tn/Vl21CPKY5yDOBKVPMSgTzJB/PhDbcUVaK/GOqLiY bIpLp/o3E3S0gHQMvf/1nSALdnB17HysePWFzFzdef X-Received: by 2002:a17:903:2c05:b0:2a7:d5c0:c661 with SMTP id d9443c01a7336-2ad7443a1c0mr70941425ad.15.1771841867797; Mon, 23 Feb 2026 02:17:47 -0800 (PST) Received: from c6dfb3cc7c9a ([115.245.213.202]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2ad74e3425dsm66574795ad.16.2026.02.23.02.17.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Feb 2026 02:17:47 -0800 (PST) From: Sanjaikumar V S To: mwalle@kernel.org Cc: linux-kernel@vger.kernel.org, linux-mtd@lists.infradead.org, miquel.raynal@bootlin.com, pratyush@kernel.org, richard@nod.at, sanjaikumarvs@gmail.com, sanjaikumar.vs@dicortech.com, tudor.ambarus@linaro.org, stable@vger.kernel.org, vigneshr@ti.com Subject: [PATCH v3 1/2] mtd: spi-nor: sst: Fix write enable before AAI sequence Date: Mon, 23 Feb 2026 10:17:17 +0000 Message-ID: <20260223101718.89-2-sanjaikumarvs@gmail.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260223101718.89-1-sanjaikumarvs@gmail.com> References: <20260220094236.28-1-sanjaikumarvs@gmail.com> <20260223101718.89-1-sanjaikumarvs@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Sanjaikumar V S When writing to SST flash starting at an odd address, a single byte is first programmed using the byte program (BP) command. After this operation completes, the flash hardware automatically clears the Write Enable Latch (WEL) bit. If an AAI (Auto Address Increment) word program sequence follows, it requires WEL to be set. Without re-enabling writes, the AAI sequence fails. Add spi_nor_write_enable() after the odd-address byte program when more data needs to be written. Use a local boolean for clarity. Fixes: b199489d37b2 ("mtd: spi-nor: add the framework for SPI NOR") Cc: stable@vger.kernel.org Signed-off-by: Sanjaikumar V S --- drivers/mtd/spi-nor/sst.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/drivers/mtd/spi-nor/sst.c b/drivers/mtd/spi-nor/sst.c index 175211fe6a5e..db02c14ba16f 100644 --- a/drivers/mtd/spi-nor/sst.c +++ b/drivers/mtd/spi-nor/sst.c @@ -203,6 +203,8 @@ static int sst_nor_write(struct mtd_info *mtd, loff_t to, size_t len, /* Start write from odd address. */ if (to % 2) { + bool needs_write_enable = (len > 1); + /* write one byte. */ ret = sst_nor_write_data(nor, to, 1, buf); if (ret < 0) @@ -210,6 +212,17 @@ static int sst_nor_write(struct mtd_info *mtd, loff_t to, size_t len, to++; actual++; + + /* + * Byte program clears the write enable latch. If more + * data needs to be written using the AAI sequence, + * re-enable writes. + */ + if (needs_write_enable) { + ret = spi_nor_write_enable(nor); + if (ret) + goto out; + } } /* Write out most of the data here. */ -- 2.43.0