Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2219649/?format=api
{ "id": 2219649, "url": "http://patchwork.ozlabs.org/api/patches/2219649/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-mtd/patch/20260403-winbond-v6-18-rc1-spi-nor-swp-v4-24-833dab5e7288@bootlin.com/", "project": { "id": 3, "url": "http://patchwork.ozlabs.org/api/projects/3/?format=api", "name": "Linux MTD development", "link_name": "linux-mtd", "list_id": "linux-mtd.lists.infradead.org", "list_email": "linux-mtd@lists.infradead.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260403-winbond-v6-18-rc1-spi-nor-swp-v4-24-833dab5e7288@bootlin.com>", "list_archive_url": null, "date": "2026-04-03T16:09:42", "name": "[v4,24/27] mtd: spi-nor: winbond: Add W25H02NWxxAM CMP locking support", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "8594bb6b2c7cf7e6d95c32fd30004e7748108c22", "submitter": { "id": 73368, "url": "http://patchwork.ozlabs.org/api/people/73368/?format=api", "name": "Miquel Raynal", "email": "miquel.raynal@bootlin.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-mtd/patch/20260403-winbond-v6-18-rc1-spi-nor-swp-v4-24-833dab5e7288@bootlin.com/mbox/", "series": [ { "id": 498652, "url": "http://patchwork.ozlabs.org/api/series/498652/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-mtd/list/?series=498652", "date": "2026-04-03T16:09:18", "name": "mtd: spi-nor: Enhance software protection", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/498652/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2219649/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2219649/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=bZx+xxsC;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n secure) header.d=infradead.org header.i=@infradead.org header.a=rsa-sha256\n header.s=casper.20170209 header.b=RXzvs9t3;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=bootlin.com header.i=@bootlin.com header.a=rsa-sha256\n header.s=dkim header.b=q8lUnjwH;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fnNxV4RJfz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 04 Apr 2026 03:10:54 +1100 (AEDT)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8h6e-00000002I41-0skv;\n\tFri, 03 Apr 2026 16:10:48 +0000", "from casper.infradead.org ([2001:8b0:10b:1236::1])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8h6Y-00000002HuS-0b9o\n\tfor linux-mtd@bombadil.infradead.org;\n\tFri, 03 Apr 2026 16:10:42 +0000", "from smtpout-03.galae.net ([185.246.85.4])\n\tby casper.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1w8h6S-0000000EglD-0EZY\n\tfor linux-mtd@lists.infradead.org;\n\tFri, 03 Apr 2026 16:10:40 +0000", "from smtpout-01.galae.net (smtpout-01.galae.net [212.83.139.233])\n\tby smtpout-03.galae.net (Postfix) with ESMTPS id C13404E428D8;\n\tFri, 3 Apr 2026 16:10:34 +0000 (UTC)", "from mail.galae.net (mail.galae.net [212.83.136.155])\n\tby smtpout-01.galae.net (Postfix) with ESMTPS id 9887D603C1;\n\tFri, 3 Apr 2026 16:10:34 +0000 (UTC)", "from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon)\n with ESMTPSA id 23F4010450102;\n\tFri, 3 Apr 2026 18:10:31 +0200 (CEST)" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:Cc:To:In-Reply-To:References:Message-Id\n\t:MIME-Version:Subject:Date:From:Reply-To:Content-ID:Content-Description:\n\tResent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:\n\tList-Owner; bh=l7YoAfPkMso1EMJKPIwidR0EO2yGnSJdX/nxS4tgAfc=; b=bZx+xxsCx+X5/z\n\tbxCuh4rqAzjJTe9SozEslg7EpnwmsMTmcwADg7QyttDzwdwS34+JmmFlKf25vdK9y8wrG5LD/hUwt\n\teUUYir8oLXiCdWGkrCZhUd5PZzViBcgduIKDaWeXURMvKXtD3ujug5+pFfCtda0W30WgeQFIvv3+M\n\tfGhFgiwnLKk5zcxcGXFA1Jp66B/uXvM2ZIm7e2c6XS7V8q343VS1TVNCY5ES95dYvWliLMP3Ew7Wm\n\t3B3B7fk7SYF4nDOOuBarI5oA1Z3rafMjbPHevzEvTyzwvPGtbk+ZzSADPNVCl4MJxF3y+S7lPyQvd\n\tul4n8lVLe1azH6NuupKg==;", "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=infradead.org; s=casper.20170209; h=Cc:To:In-Reply-To:References:Message-Id\n\t:Content-Transfer-Encoding:Content-Type:MIME-Version:Subject:Date:From:Sender\n\t:Reply-To:Content-ID:Content-Description;\n\tbh=R7OT2YlAzzFHwB/uvEM78CXYvmQMpqZLz49OKpEP2YA=; b=RXzvs9t3UOkHM+chw5U60OH8IW\n\tdwVV8BWUoCafxAwg/9I374wyiwUy3ZN9s9z3tTvYOJT03cjisuNojDGNM0ROYYNzQtLDOoQZkpLUH\n\tozajZV+aq3NFi8gbracZ2Rl+oqSPL7j1PSXZNZXC2GkcGxa15lVnSqtceHZgzxS43uYqO2VWmgUiG\n\tV82cH8+9FPvxZu25eLPwwKi59nDJazXLyftkG6bj3kNtU3USAx+t2chM3McwGVPlvz0HK9CVp5QNS\n\t4/SkShV+L/JM14JfSv0g4EYRh7GEorLk0Uw+a6pKkwtL6kdXjxyG3jSPU01RMeJqi5rWkjEAHu9Hd\n\tBtBVBFHQ==;", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=bootlin.com; s=dkim;\n\tt=1775232633; h=from:subject:date:message-id:to:cc:mime-version:content-type:\n\t content-transfer-encoding:in-reply-to:references;\n\tbh=R7OT2YlAzzFHwB/uvEM78CXYvmQMpqZLz49OKpEP2YA=;\n\tb=q8lUnjwH9jPWI4Yb3j8YS90x52RZKXekZVFr7dYwDVHBPhlSn/m+pxLA7xKcFSeqrFaC5x\n\t0E8c6amxWmqFbkBZqGPkXqokVy3j2BPz1dVAiUFbpB5KQAiG5dAw1Ct4A6SHWLKs3MaP22\n\tQWhrMfpeidVa3cmm/y4YDM3Fl31rDLEcZwanNJezFJGO4neVxOF1D9ngzh3RQFb62FXtFq\n\tjpNXk50SIpXnRi6KmBQuRGrteLAMQ7hPYwi0pBeat+gsytxp32HDzmjGZ70LDlSHR+5ATV\n\tmiiTeZG242ctUsKzCLNrqitlc0Yk3wcFe+tdBhxMNSUvj0Z6yLYUM+Si5HvNPg==" ], "From": "Miquel Raynal <miquel.raynal@bootlin.com>", "Date": "Fri, 03 Apr 2026 18:09:42 +0200", "Subject": "[PATCH v4 24/27] mtd: spi-nor: winbond: Add W25H02NWxxAM CMP\n locking support", "MIME-Version": "1.0", "Message-Id": "\n <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-24-833dab5e7288@bootlin.com>", "References": "\n <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-0-833dab5e7288@bootlin.com>", "In-Reply-To": "\n <20260403-winbond-v6-18-rc1-spi-nor-swp-v4-0-833dab5e7288@bootlin.com>", "To": "Pratyush Yadav <pratyush@kernel.org>, Michael Walle <mwalle@kernel.org>,\n Takahiro Kuwano <takahiro.kuwano@infineon.com>,\n Richard Weinberger <richard@nod.at>, Vignesh Raghavendra <vigneshr@ti.com>,\n Jonathan Corbet <corbet@lwn.net>", "Cc": "Sean Anderson <sean.anderson@linux.dev>,\n Thomas Petazzoni <thomas.petazzoni@bootlin.com>,\n Steam Lin <STLin2@winbond.com>, linux-mtd@lists.infradead.org,\n linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org,\n Miquel Raynal <miquel.raynal@bootlin.com>", "X-Mailer": "b4 0.14.3", "X-Last-TLS-Session-Version": "TLSv1.3", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260403_171036_194324_15AEE62D ", "X-CRM114-Status": "GOOD ( 14.51 )", "X-Spam-Score": "-2.1 (--)", "X-Spam-Report": "SpamAssassin version 4.0.1 on casper.infradead.org summary:\n Content analysis details: (-2.1 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -0.0 SPF_HELO_PASS SPF: HELO matches SPF record\n -0.0 SPF_PASS SPF: sender matches SPF record\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n 0.0 RCVD_IN_VALIDITY_SAFE_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [185.246.85.4 listed in sa-accredit.habeas.com]\n 0.0 RCVD_IN_VALIDITY_CERTIFIED_BLOCKED RBL: ADMINISTRATOR NOTICE: The\n query to Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [185.246.85.4 listed in\n sa-trusted.bondedsender.org]\n 0.0 RCVD_IN_VALIDITY_RPBL_BLOCKED RBL: ADMINISTRATOR NOTICE: The query to\n Validity was blocked. See\n https://knowledge.validity.com/hc/en-us/articles/20961730681243\n for more information.\n [185.246.85.4 listed in bl.score.senderscore.com]", "X-BeenThere": "linux-mtd@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "Linux MTD discussion mailing list <linux-mtd.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/linux-mtd>,\n <mailto:linux-mtd-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/linux-mtd/>", "List-Post": "<mailto:linux-mtd@lists.infradead.org>", "List-Help": "<mailto:linux-mtd-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/linux-mtd>,\n <mailto:linux-mtd-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"linux-mtd\" <linux-mtd-bounces@lists.infradead.org>", "Errors-To": "linux-mtd-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "This chip has support for the locking complement (CMP) feature. Add\nthe relevant bit to enable it.\n\nUnfortunately, this chip also comes with an incorrect BFPT table,\nindicating the Control Register cannot be read back. This is wrong,\nreading back the register works and has no (observed) side effect. The\ndatasheet clearly indicates supporting the 35h command and all bits from\nthe CR are marked readable. QE and CMP bits are inside, and can be\nproperly read back.\n\nAdd a fixup for this, otherwise it would defeat the use of the CMP\nfeature.\n\nSigned-off-by: Miquel Raynal <miquel.raynal@bootlin.com>\n---\nTest run with W25H02NWxxAM:\n$ flash_lock -u /dev/mtd0\n$ flash_lock -l /dev/mtd0 $bs $all_but_one # all but the first\n$ show_sectors\nlocked sectors\n region (in hex) | status | #blocks\n ------------------+----------+--------\n 00000000-0000ffff | unlocked | 1\n 00010000-0fffffff | locked | 4095\n$ flash_lock -u /dev/mtd0 $bs 1 # all but the two first\n$ show_sectors\nlocked sectors\n region (in hex) | status | #blocks\n ------------------+----------+--------\n 00000000-0001ffff | unlocked | 2\n 00020000-0fffffff | locked | 4094\n$ flash_lock -u /dev/mtd0\n$ flash_lock -l /dev/mtd0 0 $all_but_one # same from the other side\n$ show_sectors\nlocked sectors\n region (in hex) | status | #blocks\n ------------------+----------+--------\n 00000000-0ffeffff | locked | 4095\n 0fff0000-0fffffff | unlocked | 1\n$ flash_lock -u /dev/mtd0 $(($size - (2 * $bs))) 1 # all but two\n$ show_sectors\nlocked sectors\n region (in hex) | status | #blocks\n ------------------+----------+--------\n 00000000-0ffdffff | locked | 4094\n 0ffe0000-0fffffff | unlocked | 2\n---\n drivers/mtd/spi-nor/winbond.c | 24 +++++++++++++++++++++++-\n 1 file changed, 23 insertions(+), 1 deletion(-)", "diff": "diff --git a/drivers/mtd/spi-nor/winbond.c b/drivers/mtd/spi-nor/winbond.c\nindex 1b9b0e9598ef..959fd4f46eb5 100644\n--- a/drivers/mtd/spi-nor/winbond.c\n+++ b/drivers/mtd/spi-nor/winbond.c\n@@ -73,6 +73,26 @@ static const struct spi_nor_fixups w25q256_fixups = {\n \t.post_bfpt = w25q256_post_bfpt_fixups,\n };\n \n+static int\n+winbond_rdcr_post_bfpt_fixup(struct spi_nor *nor,\n+\t\t\t const struct sfdp_parameter_header *bfpt_header,\n+\t\t\t const struct sfdp_bfpt *bfpt)\n+{\n+\t/*\n+\t * W25H02NW, unlike its W25H512NW nor W25H01NW cousins, improperly sets\n+\t * the QE BFPT configuration bits, indicating a non readable CR. This is\n+\t * both incorrect and impractical, as the chip features a CMP bit for its\n+\t * locking scheme that lays in the Control Register, and needs to be read.\n+\t */\n+\tnor->flags &= ~SNOR_F_NO_READ_CR;\n+\n+\treturn 0;\n+}\n+\n+static const struct spi_nor_fixups winbond_rdcr_fixup = {\n+\t.post_bfpt = winbond_rdcr_post_bfpt_fixup,\n+};\n+\n /**\n * winbond_nor_select_die() - Set active die.\n * @nor:\tpointer to 'struct spi_nor'.\n@@ -368,7 +388,9 @@ static const struct flash_info winbond_nor_parts[] = {\n \t}, {\n \t\t/* W25H02NWxxAM */\n \t\t.id = SNOR_ID(0xef, 0xa0, 0x22),\n-\t\t.flags = SPI_NOR_HAS_LOCK | SPI_NOR_HAS_TB | SPI_NOR_TB_SR_BIT6 | SPI_NOR_4BIT_BP,\n+\t\t.flags = SPI_NOR_HAS_LOCK | SPI_NOR_HAS_TB | SPI_NOR_TB_SR_BIT6 |\n+\t\t\t SPI_NOR_4BIT_BP | SPI_NOR_HAS_CMP,\n+\t\t.fixups = &winbond_rdcr_fixup,\n \t},\n };\n \n", "prefixes": [ "v4", "24/27" ] }