Skip to content

Commit 31ad3ef

Browse files
mwaller-vignesh
authored andcommitted
mtd: spi-nor: keep lock bits if they are non-volatile
Traditionally, Linux unlocks the whole flash because there are legacy devices which has the write protection bits set by default at startup. If you actually want to use the flash protection bits, eg. because there is a read-only part for a bootloader, this automatic unlocking is harmful. If there is no hardware write protection in place (usually called WP#), a startup of the kernel just discards this protection. I've gone through the datasheets of all the flashes (except the Intel ones where I could not find any datasheet nor reference) which supports the unlocking feature and looked how the sector protection was implemented. The currently supported flashes can be divided into the following two categories: (1) block protection bits are non-volatile. Thus they keep their values at reset and power-cycle (2) flashes where these bits are volatile. After reset or power-cycle, the whole memory array is protected. (a) some devices needs a special "Global Unprotect" command, eg. the Atmel AT25DF041A. (b) some devices require to clear the BPn bits in the status register. Due to the reasons above, we do not want to clear the bits for flashes which belong to category (1). Fortunately for us, only Atmel flashes fall into category (2a). Implement the "Global Protect" and "Global Unprotect" commands for these. For (2b) we can use normal block protection locking scheme. This patch adds a new flag to indicate the case (2). Only if we have such a flash we unlock the whole flash array. To be backwards compatible it also introduces a kernel configuration option which restores the complete legacy behavior ("Disable write protection on any flashes"). Hopefully, this will clean up "unlock the entire flash for legacy devices" once and for all. For reference here are the actually commits which introduced the legacy behavior (and extended the behavior to other chip manufacturers): commit f80e521 ("mtd: m25p80: add support for the Intel/Numonyx {16,32,64}0S33B SPI flash chips") commit ea60658 ("mtd: m25p80: disable SST software protection bits by default") commit 7228982 ("[MTD] m25p80: fix bug - ATmel spi flash fails to be copied to") Actually, this might also fix handling of the Atmel AT25DF flashes, because the original commit 7228982 ("[MTD] m25p80: fix bug - ATmel spi flash fails to be copied to") was writing a 0 to the status register, which is a "Global Unprotect". This might not be the case in the current code which only handles the block protection bits BP2, BP1 and BP0. Thus, it depends on the current contents of the status register if this unlock actually corresponds to a "Global Unprotect" command. In the worst case, the current code might leave the AT25DF flashes in a write protected state. The commit 191f5c2 ("mtd: spi-nor: use 16-bit WRR command when QE is set on spansion flashes") changed that behavior by just clearing BP2 to BP0 instead of writing a 0 to the status register. Further, the commit 3e0930f ("mtd: spi-nor: Rework the disabling of block write protection") expanded the unlock_all() feature to ANY flash which supports locking. Signed-off-by: Michael Walle <michael@walle.cc> Signed-off-by: Vignesh Raghavendra <vigneshr@ti.com> Reviewed-by: Tudor Ambarus <tudor.ambarus@microchip.com> Link: https://lore.kernel.org/r/20201203162959.29589-8-michael@walle.cc
1 parent 8c174d1 commit 31ad3ef

File tree

7 files changed

+211
-24
lines changed

7 files changed

+211
-24
lines changed

drivers/mtd/spi-nor/Kconfig

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,50 @@ config MTD_SPI_NOR_USE_4K_SECTORS
2424
Please note that some tools/drivers/filesystems may not work with
2525
4096 B erase size (e.g. UBIFS requires 15 KiB as a minimum).
2626

27+
choice
28+
prompt "Software write protection at boot"
29+
default MTD_SPI_NOR_SWP_DISABLE_ON_VOLATILE
30+
31+
config MTD_SPI_NOR_SWP_DISABLE
32+
bool "Disable SWP on any flashes (legacy behavior)"
33+
help
34+
This option disables the software write protection on any SPI
35+
flashes at boot-up.
36+
37+
Depending on the flash chip this either clears the block protection
38+
bits or does a "Global Unprotect" command.
39+
40+
Don't use this if you intent to use the software write protection
41+
of your SPI flash. This is only to keep backwards compatibility.
42+
43+
config MTD_SPI_NOR_SWP_DISABLE_ON_VOLATILE
44+
bool "Disable SWP on flashes w/ volatile protection bits"
45+
help
46+
Some SPI flashes have volatile block protection bits, ie. after a
47+
power-up or a reset the flash is software write protected by
48+
default.
49+
50+
This option disables the software write protection for these kind
51+
of flashes while keeping it enabled for any other SPI flashes
52+
which have non-volatile write protection bits.
53+
54+
If the software write protection will be disabled depending on
55+
the flash either the block protection bits are cleared or a
56+
"Global Unprotect" command is issued.
57+
58+
If you are unsure, select this option.
59+
60+
config MTD_SPI_NOR_SWP_KEEP
61+
bool "Keep software write protection as is"
62+
help
63+
If you select this option the software write protection of any
64+
SPI flashes will not be changed. If your flash is software write
65+
protected or will be automatically software write protected after
66+
power-up you have to manually unlock it before you are able to
67+
write to it.
68+
69+
endchoice
70+
2771
source "drivers/mtd/spi-nor/controllers/Kconfig"
2872

2973
endif # MTD_SPI_NOR

drivers/mtd/spi-nor/atmel.c

Lines changed: 121 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,8 @@
88

99
#include "core.h"
1010

11+
#define ATMEL_SR_GLOBAL_PROTECT_MASK GENMASK(5, 2)
12+
1113
/*
1214
* The Atmel AT25FS010/AT25FS040 parts have some weird configuration for the
1315
* block protection bits. We don't support them. But legacy behavior in linux
@@ -55,25 +57,137 @@ static const struct spi_nor_fixups atmel_at25fs_fixups = {
5557
.default_init = atmel_at25fs_default_init,
5658
};
5759

60+
/**
61+
* atmel_set_global_protection - Do a Global Protect or Unprotect command
62+
* @nor: pointer to 'struct spi_nor'
63+
* @ofs: offset in bytes
64+
* @len: len in bytes
65+
* @is_protect: if true do a Global Protect otherwise it is a Global Unprotect
66+
*
67+
* Return: 0 on success, -error otherwise.
68+
*/
69+
static int atmel_set_global_protection(struct spi_nor *nor, loff_t ofs,
70+
uint64_t len, bool is_protect)
71+
{
72+
int ret;
73+
u8 sr;
74+
75+
/* We only support locking the whole flash array */
76+
if (ofs || len != nor->params->size)
77+
return -EINVAL;
78+
79+
ret = spi_nor_read_sr(nor, nor->bouncebuf);
80+
if (ret)
81+
return ret;
82+
83+
sr = nor->bouncebuf[0];
84+
85+
/* SRWD bit needs to be cleared, otherwise the protection doesn't change */
86+
if (sr & SR_SRWD) {
87+
sr &= ~SR_SRWD;
88+
ret = spi_nor_write_sr_and_check(nor, sr);
89+
if (ret) {
90+
dev_dbg(nor->dev, "unable to clear SRWD bit, WP# asserted?\n");
91+
return ret;
92+
}
93+
}
94+
95+
if (is_protect) {
96+
sr |= ATMEL_SR_GLOBAL_PROTECT_MASK;
97+
/*
98+
* Set the SRWD bit again as soon as we are protecting
99+
* anything. This will ensure that the WP# pin is working
100+
* correctly. By doing this we also behave the same as
101+
* spi_nor_sr_lock(), which sets SRWD if any block protection
102+
* is active.
103+
*/
104+
sr |= SR_SRWD;
105+
} else {
106+
sr &= ~ATMEL_SR_GLOBAL_PROTECT_MASK;
107+
}
108+
109+
nor->bouncebuf[0] = sr;
110+
111+
/*
112+
* We cannot use the spi_nor_write_sr_and_check() because this command
113+
* isn't really setting any bits, instead it is an pseudo command for
114+
* "Global Unprotect" or "Global Protect"
115+
*/
116+
return spi_nor_write_sr(nor, nor->bouncebuf, 1);
117+
}
118+
119+
static int atmel_global_protect(struct spi_nor *nor, loff_t ofs, uint64_t len)
120+
{
121+
return atmel_set_global_protection(nor, ofs, len, true);
122+
}
123+
124+
static int atmel_global_unprotect(struct spi_nor *nor, loff_t ofs, uint64_t len)
125+
{
126+
return atmel_set_global_protection(nor, ofs, len, false);
127+
}
128+
129+
static int atmel_is_global_protected(struct spi_nor *nor, loff_t ofs, uint64_t len)
130+
{
131+
int ret;
132+
133+
if (ofs >= nor->params->size || (ofs + len) > nor->params->size)
134+
return -EINVAL;
135+
136+
ret = spi_nor_read_sr(nor, nor->bouncebuf);
137+
if (ret)
138+
return ret;
139+
140+
return ((nor->bouncebuf[0] & ATMEL_SR_GLOBAL_PROTECT_MASK) == ATMEL_SR_GLOBAL_PROTECT_MASK);
141+
}
142+
143+
static const struct spi_nor_locking_ops atmel_global_protection_ops = {
144+
.lock = atmel_global_protect,
145+
.unlock = atmel_global_unprotect,
146+
.is_locked = atmel_is_global_protected,
147+
};
148+
149+
static void atmel_global_protection_default_init(struct spi_nor *nor)
150+
{
151+
nor->params->locking_ops = &atmel_global_protection_ops;
152+
}
153+
154+
static const struct spi_nor_fixups atmel_global_protection_fixups = {
155+
.default_init = atmel_global_protection_default_init,
156+
};
157+
58158
static const struct flash_info atmel_parts[] = {
59159
/* Atmel -- some are (confusingly) marketed as "DataFlash" */
60160
{ "at25fs010", INFO(0x1f6601, 0, 32 * 1024, 4, SECT_4K | SPI_NOR_HAS_LOCK)
61161
.fixups = &atmel_at25fs_fixups },
62162
{ "at25fs040", INFO(0x1f6604, 0, 64 * 1024, 8, SECT_4K | SPI_NOR_HAS_LOCK)
63163
.fixups = &atmel_at25fs_fixups },
64164

65-
{ "at25df041a", INFO(0x1f4401, 0, 64 * 1024, 8, SECT_4K | SPI_NOR_HAS_LOCK) },
66-
{ "at25df321", INFO(0x1f4700, 0, 64 * 1024, 64, SECT_4K | SPI_NOR_HAS_LOCK) },
67-
{ "at25df321a", INFO(0x1f4701, 0, 64 * 1024, 64, SECT_4K | SPI_NOR_HAS_LOCK) },
68-
{ "at25df641", INFO(0x1f4800, 0, 64 * 1024, 128, SECT_4K | SPI_NOR_HAS_LOCK) },
165+
{ "at25df041a", INFO(0x1f4401, 0, 64 * 1024, 8,
166+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
167+
.fixups = &atmel_global_protection_fixups },
168+
{ "at25df321", INFO(0x1f4700, 0, 64 * 1024, 64,
169+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
170+
.fixups = &atmel_global_protection_fixups },
171+
{ "at25df321a", INFO(0x1f4701, 0, 64 * 1024, 64,
172+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
173+
.fixups = &atmel_global_protection_fixups },
174+
{ "at25df641", INFO(0x1f4800, 0, 64 * 1024, 128,
175+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
176+
.fixups = &atmel_global_protection_fixups },
69177

70178
{ "at25sl321", INFO(0x1f4216, 0, 64 * 1024, 64,
71179
SECT_4K | SPI_NOR_DUAL_READ | SPI_NOR_QUAD_READ) },
72180

73181
{ "at26f004", INFO(0x1f0400, 0, 64 * 1024, 8, SECT_4K) },
74-
{ "at26df081a", INFO(0x1f4501, 0, 64 * 1024, 16, SECT_4K | SPI_NOR_HAS_LOCK) },
75-
{ "at26df161a", INFO(0x1f4601, 0, 64 * 1024, 32, SECT_4K | SPI_NOR_HAS_LOCK) },
76-
{ "at26df321", INFO(0x1f4700, 0, 64 * 1024, 64, SECT_4K | SPI_NOR_HAS_LOCK) },
182+
{ "at26df081a", INFO(0x1f4501, 0, 64 * 1024, 16,
183+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
184+
.fixups = &atmel_global_protection_fixups },
185+
{ "at26df161a", INFO(0x1f4601, 0, 64 * 1024, 32,
186+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
187+
.fixups = &atmel_global_protection_fixups },
188+
{ "at26df321", INFO(0x1f4700, 0, 64 * 1024, 64,
189+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE)
190+
.fixups = &atmel_global_protection_fixups },
77191

78192
{ "at45db081d", INFO(0x1f2500, 0, 64 * 1024, 16, SECT_4K) },
79193
};

drivers/mtd/spi-nor/core.c

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -377,7 +377,7 @@ int spi_nor_write_disable(struct spi_nor *nor)
377377
*
378378
* Return: 0 on success, -errno otherwise.
379379
*/
380-
static int spi_nor_read_sr(struct spi_nor *nor, u8 *sr)
380+
int spi_nor_read_sr(struct spi_nor *nor, u8 *sr)
381381
{
382382
int ret;
383383

@@ -861,7 +861,7 @@ int spi_nor_wait_till_ready(struct spi_nor *nor)
861861
*
862862
* Return: 0 on success, -errno otherwise.
863863
*/
864-
static int spi_nor_write_sr(struct spi_nor *nor, const u8 *sr, size_t len)
864+
int spi_nor_write_sr(struct spi_nor *nor, const u8 *sr, size_t len)
865865
{
866866
int ret;
867867

@@ -3140,6 +3140,8 @@ static void spi_nor_try_unlock_all(struct spi_nor *nor)
31403140
if (!(nor->flags & SNOR_F_HAS_LOCK))
31413141
return;
31423142

3143+
dev_dbg(nor->dev, "Unprotecting entire flash array\n");
3144+
31433145
ret = spi_nor_unlock(&nor->mtd, 0, nor->params->size);
31443146
if (ret)
31453147
dev_dbg(nor->dev, "Failed to unlock the entire flash memory array\n");
@@ -3161,7 +3163,20 @@ static int spi_nor_init(struct spi_nor *nor)
31613163
return err;
31623164
}
31633165

3164-
spi_nor_try_unlock_all(nor);
3166+
/*
3167+
* Some SPI NOR flashes are write protected by default after a power-on
3168+
* reset cycle, in order to avoid inadvertent writes during power-up.
3169+
* Backward compatibility imposes to unlock the entire flash memory
3170+
* array at power-up by default. Depending on the kernel configuration
3171+
* (1) do nothing, (2) always unlock the entire flash array or (3)
3172+
* unlock the entire flash array only when the software write
3173+
* protection bits are volatile. The latter is indicated by
3174+
* SNOR_F_SWP_IS_VOLATILE.
3175+
*/
3176+
if (IS_ENABLED(CONFIG_MTD_SPI_NOR_SWP_DISABLE) ||
3177+
(IS_ENABLED(CONFIG_MTD_SPI_NOR_SWP_DISABLE_ON_VOLATILE) &&
3178+
nor->flags & SNOR_F_SWP_IS_VOLATILE))
3179+
spi_nor_try_unlock_all(nor);
31653180

31663181
if (nor->addr_width == 4 &&
31673182
nor->read_proto != SNOR_PROTO_8_8_8_DTR &&
@@ -3460,6 +3475,8 @@ int spi_nor_scan(struct spi_nor *nor, const char *name,
34603475
nor->flags |= SNOR_F_NO_OP_CHIP_ERASE;
34613476
if (info->flags & USE_CLSR)
34623477
nor->flags |= SNOR_F_USE_CLSR;
3478+
if (info->flags & SPI_NOR_SWP_IS_VOLATILE)
3479+
nor->flags |= SNOR_F_SWP_IS_VOLATILE;
34633480

34643481
if (info->flags & SPI_NOR_4BIT_BP) {
34653482
nor->flags |= SNOR_F_HAS_4BIT_BP;

drivers/mtd/spi-nor/core.h

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ enum spi_nor_option_flags {
2828
SNOR_F_HAS_SR_BP3_BIT6 = BIT(13),
2929
SNOR_F_IO_MODE_EN_VOLATILE = BIT(14),
3030
SNOR_F_SOFT_RESET = BIT(15),
31+
SNOR_F_SWP_IS_VOLATILE = BIT(16),
3132
};
3233

3334
struct spi_nor_read_command {
@@ -332,6 +333,11 @@ struct flash_info {
332333
* available I/O mode via a
333334
* volatile bit.
334335
*/
336+
#define SPI_NOR_SWP_IS_VOLATILE BIT(22) /*
337+
* Flash has volatile software write
338+
* protection bits. Usually these will
339+
* power-up in a write-protected state.
340+
*/
335341

336342
/* Part specific fixup hooks. */
337343
const struct spi_nor_fixups *fixups;
@@ -433,6 +439,8 @@ void spi_nor_unlock_and_unprep(struct spi_nor *nor);
433439
int spi_nor_sr1_bit6_quad_enable(struct spi_nor *nor);
434440
int spi_nor_sr2_bit1_quad_enable(struct spi_nor *nor);
435441
int spi_nor_sr2_bit7_quad_enable(struct spi_nor *nor);
442+
int spi_nor_read_sr(struct spi_nor *nor, u8 *sr);
443+
int spi_nor_write_sr(struct spi_nor *nor, const u8 *sr, size_t len);
436444
int spi_nor_write_sr_and_check(struct spi_nor *nor, u8 sr1);
437445

438446
int spi_nor_xread_sr(struct spi_nor *nor, u8 *sr);

drivers/mtd/spi-nor/esmt.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
static const struct flash_info esmt_parts[] = {
1212
/* ESMT */
1313
{ "f25l32pa", INFO(0x8c2016, 0, 64 * 1024, 64,
14-
SECT_4K | SPI_NOR_HAS_LOCK) },
14+
SECT_4K | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
1515
{ "f25l32qa", INFO(0x8c4116, 0, 64 * 1024, 64,
1616
SECT_4K | SPI_NOR_HAS_LOCK) },
1717
{ "f25l64qa", INFO(0x8c4117, 0, 64 * 1024, 128,

drivers/mtd/spi-nor/intel.c

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,12 @@
1010

1111
static const struct flash_info intel_parts[] = {
1212
/* Intel/Numonyx -- xxxs33b */
13-
{ "160s33b", INFO(0x898911, 0, 64 * 1024, 32, SPI_NOR_HAS_LOCK) },
14-
{ "320s33b", INFO(0x898912, 0, 64 * 1024, 64, SPI_NOR_HAS_LOCK) },
15-
{ "640s33b", INFO(0x898913, 0, 64 * 1024, 128, SPI_NOR_HAS_LOCK) },
13+
{ "160s33b", INFO(0x898911, 0, 64 * 1024, 32,
14+
SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
15+
{ "320s33b", INFO(0x898912, 0, 64 * 1024, 64,
16+
SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
17+
{ "640s33b", INFO(0x898913, 0, 64 * 1024, 128,
18+
SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
1619
};
1720

1821
const struct spi_nor_manufacturer spi_nor_intel = {

drivers/mtd/spi-nor/sst.c

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,27 +11,28 @@
1111
static const struct flash_info sst_parts[] = {
1212
/* SST -- large erase sizes are "overlays", "sectors" are 4K */
1313
{ "sst25vf040b", INFO(0xbf258d, 0, 64 * 1024, 8,
14-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
14+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
1515
{ "sst25vf080b", INFO(0xbf258e, 0, 64 * 1024, 16,
16-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
16+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
1717
{ "sst25vf016b", INFO(0xbf2541, 0, 64 * 1024, 32,
18-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
18+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
1919
{ "sst25vf032b", INFO(0xbf254a, 0, 64 * 1024, 64,
20-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
20+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
2121
{ "sst25vf064c", INFO(0xbf254b, 0, 64 * 1024, 128,
22-
SECT_4K | SPI_NOR_4BIT_BP | SPI_NOR_HAS_LOCK) },
22+
SECT_4K | SPI_NOR_4BIT_BP | SPI_NOR_HAS_LOCK |
23+
SPI_NOR_SWP_IS_VOLATILE) },
2324
{ "sst25wf512", INFO(0xbf2501, 0, 64 * 1024, 1,
24-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
25+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
2526
{ "sst25wf010", INFO(0xbf2502, 0, 64 * 1024, 2,
26-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
27+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
2728
{ "sst25wf020", INFO(0xbf2503, 0, 64 * 1024, 4,
28-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
29+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
2930
{ "sst25wf020a", INFO(0x621612, 0, 64 * 1024, 4, SECT_4K | SPI_NOR_HAS_LOCK) },
3031
{ "sst25wf040b", INFO(0x621613, 0, 64 * 1024, 8, SECT_4K | SPI_NOR_HAS_LOCK) },
3132
{ "sst25wf040", INFO(0xbf2504, 0, 64 * 1024, 8,
32-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
33+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
3334
{ "sst25wf080", INFO(0xbf2505, 0, 64 * 1024, 16,
34-
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK) },
35+
SECT_4K | SST_WRITE | SPI_NOR_HAS_LOCK | SPI_NOR_SWP_IS_VOLATILE) },
3536
{ "sst26wf016b", INFO(0xbf2651, 0, 64 * 1024, 32,
3637
SECT_4K | SPI_NOR_DUAL_READ |
3738
SPI_NOR_QUAD_READ) },

0 commit comments

Comments
 (0)