diff options
author | Marek Vasut <marex@denx.de> | 2016-03-11 03:20:16 +0100 |
---|---|---|
committer | Jagan Teki <jteki@openedev.com> | 2016-03-12 19:55:42 +0530 |
commit | ea9619aed6908e83b0679bd9c9aa4ae97714ef97 (patch) | |
tree | 2de8be1ebdc1346e144f3a1b052e24c8bed05e16 /drivers | |
parent | e6601df8acf19a369b4c12ef16296f719dd237ca (diff) | |
download | u-boot-imx-ea9619aed6908e83b0679bd9c9aa4ae97714ef97.zip u-boot-imx-ea9619aed6908e83b0679bd9c9aa4ae97714ef97.tar.gz u-boot-imx-ea9619aed6908e83b0679bd9c9aa4ae97714ef97.tar.bz2 |
sf: Correct data types in stm_is_locked_sr()
The stm_is_locked_sr() function is picked from Linux kernel. For reason
unknown, the 64bit data types used by the function and present in Linux
were replaced with 32bit unsigned ones, which causes trouble.
The testcase performed was done using ST M25P80 chip.
The command used was:
=> sf protect unlock 0 0x10000
The call chain starts in stm_unlock(), which calls stm_is_locked_sr()
with negative ofs argument. This works fine in Linux, where the "ofs"
is loff_t, which is signed long long, while this fails in U-Boot, where
"ofs" is u32 (unsigned int). Because of this signedness problem, the
expression past the return statement to be incorrectly evaluated to 1,
which in turn propagates back to stm_unlock() and results in -EINVAL.
The correction is very simple, just use the correctly sized data types
with correct signedness in the function to make it work as intended.
Signed-off-by: Marek Vasut <marex@denx.de>
Cc: Simon Glass <sjg@chromium.org>
Reviewed-by: Jagan Teki <jteki@openedev.com>
Diffstat (limited to 'drivers')
-rw-r--r-- | drivers/mtd/spi/spi_flash.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/drivers/mtd/spi/spi_flash.c b/drivers/mtd/spi/spi_flash.c index 2ae2e3c..44d9e9b 100644 --- a/drivers/mtd/spi/spi_flash.c +++ b/drivers/mtd/spi/spi_flash.c @@ -665,7 +665,7 @@ int sst_write_bp(struct spi_flash *flash, u32 offset, size_t len, #if defined(CONFIG_SPI_FLASH_STMICRO) || defined(CONFIG_SPI_FLASH_SST) static void stm_get_locked_range(struct spi_flash *flash, u8 sr, loff_t *ofs, - u32 *len) + u64 *len) { u8 mask = SR_BP2 | SR_BP1 | SR_BP0; int shift = ffs(mask) - 1; @@ -685,11 +685,11 @@ static void stm_get_locked_range(struct spi_flash *flash, u8 sr, loff_t *ofs, /* * Return 1 if the entire region is locked, 0 otherwise */ -static int stm_is_locked_sr(struct spi_flash *flash, u32 ofs, u32 len, +static int stm_is_locked_sr(struct spi_flash *flash, loff_t ofs, u64 len, u8 sr) { loff_t lock_offs; - u32 lock_len; + u64 lock_len; stm_get_locked_range(flash, sr, &lock_offs, &lock_len); |