Received: by 10.192.165.148 with SMTP id m20csp1056164imm; Thu, 10 May 2018 05:04:05 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoum3JD4ALT6Au8BI3YT6fs6EXtHKxFbh7lNS+sB76duxQvdvatnce47cDenhMrVY7F514X X-Received: by 2002:a63:a503:: with SMTP id n3-v6mr928538pgf.19.1525953845309; Thu, 10 May 2018 05:04:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525953845; cv=none; d=google.com; s=arc-20160816; b=o2XkmfN9mdwdXtkxEIwv0KXpB+fO1bM9VlUXKZb70ax5HsE9kGkfkm8h3WzOb0p1Dv dKweDx6JBReU12hTJRV1697DDxrXTAAuP/hCGjuiYVjsey6dLQx2dWGFZWllGYQnUEB7 5i40BF5pl1B2uv8niBoafsnTKo5BrBVPs+r9jhH7SrlLp1UmW7w5Aq7bcB2ZQcANtaHV 5JFqxWORbyVw2H6UAGqB1ZrmQhgI5g0oRvF5S2/GW1HjtgCtg2kH6ETStD6cCsIZ6yhM HyjgGTkX4ZKOHnnJqxX3X2NkqwxYqQzDmcJ4SjK25xa9KG0saT21a3FhrUzpNh2FRqWL EvOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=CJ4VyNsFSHUsV/qp6iI2bSoKjRt4iqEuWlW0HmKc6uQ=; b=MUi6EfZVJcJTjN2j4DBz25sD9QvJZQoEx6s26P6esivuITF0G2X+iWH4lX9blDv1jT Z/Lx1AkNgRS2ohhpfamZE8IeDNUfdx/5k8G4Y5ST2UoNDFNt3qWh1cCNSd9P+EyRZZti Yywc2Tp70XA6ao2kvPp0Zj6vOuMTFxO+2w3OpMQZiBXNPwjMopR0dy3OuSl/CKsE5e7D kairF20aGu9GPe/UfCr1QoEq6H0Ok9UfUhHbWQTeroXEymdmwTSAF8mxv/FOmODUisi3 ZTdhYfRm44geRA18P7mp01hifuDNuL29mQHioreemgSrjoOlAyjDBXuNhz06cAxcZUrI gbQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g92-v6si604232plg.256.2018.05.10.05.03.29; Thu, 10 May 2018 05:04:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757257AbeEJMDR (ORCPT + 99 others); Thu, 10 May 2018 08:03:17 -0400 Received: from mail.bootlin.com ([62.4.15.54]:40496 "EHLO mail.bootlin.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757243AbeEJMDN (ORCPT ); Thu, 10 May 2018 08:03:13 -0400 Received: by mail.bootlin.com (Postfix, from userid 110) id EBF7B2072B; Thu, 10 May 2018 14:03:10 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.bootlin.com X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT shortcircuit=ham autolearn=disabled version=3.4.0 Received: from bbrezillon (unknown [91.160.177.164]) by mail.bootlin.com (Postfix) with ESMTPSA id 8F329203B0; Thu, 10 May 2018 14:03:10 +0200 (CEST) Date: Thu, 10 May 2018 14:03:11 +0200 From: Boris Brezillon To: Jane Wan Cc: miquel.raynal@bootlin.com, dwmw2@infradead.org, computersforpeace@gmail.com, richard@nod.at, marek.vasut@gmail.com, yamada.masahiro@socionext.com, prabhakar.kushwaha@nxp.com, shawnguo@kernel.org, jagdish.gediya@nxp.com, shreeya.patel23498@gmail.com, linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, ties.bos@nokia.com Subject: Re: [PATCH v5 2/2] mtd: rawnand: use bit-wise majority to recover the contents of ONFI parameter Message-ID: <20180510140311.02805561@bbrezillon> In-Reply-To: <1525920400-11392-1-git-send-email-Jane.Wan@nokia.com> References: <1525920400-11392-1-git-send-email-Jane.Wan@nokia.com> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jane, Subject prefix should be "[PATCH v5] ...", the 2/2 is no longer valid since you only have one patch here. On Wed, 9 May 2018 19:46:40 -0700 Jane Wan wrote: > Per ONFI specification (Rev. 4.0), if all parameter pages have invalid > CRC values, the bit-wise majority may be used to recover the contents of > the parameter pages from the parameter page copies present. > > Signed-off-by: Jane Wan > --- There should be a changelog here describing what has changed in each version of the patch. > drivers/mtd/nand/raw/nand_base.c | 46 +++++++++++++++++++++++++++++++++----- > 1 file changed, 41 insertions(+), 5 deletions(-) > > diff --git a/drivers/mtd/nand/raw/nand_base.c b/drivers/mtd/nand/raw/nand_base.c > index 72f3a89..a7c2507 100644 > --- a/drivers/mtd/nand/raw/nand_base.c > +++ b/drivers/mtd/nand/raw/nand_base.c > @@ -5086,6 +5086,34 @@ static int nand_flash_detect_ext_param_page(struct nand_chip *chip, > return ret; > } > > +#define GET_BIT(bit, val) (((val) >> (bit)) & 0x01) Not sure we need that macro, see below. > + > +/* > + * Recover data with bit-wise majority > + */ > +static void nand_bit_wise_majority(const void **srcbufs, > + void *dstbuf, > + unsigned int nbufs, > + unsigned int bufsize) I'd prefer to have nbufs just after srcbufs and named nsrcbufs: static void nand_bit_wise_majority(const void **srcbufs, unsigned int nsrcbufs, void *dstbuf, unsigned int bufsize) > +{ > + int i, j, k; > + u8 v, m; > + u8 *p; > + > + p = *(u8 **)srcbufs; Nope, I'd like to support the cases where srcbufs are not contiguous, so that does not work. > + for (i = 0; i < bufsize; i++) { > + v = 0; You can declare the v variable here, since its scope is limited to the for loop. BTW, v, m, can't we pick better names? I guess v is for val, but I'm not even sure what m stands for. > + for (j = 0; j < 8; j++) { > + m = 0; > + for (k = 0; k < nbufs; k++) > + m += GET_BIT(j, p[k*bufsize + i]); for (k = 0; k < nbufs; k++) { const u8 *srcbuf = srcbufs[j]; if (srcbuf[i] & BIT(k)) m++; } > + if (m > nbufs/2) Space between operands and operators please if (m > nbufs / 2) > + v |= BIT(j); > + } > + ((u8 *)dstbuf)[i] = v; > + } > +} > + > /* > * Check if the NAND chip is ONFI compliant, returns 1 if it is, 0 otherwise. > */ > @@ -5102,7 +5130,7 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > return 0; > > /* ONFI chip: allocate a buffer to hold its parameter page */ > - p = kzalloc(sizeof(*p), GFP_KERNEL); > + p = kzalloc((sizeof(*p) * 3), GFP_KERNEL); > if (!p) > return -ENOMEM; > > @@ -5113,21 +5141,29 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > } > > for (i = 0; i < 3; i++) { > - ret = nand_read_data_op(chip, p, sizeof(*p), true); > + ret = nand_read_data_op(chip, &p[i], sizeof(*p), true); > if (ret) { > ret = 0; > goto free_onfi_param_page; > } > > - if (onfi_crc16(ONFI_CRC_BASE, (uint8_t *)p, 254) == > + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)&p[i], 254) == > le16_to_cpu(p->crc)) { > + if (i) > + memcpy(p, &p[i], sizeof(*p)); > break; > } > } > > if (i == 3) { const void *srcbufs[3] = {p, p + 1, p + 2}; > - pr_err("Could not find valid ONFI parameter page; aborting\n"); > - goto free_onfi_param_page; > + pr_err("Could not find valid ONFI parameter page\n"); > + pr_info("Recover ONFI params with bit-wise majority\n"); > + nand_bit_wise_majority((const void **)&p, p, 3, sizeof(*p)); nand_bit_wise_majority(srcbufs, ARRAY_SIZE(srcbufs), p, sizeof(*p)) > + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)p, 254) != > + le16_to_cpu(p->crc)) { > + pr_err("ONFI parameter recovery failed, aborting\n"); > + goto free_onfi_param_page; > + } > } > > /* Check version */ Thanks, Boris