Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1851302imm; Sat, 12 May 2018 01:21:30 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrTRS7+DYqCGtgkqbvvVeWykdWJK4opgX/15jDHBNzc7/2TFbhBLsjeqVzDDGXDBTi9G9Tu X-Received: by 2002:a62:d605:: with SMTP id r5-v6mr2271201pfg.8.1526113290179; Sat, 12 May 2018 01:21:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526113290; cv=none; d=google.com; s=arc-20160816; b=tol2Nog8XXso/sS7JJnNa1rKJsM7fi/Wr7MFdAI48n/fUJB+kG6RCC8bsImG33wfKr narmYDhYiXwpu+kf7Mv2UCTSp/Pr05oUYrdByfjVvAtIOk/aQOYHfuwK6P7zu5vShbjG G1MqpyN7epSktpJ81aH6NLmg/Wt1ieEZrOcni0zzkCGE/8i69eeeZs76moF+J9koQFFL a3vfGZ5TpzWDHa0e8gukzREnlmxad6nNtTPcicbg7VunmlYaU2wvIikos34YqNc9VH+P m6YdOhfQML0z0go4QpEFDD9eEeB0yrCdSfBd2Ahi8Sg3aTq8mmZ90iIFLJLSz8gx1YyX 9GTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=mpHj5hUmKKIVJa4SzkrCmPSvv4Gj2Qbpzn5Anx88F+4=; b=q6hoWyA9H/mUn1AKY5u1pjJu95KXhIYSSqL8qGZsfeKe7XlTXENxip/wq0R0no3B/5 oCYTe08QVMPWfEG6wXGDUPrzluDSQQvQ5GTeYqx1iTP3N1wYsYcvDHIvwoszGtoIiOZP bLRlOUhKiMkXTTiO7cY1nW+AsO7Vq1NyMpV9IV8UNp1hGHfHEwTZQvVC6xa7iwP7y+Sj +krytDPzRqBRD7BE/em+6MsA0m6praAK7aAJplG90lOGWDPiTdZgu9o76VAwGN4RZ18C WsR5+CWyxnaqPoFX1hMIOr7DGDeFnDX5+12Ug8dkYVjlnCsF7IIJ7Nkr7wIZA9+fC8LC 1aTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b40-v6si4972109plb.44.2018.05.12.01.21.02; Sat, 12 May 2018 01:21:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750805AbeELIUy (ORCPT + 99 others); Sat, 12 May 2018 04:20:54 -0400 Received: from mail.bootlin.com ([62.4.15.54]:33722 "EHLO mail.bootlin.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750722AbeELIUx (ORCPT ); Sat, 12 May 2018 04:20:53 -0400 Received: by mail.bootlin.com (Postfix, from userid 110) id 00E3F207D4; Sat, 12 May 2018 10:20:50 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.bootlin.com X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT shortcircuit=ham autolearn=disabled version=3.4.0 Received: from bbrezillon (91-160-177-164.subs.proxad.net [91.160.177.164]) by mail.bootlin.com (Postfix) with ESMTPSA id 9848F2038E; Sat, 12 May 2018 10:20:40 +0200 (CEST) Date: Sat, 12 May 2018 10:20:40 +0200 From: Boris Brezillon To: Jane Wan Cc: miquel.raynal@bootlin.com, dwmw2@infradead.org, computersforpeace@gmail.com, richard@nod.at, marek.vasut@gmail.com, yamada.masahiro@socionext.com, prabhakar.kushwaha@nxp.com, shawnguo@kernel.org, jagdish.gediya@nxp.com, shreeya.patel23498@gmail.com, linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, ties.bos@nokia.com Subject: Re: [PATCH v6] mtd: rawnand: use bit-wise majority to recover the contents of ONFI parameter Message-ID: <20180512102040.3e5c2cbe@bbrezillon> In-Reply-To: <1525987717-31675-1-git-send-email-Jane.Wan@nokia.com> References: <1525987717-31675-1-git-send-email-Jane.Wan@nokia.com> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 10 May 2018 14:28:37 -0700 Jane Wan wrote: > Per ONFI specification (Rev. 4.0), if all parameter pages have invalid > CRC values, the bit-wise majority may be used to recover the contents of > the parameter pages from the parameter page copies present. > > Signed-off-by: Jane Wan > --- > v6: support the cases that srcbufs are not contiguous > v5: make the bit-wise majority functon generic > v4: move the bit-wise majority code in a separate function > v3: fix warning message detected by kbuild test robot > v2: rebase the changes on top of v4.17-rc1 > > drivers/mtd/nand/raw/nand_base.c | 52 ++++++++++++++++++++++++++++++++++---- > 1 file changed, 47 insertions(+), 5 deletions(-) > > diff --git a/drivers/mtd/nand/raw/nand_base.c b/drivers/mtd/nand/raw/nand_base.c > index 72f3a89..acf905c 100644 > --- a/drivers/mtd/nand/raw/nand_base.c > +++ b/drivers/mtd/nand/raw/nand_base.c > @@ -5087,6 +5087,35 @@ static int nand_flash_detect_ext_param_page(struct nand_chip *chip, > } > > /* > + * Recover data with bit-wise majority > + */ > +static void nand_bit_wise_majority(const void **srcbufs, > + unsigned int nsrcbufs, > + void *dstbuf, > + unsigned int bufsize) > +{ > + int i, j, k; > + > + for (i = 0; i < bufsize; i++) { > + u8 cnt, val; > + > + val = 0; > + for (j = 0; j < 8; j++) { > + cnt = 0; > + for (k = 0; k < nsrcbufs; k++) { > + const u8 *srcbuf = srcbufs[k]; > + > + if (srcbuf[i] & BIT(j)) > + cnt++; > + } > + if (cnt > nsrcbufs / 2) > + val |= BIT(j); > + } > + ((u8 *)dstbuf)[i] = val; > + } > +} > + > +/* > * Check if the NAND chip is ONFI compliant, returns 1 if it is, 0 otherwise. > */ > static int nand_flash_detect_onfi(struct nand_chip *chip) > @@ -5102,7 +5131,7 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > return 0; > > /* ONFI chip: allocate a buffer to hold its parameter page */ > - p = kzalloc(sizeof(*p), GFP_KERNEL); > + p = kzalloc((sizeof(*p) * 3), GFP_KERNEL); > if (!p) > return -ENOMEM; > > @@ -5113,21 +5142,34 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > } > > for (i = 0; i < 3; i++) { > - ret = nand_read_data_op(chip, p, sizeof(*p), true); > + ret = nand_read_data_op(chip, &p[i], sizeof(*p), true); > if (ret) { > ret = 0; > goto free_onfi_param_page; > } > > - if (onfi_crc16(ONFI_CRC_BASE, (uint8_t *)p, 254) == > + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)&p[i], 254) == > le16_to_cpu(p->crc)) { > + if (i) > + memcpy(p, &p[i], sizeof(*p)); > break; > } > } > > if (i == 3) { > - pr_err("Could not find valid ONFI parameter page; aborting\n"); > - goto free_onfi_param_page; > + const void *srcbufs[3] = {p, p + 1, p + 2}; > + > + pr_err("Could not find valid ONFI parameter page\n"); Maybe pr_warn() here > + pr_info("Recover ONFI params with bit-wise majority\n"); and maybe you can pack the 2 messages: pr_warn("Could not find a valid ONFI parameter page, trying bit-wise majority to recover it"); > + > + nand_bit_wise_majority(srcbufs, ARRAY_SIZE(srcbufs), p, > + sizeof(*p)); > + > + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)p, 254) != > + le16_to_cpu(p->crc)) { > + pr_err("ONFI parameter recovery failed, aborting\n"); > + goto free_onfi_param_page; > + } > } > > /* Check version */