Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1653254imm; Wed, 16 May 2018 00:44:12 -0700 (PDT) X-Google-Smtp-Source: AB8JxZolDJs1XYSzDCFinKarnH3ADQLzIc7+x9gEQPturfx2hN/jqPYSZ2BbpuUM1TQ/3XviDqv/ X-Received: by 2002:a62:dc8a:: with SMTP id c10-v6mr18888867pfl.183.1526456652461; Wed, 16 May 2018 00:44:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526456652; cv=none; d=google.com; s=arc-20160816; b=y6p05yhyyP3s6gqDJyG2rWhH6ZGRXC6LkKDk9vNEd6Y/fPjC9r0tVQ4WQmY2utcbDL b42PjxmdVxD9FsuqtHA5XQ34FNh+zT1YNd34RRH0vhZUo888DvSm7Vrbo+u1G/ULcqz0 ZtzV0h0gDMm84TEUiZENmE3mTQeRN56zoUo3CeMlKhTio2HU367aw4nIB/mEqia7nIZC iiaB6S58bcf8wn7Akkj62H383A+aG9ja1IyDDK4GOxx7+eIxzzLyaVyoNpGDUUbr3Ev9 uaWuzBXhXJO8flQVRY0zlHCTkwsezy1dl1VA2cvtTe+/8cjd+WxIkBEAGGp5sO4Wd9qx CHkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=k6w9hyKws8CfMMOmzeZker3Rnqes61XlYoefNIDoPpI=; b=opPcF+Y7ThIF2g4nHzJcuCAoJSTztZCALZegGerwSYHqP53TRkyroCE8g4hRJteLvx TB50+/IK2WoMIQ5c6RSYZNaMirmUbjS+oIUvNivCobntgbiocpODPlVF5E70enezjmsK E7XIVE8Uhp3LKzvTLoO2Kp66gjFaIpvYptn28bHMXus7oVmTTFUSBD8wyAVKVwFZMw3T BTduvJOBAKiE7ibzLGtZj2kJ14o8ANfLVhrlerEg/X6A/Gb8Ge4vbKGbQJrYB60G/Vn+ rMmCV3nX/5gxbbmb5lfvRzs3bSDn3mSu/UyqIRxuLZQ7KngqA+kSdtDYLaq76YKt3X0+ 2Kyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x143-v6si1625027pgx.378.2018.05.16.00.43.58; Wed, 16 May 2018 00:44:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752550AbeEPHmj convert rfc822-to-8bit (ORCPT + 99 others); Wed, 16 May 2018 03:42:39 -0400 Received: from mail.bootlin.com ([62.4.15.54]:57806 "EHLO mail.bootlin.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751449AbeEPHma (ORCPT ); Wed, 16 May 2018 03:42:30 -0400 Received: by mail.bootlin.com (Postfix, from userid 110) id D25BA20896; Wed, 16 May 2018 09:42:27 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.bootlin.com X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT shortcircuit=ham autolearn=disabled version=3.4.0 Received: from xps13 (LStLambert-657-1-97-87.w90-63.abo.wanadoo.fr [90.63.216.87]) by mail.bootlin.com (Postfix) with ESMTPSA id 74F6B2072C; Wed, 16 May 2018 09:42:27 +0200 (CEST) Date: Wed, 16 May 2018 09:42:27 +0200 From: Miquel Raynal To: Chris Moore Cc: Boris Brezillon , "Wan, Jane (Nokia - US/Sunnyvale)" , "dwmw2@infradead.org" , "computersforpeace@gmail.com" , "richard@nod.at" , "marek.vasut@gmail.com" , "yamada.masahiro@socionext.com" , "prabhakar.kushwaha@nxp.com" , "shawnguo@kernel.org" , "jagdish.gediya@nxp.com" , "shreeya.patel23498@gmail.com" , "Bos, Ties (Nokia - US/Sunnyvale)" , "linux-mtd@lists.infradead.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH v7] mtd: rawnand: use bit-wise majority to recover the contents of ONFI parameter Message-ID: <20180516094227.14132e74@xps13> In-Reply-To: References: <20180515093429.34902670@bbrezillon> Organization: Bootlin X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Chris, > >>> +static void nand_bit_wise_majority(const void **srcbufs, > >>> + unsigned int nsrcbufs, > >>> + void *dstbuf, > >>> + unsigned int bufsize) > >>> +{ > >>> + int i, j, k; > >>> + > >>> + for (i = 0; i < bufsize; i++) { > >>> + u8 cnt, val; > >>> + > >>> + val = 0; > >>> + for (j = 0; j < 8; j++) { > >>> + cnt = 0; > >>> + for (k = 0; k < nsrcbufs; k++) { > >>> + const u8 *srcbuf = srcbufs[k]; > >>> + > >>> + if (srcbuf[i] & BIT(j)) > >>> + cnt++; > >>> + } > >>> + if (cnt > nsrcbufs / 2) > >>> + val |= BIT(j); > >>> + } > >>> + ((u8 *)dstbuf)[i] = val; > >>> + } > >>> +} > >>> + > >>> +/* > >>> * Check if the NAND chip is ONFI compliant, returns 1 if it is, 0 otherwise. > >>> */ > >>> static int nand_flash_detect_onfi(struct nand_chip *chip) > >>> @@ -5102,7 +5131,7 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > >>> return 0; > >>> >>> /* ONFI chip: allocate a buffer to hold its parameter page */ > >>> - p = kzalloc(sizeof(*p), GFP_KERNEL); > >>> + p = kzalloc((sizeof(*p) * 3), GFP_KERNEL); > >>> if (!p) > >>> return -ENOMEM; > >>> >>> @@ -5113,21 +5142,32 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > >>> } > >>> >>> for (i = 0; i < 3; i++) { > >>> - ret = nand_read_data_op(chip, p, sizeof(*p), true); > >>> + ret = nand_read_data_op(chip, &p[i], sizeof(*p), true); > >>> if (ret) { > >>> ret = 0; > >>> goto free_onfi_param_page; > >>> } > >>> >>> - if (onfi_crc16(ONFI_CRC_BASE, (uint8_t *)p, 254) == > >>> + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)&p[i], 254) == > >>> le16_to_cpu(p->crc)) { > >>> + if (i) > >>> + memcpy(p, &p[i], sizeof(*p)); > >>> break; > >>> } > >>> } > >>> >>> if (i == 3) { > >>> - pr_err("Could not find valid ONFI parameter page; aborting\n"); > >>> - goto free_onfi_param_page; > >>> + const void *srcbufs[3] = {p, p + 1, p + 2}; > >>> + > >>> + pr_warn("Could not find a valid ONFI parameter page, trying bit-wise majority to recover it\n"); > >>> + nand_bit_wise_majority(srcbufs, ARRAY_SIZE(srcbufs), p, > >>> + sizeof(*p)); > >>> + > >>> + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)p, 254) != > >>> + le16_to_cpu(p->crc)) { > >>> + pr_err("ONFI parameter recovery failed, aborting\n"); > >>> + goto free_onfi_param_page; > >>> + } > >>> } > >>> >>> /* Check version */ > >> This version is still hard coded for a three sample bitwise majority vote. > >> So why not use the method which I suggested previously for v2 and which > >> I repeat below? > > Because I want the nand_bit_wise_majority() function to work with > > nsrcbufs > 3 (the ONFI spec says there's at least 3 copy of the param > > page, but NAND vendor can decide to put more). Also, if the X copies of > > the PARAM are corrupted (which is rather unlikely), that means we > > already spent quite a lot of time reading the different copies and > > calculating the CRC, so I think we don't care about perf optimizations > > when doing bit-wise majority. > > > >> The three sample bitwise majority can be implemented without bit level > >> manipulation using the identity: > >> majority3(a, b, c) = (a & b) | (a & c) | (b & c) > >> This can be factorized slightly to (a & (b | c)) | (b & c) > >> This enables the operation to be performed 8, 16, 32 or even 64 bits at > >> a time depending on the hardware. > >> > >> This method is not only faster and but also more compact. > >> > > I do understand that the ONFI specifications permit more than 3 copies. > However elsewhere the proposed code shows no intention of handling other cases. > The constant 3 is hard coded in the following lines extracted from the proposed code: > ... > +    p = kzalloc((sizeof(*p) * 3), GFP_KERNEL); > ... >      for (i = 0; i < 3; i++) { > ... >      if (i == 3) { > ... > +        const void *srcbufs[3] = {p, p + 1, p + 2}; > > Moreover the last of these is difficult to generalize. Indeed, this is something to improve. I think Boris' request was to prepare changes like this one, to avoid the situation where the code does not scale (like this 'p, p + 1, p + 2'). Thanks, Miquèl