Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1733423imm; Wed, 16 May 2018 02:09:32 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoO8Xe/WDIizt1p+lzZa5ht0r17yEaMGhcVJN8xIXhVYiE8fVLf+1STQMSCLAjyixCJA+Eo X-Received: by 2002:a63:740c:: with SMTP id p12-v6mr10047pgc.259.1526461772590; Wed, 16 May 2018 02:09:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526461772; cv=none; d=google.com; s=arc-20160816; b=jLg6IMfuNr81JGDG9+7tlZ/UCelnOCUZgs7oxHlP4EIG/lL3yA3PivEBh954j60fJr jZKOpJb6w8owLDWI05O0uGsw6tBFL3SCnaQXBz0hNfdHeT28CGpkttOHS5E2e+ZQ3hox jmhX5vO3cvnOl6Yva7zTP0EKvExGc9p08OGCNFQWpHmlNyMfTaFEexHurQVh7CadsU/c yGx6FGDhGCo1ZLVi0O8zoLDi7C+FPrQH029qamCFXhUvpfo6ceBjadiUPDn2sQelS7e1 4vqypxLBTdPaoM8FzZWNHkuootIIzeKbFWYV9oSy8H9sweiWzjHt4pBaUuw+bDmbGQB3 syJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=uxGtw7yFjMPXRf/7Z8fyPRWnWcf2YlyawHUCxnyZIX8=; b=b0wh384ufEVYBwbmjizTX4pRxONdBwK3FapWByztTvDVS5zl2DbcKNR2CESgZnf7WC dCrK3Y95ztLAjJIdRujycsHOHuwzAqP1NQQmK39Bl8OUGeGKOuIFCJ1E67jT2Dn/QU5J TWKQ/jxGPhn1QSXjvG7Xfxy5wOvzt4L61xPcVeOEIMUNampjv3GtyR/55mVczmhZn+Hk XI2xu+QQxChMjpgX9/fsf3pp+gjm8aGNTW7fIzu/vwHmjiW45hFh0nF+NzlF5g5a+eUC jipUGeMrpe/QrDImwb8wWF01x+ZWwO8H0WrQrdCZPV5p39NLJMl3T58xEN0S+EkgiUw9 u6uA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z73-v6si2344407pfj.197.2018.05.16.02.09.18; Wed, 16 May 2018 02:09:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752443AbeEPJI4 convert rfc822-to-8bit (ORCPT + 99 others); Wed, 16 May 2018 05:08:56 -0400 Received: from mail.bootlin.com ([62.4.15.54]:33506 "EHLO mail.bootlin.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752389AbeEPJIw (ORCPT ); Wed, 16 May 2018 05:08:52 -0400 Received: by mail.bootlin.com (Postfix, from userid 110) id 68D3120726; Wed, 16 May 2018 11:08:49 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.bootlin.com X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,SHORTCIRCUIT, URIBL_BLOCKED shortcircuit=ham autolearn=disabled version=3.4.0 Received: from bbrezillon (91-160-177-164.subs.proxad.net [91.160.177.164]) by mail.bootlin.com (Postfix) with ESMTPSA id 04EAA2038E; Wed, 16 May 2018 11:08:39 +0200 (CEST) Date: Wed, 16 May 2018 11:08:39 +0200 From: Boris Brezillon To: Miquel Raynal Cc: Chris Moore , "Wan, Jane (Nokia - US/Sunnyvale)" , "dwmw2@infradead.org" , "computersforpeace@gmail.com" , "richard@nod.at" , "marek.vasut@gmail.com" , "yamada.masahiro@socionext.com" , "prabhakar.kushwaha@nxp.com" , "shawnguo@kernel.org" , "jagdish.gediya@nxp.com" , "shreeya.patel23498@gmail.com" , "Bos, Ties (Nokia - US/Sunnyvale)" , "linux-mtd@lists.infradead.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH v7] mtd: rawnand: use bit-wise majority to recover the contents of ONFI parameter Message-ID: <20180516110839.46e881c6@bbrezillon> In-Reply-To: <20180516094227.14132e74@xps13> References: <20180515093429.34902670@bbrezillon> <20180516094227.14132e74@xps13> X-Mailer: Claws Mail 3.15.0-dirty (GTK+ 2.24.31; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 16 May 2018 09:42:27 +0200 Miquel Raynal wrote: > Hi Chris, > > > >>> +static void nand_bit_wise_majority(const void **srcbufs, > > >>> + unsigned int nsrcbufs, > > >>> + void *dstbuf, > > >>> + unsigned int bufsize) > > >>> +{ > > >>> + int i, j, k; > > >>> + > > >>> + for (i = 0; i < bufsize; i++) { > > >>> + u8 cnt, val; > > >>> + > > >>> + val = 0; > > >>> + for (j = 0; j < 8; j++) { > > >>> + cnt = 0; > > >>> + for (k = 0; k < nsrcbufs; k++) { > > >>> + const u8 *srcbuf = srcbufs[k]; > > >>> + > > >>> + if (srcbuf[i] & BIT(j)) > > >>> + cnt++; > > >>> + } > > >>> + if (cnt > nsrcbufs / 2) > > >>> + val |= BIT(j); > > >>> + } > > >>> + ((u8 *)dstbuf)[i] = val; > > >>> + } > > >>> +} > > >>> + > > >>> +/* > > >>> * Check if the NAND chip is ONFI compliant, returns 1 if it is, 0 otherwise. > > >>> */ > > >>> static int nand_flash_detect_onfi(struct nand_chip *chip) > > >>> @@ -5102,7 +5131,7 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > > >>> return 0; > > >>> >>> /* ONFI chip: allocate a buffer to hold its parameter page */ > > >>> - p = kzalloc(sizeof(*p), GFP_KERNEL); > > >>> + p = kzalloc((sizeof(*p) * 3), GFP_KERNEL); > > >>> if (!p) > > >>> return -ENOMEM; > > >>> >>> @@ -5113,21 +5142,32 @@ static int nand_flash_detect_onfi(struct nand_chip *chip) > > >>> } > > >>> >>> for (i = 0; i < 3; i++) { > > >>> - ret = nand_read_data_op(chip, p, sizeof(*p), true); > > >>> + ret = nand_read_data_op(chip, &p[i], sizeof(*p), true); > > >>> if (ret) { > > >>> ret = 0; > > >>> goto free_onfi_param_page; > > >>> } > > >>> >>> - if (onfi_crc16(ONFI_CRC_BASE, (uint8_t *)p, 254) == > > >>> + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)&p[i], 254) == > > >>> le16_to_cpu(p->crc)) { > > >>> + if (i) > > >>> + memcpy(p, &p[i], sizeof(*p)); > > >>> break; > > >>> } > > >>> } > > >>> >>> if (i == 3) { > > >>> - pr_err("Could not find valid ONFI parameter page; aborting\n"); > > >>> - goto free_onfi_param_page; > > >>> + const void *srcbufs[3] = {p, p + 1, p + 2}; > > >>> + > > >>> + pr_warn("Could not find a valid ONFI parameter page, trying bit-wise majority to recover it\n"); > > >>> + nand_bit_wise_majority(srcbufs, ARRAY_SIZE(srcbufs), p, > > >>> + sizeof(*p)); > > >>> + > > >>> + if (onfi_crc16(ONFI_CRC_BASE, (u8 *)p, 254) != > > >>> + le16_to_cpu(p->crc)) { > > >>> + pr_err("ONFI parameter recovery failed, aborting\n"); > > >>> + goto free_onfi_param_page; > > >>> + } > > >>> } > > >>> >>> /* Check version */ > > >> This version is still hard coded for a three sample bitwise majority vote. > > >> So why not use the method which I suggested previously for v2 and which > > >> I repeat below? > > > Because I want the nand_bit_wise_majority() function to work with > > > nsrcbufs > 3 (the ONFI spec says there's at least 3 copy of the param > > > page, but NAND vendor can decide to put more). Also, if the X copies of > > > the PARAM are corrupted (which is rather unlikely), that means we > > > already spent quite a lot of time reading the different copies and > > > calculating the CRC, so I think we don't care about perf optimizations > > > when doing bit-wise majority. > > > > > >> The three sample bitwise majority can be implemented without bit level > > >> manipulation using the identity: > > >> majority3(a, b, c) = (a & b) | (a & c) | (b & c) > > >> This can be factorized slightly to (a & (b | c)) | (b & c) > > >> This enables the operation to be performed 8, 16, 32 or even 64 bits at > > >> a time depending on the hardware. > > >> > > >> This method is not only faster and but also more compact. > > >> > > > > I do understand that the ONFI specifications permit more than 3 copies. > > However elsewhere the proposed code shows no intention of handling other cases. > > The constant 3 is hard coded in the following lines extracted from the proposed code: > > ... > > +    p = kzalloc((sizeof(*p) * 3), GFP_KERNEL); > > ... > >      for (i = 0; i < 3; i++) { > > ... > >      if (i == 3) { > > ... > > +        const void *srcbufs[3] = {p, p + 1, p + 2}; > > > > Moreover the last of these is difficult to generalize. > > Indeed, this is something to improve. I think Boris' request was to > prepare changes like this one, to avoid the situation where the code > does not scale (like this 'p, p + 1, p + 2'). Yep, here is a quick/untested patch [1] making ONFI param page detection and recovery more robust by reading more than 3 param pages if there are more. And that's the reason I want a generic bit-wise majority helper, not something that only works for 3 copies. [1]http://code.bulix.org/t21eys-335698