docecc.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522
  1. /*
  2. * ECC algorithm for M-systems disk on chip. We use the excellent Reed
  3. * Solmon code of Phil Karn (karn@ka9q.ampr.org) available under the
  4. * GNU GPL License. The rest is simply to convert the disk on chip
  5. * syndrome into a standard syndome.
  6. *
  7. * Author: Fabrice Bellard (fabrice.bellard@netgem.com)
  8. * Copyright (C) 2000 Netgem S.A.
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License as published by
  12. * the Free Software Foundation; either version 2 of the License, or
  13. * (at your option) any later version.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. * GNU General Public License for more details.
  19. *
  20. * You should have received a copy of the GNU General Public License
  21. * along with this program; if not, write to the Free Software
  22. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  23. */
  24. #include <linux/kernel.h>
  25. #include <linux/module.h>
  26. #include <asm/errno.h>
  27. #include <asm/io.h>
  28. #include <asm/uaccess.h>
  29. #include <linux/delay.h>
  30. #include <linux/slab.h>
  31. #include <linux/init.h>
  32. #include <linux/types.h>
  33. #include <linux/mtd/mtd.h>
  34. #include <linux/mtd/doc2000.h>
  35. #define DEBUG_ECC 0
  36. /* need to undef it (from asm/termbits.h) */
  37. #undef B0
  38. #define MM 10 /* Symbol size in bits */
  39. #define KK (1023-4) /* Number of data symbols per block */
  40. #define B0 510 /* First root of generator polynomial, alpha form */
  41. #define PRIM 1 /* power of alpha used to generate roots of generator poly */
  42. #define NN ((1 << MM) - 1)
  43. typedef unsigned short dtype;
  44. /* 1+x^3+x^10 */
  45. static const int Pp[MM+1] = { 1, 0, 0, 1, 0, 0, 0, 0, 0, 0, 1 };
  46. /* This defines the type used to store an element of the Galois Field
  47. * used by the code. Make sure this is something larger than a char if
  48. * if anything larger than GF(256) is used.
  49. *
  50. * Note: unsigned char will work up to GF(256) but int seems to run
  51. * faster on the Pentium.
  52. */
  53. typedef int gf;
  54. /* No legal value in index form represents zero, so
  55. * we need a special value for this purpose
  56. */
  57. #define A0 (NN)
  58. /* Compute x % NN, where NN is 2**MM - 1,
  59. * without a slow divide
  60. */
  61. static inline gf
  62. modnn(int x)
  63. {
  64. while (x >= NN) {
  65. x -= NN;
  66. x = (x >> MM) + (x & NN);
  67. }
  68. return x;
  69. }
  70. #define CLEAR(a,n) {\
  71. int ci;\
  72. for(ci=(n)-1;ci >=0;ci--)\
  73. (a)[ci] = 0;\
  74. }
  75. #define COPY(a,b,n) {\
  76. int ci;\
  77. for(ci=(n)-1;ci >=0;ci--)\
  78. (a)[ci] = (b)[ci];\
  79. }
  80. #define COPYDOWN(a,b,n) {\
  81. int ci;\
  82. for(ci=(n)-1;ci >=0;ci--)\
  83. (a)[ci] = (b)[ci];\
  84. }
  85. #define Ldec 1
  86. /* generate GF(2**m) from the irreducible polynomial p(X) in Pp[0]..Pp[m]
  87. lookup tables: index->polynomial form alpha_to[] contains j=alpha**i;
  88. polynomial form -> index form index_of[j=alpha**i] = i
  89. alpha=2 is the primitive element of GF(2**m)
  90. HARI's COMMENT: (4/13/94) alpha_to[] can be used as follows:
  91. Let @ represent the primitive element commonly called "alpha" that
  92. is the root of the primitive polynomial p(x). Then in GF(2^m), for any
  93. 0 <= i <= 2^m-2,
  94. @^i = a(0) + a(1) @ + a(2) @^2 + ... + a(m-1) @^(m-1)
  95. where the binary vector (a(0),a(1),a(2),...,a(m-1)) is the representation
  96. of the integer "alpha_to[i]" with a(0) being the LSB and a(m-1) the MSB. Thus for
  97. example the polynomial representation of @^5 would be given by the binary
  98. representation of the integer "alpha_to[5]".
  99. Similarly, index_of[] can be used as follows:
  100. As above, let @ represent the primitive element of GF(2^m) that is
  101. the root of the primitive polynomial p(x). In order to find the power
  102. of @ (alpha) that has the polynomial representation
  103. a(0) + a(1) @ + a(2) @^2 + ... + a(m-1) @^(m-1)
  104. we consider the integer "i" whose binary representation with a(0) being LSB
  105. and a(m-1) MSB is (a(0),a(1),...,a(m-1)) and locate the entry
  106. "index_of[i]". Now, @^index_of[i] is that element whose polynomial
  107. representation is (a(0),a(1),a(2),...,a(m-1)).
  108. NOTE:
  109. The element alpha_to[2^m-1] = 0 always signifying that the
  110. representation of "@^infinity" = 0 is (0,0,0,...,0).
  111. Similarly, the element index_of[0] = A0 always signifying
  112. that the power of alpha which has the polynomial representation
  113. (0,0,...,0) is "infinity".
  114. */
  115. static void
  116. generate_gf(dtype Alpha_to[NN + 1], dtype Index_of[NN + 1])
  117. {
  118. register int i, mask;
  119. mask = 1;
  120. Alpha_to[MM] = 0;
  121. for (i = 0; i < MM; i++) {
  122. Alpha_to[i] = mask;
  123. Index_of[Alpha_to[i]] = i;
  124. /* If Pp[i] == 1 then, term @^i occurs in poly-repr of @^MM */
  125. if (Pp[i] != 0)
  126. Alpha_to[MM] ^= mask; /* Bit-wise EXOR operation */
  127. mask <<= 1; /* single left-shift */
  128. }
  129. Index_of[Alpha_to[MM]] = MM;
  130. /*
  131. * Have obtained poly-repr of @^MM. Poly-repr of @^(i+1) is given by
  132. * poly-repr of @^i shifted left one-bit and accounting for any @^MM
  133. * term that may occur when poly-repr of @^i is shifted.
  134. */
  135. mask >>= 1;
  136. for (i = MM + 1; i < NN; i++) {
  137. if (Alpha_to[i - 1] >= mask)
  138. Alpha_to[i] = Alpha_to[MM] ^ ((Alpha_to[i - 1] ^ mask) << 1);
  139. else
  140. Alpha_to[i] = Alpha_to[i - 1] << 1;
  141. Index_of[Alpha_to[i]] = i;
  142. }
  143. Index_of[0] = A0;
  144. Alpha_to[NN] = 0;
  145. }
  146. /*
  147. * Performs ERRORS+ERASURES decoding of RS codes. bb[] is the content
  148. * of the feedback shift register after having processed the data and
  149. * the ECC.
  150. *
  151. * Return number of symbols corrected, or -1 if codeword is illegal
  152. * or uncorrectable. If eras_pos is non-null, the detected error locations
  153. * are written back. NOTE! This array must be at least NN-KK elements long.
  154. * The corrected data are written in eras_val[]. They must be xor with the data
  155. * to retrieve the correct data : data[erase_pos[i]] ^= erase_val[i] .
  156. *
  157. * First "no_eras" erasures are declared by the calling program. Then, the
  158. * maximum # of errors correctable is t_after_eras = floor((NN-KK-no_eras)/2).
  159. * If the number of channel errors is not greater than "t_after_eras" the
  160. * transmitted codeword will be recovered. Details of algorithm can be found
  161. * in R. Blahut's "Theory ... of Error-Correcting Codes".
  162. * Warning: the eras_pos[] array must not contain duplicate entries; decoder failure
  163. * will result. The decoder *could* check for this condition, but it would involve
  164. * extra time on every decoding operation.
  165. * */
  166. static int
  167. eras_dec_rs(dtype Alpha_to[NN + 1], dtype Index_of[NN + 1],
  168. gf bb[NN - KK + 1], gf eras_val[NN-KK], int eras_pos[NN-KK],
  169. int no_eras)
  170. {
  171. int deg_lambda, el, deg_omega;
  172. int i, j, r,k;
  173. gf u,q,tmp,num1,num2,den,discr_r;
  174. gf lambda[NN-KK + 1], s[NN-KK + 1]; /* Err+Eras Locator poly
  175. * and syndrome poly */
  176. gf b[NN-KK + 1], t[NN-KK + 1], omega[NN-KK + 1];
  177. gf root[NN-KK], reg[NN-KK + 1], loc[NN-KK];
  178. int syn_error, count;
  179. syn_error = 0;
  180. for(i=0;i<NN-KK;i++)
  181. syn_error |= bb[i];
  182. if (!syn_error) {
  183. /* if remainder is zero, data[] is a codeword and there are no
  184. * errors to correct. So return data[] unmodified
  185. */
  186. count = 0;
  187. goto finish;
  188. }
  189. for(i=1;i<=NN-KK;i++){
  190. s[i] = bb[0];
  191. }
  192. for(j=1;j<NN-KK;j++){
  193. if(bb[j] == 0)
  194. continue;
  195. tmp = Index_of[bb[j]];
  196. for(i=1;i<=NN-KK;i++)
  197. s[i] ^= Alpha_to[modnn(tmp + (B0+i-1)*PRIM*j)];
  198. }
  199. /* undo the feedback register implicit multiplication and convert
  200. syndromes to index form */
  201. for(i=1;i<=NN-KK;i++) {
  202. tmp = Index_of[s[i]];
  203. if (tmp != A0)
  204. tmp = modnn(tmp + 2 * KK * (B0+i-1)*PRIM);
  205. s[i] = tmp;
  206. }
  207. CLEAR(&lambda[1],NN-KK);
  208. lambda[0] = 1;
  209. if (no_eras > 0) {
  210. /* Init lambda to be the erasure locator polynomial */
  211. lambda[1] = Alpha_to[modnn(PRIM * eras_pos[0])];
  212. for (i = 1; i < no_eras; i++) {
  213. u = modnn(PRIM*eras_pos[i]);
  214. for (j = i+1; j > 0; j--) {
  215. tmp = Index_of[lambda[j - 1]];
  216. if(tmp != A0)
  217. lambda[j] ^= Alpha_to[modnn(u + tmp)];
  218. }
  219. }
  220. #if DEBUG_ECC >= 1
  221. /* Test code that verifies the erasure locator polynomial just constructed
  222. Needed only for decoder debugging. */
  223. /* find roots of the erasure location polynomial */
  224. for(i=1;i<=no_eras;i++)
  225. reg[i] = Index_of[lambda[i]];
  226. count = 0;
  227. for (i = 1,k=NN-Ldec; i <= NN; i++,k = modnn(NN+k-Ldec)) {
  228. q = 1;
  229. for (j = 1; j <= no_eras; j++)
  230. if (reg[j] != A0) {
  231. reg[j] = modnn(reg[j] + j);
  232. q ^= Alpha_to[reg[j]];
  233. }
  234. if (q != 0)
  235. continue;
  236. /* store root and error location number indices */
  237. root[count] = i;
  238. loc[count] = k;
  239. count++;
  240. }
  241. if (count != no_eras) {
  242. printf("\n lambda(x) is WRONG\n");
  243. count = -1;
  244. goto finish;
  245. }
  246. #if DEBUG_ECC >= 2
  247. printf("\n Erasure positions as determined by roots of Eras Loc Poly:\n");
  248. for (i = 0; i < count; i++)
  249. printf("%d ", loc[i]);
  250. printf("\n");
  251. #endif
  252. #endif
  253. }
  254. for(i=0;i<NN-KK+1;i++)
  255. b[i] = Index_of[lambda[i]];
  256. /*
  257. * Begin Berlekamp-Massey algorithm to determine error+erasure
  258. * locator polynomial
  259. */
  260. r = no_eras;
  261. el = no_eras;
  262. while (++r <= NN-KK) { /* r is the step number */
  263. /* Compute discrepancy at the r-th step in poly-form */
  264. discr_r = 0;
  265. for (i = 0; i < r; i++){
  266. if ((lambda[i] != 0) && (s[r - i] != A0)) {
  267. discr_r ^= Alpha_to[modnn(Index_of[lambda[i]] + s[r - i])];
  268. }
  269. }
  270. discr_r = Index_of[discr_r]; /* Index form */
  271. if (discr_r == A0) {
  272. /* 2 lines below: B(x) <-- x*B(x) */
  273. COPYDOWN(&b[1],b,NN-KK);
  274. b[0] = A0;
  275. } else {
  276. /* 7 lines below: T(x) <-- lambda(x) - discr_r*x*b(x) */
  277. t[0] = lambda[0];
  278. for (i = 0 ; i < NN-KK; i++) {
  279. if(b[i] != A0)
  280. t[i+1] = lambda[i+1] ^ Alpha_to[modnn(discr_r + b[i])];
  281. else
  282. t[i+1] = lambda[i+1];
  283. }
  284. if (2 * el <= r + no_eras - 1) {
  285. el = r + no_eras - el;
  286. /*
  287. * 2 lines below: B(x) <-- inv(discr_r) *
  288. * lambda(x)
  289. */
  290. for (i = 0; i <= NN-KK; i++)
  291. b[i] = (lambda[i] == 0) ? A0 : modnn(Index_of[lambda[i]] - discr_r + NN);
  292. } else {
  293. /* 2 lines below: B(x) <-- x*B(x) */
  294. COPYDOWN(&b[1],b,NN-KK);
  295. b[0] = A0;
  296. }
  297. COPY(lambda,t,NN-KK+1);
  298. }
  299. }
  300. /* Convert lambda to index form and compute deg(lambda(x)) */
  301. deg_lambda = 0;
  302. for(i=0;i<NN-KK+1;i++){
  303. lambda[i] = Index_of[lambda[i]];
  304. if(lambda[i] != A0)
  305. deg_lambda = i;
  306. }
  307. /*
  308. * Find roots of the error+erasure locator polynomial by Chien
  309. * Search
  310. */
  311. COPY(&reg[1],&lambda[1],NN-KK);
  312. count = 0; /* Number of roots of lambda(x) */
  313. for (i = 1,k=NN-Ldec; i <= NN; i++,k = modnn(NN+k-Ldec)) {
  314. q = 1;
  315. for (j = deg_lambda; j > 0; j--){
  316. if (reg[j] != A0) {
  317. reg[j] = modnn(reg[j] + j);
  318. q ^= Alpha_to[reg[j]];
  319. }
  320. }
  321. if (q != 0)
  322. continue;
  323. /* store root (index-form) and error location number */
  324. root[count] = i;
  325. loc[count] = k;
  326. /* If we've already found max possible roots,
  327. * abort the search to save time
  328. */
  329. if(++count == deg_lambda)
  330. break;
  331. }
  332. if (deg_lambda != count) {
  333. /*
  334. * deg(lambda) unequal to number of roots => uncorrectable
  335. * error detected
  336. */
  337. count = -1;
  338. goto finish;
  339. }
  340. /*
  341. * Compute err+eras evaluator poly omega(x) = s(x)*lambda(x) (modulo
  342. * x**(NN-KK)). in index form. Also find deg(omega).
  343. */
  344. deg_omega = 0;
  345. for (i = 0; i < NN-KK;i++){
  346. tmp = 0;
  347. j = (deg_lambda < i) ? deg_lambda : i;
  348. for(;j >= 0; j--){
  349. if ((s[i + 1 - j] != A0) && (lambda[j] != A0))
  350. tmp ^= Alpha_to[modnn(s[i + 1 - j] + lambda[j])];
  351. }
  352. if(tmp != 0)
  353. deg_omega = i;
  354. omega[i] = Index_of[tmp];
  355. }
  356. omega[NN-KK] = A0;
  357. /*
  358. * Compute error values in poly-form. num1 = omega(inv(X(l))), num2 =
  359. * inv(X(l))**(B0-1) and den = lambda_pr(inv(X(l))) all in poly-form
  360. */
  361. for (j = count-1; j >=0; j--) {
  362. num1 = 0;
  363. for (i = deg_omega; i >= 0; i--) {
  364. if (omega[i] != A0)
  365. num1 ^= Alpha_to[modnn(omega[i] + i * root[j])];
  366. }
  367. num2 = Alpha_to[modnn(root[j] * (B0 - 1) + NN)];
  368. den = 0;
  369. /* lambda[i+1] for i even is the formal derivative lambda_pr of lambda[i] */
  370. for (i = min(deg_lambda,NN-KK-1) & ~1; i >= 0; i -=2) {
  371. if(lambda[i+1] != A0)
  372. den ^= Alpha_to[modnn(lambda[i+1] + i * root[j])];
  373. }
  374. if (den == 0) {
  375. #if DEBUG_ECC >= 1
  376. printf("\n ERROR: denominator = 0\n");
  377. #endif
  378. /* Convert to dual- basis */
  379. count = -1;
  380. goto finish;
  381. }
  382. /* Apply error to data */
  383. if (num1 != 0) {
  384. eras_val[j] = Alpha_to[modnn(Index_of[num1] + Index_of[num2] + NN - Index_of[den])];
  385. } else {
  386. eras_val[j] = 0;
  387. }
  388. }
  389. finish:
  390. for(i=0;i<count;i++)
  391. eras_pos[i] = loc[i];
  392. return count;
  393. }
  394. /***************************************************************************/
  395. /* The DOC specific code begins here */
  396. #define SECTOR_SIZE 512
  397. /* The sector bytes are packed into NB_DATA MM bits words */
  398. #define NB_DATA (((SECTOR_SIZE + 1) * 8 + 6) / MM)
  399. /*
  400. * Correct the errors in 'sector[]' by using 'ecc1[]' which is the
  401. * content of the feedback shift register applyied to the sector and
  402. * the ECC. Return the number of errors corrected (and correct them in
  403. * sector), or -1 if error
  404. */
  405. int doc_decode_ecc(unsigned char sector[SECTOR_SIZE], unsigned char ecc1[6])
  406. {
  407. int parity, i, nb_errors;
  408. gf bb[NN - KK + 1];
  409. gf error_val[NN-KK];
  410. int error_pos[NN-KK], pos, bitpos, index, val;
  411. dtype *Alpha_to, *Index_of;
  412. /* init log and exp tables here to save memory. However, it is slower */
  413. Alpha_to = kmalloc((NN + 1) * sizeof(dtype), GFP_KERNEL);
  414. if (!Alpha_to)
  415. return -1;
  416. Index_of = kmalloc((NN + 1) * sizeof(dtype), GFP_KERNEL);
  417. if (!Index_of) {
  418. kfree(Alpha_to);
  419. return -1;
  420. }
  421. generate_gf(Alpha_to, Index_of);
  422. parity = ecc1[1];
  423. bb[0] = (ecc1[4] & 0xff) | ((ecc1[5] & 0x03) << 8);
  424. bb[1] = ((ecc1[5] & 0xfc) >> 2) | ((ecc1[2] & 0x0f) << 6);
  425. bb[2] = ((ecc1[2] & 0xf0) >> 4) | ((ecc1[3] & 0x3f) << 4);
  426. bb[3] = ((ecc1[3] & 0xc0) >> 6) | ((ecc1[0] & 0xff) << 2);
  427. nb_errors = eras_dec_rs(Alpha_to, Index_of, bb,
  428. error_val, error_pos, 0);
  429. if (nb_errors <= 0)
  430. goto the_end;
  431. /* correct the errors */
  432. for(i=0;i<nb_errors;i++) {
  433. pos = error_pos[i];
  434. if (pos >= NB_DATA && pos < KK) {
  435. nb_errors = -1;
  436. goto the_end;
  437. }
  438. if (pos < NB_DATA) {
  439. /* extract bit position (MSB first) */
  440. pos = 10 * (NB_DATA - 1 - pos) - 6;
  441. /* now correct the following 10 bits. At most two bytes
  442. can be modified since pos is even */
  443. index = (pos >> 3) ^ 1;
  444. bitpos = pos & 7;
  445. if ((index >= 0 && index < SECTOR_SIZE) ||
  446. index == (SECTOR_SIZE + 1)) {
  447. val = error_val[i] >> (2 + bitpos);
  448. parity ^= val;
  449. if (index < SECTOR_SIZE)
  450. sector[index] ^= val;
  451. }
  452. index = ((pos >> 3) + 1) ^ 1;
  453. bitpos = (bitpos + 10) & 7;
  454. if (bitpos == 0)
  455. bitpos = 8;
  456. if ((index >= 0 && index < SECTOR_SIZE) ||
  457. index == (SECTOR_SIZE + 1)) {
  458. val = error_val[i] << (8 - bitpos);
  459. parity ^= val;
  460. if (index < SECTOR_SIZE)
  461. sector[index] ^= val;
  462. }
  463. }
  464. }
  465. /* use parity to test extra errors */
  466. if ((parity & 0xff) != 0)
  467. nb_errors = -1;
  468. the_end:
  469. kfree(Alpha_to);
  470. kfree(Index_of);
  471. return nb_errors;
  472. }
  473. EXPORT_SYMBOL_GPL(doc_decode_ecc);
  474. MODULE_LICENSE("GPL");
  475. MODULE_AUTHOR("Fabrice Bellard <fabrice.bellard@netgem.com>");
  476. MODULE_DESCRIPTION("ECC code for correcting errors detected by DiskOnChip 2000 and Millennium ECC hardware");