Extra MTD device information

Ricky Taylor rickytaylor26 at gmail.com
Wed Oct 19 13:51:36 EDT 2011


Hello,

I am a member of a very small team working on reverse engineering a few Apple
products and writing device drivers for Linux.

One of the unfortunate discoveries we've made concerning the NAND controller
and DMA controller in the iPhone 4 is that they can (and are used to) encrypt
data to and from the actual NAND chips, on top of this, during their FTL
algorithms, they change the keys used for the encryption.

To top this all off, their FTL is dependant on more pieces of device
information than mtd_info provides. (Such as the size of the banks on each
NAND chip.)

I was wondering if anyone on this list had any advice regarding how to store
and retrieve the extra information from the MTD layer and how to deal with
changing the keys used to encrypt and decrypt the NAND data.

I would like to avoid exposing the NAND as anything other than an MTD
device with
a few partitions, as the filesystem part could be used as a completely
ordinary MTD
partition with no issues.

Thanks,
Ricky Taylor



More information about the linux-mtd mailing list