Sending vendor specific commands to spi-nor flash

Paul Barker paul.barker at sancloud.com
Mon May 23 03:02:51 PDT 2022


On 23/05/2022 09:31, Michael Walle wrote:
> Hi,
> 
> Am 2022-05-18 14:32, schrieb Paul Barker:
>> We're looking to add support for sending vendor specific commands to
>> Micron Authenta flash devices over the SPI bus.
> 
> Please elaborate a bit more on the use case. Is this something specific
> to the flash or is it more of a general feature?

The Authenta flash devices support two groups of vendor-specific commands:

1) "Advanced Sector Protection" commands, common to several Micron 
parts. These include volatile & non-volatile lock bits, password 
protection and a global freeze bit.

2) "Authenticated Core Root of Trust for Measurement (A-CRTM)" commands, 
specific to Authenta flash devices. These include authenticated write 
operations where the data to be written must be signed with a 
cryptographic key and measurement operations which allow remote 
attestation of the contents of the flash. These features interact with 
the cloud-based Authenta Key Management Service (KMS) provided by Micron 
and user-controlled cryptographic keys can also be supported for these 
devices.

To make use of these features vendor-specific commands are sent to the 
flash device. We expect to send these commands during the boot process 
and during the process of securely deploying a new software image to the 
flash device.

Brief information on the Authenta features is available as a PDF [1].

[1]: 
https://media-www.micron.com/-/media/client/global/documents/products/data-sheet/nor-flash/serial-nor/mt25q/mt25q_a_crtm_rpmc_addendum_rev_1_6_brief.pdf 


> 
>> Since we're using the
>> MTD block interface to support a filesystem on the SPI flash we need
>> to send these vendor specific commands via some sort of IOCTL.
>>
>> I can see a couple of ways to achieve this (as follows) and would like
>> to get some feedback from the MTD & spi-nor maintainers on which
>> approach is preferred:
>>
>> 1) Add new IOCTLs to the mtdchar device to support these vendor
>> specific operations. An initial set of patches was sent back in
>> October 2021 which took this route [1], but no further progress was
>> made. The new IOCTLs would exist for all mtdchar devices (regardless
>> of vendor) if we go this route and we'd need to ensure -EINVAL or
>> -ENOTSUPP is returned as appropriate if these IOCTLs are called on a
>> device which does not implement them.
>>
>> 2) Add a vendor-specific IOCTL layer to the mtdchar device interface.
>> When the mtdchar IOCTL handler is called with a command not defined in
>> mtdchar.c, pass the call on to a device-specific IOCTL handler which
>> can potentially handle vendor specific commands.
>>
>> 3) Add a generic SPI transfer IOCTL for spi-nor MTD devices. This
>> would avoid the need to define IOCTLs for every vendor specific
>> command supported by SPI flash devices. Instead, knowledge of the
>> vendor specific commands would be kept in userspace and the kernel
>> would simply provide an API for sending & receiving arbitrary bytes
>> over the SPI bus. This is similar to the MMC_IOC_CMD IOCTL supported
>> by the MMC driver.
>>
>> My preference would be for option (3) since it minimizes the scope of
>> the changes we need to make in the kernel. We're not tied to this
>> though, so let us know if a different option is preferred.
> 
> I'm not sure we should allow a generic "issue anything to the spi
> flash". It it is just a one time thing, like for example, program
> a password during production, or program non-volatile memory during
> production of the board, I'm fine with it. Most probably, calling
> that ioctl will also call add_taint(). This will also need to go
> with proper userspace util support.
> 
> But if it is something for general use, please provide a proper API
> and don't write userspace drivers.

I've been looking at how the eMMC/SD and NVMe drivers support passing 
through vendor specific commands using MMC_IOC_CMD for eMMC/SD and 
NVME_IOCTL_ADMIN_CMD/NVME_IOCTL_IO_CMD for NVMe. Neither of these ioctl 
handlers appear to call add_taint().

For A-CRTM operations, in our current use case the command bytes to be 
sent over the SPI bus to the flash device are sent from a cloud-based 
service to a userspace agent on the device. The agent simply needs a way 
to pass these command bytes over the SPI bus to the device and retrieve 
the sequence of response bytes to send back to the cloud-based service. 
For this we could use either a generic SPI transfer IOCTL or a Micron 
specific A-CRTM command IOCTL.

For the Advanced Sector Protection commands we can add IOCTLs for each 
command if that's the preferred approach. The command list can be seen 
on page 35 of the datasheet for the MT25QL02GCBB spi-nor flash device 
[2] and on other Micron flash device datasheets.

[2]: 
https://media-www.micron.com/-/media/client/global/documents/products/data-sheet/nor-flash/serial-nor/mt25q/die-rev-b/mt25q_qlkt_l_02g_cbb_0.pdf

We're happy to look at extending libmtd and/or mtd-utils to wrap any 
IOCTLs added to the drivers. Would that provide the proper API you're 
looking for?

Thanks,

-- 
Paul Barker
Principal Software Engineer
SanCloud Ltd

e: paul.barker at sancloud.com
w: https://sancloud.com/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xA67255DFCCE62ECD.asc
Type: application/pgp-keys
Size: 7526 bytes
Desc: OpenPGP public key
URL: <http://lists.infradead.org/pipermail/linux-mtd/attachments/20220523/9abd30ae/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 236 bytes
Desc: OpenPGP digital signature
URL: <http://lists.infradead.org/pipermail/linux-mtd/attachments/20220523/9abd30ae/attachment.sig>


More information about the linux-mtd mailing list