1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113
|
---
title: Plugin: MTD
---
## Introduction
The Memory Technology Device (MTD) interface is a way of abstracting flash devices as if they were
normal block devices.
See <http://www.linux-mtd.infradead.org/doc/general.html> for more details.
This plugin supports the following protocol ID:
* `org.infradead.mtd`
## GUID Generation
These devices use custom DeviceInstanceId values built from the device `NAME` and DMI data, e.g.
* `MTD\NAME_Factory`
* `MTD\VENDOR_foo&NAME_baz`
* `MTD\VENDOR_foo&PRODUCT_bar&NAME_baz`
Since 2.0.13, if the MTD device has a PCI parent device, this information will
be used instead, e.g.
* `MTD\NAME_Factory`
* `MTD\VEN_1234&DEV_5678`
* `MTD\VEN_1234&DEV_5678&NAME_Factory`
* `MTD\DRIVER_xe` (quirk-only)
If the `FirmwareGType` quirk is set for the device then the firmware is read back from the device at
daemon startup and parsed for the version number.
In the event the firmware has multiple child images then the device GUIDs are used as firmware IDs.
## Update Behavior
The MTD device is erased in chunks, written and then read back to verify.
Although fwupd can read and write a raw image to the MTD partition there is no automatic way to
get the *existing* version number. By providing the `GType` fwupd can read the MTD partition and
discover additional metadata about the image. For instance, adding a quirk like:
[MTD\VENDOR_PINE64&PRODUCT_PinePhone-Pro&NAME_spi1.0]
FirmwareGType = FuUswidFirmware
... and then append or insert the image into the MTD image with prepared SBOM metadata:
pip install uswid
uswid --load uswid.ini --save metadata.uswid
This would allow fwupd to read the MTD image data, look for a [uSWID](https://github.com/hughsie/python-uswid)
data section and then parse the metadata from that. Any of the firmware formats supported by
`fwupdtool get-firmware-gtypes` that can provide a version can be used.
## Quirk Use
This plugin uses the following plugin-specific quirks:
### MtdMetadataOffset
The offset to start searching within the MTD partition when using `FirmwareGType`. This is provided
to avoid dumping a huge amount of MTD data to access a tiny chunk of data that will not be before a
known offset.
Since: 1.9.1
### MtdFmapRegions
A comma-separated list of region names that should be written to the device as images in the
specified order. Each image should have the required offset set as a physical address.
This can be used to selectively target coreboot FMAP regions.
Since: 2.0.17
### MtdFmapOffset
An offset where the `__FMAP__` header can be found, for example `0x1090000`.
This can be used to avoid loading and searching the entire SPI rom for a FMAP image.
If this option is set then the device `FirmwareGType` is automatically set to `FuFmapFirmware`.
To test actual firmware blobs with mtram, use `sudo modprobe mtdram total_size=32768`
Since: 2.0.17
### MtdMetadataSize
The size of data to read from the MTD partition when using `FirmwareGType`. This is provided to
avoid dumping a huge amount of MTD data to access a tiny chunk of data.
Since: 1.9.1
### `Flags=smbios-version-fallback`
Fall back to the SMBIOS reported version if no version metadata could be found.
This uses a version from the DMI BIOS version string, falling back to a `pair` version format
using the BIOS major and minor release.
Since: 2.0.18
## Vendor ID Security
The vendor ID is set from the system vendor, for example `DMI:LENOVO`
## External Interface Access
This plugin requires read/write access to `/dev/mtd`.
## Version Considerations
This plugin has been available since fwupd version `1.7.2`.
|