DEVICE AND METHOD FOR VERIFYING A COMPONENT OF A STORAGE DEVICE
The present application claims priority to and the benefit of U.S. Provisional Application No. 62/975,616, filed Feb. 12, 2020, entitled “SYSTEMS, METHODS, AND APPARATUS FOR PROVIDING LOCK-IN FEATURES FOR MODULAR STORAGE DEVICES,” the entire content of which is incorporated herein by reference. One or more aspects of embodiments of the present disclosure relate to storage devices, and more particularly, to verifying whether a component of a storage device is an authorized and/or verified component. It may be desirable to use a computational storage device (e.g., a solid state drive (SSD) with an embedded processor or Field Programmable Gate Array (FPGA)), for various data processing tasks, as such a storage device may help provide efficient and cost-effective data processing solutions. For example, a computational storage device may provide a platform for performing at least a portion of the data processing functions that may otherwise be performed by a host CPU processor, within the storage device itself. Thus, it is desirable to have a system and method for quickly determining whether one or more components of a computational storage device are verified components. Embodiments of the present disclosure are directed to a storage device configured for hardware verification. The storage device comprises a first hardware component comprising a connector and a first verification logic. The first validation logic is configured to detect a criterion and generate a first signal via the connector in response to detecting the criterion. The storage device also comprises a second hardware component coupled to the first hardware component via the connector. The second hardware component comprises a second validation logic, where the second validation logic is configured to monitor and receive the first signal via the connector. In response to receiving the first signal, the second validation logic is configured to compare the received first signal to an expected signal and generate a result. The storage device is configured to take an action in response to the result. According to one embodiment, the first hardware component includes at least one of a field gate programmable array (FPGA) or an application-specific integrated circuit, and the second hardware component includes non-volatile memory. According to one embodiment, the expected signal is associated with an identifier stored in memory of the second hardware component. According to one embodiment, the connector is a connector supporting a peripheral component interconnect express (PCIe) protocol. According to one embodiment, the criterion is detecting start of a reset period. According to one embodiment, the first signal is provided over a preset pin of the connector. According to one embodiment, the result comprises an indication of a match of the received first signal with the expected signal, and the action comprises enabling an acceleration feature of the storage device. According to one embodiment, the result comprises an indication of a mismatch of the received first signal with the expected signal, and the action comprises disabling an acceleration feature of the storage device. According to one embodiment, the result comprises an indication of a mismatch of the received first signal with the expected signal, and the action comprises displaying a notification on a display device. According to one embodiment, the second hardware component is coupled to a host via a second connector. Embodiments of the present disclosure are also directed to a method for hardware verification by a storage device. The method comprises detecting, via a first verification logic in a first hardware component, a criterion; generating, via a connector in the first hardware component, a first signal in response to detecting the criterion; monitoring and receiving, by a second validation logic in a second hardware component, the first signal, the second hardware component being coupled to the first hardware component via the connector; and comparing, by the second validation logic, in response to receiving the first signal, the received first signal to an expected signal, and generating a result, wherein the storage device is configured to take an action in response to the result. As a person of skill in the art should recognize, embodiments of the present disclosure provide a mechanism for quickly determining whether one or more components of a computational storage device are verified components. This may help avoid, for example, unpredictable behavior or failure of the device due to use of an unverified component. Non-limiting and non-exhaustive embodiments of the present embodiments are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified. Hereinafter, example embodiments will be described in more detail with reference to the accompanying drawings, in which like reference numbers refer to like elements throughout. The present invention, however, may be embodied in various different forms, and should not be construed as being limited to only the illustrated embodiments herein. Rather, these embodiments are provided as examples so that this disclosure will be thorough and complete, and will fully convey the aspects and features of the present disclosure to those skilled in the art. Accordingly, processes, elements, and techniques that are not necessary to those having ordinary skill in the art for a complete understanding of the aspects and features of the present disclosure may not be described. Unless otherwise noted, like reference numerals denote like elements throughout the attached drawings and the written description, and thus, descriptions thereof may not be repeated. Further, in the drawings, the relative sizes of elements, layers, and regions may be exaggerated and/or simplified for clarity. A computational storage device may at times be modular in design or construction. In such a case, the computational storage device may be constructed from different removable components including, for example, a storage component (e.g. solid state memory) and a processing component (e.g. a field programmable gate array (FPGA). The modular components of the computational storage device may be obtained from different vendors. As such, there is a likelihood that one may attempt to construct the computational storage device from unauthorized/unqualified vendors which may compromise the quality of the constructed computational storage device. In general terms, embodiments of the present disclosure are directed to a system and method for detecting, via hardware, whether a storage device (e.g., an SSD) or a processor device (e.g., an FPGA) forming part of a computational storage device, is an authorized component. The verification process may be performed, for example, during a reset of all or a portion of the computational storage device. The verification process may be performed, for example, to verify that the device has authorized components before the FPGA has down loaded an image and/or bit-file that configures the FPGA to operate in a predetermined manner. In one embodiment, the verification can be conducted via a hardware verification logic included in the processor device and in the storage device. The hardware verification logic may be configured to utilize a reserved pin of a connector (e.g., a U.2 connector, or the like) that connects the storage device to the processor device. In one embodiment, the reserved pin can include pin E6 pin of the U.2 connector. According to one embodiment, hardware verification by an initiator of a target occurs during a reset period. The initiator may be an initiator as described by the NVMe standard, although embodiments of the disclosure are not limited thereto. The initiator may be the processor device, with the target being the storage device, or vice versa. The reset period may occur, for example, when a device is inserted into a slot of a computer system without stopping or shutting down the system, or when the entire computer system is rebooted. During the reset period, the initiator may be configured to monitor the reserved pin for determining whether traffic is detected through the pin. In one embodiment, an authorized target drives the reserved pin with a verification ID (also referred to as a verification signal) that notifies the initiator that the target is an authorized device. The verification ID may include, for example, a predefined waveform pattern/signal. In response to verifying that the target is an authorized device, the initiator may enable certain functionalities of the device that would not be enabled without such verification. The functionalities may include, for example, downloading proprietary bit files and/or enabling certain acceleration features. The computation storage device 100 The one or more processor components 104 In the example of In one embodiment, the modular storage component 102 connects to the one or more processor components 104 The computational storage device 100 The computational storage device 100 In the modular configuration of the computational storage device 100 in the examples of In one embodiment, in the event that the added modular component cannot be verified, the computational storage device may be configured to download or otherwise receive, for example, standard FPGA bit files without downloading proprietary FPGA bit files. This may allow, for example, the computational storage device to function as it normally would, but without the acceleration capabilities. The device can additionally transmit a message to inform a user or application that the added device is unauthorized. In one embodiment, the verification modules 200 further include multiplexors 204 Outputs of the multiplexors 204 In one embodiment, the hardware verification logic 202 in the initiator and target devices initiate a verification cycle in response to a reset by a host processor. In one embodiment, the reset drives the reset pin 206 to be asserted low, causing the multiplexor 204 to select the hardware verification logic 202 to communicate via the reserved pin 208 of the connector 210 during the reset. In one embodiment, the initiator is a device that is installed first on the host computer that seeks verification of the target, which may be a later-added modular component. Either the processor component or the storage component may be the initiator or the target. In one example, the initiator is the processor component 120, 130 of Assuming, for illustration purposes, that the initiator is an FPGA and the target is an SSD, the initiator may execute the hardware verification logic 202 In one embodiment, the hardware verification logic 202 Turning now to the target, as with the initiator, the multiplexor 204 The hardware verification logic 202 In one embodiment, the FGPA may check the results of the verification in the defined register location prior to taking certain actions. Such actions may be, for example, to download or not, a proprietary bit file in addition to a standard bit file, during a boot sequence, and/or enable or disable certain acceleration features of the FPGA including compression, encryption, and the like. Other acceleration features that may be enabled or disabled depending on the verification results may include, for example, enabling/disabling a double data rate fourth generation synchronous dynamic random-access (DDR4) channel (if supported), enabling/disabling a high bandwidth memory (HBM) (if present), and or the like. In one embodiment, the multiplexors 204 The initiator monitoring the reserved pin 208 during the reset period receives the verification ID. In one embodiment, a fixed counter is invoked by the initiator when a first signal is received on the reserved pin 208. When the fixed counter reaches a particular value corresponding to the size of the expected verification ID, the initiator concludes that all of the verification ID has been received. Further, the initiator may cause the reserved pin 208 (not shown) to be driven to a low state 408. This may occur, for example, prior to expiration of the reset period. The initiator compares the received verification ID against the expected verification ID for determining a match. In one embodiment, when the reset pin 206 is no longer asserted 410 (e.g. at the expiration of the reset period), the reserved pin 208 serves to provide a chassis type. For example, the reserved pin 208 in a low state may indicate a chassis type of NVMe, and the reserved pin in a high state may indicate a chassis type of NVMe-oF. In act 500, a reset is asserted by the host processor for a particular slot (e.g. in response to a host insertion of a device into the slot), or for the entire system. In act 502, the hardware verification logic 202 In act 504, the hardware verification logic 202 In act 506, in response to verifying the target, the initiator takes one or more actions that are allowed to be performed with authorized targets. Such actions may include, for example, downloading FPGA bit files that are proprietary to the vendor providing the FPGA (in addition to the standard FPGA bit files) during a boot sequence, and continuing a PCIe link training sequence to establish a high speed I/O connection between the initiator and the target devices. Other actions may include enabling acceleration features of the processor component, enabling a DDR4 channel, and/or enabling a high bandwidth memory. Referring again to act 504, if the hardware verification logic 202 In act 510, the initiator takes one or more actions in response to the target component failing the verification. Such actions may include, for example, proceeding with the boot sequence by downloading standard FPGA bit files without downloading a proprietary FPGA bit file, disabling certain acceleration features of the FPGA (e.g. compression, encryption, etc.), disabling the DDR4 channel, and/or disabling the HBM if present. In this manner, the computational storage device with the un-verified target component can be functional, but with limited capabilities. In one embodiment, a notification is transmitted in act 512 for informing a user that the target device is not an authorized device. The notification may be displayed to the user, for example, as part of the functionality of the BIOS (Basic Input Output System). It will be understood that, although the terms “first”, “second”, “third”, etc., may be used herein to describe various elements, components, regions, layers and/or sections, these elements, components, regions, layers and/or sections should not be limited by these terms. These terms are only used to distinguish one element, component, region, layer or section from another element, component, region, layer or section. Thus, a first element, component, region, layer or section discussed herein could be termed a second element, component, region, layer or section, without departing from the spirit and scope of the inventive concept. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the inventive concept. As used herein, the terms “substantially,” “about,” and similar terms are used as terms of approximation and not as terms of degree, and are intended to account for the inherent deviations in measured or calculated values that would be recognized by those of ordinary skill in the art. As used herein, the singular forms “a” and “an” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising”, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. Expressions such as “at least one of,” when preceding a list of elements, modify the entire list of elements and do not modify the individual elements of the list. Further, the use of “may” when describing embodiments of the inventive concept refers to “one or more embodiments of the present disclosure”. Also, the term “exemplary” is intended to refer to an example or illustration. As used herein, the terms “use,” “using,” and “used” may be considered synonymous with the terms “utilize,” “utilizing,” and “utilized,” respectively. It will be understood that when an element or layer is referred to as being “on”, “connected to”, “coupled to”, or “adjacent to” another element or layer, it may be directly on, connected to, coupled to, or adjacent to the other element or layer, or one or more intervening elements or layers may be present. In contrast, when an element or layer is referred to as being “directly on”, “directly connected to”, “directly coupled to”, or “immediately adjacent to” another element or layer, there are no intervening elements or layers present. Any numerical range recited herein is intended to include all sub-ranges of the same numerical precision subsumed within the recited range. For example, a range of “1.0 to 10.0” is intended to include all subranges between (and including) the recited minimum value of 1.0 and the recited maximum value of 10.0, that is, having a minimum value equal to or greater than 1.0 and a maximum value equal to or less than 10.0, such as, for example, 2.4 to 7.6. Any maximum numerical limitation recited herein is intended to include all lower numerical limitations subsumed therein and any minimum numerical limitation recited in this specification is intended to include all higher numerical limitations subsumed therein. Although exemplary embodiments of a system and method for verifying components of a modular computational storage device have been specifically described and illustrated herein, many modifications and variations will be apparent to those skilled in the art. Accordingly, it is to be understood that a system and method for verifying components of a modular computational storage device constructed according to principles of this disclosure may be embodied other than as specifically described herein. The disclosure is also defined in the following claims, and equivalents thereof. A storage device configured for hardware verification is disclosed. The storage device comprises a first hardware component comprising a connector and a first verification logic. The first validation logic is configured to detect a criterion and generate a first signal via the connector in response to detecting the criterion. The storage device also comprises a second hardware component coupled to the first hardware component via the connector. The second hardware component comprises a second validation logic, where the second validation logic is configured to monitor and receive the first signal via the connector. In response to receiving the first signal, the second validation logic is configured to compare the received first signal to an expected signal and generate a result. The storage device is configured to take an action in response to the result. 1. A storage device configured for hardware verification comprising:
a first hardware component comprising a connector and a first verification logic, the first validation logic configured to detect a criterion and generate a first signal via the connector in response to detecting the criterion; and a second hardware component coupled to the first hardware component via the connector, the second hardware component comprising a second validation logic, the second validation logic configured to monitor and receive the first signal via the connector, wherein in response to receiving the first signal, the second validation logic is configured to compare the received first signal to an expected signal and generate a result, wherein the storage device is configured to take an action in response to the result. 2. The device of 3. The device of 4. The device of 5. The device of 6. The device of 7. The device of 8. The device of 9. The device of 10. The device of 11. A method for hardware verification by a storage device, the method comprising:
detecting, via a first verification logic in a first hardware component, a criterion; generating, via a connector in the first hardware component, a first signal in response to detecting the criterion; monitoring and receiving, by a second validation logic in a second hardware component, the first signal, the second hardware component being coupled to the first hardware component via the connector; and comparing, by the second validation logic, in response to receiving the first signal, the received first signal to an expected signal, and generating a result, wherein the storage device is configured to take an action in response to the result. 12. The method of 13. The method of 14. The method of 15. The method of 16. The method of 17. The method of 18. The method of 19. The method of 20. The method of CROSS-REFERENCE TO RELATED APPLICATION(S)
FIELD
BACKGROUND
SUMMARY
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION