Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp3879732rdb; Mon, 11 Dec 2023 02:47:18 -0800 (PST) X-Google-Smtp-Source: AGHT+IFsUiott8S83ZaNi7+V9GWdAwQWj2f7ywBifnw+DDgo53lsfspBECNzXc2HKrjvrf5Hwkhl X-Received: by 2002:a17:90b:b06:b0:286:6cc1:269 with SMTP id bf6-20020a17090b0b0600b002866cc10269mr1405634pjb.52.1702291637957; Mon, 11 Dec 2023 02:47:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702291637; cv=none; d=google.com; s=arc-20160816; b=LDkBcMP9APBS2FQ6w4Cgkp5Wdd31lxE3kupYz+psww/4uksouODW2LFdfz10UyZvao yaFLXnrdRm8j3exfFvSoRlGw48n1EZyxALSj7uC+C4zj4HjzfpAzqd+oWI/le9Qf6fEx owts/TpBkgLZTul88kk6tErASwCWAPQ9wV2bIvrL9cFv5YeHV60fr4meDTimmJ0fnT68 Qh27QCyuCQu9K7UURtZ7/TxSZHxQZsB0B3ohKGF9tcYKf7tOhHK7z1WPf+wMtpz0XAuv E39KVhWPEi5e2gYTUGItQPjmY5jdT/9GZ9Cxwo7GLkYfn6YGUAlvKmyxb/V/34/KYcC4 nOAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=VRaB+d91Uu6xiAKEYbnjI1nP1SW5PnoIztJ/4Xz4pDQ=; fh=B1NlL/3PQS/8RP1Kz0IVW3DEmee7rmBBuHQgrnZcdRQ=; b=Bo+lgL4xRWRC8wsdLsJczGHfxLXBWywtXUYamEMNVmT/MY5vqCVSHRW5+FQidXb5fO wj3OXQ8ZvtXcraUL+Ggpo3LmIkKIq3wfQDsxLmRgbj2IhMk41gzA5NdO7UYTGiffeI1P w3EjKd7LFMy5XYaH5LcxAJ3vC0n9/OTe3/QXfxr/McstQeHh4lhn0cXFZqGonJbRQx+/ zlYcfX+iW19fHpoTqHgfDzh4Z4QoU0/M+2Pc9ipz/dBBvOdtF1xW7cJTRyOTdp3CoUig Ode0qy+SSsADisbUZbBI1J/8BEc3ZIAN1zRtezd9rLoZOU3DMpV9Aw0555hJepyOQxzS 6c5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xs4all.nl Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id mu16-20020a17090b389000b002858ed80acfsi7380881pjb.131.2023.12.11.02.47.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 02:47:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xs4all.nl Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id E07B3807798A; Mon, 11 Dec 2023 02:46:01 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234395AbjLKKpq (ORCPT + 99 others); Mon, 11 Dec 2023 05:45:46 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37762 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234312AbjLKKpp (ORCPT ); Mon, 11 Dec 2023 05:45:45 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EDDC4C7 for ; Mon, 11 Dec 2023 02:45:50 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 64FB5C433C7; Mon, 11 Dec 2023 10:45:45 +0000 (UTC) Message-ID: <797a2cbd-ab84-47ec-99b0-23c392f343e1@xs4all.nl> Date: Mon, 11 Dec 2023 11:45:43 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v3,02/21] v4l2: handle secure memory flags in queue setup Content-Language: en-US, nl To: Yunfei Dong , Jeffrey Kardatzke , =?UTF-8?Q?N=C3=ADcolas_F_=2E_R_=2E_A_=2E_Prado?= , Nicolas Dufresne , AngeloGioacchino Del Regno , Benjamin Gaignard , Nathan Hebert Cc: Chen-Yu Tsai , Yong Wu , Hsin-Yi Wang , Fritz Koenig , Daniel Vetter , Steve Cho , Sumit Semwal , Brian Starkey , John Stultz , "T . J . Mercier" , =?UTF-8?Q?Christian_K=C3=B6nig?= , Matthias Brugger , dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-mediatek@lists.infradead.org, Project_Global_Chrome_Upstream_Group@mediatek.com References: <20231206081538.17056-1-yunfei.dong@mediatek.com> <20231206081538.17056-3-yunfei.dong@mediatek.com> From: Hans Verkuil In-Reply-To: <20231206081538.17056-3-yunfei.dong@mediatek.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 11 Dec 2023 02:46:02 -0800 (PST) Hi Yunfei, Jeffrey, Some comments below: On 06/12/2023 09:15, Yunfei Dong wrote: > From: Jeffrey Kardatzke > > Validates the secure memory flags when setting up a queue and ensures > the queue has the proper capability. > > Signed-off-by: Jeffrey Kardatzke > Signed-off-by: Yunfei Dong > --- > .../media/common/videobuf2/videobuf2-core.c | 23 +++++++++++++ > .../media/common/videobuf2/videobuf2-v4l2.c | 34 +++++++++++++------ > 2 files changed, 46 insertions(+), 11 deletions(-) > > diff --git a/drivers/media/common/videobuf2/videobuf2-core.c b/drivers/media/common/videobuf2/videobuf2-core.c > index 8c1df829745b..09dc030484be 100644 > --- a/drivers/media/common/videobuf2/videobuf2-core.c > +++ b/drivers/media/common/videobuf2/videobuf2-core.c > @@ -813,6 +813,15 @@ static bool verify_coherency_flags(struct vb2_queue *q, bool non_coherent_mem) > return true; > } > > +static bool verify_secure_mem_flags(struct vb2_queue *q, bool secure_mem) > +{ > + if (secure_mem != q->secure_mem) { > + dprintk(q, 1, "secure memory model mismatch\n"); > + return false; > + } > + return true; > +} > + > int vb2_core_reqbufs(struct vb2_queue *q, enum vb2_memory memory, > unsigned int flags, unsigned int *count) > { > @@ -820,6 +829,7 @@ int vb2_core_reqbufs(struct vb2_queue *q, enum vb2_memory memory, > unsigned int q_num_bufs = vb2_get_num_buffers(q); > unsigned plane_sizes[VB2_MAX_PLANES] = { }; > bool non_coherent_mem = flags & V4L2_MEMORY_FLAG_NON_COHERENT; > + bool secure_mem = flags & V4L2_MEMORY_FLAG_SECURE; > unsigned int i; > int ret = 0; > > @@ -836,6 +846,8 @@ int vb2_core_reqbufs(struct vb2_queue *q, enum vb2_memory memory, > if (*count == 0 || q_num_bufs != 0 || > (q->memory != VB2_MEMORY_UNKNOWN && q->memory != memory) || > !verify_coherency_flags(q, non_coherent_mem)) { > + bool no_previous_buffers = !q->num_buffers; > + > /* > * We already have buffers allocated, so first check if they > * are not in use and can be freed. > @@ -854,6 +866,12 @@ int vb2_core_reqbufs(struct vb2_queue *q, enum vb2_memory memory, > __vb2_queue_free(q, q_num_bufs); > mutex_unlock(&q->mmap_lock); > > + /* > + * Do not allow switching secure buffer mode. > + */ > + if (!no_previous_buffers && !verify_secure_mem_flags(q, secure_mem)) > + return -EINVAL; > + Why is this needed? Here VIDIOC_REQBUFS is called either to just delete all existing buffers (count == 0), or to delete all existing buffers and allocate new buffers (count > 0). Since in both cases all existing buffers are deleted, you are free to choose whatever new secure mode you want. > /* > * In case of REQBUFS(0) return immediately without calling > * driver's queue_setup() callback and allocating resources. > @@ -882,6 +900,7 @@ int vb2_core_reqbufs(struct vb2_queue *q, enum vb2_memory memory, > if (ret) > return ret; > set_queue_coherency(q, non_coherent_mem); > + q->secure_mem = secure_mem; > > /* > * Ask the driver how many buffers and planes per buffer it requires. > @@ -986,6 +1005,7 @@ int vb2_core_create_bufs(struct vb2_queue *q, enum vb2_memory memory, > unsigned plane_sizes[VB2_MAX_PLANES] = { }; > bool non_coherent_mem = flags & V4L2_MEMORY_FLAG_NON_COHERENT; > unsigned int q_num_bufs = vb2_get_num_buffers(q); > + bool secure_mem = flags & V4L2_MEMORY_FLAG_SECURE; > bool no_previous_buffers = !q_num_bufs; > int ret = 0; > > @@ -1015,6 +1035,7 @@ int vb2_core_create_bufs(struct vb2_queue *q, enum vb2_memory memory, > return ret; > q->waiting_for_buffers = !q->is_output; > set_queue_coherency(q, non_coherent_mem); > + q->secure_mem = secure_mem; > } else { > if (q->memory != memory) { > dprintk(q, 1, "memory model mismatch\n"); > @@ -1022,6 +1043,8 @@ int vb2_core_create_bufs(struct vb2_queue *q, enum vb2_memory memory, > } > if (!verify_coherency_flags(q, non_coherent_mem)) > return -EINVAL; > + if (!verify_secure_mem_flags(q, secure_mem)) > + return -EINVAL; > } > > num_buffers = min(*count, q->max_num_buffers - q_num_bufs); > diff --git a/drivers/media/common/videobuf2/videobuf2-v4l2.c b/drivers/media/common/videobuf2/videobuf2-v4l2.c > index 54d572c3b515..0a530830276c 100644 > --- a/drivers/media/common/videobuf2/videobuf2-v4l2.c > +++ b/drivers/media/common/videobuf2/videobuf2-v4l2.c > @@ -686,22 +686,30 @@ static void fill_buf_caps(struct vb2_queue *q, u32 *caps) > *caps |= V4L2_BUF_CAP_SUPPORTS_MMAP_CACHE_HINTS; > if (q->supports_requests) > *caps |= V4L2_BUF_CAP_SUPPORTS_REQUESTS; > + if (q->allow_secure_mem && q->io_modes & VB2_DMABUF) > + *caps |= V4L2_BUF_CAP_SUPPORTS_SECURE_MEM; > } > > -static void validate_memory_flags(struct vb2_queue *q, > +static bool validate_memory_flags(struct vb2_queue *q, > int memory, > u32 *flags) > { > + if (*flags & V4L2_MEMORY_FLAG_SECURE && > + (!q->allow_secure_mem || memory != V4L2_MEMORY_DMABUF)) { > + return false; > + } > + This check belongs to videobuf2-core.c and the check should be done in vb2_core_reqbufs and vb2_core_create_bufs. So just leave this function as a void. > if (!q->allow_cache_hints || memory != V4L2_MEMORY_MMAP) { > /* > - * This needs to clear V4L2_MEMORY_FLAG_NON_COHERENT only, > - * but in order to avoid bugs we zero out all bits. > + * This needs to clear V4L2_MEMORY_FLAG_NON_COHERENT only. Just drop this as well since it adds no useful information anymore. > */ > - *flags = 0; > - } else { > - /* Clear all unknown flags. */ > - *flags &= V4L2_MEMORY_FLAG_NON_COHERENT; > + *flags &= ~V4L2_MEMORY_FLAG_NON_COHERENT; > } > + > + /* Clear all unknown flags. */ > + *flags &= V4L2_MEMORY_FLAG_NON_COHERENT | V4L2_MEMORY_FLAG_SECURE; This is still needed here. > + > + return true; > } > So the following changes from here... > int vb2_reqbufs(struct vb2_queue *q, struct v4l2_requestbuffers *req) > @@ -710,7 +718,8 @@ int vb2_reqbufs(struct vb2_queue *q, struct v4l2_requestbuffers *req) > u32 flags = req->flags; > > fill_buf_caps(q, &req->capabilities); > - validate_memory_flags(q, req->memory, &flags); > + if (!validate_memory_flags(q, req->memory, &flags)) > + return -EINVAL; > req->flags = flags; > return ret ? ret : vb2_core_reqbufs(q, req->memory, > req->flags, &req->count); > @@ -752,7 +761,8 @@ int vb2_create_bufs(struct vb2_queue *q, struct v4l2_create_buffers *create) > unsigned i; > > fill_buf_caps(q, &create->capabilities); > - validate_memory_flags(q, create->memory, &create->flags); > + if (!validate_memory_flags(q, create->memory, &create->flags)) > + return -EINVAL; > create->index = vb2_get_num_buffers(q); > create->max_num_buffers = q->max_num_buffers; > create->capabilities |= V4L2_BUF_CAP_SUPPORTS_MAX_NUM_BUFFERS; > @@ -1007,7 +1017,8 @@ int vb2_ioctl_reqbufs(struct file *file, void *priv, > u32 flags = p->flags; > > fill_buf_caps(vdev->queue, &p->capabilities); > - validate_memory_flags(vdev->queue, p->memory, &flags); > + if (!validate_memory_flags(vdev->queue, p->memory, &flags)) > + return -EINVAL; > p->flags = flags; > if (res) > return res; > @@ -1031,7 +1042,8 @@ int vb2_ioctl_create_bufs(struct file *file, void *priv, > > p->index = vdev->queue->num_buffers; > fill_buf_caps(vdev->queue, &p->capabilities); > - validate_memory_flags(vdev->queue, p->memory, &p->flags); > + if (!validate_memory_flags(vdev->queue, p->memory, &p->flags)) > + return -EINVAL; > /* > * If count == 0, then just check if memory and type are valid. > * Any -EBUSY result from vb2_verify_memory_type can be mapped to 0. ...to the end should all be dropped since the vb2 core will do the checks. Regards, Hans