Re: [Media Summit] ChromeOS Kernel CAM

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Sep 08, 2022 at 05:14:41PM +0300, Laurent Pinchart wrote:
> On Thu, Sep 08, 2022 at 10:08:46AM +0200, Maxime Ripard wrote:
> > Hi Ricardo,
> > 
> > On Thu, Sep 08, 2022 at 09:11:11AM +0200, Ricardo Ribalda wrote:
> > > > - Still on slide 16, V4L2 as an API is usable without disclosing vendor
> > > >   IP. What is not possible is upstreaming a driver. I don't see this as
> > > >   significantly different between V4L2 and the new API proposal. I
> > > >   expect this to be discussed on Monday.
> > > 
> > > I am only considering upstream drivers. There is not much to discuss
> > > for downstream or closed drivers :)
> > 
> > Are we really discussing upstream *drivers*? If anything, it looks like
> > the Kcam proposal moves most of the drivers out of upstream.
> 
> Given that the API proposal sets at a significant lower level than V4L2
> in the stack, the concept of "userspace driver" (I meant it in the sense
> of GPU support in mesa) plays a bigger role. It would be good to clarify
> what is meant by "driver" and maybe use the term "kernel driver" when
> only the kernel part is covered, to avoid misunderstandings.

I think there's a bit of a misunderstanding about what exactly is in a
DRM driver, and what is in Mesa.

Mesa doesn't program the hardware at all, it's merely a glorified
compiler. It's not more of a driver than GCC is an OS. Most importantly
for our discussion, Mesa doesn't perform any kind of register access (or
register access request), only the (kernel) driver does that.

What would be relevant to the discussion though was the userspace mode
setting, where X11 would have most of the logic to drive the hardware
directly.

That ended up being a mistake, and got superseded by KMS more than a
decade ago because it wasn't working.

> > > > - Slide 31 mentions that entities can send operations internally and
> > > >   listen to each other events. I'd like to better understand how that
> > > >   will work without any abstraction in the API (as that is one of the
> > > >   main design decision behind this new API) when those entities are from
> > > >   different vendors, and handled by different drivers that are developed
> > > >   independently (for instance, the camera sensor and the CSI-2 receiver,
> > > >   or even the CSI-2 receiver and the ISP).
> > > 
> > > It is still under work.
> > > 
> > > Hardware, specially for standard buses,  should be resilient (not
> > > crash) to format mismatches. Otherwise a mal-functionling sensor or
> > > too much noise could crash the system (with or without kcam).
> > > 
> > > Drivers developed together should know about the rest of the system,
> > > so that is not the issue here.
> > > 
> > > For drivers developed by different vendors for a standard bus, on
> > > hardware that is not resilient (that was a mouthful), then we need to
> > > prepare a set of read-only standard registers.
> > 
> > I'm not even sure that read-only registers would be enough. I've
> > experienced first-hand DMA controllers that, when the camera has its
> > timings completely off, end up completely confused and write way outside
> > of its assigned buffer creating big chunks of corrupted memory in the
> > system.
> > 
> > And that was by writing fairly legit values to registers that were meant
> > for that, so we wouldn't be able to defend against it even with the
> > smartest whitelist.
> > 
> > And we were in a "good faith" situation. Giving an attacker basically
> > programmable access to DMA engines that might not be sitting behind an
> > IOMMU seems like a very dangerous idea to me.
> 
> Do we need to preassign a range of CVE numbers ? :-)

We can do that, but I'd rather have some way to defend against that.

Maxime

Attachment: signature.asc
Description: PGP signature


[Index of Archives]     [Linux Input]     [Video for Linux]     [Gstreamer Embedded]     [Mplayer Users]     [Linux USB Devel]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Yosemite Backpacking]

  Powered by Linux