2018-01-09 02:55:39 +07:00
|
|
|
/* SPDX-License-Identifier: MIT */
|
|
|
|
/*
|
|
|
|
* Copyright (C) 2017 Google, Inc.
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Sean Paul <seanpaul@chromium.org>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <drm/drm_hdcp.h>
|
2019-02-17 00:36:51 +07:00
|
|
|
#include <drm/i915_component.h>
|
2018-01-09 02:55:39 +07:00
|
|
|
#include <linux/i2c.h>
|
|
|
|
#include <linux/random.h>
|
2019-02-17 00:36:51 +07:00
|
|
|
#include <linux/component.h>
|
2018-01-09 02:55:39 +07:00
|
|
|
|
|
|
|
#include "intel_drv.h"
|
|
|
|
#include "i915_reg.h"
|
|
|
|
|
|
|
|
#define KEY_LOAD_TRIES 5
|
2018-12-05 18:44:43 +07:00
|
|
|
#define ENCRYPT_STATUS_CHANGE_TIMEOUT_MS 50
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-10-23 16:22:27 +07:00
|
|
|
static
|
|
|
|
bool intel_hdcp_is_ksv_valid(u8 *ksv)
|
|
|
|
{
|
|
|
|
int i, ones = 0;
|
|
|
|
/* KSV has 20 1's and 20 0's */
|
|
|
|
for (i = 0; i < DRM_HDCP_KSV_LEN; i++)
|
|
|
|
ones += hweight8(ksv[i]);
|
|
|
|
if (ones != 20)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static
|
|
|
|
int intel_hdcp_read_valid_bksv(struct intel_digital_port *intel_dig_port,
|
|
|
|
const struct intel_hdcp_shim *shim, u8 *bksv)
|
|
|
|
{
|
|
|
|
int ret, i, tries = 2;
|
|
|
|
|
|
|
|
/* HDCP spec states that we must retry the bksv if it is invalid */
|
|
|
|
for (i = 0; i < tries; i++) {
|
|
|
|
ret = shim->read_bksv(intel_dig_port, bksv);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
if (intel_hdcp_is_ksv_valid(bksv))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (i == tries) {
|
2018-10-23 17:41:28 +07:00
|
|
|
DRM_DEBUG_KMS("Bksv is invalid\n");
|
2018-10-23 16:22:27 +07:00
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-10-23 16:22:29 +07:00
|
|
|
/* Is HDCP1.4 capable on Platform and Sink */
|
|
|
|
bool intel_hdcp_capable(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_digital_port *intel_dig_port = conn_to_dig_port(connector);
|
2018-10-29 16:45:46 +07:00
|
|
|
const struct intel_hdcp_shim *shim = connector->hdcp.shim;
|
2018-10-23 16:22:29 +07:00
|
|
|
bool capable = false;
|
|
|
|
u8 bksv[5];
|
|
|
|
|
|
|
|
if (!shim)
|
|
|
|
return capable;
|
|
|
|
|
|
|
|
if (shim->hdcp_capable) {
|
|
|
|
shim->hdcp_capable(intel_dig_port, &capable);
|
|
|
|
} else {
|
|
|
|
if (!intel_hdcp_read_valid_bksv(intel_dig_port, shim, bksv))
|
|
|
|
capable = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return capable;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:53 +07:00
|
|
|
/* Is HDCP2.2 capable on Platform and Sink */
|
|
|
|
static bool intel_hdcp2_capable(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct intel_digital_port *intel_dig_port = conn_to_dig_port(connector);
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
bool capable = false;
|
|
|
|
|
|
|
|
/* I915 support for HDCP2.2 */
|
|
|
|
if (!hdcp->hdcp2_supported)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* MEI interface is solid */
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
if (!dev_priv->hdcp_comp_added || !dev_priv->hdcp_master) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
/* Sink's capability for HDCP2.2 */
|
|
|
|
hdcp->shim->hdcp_2_2_capable(intel_dig_port, &capable);
|
|
|
|
|
|
|
|
return capable;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:52 +07:00
|
|
|
static inline bool intel_hdcp_in_use(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
enum port port = connector->encoder->port;
|
|
|
|
u32 reg;
|
|
|
|
|
|
|
|
reg = I915_READ(PORT_HDCP_STATUS(port));
|
|
|
|
return reg & HDCP_STATUS_ENC;
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
static int intel_hdcp_poll_ksv_fifo(struct intel_digital_port *intel_dig_port,
|
|
|
|
const struct intel_hdcp_shim *shim)
|
|
|
|
{
|
|
|
|
int ret, read_ret;
|
|
|
|
bool ksv_ready;
|
|
|
|
|
|
|
|
/* Poll for ksv list ready (spec says max time allowed is 5s) */
|
|
|
|
ret = __wait_for(read_ret = shim->read_ksv_ready(intel_dig_port,
|
|
|
|
&ksv_ready),
|
|
|
|
read_ret || ksv_ready, 5 * 1000 * 1000, 1000,
|
|
|
|
100 * 1000);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
if (read_ret)
|
|
|
|
return read_ret;
|
|
|
|
if (!ksv_ready)
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2018-04-02 17:10:33 +07:00
|
|
|
static bool hdcp_key_loadable(struct drm_i915_private *dev_priv)
|
|
|
|
{
|
|
|
|
struct i915_power_domains *power_domains = &dev_priv->power_domains;
|
|
|
|
struct i915_power_well *power_well;
|
|
|
|
enum i915_power_well_id id;
|
|
|
|
bool enabled = false;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* On HSW and BDW, Display HW loads the Key as soon as Display resumes.
|
|
|
|
* On all BXT+, SW can load the keys only when the PW#1 is turned on.
|
|
|
|
*/
|
|
|
|
if (IS_HASWELL(dev_priv) || IS_BROADWELL(dev_priv))
|
|
|
|
id = HSW_DISP_PW_GLOBAL;
|
|
|
|
else
|
|
|
|
id = SKL_DISP_PW_1;
|
|
|
|
|
|
|
|
mutex_lock(&power_domains->lock);
|
|
|
|
|
|
|
|
/* PG1 (power well #1) needs to be enabled */
|
|
|
|
for_each_power_well(dev_priv, power_well) {
|
2018-08-06 16:58:37 +07:00
|
|
|
if (power_well->desc->id == id) {
|
|
|
|
enabled = power_well->desc->ops->is_enabled(dev_priv,
|
|
|
|
power_well);
|
2018-04-02 17:10:33 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mutex_unlock(&power_domains->lock);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Another req for hdcp key loadability is enabled state of pll for
|
|
|
|
* cdclk. Without active crtc we wont land here. So we are assuming that
|
|
|
|
* cdclk is already on.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return enabled;
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
static void intel_hdcp_clear_keys(struct drm_i915_private *dev_priv)
|
|
|
|
{
|
|
|
|
I915_WRITE(HDCP_KEY_CONF, HDCP_CLEAR_KEYS_TRIGGER);
|
|
|
|
I915_WRITE(HDCP_KEY_STATUS, HDCP_KEY_LOAD_DONE | HDCP_KEY_LOAD_STATUS |
|
|
|
|
HDCP_FUSE_IN_PROGRESS | HDCP_FUSE_ERROR | HDCP_FUSE_DONE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_hdcp_load_keys(struct drm_i915_private *dev_priv)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
u32 val;
|
|
|
|
|
2018-02-03 05:09:07 +07:00
|
|
|
val = I915_READ(HDCP_KEY_STATUS);
|
|
|
|
if ((val & HDCP_KEY_LOAD_DONE) && (val & HDCP_KEY_LOAD_STATUS))
|
|
|
|
return 0;
|
|
|
|
|
2018-01-18 12:48:05 +07:00
|
|
|
/*
|
|
|
|
* On HSW and BDW HW loads the HDCP1.4 Key when Display comes
|
|
|
|
* out of reset. So if Key is not already loaded, its an error state.
|
|
|
|
*/
|
|
|
|
if (IS_HASWELL(dev_priv) || IS_BROADWELL(dev_priv))
|
|
|
|
if (!(I915_READ(HDCP_KEY_STATUS) & HDCP_KEY_LOAD_DONE))
|
|
|
|
return -ENXIO;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initiate loading the HDCP key from fuses.
|
|
|
|
*
|
2018-12-05 18:44:40 +07:00
|
|
|
* BXT+ platforms, HDCP key needs to be loaded by SW. Only Gen 9
|
|
|
|
* platforms except BXT and GLK, differ in the key load trigger process
|
|
|
|
* from other platforms. So GEN9_BC uses the GT Driver Mailbox i/f.
|
2018-01-18 12:48:05 +07:00
|
|
|
*/
|
2018-12-05 18:44:40 +07:00
|
|
|
if (IS_GEN9_BC(dev_priv)) {
|
2018-01-18 12:48:05 +07:00
|
|
|
mutex_lock(&dev_priv->pcu_lock);
|
|
|
|
ret = sandybridge_pcode_write(dev_priv,
|
|
|
|
SKL_PCODE_LOAD_HDCP_KEYS, 1);
|
|
|
|
mutex_unlock(&dev_priv->pcu_lock);
|
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Failed to initiate HDCP key load (%d)\n",
|
|
|
|
ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
I915_WRITE(HDCP_KEY_CONF, HDCP_KEY_LOAD_TRIGGER);
|
2018-01-09 02:55:39 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Wait for the keys to load (500us) */
|
|
|
|
ret = __intel_wait_for_register(dev_priv, HDCP_KEY_STATUS,
|
|
|
|
HDCP_KEY_LOAD_DONE, HDCP_KEY_LOAD_DONE,
|
|
|
|
10, 1, &val);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
else if (!(val & HDCP_KEY_LOAD_STATUS))
|
|
|
|
return -ENXIO;
|
|
|
|
|
|
|
|
/* Send Aksv over to PCH display for use in authentication */
|
|
|
|
I915_WRITE(HDCP_KEY_CONF, HDCP_AKSV_SEND_TRIGGER);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Returns updated SHA-1 index */
|
|
|
|
static int intel_write_sha_text(struct drm_i915_private *dev_priv, u32 sha_text)
|
|
|
|
{
|
|
|
|
I915_WRITE(HDCP_SHA_TEXT, sha_text);
|
|
|
|
if (intel_wait_for_register(dev_priv, HDCP_REP_CTL,
|
|
|
|
HDCP_SHA1_READY, HDCP_SHA1_READY, 1)) {
|
|
|
|
DRM_ERROR("Timed out waiting for SHA1 ready\n");
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static
|
|
|
|
u32 intel_hdcp_get_repeater_ctl(struct intel_digital_port *intel_dig_port)
|
|
|
|
{
|
|
|
|
enum port port = intel_dig_port->base.port;
|
|
|
|
switch (port) {
|
|
|
|
case PORT_A:
|
|
|
|
return HDCP_DDIA_REP_PRESENT | HDCP_DDIA_SHA1_M0;
|
|
|
|
case PORT_B:
|
|
|
|
return HDCP_DDIB_REP_PRESENT | HDCP_DDIB_SHA1_M0;
|
|
|
|
case PORT_C:
|
|
|
|
return HDCP_DDIC_REP_PRESENT | HDCP_DDIC_SHA1_M0;
|
|
|
|
case PORT_D:
|
|
|
|
return HDCP_DDID_REP_PRESENT | HDCP_DDID_SHA1_M0;
|
|
|
|
case PORT_E:
|
|
|
|
return HDCP_DDIE_REP_PRESENT | HDCP_DDIE_SHA1_M0;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
DRM_ERROR("Unknown port %d\n", port);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static
|
2018-04-02 17:10:32 +07:00
|
|
|
int intel_hdcp_validate_v_prime(struct intel_digital_port *intel_dig_port,
|
|
|
|
const struct intel_hdcp_shim *shim,
|
|
|
|
u8 *ksv_fifo, u8 num_downstream, u8 *bstatus)
|
2018-01-09 02:55:39 +07:00
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv;
|
|
|
|
u32 vprime, sha_text, sha_leftovers, rep_ctl;
|
|
|
|
int ret, i, j, sha_idx;
|
|
|
|
|
|
|
|
dev_priv = intel_dig_port->base.base.dev->dev_private;
|
|
|
|
|
|
|
|
/* Process V' values from the receiver */
|
|
|
|
for (i = 0; i < DRM_HDCP_V_PRIME_NUM_PARTS; i++) {
|
|
|
|
ret = shim->read_v_prime_part(intel_dig_port, i, &vprime);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
I915_WRITE(HDCP_SHA_V_PRIME(i), vprime);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to write the concatenation of all device KSVs, BINFO (DP) ||
|
|
|
|
* BSTATUS (HDMI), and M0 (which is added via HDCP_REP_CTL). This byte
|
|
|
|
* stream is written via the HDCP_SHA_TEXT register in 32-bit
|
|
|
|
* increments. Every 64 bytes, we need to write HDCP_REP_CTL again. This
|
|
|
|
* index will keep track of our progress through the 64 bytes as well as
|
|
|
|
* helping us work the 40-bit KSVs through our 32-bit register.
|
|
|
|
*
|
|
|
|
* NOTE: data passed via HDCP_SHA_TEXT should be big-endian
|
|
|
|
*/
|
|
|
|
sha_idx = 0;
|
|
|
|
sha_text = 0;
|
|
|
|
sha_leftovers = 0;
|
|
|
|
rep_ctl = intel_hdcp_get_repeater_ctl(intel_dig_port);
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_32);
|
|
|
|
for (i = 0; i < num_downstream; i++) {
|
|
|
|
unsigned int sha_empty;
|
|
|
|
u8 *ksv = &ksv_fifo[i * DRM_HDCP_KSV_LEN];
|
|
|
|
|
|
|
|
/* Fill up the empty slots in sha_text and write it out */
|
|
|
|
sha_empty = sizeof(sha_text) - sha_leftovers;
|
|
|
|
for (j = 0; j < sha_empty; j++)
|
|
|
|
sha_text |= ksv[j] << ((sizeof(sha_text) - j - 1) * 8);
|
|
|
|
|
|
|
|
ret = intel_write_sha_text(dev_priv, sha_text);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
/* Programming guide writes this every 64 bytes */
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
if (!(sha_idx % 64))
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_32);
|
|
|
|
|
|
|
|
/* Store the leftover bytes from the ksv in sha_text */
|
|
|
|
sha_leftovers = DRM_HDCP_KSV_LEN - sha_empty;
|
|
|
|
sha_text = 0;
|
|
|
|
for (j = 0; j < sha_leftovers; j++)
|
|
|
|
sha_text |= ksv[sha_empty + j] <<
|
|
|
|
((sizeof(sha_text) - j - 1) * 8);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we still have room in sha_text for more data, continue.
|
|
|
|
* Otherwise, write it out immediately.
|
|
|
|
*/
|
|
|
|
if (sizeof(sha_text) > sha_leftovers)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
ret = intel_write_sha_text(dev_priv, sha_text);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_leftovers = 0;
|
|
|
|
sha_text = 0;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to write BINFO/BSTATUS, and M0 now. Depending on how many
|
|
|
|
* bytes are leftover from the last ksv, we might be able to fit them
|
|
|
|
* all in sha_text (first 2 cases), or we might need to split them up
|
|
|
|
* into 2 writes (last 2 cases).
|
|
|
|
*/
|
|
|
|
if (sha_leftovers == 0) {
|
|
|
|
/* Write 16 bits of text, 16 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_16);
|
|
|
|
ret = intel_write_sha_text(dev_priv,
|
|
|
|
bstatus[0] << 8 | bstatus[1]);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 32 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_0);
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 16 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_16);
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
} else if (sha_leftovers == 1) {
|
|
|
|
/* Write 24 bits of text, 8 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_24);
|
|
|
|
sha_text |= bstatus[0] << 16 | bstatus[1] << 8;
|
|
|
|
/* Only 24-bits of data, must be in the LSB */
|
|
|
|
sha_text = (sha_text & 0xffffff00) >> 8;
|
|
|
|
ret = intel_write_sha_text(dev_priv, sha_text);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 32 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_0);
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 24 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_8);
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
} else if (sha_leftovers == 2) {
|
|
|
|
/* Write 32 bits of text */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_32);
|
|
|
|
sha_text |= bstatus[0] << 24 | bstatus[1] << 16;
|
|
|
|
ret = intel_write_sha_text(dev_priv, sha_text);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 64 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_0);
|
|
|
|
for (i = 0; i < 2; i++) {
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
}
|
|
|
|
} else if (sha_leftovers == 3) {
|
|
|
|
/* Write 32 bits of text */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_32);
|
|
|
|
sha_text |= bstatus[0] << 24;
|
|
|
|
ret = intel_write_sha_text(dev_priv, sha_text);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 8 bits of text, 24 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_8);
|
|
|
|
ret = intel_write_sha_text(dev_priv, bstatus[1]);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 32 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_0);
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
|
|
|
|
/* Write 8 bits of M0 */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_24);
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
} else {
|
2018-04-02 17:10:32 +07:00
|
|
|
DRM_DEBUG_KMS("Invalid number of leftovers %d\n",
|
|
|
|
sha_leftovers);
|
2018-01-09 02:55:39 +07:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_TEXT_32);
|
|
|
|
/* Fill up to 64-4 bytes with zeros (leave the last write for length) */
|
|
|
|
while ((sha_idx % 64) < (64 - sizeof(sha_text))) {
|
|
|
|
ret = intel_write_sha_text(dev_priv, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
sha_idx += sizeof(sha_text);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Last write gets the length of the concatenation in bits. That is:
|
|
|
|
* - 5 bytes per device
|
|
|
|
* - 10 bytes for BINFO/BSTATUS(2), M0(8)
|
|
|
|
*/
|
|
|
|
sha_text = (num_downstream * 5 + 10) * 8;
|
|
|
|
ret = intel_write_sha_text(dev_priv, sha_text);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
/* Tell the HW we're done with the hash and wait for it to ACK */
|
|
|
|
I915_WRITE(HDCP_REP_CTL, rep_ctl | HDCP_SHA1_COMPLETE_HASH);
|
|
|
|
if (intel_wait_for_register(dev_priv, HDCP_REP_CTL,
|
|
|
|
HDCP_SHA1_COMPLETE,
|
|
|
|
HDCP_SHA1_COMPLETE, 1)) {
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_ERROR("Timed out waiting for SHA1 complete\n");
|
2018-01-09 02:55:39 +07:00
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
if (!(I915_READ(HDCP_REP_CTL) & HDCP_SHA1_V_MATCH)) {
|
2018-04-02 17:10:32 +07:00
|
|
|
DRM_DEBUG_KMS("SHA-1 mismatch, HDCP failed\n");
|
2018-01-09 02:55:39 +07:00
|
|
|
return -ENXIO;
|
|
|
|
}
|
|
|
|
|
2018-04-02 17:10:32 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Implements Part 2 of the HDCP authorization procedure */
|
|
|
|
static
|
|
|
|
int intel_hdcp_auth_downstream(struct intel_digital_port *intel_dig_port,
|
|
|
|
const struct intel_hdcp_shim *shim)
|
|
|
|
{
|
|
|
|
u8 bstatus[2], num_downstream, *ksv_fifo;
|
|
|
|
int ret, i, tries = 3;
|
|
|
|
|
|
|
|
ret = intel_hdcp_poll_ksv_fifo(intel_dig_port, shim);
|
|
|
|
if (ret) {
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_DEBUG_KMS("KSV list failed to become ready (%d)\n", ret);
|
2018-04-02 17:10:32 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = shim->read_bstatus(intel_dig_port, bstatus);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
if (DRM_HDCP_MAX_DEVICE_EXCEEDED(bstatus[0]) ||
|
|
|
|
DRM_HDCP_MAX_CASCADE_EXCEEDED(bstatus[1])) {
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_DEBUG_KMS("Max Topology Limit Exceeded\n");
|
2018-04-02 17:10:32 +07:00
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* When repeater reports 0 device count, HDCP1.4 spec allows disabling
|
|
|
|
* the HDCP encryption. That implies that repeater can't have its own
|
|
|
|
* display. As there is no consumption of encrypted content in the
|
|
|
|
* repeater with 0 downstream devices, we are failing the
|
|
|
|
* authentication.
|
|
|
|
*/
|
|
|
|
num_downstream = DRM_HDCP_NUM_DOWNSTREAM(bstatus[0]);
|
|
|
|
if (num_downstream == 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
treewide: kzalloc() -> kcalloc()
The kzalloc() function has a 2-factor argument form, kcalloc(). This
patch replaces cases of:
kzalloc(a * b, gfp)
with:
kcalloc(a * b, gfp)
as well as handling cases of:
kzalloc(a * b * c, gfp)
with:
kzalloc(array3_size(a, b, c), gfp)
as it's slightly less ugly than:
kzalloc_array(array_size(a, b), c, gfp)
This does, however, attempt to ignore constant size factors like:
kzalloc(4 * 1024, gfp)
though any constants defined via macros get caught up in the conversion.
Any factors with a sizeof() of "unsigned char", "char", and "u8" were
dropped, since they're redundant.
The Coccinelle script used for this was:
// Fix redundant parens around sizeof().
@@
type TYPE;
expression THING, E;
@@
(
kzalloc(
- (sizeof(TYPE)) * E
+ sizeof(TYPE) * E
, ...)
|
kzalloc(
- (sizeof(THING)) * E
+ sizeof(THING) * E
, ...)
)
// Drop single-byte sizes and redundant parens.
@@
expression COUNT;
typedef u8;
typedef __u8;
@@
(
kzalloc(
- sizeof(u8) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(__u8) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(char) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(unsigned char) * (COUNT)
+ COUNT
, ...)
|
kzalloc(
- sizeof(u8) * COUNT
+ COUNT
, ...)
|
kzalloc(
- sizeof(__u8) * COUNT
+ COUNT
, ...)
|
kzalloc(
- sizeof(char) * COUNT
+ COUNT
, ...)
|
kzalloc(
- sizeof(unsigned char) * COUNT
+ COUNT
, ...)
)
// 2-factor product with sizeof(type/expression) and identifier or constant.
@@
type TYPE;
expression THING;
identifier COUNT_ID;
constant COUNT_CONST;
@@
(
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * (COUNT_ID)
+ COUNT_ID, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * COUNT_ID
+ COUNT_ID, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * (COUNT_CONST)
+ COUNT_CONST, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * COUNT_CONST
+ COUNT_CONST, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * (COUNT_ID)
+ COUNT_ID, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * COUNT_ID
+ COUNT_ID, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * (COUNT_CONST)
+ COUNT_CONST, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * COUNT_CONST
+ COUNT_CONST, sizeof(THING)
, ...)
)
// 2-factor product, only identifiers.
@@
identifier SIZE, COUNT;
@@
- kzalloc
+ kcalloc
(
- SIZE * COUNT
+ COUNT, SIZE
, ...)
// 3-factor product with 1 sizeof(type) or sizeof(expression), with
// redundant parens removed.
@@
expression THING;
identifier STRIDE, COUNT;
type TYPE;
@@
(
kzalloc(
- sizeof(TYPE) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(TYPE) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(TYPE) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(TYPE) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(TYPE))
, ...)
|
kzalloc(
- sizeof(THING) * (COUNT) * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kzalloc(
- sizeof(THING) * (COUNT) * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kzalloc(
- sizeof(THING) * COUNT * (STRIDE)
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
|
kzalloc(
- sizeof(THING) * COUNT * STRIDE
+ array3_size(COUNT, STRIDE, sizeof(THING))
, ...)
)
// 3-factor product with 2 sizeof(variable), with redundant parens removed.
@@
expression THING1, THING2;
identifier COUNT;
type TYPE1, TYPE2;
@@
(
kzalloc(
- sizeof(TYPE1) * sizeof(TYPE2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
kzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(TYPE2))
, ...)
|
kzalloc(
- sizeof(THING1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
kzalloc(
- sizeof(THING1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(THING1), sizeof(THING2))
, ...)
|
kzalloc(
- sizeof(TYPE1) * sizeof(THING2) * COUNT
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
|
kzalloc(
- sizeof(TYPE1) * sizeof(THING2) * (COUNT)
+ array3_size(COUNT, sizeof(TYPE1), sizeof(THING2))
, ...)
)
// 3-factor product, only identifiers, with redundant parens removed.
@@
identifier STRIDE, SIZE, COUNT;
@@
(
kzalloc(
- (COUNT) * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- (COUNT) * (STRIDE) * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- (COUNT) * STRIDE * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- (COUNT) * (STRIDE) * (SIZE)
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
|
kzalloc(
- COUNT * STRIDE * SIZE
+ array3_size(COUNT, STRIDE, SIZE)
, ...)
)
// Any remaining multi-factor products, first at least 3-factor products,
// when they're not all constants...
@@
expression E1, E2, E3;
constant C1, C2, C3;
@@
(
kzalloc(C1 * C2 * C3, ...)
|
kzalloc(
- (E1) * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
|
kzalloc(
- (E1) * (E2) * E3
+ array3_size(E1, E2, E3)
, ...)
|
kzalloc(
- (E1) * (E2) * (E3)
+ array3_size(E1, E2, E3)
, ...)
|
kzalloc(
- E1 * E2 * E3
+ array3_size(E1, E2, E3)
, ...)
)
// And then all remaining 2 factors products when they're not all constants,
// keeping sizeof() as the second factor argument.
@@
expression THING, E1, E2;
type TYPE;
constant C1, C2, C3;
@@
(
kzalloc(sizeof(THING) * C2, ...)
|
kzalloc(sizeof(TYPE) * C2, ...)
|
kzalloc(C1 * C2 * C3, ...)
|
kzalloc(C1 * C2, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * (E2)
+ E2, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(TYPE) * E2
+ E2, sizeof(TYPE)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * (E2)
+ E2, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- sizeof(THING) * E2
+ E2, sizeof(THING)
, ...)
|
- kzalloc
+ kcalloc
(
- (E1) * E2
+ E1, E2
, ...)
|
- kzalloc
+ kcalloc
(
- (E1) * (E2)
+ E1, E2
, ...)
|
- kzalloc
+ kcalloc
(
- E1 * E2
+ E1, E2
, ...)
)
Signed-off-by: Kees Cook <keescook@chromium.org>
2018-06-13 04:03:40 +07:00
|
|
|
ksv_fifo = kcalloc(DRM_HDCP_KSV_LEN, num_downstream, GFP_KERNEL);
|
2018-04-02 17:10:32 +07:00
|
|
|
if (!ksv_fifo)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
ret = shim->read_ksv_fifo(intel_dig_port, num_downstream, ksv_fifo);
|
|
|
|
if (ret)
|
2018-04-05 05:59:57 +07:00
|
|
|
goto err;
|
2018-04-02 17:10:32 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* When V prime mismatches, DP Spec mandates re-read of
|
|
|
|
* V prime atleast twice.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < tries; i++) {
|
|
|
|
ret = intel_hdcp_validate_v_prime(intel_dig_port, shim,
|
|
|
|
ksv_fifo, num_downstream,
|
|
|
|
bstatus);
|
|
|
|
if (!ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i == tries) {
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_DEBUG_KMS("V Prime validation failed.(%d)\n", ret);
|
2018-04-05 05:59:57 +07:00
|
|
|
goto err;
|
2018-04-02 17:10:32 +07:00
|
|
|
}
|
|
|
|
|
2018-01-30 21:47:01 +07:00
|
|
|
DRM_DEBUG_KMS("HDCP is enabled (%d downstream devices)\n",
|
|
|
|
num_downstream);
|
2018-04-05 05:59:57 +07:00
|
|
|
ret = 0;
|
|
|
|
err:
|
|
|
|
kfree(ksv_fifo);
|
|
|
|
return ret;
|
2018-01-09 02:55:39 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Implements Part 1 of the HDCP authorization procedure */
|
|
|
|
static int intel_hdcp_auth(struct intel_digital_port *intel_dig_port,
|
|
|
|
const struct intel_hdcp_shim *shim)
|
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv;
|
|
|
|
enum port port;
|
|
|
|
unsigned long r0_prime_gen_start;
|
2018-02-06 00:32:02 +07:00
|
|
|
int ret, i, tries = 2;
|
2018-01-09 02:55:39 +07:00
|
|
|
union {
|
|
|
|
u32 reg[2];
|
|
|
|
u8 shim[DRM_HDCP_AN_LEN];
|
|
|
|
} an;
|
|
|
|
union {
|
|
|
|
u32 reg[2];
|
|
|
|
u8 shim[DRM_HDCP_KSV_LEN];
|
|
|
|
} bksv;
|
|
|
|
union {
|
|
|
|
u32 reg;
|
|
|
|
u8 shim[DRM_HDCP_RI_LEN];
|
|
|
|
} ri;
|
2018-02-03 05:09:08 +07:00
|
|
|
bool repeater_present, hdcp_capable;
|
2018-01-09 02:55:39 +07:00
|
|
|
|
|
|
|
dev_priv = intel_dig_port->base.base.dev->dev_private;
|
|
|
|
|
|
|
|
port = intel_dig_port->base.port;
|
|
|
|
|
2018-02-03 05:09:08 +07:00
|
|
|
/*
|
|
|
|
* Detects whether the display is HDCP capable. Although we check for
|
|
|
|
* valid Bksv below, the HDCP over DP spec requires that we check
|
|
|
|
* whether the display supports HDCP before we write An. For HDMI
|
|
|
|
* displays, this is not necessary.
|
|
|
|
*/
|
|
|
|
if (shim->hdcp_capable) {
|
|
|
|
ret = shim->hdcp_capable(intel_dig_port, &hdcp_capable);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
if (!hdcp_capable) {
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_DEBUG_KMS("Panel is not HDCP capable\n");
|
2018-02-03 05:09:08 +07:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
/* Initialize An with 2 random values and acquire it */
|
|
|
|
for (i = 0; i < 2; i++)
|
|
|
|
I915_WRITE(PORT_HDCP_ANINIT(port), get_random_u32());
|
|
|
|
I915_WRITE(PORT_HDCP_CONF(port), HDCP_CONF_CAPTURE_AN);
|
|
|
|
|
|
|
|
/* Wait for An to be acquired */
|
|
|
|
if (intel_wait_for_register(dev_priv, PORT_HDCP_STATUS(port),
|
|
|
|
HDCP_STATUS_AN_READY,
|
|
|
|
HDCP_STATUS_AN_READY, 1)) {
|
|
|
|
DRM_ERROR("Timed out waiting for An\n");
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
an.reg[0] = I915_READ(PORT_HDCP_ANLO(port));
|
|
|
|
an.reg[1] = I915_READ(PORT_HDCP_ANHI(port));
|
|
|
|
ret = shim->write_an_aksv(intel_dig_port, an.shim);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
r0_prime_gen_start = jiffies;
|
|
|
|
|
|
|
|
memset(&bksv, 0, sizeof(bksv));
|
2018-02-06 00:32:02 +07:00
|
|
|
|
2018-10-23 16:22:27 +07:00
|
|
|
ret = intel_hdcp_read_valid_bksv(intel_dig_port, shim, bksv.shim);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2018-01-09 02:55:39 +07:00
|
|
|
|
|
|
|
I915_WRITE(PORT_HDCP_BKSVLO(port), bksv.reg[0]);
|
|
|
|
I915_WRITE(PORT_HDCP_BKSVHI(port), bksv.reg[1]);
|
|
|
|
|
|
|
|
ret = shim->repeater_present(intel_dig_port, &repeater_present);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
if (repeater_present)
|
|
|
|
I915_WRITE(HDCP_REP_CTL,
|
|
|
|
intel_hdcp_get_repeater_ctl(intel_dig_port));
|
|
|
|
|
|
|
|
ret = shim->toggle_signalling(intel_dig_port, true);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
I915_WRITE(PORT_HDCP_CONF(port), HDCP_CONF_AUTH_AND_ENC);
|
|
|
|
|
|
|
|
/* Wait for R0 ready */
|
|
|
|
if (wait_for(I915_READ(PORT_HDCP_STATUS(port)) &
|
|
|
|
(HDCP_STATUS_R0_READY | HDCP_STATUS_ENC), 1)) {
|
|
|
|
DRM_ERROR("Timed out waiting for R0 ready\n");
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Wait for R0' to become available. The spec says 100ms from Aksv, but
|
|
|
|
* some monitors can take longer than this. We'll set the timeout at
|
|
|
|
* 300ms just to be sure.
|
|
|
|
*
|
|
|
|
* On DP, there's an R0_READY bit available but no such bit
|
|
|
|
* exists on HDMI. Since the upper-bound is the same, we'll just do
|
|
|
|
* the stupid thing instead of polling on one and not the other.
|
|
|
|
*/
|
|
|
|
wait_remaining_ms_from_jiffies(r0_prime_gen_start, 300);
|
|
|
|
|
2018-04-02 18:50:22 +07:00
|
|
|
tries = 3;
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-04-02 18:50:22 +07:00
|
|
|
/*
|
|
|
|
* DP HDCP Spec mandates the two more reattempt to read R0, incase
|
|
|
|
* of R0 mismatch.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < tries; i++) {
|
|
|
|
ri.reg = 0;
|
|
|
|
ret = shim->read_ri_prime(intel_dig_port, ri.shim);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
I915_WRITE(PORT_HDCP_RPRIME(port), ri.reg);
|
|
|
|
|
|
|
|
/* Wait for Ri prime match */
|
|
|
|
if (!wait_for(I915_READ(PORT_HDCP_STATUS(port)) &
|
|
|
|
(HDCP_STATUS_RI_MATCH | HDCP_STATUS_ENC), 1))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i == tries) {
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_DEBUG_KMS("Timed out waiting for Ri prime match (%x)\n",
|
|
|
|
I915_READ(PORT_HDCP_STATUS(port)));
|
2018-01-09 02:55:39 +07:00
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Wait for encryption confirmation */
|
|
|
|
if (intel_wait_for_register(dev_priv, PORT_HDCP_STATUS(port),
|
2018-12-05 18:44:43 +07:00
|
|
|
HDCP_STATUS_ENC, HDCP_STATUS_ENC,
|
|
|
|
ENCRYPT_STATUS_CHANGE_TIMEOUT_MS)) {
|
2018-01-09 02:55:39 +07:00
|
|
|
DRM_ERROR("Timed out waiting for encryption\n");
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX: If we have MST-connected devices, we need to enable encryption
|
|
|
|
* on those as well.
|
|
|
|
*/
|
|
|
|
|
2018-01-18 12:48:06 +07:00
|
|
|
if (repeater_present)
|
|
|
|
return intel_hdcp_auth_downstream(intel_dig_port, shim);
|
|
|
|
|
2018-01-30 21:47:01 +07:00
|
|
|
DRM_DEBUG_KMS("HDCP is enabled (no repeater present)\n");
|
2018-01-18 12:48:06 +07:00
|
|
|
return 0;
|
2018-01-09 02:55:39 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int _intel_hdcp_disable(struct intel_connector *connector)
|
|
|
|
{
|
2018-10-29 16:45:46 +07:00
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
2018-01-09 02:55:39 +07:00
|
|
|
struct drm_i915_private *dev_priv = connector->base.dev->dev_private;
|
|
|
|
struct intel_digital_port *intel_dig_port = conn_to_dig_port(connector);
|
|
|
|
enum port port = intel_dig_port->base.port;
|
|
|
|
int ret;
|
|
|
|
|
2018-02-03 05:09:05 +07:00
|
|
|
DRM_DEBUG_KMS("[%s:%d] HDCP is being disabled...\n",
|
|
|
|
connector->base.name, connector->base.base.id);
|
|
|
|
|
2019-02-17 00:36:52 +07:00
|
|
|
hdcp->hdcp_encrypted = false;
|
2018-01-09 02:55:39 +07:00
|
|
|
I915_WRITE(PORT_HDCP_CONF(port), 0);
|
|
|
|
if (intel_wait_for_register(dev_priv, PORT_HDCP_STATUS(port), ~0, 0,
|
2018-12-05 18:44:43 +07:00
|
|
|
ENCRYPT_STATUS_CHANGE_TIMEOUT_MS)) {
|
2018-01-09 02:55:39 +07:00
|
|
|
DRM_ERROR("Failed to disable HDCP, timeout clearing status\n");
|
|
|
|
return -ETIMEDOUT;
|
|
|
|
}
|
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
ret = hdcp->shim->toggle_signalling(intel_dig_port, false);
|
2018-01-09 02:55:39 +07:00
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Failed to disable HDCP signalling\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-01-30 21:47:01 +07:00
|
|
|
DRM_DEBUG_KMS("HDCP is disabled\n");
|
2018-01-09 02:55:39 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _intel_hdcp_enable(struct intel_connector *connector)
|
|
|
|
{
|
2018-10-29 16:45:46 +07:00
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
2018-01-09 02:55:39 +07:00
|
|
|
struct drm_i915_private *dev_priv = connector->base.dev->dev_private;
|
2018-02-03 05:09:09 +07:00
|
|
|
int i, ret, tries = 3;
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-02-03 05:09:05 +07:00
|
|
|
DRM_DEBUG_KMS("[%s:%d] HDCP is being enabled...\n",
|
|
|
|
connector->base.name, connector->base.base.id);
|
|
|
|
|
2018-04-02 17:10:33 +07:00
|
|
|
if (!hdcp_key_loadable(dev_priv)) {
|
|
|
|
DRM_ERROR("HDCP key Load is not possible\n");
|
2018-01-09 02:55:39 +07:00
|
|
|
return -ENXIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < KEY_LOAD_TRIES; i++) {
|
|
|
|
ret = intel_hdcp_load_keys(dev_priv);
|
|
|
|
if (!ret)
|
|
|
|
break;
|
|
|
|
intel_hdcp_clear_keys(dev_priv);
|
|
|
|
}
|
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Could not load HDCP keys, (%d)\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-02-03 05:09:09 +07:00
|
|
|
/* Incase of authentication failures, HDCP spec expects reauth. */
|
|
|
|
for (i = 0; i < tries; i++) {
|
2018-10-29 16:45:46 +07:00
|
|
|
ret = intel_hdcp_auth(conn_to_dig_port(connector), hdcp->shim);
|
2019-02-17 00:36:52 +07:00
|
|
|
if (!ret) {
|
|
|
|
hdcp->hdcp_encrypted = true;
|
2018-02-03 05:09:09 +07:00
|
|
|
return 0;
|
2019-02-17 00:36:52 +07:00
|
|
|
}
|
2018-02-03 05:09:09 +07:00
|
|
|
|
|
|
|
DRM_DEBUG_KMS("HDCP Auth failure (%d)\n", ret);
|
2018-02-03 05:09:03 +07:00
|
|
|
|
|
|
|
/* Ensuring HDCP encryption and signalling are stopped. */
|
|
|
|
_intel_hdcp_disable(connector);
|
2018-01-09 02:55:39 +07:00
|
|
|
}
|
|
|
|
|
2018-10-29 16:45:47 +07:00
|
|
|
DRM_DEBUG_KMS("HDCP authentication failed (%d tries/%d)\n", tries, ret);
|
2018-02-03 05:09:09 +07:00
|
|
|
return ret;
|
2018-01-09 02:55:39 +07:00
|
|
|
}
|
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
static inline
|
|
|
|
struct intel_connector *intel_hdcp_to_connector(struct intel_hdcp *hdcp)
|
|
|
|
{
|
|
|
|
return container_of(hdcp, struct intel_connector, hdcp);
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:48 +07:00
|
|
|
/* Implements Part 3 of the HDCP authorization procedure */
|
|
|
|
int intel_hdcp_check_link(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
struct drm_i915_private *dev_priv = connector->base.dev->dev_private;
|
|
|
|
struct intel_digital_port *intel_dig_port = conn_to_dig_port(connector);
|
|
|
|
enum port port = intel_dig_port->base.port;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
mutex_lock(&hdcp->mutex);
|
|
|
|
|
2019-02-17 00:36:52 +07:00
|
|
|
/* Check_link valid only when HDCP1.4 is enabled */
|
|
|
|
if (hdcp->value != DRM_MODE_CONTENT_PROTECTION_ENABLED ||
|
|
|
|
!hdcp->hdcp_encrypted) {
|
|
|
|
ret = -EINVAL;
|
2019-02-17 00:36:48 +07:00
|
|
|
goto out;
|
2019-02-17 00:36:52 +07:00
|
|
|
}
|
2019-02-17 00:36:48 +07:00
|
|
|
|
2019-02-17 00:36:52 +07:00
|
|
|
if (WARN_ON(!intel_hdcp_in_use(connector))) {
|
|
|
|
DRM_ERROR("%s:%d HDCP link stopped encryption,%x\n",
|
2019-02-17 00:36:48 +07:00
|
|
|
connector->base.name, connector->base.base.id,
|
|
|
|
I915_READ(PORT_HDCP_STATUS(port)));
|
|
|
|
ret = -ENXIO;
|
|
|
|
hdcp->value = DRM_MODE_CONTENT_PROTECTION_DESIRED;
|
|
|
|
schedule_work(&hdcp->prop_work);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (hdcp->shim->check_link(intel_dig_port)) {
|
|
|
|
if (hdcp->value != DRM_MODE_CONTENT_PROTECTION_UNDESIRED) {
|
|
|
|
hdcp->value = DRM_MODE_CONTENT_PROTECTION_ENABLED;
|
|
|
|
schedule_work(&hdcp->prop_work);
|
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
DRM_DEBUG_KMS("[%s:%d] HDCP link failed, retrying authentication\n",
|
|
|
|
connector->base.name, connector->base.base.id);
|
|
|
|
|
|
|
|
ret = _intel_hdcp_disable(connector);
|
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Failed to disable hdcp (%d)\n", ret);
|
|
|
|
hdcp->value = DRM_MODE_CONTENT_PROTECTION_DESIRED;
|
|
|
|
schedule_work(&hdcp->prop_work);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = _intel_hdcp_enable(connector);
|
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Failed to enable hdcp (%d)\n", ret);
|
|
|
|
hdcp->value = DRM_MODE_CONTENT_PROTECTION_DESIRED;
|
|
|
|
schedule_work(&hdcp->prop_work);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
mutex_unlock(&hdcp->mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
static void intel_hdcp_prop_work(struct work_struct *work)
|
|
|
|
{
|
2018-10-29 16:45:46 +07:00
|
|
|
struct intel_hdcp *hdcp = container_of(work, struct intel_hdcp,
|
|
|
|
prop_work);
|
|
|
|
struct intel_connector *connector = intel_hdcp_to_connector(hdcp);
|
2018-01-09 02:55:39 +07:00
|
|
|
struct drm_device *dev = connector->base.dev;
|
|
|
|
struct drm_connector_state *state;
|
|
|
|
|
|
|
|
drm_modeset_lock(&dev->mode_config.connection_mutex, NULL);
|
2018-10-29 16:45:46 +07:00
|
|
|
mutex_lock(&hdcp->mutex);
|
2018-01-09 02:55:39 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* This worker is only used to flip between ENABLED/DESIRED. Either of
|
2018-10-29 16:45:46 +07:00
|
|
|
* those to UNDESIRED is handled by core. If value == UNDESIRED,
|
2018-01-09 02:55:39 +07:00
|
|
|
* we're running just after hdcp has been disabled, so just exit
|
|
|
|
*/
|
2018-10-29 16:45:46 +07:00
|
|
|
if (hdcp->value != DRM_MODE_CONTENT_PROTECTION_UNDESIRED) {
|
2018-01-09 02:55:39 +07:00
|
|
|
state = connector->base.state;
|
2018-10-29 16:45:46 +07:00
|
|
|
state->content_protection = hdcp->value;
|
2018-01-09 02:55:39 +07:00
|
|
|
}
|
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
mutex_unlock(&hdcp->mutex);
|
2018-01-09 02:55:39 +07:00
|
|
|
drm_modeset_unlock(&dev->mode_config.connection_mutex);
|
|
|
|
}
|
|
|
|
|
2018-01-18 12:48:05 +07:00
|
|
|
bool is_hdcp_supported(struct drm_i915_private *dev_priv, enum port port)
|
|
|
|
{
|
|
|
|
/* PORT E doesn't have HDCP, and PORT F is disabled */
|
2018-12-05 18:44:41 +07:00
|
|
|
return INTEL_GEN(dev_priv) >= 9 && port < PORT_E;
|
2018-01-18 12:48:05 +07:00
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:51 +07:00
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_prepare_ake_init(struct intel_connector *connector,
|
|
|
|
struct hdcp2_ake_init *ake_data)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->initiate_hdcp2_session(comp->mei_dev, data, ake_data);
|
|
|
|
if (ret)
|
|
|
|
DRM_DEBUG_KMS("Prepare_ake_init failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_verify_rx_cert_prepare_km(struct intel_connector *connector,
|
|
|
|
struct hdcp2_ake_send_cert *rx_cert,
|
|
|
|
bool *paired,
|
|
|
|
struct hdcp2_ake_no_stored_km *ek_pub_km,
|
|
|
|
size_t *msg_sz)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->verify_receiver_cert_prepare_km(comp->mei_dev, data,
|
|
|
|
rx_cert, paired,
|
|
|
|
ek_pub_km, msg_sz);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Verify rx_cert failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_verify_hprime(struct intel_connector *connector,
|
|
|
|
struct hdcp2_ake_send_hprime *rx_hprime)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->verify_hprime(comp->mei_dev, data, rx_hprime);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Verify hprime failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_store_pairing_info(struct intel_connector *connector,
|
|
|
|
struct hdcp2_ake_send_pairing_info *pairing_info)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->store_pairing_info(comp->mei_dev, data, pairing_info);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Store pairing info failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_prepare_lc_init(struct intel_connector *connector,
|
|
|
|
struct hdcp2_lc_init *lc_init)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->initiate_locality_check(comp->mei_dev, data, lc_init);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Prepare lc_init failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_verify_lprime(struct intel_connector *connector,
|
|
|
|
struct hdcp2_lc_send_lprime *rx_lprime)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->verify_lprime(comp->mei_dev, data, rx_lprime);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Verify L_Prime failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused))
|
|
|
|
int hdcp2_prepare_skey(struct intel_connector *connector,
|
|
|
|
struct hdcp2_ske_send_eks *ske_data)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->get_session_key(comp->mei_dev, data, ske_data);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Get session key failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_verify_rep_topology_prepare_ack(struct intel_connector *connector,
|
|
|
|
struct hdcp2_rep_send_receiverid_list
|
|
|
|
*rep_topology,
|
|
|
|
struct hdcp2_rep_send_ack *rep_send_ack)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->repeater_check_flow_prepare_ack(comp->mei_dev, data,
|
|
|
|
rep_topology,
|
|
|
|
rep_send_ack);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Verify rep topology failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused)) int
|
|
|
|
hdcp2_verify_mprime(struct intel_connector *connector,
|
|
|
|
struct hdcp2_rep_stream_ready *stream_ready)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->verify_mprime(comp->mei_dev, data, stream_ready);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Verify mprime failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static __attribute__((unused))
|
|
|
|
int hdcp2_authenticate_port(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct hdcp_port_data *data = &connector->hdcp.port_data;
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->enable_hdcp_authentication(comp->mei_dev, data);
|
|
|
|
if (ret < 0)
|
|
|
|
DRM_DEBUG_KMS("Enable hdcp auth failed. %d\n", ret);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:53 +07:00
|
|
|
static int hdcp2_close_mei_session(struct intel_connector *connector)
|
2019-02-17 00:36:51 +07:00
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct i915_hdcp_comp_master *comp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
comp = dev_priv->hdcp_master;
|
|
|
|
|
|
|
|
if (!comp || !comp->ops) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = comp->ops->close_hdcp_session(comp->mei_dev,
|
|
|
|
&connector->hdcp.port_data);
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:53 +07:00
|
|
|
static int hdcp2_deauthenticate_port(struct intel_connector *connector)
|
2019-02-17 00:36:51 +07:00
|
|
|
{
|
|
|
|
return hdcp2_close_mei_session(connector);
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:53 +07:00
|
|
|
static int hdcp2_authenticate_sink(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
DRM_ERROR("Sink authentication is done in subsequent patches\n");
|
|
|
|
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int hdcp2_enable_encryption(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_digital_port *intel_dig_port = conn_to_dig_port(connector);
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
enum port port = connector->encoder->port;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
WARN_ON(I915_READ(HDCP2_STATUS_DDI(port)) & LINK_ENCRYPTION_STATUS);
|
|
|
|
|
|
|
|
if (hdcp->shim->toggle_signalling) {
|
|
|
|
ret = hdcp->shim->toggle_signalling(intel_dig_port, true);
|
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Failed to enable HDCP signalling. %d\n",
|
|
|
|
ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (I915_READ(HDCP2_STATUS_DDI(port)) & LINK_AUTH_STATUS) {
|
|
|
|
/* Link is Authenticated. Now set for Encryption */
|
|
|
|
I915_WRITE(HDCP2_CTL_DDI(port),
|
|
|
|
I915_READ(HDCP2_CTL_DDI(port)) |
|
|
|
|
CTL_LINK_ENCRYPTION_REQ);
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = intel_wait_for_register(dev_priv, HDCP2_STATUS_DDI(port),
|
|
|
|
LINK_ENCRYPTION_STATUS,
|
|
|
|
LINK_ENCRYPTION_STATUS,
|
|
|
|
ENCRYPT_STATUS_CHANGE_TIMEOUT_MS);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int hdcp2_disable_encryption(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_digital_port *intel_dig_port = conn_to_dig_port(connector);
|
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
enum port port = connector->encoder->port;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
WARN_ON(!(I915_READ(HDCP2_STATUS_DDI(port)) & LINK_ENCRYPTION_STATUS));
|
|
|
|
|
|
|
|
I915_WRITE(HDCP2_CTL_DDI(port),
|
|
|
|
I915_READ(HDCP2_CTL_DDI(port)) & ~CTL_LINK_ENCRYPTION_REQ);
|
|
|
|
|
|
|
|
ret = intel_wait_for_register(dev_priv, HDCP2_STATUS_DDI(port),
|
|
|
|
LINK_ENCRYPTION_STATUS, 0x0,
|
|
|
|
ENCRYPT_STATUS_CHANGE_TIMEOUT_MS);
|
|
|
|
if (ret == -ETIMEDOUT)
|
|
|
|
DRM_DEBUG_KMS("Disable Encryption Timedout");
|
|
|
|
|
|
|
|
if (hdcp->shim->toggle_signalling) {
|
|
|
|
ret = hdcp->shim->toggle_signalling(intel_dig_port, false);
|
|
|
|
if (ret) {
|
|
|
|
DRM_ERROR("Failed to disable HDCP signalling. %d\n",
|
|
|
|
ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int hdcp2_authenticate_and_encrypt(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
int ret, i, tries = 3;
|
|
|
|
|
|
|
|
for (i = 0; i < tries; i++) {
|
|
|
|
ret = hdcp2_authenticate_sink(connector);
|
|
|
|
if (!ret)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Clearing the mei hdcp session */
|
|
|
|
DRM_DEBUG_KMS("HDCP2.2 Auth %d of %d Failed.(%d)\n",
|
|
|
|
i + 1, tries, ret);
|
|
|
|
if (hdcp2_deauthenticate_port(connector) < 0)
|
|
|
|
DRM_DEBUG_KMS("Port deauth failed.\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i != tries) {
|
|
|
|
/*
|
|
|
|
* Ensuring the required 200mSec min time interval between
|
|
|
|
* Session Key Exchange and encryption.
|
|
|
|
*/
|
|
|
|
msleep(HDCP_2_2_DELAY_BEFORE_ENCRYPTION_EN);
|
|
|
|
ret = hdcp2_enable_encryption(connector);
|
|
|
|
if (ret < 0) {
|
|
|
|
DRM_DEBUG_KMS("Encryption Enable Failed.(%d)\n", ret);
|
|
|
|
if (hdcp2_deauthenticate_port(connector) < 0)
|
|
|
|
DRM_DEBUG_KMS("Port deauth failed.\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _intel_hdcp2_enable(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
DRM_DEBUG_KMS("[%s:%d] HDCP2.2 is being enabled. Type: %d\n",
|
|
|
|
connector->base.name, connector->base.base.id,
|
|
|
|
hdcp->content_type);
|
|
|
|
|
|
|
|
ret = hdcp2_authenticate_and_encrypt(connector);
|
|
|
|
if (ret) {
|
|
|
|
DRM_DEBUG_KMS("HDCP2 Type%d Enabling Failed. (%d)\n",
|
|
|
|
hdcp->content_type, ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
DRM_DEBUG_KMS("[%s:%d] HDCP2.2 is enabled. Type %d\n",
|
|
|
|
connector->base.name, connector->base.base.id,
|
|
|
|
hdcp->content_type);
|
|
|
|
|
|
|
|
hdcp->hdcp2_encrypted = true;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int _intel_hdcp2_disable(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
DRM_DEBUG_KMS("[%s:%d] HDCP2.2 is being Disabled\n",
|
|
|
|
connector->base.name, connector->base.base.id);
|
|
|
|
|
|
|
|
ret = hdcp2_disable_encryption(connector);
|
|
|
|
|
|
|
|
if (hdcp2_deauthenticate_port(connector) < 0)
|
|
|
|
DRM_DEBUG_KMS("Port deauth failed.\n");
|
|
|
|
|
|
|
|
connector->hdcp.hdcp2_encrypted = false;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:52 +07:00
|
|
|
static void intel_hdcp_check_work(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct intel_hdcp *hdcp = container_of(to_delayed_work(work),
|
|
|
|
struct intel_hdcp,
|
|
|
|
check_work);
|
|
|
|
struct intel_connector *connector = intel_hdcp_to_connector(hdcp);
|
|
|
|
|
|
|
|
if (!intel_hdcp_check_link(connector))
|
|
|
|
schedule_delayed_work(&hdcp->check_work,
|
|
|
|
DRM_HDCP_CHECK_PERIOD_MS);
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:51 +07:00
|
|
|
static int i915_hdcp_component_bind(struct device *i915_kdev,
|
|
|
|
struct device *mei_kdev, void *data)
|
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv = kdev_to_i915(i915_kdev);
|
|
|
|
|
|
|
|
DRM_DEBUG("I915 HDCP comp bind\n");
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
dev_priv->hdcp_master = (struct i915_hdcp_comp_master *)data;
|
|
|
|
dev_priv->hdcp_master->mei_dev = mei_kdev;
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void i915_hdcp_component_unbind(struct device *i915_kdev,
|
|
|
|
struct device *mei_kdev, void *data)
|
|
|
|
{
|
|
|
|
struct drm_i915_private *dev_priv = kdev_to_i915(i915_kdev);
|
|
|
|
|
|
|
|
DRM_DEBUG("I915 HDCP comp unbind\n");
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
dev_priv->hdcp_master = NULL;
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct component_ops i915_hdcp_component_ops = {
|
|
|
|
.bind = i915_hdcp_component_bind,
|
|
|
|
.unbind = i915_hdcp_component_unbind,
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline int initialize_hdcp_port_data(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
struct hdcp_port_data *data = &hdcp->port_data;
|
|
|
|
|
|
|
|
data->port = connector->encoder->port;
|
|
|
|
data->port_type = (u8)HDCP_PORT_TYPE_INTEGRATED;
|
|
|
|
data->protocol = (u8)hdcp->shim->protocol;
|
|
|
|
|
|
|
|
data->k = 1;
|
|
|
|
if (!data->streams)
|
|
|
|
data->streams = kcalloc(data->k,
|
|
|
|
sizeof(struct hdcp2_streamid_type),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!data->streams) {
|
|
|
|
DRM_ERROR("Out of Memory\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
data->streams[0].stream_id = 0;
|
|
|
|
data->streams[0].stream_type = hdcp->content_type;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:50 +07:00
|
|
|
static bool is_hdcp2_supported(struct drm_i915_private *dev_priv)
|
|
|
|
{
|
|
|
|
if (!IS_ENABLED(CONFIG_INTEL_MEI_HDCP))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return (INTEL_GEN(dev_priv) >= 10 || IS_GEMINILAKE(dev_priv) ||
|
|
|
|
IS_KABYLAKE(dev_priv));
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:51 +07:00
|
|
|
void intel_hdcp_component_init(struct drm_i915_private *dev_priv)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!is_hdcp2_supported(dev_priv))
|
|
|
|
return;
|
|
|
|
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
WARN_ON(dev_priv->hdcp_comp_added);
|
|
|
|
|
|
|
|
dev_priv->hdcp_comp_added = true;
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
ret = component_add_typed(dev_priv->drm.dev, &i915_hdcp_component_ops,
|
|
|
|
I915_COMPONENT_HDCP);
|
|
|
|
if (ret < 0) {
|
|
|
|
DRM_DEBUG_KMS("Failed at component add(%d)\n", ret);
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
dev_priv->hdcp_comp_added = false;
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:50 +07:00
|
|
|
static void intel_hdcp2_init(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
2019-02-17 00:36:51 +07:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = initialize_hdcp_port_data(connector);
|
|
|
|
if (ret) {
|
|
|
|
DRM_DEBUG_KMS("Mei hdcp data init failed\n");
|
|
|
|
return;
|
|
|
|
}
|
2019-02-17 00:36:50 +07:00
|
|
|
|
|
|
|
hdcp->hdcp2_supported = true;
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
int intel_hdcp_init(struct intel_connector *connector,
|
2018-10-29 16:45:46 +07:00
|
|
|
const struct intel_hdcp_shim *shim)
|
2018-01-09 02:55:39 +07:00
|
|
|
{
|
2019-02-17 00:36:50 +07:00
|
|
|
struct drm_i915_private *dev_priv = to_i915(connector->base.dev);
|
2018-10-29 16:45:46 +07:00
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
2018-01-09 02:55:39 +07:00
|
|
|
int ret;
|
|
|
|
|
2019-02-17 00:36:50 +07:00
|
|
|
if (!shim)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ret = drm_connector_attach_content_protection_property(&connector->base);
|
2018-01-09 02:55:39 +07:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
hdcp->shim = shim;
|
|
|
|
mutex_init(&hdcp->mutex);
|
|
|
|
INIT_DELAYED_WORK(&hdcp->check_work, intel_hdcp_check_work);
|
|
|
|
INIT_WORK(&hdcp->prop_work, intel_hdcp_prop_work);
|
2019-02-17 00:36:50 +07:00
|
|
|
|
|
|
|
if (is_hdcp2_supported(dev_priv))
|
|
|
|
intel_hdcp2_init(connector);
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int intel_hdcp_enable(struct intel_connector *connector)
|
|
|
|
{
|
2018-10-29 16:45:46 +07:00
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
2019-02-17 00:36:53 +07:00
|
|
|
int ret = -EINVAL;
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
if (!hdcp->shim)
|
2018-01-09 02:55:39 +07:00
|
|
|
return -ENOENT;
|
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
mutex_lock(&hdcp->mutex);
|
2019-02-17 00:36:53 +07:00
|
|
|
WARN_ON(hdcp->value == DRM_MODE_CONTENT_PROTECTION_ENABLED);
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2019-02-17 00:36:53 +07:00
|
|
|
/*
|
|
|
|
* Considering that HDCP2.2 is more secure than HDCP1.4, If the setup
|
|
|
|
* is capable of HDCP2.2, it is preferred to use HDCP2.2.
|
|
|
|
*/
|
|
|
|
if (intel_hdcp2_capable(connector))
|
|
|
|
ret = _intel_hdcp2_enable(connector);
|
|
|
|
|
|
|
|
/* When HDCP2.2 fails, HDCP1.4 will be attempted */
|
|
|
|
if (ret && intel_hdcp_capable(connector)) {
|
|
|
|
ret = _intel_hdcp_enable(connector);
|
|
|
|
if (!ret)
|
|
|
|
schedule_delayed_work(&hdcp->check_work,
|
|
|
|
DRM_HDCP_CHECK_PERIOD_MS);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ret) {
|
|
|
|
hdcp->value = DRM_MODE_CONTENT_PROTECTION_ENABLED;
|
|
|
|
schedule_work(&hdcp->prop_work);
|
|
|
|
}
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
mutex_unlock(&hdcp->mutex);
|
2018-01-09 02:55:39 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int intel_hdcp_disable(struct intel_connector *connector)
|
|
|
|
{
|
2018-10-29 16:45:46 +07:00
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
2018-01-10 01:53:13 +07:00
|
|
|
int ret = 0;
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
if (!hdcp->shim)
|
2018-01-09 02:55:39 +07:00
|
|
|
return -ENOENT;
|
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
mutex_lock(&hdcp->mutex);
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
if (hdcp->value != DRM_MODE_CONTENT_PROTECTION_UNDESIRED) {
|
|
|
|
hdcp->value = DRM_MODE_CONTENT_PROTECTION_UNDESIRED;
|
2019-02-17 00:36:53 +07:00
|
|
|
if (hdcp->hdcp2_encrypted)
|
|
|
|
ret = _intel_hdcp2_disable(connector);
|
|
|
|
else if (hdcp->hdcp_encrypted)
|
2019-02-17 00:36:52 +07:00
|
|
|
ret = _intel_hdcp_disable(connector);
|
2018-01-10 01:53:13 +07:00
|
|
|
}
|
2018-01-09 02:55:39 +07:00
|
|
|
|
2018-10-29 16:45:46 +07:00
|
|
|
mutex_unlock(&hdcp->mutex);
|
|
|
|
cancel_delayed_work_sync(&hdcp->check_work);
|
2018-01-09 02:55:39 +07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-02-17 00:36:51 +07:00
|
|
|
void intel_hdcp_component_fini(struct drm_i915_private *dev_priv)
|
|
|
|
{
|
|
|
|
mutex_lock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
if (!dev_priv->hdcp_comp_added) {
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
dev_priv->hdcp_comp_added = false;
|
|
|
|
mutex_unlock(&dev_priv->hdcp_comp_mutex);
|
|
|
|
|
|
|
|
component_del(dev_priv->drm.dev, &i915_hdcp_component_ops);
|
|
|
|
}
|
|
|
|
|
|
|
|
void intel_hdcp_cleanup(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
if (!connector->hdcp.shim)
|
|
|
|
return;
|
|
|
|
|
|
|
|
mutex_lock(&connector->hdcp.mutex);
|
|
|
|
kfree(connector->hdcp.port_data.streams);
|
|
|
|
mutex_unlock(&connector->hdcp.mutex);
|
|
|
|
}
|
|
|
|
|
2018-01-09 02:55:39 +07:00
|
|
|
void intel_hdcp_atomic_check(struct drm_connector *connector,
|
|
|
|
struct drm_connector_state *old_state,
|
|
|
|
struct drm_connector_state *new_state)
|
|
|
|
{
|
2019-01-16 16:15:19 +07:00
|
|
|
u64 old_cp = old_state->content_protection;
|
|
|
|
u64 new_cp = new_state->content_protection;
|
2018-01-09 02:55:39 +07:00
|
|
|
struct drm_crtc_state *crtc_state;
|
|
|
|
|
|
|
|
if (!new_state->crtc) {
|
|
|
|
/*
|
|
|
|
* If the connector is being disabled with CP enabled, mark it
|
|
|
|
* desired so it's re-enabled when the connector is brought back
|
|
|
|
*/
|
|
|
|
if (old_cp == DRM_MODE_CONTENT_PROTECTION_ENABLED)
|
|
|
|
new_state->content_protection =
|
|
|
|
DRM_MODE_CONTENT_PROTECTION_DESIRED;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Nothing to do if the state didn't change, or HDCP was activated since
|
|
|
|
* the last commit
|
|
|
|
*/
|
|
|
|
if (old_cp == new_cp ||
|
|
|
|
(old_cp == DRM_MODE_CONTENT_PROTECTION_DESIRED &&
|
|
|
|
new_cp == DRM_MODE_CONTENT_PROTECTION_ENABLED))
|
|
|
|
return;
|
|
|
|
|
|
|
|
crtc_state = drm_atomic_get_new_crtc_state(new_state->state,
|
|
|
|
new_state->crtc);
|
|
|
|
crtc_state->mode_changed = true;
|
|
|
|
}
|
2019-02-17 00:36:52 +07:00
|
|
|
|
|
|
|
/* Handles the CP_IRQ raised from the DP HDCP sink */
|
|
|
|
void intel_hdcp_handle_cp_irq(struct intel_connector *connector)
|
|
|
|
{
|
|
|
|
struct intel_hdcp *hdcp = &connector->hdcp;
|
|
|
|
|
|
|
|
if (!hdcp->shim)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CP_IRQ could be triggered due to 1. HDCP2.2 auth msgs availability,
|
|
|
|
* 2. link failure and 3. repeater reauth request. At present we dont
|
|
|
|
* handle the CP_IRQ for the HDCP2.2 auth msg availability for read.
|
|
|
|
* To handle other two causes for CP_IRQ we have the work_fn which is
|
|
|
|
* scheduled here.
|
|
|
|
*/
|
|
|
|
schedule_delayed_work(&hdcp->check_work, 0);
|
|
|
|
}
|