From patchwork Fri Apr 21 16:27:49 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Yacoub X-Patchwork-Id: 13220321 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 78789C7618E for ; Fri, 21 Apr 2023 16:28:08 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233109AbjDUQ2H (ORCPT ); Fri, 21 Apr 2023 12:28:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233075AbjDUQ2D (ORCPT ); Fri, 21 Apr 2023 12:28:03 -0400 Received: from mail-yw1-x1131.google.com (mail-yw1-x1131.google.com [IPv6:2607:f8b0:4864:20::1131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C7DE1902A for ; Fri, 21 Apr 2023 09:28:00 -0700 (PDT) Received: by mail-yw1-x1131.google.com with SMTP id 00721157ae682-555d2810415so27997527b3.0 for ; Fri, 21 Apr 2023 09:28:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1682094480; x=1684686480; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ZKO1I2nyCroJ5CwepD9IlxcHZJ24Ly0m35i9l8S4MQs=; b=g3RnDFLE3IRBLOW7Omv+IL4sEVPhjSZaDkVIesz/E8/m//3gDrLMsuSwVNhLbJ9X2p xlUPMYzjV5CN7EdNPKebyh5SpA7LDmzcz4TRXrn7Qv0SU2mgm2I8zcGGb3T7BL0luon/ WT7XaMP2oPdqlFOaFXLh+87xE6nLWbIARE3n0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682094480; x=1684686480; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ZKO1I2nyCroJ5CwepD9IlxcHZJ24Ly0m35i9l8S4MQs=; b=YeqAG6qqPROKnjebzo0bhZ89PVO4DkfJ0V8nlAE3Pwk18Al3sO7jaXFGS6VIMIc8SB hCOxo5eFR0a73WW5jbR1gU9KBqYs+/z3oI0ZwLs6FOFSX0FJqY1Yz5xZMUE/FkP1eba4 VScNAUQ7l5TfnXfYA/hrXVXcwM7qJSbb/L1YyWAnHa/9l34F0H46M3kyeHWu/e3tL/yU kw6LD39W3GYsBKP1b91z2kOsoTdQ90j8Oydd5ZS5Qa1oqrVseWn8gr8OiwcWhBnPSqCE 1B8RRdhl/4TfL8w7vQDC32Vk4MqtTkA5BVFFJuThjyuau0u4BvoK4tgW26O+b9MAJqGo /Nww== X-Gm-Message-State: AAQBX9eQKbQ4/asQ1ySwcKe+0fZNTsaY8DcX2Q3aBn2GBcK4KfV/Oy+1 LbkK+yIyHm8ZNl8ZXFn9M11W8A== X-Google-Smtp-Source: AKy350bWZ//HXXTogoYM52hKsklw5A+76WgTKpW7vs/w2gfk4xuaOgmgfr2EAMS8SOswZdedlP3CeA== X-Received: by 2002:a81:5f85:0:b0:544:57ba:a32e with SMTP id t127-20020a815f85000000b0054457baa32emr2458316ywb.9.1682094478553; Fri, 21 Apr 2023 09:27:58 -0700 (PDT) Received: from localhost ([2620:0:1035:15:25e5:2115:c97c:bf00]) by smtp.gmail.com with UTF8SMTPSA id m4-20020a258004000000b00b8c31377e1bsm995731ybk.54.2023.04.21.09.27.57 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 21 Apr 2023 09:27:58 -0700 (PDT) From: Mark Yacoub X-Google-Original-From: Mark Yacoub To: dri-devel@lists.freedesktop.org, freedreno@lists.freedesktop.org, Rob Clark , Abhinav Kumar , Dmitry Baryshkov , Sean Paul , David Airlie , Daniel Vetter Cc: seanpaul@chromium.org, dianders@chromium.org, Mark Yacoub , linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 3/3] dp_hdcp: Get the hdcp key from the connector prop Date: Fri, 21 Apr 2023 12:27:49 -0400 Message-ID: <20230421162749.360777-4-markyacoub@google.com> X-Mailer: git-send-email 2.40.0.634.g4ca3ef3211-goog In-Reply-To: <20230421162749.360777-1-markyacoub@google.com> References: <20230421162749.360777-1-markyacoub@google.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-arm-msm@vger.kernel.org From: Mark Yacoub [Why] To support protected content, the driver requires a key. Currently, it's being injected from debugfs, which is not super useful to run a user space in the wild. [How] When the key is needed, fetch the "Content Protection Property" on the connector and get the key blob. Verify that the size is valid and use it. Signed-off-by: Mark Yacoub --- drivers/gpu/drm/msm/dp/dp_hdcp.c | 66 +++++++++++++++++++++++++++++--- 1 file changed, 61 insertions(+), 5 deletions(-) diff --git a/drivers/gpu/drm/msm/dp/dp_hdcp.c b/drivers/gpu/drm/msm/dp/dp_hdcp.c index 191340971f943..4321d245b36c9 100644 --- a/drivers/gpu/drm/msm/dp/dp_hdcp.c +++ b/drivers/gpu/drm/msm/dp/dp_hdcp.c @@ -117,19 +117,61 @@ static bool dp_hdcp_are_keys_valid(struct drm_connector *connector, return FIELD_GET(DP_HDCP_KEY_STATUS, val) == DP_HDCP_KEY_STATUS_VALID; } +static bool dp_hdcp_get_key_from_connector(struct drm_connector *connector, + struct drm_bridge *bridge) +{ + struct drm_property_blob *key_blob; + u8 *raw_key; + int ret; + struct dp_hdcp *hdcp; + struct drm_device *dev = connector->dev; + struct drm_property *prop = + dev->mode_config.content_protection_key_property; + + if (!prop) + return false; + + key_blob = connector->state->content_protection_key; + if (!key_blob) + return false; + + raw_key = key_blob->data; + + if (key_blob->length != + DRM_HDCP_KSV_LEN + DP_HDCP_NUM_KEYS * DP_HDCP_KEY_LEN) { + drm_dbg_atomic( + dev, + "[CONNECTOR:%d:%s] Content Protection Key is a blob that we don't expect.\n", + connector->base.id, connector->name); + return false; + } + + hdcp = dp_display_bridge_to_hdcp(bridge); + ret = dp_hdcp_ingest_key(hdcp, key_blob->data, key_blob->length); + if (ret) + return false; + + return true; +} + static int dp_hdcp_load_keys(struct drm_connector *connector, void *driver_data) { struct drm_bridge *bridge = (struct drm_bridge *)driver_data; struct dp_hdcp *hdcp = dp_display_bridge_to_hdcp(bridge); int i, ret = 0; + bool is_hdcp_key_valid; mutex_lock(&hdcp->key_lock); + is_hdcp_key_valid = hdcp->key.valid; + mutex_unlock(&hdcp->key_lock); - if (!hdcp->key.valid) { - ret = -ENOENT; - goto out; + if (!is_hdcp_key_valid && + !dp_hdcp_get_key_from_connector(connector, bridge)) { + return -ENOENT; } + mutex_lock(&hdcp->key_lock); + dp_catalog_hdcp_write_aksv(hdcp->catalog, hdcp->key.ksv.words); @@ -139,7 +181,6 @@ static int dp_hdcp_load_keys(struct drm_connector *connector, void *driver_data) } dp_catalog_hdcp_post_write_key(hdcp->catalog); -out: mutex_unlock(&hdcp->key_lock); return ret; } @@ -346,6 +387,8 @@ int dp_hdcp_attach(struct dp_hdcp *hdcp, struct drm_connector *connector, struct drm_bridge *bridge, struct dp_catalog *catalog) { struct drm_hdcp_helper_data *helper_data; + struct drm_device *dev; + struct drm_property *prop; /* HDCP is not configured for this device */ if (!hdcp->parser->io.dp_controller.hdcp_key.base) @@ -357,7 +400,20 @@ int dp_hdcp_attach(struct dp_hdcp *hdcp, struct drm_connector *connector, return PTR_ERR(helper_data); helper_data->driver_data = bridge; - hdcp->dev = connector->dev; + + dev = connector->dev; + prop = dev->mode_config.content_protection_key_property; + if (!prop) { + prop = drm_property_create(dev, DRM_MODE_PROP_BLOB, + "Content Protection Key", 0); + } + if (!prop) + return -1; + drm_object_attach_property(&connector->base, prop, + DRM_MODE_HDCP_CONTENT_TYPE0); + dev->mode_config.content_protection_key_property = prop; + + hdcp->dev = dev; hdcp->connector = connector; hdcp->helper_data = helper_data; hdcp->catalog = catalog;