From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2B64A1FBCB0; Sun, 26 Jan 2025 14:55:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1737903359; cv=none; b=cm6gtJosBCSyIjvlxDW6dhQGf0ulbV6X2qanxS7y/PbbhiUFzFV5AVVex4QrsEdGDkiCpswiAsDFwwe2ij0250dCVgG/g68yzU63baOVFRlD/y8g9oE8EFSknfRNd8GZU6sgfvWSCz1q6ifMgcJ4DESsKeHmJsCcVyNgNUxrvcs= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1737903359; c=relaxed/simple; bh=EYI705xdQShbAD0yLozHhPvmNGu1nQ4LYHyzS23LD24=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=XOtP4FLeh7Bnk7hmVdlrzjpA2bMLRvf6BdTvLBUFoBUKct1Lbau/dMtK4I/r19TB3Qo3KjLd+WQoJXvpf8ujEcuwW/GHxRo+1tW8apUGcQPAzQZdfyqyzG2R1GOoer/sRyTJjuxd0EKfcD2vo51RBEeXKX5ZQMG7YXOWCyhe+AU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=enSVgOk/; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="enSVgOk/" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 77359C4CED3; Sun, 26 Jan 2025 14:55:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1737903359; bh=EYI705xdQShbAD0yLozHhPvmNGu1nQ4LYHyzS23LD24=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=enSVgOk/wMyuGPCVflB/OGUbh62WaOmVhd4nLE1Qt8Q9sdmcnwOnt1zmOltCOswy9 gU1Qpsy17xrpjdJwcro2CjHhYdi4vuOVf4rSeXx+GzbJsYBRu2oSMrJJnTvbW+5pj+ 2UDJZB0a0FJ/qRA5/jQzB9kKj4ov+1YF3lmmaybCs59vhwbYiBVrMFKKGhjU4CQdZk kn1iyfWjOEYekHCOpqh/mP2BBkAU1uAj9yr+AI3QQkjzeqg47nTNAI6IJaBsA8AXXI 6iNagVkEl6SSTlIvYQxhdebkbeyhCKW2ylpqhiX5QDNwmyvTLFEg9Lws7VeepPAVyC uZrM/v9X+mo5g== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Hermes Wu , AngeloGioacchino Del Regno , Dmitry Baryshkov , Sasha Levin , andrzej.hajda@intel.com, neil.armstrong@linaro.org, rfoss@kernel.org, maarten.lankhorst@linux.intel.com, mripard@kernel.org, tzimmermann@suse.de, airlied@gmail.com, simona@ffwll.ch, dri-devel@lists.freedesktop.org Subject: [PATCH AUTOSEL 6.12 25/31] drm/bridge: it6505: fix HDCP encryption when R0 ready Date: Sun, 26 Jan 2025 09:54:41 -0500 Message-Id: <20250126145448.930220-25-sashal@kernel.org> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250126145448.930220-1-sashal@kernel.org> References: <20250126145448.930220-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.12.11 Content-Transfer-Encoding: 8bit From: Hermes Wu [ Upstream commit 8c01b0bae2f9e58f2fee0e811cb90d8331986554 ] When starting HDCP authentication, HDCP encryption should be enabled when R0'is checked. Change encryption enables time at R0' ready. The hardware HDCP engine trigger is changed and the repeater KSV fails will restart HDCP. Signed-off-by: Hermes Wu Reviewed-by: AngeloGioacchino Del Regno Signed-off-by: Dmitry Baryshkov Link: https://patchwork.freedesktop.org/patch/msgid/20241230-v7-upstream-v7-6-e0fdd4844703@ite.corp-partner.google.com Signed-off-by: Sasha Levin --- drivers/gpu/drm/bridge/ite-it6505.c | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/drivers/gpu/drm/bridge/ite-it6505.c b/drivers/gpu/drm/bridge/ite-it6505.c index e8dac873a92c9..886e26a0000b4 100644 --- a/drivers/gpu/drm/bridge/ite-it6505.c +++ b/drivers/gpu/drm/bridge/ite-it6505.c @@ -2081,15 +2081,12 @@ static void it6505_hdcp_wait_ksv_list(struct work_struct *work) ksv_list_check = it6505_hdcp_part2_ksvlist_check(it6505); DRM_DEV_DEBUG_DRIVER(dev, "ksv list ready, ksv list check %s", ksv_list_check ? "pass" : "fail"); - if (ksv_list_check) { - it6505_set_bits(it6505, REG_HDCP_TRIGGER, - HDCP_TRIGGER_KSV_DONE, HDCP_TRIGGER_KSV_DONE); + + if (ksv_list_check) return; - } + timeout: - it6505_set_bits(it6505, REG_HDCP_TRIGGER, - HDCP_TRIGGER_KSV_DONE | HDCP_TRIGGER_KSV_FAIL, - HDCP_TRIGGER_KSV_DONE | HDCP_TRIGGER_KSV_FAIL); + it6505_start_hdcp(it6505); } static void it6505_hdcp_work(struct work_struct *work) @@ -2462,7 +2459,11 @@ static void it6505_irq_hdcp_ksv_check(struct it6505 *it6505) { struct device *dev = it6505->dev; - DRM_DEV_DEBUG_DRIVER(dev, "HDCP event Interrupt"); + DRM_DEV_DEBUG_DRIVER(dev, "HDCP repeater R0 event Interrupt"); + /* 1B01 HDCP encription should start when R0 is ready*/ + it6505_set_bits(it6505, REG_HDCP_TRIGGER, + HDCP_TRIGGER_KSV_DONE, HDCP_TRIGGER_KSV_DONE); + schedule_work(&it6505->hdcp_wait_ksv_list); } -- 2.39.5