blob: 6ce377667623d88b9a9c2b7115fa1c74f49e98e7 [file] [log] [blame]
/* Copyright (c) 2015-2018, The Linux Foundation. All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 and
* only version 2 as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*/
#define pr_fmt(fmt) "[hdcp-lib] %s: " fmt, __func__
#include <linux/platform_device.h>
#include <linux/kernel.h>
#include <linux/slab.h>
#include <linux/module.h>
#include <linux/fs.h>
#include <linux/file.h>
#include <linux/uaccess.h>
#include <linux/cdev.h>
#include <linux/sched.h>
#include <linux/list.h>
#include <linux/mutex.h>
#include <linux/io.h>
#include <linux/ion.h>
#include <linux/types.h>
#include <linux/device.h>
#include <linux/sched.h>
#include <linux/delay.h>
#include <linux/completion.h>
#include <linux/errno.h>
#include <linux/hdcp_qseecom.h>
#include <linux/kthread.h>
#include <linux/of.h>
#include <video/msm_hdmi_hdcp_mgr.h>
#include "qseecom_kernel.h"
#define TZAPP_NAME "hdcp2p2"
#define HDCP1_APP_NAME "hdcp1"
#define QSEECOM_SBUFF_SIZE 0x1000
#define MAX_TX_MESSAGE_SIZE 129
#define MAX_RX_MESSAGE_SIZE 534
#define MAX_TOPOLOGY_ELEMS 32
#define HDCP1_AKSV_SIZE 8
/* parameters related to LC_Init message */
#define MESSAGE_ID_SIZE 1
#define LC_INIT_MESSAGE_SIZE (MESSAGE_ID_SIZE+BITS_64_IN_BYTES)
/* parameters related to SKE_Send_EKS message */
#define SKE_SEND_EKS_MESSAGE_SIZE \
(MESSAGE_ID_SIZE+BITS_128_IN_BYTES+BITS_64_IN_BYTES)
/* all message IDs */
#define INVALID_MESSAGE_ID 0
#define AKE_INIT_MESSAGE_ID 2
#define AKE_SEND_CERT_MESSAGE_ID 3
#define AKE_NO_STORED_KM_MESSAGE_ID 4
#define AKE_STORED_KM_MESSAGE_ID 5
#define AKE_SEND_H_PRIME_MESSAGE_ID 7
#define AKE_SEND_PAIRING_INFO_MESSAGE_ID 8
#define LC_INIT_MESSAGE_ID 9
#define LC_SEND_L_PRIME_MESSAGE_ID 10
#define SKE_SEND_EKS_MESSAGE_ID 11
#define REPEATER_AUTH_SEND_RECEIVERID_LIST_MESSAGE_ID 12
#define REPEATER_AUTH_SEND_ACK_MESSAGE_ID 15
#define REPEATER_AUTH_STREAM_MANAGE_MESSAGE_ID 16
#define REPEATER_AUTH_STREAM_READY_MESSAGE_ID 17
#define SKE_SEND_TYPE_ID 18
#define HDCP2P2_MAX_MESSAGES 19
#define HDCP1_SET_KEY_MESSAGE_ID 202
#define HDCP1_SET_ENC_MESSAGE_ID 205
#define BITS_40_IN_BYTES 5
#define BITS_64_IN_BYTES 8
#define BITS_128_IN_BYTES 16
#define RXCAPS_SIZE 3
#define RXINFO_SIZE 2
#define SEQ_NUM_V_SIZE 3
#define RCVR_ID_SIZE BITS_40_IN_BYTES
#define MAX_RCVR_IDS_ALLOWED_IN_LIST 31
#define MAX_RCVR_ID_LIST_SIZE \
(RCVR_ID_SIZE * MAX_RCVR_IDS_ALLOWED_IN_LIST)
/*
* Minimum wait as per standard is 200 ms. Keep it 220 ms
* to be on safe side.
*/
#define SLEEP_SET_HW_KEY_MS 220
/* hdcp command status */
#define HDCP_SUCCESS 0
/* flags set by tz in response message */
#define HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST 1
#define HDCP_TXMTR_SERVICE_ID 0x0001000
#define SERVICE_CREATE_CMD(x) (HDCP_TXMTR_SERVICE_ID | x)
#define HDCP_TXMTR_INIT SERVICE_CREATE_CMD(1)
#define HDCP_TXMTR_DEINIT SERVICE_CREATE_CMD(2)
#define HDCP_TXMTR_PROCESS_RECEIVED_MESSAGE SERVICE_CREATE_CMD(3)
#define HDCP_TXMTR_SEND_MESSAGE_TIMEOUT SERVICE_CREATE_CMD(4)
#define HDCP_TXMTR_SET_HW_KEY SERVICE_CREATE_CMD(5)
#define HDCP_TXMTR_QUERY_STREAM_TYPE SERVICE_CREATE_CMD(6)
#define HDCP_LIB_INIT SERVICE_CREATE_CMD(11)
#define HDCP_LIB_DEINIT SERVICE_CREATE_CMD(12)
#define HDCP_TXMTR_GET_VERSION SERVICE_CREATE_CMD(14)
#define HDCP_TXMTR_VERIFY_KEY SERVICE_CREATE_CMD(15)
#define HDCP_SESSION_INIT SERVICE_CREATE_CMD(16)
#define HDCP_SESSION_DEINIT SERVICE_CREATE_CMD(17)
#define HDCP_TXMTR_START_AUTHENTICATE SERVICE_CREATE_CMD(18)
#define HCDP_TXMTR_GET_MAJOR_VERSION(v) (((v) >> 16) & 0xFF)
#define HCDP_TXMTR_GET_MINOR_VERSION(v) (((v) >> 8) & 0xFF)
#define HCDP_TXMTR_GET_PATCH_VERSION(v) ((v) & 0xFF)
#define HDCP_CLIENT_MAJOR_VERSION 2
#define HDCP_CLIENT_MINOR_VERSION 1
#define HDCP_CLIENT_PATCH_VERSION 0
#define HDCP_CLIENT_MAKE_VERSION(maj, min, patch) \
((((maj) & 0xFF) << 16) | (((min) & 0xFF) << 8) | ((patch) & 0xFF))
#define REAUTH_REQ BIT(3)
#define LINK_INTEGRITY_FAILURE BIT(4)
#define HDCP_LIB_EXECUTE(x) {\
kthread_queue_work(&handle->worker, &handle->wk_##x);\
}
static const struct hdcp_msg_data hdcp_msg_lookup[HDCP2P2_MAX_MESSAGES] = {
[AKE_INIT_MESSAGE_ID] = { 2,
{ {"rtx", 0x69000, 8}, {"TxCaps", 0x69008, 3} },
0 },
[AKE_SEND_CERT_MESSAGE_ID] = { 3,
{ {"cert-rx", 0x6900B, 522}, {"rrx", 0x69215, 8},
{"RxCaps", 0x6921D, 3} },
0 },
[AKE_NO_STORED_KM_MESSAGE_ID] = { 1,
{ {"Ekpub_km", 0x69220, 128} },
0 },
[AKE_STORED_KM_MESSAGE_ID] = { 2,
{ {"Ekh_km", 0x692A0, 16}, {"m", 0x692B0, 16} },
0 },
[AKE_SEND_H_PRIME_MESSAGE_ID] = { 1,
{ {"H'", 0x692C0, 32} },
(1 << 1) },
[AKE_SEND_PAIRING_INFO_MESSAGE_ID] = { 1,
{ {"Ekh_km", 0x692E0, 16} },
(1 << 2) },
[LC_INIT_MESSAGE_ID] = { 1,
{ {"rn", 0x692F0, 8} },
0 },
[LC_SEND_L_PRIME_MESSAGE_ID] = { 1,
{ {"L'", 0x692F8, 32} },
0 },
[SKE_SEND_EKS_MESSAGE_ID] = { 2,
{ {"Edkey_ks", 0x69318, 16}, {"riv", 0x69328, 8} },
0 },
[SKE_SEND_TYPE_ID] = { 1,
{ {"type", 0x69494, 1} },
0 },
[REPEATER_AUTH_SEND_RECEIVERID_LIST_MESSAGE_ID] = { 4,
{ {"RxInfo", 0x69330, 2}, {"seq_num_V", 0x69332, 3},
{"V'", 0x69335, 16}, {"ridlist", 0x69345, 155} },
(1 << 0) },
[REPEATER_AUTH_SEND_ACK_MESSAGE_ID] = { 1,
{ {"V", 0x693E0, 16} },
0 },
[REPEATER_AUTH_STREAM_MANAGE_MESSAGE_ID] = { 3,
{ {"seq_num_M", 0x693F0, 3}, {"k", 0x693F3, 2},
{"streamID_Type", 0x693F5, 126} },
0 },
[REPEATER_AUTH_STREAM_READY_MESSAGE_ID] = { 1,
{ {"M'", 0x69473, 32} },
0 }
};
enum hdcp_state {
HDCP_STATE_INIT = 0x00,
HDCP_STATE_APP_LOADED = 0x01,
HDCP_STATE_SESSION_INIT = 0x02,
HDCP_STATE_TXMTR_INIT = 0x04,
HDCP_STATE_AUTHENTICATED = 0x08,
HDCP_STATE_ERROR = 0x10
};
enum hdcp_element {
HDCP_TYPE_UNKNOWN,
HDCP_TYPE_RECEIVER,
HDCP_TYPE_REPEATER,
};
enum hdcp_version {
HDCP_VERSION_UNKNOWN,
HDCP_VERSION_2_2,
HDCP_VERSION_1_4
};
struct receiver_info {
unsigned char rcvrInfo[RCVR_ID_SIZE];
enum hdcp_element elem_type;
enum hdcp_version hdcp_version;
};
struct topology_info {
unsigned int nNumRcvrs;
struct receiver_info rcvinfo[MAX_TOPOLOGY_ELEMS];
};
struct __attribute__ ((__packed__)) hdcp1_key_set_req {
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp1_key_set_rsp {
uint32_t commandid;
uint32_t ret;
uint8_t ksv[HDCP1_AKSV_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_version_req {
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_version_rsp {
uint32_t commandid;
uint32_t commandId;
uint32_t appversion;
};
struct __attribute__ ((__packed__)) hdcp_verify_key_req {
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_verify_key_rsp {
uint32_t status;
uint32_t commandId;
};
struct __attribute__ ((__packed__)) hdcp_lib_init_req_v1 {
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_lib_init_rsp_v1 {
uint32_t status;
uint32_t commandid;
uint32_t ctxhandle;
uint32_t timeout;
uint32_t msglen;
uint8_t message[MAX_TX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_lib_init_req {
uint32_t commandid;
uint32_t clientversion;
};
struct __attribute__ ((__packed__)) hdcp_lib_init_rsp {
uint32_t status;
uint32_t commandid;
uint32_t appversion;
};
struct __attribute__ ((__packed__)) hdcp_lib_deinit_req {
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_lib_deinit_rsp {
uint32_t status;
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_lib_session_init_req {
uint32_t commandid;
uint32_t deviceid;
};
struct __attribute__ ((__packed__)) hdcp_lib_session_init_rsp {
uint32_t status;
uint32_t commandid;
uint32_t sessionid;
};
struct __attribute__ ((__packed__)) hdcp_lib_session_deinit_req {
uint32_t commandid;
uint32_t sessionid;
};
struct __attribute__ ((__packed__)) hdcp_lib_session_deinit_rsp {
uint32_t status;
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_tx_init_req_v1 {
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_tx_init_rsp_v1 {
uint32_t status;
uint32_t commandid;
uint32_t ctxhandle;
uint32_t timeout;
uint32_t msglen;
uint8_t message[MAX_TX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_tx_init_req {
uint32_t commandid;
uint32_t sessionid;
};
struct __attribute__ ((__packed__)) hdcp_tx_init_rsp {
uint32_t status;
uint32_t commandid;
uint32_t ctxhandle;
};
struct __attribute__ ((__packed__)) hdcp_deinit_req {
uint32_t commandid;
uint32_t ctxhandle;
};
struct __attribute__ ((__packed__)) hdcp_deinit_rsp {
uint32_t status;
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_rcvd_msg_req {
uint32_t commandid;
uint32_t ctxhandle;
uint32_t msglen;
uint8_t msg[MAX_RX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_rcvd_msg_rsp {
uint32_t status;
uint32_t commandid;
uint32_t state;
uint32_t timeout;
uint32_t flag;
uint32_t msglen;
uint8_t msg[MAX_TX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_set_hw_key_req {
uint32_t commandid;
uint32_t ctxhandle;
};
struct __attribute__ ((__packed__)) hdcp_set_hw_key_rsp {
uint32_t status;
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_send_timeout_req {
uint32_t commandid;
uint32_t ctxhandle;
};
struct __attribute__ ((__packed__)) hdcp_send_timeout_rsp {
uint32_t status;
uint32_t commandid;
uint32_t timeout;
uint32_t msglen;
uint8_t message[MAX_TX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_query_stream_type_req {
uint32_t commandid;
uint32_t ctxhandle;
};
struct __attribute__ ((__packed__)) hdcp_query_stream_type_rsp {
uint32_t status;
uint32_t commandid;
uint32_t timeout;
uint32_t msglen;
uint8_t msg[MAX_TX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_set_stream_type_req {
uint32_t commandid;
uint32_t ctxhandle;
uint8_t streamtype;
};
struct __attribute__ ((__packed__)) hdcp_set_stream_type_rsp {
uint32_t status;
uint32_t commandid;
uint32_t timeout;
uint32_t msglen;
uint8_t message[MAX_TX_MESSAGE_SIZE];
};
struct __attribute__ ((__packed__)) hdcp_update_srm_req {
uint32_t commandid;
uint32_t ctxhandle;
uint32_t srmoffset;
uint32_t srmlength;
};
struct __attribute__ ((__packed__)) hdcp_update_srm_rsp {
uint32_t status;
uint32_t commandid;
};
struct __attribute__ ((__packed__)) hdcp_get_topology_req {
uint32_t commandid;
uint32_t ctxhandle;
};
struct __attribute__ ((__packed__)) hdcp_get_topology_rsp {
uint32_t status;
uint32_t commandid;
struct topology_info topologyinfo;
};
struct __attribute__ ((__packed__)) rxvr_info_struct {
uint8_t rcvrCert[522];
uint8_t rrx[BITS_64_IN_BYTES];
uint8_t rxcaps[RXCAPS_SIZE];
bool repeater;
};
struct __attribute__ ((__packed__)) repeater_info_struct {
uint8_t RxInfo[RXINFO_SIZE];
uint8_t seq_num_V[SEQ_NUM_V_SIZE];
bool seq_num_V_Rollover_flag;
uint8_t ReceiverIDList[MAX_RCVR_ID_LIST_SIZE];
uint32_t ReceiverIDListLen;
};
struct __attribute__ ((__packed__)) hdcp1_set_enc_req {
uint32_t commandid;
uint32_t enable;
};
struct __attribute__ ((__packed__)) hdcp1_set_enc_rsp {
uint32_t commandid;
uint32_t ret;
};
struct __attribute__ ((__packed__)) hdcp_start_auth_req {
uint32_t commandid;
uint32_t ctxHandle;
};
struct __attribute__ ((__packed__)) hdcp_start_auth_rsp {
uint32_t status;
uint32_t commandid;
uint32_t ctxhandle;
uint32_t timeout;
uint32_t msglen;
uint8_t message[MAX_TX_MESSAGE_SIZE];
};
struct hdcp_lib_handle {
unsigned char *listener_buf;
uint32_t msglen;
uint32_t tz_ctxhandle;
uint32_t hdcp_timeout;
uint32_t timeout_left;
uint32_t wait_timeout;
bool no_stored_km_flag;
bool feature_supported;
bool authenticated;
void *client_ctx;
struct hdcp_client_ops *client_ops;
struct mutex msg_lock;
struct mutex wakeup_mutex;
enum hdcp_state hdcp_state;
enum hdcp_lib_wakeup_cmd wakeup_cmd;
bool repeater_flag;
bool update_stream;
struct qseecom_handle *qseecom_handle;
int last_msg_sent;
int last_msg;
char *last_msg_recvd_buf;
uint32_t last_msg_recvd_len;
atomic_t hdcp_off;
uint32_t session_id;
enum hdcp_device_type device_type;
struct task_struct *thread;
struct completion poll_wait;
struct kthread_worker worker;
struct kthread_work wk_init;
struct kthread_work wk_msg_sent;
struct kthread_work wk_msg_recvd;
struct kthread_work wk_timeout;
struct kthread_work wk_clean;
struct kthread_work wk_wait;
struct kthread_work wk_stream;
int (*hdcp_app_init)(struct hdcp_lib_handle *handle);
int (*hdcp_txmtr_init)(struct hdcp_lib_handle *handle);
};
struct hdcp_lib_message_map {
int msg_id;
const char *msg_name;
};
static void hdcp_lib_clean(struct hdcp_lib_handle *handle);
static void hdcp_lib_init(struct hdcp_lib_handle *handle);
static void hdcp_lib_msg_sent(struct hdcp_lib_handle *handle);
static void hdcp_lib_msg_recvd(struct hdcp_lib_handle *handle);
static void hdcp_lib_timeout(struct hdcp_lib_handle *handle);
static void hdcp_lib_stream(struct hdcp_lib_handle *handle);
static int hdcp_lib_txmtr_init(struct hdcp_lib_handle *handle);
static struct qseecom_handle *hdcp1_handle;
static bool hdcp1_supported = true;
static bool hdcp1_enc_enabled;
static struct mutex hdcp1_ta_cmd_lock;
static const char *hdcp_lib_message_name(int msg_id)
{
/*
* Message ID map. The first number indicates the message number
* assigned to the message by the HDCP 2.2 spec. This is also the first
* byte of every HDCP 2.2 authentication protocol message.
*/
static struct hdcp_lib_message_map hdcp_lib_msg_map[] = {
{2, "AKE_INIT"},
{3, "AKE_SEND_CERT"},
{4, "AKE_NO_STORED_KM"},
{5, "AKE_STORED_KM"},
{7, "AKE_SEND_H_PRIME"},
{8, "AKE_SEND_PAIRING_INFO"},
{9, "LC_INIT"},
{10, "LC_SEND_L_PRIME"},
{11, "SKE_SEND_EKS"},
{12, "REPEATER_AUTH_SEND_RECEIVERID_LIST"},
{15, "REPEATER_AUTH_SEND_ACK"},
{16, "REPEATER_AUTH_STREAM_MANAGE"},
{17, "REPEATER_AUTH_STREAM_READY"},
{18, "SKE_SEND_TYPE_ID"},
};
int i;
for (i = 0; i < ARRAY_SIZE(hdcp_lib_msg_map); i++) {
if (msg_id == hdcp_lib_msg_map[i].msg_id)
return hdcp_lib_msg_map[i].msg_name;
}
return "UNKNOWN";
}
static int hdcp_lib_get_next_message(struct hdcp_lib_handle *handle,
struct hdcp_wakeup_data *data)
{
switch (handle->last_msg) {
case INVALID_MESSAGE_ID:
return AKE_INIT_MESSAGE_ID;
case AKE_INIT_MESSAGE_ID:
return AKE_SEND_CERT_MESSAGE_ID;
case AKE_SEND_CERT_MESSAGE_ID:
if (handle->no_stored_km_flag)
return AKE_NO_STORED_KM_MESSAGE_ID;
else
return AKE_STORED_KM_MESSAGE_ID;
case AKE_STORED_KM_MESSAGE_ID:
case AKE_NO_STORED_KM_MESSAGE_ID:
return AKE_SEND_H_PRIME_MESSAGE_ID;
case AKE_SEND_H_PRIME_MESSAGE_ID:
if (handle->no_stored_km_flag)
return AKE_SEND_PAIRING_INFO_MESSAGE_ID;
else
return LC_INIT_MESSAGE_ID;
case AKE_SEND_PAIRING_INFO_MESSAGE_ID:
return LC_INIT_MESSAGE_ID;
case LC_INIT_MESSAGE_ID:
return LC_SEND_L_PRIME_MESSAGE_ID;
case LC_SEND_L_PRIME_MESSAGE_ID:
return SKE_SEND_EKS_MESSAGE_ID;
case SKE_SEND_EKS_MESSAGE_ID:
if (!handle->repeater_flag)
return SKE_SEND_TYPE_ID;
case SKE_SEND_TYPE_ID:
case REPEATER_AUTH_STREAM_READY_MESSAGE_ID:
case REPEATER_AUTH_SEND_ACK_MESSAGE_ID:
if (!handle->repeater_flag)
return INVALID_MESSAGE_ID;
if (data->cmd == HDCP_WKUP_CMD_SEND_MESSAGE)
return REPEATER_AUTH_STREAM_MANAGE_MESSAGE_ID;
else
return REPEATER_AUTH_SEND_RECEIVERID_LIST_MESSAGE_ID;
case REPEATER_AUTH_SEND_RECEIVERID_LIST_MESSAGE_ID:
return REPEATER_AUTH_SEND_ACK_MESSAGE_ID;
case REPEATER_AUTH_STREAM_MANAGE_MESSAGE_ID:
return REPEATER_AUTH_STREAM_READY_MESSAGE_ID;
default:
pr_err("Uknown message ID (%d)", handle->last_msg);
return -EINVAL;
}
}
static void hdcp_lib_wait_for_response(struct hdcp_lib_handle *handle,
struct hdcp_wakeup_data *data)
{
switch (handle->last_msg) {
case AKE_SEND_H_PRIME_MESSAGE_ID:
if (handle->no_stored_km_flag)
handle->wait_timeout = HZ;
else
handle->wait_timeout = HZ / 4;
break;
case AKE_SEND_PAIRING_INFO_MESSAGE_ID:
handle->wait_timeout = HZ / 4;
break;
case REPEATER_AUTH_SEND_RECEIVERID_LIST_MESSAGE_ID:
if (!handle->authenticated)
handle->wait_timeout = HZ * 3;
else
handle->wait_timeout = 0;
break;
default:
handle->wait_timeout = 0;
}
if (handle->wait_timeout)
kthread_queue_work(&handle->worker, &handle->wk_wait);
}
static void hdcp_lib_wakeup_client(struct hdcp_lib_handle *handle,
struct hdcp_wakeup_data *data)
{
int rc = 0, i;
if (!handle || !handle->client_ops || !handle->client_ops->wakeup ||
!data || (data->cmd == HDCP_WKUP_CMD_INVALID))
return;
data->abort_mask = REAUTH_REQ | LINK_INTEGRITY_FAILURE;
if (data->cmd == HDCP_WKUP_CMD_RECV_MESSAGE ||
data->cmd == HDCP_WKUP_CMD_LINK_POLL)
handle->last_msg = hdcp_lib_get_next_message(handle, data);
if (handle->last_msg != INVALID_MESSAGE_ID &&
data->cmd != HDCP_WKUP_CMD_STATUS_SUCCESS &&
data->cmd != HDCP_WKUP_CMD_STATUS_FAILED) {
u32 msg_num, rx_status;
const struct hdcp_msg_part *msg;
pr_debug("lib->client: %s (%s)\n",
hdcp_cmd_to_str(data->cmd),
hdcp_lib_message_name(handle->last_msg));
data->message_data = &hdcp_msg_lookup[handle->last_msg];
msg_num = data->message_data->num_messages;
msg = data->message_data->messages;
rx_status = data->message_data->rx_status;
pr_debug("%10s | %6s | %4s\n", "name", "offset", "len");
for (i = 0; i < msg_num; i++)
pr_debug("%10s | %6x | %4d\n",
msg[i].name, msg[i].offset,
msg[i].length);
} else {
pr_debug("lib->client: %s\n", hdcp_cmd_to_str(data->cmd));
}
rc = handle->client_ops->wakeup(data);
if (rc)
pr_err("error sending %s to client\n",
hdcp_cmd_to_str(data->cmd));
hdcp_lib_wait_for_response(handle, data);
}
static inline void hdcp_lib_send_message(struct hdcp_lib_handle *handle)
{
char msg_name[50];
struct hdcp_wakeup_data cdata = {
HDCP_WKUP_CMD_SEND_MESSAGE
};
cdata.context = handle->client_ctx;
cdata.send_msg_buf = handle->listener_buf;
cdata.send_msg_len = handle->msglen;
cdata.timeout = handle->hdcp_timeout;
snprintf(msg_name, sizeof(msg_name), "%s: ",
hdcp_lib_message_name((int)cdata.send_msg_buf[0]));
print_hex_dump(KERN_DEBUG, msg_name,
DUMP_PREFIX_NONE, 16, 1, cdata.send_msg_buf,
cdata.send_msg_len, false);
hdcp_lib_wakeup_client(handle, &cdata);
}
static int hdcp_lib_enable_encryption(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_set_hw_key_req *req_buf;
struct hdcp_set_hw_key_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto error;
}
/*
* wait at least 200ms before enabling encryption
* as per hdcp2p2 sepcifications.
*/
msleep(SLEEP_SET_HW_KEY_MS);
req_buf = (struct hdcp_set_hw_key_req *)(handle->qseecom_handle->sbuf);
req_buf->commandid = HDCP_TXMTR_SET_HW_KEY;
req_buf->ctxhandle = handle->tz_ctxhandle;
rsp_buf = (struct hdcp_set_hw_key_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_set_hw_key_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_set_hw_key_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_set_hw_key_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS)) {
pr_err("qseecom cmd failed with err = %d status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto error;
}
/* reached an authenticated state */
handle->hdcp_state |= HDCP_STATE_AUTHENTICATED;
pr_debug("success\n");
return 0;
error:
if (handle && !atomic_read(&handle->hdcp_off))
HDCP_LIB_EXECUTE(clean);
return rc;
}
static int hdcp_lib_get_version(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_version_req *req_buf;
struct hdcp_version_rsp *rsp_buf;
uint32_t app_major_version = 0;
if (!handle) {
pr_err("invalid input\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("library not loaded\n");
rc = -EINVAL;
goto exit;
}
/* get the TZ hdcp2p2 app version */
req_buf = (struct hdcp_version_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_TXMTR_GET_VERSION;
rsp_buf = (struct hdcp_version_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_version_req)));
rc = qseecom_send_command(handle->qseecom_handle,
req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_lib_init_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_lib_init_rsp)));
if (rc < 0) {
pr_err("qseecom cmd failed err = %d\n", rc);
goto exit;
}
app_major_version = HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion);
pr_debug("hdcp2p2 app major version %d, app version %d\n",
app_major_version, rsp_buf->appversion);
exit:
return rc;
}
static int hdcp_lib_verify_keys(struct hdcp_lib_handle *handle)
{
int rc = -EINVAL;
struct hdcp_verify_key_req *req_buf;
struct hdcp_verify_key_rsp *rsp_buf;
if (!handle) {
pr_err("invalid input\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("app not loaded\n");
goto exit;
}
req_buf = (struct hdcp_verify_key_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_TXMTR_VERIFY_KEY;
rsp_buf = (struct hdcp_verify_key_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_verify_key_req)));
rc = qseecom_send_command(handle->qseecom_handle,
req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_verify_key_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_verify_key_rsp)));
if (rc < 0) {
pr_err("qseecom cmd failed err = %d\n", rc);
goto exit;
}
return rsp_buf->status;
exit:
return rc;
}
static int hdcp_app_init(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_lib_init_req *req_buf;
struct hdcp_lib_init_rsp *rsp_buf;
uint32_t app_minor_version = 0;
if (!handle) {
pr_err("invalid input\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("library not loaded\n");
goto exit;
}
/* now load the app by sending hdcp_lib_init */
req_buf = (struct hdcp_lib_init_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_LIB_INIT;
req_buf->clientversion =
HDCP_CLIENT_MAKE_VERSION(HDCP_CLIENT_MAJOR_VERSION,
HDCP_CLIENT_MINOR_VERSION,
HDCP_CLIENT_PATCH_VERSION);
rsp_buf = (struct hdcp_lib_init_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_lib_init_req)));
rc = qseecom_send_command(handle->qseecom_handle,
req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_lib_init_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_lib_init_rsp)));
if (rc < 0) {
pr_err("qseecom cmd failed err = %d\n", rc);
goto exit;
}
app_minor_version = HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion);
if (app_minor_version != HDCP_CLIENT_MINOR_VERSION) {
pr_err
("client-app minor version mismatch app(%d), client(%d)\n",
app_minor_version, HDCP_CLIENT_MINOR_VERSION);
rc = -1;
goto exit;
}
pr_debug("success\n");
pr_debug("client version major(%d), minor(%d), patch(%d)\n",
HDCP_CLIENT_MAJOR_VERSION, HDCP_CLIENT_MINOR_VERSION,
HDCP_CLIENT_PATCH_VERSION);
pr_debug("app version major(%d), minor(%d), patch(%d)\n",
HCDP_TXMTR_GET_MAJOR_VERSION(rsp_buf->appversion),
HCDP_TXMTR_GET_MINOR_VERSION(rsp_buf->appversion),
HCDP_TXMTR_GET_PATCH_VERSION(rsp_buf->appversion));
exit:
return rc;
}
static int hdcp_lib_library_load(struct hdcp_lib_handle *handle)
{
int rc = 0;
if (!handle) {
pr_err("invalid input\n");
goto exit;
}
if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
pr_err("library already loaded\n");
goto exit;
}
/*
* allocating resource for qseecom handle
* the app is not loaded here
*/
rc = qseecom_start_app(&(handle->qseecom_handle),
TZAPP_NAME, QSEECOM_SBUFF_SIZE);
if (rc) {
pr_err("qseecom_start_app failed %d\n", rc);
goto exit;
}
handle->hdcp_state |= HDCP_STATE_APP_LOADED;
pr_debug("qseecom_start_app success\n");
rc = hdcp_lib_get_version(handle);
if (rc) {
pr_err("library get version failed\n");
goto exit;
}
handle->hdcp_app_init = hdcp_app_init;
handle->hdcp_txmtr_init = hdcp_lib_txmtr_init;
if (handle->hdcp_app_init == NULL) {
pr_err("invalid app init function pointer\n");
goto exit;
}
rc = handle->hdcp_app_init(handle);
if (rc) {
pr_err("app init failed\n");
goto exit;
}
exit:
return rc;
}
static int hdcp_lib_library_unload(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_lib_deinit_req *req_buf;
struct hdcp_lib_deinit_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("library not loaded\n");
return rc;
}
/* unloading app by sending hdcp_lib_deinit cmd */
req_buf = (struct hdcp_lib_deinit_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_LIB_DEINIT;
rsp_buf = (struct hdcp_lib_deinit_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_lib_deinit_req)));
rc = qseecom_send_command(handle->qseecom_handle,
req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_lib_deinit_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_lib_deinit_rsp)));
if (rc < 0) {
pr_err("qseecom cmd failed err = %d\n", rc);
goto exit;
}
/* deallocate the resources for qseecom handle */
rc = qseecom_shutdown_app(&handle->qseecom_handle);
if (rc) {
pr_err("qseecom_shutdown_app failed err: %d\n", rc);
goto exit;
}
handle->hdcp_state &= ~HDCP_STATE_APP_LOADED;
pr_debug("success\n");
exit:
return rc;
}
static int hdcp_lib_session_init(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_lib_session_init_req *req_buf;
struct hdcp_lib_session_init_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("app not loaded\n");
goto exit;
}
if (handle->hdcp_state & HDCP_STATE_SESSION_INIT) {
pr_err("session already initialized\n");
goto exit;
}
/* send HDCP_Session_Init command to TZ */
req_buf =
(struct hdcp_lib_session_init_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_SESSION_INIT;
req_buf->deviceid = handle->device_type;
rsp_buf = (struct hdcp_lib_session_init_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_lib_session_init_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_lib_session_init_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_lib_session_init_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->commandid != HDCP_SESSION_INIT)) {
pr_err("qseecom cmd failed with err = %d, status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
pr_debug("session id %d\n", rsp_buf->sessionid);
handle->session_id = rsp_buf->sessionid;
handle->hdcp_state |= HDCP_STATE_SESSION_INIT;
pr_debug("success\n");
exit:
return rc;
}
static int hdcp_lib_session_deinit(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_lib_session_deinit_req *req_buf;
struct hdcp_lib_session_deinit_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("app not loaded\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
/* unload library here */
pr_err("session not initialized\n");
goto exit;
}
/* send command to TZ */
req_buf =
(struct hdcp_lib_session_deinit_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_SESSION_DEINIT;
req_buf->sessionid = handle->session_id;
rsp_buf = (struct hdcp_lib_session_deinit_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_lib_session_deinit_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_lib_session_deinit_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_lib_session_deinit_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->commandid != HDCP_SESSION_DEINIT)) {
pr_err("qseecom cmd failed with err = %d status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
handle->hdcp_state &= ~HDCP_STATE_SESSION_INIT;
pr_debug("success\n");
exit:
return rc;
}
static int hdcp_lib_txmtr_init(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_tx_init_req *req_buf;
struct hdcp_tx_init_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
pr_err("session not initialized\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("library not loaded\n");
goto exit;
}
/* send HDCP_Txmtr_Init command to TZ */
req_buf = (struct hdcp_tx_init_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_TXMTR_INIT;
req_buf->sessionid = handle->session_id;
rsp_buf = (struct hdcp_tx_init_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_tx_init_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_tx_init_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_tx_init_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->commandid != HDCP_TXMTR_INIT)) {
pr_err("qseecom cmd failed with err = %d, status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
handle->tz_ctxhandle = rsp_buf->ctxhandle;
handle->hdcp_state |= HDCP_STATE_TXMTR_INIT;
pr_debug("success\n");
exit:
return rc;
}
static int hdcp_lib_txmtr_deinit(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_deinit_req *req_buf;
struct hdcp_deinit_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_err("app not loaded\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
/* unload library here */
pr_err("txmtr not initialized\n");
goto exit;
}
/* send command to TZ */
req_buf = (struct hdcp_deinit_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_TXMTR_DEINIT;
req_buf->ctxhandle = handle->tz_ctxhandle;
rsp_buf = (struct hdcp_deinit_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_deinit_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof(struct hdcp_deinit_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_deinit_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->commandid != HDCP_TXMTR_DEINIT)) {
pr_err("qseecom cmd failed with err = %d status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
handle->hdcp_state &= ~HDCP_STATE_TXMTR_INIT;
pr_debug("success\n");
exit:
return rc;
}
static int hdcp_lib_start_auth(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_start_auth_req *req_buf;
struct hdcp_start_auth_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
rc = -EINVAL;
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_SESSION_INIT)) {
pr_err("session not initialized\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_TXMTR_INIT)) {
pr_err("txmtr not initialized\n");
goto exit;
}
/* send HDCP_Txmtr_Start_Auth command to TZ */
req_buf = (struct hdcp_start_auth_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_TXMTR_START_AUTHENTICATE;
req_buf->ctxHandle = handle->tz_ctxhandle;
rsp_buf = (struct hdcp_start_auth_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_start_auth_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_start_auth_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_start_auth_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->commandid != HDCP_TXMTR_START_AUTHENTICATE) ||
(rsp_buf->msglen == 0) || (rsp_buf->message == NULL)) {
pr_err("qseecom cmd failed with err = %d, status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
pr_debug("recvd %s from TZ at %dms\n",
hdcp_lib_message_name((int)rsp_buf->message[0]),
jiffies_to_msecs(jiffies));
handle->last_msg = (int)rsp_buf->message[0];
/* send the response to HDMI driver */
memset(handle->listener_buf, 0, MAX_TX_MESSAGE_SIZE);
memcpy(handle->listener_buf, (unsigned char *)rsp_buf->message,
rsp_buf->msglen);
handle->msglen = rsp_buf->msglen;
handle->hdcp_timeout = rsp_buf->timeout;
handle->tz_ctxhandle = rsp_buf->ctxhandle;
pr_debug("success\n");
exit:
return rc;
}
static void hdcp_lib_stream(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_query_stream_type_req *req_buf;
struct hdcp_query_stream_type_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
return;
}
if (atomic_read(&handle->hdcp_off)) {
pr_debug("invalid state, hdcp off\n");
return;
}
if (!handle->repeater_flag) {
pr_debug("invalid state, not a repeater\n");
return;
}
/* send command to TZ */
req_buf =
(struct hdcp_query_stream_type_req *)handle->qseecom_handle->sbuf;
req_buf->commandid = HDCP_TXMTR_QUERY_STREAM_TYPE;
req_buf->ctxhandle = handle->tz_ctxhandle;
rsp_buf = (struct hdcp_query_stream_type_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_query_stream_type_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_query_stream_type_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_query_stream_type_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->msglen == 0) ||
(rsp_buf->commandid != HDCP_TXMTR_QUERY_STREAM_TYPE) ||
(rsp_buf->msg == NULL)) {
pr_err("qseecom cmd failed with err=%d status=%d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
pr_debug("message received from TZ: %s\n",
hdcp_lib_message_name((int)rsp_buf->msg[0]));
handle->last_msg = (int)rsp_buf->msg[0];
memset(handle->listener_buf, 0, MAX_TX_MESSAGE_SIZE);
memcpy(handle->listener_buf, (unsigned char *)rsp_buf->msg,
rsp_buf->msglen);
handle->hdcp_timeout = rsp_buf->timeout;
handle->msglen = rsp_buf->msglen;
exit:
if (!rc && !atomic_read(&handle->hdcp_off))
hdcp_lib_send_message(handle);
}
static void hdcp_lib_query_stream_work(struct kthread_work *work)
{
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle,
wk_stream);
hdcp_lib_stream(handle);
}
static bool hdcp_lib_client_feature_supported(void *phdcpcontext)
{
int rc = 0;
bool supported = false;
struct hdcp_lib_handle *handle = phdcpcontext;
if (!handle) {
pr_err("invalid input\n");
goto exit;
}
if (handle->feature_supported) {
supported = true;
goto exit;
}
rc = hdcp_lib_library_load(handle);
if (!rc) {
if (!hdcp_lib_verify_keys(handle)) {
pr_debug("HDCP2p2 supported\n");
handle->feature_supported = true;
supported = true;
}
hdcp_lib_library_unload(handle);
}
exit:
return supported;
}
static void hdcp_lib_check_worker_status(struct hdcp_lib_handle *handle)
{
if (!list_empty(&handle->wk_init.node))
pr_debug("init work queued\n");
if (handle->worker.current_work == &handle->wk_init)
pr_debug("init work executing\n");
if (!list_empty(&handle->wk_msg_sent.node))
pr_debug("msg_sent work queued\n");
if (handle->worker.current_work == &handle->wk_msg_sent)
pr_debug("msg_sent work executing\n");
if (!list_empty(&handle->wk_msg_recvd.node))
pr_debug("msg_recvd work queued\n");
if (handle->worker.current_work == &handle->wk_msg_recvd)
pr_debug("msg_recvd work executing\n");
if (!list_empty(&handle->wk_timeout.node))
pr_debug("timeout work queued\n");
if (handle->worker.current_work == &handle->wk_timeout)
pr_debug("timeout work executing\n");
if (!list_empty(&handle->wk_clean.node))
pr_debug("clean work queued\n");
if (handle->worker.current_work == &handle->wk_clean)
pr_debug("clean work executing\n");
if (!list_empty(&handle->wk_wait.node))
pr_debug("wait work queued\n");
if (handle->worker.current_work == &handle->wk_wait)
pr_debug("wait work executing\n");
if (!list_empty(&handle->wk_stream.node))
pr_debug("stream work queued\n");
if (handle->worker.current_work == &handle->wk_stream)
pr_debug("stream work executing\n");
}
static int hdcp_lib_check_valid_state(struct hdcp_lib_handle *handle)
{
int rc = 0;
if (!list_empty(&handle->worker.work_list))
hdcp_lib_check_worker_status(handle);
if (handle->wakeup_cmd == HDCP_LIB_WKUP_CMD_START) {
if (!list_empty(&handle->worker.work_list)) {
pr_debug("error: queue not empty\n");
rc = -EBUSY;
goto exit;
}
if (handle->hdcp_state & HDCP_STATE_APP_LOADED) {
pr_debug("library already loaded\n");
rc = -EBUSY;
goto exit;
}
} else {
if (atomic_read(&handle->hdcp_off)) {
pr_debug("hdcp2.2 session tearing down\n");
goto exit;
}
if (!(handle->hdcp_state & HDCP_STATE_APP_LOADED)) {
pr_debug("hdcp 2.2 app not loaded\n");
goto exit;
}
}
exit:
return rc;
}
static int hdcp_lib_wakeup_thread(struct hdcp_lib_wakeup_data *data)
{
struct hdcp_lib_handle *handle;
int rc = 0;
if (!data)
return -EINVAL;
handle = data->context;
if (!handle)
return -EINVAL;
mutex_lock(&handle->wakeup_mutex);
handle->wakeup_cmd = data->cmd;
handle->timeout_left = data->timeout;
pr_debug("client->lib: %s (%s)\n",
hdcp_lib_cmd_to_str(data->cmd),
hdcp_lib_message_name(handle->last_msg));
rc = hdcp_lib_check_valid_state(handle);
if (rc)
goto exit;
mutex_lock(&handle->msg_lock);
if (data->recvd_msg_len) {
kzfree(handle->last_msg_recvd_buf);
handle->last_msg_recvd_len = data->recvd_msg_len;
handle->last_msg_recvd_buf = kzalloc(data->recvd_msg_len,
GFP_KERNEL);
if (!handle->last_msg_recvd_buf) {
rc = -ENOMEM;
mutex_unlock(&handle->msg_lock);
goto exit;
}
memcpy(handle->last_msg_recvd_buf, data->recvd_msg_buf,
data->recvd_msg_len);
}
mutex_unlock(&handle->msg_lock);
if (!completion_done(&handle->poll_wait))
complete_all(&handle->poll_wait);
switch (handle->wakeup_cmd) {
case HDCP_LIB_WKUP_CMD_START:
handle->no_stored_km_flag = 0;
handle->repeater_flag = false;
handle->update_stream = false;
handle->last_msg_sent = 0;
handle->last_msg = INVALID_MESSAGE_ID;
handle->hdcp_timeout = 0;
handle->timeout_left = 0;
atomic_set(&handle->hdcp_off, 0);
handle->hdcp_state = HDCP_STATE_INIT;
HDCP_LIB_EXECUTE(init);
break;
case HDCP_LIB_WKUP_CMD_STOP:
atomic_set(&handle->hdcp_off, 1);
HDCP_LIB_EXECUTE(clean);
break;
case HDCP_LIB_WKUP_CMD_MSG_SEND_SUCCESS:
handle->last_msg_sent = handle->listener_buf[0];
HDCP_LIB_EXECUTE(msg_sent);
break;
case HDCP_LIB_WKUP_CMD_MSG_SEND_FAILED:
case HDCP_LIB_WKUP_CMD_MSG_RECV_FAILED:
case HDCP_LIB_WKUP_CMD_LINK_FAILED:
handle->hdcp_state |= HDCP_STATE_ERROR;
HDCP_LIB_EXECUTE(clean);
break;
case HDCP_LIB_WKUP_CMD_MSG_RECV_SUCCESS:
HDCP_LIB_EXECUTE(msg_recvd);
break;
case HDCP_LIB_WKUP_CMD_MSG_RECV_TIMEOUT:
HDCP_LIB_EXECUTE(timeout);
break;
case HDCP_LIB_WKUP_CMD_QUERY_STREAM_TYPE:
HDCP_LIB_EXECUTE(stream);
break;
default:
pr_err("invalid wakeup command %d\n", handle->wakeup_cmd);
}
exit:
mutex_unlock(&handle->wakeup_mutex);
return rc;
}
static void hdcp_lib_msg_sent(struct hdcp_lib_handle *handle)
{
struct hdcp_wakeup_data cdata = { HDCP_WKUP_CMD_INVALID };
if (!handle) {
pr_err("invalid handle\n");
return;
}
cdata.context = handle->client_ctx;
switch (handle->last_msg_sent) {
case SKE_SEND_TYPE_ID:
if (!hdcp_lib_enable_encryption(handle)) {
handle->authenticated = true;
cdata.cmd = HDCP_WKUP_CMD_STATUS_SUCCESS;
hdcp_lib_wakeup_client(handle, &cdata);
}
/* poll for link check */
cdata.cmd = HDCP_WKUP_CMD_LINK_POLL;
break;
case SKE_SEND_EKS_MESSAGE_ID:
if (handle->repeater_flag) {
/* poll for link check */
cdata.cmd = HDCP_WKUP_CMD_LINK_POLL;
} else {
memset(handle->listener_buf, 0, MAX_TX_MESSAGE_SIZE);
handle->listener_buf[0] = SKE_SEND_TYPE_ID;
handle->msglen = 2;
cdata.cmd = HDCP_WKUP_CMD_SEND_MESSAGE;
cdata.send_msg_buf = handle->listener_buf;
cdata.send_msg_len = handle->msglen;
handle->last_msg = hdcp_lib_get_next_message(handle,
&cdata);
}
break;
case REPEATER_AUTH_SEND_ACK_MESSAGE_ID:
pr_debug("Repeater authentication successful\n");
if (handle->update_stream) {
HDCP_LIB_EXECUTE(stream);
handle->update_stream = false;
} else {
cdata.cmd = HDCP_WKUP_CMD_LINK_POLL;
}
break;
default:
cdata.cmd = HDCP_WKUP_CMD_RECV_MESSAGE;
cdata.timeout = handle->timeout_left;
}
hdcp_lib_wakeup_client(handle, &cdata);
}
static void hdcp_lib_msg_sent_work(struct kthread_work *work)
{
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle,
wk_msg_sent);
if (handle->wakeup_cmd != HDCP_LIB_WKUP_CMD_MSG_SEND_SUCCESS) {
pr_err("invalid wakeup command %d\n", handle->wakeup_cmd);
return;
}
hdcp_lib_msg_sent(handle);
}
static void hdcp_lib_init(struct hdcp_lib_handle *handle)
{
int rc = 0;
if (!handle) {
pr_err("invalid handle\n");
return;
}
if (handle->wakeup_cmd != HDCP_LIB_WKUP_CMD_START) {
pr_err("invalid wakeup command %d\n", handle->wakeup_cmd);
return;
}
rc = hdcp_lib_library_load(handle);
if (rc)
goto exit;
rc = hdcp_lib_session_init(handle);
if (rc)
goto exit;
if (handle->hdcp_txmtr_init == NULL) {
pr_err("invalid txmtr init function pointer\n");
return;
}
rc = handle->hdcp_txmtr_init(handle);
if (rc)
goto exit;
rc = hdcp_lib_start_auth(handle);
if (rc)
goto exit;
hdcp_lib_send_message(handle);
return;
exit:
HDCP_LIB_EXECUTE(clean);
}
static void hdcp_lib_init_work(struct kthread_work *work)
{
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle,
wk_init);
hdcp_lib_init(handle);
}
static void hdcp_lib_timeout(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_send_timeout_req *req_buf;
struct hdcp_send_timeout_rsp *rsp_buf;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_debug("invalid handle\n");
return;
}
if (atomic_read(&handle->hdcp_off)) {
pr_debug("invalid state, hdcp off\n");
return;
}
req_buf = (struct hdcp_send_timeout_req *)
(handle->qseecom_handle->sbuf);
req_buf->commandid = HDCP_TXMTR_SEND_MESSAGE_TIMEOUT;
req_buf->ctxhandle = handle->tz_ctxhandle;
rsp_buf = (struct hdcp_send_timeout_rsp *)
(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp_send_timeout_req)));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_send_timeout_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct
hdcp_send_timeout_rsp)));
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS)) {
pr_err("qseecom cmd failed for with err = %d status = %d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto error;
}
if (rsp_buf->commandid == HDCP_TXMTR_SEND_MESSAGE_TIMEOUT) {
pr_err("HDCP_TXMTR_SEND_MESSAGE_TIMEOUT\n");
rc = -EINVAL;
goto error;
}
/*
* if the response contains LC_Init message
* send the message again to TZ
*/
if ((rsp_buf->commandid == HDCP_TXMTR_PROCESS_RECEIVED_MESSAGE) &&
((int)rsp_buf->message[0] == LC_INIT_MESSAGE_ID) &&
(rsp_buf->msglen == LC_INIT_MESSAGE_SIZE)) {
if (!atomic_read(&handle->hdcp_off)) {
/* keep local copy of TZ response */
memset(handle->listener_buf, 0, MAX_TX_MESSAGE_SIZE);
memcpy(handle->listener_buf,
(unsigned char *)rsp_buf->message,
rsp_buf->msglen);
handle->hdcp_timeout = rsp_buf->timeout;
handle->msglen = rsp_buf->msglen;
hdcp_lib_send_message(handle);
}
}
return;
error:
if (!atomic_read(&handle->hdcp_off))
HDCP_LIB_EXECUTE(clean);
}
static void hdcp_lib_manage_timeout_work(struct kthread_work *work)
{
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle,
wk_timeout);
hdcp_lib_timeout(handle);
}
static void hdcp_lib_clean(struct hdcp_lib_handle *handle)
{
struct hdcp_wakeup_data cdata = { HDCP_WKUP_CMD_INVALID };
if (!handle) {
pr_err("invalid input\n");
return;
}
handle->authenticated = false;
hdcp_lib_txmtr_deinit(handle);
hdcp_lib_session_deinit(handle);
hdcp_lib_library_unload(handle);
cdata.context = handle->client_ctx;
cdata.cmd = HDCP_WKUP_CMD_STATUS_FAILED;
if (!atomic_read(&handle->hdcp_off))
hdcp_lib_wakeup_client(handle, &cdata);
atomic_set(&handle->hdcp_off, 1);
}
static void hdcp_lib_cleanup_work(struct kthread_work *work)
{
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle,
wk_clean);
hdcp_lib_clean(handle);
}
static void hdcp_lib_msg_recvd(struct hdcp_lib_handle *handle)
{
int rc = 0;
struct hdcp_wakeup_data cdata = { HDCP_WKUP_CMD_INVALID };
struct hdcp_rcvd_msg_req *req_buf;
struct hdcp_rcvd_msg_rsp *rsp_buf;
uint32_t msglen;
char *msg = NULL;
char msg_name[50];
uint32_t message_id_bytes = 0;
if (!handle || !handle->qseecom_handle ||
!handle->qseecom_handle->sbuf) {
pr_err("invalid handle\n");
return;
}
if (atomic_read(&handle->hdcp_off)) {
pr_debug("invalid state, hdcp off\n");
return;
}
cdata.context = handle->client_ctx;
mutex_lock(&handle->msg_lock);
msglen = handle->last_msg_recvd_len;
if (msglen == 0) {
pr_err("invalid msg len\n");
mutex_unlock(&handle->msg_lock);
rc = -EINVAL;
goto exit;
}
/* If the client is DP then allocate extra byte for message ID. */
if (handle->device_type == HDCP_TXMTR_DP)
message_id_bytes = 1;
msglen += message_id_bytes;
msg = kzalloc(msglen, GFP_KERNEL);
if (!msg) {
mutex_unlock(&handle->msg_lock);
rc = -ENOMEM;
goto exit;
}
/* copy the message id if needed */
if (message_id_bytes)
memcpy(msg, &handle->last_msg, message_id_bytes);
memcpy(msg + message_id_bytes,
handle->last_msg_recvd_buf,
handle->last_msg_recvd_len);
mutex_unlock(&handle->msg_lock);
snprintf(msg_name, sizeof(msg_name), "%s: ",
hdcp_lib_message_name((int)msg[0]));
print_hex_dump(KERN_DEBUG, msg_name,
DUMP_PREFIX_NONE, 16, 1, msg, msglen, false);
/* send the message to QSEECOM */
req_buf = (struct hdcp_rcvd_msg_req *)(handle->qseecom_handle->sbuf);
req_buf->commandid = HDCP_TXMTR_PROCESS_RECEIVED_MESSAGE;
memcpy(req_buf->msg, msg, msglen);
req_buf->msglen = msglen;
req_buf->ctxhandle = handle->tz_ctxhandle;
rsp_buf =
(struct hdcp_rcvd_msg_rsp *)(handle->qseecom_handle->sbuf +
QSEECOM_ALIGN(sizeof
(struct
hdcp_rcvd_msg_req)));
pr_debug("writing %s to TZ at %dms\n",
hdcp_lib_message_name((int)msg[0]), jiffies_to_msecs(jiffies));
rc = qseecom_send_command(handle->qseecom_handle, req_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_rcvd_msg_req)),
rsp_buf,
QSEECOM_ALIGN(sizeof
(struct hdcp_rcvd_msg_rsp)));
/* get next message from sink if we receive H PRIME on no store km */
if ((msg[0] == AKE_SEND_H_PRIME_MESSAGE_ID) &&
handle->no_stored_km_flag) {
handle->hdcp_timeout = rsp_buf->timeout;
cdata.cmd = HDCP_WKUP_CMD_RECV_MESSAGE;
cdata.timeout = handle->hdcp_timeout;
goto exit;
}
if ((msg[0] == REPEATER_AUTH_STREAM_READY_MESSAGE_ID) &&
(rc == 0) && (rsp_buf->status == 0)) {
pr_debug("Got Auth_Stream_Ready, nothing sent to rx\n");
if (!handle->authenticated &&
!hdcp_lib_enable_encryption(handle)) {
handle->authenticated = true;
cdata.cmd = HDCP_WKUP_CMD_STATUS_SUCCESS;
hdcp_lib_wakeup_client(handle, &cdata);
}
cdata.cmd = HDCP_WKUP_CMD_LINK_POLL;
goto exit;
}
if ((rc < 0) || (rsp_buf->status != HDCP_SUCCESS) ||
(rsp_buf->msglen == 0) ||
(rsp_buf->commandid != HDCP_TXMTR_PROCESS_RECEIVED_MESSAGE) ||
(rsp_buf->msg == NULL)) {
pr_err("qseecom cmd failed with err=%d status=%d\n",
rc, rsp_buf->status);
rc = -EINVAL;
goto exit;
}
pr_debug("recvd %s from TZ at %dms\n",
hdcp_lib_message_name((int)rsp_buf->msg[0]),
jiffies_to_msecs(jiffies));
handle->last_msg = (int)rsp_buf->msg[0];
/* set the flag if response is AKE_No_Stored_km */
if (((int)rsp_buf->msg[0] == AKE_NO_STORED_KM_MESSAGE_ID)) {
pr_debug("Setting no_stored_km_flag\n");
handle->no_stored_km_flag = 1;
} else {
handle->no_stored_km_flag = 0;
}
/* check if it's a repeater */
if ((rsp_buf->msg[0] == SKE_SEND_EKS_MESSAGE_ID) &&
(rsp_buf->msglen == SKE_SEND_EKS_MESSAGE_SIZE)) {
if ((rsp_buf->flag ==
HDCP_TXMTR_SUBSTATE_WAITING_FOR_RECIEVERID_LIST) &&
(rsp_buf->timeout > 0))
handle->repeater_flag = true;
handle->update_stream = true;
}
memset(handle->listener_buf, 0, MAX_TX_MESSAGE_SIZE);
memcpy(handle->listener_buf, (unsigned char *)rsp_buf->msg,
rsp_buf->msglen);
handle->hdcp_timeout = rsp_buf->timeout;
handle->msglen = rsp_buf->msglen;
if (!atomic_read(&handle->hdcp_off))
hdcp_lib_send_message(handle);
exit:
kzfree(msg);
hdcp_lib_wakeup_client(handle, &cdata);
if (rc && !atomic_read(&handle->hdcp_off))
HDCP_LIB_EXECUTE(clean);
}
static void hdcp_lib_msg_recvd_work(struct kthread_work *work)
{
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle,
wk_msg_recvd);
hdcp_lib_msg_recvd(handle);
}
static void hdcp_lib_wait_work(struct kthread_work *work)
{
u32 timeout;
struct hdcp_lib_handle *handle = container_of(work,
struct hdcp_lib_handle, wk_wait);
if (!handle) {
pr_err("invalid input\n");
return;
}
if (atomic_read(&handle->hdcp_off)) {
pr_debug("invalid state: hdcp off\n");
return;
}
if (handle->hdcp_state & HDCP_STATE_ERROR) {
pr_debug("invalid state: hdcp error\n");
return;
}
reinit_completion(&handle->poll_wait);
timeout = wait_for_completion_timeout(&handle->poll_wait,
handle->wait_timeout);
if (!timeout) {
pr_err("wait timeout\n");
if (!atomic_read(&handle->hdcp_off))
HDCP_LIB_EXECUTE(clean);
}
handle->wait_timeout = 0;
}
bool hdcp1_check_if_supported_load_app(void)
{
int rc = 0;
/* start hdcp1 app */
if (hdcp1_supported && !hdcp1_handle) {
rc = qseecom_start_app(&hdcp1_handle, HDCP1_APP_NAME,
QSEECOM_SBUFF_SIZE);
if (rc) {
pr_err("qseecom_start_app failed %d\n", rc);
hdcp1_supported = false;
} else {
mutex_init(&hdcp1_ta_cmd_lock);
}
}
pr_debug("hdcp1 app %s loaded\n",
hdcp1_supported ? "successfully" : "not");
return hdcp1_supported;
}
/* APIs exposed to all clients */
int hdcp1_set_keys(uint32_t *aksv_msb, uint32_t *aksv_lsb)
{
int rc = 0;
struct hdcp1_key_set_req *key_set_req;
struct hdcp1_key_set_rsp *key_set_rsp;
if (aksv_msb == NULL || aksv_lsb == NULL)
return -EINVAL;
if (!hdcp1_supported || !hdcp1_handle)
return -EINVAL;
/* set keys and request aksv */
key_set_req = (struct hdcp1_key_set_req *)hdcp1_handle->sbuf;
key_set_req->commandid = HDCP1_SET_KEY_MESSAGE_ID;
key_set_rsp = (struct hdcp1_key_set_rsp *)(hdcp1_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp1_key_set_req)));
rc = qseecom_send_command(hdcp1_handle, key_set_req,
QSEECOM_ALIGN(sizeof
(struct hdcp1_key_set_req)),
key_set_rsp,
QSEECOM_ALIGN(sizeof
(struct hdcp1_key_set_rsp)));
if (rc < 0) {
pr_err("qseecom cmd failed err=%d\n", rc);
return -ENOKEY;
}
rc = key_set_rsp->ret;
if (rc) {
pr_err("set key cmd failed, rsp=%d\n", key_set_rsp->ret);
return -ENOKEY;
}
/* copy bytes into msb and lsb */
*aksv_msb = key_set_rsp->ksv[0] << 24 | key_set_rsp->ksv[1] << 16 |
key_set_rsp->ksv[2] << 8 | key_set_rsp->ksv[3];
*aksv_lsb = key_set_rsp->ksv[4] << 24 | key_set_rsp->ksv[5] << 16 |
key_set_rsp->ksv[6] << 8 | key_set_rsp->ksv[7];
return 0;
}
int hdcp1_set_enc(bool enable)
{
int rc = 0;
struct hdcp1_set_enc_req *set_enc_req;
struct hdcp1_set_enc_rsp *set_enc_rsp;
mutex_lock(&hdcp1_ta_cmd_lock);
if (!hdcp1_supported || !hdcp1_handle) {
rc = -EINVAL;
goto end;
}
if (hdcp1_enc_enabled == enable) {
pr_info("already %s\n", enable ? "enabled" : "disabled");
goto end;
}
/* set keys and request aksv */
set_enc_req = (struct hdcp1_set_enc_req *)hdcp1_handle->sbuf;
set_enc_req->commandid = HDCP1_SET_ENC_MESSAGE_ID;
set_enc_req->enable = enable;
set_enc_rsp = (struct hdcp1_set_enc_rsp *)(hdcp1_handle->sbuf +
QSEECOM_ALIGN(sizeof(struct hdcp1_set_enc_req)));
rc = qseecom_send_command(hdcp1_handle, set_enc_req,
QSEECOM_ALIGN(sizeof
(struct hdcp1_set_enc_req)),
set_enc_rsp,
QSEECOM_ALIGN(sizeof
(struct hdcp1_set_enc_rsp)));
if (rc < 0) {
pr_err("qseecom cmd failed err=%d\n", rc);
goto end;
}
rc = set_enc_rsp->ret;
if (rc) {
pr_err("enc cmd failed, rsp=%d\n", set_enc_rsp->ret);
rc = -EINVAL;
goto end;
}
hdcp1_enc_enabled = enable;
pr_info("%s success\n", enable ? "enable" : "disable");
end:
mutex_unlock(&hdcp1_ta_cmd_lock);
return rc;
}
int hdcp_library_register(struct hdcp_register_data *data)
{
int rc = 0;
struct hdcp_lib_handle *handle = NULL;
if (!data) {
pr_err("invalid input\n");
return -EINVAL;
}
if (!data->txmtr_ops) {
pr_err("invalid input: txmtr context\n");
return -EINVAL;
}
if (!data->client_ops) {
pr_err("invalid input: client_ops\n");
return -EINVAL;
}
if (!data->hdcp_ctx) {
pr_err("invalid input: hdcp_ctx\n");
return -EINVAL;
}
/* populate ops to be called by client */
data->txmtr_ops->feature_supported = hdcp_lib_client_feature_supported;
data->txmtr_ops->wakeup = hdcp_lib_wakeup_thread;
handle = kzalloc(sizeof(*handle), GFP_KERNEL);
if (!handle) {
rc = -ENOMEM;
goto unlock;
}
handle->client_ctx = data->client_ctx;
handle->client_ops = data->client_ops;
handle->hdcp_app_init = NULL;
handle->hdcp_txmtr_init = NULL;
handle->device_type = data->device_type;
atomic_set(&handle->hdcp_off, 0);
mutex_init(&handle->msg_lock);
mutex_init(&handle->wakeup_mutex);
kthread_init_worker(&handle->worker);
kthread_init_work(&handle->wk_init, hdcp_lib_init_work);
kthread_init_work(&handle->wk_msg_sent, hdcp_lib_msg_sent_work);
kthread_init_work(&handle->wk_msg_recvd, hdcp_lib_msg_recvd_work);
kthread_init_work(&handle->wk_timeout, hdcp_lib_manage_timeout_work);
kthread_init_work(&handle->wk_clean, hdcp_lib_cleanup_work);
kthread_init_work(&handle->wk_wait, hdcp_lib_wait_work);
kthread_init_work(&handle->wk_stream, hdcp_lib_query_stream_work);
init_completion(&handle->poll_wait);
handle->listener_buf = kzalloc(MAX_TX_MESSAGE_SIZE, GFP_KERNEL);
if (!(handle->listener_buf)) {
rc = -ENOMEM;
goto error;
}
*data->hdcp_ctx = handle;
handle->thread = kthread_run(kthread_worker_fn,
&handle->worker, "hdcp_tz_lib");
if (IS_ERR(handle->thread)) {
pr_err("unable to start lib thread\n");
rc = PTR_ERR(handle->thread);
handle->thread = NULL;
goto error;
}
return 0;
error:
kzfree(handle->listener_buf);
handle->listener_buf = NULL;
kzfree(handle);
handle = NULL;
unlock:
return rc;
}
EXPORT_SYMBOL(hdcp_library_register);
void hdcp_library_deregister(void *phdcpcontext)
{
struct hdcp_lib_handle *handle = phdcpcontext;
if (!handle)
return;
kthread_stop(handle->thread);
kzfree(handle->qseecom_handle);
kzfree(handle->last_msg_recvd_buf);
mutex_destroy(&handle->wakeup_mutex);
kzfree(handle->listener_buf);
kzfree(handle);
}
EXPORT_SYMBOL(hdcp_library_deregister);