From d84ba5e84998c2276f0abfd09d234f504e824f82 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Wed, 28 Mar 2018 14:01:31 +0900 Subject: [PATCH 01/16] change the type of the size Change-Id: I59c965b5bef5c5faf74e323efa911cb28832ab9b --- src/tbm_bufmgr_sprd.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index 874deb0..fb1b09e 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -1107,7 +1107,8 @@ tbm_sprd_bufmgr_get_plane_data(tbm_backend_bufmgr_data *bufmgr_data, } static tbm_backend_bo_data * -tbm_sprd_bufmgr_alloc_bo(tbm_backend_bufmgr_data *bufmgr_data, int size, tbm_bo_memory_type flags, tbm_error_e *error) +tbm_sprd_bufmgr_alloc_bo(tbm_backend_bufmgr_data *bufmgr_data, unsigned int size, + tbm_bo_memory_type flags, tbm_error_e *error) { tbm_bufmgr_sprd bufmgr_sprd = (tbm_bufmgr_sprd)bufmgr_data; tbm_bo_sprd bo_sprd; -- 2.7.4 From d16c0fc03155ee91e868882cc56981d88b66d5bc Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Wed, 28 Mar 2018 14:01:44 +0900 Subject: [PATCH 02/16] package version up to 2.1.0 Change-Id: Ibb13c84382739bb3dac41fbde2413109945830a6 --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index 7f971ab..dd481fb 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.0.1 +Version: 2.1.0 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From 9205e3cf4adfe53bafa8e9e03c026ecb23d494d6 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Thu, 29 Mar 2018 20:47:32 +0900 Subject: [PATCH 03/16] use TBM_ERROR_INVALID_OPERATION Change-Id: I985c4f062930e1a3078a46a043e10e767f940c25 --- src/tbm_bufmgr_sprd.c | 42 +++++++++++++++++++++--------------------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index fb1b09e..f105c2d 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -823,7 +823,7 @@ tbm_sprd_bufmgr_bind_native_display(tbm_backend_bufmgr_data *bufmgr_data, tbm_na if (!tbm_drm_helper_wl_auth_server_init(native_display, bufmgr_sprd->fd, bufmgr_sprd->device_name, 0)) { TBM_ERR("fail to tbm_drm_helper_wl_server_init\n"); - return TBM_ERROR_OPERATION_FAILED; + return TBM_ERROR_INVALID_OPERATION; } bufmgr_sprd->bind_display = native_display; @@ -1149,7 +1149,7 @@ tbm_sprd_bufmgr_alloc_bo(tbm_backend_bufmgr_data *bufmgr_data, unsigned int size arg.flags, (unsigned int)arg.size); free(bo_sprd); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } @@ -1164,7 +1164,7 @@ tbm_sprd_bufmgr_alloc_bo(tbm_backend_bufmgr_data *bufmgr_data, unsigned int size TBM_ERR("error fail init cache state(%d)\n", bo_sprd->name); free(bo_sprd); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } @@ -1178,7 +1178,7 @@ tbm_sprd_bufmgr_alloc_bo(tbm_backend_bufmgr_data *bufmgr_data, unsigned int size TBM_ERR("error Cannot dmabuf=%d\n", bo_sprd->gem); free(bo_sprd); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } bo_sprd->dmabuf = arg.fd; @@ -1224,7 +1224,7 @@ tbm_sprd_bufmgr_import_fd(tbm_backend_bufmgr_data *bufmgr_data, tbm_fd key, tbm_ TBM_ERR("Cannot get gem handle from fd:%d (%s)\n", arg.fd, strerror_r(errno, buf, STRERR_BUFSIZE)); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } gem = arg.handle; @@ -1234,7 +1234,7 @@ tbm_sprd_bufmgr_import_fd(tbm_backend_bufmgr_data *bufmgr_data, tbm_fd key, tbm_ TBM_ERR("Cannot get name from gem:%d, fd:%d (%s)\n", gem, key, strerror_r(errno, buf, STRERR_BUFSIZE)); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } @@ -1267,7 +1267,7 @@ tbm_sprd_bufmgr_import_fd(tbm_backend_bufmgr_data *bufmgr_data, tbm_fd key, tbm_ TBM_ERR("Cannot get gem info from gem:%d, fd:%d (%s)\n", gem, key, strerror_r(errno, buf, STRERR_BUFSIZE)); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } @@ -1293,7 +1293,7 @@ tbm_sprd_bufmgr_import_fd(tbm_backend_bufmgr_data *bufmgr_data, tbm_fd key, tbm_ if (!_bo_init_cache_state(bufmgr_sprd, bo_sprd, 1)) { TBM_ERR("error fail init cache state(%d)\n", bo_sprd->name); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_init_cache; } @@ -1348,7 +1348,7 @@ tbm_sprd_bufmgr_import_key(tbm_backend_bufmgr_data *bufmgr_data, tbm_key key, tb if (drmIoctl(bufmgr_sprd->fd, DRM_IOCTL_GEM_OPEN, &arg)) { TBM_ERR("error Cannot open gem name=%d\n", key); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return NULL; } @@ -1359,7 +1359,7 @@ tbm_sprd_bufmgr_import_key(tbm_backend_bufmgr_data *bufmgr_data, tbm_key key, tb sizeof(struct drm_sprd_gem_info))) { TBM_ERR("error Cannot get gem info=%d\n", key); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_gem; } @@ -1387,7 +1387,7 @@ tbm_sprd_bufmgr_import_key(tbm_backend_bufmgr_data *bufmgr_data, tbm_key key, tb if (!_bo_init_cache_state(bufmgr_sprd, bo_sprd, 1)) { TBM_ERR("error fail init cache state(%d)\n", bo_sprd->name); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_init_cache; } @@ -1398,7 +1398,7 @@ tbm_sprd_bufmgr_import_key(tbm_backend_bufmgr_data *bufmgr_data, tbm_key key, tb if (drmIoctl(bo_sprd->fd, DRM_IOCTL_PRIME_HANDLE_TO_FD, &arg)) { TBM_ERR("error Cannot dmabuf=%d\n", bo_sprd->gem); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_prime_handle_to_fd; } bo_sprd->dmabuf = arg.fd; @@ -1559,7 +1559,7 @@ tbm_sprd_bo_get_handle(tbm_backend_bo_data *bo_data, tbm_bo_device_type device, TBM_ERR("Cannot get handle: gem:%d, device:%d\n", bo_sprd->gem, device); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return (tbm_bo_handle) NULL; } @@ -1610,7 +1610,7 @@ tbm_sprd_bo_map(tbm_backend_bo_data *bo_data, tbm_bo_device_type device, TBM_ERR("Cannot get handle: gem:%d, device:%d, opt:%d\n", bo_sprd->gem, device, opt); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return (tbm_bo_handle) NULL; } @@ -1674,7 +1674,7 @@ tbm_sprd_bo_export_fd(tbm_backend_bo_data *bo_data, tbm_error_e *error) TBM_ERR("bo_sprd:%p Cannot dmabuf=%d (%s)\n", bo_sprd, bo_sprd->gem, strerror_r(errno, buf, STRERR_BUFSIZE)); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; return (tbm_fd) ret; } @@ -1801,7 +1801,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) if (bufmgr_sprd->fd < 0) { TBM_ERR("fail to open drm!\n"); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_open_drm; } } @@ -1813,14 +1813,14 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) TBM_ERR("fail to get device name!\n"); tbm_drm_helper_unset_tbm_master_fd(); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_device_name; } } else { if (!tbm_drm_helper_get_auth_info(&(bufmgr_sprd->fd), &(bufmgr_sprd->device_name), NULL)) { TBM_ERR("fail to get auth drm info!\n"); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_auth_info; } @@ -1842,7 +1842,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) if (!_bufmgr_init_cache_state(bufmgr_sprd)) { TBM_ERR("fail to init bufmgr cache state\n"); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_init_cache_state; } @@ -1871,7 +1871,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) if (err != TBM_ERROR_NONE) { TBM_ERR("fail to register bufmgr_func! err(%d)\n", err); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_register_bufmgr_func; } bufmgr_sprd->bufmgr_func = bufmgr_func; @@ -1900,7 +1900,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) if (err != TBM_ERROR_NONE) { TBM_ERR("fail to register bo_func! err(%d)\n", err); if (error) - *error = TBM_ERROR_OPERATION_FAILED; + *error = TBM_ERROR_INVALID_OPERATION; goto fail_register_bo_func; } bufmgr_sprd->bo_func = bo_func; -- 2.7.4 From 4854bb95926e1da20f9ea6659ffd7cb95d6e8482 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Fri, 4 May 2018 11:26:59 +0900 Subject: [PATCH 04/16] use 3.0 version of tbm backend abi Change-Id: I87dbe99011d03deb115ef3385b925e50a5abea16 --- src/tbm_bufmgr_sprd.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index f105c2d..6f8059e 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -1942,7 +1942,7 @@ fail_open_drm: tbm_backend_module tbm_backend_module_data = { "sprd", "Samsung", - TBM_BACKEND_ABI_VERSION_2_0, + TBM_BACKEND_ABI_VERSION_3_0, tbm_sprd_init, tbm_sprd_deinit }; -- 2.7.4 From 32585d2d4a73f93981327d1e13fe9cad72153a56 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Fri, 4 May 2018 11:30:00 +0900 Subject: [PATCH 05/16] package version up to 2.2.0 Change-Id: I2a9f8ce08a302c385ce0295380827d7622d33f2d --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index dd481fb..50ea4c1 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.1.0 +Version: 2.2.0 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From fd9b0f53b9a01bc01b824d1809ba4e0266a83b68 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Wed, 26 Dec 2018 19:15:45 +0900 Subject: [PATCH 06/16] package version up to 2.3.0 Change-Id: I56205e69541c3db9ef58e4d02a4080661118891a --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index 50ea4c1..1c0fec9 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.2.0 +Version: 2.3.0 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From aa61ae59ef809d35332d82e2ec9f78e33ae36f30 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Fri, 1 Nov 2019 13:05:51 +0900 Subject: [PATCH 07/16] package version up to 2.4.0 tizen 6.0 starts here. Change-Id: I29aa6fcc3a5783a58139de71f964d728132ff5d6 --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index 1c0fec9..9646af7 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.3.0 +Version: 2.4.0 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From bd671e29249ed6e6bf69f27cd3303e92944bed79 Mon Sep 17 00:00:00 2001 From: Changyeon Lee Date: Wed, 11 Dec 2019 19:36:01 +0900 Subject: [PATCH 08/16] set same pitch to all plane of NV format Change-Id: I877a8c19f3e8fa12eddba3cdc99cc5a0dc85ea10 --- src/tbm_bufmgr_sprd.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index 6f8059e..2e2dd63 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -956,7 +956,7 @@ tbm_sprd_bufmgr_get_plane_data(tbm_backend_bufmgr_data *bufmgr_data, // else if (plane_idx == 1) { _offset = _size; - _pitch = SIZE_ALIGN(width , TBM_SURFACE_ALIGNMENT_PITCH_YUV / 2); + _pitch = SIZE_ALIGN(width , TBM_SURFACE_ALIGNMENT_PITCH_YUV); _align_height = SIZE_ALIGN(height / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV); _size = SIZE_ALIGN(_pitch * _align_height, TBM_SURFACE_ALIGNMENT_PLANE); _bo_idx = 0; @@ -978,7 +978,7 @@ tbm_sprd_bufmgr_get_plane_data(tbm_backend_bufmgr_data *bufmgr_data, //else if( plane_idx ==1 ) { _offset += _size; - _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV / 2); + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); _bo_idx = 0; } -- 2.7.4 From e4732b6e173d97cbbe722b9d6262caa77961f485 Mon Sep 17 00:00:00 2001 From: Changyeon Lee Date: Wed, 11 Dec 2019 19:46:42 +0900 Subject: [PATCH 09/16] package version up to 2.4.1 Change-Id: Ie7a77a2436220724320500013d9540dd004cd8d1 --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index 9646af7..f2a8ab3 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.4.0 +Version: 2.4.1 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From c7485c8646de736456c07e391e84d5fee743e7d9 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Tue, 19 May 2020 13:28:35 +0900 Subject: [PATCH 10/16] remove the uset of tbm_backend_bufmgr_query_display_server The backend has to use the drmIsMaster() to check if the drm_fd is the master fd instead of tbm_backend_bufmgr_query_display_server(). Change-Id: I74c1d90456e36727696c6168f8a38db1bd3c93a7 --- src/tbm_bufmgr_sprd.c | 53 ++++++++++++++++++++++++++++++++++----------------- 1 file changed, 35 insertions(+), 18 deletions(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index 2e2dd63..b256ea8 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -1794,20 +1794,44 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) return NULL; } - if (tbm_backend_bufmgr_query_display_server(bufmgr, &err)) { - bufmgr_sprd->fd = tbm_drm_helper_get_master_fd(); + /* check the master_fd which already had opened */ + bufmgr_sprd->fd = tbm_drm_helper_get_master_fd(); + if (bufmgr_sprd->fd < 0) { + bufmgr_sprd->fd = _tbm_sprd_open_drm(); if (bufmgr_sprd->fd < 0) { - bufmgr_sprd->fd = _tbm_sprd_open_drm(); - if (bufmgr_sprd->fd < 0) { - TBM_ERR("fail to open drm!\n"); + TBM_ERR("fail to open drm!\n"); + if (error) + *error = TBM_ERROR_INVALID_OPERATION; + goto fail_open_drm; + } + + if (drmIsMaster(bufmgr_sprd->fd)) { + tbm_drm_helper_set_tbm_master_fd(bufmgr_sprd->fd); + + bufmgr_sprd->device_name = drmGetDeviceNameFromFd(bufmgr_sprd->fd); + if (!bufmgr_sprd->device_name) { + TBM_ERR("fail to get device name!\n"); + tbm_drm_helper_unset_tbm_master_fd(); + if (error) + *error = TBM_ERROR_INVALID_OPERATION; + goto fail_get_device_name; + } + TBM_ERR("This is Master FD(%d) from open_drm.", bufmgr_sprd->fd); + } else { + /* close the fd and get the authenticated fd from the master fd */ + close(bufmgr_sprd->fd); + bufmgr_sprd->fd = -1; + + /* get the authenticated drm fd from the master fd */ + if (!tbm_drm_helper_get_auth_info(&(bufmgr_sprd->fd), &(bufmgr_sprd->device_name), NULL)) { + TBM_ERR("fail to get auth drm info!\n"); if (error) *error = TBM_ERROR_INVALID_OPERATION; - goto fail_open_drm; + goto fail_get_auth_info; } + TBM_ERR("This is Authenticated FD(%d)", bufmgr_sprd->fd); } - - tbm_drm_helper_set_tbm_master_fd(bufmgr_sprd->fd); - + } else { bufmgr_sprd->device_name = drmGetDeviceNameFromFd(bufmgr_sprd->fd); if (!bufmgr_sprd->device_name) { TBM_ERR("fail to get device name!\n"); @@ -1816,14 +1840,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_device_name; } - } else { - if (!tbm_drm_helper_get_auth_info(&(bufmgr_sprd->fd), &(bufmgr_sprd->device_name), NULL)) { - TBM_ERR("fail to get auth drm info!\n"); - if (error) - *error = TBM_ERROR_INVALID_OPERATION; - goto fail_get_auth_info; - } - + TBM_ERR("This is Master FD from tbm_drm_helper_get_master_fd(%d)", bufmgr_sprd->fd); } tbm_drm_helper_set_fd(bufmgr_sprd->fd); @@ -1926,7 +1943,7 @@ fail_alloc_bufmgr_func: if (bufmgr_sprd->hashBos) drmHashDestroy(bufmgr_sprd->hashBos); fail_init_cache_state: - if (tbm_backend_bufmgr_query_display_server(bufmgr, &err)) + if (tbm_drm_helper_get_master_fd() >= 0) tbm_drm_helper_unset_tbm_master_fd(); tbm_drm_helper_unset_fd(); if (bufmgr_sprd->device_name) -- 2.7.4 From 83b5b009357076d6473cbddc2742be1478a70e18 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Tue, 19 May 2020 14:08:02 +0900 Subject: [PATCH 11/16] package version up to 2.4.2 Change-Id: Ia5090afdcf6a184064b6d6573e118fdaf98a613b --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index f2a8ab3..1b1170d 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.4.1 +Version: 2.4.2 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From 274194887119fe24507368bb13de384526340bbe Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Thu, 28 May 2020 11:17:45 +0900 Subject: [PATCH 12/16] change the error log from error to info Change-Id: I06f2ccffb62989a6dabee1381bb2411f53dbb017 --- src/tbm_bufmgr_sprd.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index b256ea8..7161fa5 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -1816,7 +1816,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_device_name; } - TBM_ERR("This is Master FD(%d) from open_drm.", bufmgr_sprd->fd); + TBM_INFO("This is Master FD(%d) from open_drm.", bufmgr_sprd->fd); } else { /* close the fd and get the authenticated fd from the master fd */ close(bufmgr_sprd->fd); @@ -1829,7 +1829,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_auth_info; } - TBM_ERR("This is Authenticated FD(%d)", bufmgr_sprd->fd); + TBM_INFO("This is Authenticated FD(%d)", bufmgr_sprd->fd); } } else { bufmgr_sprd->device_name = drmGetDeviceNameFromFd(bufmgr_sprd->fd); @@ -1840,7 +1840,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) *error = TBM_ERROR_INVALID_OPERATION; goto fail_get_device_name; } - TBM_ERR("This is Master FD from tbm_drm_helper_get_master_fd(%d)", bufmgr_sprd->fd); + TBM_INFO("This is Master FD from tbm_drm_helper_get_master_fd(%d)", bufmgr_sprd->fd); } tbm_drm_helper_set_fd(bufmgr_sprd->fd); -- 2.7.4 From e2e1af4397657413892f56f9b4817da68c82a714 Mon Sep 17 00:00:00 2001 From: Changyeon Lee Date: Tue, 21 Jul 2020 20:06:40 +0900 Subject: [PATCH 13/16] fix fd leak Change-Id: I90e1cf86227728a93c714d1e593de4acf52deea4 --- src/tbm_bufmgr_sprd.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/tbm_bufmgr_sprd.c b/src/tbm_bufmgr_sprd.c index 7161fa5..46e278e 100644 --- a/src/tbm_bufmgr_sprd.c +++ b/src/tbm_bufmgr_sprd.c @@ -1778,6 +1778,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) tbm_backend_bo_func *bo_func = NULL; int fp; tbm_error_e err; + int set_master = 0; if (!bufmgr) { TBM_ERR("bufmgr is null.\n"); @@ -1807,6 +1808,7 @@ tbm_sprd_init(tbm_bufmgr bufmgr, tbm_error_e *error) if (drmIsMaster(bufmgr_sprd->fd)) { tbm_drm_helper_set_tbm_master_fd(bufmgr_sprd->fd); + set_master = 1; bufmgr_sprd->device_name = drmGetDeviceNameFromFd(bufmgr_sprd->fd); if (!bufmgr_sprd->device_name) { @@ -1943,7 +1945,7 @@ fail_alloc_bufmgr_func: if (bufmgr_sprd->hashBos) drmHashDestroy(bufmgr_sprd->hashBos); fail_init_cache_state: - if (tbm_drm_helper_get_master_fd() >= 0) + if (set_master) tbm_drm_helper_unset_tbm_master_fd(); tbm_drm_helper_unset_fd(); if (bufmgr_sprd->device_name) -- 2.7.4 From 1f827848e204c170b14b342ab39b6bee179f5c9f Mon Sep 17 00:00:00 2001 From: Changyeon Lee Date: Tue, 21 Jul 2020 20:15:29 +0900 Subject: [PATCH 14/16] package version up to 2.4.3 Change-Id: Ia10f4c76e8a1d5df507288c3fb09642b73d584ed --- packaging/libtbm-sprd.spec | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index 1b1170d..3078e52 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -1,5 +1,5 @@ Name: libtbm-sprd -Version: 2.4.2 +Version: 2.4.3 Release: 0 License: MIT Summary: Tizen Buffer Manager - sprd backend -- 2.7.4 From 2b6282ed54f6e56def6caaab4cf910d96a4e1436 Mon Sep 17 00:00:00 2001 From: SooChan Lim Date: Wed, 3 Feb 2021 09:25:53 +0900 Subject: [PATCH 15/16] move source files to src/libtbm-sprd/ Change-Id: Ifa25b025f916a05e5983b1bf639c2aa59b3a11c1 --- configure.ac | 1 + src/Makefile.am | 13 +------------ src/libtbm-sprd/Makefile.am | 12 ++++++++++++ src/{ => libtbm-sprd}/tbm_bufmgr_sprd.c | 0 src/{ => libtbm-sprd}/tbm_bufmgr_tgl.h | 0 5 files changed, 14 insertions(+), 12 deletions(-) create mode 100644 src/libtbm-sprd/Makefile.am rename src/{ => libtbm-sprd}/tbm_bufmgr_sprd.c (100%) rename src/{ => libtbm-sprd}/tbm_bufmgr_tgl.h (100%) diff --git a/configure.ac b/configure.ac index 1a01f3f..6b01214 100755 --- a/configure.ac +++ b/configure.ac @@ -57,6 +57,7 @@ AC_SUBST(bufmgr_dir) AC_OUTPUT([ Makefile + src/libtbm-sprd/Makefile src/Makefile]) echo "" diff --git a/src/Makefile.am b/src/Makefile.am index ebe5b35..ad0ed89 100644 --- a/src/Makefile.am +++ b/src/Makefile.am @@ -1,12 +1 @@ -AM_CFLAGS = \ - @LIBTBM_SPRD_CFLAGS@ \ - -I$(top_srcdir) \ - -I$(top_srcdir)/src \ - -I/usr/include/drm - -libtbm_sprd_la_LTLIBRARIES = libtbm_sprd.la -libtbm_sprd_ladir = /${bufmgr_dir} -libtbm_sprd_la_LIBADD = @LIBTBM_SPRD_LIBS@ - -libtbm_sprd_la_SOURCES = \ - tbm_bufmgr_sprd.c +SUBDIRS = libtbm-sprd diff --git a/src/libtbm-sprd/Makefile.am b/src/libtbm-sprd/Makefile.am new file mode 100644 index 0000000..ebe5b35 --- /dev/null +++ b/src/libtbm-sprd/Makefile.am @@ -0,0 +1,12 @@ +AM_CFLAGS = \ + @LIBTBM_SPRD_CFLAGS@ \ + -I$(top_srcdir) \ + -I$(top_srcdir)/src \ + -I/usr/include/drm + +libtbm_sprd_la_LTLIBRARIES = libtbm_sprd.la +libtbm_sprd_ladir = /${bufmgr_dir} +libtbm_sprd_la_LIBADD = @LIBTBM_SPRD_LIBS@ + +libtbm_sprd_la_SOURCES = \ + tbm_bufmgr_sprd.c diff --git a/src/tbm_bufmgr_sprd.c b/src/libtbm-sprd/tbm_bufmgr_sprd.c similarity index 100% rename from src/tbm_bufmgr_sprd.c rename to src/libtbm-sprd/tbm_bufmgr_sprd.c diff --git a/src/tbm_bufmgr_tgl.h b/src/libtbm-sprd/tbm_bufmgr_tgl.h similarity index 100% rename from src/tbm_bufmgr_tgl.h rename to src/libtbm-sprd/tbm_bufmgr_tgl.h -- 2.7.4 From 8d5ac12d780fb58f9f1cc703bdb487518838f8c9 Mon Sep 17 00:00:00 2001 From: Junkyeong Kim Date: Fri, 5 Feb 2021 14:36:46 +0900 Subject: [PATCH 16/16] make hal-backend-tbm-sprd package This is the first step for implementing the new hal backend. libhal-backend-tbm-sprd package has a new hal backend module. The new hal architecture will be available for Tizen 6.5. Change-Id: Ibdbaca5dc4b234280876b287c966ca6f3bbabe33 Signed-off-by: Junkyeong Kim --- configure.ac | 38 +- packaging/libhal-backend-tbm-sprd.manifest | 5 + packaging/libtbm-sprd.spec | 29 +- rules/99-libhal-backend-tbm-sprd.rules | 2 + src/Makefile.am | 2 +- src/libhal-backend-tbm-sprd/Makefile.am | 12 + src/libhal-backend-tbm-sprd/tbm_backend_log.c | 43 + src/libhal-backend-tbm-sprd/tbm_backend_log.h | 104 ++ src/libhal-backend-tbm-sprd/tbm_backend_sprd.c | 1903 ++++++++++++++++++++++++ src/libhal-backend-tbm-sprd/tbm_bufmgr_tgl.h | 126 ++ 10 files changed, 2257 insertions(+), 7 deletions(-) create mode 100644 packaging/libhal-backend-tbm-sprd.manifest create mode 100644 rules/99-libhal-backend-tbm-sprd.rules create mode 100644 src/libhal-backend-tbm-sprd/Makefile.am create mode 100644 src/libhal-backend-tbm-sprd/tbm_backend_log.c create mode 100644 src/libhal-backend-tbm-sprd/tbm_backend_log.h create mode 100644 src/libhal-backend-tbm-sprd/tbm_backend_sprd.c create mode 100644 src/libhal-backend-tbm-sprd/tbm_bufmgr_tgl.h diff --git a/configure.ac b/configure.ac index 6b01214..2ff6a69 100755 --- a/configure.ac +++ b/configure.ac @@ -38,15 +38,22 @@ m4_ifdef([AM_SILENT_RULES], [AM_SILENT_RULES([yes])]) PKG_CHECK_MODULES(LIBDRM, libdrm) PKG_CHECK_MODULES(LIBTBM, libtbm) +PKG_CHECK_MODULES(HAL_API_COMMON, hal-api-common) +PKG_CHECK_MODULES(HAL_API_TBM, hal-api-tbm) PKG_CHECK_MODULES(LIBDLOG, dlog) -LIBTBM_SPRD_CFLAGS="$LIBDRM_CFLAGS $LIBTBM_CFLAGS $LIBDLOG_CFLAGS $LIBUDEV_CLFAGS " -LIBTBM_SPRD_LIBS="$LIBDRM_LIBS $LIBTBM_LIBS $LIBDLOG_LIBS $LIBUDEV_LIBS " +PKG_CHECK_MODULES(CAPI, [capi-base-common >= 0.1.1], [capi_0_1_1=yes], [capi_0_1_1=no]) +if test x"$capi_0_1_1" = xyes; then + AC_DEFINE(HAVE_CAPI_0_1_1,1,[The version of capi-base-common is over 0.1.1]) +fi + +LIBTBM_SPRD_CFLAGS="$LIBDRM_CFLAGS $LIBTBM_CFLAGS $LIBDLOG_CFLAGS " +LIBTBM_SPRD_LIBS="$LIBDRM_LIBS $LIBTBM_LIBS $LIBDLOG_LIBS " PKG_CHECK_MODULES(LIBUDEV, libudev, [udev=yes], [udev=no]) if test x"$udev" = xyes; then AC_DEFINE(HAVE_UDEV,1,[Enable udev-based monitor hotplug detection]) - LIBTBM_SPRD_CFLAGS="$LIBTBM_SPRD_CFLAGS $LIBUDEV_CFLAGS" - LIBTBM_SPRD_LIBS="$LIBTBM_SPRD_LIBS $LIBUDEV_LIBS" + LIBTBM_SPRD_CFLAGS+="$LIBUDEV_CFLAGS " + LIBTBM_SPRD_LIBS+="$LIBUDEV_LIBS " fi AC_SUBST(LIBTBM_SPRD_CFLAGS) @@ -55,9 +62,29 @@ AC_SUBST(LIBTBM_SPRD_LIBS) bufmgr_dir=${libdir#*/} AC_SUBST(bufmgr_dir) +# set the data dir for the tdm config +DEFAULT_HAL_LIBDIR="/hal/lib" +AC_ARG_WITH(hal-libdir, AS_HELP_STRING([--with-hal-libdir=PATH], [hal backend library path]), + [ HAL_LIBDIR="$withval" ], + [ HAL_LIBDIR="${DEFAULT_HAL_LIBDIR}" ]) +AC_DEFINE_UNQUOTED(HAL_LIBDIR, "${HAL_LIBDIR}", [Directory for hal backend library path]) +AC_SUBST(HAL_LIBDIR) + +# for libhal-backend-tbm-sprd +LIBHAL_BACKEND_TBM_SPRD_CFLAGS="$HAL_API_COMMON_CFLAGS $HAL_API_TBM_CFLAGS $LIBDRM_CFLAGS $LIBDRM_SPRD_CFLAGS $CAPI_CFLAGS $DLOG_CFLAGS " +LIBHAL_BACKEND_TBM_SPRD_LIBS="$HAL_API_COMMON_LIBS $HAL_API_TBM_LIBS $LIBDRM_LIBS $LIBDRM_SPRD_LIBS $CAPI_LIBS $DLOG_LIBS " +if test x"$udev" = xyes; then + LIBHAL_BACKEND_TBM_SPRD_CFLAGS+="$LIBUDEV_CFLAGS " + LIBHAL_BACKEND_TBM_SPRD_LIBS+="$LIBUDEV_LIBS " +fi + +AC_SUBST(LIBHAL_BACKEND_TBM_SPRD_CFLAGS) +AC_SUBST(LIBHAL_BACKEND_TBM_SPRD_LIBS) + AC_OUTPUT([ Makefile src/libtbm-sprd/Makefile + src/libhal-backend-tbm-sprd/Makefile src/Makefile]) echo "" @@ -66,5 +93,8 @@ echo "LDFLAGS : $LDFLAGS" echo "LIBTBM_SPRD_CFLAGS : $LIBTBM_SPRD_CFLAGS" echo "LIBTBM_SPRD_LIBS : $LIBTBM_SPRD_LIBS" echo "bufmgr_dir : $bufmgr_dir" +echo "LIBHAL_BACKEND_TBM_SPRD_CFLAGS : $LIBHAL_BACKEND_TBM_SPRD_CFLAGS" +echo "LIBHAL_BACKEND_TBM_SPRD_LIBS : $LIBHAL_BACKEND_TBM_SPRD_LIBS" +echo "hal-libdir : $HAL_LIBDIR" echo "" diff --git a/packaging/libhal-backend-tbm-sprd.manifest b/packaging/libhal-backend-tbm-sprd.manifest new file mode 100644 index 0000000..75b0fa5 --- /dev/null +++ b/packaging/libhal-backend-tbm-sprd.manifest @@ -0,0 +1,5 @@ + + + + + diff --git a/packaging/libtbm-sprd.spec b/packaging/libtbm-sprd.spec index 3078e52..05d5553 100644 --- a/packaging/libtbm-sprd.spec +++ b/packaging/libtbm-sprd.spec @@ -6,25 +6,39 @@ Summary: Tizen Buffer Manager - sprd backend Group: System/Libraries ExcludeArch: %{ix86} x86_64 aarch64 Source0: %{name}-%{version}.tar.gz -Source1001: %{name}.manifest +Source1001: %{name}.manifest +Source1002: libhal-backend-tbm-sprd.manifest BuildRequires: pkgconfig(libdrm) BuildRequires: pkgconfig(libtbm) +BuildRequires: pkgconfig(hal-api-common) +BuildRequires: pkgconfig(hal-api-tbm) BuildRequires: pkgconfig(dlog) BuildRequires: pkgconfig(libudev) BuildRequires: kernel-headers-3.10-sc7730 -BuildConflicts: linux-glibc-devel +BuildConflicts: linux-glibc-devel %description descriptionion:Tizen Buffer manager backend module for spreadtrum +%package -n hal-backend-tbm-sprd +Summary: hal-backend-tbm module for spreadtrum +Group: System/Libraries +Requires: hal-api-tbm +Requires: hal-api-common + +%description -n hal-backend-tbm-sprd +descriptionion: hal tbm backend module for sprd + %prep %setup -q cp %{SOURCE1001} . +cp %{SOURCE1002} . %build %reconfigure --prefix=%{_prefix} --libdir=%{_libdir}/bufmgr \ + --with-hal-libdir=%{_hal_libdir} \ CFLAGS="${CFLAGS} -Wall -Werror `pkg-config --cflags dlog`" LDFLAGS="${LDFLAGS} -Wl,--hash-style=both -Wl,--as-needed" make %{?_smp_mflags} @@ -35,6 +49,7 @@ rm -rf %{buildroot} # make rule for tgl mkdir -p %{buildroot}%{_libdir}/udev/rules.d/ cp -af rules/99-libtbm_sprd.rules %{buildroot}%{_libdir}/udev/rules.d/ +cp -af rules/99-libhal-backend-tbm-sprd.rules %{buildroot}%{_libdir}/udev/rules.d/ %make_install @@ -44,6 +59,11 @@ if [ -f %{_libdir}/bufmgr/libtbm_default.so ]; then fi ln -s libtbm_sprd.so %{_libdir}/bufmgr/libtbm_default.so +if [ -f %{_hal_libdir}/libhal-backend-tbm.so ]; then + rm -rf %{_hal_libdir}/libhal-backend-tbm.so +fi +ln -s libhal-backend-tbm-sprd.so %{_hal_libdir}/libhal-backend-tbm.so + %postun -p /sbin/ldconfig %files @@ -52,3 +72,8 @@ ln -s libtbm_sprd.so %{_libdir}/bufmgr/libtbm_default.so %{_libdir}/bufmgr/libtbm_*.so* %{_libdir}/udev/rules.d/99-libtbm_sprd.rules +%files -n hal-backend-tbm-sprd +%manifest libhal-backend-tbm-sprd.manifest +%license COPYING +%{_hal_libdir}/libhal-backend-*.so* +%{_libdir}/udev/rules.d/99-libhal-backend-tbm-sprd.rules diff --git a/rules/99-libhal-backend-tbm-sprd.rules b/rules/99-libhal-backend-tbm-sprd.rules new file mode 100644 index 0000000..a826c4c --- /dev/null +++ b/rules/99-libhal-backend-tbm-sprd.rules @@ -0,0 +1,2 @@ +KERNEL=="tgl", MODE="0666", GROUP="display", SECLABEL{smack}="*" +KERNEL=="slp_global_lock*", MODE="0666", GROUP="display", SECLABEL{smack}="*" diff --git a/src/Makefile.am b/src/Makefile.am index ad0ed89..d9d40a0 100644 --- a/src/Makefile.am +++ b/src/Makefile.am @@ -1 +1 @@ -SUBDIRS = libtbm-sprd +SUBDIRS = libtbm-sprd libhal-backend-tbm-sprd diff --git a/src/libhal-backend-tbm-sprd/Makefile.am b/src/libhal-backend-tbm-sprd/Makefile.am new file mode 100644 index 0000000..9780c33 --- /dev/null +++ b/src/libhal-backend-tbm-sprd/Makefile.am @@ -0,0 +1,12 @@ +AM_CFLAGS = \ + @LIBHAL_BACKEND_TBM_SPRD_CFLAGS@ \ + -I$(top_srcdir) \ + -I$(top_srcdir)/src/libhal-backend-tbm-sprd + +libhal_backend_tbm_sprd_la_LTLIBRARIES = libhal-backend-tbm-sprd.la +libhal_backend_tbm_sprd_ladir = @HAL_LIBDIR@ +libhal_backend_tbm_sprd_la_LIBADD = @LIBHAL_BACKEND_TBM_SPRD_LIBS@ + +libhal_backend_tbm_sprd_la_SOURCES = \ + tbm_backend_log.c \ + tbm_backend_sprd.c diff --git a/src/libhal-backend-tbm-sprd/tbm_backend_log.c b/src/libhal-backend-tbm-sprd/tbm_backend_log.c new file mode 100644 index 0000000..cfd8ce9 --- /dev/null +++ b/src/libhal-backend-tbm-sprd/tbm_backend_log.c @@ -0,0 +1,43 @@ +#include "tbm_backend_log.h" + +#undef LOG_TAG +#define LOG_TAG "TBM_BACKEND" + +unsigned int tbm_log_debug_level = TBM_BACKEND_LOG_LEVEL_INFO; + +static void +_tbm_backend_log_dlog_print(int level, const char *fmt, va_list arg) +{ + log_priority dlog_prio; + + switch (level) { + case TBM_BACKEND_LOG_LEVEL_ERR: + dlog_prio = DLOG_ERROR; + break; + case TBM_BACKEND_LOG_LEVEL_WRN: + dlog_prio = DLOG_WARN; + break; + case TBM_BACKEND_LOG_LEVEL_INFO: + dlog_prio = DLOG_INFO; + break; + case TBM_BACKEND_LOG_LEVEL_DBG: + dlog_prio = DLOG_DEBUG; + break; + default: + return; + } + __dlog_vprint(LOG_ID_SYSTEM, dlog_prio, LOG_TAG, fmt, arg); +} + +void +tbm_backend_log_print(int level, const char *fmt, ...) +{ + va_list arg; + + if (level > tbm_log_debug_level) + return; + + va_start(arg, fmt); + _tbm_backend_log_dlog_print(level, fmt, arg); + va_end(arg); +} \ No newline at end of file diff --git a/src/libhal-backend-tbm-sprd/tbm_backend_log.h b/src/libhal-backend-tbm-sprd/tbm_backend_log.h new file mode 100644 index 0000000..6c49caf --- /dev/null +++ b/src/libhal-backend-tbm-sprd/tbm_backend_log.h @@ -0,0 +1,104 @@ +/************************************************************************** + +libtbm_sprd + +Copyright 2021 Samsung Electronics co., Ltd. All Rights Reserved. + +Contact: SooChan Lim + +Permission is hereby granted, free of charge, to any person obtaining a +copy of this software and associated documentation files (the +"Software"), to deal in the Software without restriction, including +without limitation the rights to use, copy, modify, merge, publish, +distribute, sub license, and/or sell copies of the Software, and to +permit persons to whom the Software is furnished to do so, subject to +the following conditions: + +The above copyright notice and this permission notice (including the +next paragraph) shall be included in all copies or substantial portions +of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS +OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. +IN NO EVENT SHALL PRECISION INSIGHT AND/OR ITS SUPPLIERS BE LIABLE FOR +ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, +TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE +SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +**************************************************************************/ + +#ifndef __TBM_BACKEND_LOG_H__ +#define __TBM_BACKEND_LOG_H__ + +#include +#include +#include + +enum { + TBM_BACKEND_LOG_LEVEL_NONE, + TBM_BACKEND_LOG_LEVEL_ERR, + TBM_BACKEND_LOG_LEVEL_WRN, + TBM_BACKEND_LOG_LEVEL_INFO, + TBM_BACKEND_LOG_LEVEL_DBG, +}; + +/* log level */ +void tbm_backend_log_print(int level, const char *fmt, ...); + +#define TBM_BACKEND_DBG(fmt, args...) \ + do { \ + struct timespec ts; \ + clock_gettime(CLOCK_MONOTONIC, &ts); \ + tbm_backend_log_print(TBM_BACKEND_LOG_LEVEL_DBG, "[%5d.%06d][%d][%s %d]"fmt, \ + (int)ts.tv_sec, (int)ts.tv_nsec / 1000, \ + (int)syscall(SYS_gettid), __FUNCTION__, __LINE__, ##args); \ + } while (0) + +#define TBM_BACKEND_INFO(fmt, args...) \ + do { \ + struct timespec ts; \ + clock_gettime(CLOCK_MONOTONIC, &ts); \ + tbm_backend_log_print(TBM_BACKEND_LOG_LEVEL_INFO, "[%5d.%06d][%d][%s %d]"fmt, \ + (int)ts.tv_sec, (int)ts.tv_nsec / 1000, \ + (int)syscall(SYS_gettid), __FUNCTION__, __LINE__, ##args); \ + } while (0) + +#define TBM_BACKEND_WRN(fmt, args...) \ + do { \ + struct timespec ts; \ + clock_gettime(CLOCK_MONOTONIC, &ts); \ + tbm_backend_log_print(TBM_BACKEND_LOG_LEVEL_WRN, "[%5d.%06d][%d][%s %d]"fmt, \ + (int)ts.tv_sec, (int)ts.tv_nsec / 1000, \ + (int)syscall(SYS_gettid), __FUNCTION__, __LINE__, ##args); \ + } while (0) + +#define TBM_BACKEND_ERR(fmt, args...) \ + do { \ + struct timespec ts; \ + clock_gettime(CLOCK_MONOTONIC, &ts); \ + tbm_backend_log_print(TBM_BACKEND_LOG_LEVEL_ERR, "[%5d.%06d][%d][%s %d]"fmt, \ + (int)ts.tv_sec, (int)ts.tv_nsec / 1000, \ + (int)syscall(SYS_gettid), __FUNCTION__, __LINE__, ##args); \ + } while (0) + +#define TBM_BACKEND_RETURN_IF_FAIL(cond) {\ + if (!(cond)) {\ + TBM_BACKEND_ERR("'%s' failed.\n", #cond);\ + return;\ + } \ +} +#define TBM_BACKEND_RETURN_VAL_IF_FAIL(cond, val) {\ + if (!(cond)) {\ + TBM_BACKEND_ERR("'%s' failed.\n", #cond);\ + return val;\ + } \ +} +#define TBM_BACKEND_GOTO_VAL_IF_FAIL(cond, val) {\ + if (!(cond)) {\ + TBM_BACKEND_ERR("'%s' failed.\n", #cond);\ + goto val;\ + } \ +} + +#endif /* __TBM_BACKEND_LOG_H__ */ diff --git a/src/libhal-backend-tbm-sprd/tbm_backend_sprd.c b/src/libhal-backend-tbm-sprd/tbm_backend_sprd.c new file mode 100644 index 0000000..bd9293b --- /dev/null +++ b/src/libhal-backend-tbm-sprd/tbm_backend_sprd.c @@ -0,0 +1,1903 @@ +/************************************************************************** + +libtbm_sprd + +Copyright 2012 Samsung Electronics co., Ltd. All Rights Reserved. + +Contact: SooChan Lim , Sangjin Lee + +Permission is hereby granted, free of charge, to any person obtaining a +copy of this software and associated documentation files (the +"Software"), to deal in the Software without restriction, including +without limitation the rights to use, copy, modify, merge, publish, +distribute, sub license, and/or sell copies of the Software, and to +permit persons to whom the Software is furnished to do so, subject to +the following conditions: + +The above copyright notice and this permission notice (including the +next paragraph) shall be included in all copies or substantial portions +of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS +OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF +MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. +IN NO EVENT SHALL PRECISION INSIGHT AND/OR ITS SUPPLIERS BE LIABLE FOR +ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, +TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE +SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + +**************************************************************************/ + +#ifdef HAVE_CONFIG_H +#include "config.h" +#endif + +#if HAVE_UDEV +#include +#endif + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +//#define USE_CONTIG_ONLY +//#define USE_CACHE +#define USE_DMAIMPORT + +#ifdef USE_CACHE +#include "tbm_bufmgr_tgl.h" +#endif +#include "tbm_backend_log.h" + +#define TBM_COLOR_FORMAT_COUNT 4 + +#define SPRD_DRM_NAME "sprd" + +#define STRERR_BUFSIZE 128 + +#define SIZE_ALIGN(value, base) (((value) + ((base) - 1)) & ~((base) - 1)) + +#define TBM_SURFACE_ALIGNMENT_PLANE (64) +#define TBM_SURFACE_ALIGNMENT_PITCH_RGB (128) +#define TBM_SURFACE_ALIGNMENT_PITCH_YUV (16) + +struct dma_buf_info { + unsigned long size; + unsigned int fence_supported; + unsigned int padding; +}; + +#define DMA_BUF_ACCESS_READ 0x1 +#define DMA_BUF_ACCESS_WRITE 0x2 +#define DMA_BUF_ACCESS_DMA 0x4 +#define DMA_BUF_ACCESS_MAX 0x8 + +#define DMA_FENCE_LIST_MAX 5 + +struct dma_buf_fence { + unsigned long ctx; + unsigned int type; +}; + +#define DMABUF_IOCTL_BASE 'F' +#define DMABUF_IOWR(nr, type) _IOWR(DMABUF_IOCTL_BASE, nr, type) + +#define DMABUF_IOCTL_GET_INFO DMABUF_IOWR(0x00, struct dma_buf_info) +#define DMABUF_IOCTL_GET_FENCE DMABUF_IOWR(0x01, struct dma_buf_fence) +#define DMABUF_IOCTL_PUT_FENCE DMABUF_IOWR(0x02, struct dma_buf_fence) + +/* tgl key values */ +#define GLOBAL_KEY ((unsigned int)(-1)) +/* TBM_CACHE */ +#define TBM_SPRD_CACHE_INV 0x01 /**< cache invalidate */ +#define TBM_SPRD_CACHE_CLN 0x02 /**< cache clean */ +#define TBM_SPRD_CACHE_ALL 0x10 /**< cache all */ +#define TBM_SPRD_CACHE_FLUSH (TBM_SPRD_CACHE_INV|TBM_SPRD_CACHE_CLN) /**< cache flush */ +#define TBM_SPRD_CACHE_FLUSH_ALL (TBM_SPRD_CACHE_FLUSH|TBM_SPRD_CACHE_ALL) /**< cache flush all */ + +enum { + DEVICE_NONE = 0, + DEVICE_CA, /* cache aware device */ + DEVICE_CO /* cache oblivious device */ +}; + +typedef union _tbm_bo_cache_state tbm_bo_cache_state; + +union _tbm_bo_cache_state { + unsigned int val; + struct { + unsigned int cntFlush:16; /*Flush all index for sync */ + unsigned int isCached:1; + unsigned int isDirtied:2; + } data; +}; + +typedef struct _tbm_sprd_bufmgr tbm_sprd_bufmgr; +typedef struct _tbm_sprd_bo tbm_sprd_bo; + +/* tbm buffor object for sprd */ +struct _tbm_sprd_bo { + int fd; + + unsigned int name; /* FLINK ID */ + + unsigned int gem; /* GEM Handle */ + + unsigned int dmabuf; /* fd for dmabuf */ + + void *pBase; /* virtual address */ + + unsigned int size; + + unsigned int flags_sprd; + unsigned int flags_tbm; + + pthread_mutex_t mutex; + struct dma_buf_fence dma_fence[DMA_FENCE_LIST_MAX]; + int device; + int opt; + + tbm_bo_cache_state cache_state; + unsigned int map_cnt; + + tbm_sprd_bufmgr *bufmgr_data; +}; + +/* tbm bufmgr private for sprd */ +struct _tbm_sprd_bufmgr { + int fd; + void *hashBos; + + int use_dma_fence; + + int tgl_fd; +}; + +char *STR_DEVICE[] = { + "DEF", + "CPU", + "2D", + "3D", + "MM" +}; + +char *STR_OPT[] = { + "NONE", + "RD", + "WR", + "RDWR" +}; + + +uint32_t tbm_sprd_color_format_list[TBM_COLOR_FORMAT_COUNT] = { + HAL_TBM_FORMAT_ARGB8888, + HAL_TBM_FORMAT_XRGB8888, + HAL_TBM_FORMAT_NV12, + HAL_TBM_FORMAT_YUV420 + }; + +#ifdef USE_CACHE +static inline int +_tgl_get_version(int fd) +{ + struct tgl_ver_data data; + int err; + char buf[STRERR_BUFSIZE]; + + err = ioctl(fd, TGL_IOCTL_GET_VERSION, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) %s:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE)); + return 0; + } + + TBM_BACKEND_DBG("tgl version is (%u, %u).\n", data.major, data.minor); + + return 1; +} + +static inline int +_tgl_init(int fd, unsigned int key) +{ + struct tgl_reg_data data; + int err; + char buf[STRERR_BUFSIZE]; + + data.key = key; + data.timeout_ms = 1000; + + err = ioctl(fd, TGL_IOCTL_REGISTER, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) key:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE), key); + return 0; + } + + return 1; +} + +static inline int +_tgl_destroy(int fd, unsigned int key) +{ + struct tgl_reg_data data; + int err; + char buf[STRERR_BUFSIZE]; + + data.key = key; + err = ioctl(fd, TGL_IOCTL_UNREGISTER, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) key:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE), key); + return 0; + } + + return 1; +} + +static inline int +_tgl_lock(int fd, unsigned int key, int opt) +{ + struct tgl_lock_data data; + enum tgl_type_data tgl_type; + int err; + char buf[STRERR_BUFSIZE]; + + switch (opt) { + case TBM_OPTION_READ: + tgl_type = TGL_TYPE_READ; + break; + case TBM_OPTION_WRITE: + tgl_type = TGL_TYPE_WRITE; + break; + default: + tgl_type = TGL_TYPE_NONE; + break; + } + + data.key = key; + data.type = tgl_type; + + err = ioctl(fd, TGL_IOCTL_LOCK, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) key:%d opt:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE), key, opt); + return 0; + } + + return 1; +} + +static inline int +_tgl_unlock(int fd, unsigned int key) +{ + struct tgl_lock_data data; + int err; + char buf[STRERR_BUFSIZE]; + + data.key = key; + data.type = TGL_TYPE_NONE; + + err = ioctl(fd, TGL_IOCTL_UNLOCK, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) key:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE), key); + return 0; + } + + return 1; +} + +static inline int +_tgl_set_data(int fd, unsigned int key, unsigned int val) +{ + struct tgl_usr_data data; + int err; + char buf[STRERR_BUFSIZE]; + + data.key = key; + data.data1 = val; + + err = ioctl(fd, TGL_IOCTL_SET_DATA, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) key:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE), key); + return 0; + } + + return 1; +} + +static inline unsigned int +_tgl_get_data(int fd, unsigned int key, unsigned int *locked) +{ + struct tgl_usr_data data = { 0, }; + int err; + char buf[STRERR_BUFSIZE]; + + data.key = key; + + err = ioctl(fd, TGL_IOCTL_GET_DATA, &data); + if (err) { + TBM_BACKEND_ERR("error(%s) key:%d\n", + strerror_r(errno, buf, STRERR_BUFSIZE), key); + return 0; + } + + if (locked) + *locked = (unsigned int)data.status; + + return data.data1; +} +#endif + +static int +_tbm_sprd_open_drm(void) +{ +#ifdef HAVE_UDEV + struct udev_device *drm_device = NULL; + struct udev_list_entry *entry = NULL; + struct udev_enumerate *e; + const char *filepath; + struct udev *udev; + struct stat s; +#endif + int fd; + + fd = drmOpen(SPRD_DRM_NAME, NULL); + if (fd != -1) + return fd; + +#ifdef HAVE_UDEV + TBM_BACKEND_DBG("warning fail to open drm. search drm-device by udev\n"); + + udev = udev_new(); + if (!udev) { + TBM_BACKEND_ERR("udev_new() failed.\n"); + return -1; + } + + e = udev_enumerate_new(udev); + udev_enumerate_add_match_subsystem(e, "drm"); + udev_enumerate_add_match_sysname(e, "card[0-9]*"); + udev_enumerate_scan_devices(e); + + udev_list_entry_foreach(entry, udev_enumerate_get_list_entry(e)) { + struct udev_device *device, *device_parent; + + device = udev_device_new_from_syspath(udev_enumerate_get_udev(e), + udev_list_entry_get_name(entry)); + device_parent = udev_device_get_parent(device); + /* Not need unref device_parent. device_parent and device have same refcnt */ + if (device_parent) { + if (strcmp(udev_device_get_sysname(device_parent), "sprd-drm") == 0) { + drm_device = device; + TBM_BACKEND_DBG("Found render device: '%s' (%s)\n", + udev_device_get_syspath(drm_device), + udev_device_get_sysname(device_parent)); + break; + } + } + udev_device_unref(device); + } + + udev_enumerate_unref(e); + + /* Get device file path. */ + filepath = udev_device_get_devnode(drm_device); + if (!filepath) { + TBM_BACKEND_ERR("udev_device_get_devnode() failed.\n"); + udev_device_unref(drm_device); + udev_unref(udev); + return -1; + } + + udev_device_unref(drm_device); + udev_unref(udev); + + /* Open DRM device file and check validity. */ + fd = open(filepath, O_RDWR | O_CLOEXEC); + if (fd < 0) { + TBM_BACKEND_ERR("open(%s, O_RDWR | O_CLOEXEC) failed.\n"); + return -1; + } + + if (fstat(fd, &s)) { + TBM_BACKEND_ERR("fstat() failed %s.\n"); + close(fd); + return -1; + } +#endif + + return fd; +} + +#ifdef USE_CACHE +static int +_sprd_bo_cache_flush(tbm_sprd_bufmgr *bufmgr_data, tbm_sprd_bo bo_sprd, int flags) +{ + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, 0); + + /* cache flush is managed by kernel side when using dma-fence. */ + if (bufmgr_data->use_dma_fence) + return 1; +// TODO: The tm1 kernel does not support ioctl for cache flush right now. +// The drm in tm1 kernel has to support cache_flush to turn on this feature(TBM_SRPD_CACHE_FLUSH). +#if TBM_SRPD_CACHE_FLUSH + struct drm_sprd_gem_cache_op cache_op = {0, }; + int ret; + + /* if bo_sprd is null, do cache_flush_all */ + if (bo_sprd) { + cache_op.flags = 0; + cache_op.usr_addr = (uint64_t)((uint32_t)bo_sprd->pBase); + cache_op.size = bo_sprd->size; + } else { + flags = TBM_SPRD_CACHE_FLUSH_ALL; + cache_op.flags = 0; + cache_op.usr_addr = 0; + cache_op.size = 0; + } + + if (flags & TBM_SPRD_CACHE_INV) { + if (flags & TBM_SPRD_CACHE_ALL) + cache_op.flags |= SPRD_DRM_CACHE_INV_ALL; + else + cache_op.flags |= SPRD_DRM_CACHE_INV_RANGE; + } + + if (flags & TBM_SPRD_CACHE_CLN) { + if (flags & TBM_SPRD_CACHE_ALL) + cache_op.flags |= SPRD_DRM_CACHE_CLN_ALL; + else + cache_op.flags |= SPRD_DRM_CACHE_CLN_RANGE; + } + + if (flags & TBM_SPRD_CACHE_ALL) + cache_op.flags |= SPRD_DRM_ALL_CACHES_CORES; + + ret = drmCommandWriteRead(bufmgr_data->fd, DRM_SPRD_GEM_CACHE_OP, &cache_op, + sizeof(cache_op)); + if (ret) { + TBM_BACKEND_ERR("error fail to flush the cache.\n"); + return 0; + } +#endif + + return 1; +} +#endif + +static int +_bo_init_cache_state(tbm_sprd_bufmgr *bufmgr_data, tbm_sprd_bo *bo_data, int import) +{ +#ifdef USE_CACHE + TBM_BACKEND_RETURN_VAL_IF_FAIL(bo_data != NULL, 0); + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, 0); + + if (bufmgr_data->use_dma_fence) + return 1; + + _tgl_init(bufmgr_data->tgl_fd, bo_data->name); + + tbm_bo_cache_state cache_state; + + if (import == 0) { + cache_state.data.isDirtied = DEVICE_NONE; + cache_state.data.isCached = 0; + cache_state.data.cntFlush = 0; + + _tgl_set_data(bufmgr_data->tgl_fd, bo_data->name, cache_state.val); + } +#endif + + return 1; +} + +static int +_bo_set_cache_state(tbm_sprd_bufmgr *bufmgr_data, tbm_sprd_bo *bo_data, int device, int opt) +{ +#ifdef USE_CACHE + TBM_BACKEND_RETURN_VAL_IF_FAIL(bo_data != NULL, 0); + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, 0); + + char need_flush = 0; + unsigned short cntFlush = 0; + + if (bufmgr_data->use_dma_fence) + return 1; + + if (bo_data->flags_sprd & SPRD_BO_NONCACHABLE) + return 1; + + /* get cache state of a bo_data */ + bo_data->cache_state.val = _tgl_get_data(bufmgr_data->tgl_fd, bo_data->name, NULL); + + /* get global cache flush count */ + cntFlush = (unsigned short)_tgl_get_data(bufmgr_data->tgl_fd, GLOBAL_KEY, NULL); + + if (opt == HAL_TBM_DEVICE_CPU) { + if (bo_data->cache_state.data.isDirtied == DEVICE_CO && + bo_data->cache_state.data.isCached) + need_flush = TBM_SPRD_CACHE_INV; + + bo_data->cache_state.data.isCached = 1; + if (opt & TBM_OPTION_WRITE) + bo_data->cache_state.data.isDirtied = DEVICE_CA; + else { + if (bo_data->cache_state.data.isDirtied != DEVICE_CA) + bo_data->cache_state.data.isDirtied = DEVICE_NONE; + } + } else { + if (bo_data->cache_state.data.isDirtied == DEVICE_CA && + bo_data->cache_state.data.isCached && + bo_data->cache_state.data.cntFlush == cntFlush) + need_flush = TBM_SPRD_CACHE_CLN | TBM_SPRD_CACHE_ALL; + + if (opt & TBM_OPTION_WRITE) + bo_data->cache_state.data.isDirtied = DEVICE_CO; + else { + if (bo_data->cache_state.data.isDirtied != DEVICE_CO) + bo_data->cache_state.data.isDirtied = DEVICE_NONE; + } + } + + if (need_flush) { + if (need_flush & TBM_SPRD_CACHE_ALL) + _tgl_set_data(bufmgr_data->tgl_fd, GLOBAL_KEY, (unsigned int)(++cntFlush)); + + /* call cache flush */ + _sprd_bo_cache_flush(bufmgr_data, bo_data, need_flush); + + TBM_BACKEND_DBG("\tcache(%d,%d)....flush:0x%x, cntFlush(%d)\n", + bo_data->cache_state.data.isCached, + bo_data->cache_state.data.isDirtied, + need_flush, + cntFlush); + } +#endif + + return 1; +} + +static int +_bo_save_cache_state(tbm_sprd_bufmgr *bufmgr_data, tbm_sprd_bo *bo_data) +{ +#ifdef USE_CACHE + TBM_BACKEND_RETURN_VAL_IF_FAIL(bo_data != NULL, 0); + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, 0); + + if (bufmgr_data->use_dma_fence) + return 1; + + unsigned short cntFlush = 0; + + /* get global cache flush count */ + cntFlush = (unsigned short)_tgl_get_data(bufmgr_data->tgl_fd, GLOBAL_KEY, NULL); + + /* save global cache flush count */ + bo_data->cache_state.data.cntFlush = cntFlush; + _tgl_set_data(bufmgr_data->tgl_fd, bo_data->name, bo_data->cache_state.val); +#endif + + return 1; +} + +static void +_bo_destroy_cache_state(tbm_sprd_bufmgr *bufmgr_data, tbm_sprd_bo *bo_data) +{ +#ifdef USE_CACHE + TBM_BACKEND_RETURN_IF_FAIL(bo_data != NULL); + TBM_BACKEND_RETURN_IF_FAIL(bufmgr_data != NULL); + + if (bufmgr_data->use_dma_fence) + return; + + _tgl_destroy(bufmgr_data->tgl_fd, bo_data->name); +#endif +} + +static int +_bufmgr_init_cache_state(tbm_sprd_bufmgr *bufmgr_data) +{ +#ifdef USE_CACHE + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, 0); + + if (bufmgr_data->use_dma_fence) + return 1; + + /* open tgl fd for saving cache flush data */ + bufmgr_data->tgl_fd = open(tgl_devfile, O_RDWR); + + if (bufmgr_data->tgl_fd < 0) { + bufmgr_data->tgl_fd = open(tgl_devfile1, O_RDWR); + if (bufmgr_data->tgl_fd < 0) { + TBM_BACKEND_ERR("fail to open global_lock:%s\n", + tgl_devfile1); + return 0; + } + } + + if (!_tgl_get_version(bufmgr_data->tgl_fd)) { + TBM_BACKEND_ERR("fail to get tgl_version. tgl init failed.\n"); + close(bufmgr_data->tgl_fd); + return 0; + } + + if (!_tgl_init(bufmgr_data->tgl_fd, GLOBAL_KEY)) { + TBM_BACKEND_ERR("fail to initialize the tgl\n"); + close(bufmgr_data->tgl_fd); + return 0; + } +#endif + + return 1; +} + +static void +_bufmgr_deinit_cache_state(tbm_sprd_bufmgr *bufmgr_data) +{ +#ifdef USE_CACHE + TBM_BACKEND_RETURN_IF_FAIL(bufmgr_data != NULL); + + if (bufmgr_data->use_dma_fence) + return; + + if (bufmgr_data->tgl_fd >= 0) + close(bufmgr_data->tgl_fd); +#endif +} + +#ifndef USE_CONTIG_ONLY +static unsigned int +_get_sprd_flag_from_tbm(unsigned int ftbm) +{ + unsigned int flags = 0; + + /* + * HAL_TBM_BO_DEFAULT => ION_HEAP_ID_MASK_SYSTEM + * HAL_TBM_BO_SCANOUT => ION_HEAP_ID_MASK_MM + * TBM_BO_VENDOR => ION_HEAP_ID_MASK_OVERLAY + * To be updated appropriately once DRM-GEM supports different heap id masks. + * */ + + if (ftbm & HAL_TBM_BO_SCANOUT) + flags = SPRD_BO_CONTIG; + else + flags = SPRD_BO_NONCONTIG | SPRD_BO_DEV_SYSTEM; + + if (ftbm & HAL_TBM_BO_WC) + flags |= SPRD_BO_WC; + else if (ftbm & HAL_TBM_BO_NONCACHABLE) + flags |= SPRD_BO_NONCACHABLE; + + return flags; +} + +static unsigned int +_get_tbm_flag_from_sprd(unsigned int fsprd) +{ + unsigned int flags = 0; + + if (fsprd & SPRD_BO_NONCONTIG) + flags |= HAL_TBM_BO_DEFAULT; + else + flags |= HAL_TBM_BO_SCANOUT; + + if (fsprd & SPRD_BO_WC) + flags |= HAL_TBM_BO_WC; + else if (fsprd & SPRD_BO_CACHABLE) + flags |= HAL_TBM_BO_DEFAULT; + else + flags |= HAL_TBM_BO_NONCACHABLE; + + return flags; +} +#endif + +static unsigned int +_get_name(int fd, unsigned int gem) +{ + struct drm_gem_flink arg = {0,}; + + arg.handle = gem; + if (drmIoctl(fd, DRM_IOCTL_GEM_FLINK, &arg)) { + TBM_BACKEND_ERR("fail to DRM_IOCTL_GEM_FLINK gem:%d", gem); + return 0; + } + + return (unsigned int)arg.name; +} + +static hal_tbm_bo_handle +_sprd_bo_handle(tbm_sprd_bo *bo_data, int device) +{ + hal_tbm_bo_handle bo_handle; + + memset(&bo_handle, 0x0, sizeof(uint64_t)); + + switch (device) { + case HAL_TBM_DEVICE_DEFAULT: + case HAL_TBM_DEVICE_2D: + bo_handle.u32 = (uint32_t)bo_data->gem; + break; + case HAL_TBM_DEVICE_CPU: + if (!bo_data->pBase) { + struct drm_sprd_gem_mmap arg = {0,}; + + arg.handle = bo_data->gem; + arg.size = bo_data->size; + if (drmCommandWriteRead(bo_data->fd, DRM_SPRD_GEM_MMAP, &arg, sizeof(arg))) { + TBM_BACKEND_ERR("error Cannot usrptr gem=%d\n", bo_data->gem); + return (hal_tbm_bo_handle) NULL; + } + bo_data->pBase = (void *)((uint32_t)arg.mapped); + } + + bo_handle.ptr = (void *)bo_data->pBase; + break; + case HAL_TBM_DEVICE_3D: +#ifdef USE_DMAIMPORT + if (!bo_data->dmabuf) { + struct drm_prime_handle arg = {0, }; + arg.handle = bo_data->gem; + if (drmIoctl(bo_data->fd, DRM_IOCTL_PRIME_HANDLE_TO_FD, &arg)) { + TBM_BACKEND_ERR("error Cannot dmabuf=%d\n", bo_data->gem); + return (hal_tbm_bo_handle) NULL; + } + bo_data->dmabuf = arg.fd; + } + + bo_handle.u32 = (uint32_t)bo_data->dmabuf; + +#endif + break; + + case HAL_TBM_DEVICE_MM: +#ifdef USE_HEAP_ID + //TODO : Add ioctl for GSP MAP once available. + TBM_BACKEND_DBG("%s In case HAL_TBM_DEVICE_MM: \n", __FUNCTION_); +#else + if (!bo_data->dmabuf) { + struct drm_prime_handle arg = {0, }; + + arg.handle = bo_data->gem; + if (drmIoctl(bo_data->fd, DRM_IOCTL_PRIME_HANDLE_TO_FD, &arg)) { + TBM_BACKEND_ERR("error Cannot dmabuf=%d\n", bo_data->gem); + return (hal_tbm_bo_handle) NULL; + } + bo_data->dmabuf = arg.fd; + } + + bo_handle.u32 = (uint32_t)bo_data->dmabuf; +#endif + break; + default: + TBM_BACKEND_ERR("Not supported device:%d\n", device); + bo_handle.ptr = (void *) NULL; + break; + } + + return bo_handle; +} + +static hal_tbm_bufmgr_capability +tbm_sprd_bufmgr_get_capabilities(hal_tbm_bufmgr *bufmgr_data, hal_tbm_error *error) +{ + hal_tbm_bufmgr_capability capabilities = HAL_TBM_BUFMGR_CAPABILITY_NONE; + + capabilities = HAL_TBM_BUFMGR_CAPABILITY_SHARE_KEY | HAL_TBM_BUFMGR_CAPABILITY_SHARE_FD; + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return capabilities; +} + +static hal_tbm_error +tbm_sprd_bufmgr_get_supported_formats(hal_tbm_bufmgr *bufmgr, + uint32_t **formats, uint32_t *num) +{ + tbm_sprd_bufmgr *bufmgr_data = (tbm_sprd_bufmgr *)bufmgr; + uint32_t *color_formats; + + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, HAL_TBM_ERROR_INVALID_PARAMETER); + + color_formats = (uint32_t *)calloc(1, sizeof(uint32_t) * TBM_COLOR_FORMAT_COUNT); + if (color_formats == NULL) + return HAL_TBM_ERROR_OUT_OF_MEMORY; + + memcpy(color_formats, tbm_sprd_color_format_list, sizeof(uint32_t)*TBM_COLOR_FORMAT_COUNT); + + *formats = color_formats; + *num = TBM_COLOR_FORMAT_COUNT; + + TBM_BACKEND_DBG("supported format count = %d\n", *num); + + return HAL_TBM_ERROR_NONE; +} + +static hal_tbm_error +tbm_sprd_bufmgr_get_plane_data(hal_tbm_bufmgr *bufmgr, + hal_tbm_format format, int plane_idx, int width, + int height, uint32_t *size, uint32_t *offset, + uint32_t *pitch, int *bo_idx) +{ + tbm_sprd_bufmgr *bufmgr_data = (tbm_sprd_bufmgr *)bufmgr; + int bpp; + int _offset = 0; + int _pitch = 0; + int _size = 0; + int _bo_idx = 0; + int _align_height = 0; + + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, HAL_TBM_ERROR_INVALID_PARAMETER); + + switch (format) { + /* 16 bpp RGB */ + case HAL_TBM_FORMAT_XRGB4444: + case HAL_TBM_FORMAT_XBGR4444: + case HAL_TBM_FORMAT_RGBX4444: + case HAL_TBM_FORMAT_BGRX4444: + case HAL_TBM_FORMAT_ARGB4444: + case HAL_TBM_FORMAT_ABGR4444: + case HAL_TBM_FORMAT_RGBA4444: + case HAL_TBM_FORMAT_BGRA4444: + case HAL_TBM_FORMAT_XRGB1555: + case HAL_TBM_FORMAT_XBGR1555: + case HAL_TBM_FORMAT_RGBX5551: + case HAL_TBM_FORMAT_BGRX5551: + case HAL_TBM_FORMAT_ARGB1555: + case HAL_TBM_FORMAT_ABGR1555: + case HAL_TBM_FORMAT_RGBA5551: + case HAL_TBM_FORMAT_BGRA5551: + case HAL_TBM_FORMAT_RGB565: + bpp = 16; + _offset = 0; + _pitch = SIZE_ALIGN((width * bpp) >> 3, TBM_SURFACE_ALIGNMENT_PITCH_RGB); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + break; + /* 24 bpp RGB */ + case HAL_TBM_FORMAT_RGB888: + case HAL_TBM_FORMAT_BGR888: + bpp = 24; + _offset = 0; + _pitch = SIZE_ALIGN((width * bpp) >> 3, TBM_SURFACE_ALIGNMENT_PITCH_RGB); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + break; + /* 32 bpp RGB */ + case HAL_TBM_FORMAT_XRGB8888: + case HAL_TBM_FORMAT_XBGR8888: + case HAL_TBM_FORMAT_RGBX8888: + case HAL_TBM_FORMAT_BGRX8888: + case HAL_TBM_FORMAT_ARGB8888: + case HAL_TBM_FORMAT_ABGR8888: + case HAL_TBM_FORMAT_RGBA8888: + case HAL_TBM_FORMAT_BGRA8888: + bpp = 32; + _offset = 0; + _pitch = SIZE_ALIGN((width * bpp) >> 3, TBM_SURFACE_ALIGNMENT_PITCH_RGB); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + break; + + /* packed YCbCr */ + case HAL_TBM_FORMAT_YUYV: + case HAL_TBM_FORMAT_YVYU: + case HAL_TBM_FORMAT_UYVY: + case HAL_TBM_FORMAT_VYUY: + case HAL_TBM_FORMAT_AYUV: + bpp = 32; + _offset = 0; + _pitch = SIZE_ALIGN((width * bpp) >> 3, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + break; + + /* + * 2 plane YCbCr + * index 0 = Y plane, [7:0] Y + * index 1 = Cr:Cb plane, [15:0] Cr:Cb little endian + * or + * index 1 = Cb:Cr plane, [15:0] Cb:Cr little endian + */ + case HAL_TBM_FORMAT_NV12: + case HAL_TBM_FORMAT_NV21: + bpp = 12; +// if (plane_idx == 0) + { + _offset = 0; + _pitch = SIZE_ALIGN(width , TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _align_height = SIZE_ALIGN(height, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * _align_height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 0) + break; + } +// else if (plane_idx == 1) + { + _offset = _size; + _pitch = SIZE_ALIGN(width , TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _align_height = SIZE_ALIGN(height / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * _align_height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + } + break; + + case HAL_TBM_FORMAT_NV16: + case HAL_TBM_FORMAT_NV61: + bpp = 16; + //if(plane_idx == 0) + { + _offset = 0; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 0) + break; + } + //else if( plane_idx ==1 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + } + break; + + /* + * 3 plane YCbCr + * index 0: Y plane, [7:0] Y + * index 1: Cb plane, [7:0] Cb + * index 2: Cr plane, [7:0] Cr + * or + * index 1: Cr plane, [7:0] Cr + * index 2: Cb plane, [7:0] Cb + */ + /* + NATIVE_BUFFER_FORMAT_YV12 + NATIVE_BUFFER_FORMAT_I420 + */ + case HAL_TBM_FORMAT_YUV410: + case HAL_TBM_FORMAT_YVU410: + bpp = 9; + break; + case HAL_TBM_FORMAT_YUV411: + case HAL_TBM_FORMAT_YVU411: + case HAL_TBM_FORMAT_YUV420: + case HAL_TBM_FORMAT_YVU420: + bpp = 12; + //if(plane_idx == 0) + { + _offset = 0; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _align_height = SIZE_ALIGN(height, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * _align_height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 0) + break; + } + //else if( plane_idx == 1 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV / 2); + _align_height = SIZE_ALIGN(height / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * _align_height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 1) + break; + } + //else if (plane_idx == 2 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV / 2); + _align_height = SIZE_ALIGN(height / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * _align_height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + } + break; + case HAL_TBM_FORMAT_YUV422: + case HAL_TBM_FORMAT_YVU422: + bpp = 16; + //if(plane_idx == 0) + { + _offset = 0; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 0) + break; + } + //else if( plane_idx == 1 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV / 2); + _size = SIZE_ALIGN(_pitch * (height), TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 1) + break; + } + //else if (plane_idx == 2 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width / 2, TBM_SURFACE_ALIGNMENT_PITCH_YUV / 2); + _size = SIZE_ALIGN(_pitch * (height), TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + } + break; + case HAL_TBM_FORMAT_YUV444: + case HAL_TBM_FORMAT_YVU444: + bpp = 24; + //if(plane_idx == 0) + { + _offset = 0; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 0) + break; + } + //else if( plane_idx == 1 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + if (plane_idx == 1) + break; + } + //else if (plane_idx == 2 ) + { + _offset += _size; + _pitch = SIZE_ALIGN(width, TBM_SURFACE_ALIGNMENT_PITCH_YUV); + _size = SIZE_ALIGN(_pitch * height, TBM_SURFACE_ALIGNMENT_PLANE); + _bo_idx = 0; + } + break; + default: + bpp = 0; + break; + } + + *size = _size; + *offset = _offset; + *pitch = _pitch; + *bo_idx = _bo_idx; + + return HAL_TBM_ERROR_NONE; +} + +static hal_tbm_bo * +tbm_sprd_bufmgr_alloc_bo(hal_tbm_bufmgr *bufmgr, unsigned int size, + hal_tbm_bo_memory_type flags, hal_tbm_error *error) +{ + tbm_sprd_bufmgr *bufmgr_data = (tbm_sprd_bufmgr *)bufmgr; + tbm_sprd_bo *bo_data; + unsigned int sprd_flags; + + if (bufmgr_data == NULL) { + TBM_BACKEND_ERR("bufmgr_data is null\n"); + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return NULL; + } + + bo_data = calloc(1, sizeof(struct _tbm_sprd_bo)); + if (!bo_data) { + TBM_BACKEND_ERR("error fail to allocate the bo_data\n"); + if (error) + *error = HAL_TBM_ERROR_OUT_OF_MEMORY; + return NULL; + } + bo_data->bufmgr_data = bufmgr_data; + +#ifdef USE_CONTIG_ONLY + flags = HAL_TBM_BO_SCANOUT; + sprd_flags = SPRD_BO_CONTIG; +#else + sprd_flags = _get_sprd_flag_from_tbm(flags); + if ((flags & HAL_TBM_BO_SCANOUT) && (size <= 4 * 1024)) + sprd_flags |= SPRD_BO_NONCONTIG; +#endif // USE_CONTIG_ONLY + + struct drm_sprd_gem_create arg = {0, }; + + arg.size = (uint64_t)size; + arg.flags = sprd_flags; + if (drmCommandWriteRead(bufmgr_data->fd, DRM_SPRD_GEM_CREATE, &arg, + sizeof(arg))) { + TBM_BACKEND_ERR("error Cannot create bo_data(flag:%x, size:%d)\n", + arg.flags, (unsigned int)arg.size); + free(bo_data); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + + bo_data->fd = bufmgr_data->fd; + bo_data->gem = arg.handle; + bo_data->size = size; + bo_data->flags_tbm = flags; + bo_data->flags_sprd = sprd_flags; + bo_data->name = _get_name(bo_data->fd, bo_data->gem); + + if (!_bo_init_cache_state(bufmgr_data, bo_data, 0)) { + TBM_BACKEND_ERR("error fail init cache state(%d)\n", bo_data->name); + free(bo_data); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + + pthread_mutex_init(&bo_data->mutex, NULL); + + if (bufmgr_data->use_dma_fence && !bo_data->dmabuf) { + struct drm_prime_handle arg = {0, }; + + arg.handle = bo_data->gem; + if (drmIoctl(bo_data->fd, DRM_IOCTL_PRIME_HANDLE_TO_FD, &arg)) { + TBM_BACKEND_ERR("error Cannot dmabuf=%d\n", bo_data->gem); + free(bo_data); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + bo_data->dmabuf = arg.fd; + } + + /* add bo_data to hash */ + if (drmHashInsert(bufmgr_data->hashBos, bo_data->name, (void *)bo_data) < 0) + TBM_BACKEND_ERR("Cannot insert bo_data to Hash(%d)\n", bo_data->name); + + TBM_BACKEND_DBG("%s size:%d, gem:%d(%d), flags:%d(%d)\n", + __FUNCTION__, bo_data->size, + bo_data->gem, bo_data->name, + flags, sprd_flags); + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return (hal_tbm_bo *)bo_data; +} + +static hal_tbm_bo * +tbm_sprd_bufmgr_import_fd(hal_tbm_bufmgr *bufmgr, hal_tbm_fd key, hal_tbm_error *error) +{ + tbm_sprd_bufmgr *bufmgr_data = (tbm_sprd_bufmgr *)bufmgr; + tbm_sprd_bo *bo_data; + unsigned int gem; + unsigned int name; + int ret; + char buf[STRERR_BUFSIZE]; + + if (bufmgr_data == NULL) { + TBM_BACKEND_ERR("bufmgr_data is null\n"); + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return NULL; + } + + /*getting handle from fd*/ + struct drm_prime_handle arg = {0, }; + + arg.fd = key; + if (drmIoctl(bufmgr_data->fd, DRM_IOCTL_PRIME_FD_TO_HANDLE, &arg)) { + TBM_BACKEND_ERR("Cannot get gem handle from fd:%d (%s)\n", + arg.fd, strerror_r(errno, buf, STRERR_BUFSIZE)); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + gem = arg.handle; + + name = _get_name(bufmgr_data->fd, gem); + if (!name) { + TBM_BACKEND_ERR("Cannot get name from gem:%d, fd:%d (%s)\n", + gem, key, strerror_r(errno, buf, STRERR_BUFSIZE)); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + + ret = drmHashLookup(bufmgr_data->hashBos, name, (void **)&bo_data); + if (ret == 0) { + if (gem == bo_data->gem) { + if (error) + *error = HAL_TBM_ERROR_NONE; + return bo_data; + } + } + + /* Determine size of bo_data. The fd-to-handle ioctl really should + * return the size, but it doesn't. If we have kernel 3.12 or + * later, we can lseek on the prime fd to get the size. Older + * kernels will just fail, in which case we fall back to the + * provided (estimated or guess size). + */ + + unsigned int real_size; + struct drm_sprd_gem_info info = {0, }; + + real_size = lseek(key, 0, SEEK_END); + + info.handle = gem; + if (drmCommandWriteRead(bufmgr_data->fd, + DRM_SPRD_GEM_GET, + &info, + sizeof(struct drm_sprd_gem_info))) { + TBM_BACKEND_ERR("Cannot get gem info from gem:%d, fd:%d (%s)\n", + gem, key, strerror_r(errno, buf, STRERR_BUFSIZE)); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + + if (real_size == -1) + real_size = info.size; + + bo_data = calloc(1, sizeof(struct _tbm_sprd_bo)); + if (!bo_data) { + TBM_BACKEND_ERR("error bo_data:%p fail to allocate the bo_data\n", bo_data); + if (error) + *error = HAL_TBM_ERROR_OUT_OF_MEMORY; + return NULL; + } + bo_data->bufmgr_data = bufmgr_data; + + bo_data->fd = bufmgr_data->fd; + bo_data->gem = gem; + bo_data->size = real_size; + bo_data->flags_sprd = info.flags; + bo_data->flags_tbm = _get_tbm_flag_from_sprd(bo_data->flags_sprd); + bo_data->name = name; + + if (!_bo_init_cache_state(bufmgr_data, bo_data, 1)) { + TBM_BACKEND_ERR("error fail init cache state(%d)\n", bo_data->name); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + goto fail_init_cache; + } + + /* add bo_data to hash */ + if (drmHashInsert(bufmgr_data->hashBos, bo_data->name, (void *)bo_data) < 0) + TBM_BACKEND_ERR("bo_data:%p Cannot insert bo_data to Hash(%d) from gem:%d, fd:%d\n", + bo_data, bo_data->name, gem, key); + + TBM_BACKEND_DBG("bo_data:%p, gem:%d(%d), fd:%d, key_fd:%d, flags:%d(%d), size:%d\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + key, + bo_data->flags_tbm, bo_data->flags_sprd, + bo_data->size); + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return (hal_tbm_bo *)bo_data; + +fail_init_cache: + free(bo_data); + return NULL; +} + +static hal_tbm_bo * +tbm_sprd_bufmgr_import_key(hal_tbm_bufmgr *bufmgr, hal_tbm_key key, hal_tbm_error *error) +{ + tbm_sprd_bufmgr *bufmgr_data = (tbm_sprd_bufmgr *)bufmgr; + tbm_sprd_bo *bo_data; + int ret; + + if (bufmgr_data == NULL) { + TBM_BACKEND_ERR("bufmgr_data is null\n"); + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return NULL; + } + + ret = drmHashLookup(bufmgr_data->hashBos, key, (void **)&bo_data); + if (ret == 0) { + if (error) + *error = HAL_TBM_ERROR_NONE; + return (hal_tbm_bo *)bo_data; + } + + struct drm_gem_open arg = {0, }; + struct drm_sprd_gem_info info = {0, }; + + arg.name = key; + if (drmIoctl(bufmgr_data->fd, DRM_IOCTL_GEM_OPEN, &arg)) { + TBM_BACKEND_ERR("error Cannot open gem name=%d\n", key); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return NULL; + } + + info.handle = arg.handle; + if (drmCommandWriteRead(bufmgr_data->fd, + DRM_SPRD_GEM_GET, + &info, + sizeof(struct drm_sprd_gem_info))) { + TBM_BACKEND_ERR("error Cannot get gem info=%d\n", key); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + goto fail_get_gem; + } + + bo_data = calloc(1, sizeof(struct _tbm_sprd_bo)); + if (!bo_data) { + TBM_BACKEND_ERR("error fail to allocate the bo_data\n"); + if (error) + *error = HAL_TBM_ERROR_OUT_OF_MEMORY; + goto fail_alloc_bo; + } + bo_data->bufmgr_data = bufmgr_data; + + bo_data->fd = bufmgr_data->fd; + bo_data->gem = arg.handle; + bo_data->size = arg.size; + bo_data->flags_sprd = info.flags; + bo_data->name = key; +#ifdef USE_CONTIG_ONLY + bo_data->flags_sprd = SPRD_BO_CONTIG; + bo_data->flags_tbm |= HAL_TBM_BO_SCANOUT; +#else + bo_data->flags_tbm = _get_tbm_flag_from_sprd(bo_data->flags_sprd); +#endif + + if (!_bo_init_cache_state(bufmgr_data, bo_data, 1)) { + TBM_BACKEND_ERR("error fail init cache state(%d)\n", bo_data->name); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + goto fail_init_cache; + } + + if (!bo_data->dmabuf) { + struct drm_prime_handle arg = {0, }; + + arg.handle = bo_data->gem; + if (drmIoctl(bo_data->fd, DRM_IOCTL_PRIME_HANDLE_TO_FD, &arg)) { + TBM_BACKEND_ERR("error Cannot dmabuf=%d\n", bo_data->gem); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + goto fail_prime_handle_to_fd; + } + bo_data->dmabuf = arg.fd; + } + + /* add bo_data to hash */ + if (drmHashInsert(bufmgr_data->hashBos, bo_data->name, (void *)bo_data) < 0) + TBM_BACKEND_ERR("Cannot insert bo_data to Hash(%d)\n", bo_data->name); + + TBM_BACKEND_DBG(" bo_data:%p, gem:%d(%d), fd:%d, flags:%d(%d), size:%d\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + bo_data->flags_tbm, bo_data->flags_sprd, + bo_data->size); + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return (hal_tbm_bo *)bo_data; + +fail_prime_handle_to_fd: + _bo_destroy_cache_state(bufmgr_data, bo_data); +fail_init_cache: + free(bo_data); +fail_alloc_bo: +fail_get_gem: + { + struct drm_gem_close gem_close_arg = {arg.handle, 0}; + drmIoctl(bufmgr_data->fd, DRM_IOCTL_GEM_CLOSE, &gem_close_arg); + } + return NULL; +} + +static void +tbm_sprd_bo_free(hal_tbm_bo *bo) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + tbm_sprd_bo *temp; + tbm_sprd_bufmgr *bufmgr_data; + char buf[STRERR_BUFSIZE]; + int ret; + + if (!bo_data) + return; + + bufmgr_data = bo_data->bufmgr_data; + if (!bufmgr_data) + return; + + TBM_BACKEND_DBG(" bo_data:%p, gem:%d(%d), fd:%d, size:%d\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + bo_data->size); + + if (bo_data->pBase) { + if (munmap(bo_data->pBase, bo_data->size) == -1) { + TBM_BACKEND_ERR("bo_data:%p fail to munmap(%s)\n", + bo_data, strerror_r(errno, buf, STRERR_BUFSIZE)); + } + } + + /* close dmabuf */ + if (bo_data->dmabuf) { + close(bo_data->dmabuf); + bo_data->dmabuf = 0; + } + + /* delete bo from hash */ + ret = drmHashLookup(bufmgr_data->hashBos, bo_data->name, + (void **)&temp); + if (ret == 0) + drmHashDelete(bufmgr_data->hashBos, bo_data->name); + else + TBM_BACKEND_ERR("Cannot find bo_data to Hash(%d), ret=%d\n", bo_data->name, ret); + + if (temp != bo_data) + TBM_BACKEND_ERR("hashBos probably has several BOs with same name!!!\n"); + + _bo_destroy_cache_state(bufmgr_data, bo_data); + + /* Free gem handle */ + struct drm_gem_close arg = {0, }; + + memset(&arg, 0, sizeof(arg)); + arg.handle = bo_data->gem; + if (drmIoctl(bo_data->fd, DRM_IOCTL_GEM_CLOSE, &arg)) + TBM_BACKEND_ERR("bo_data:%p fail to gem close.(%s)\n", + bo_data, strerror_r(errno, buf, STRERR_BUFSIZE)); + free(bo_data); +} + +static int +tbm_sprd_bo_get_size(hal_tbm_bo *bo, hal_tbm_error *error) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + + if (!bo_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return 0; + } + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return bo_data->size; +} + +static hal_tbm_bo_memory_type +tbm_sprd_bo_get_memory_type(hal_tbm_bo *bo, hal_tbm_error *error) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + + if (!bo_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return HAL_TBM_BO_DEFAULT; + } + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return bo_data->flags_tbm; +} + +static hal_tbm_bo_handle +tbm_sprd_bo_get_handle(hal_tbm_bo *bo, hal_tbm_bo_device_type device, hal_tbm_error *error) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + hal_tbm_bo_handle bo_handle; + + if (!bo_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return (hal_tbm_bo_handle) NULL; + } + + if (!bo_data->gem) { + TBM_BACKEND_ERR("Cannot map gem=%d\n", bo_data->gem); + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return (hal_tbm_bo_handle) NULL; + } + + TBM_BACKEND_DBG("bo_data:%p, gem:%d(%d), fd:%d, flags:%d(%d), size:%d, %s\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + bo_data->flags_tbm, bo_data->flags_sprd, + bo_data->size, + STR_DEVICE[device]); + + /*Get mapped bo_handle*/ + bo_handle = _sprd_bo_handle(bo_data, device); + if (bo_handle.ptr == NULL) { + TBM_BACKEND_ERR("Cannot get handle: gem:%d, device:%d\n", + bo_data->gem, device); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return (hal_tbm_bo_handle) NULL; + } + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return bo_handle; +} + +static hal_tbm_bo_handle +tbm_sprd_bo_map(hal_tbm_bo *bo, hal_tbm_bo_device_type device, + hal_tbm_bo_access_option opt, hal_tbm_error *error) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + hal_tbm_bo_handle bo_handle; + tbm_sprd_bufmgr *bufmgr_data; + + if (!bo_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return (hal_tbm_bo_handle) NULL; + } + + bufmgr_data = bo_data->bufmgr_data; + if (!bufmgr_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return (hal_tbm_bo_handle) NULL; + } + + if (!bo_data->gem) { + TBM_BACKEND_ERR("Cannot map gem=%d\n", bo_data->gem); + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return (hal_tbm_bo_handle) NULL; + } + + TBM_BACKEND_DBG(" bo_data:%p, gem:%d(%d), fd:%d, %s, %s\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + STR_DEVICE[device], + STR_OPT[opt]); + + /*Get mapped bo_handle*/ + bo_handle = _sprd_bo_handle(bo_data, device); + if (bo_handle.ptr == NULL) { + TBM_BACKEND_ERR("Cannot get handle: gem:%d, device:%d, opt:%d\n", + bo_data->gem, device, opt); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return (hal_tbm_bo_handle) NULL; + } + + if (bo_data->map_cnt == 0) + _bo_set_cache_state(bufmgr_data, bo_data, device, opt); + + bo_data->map_cnt++; + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return bo_handle; +} + +static hal_tbm_error +tbm_sprd_bo_unmap(hal_tbm_bo *bo) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + tbm_sprd_bufmgr *bufmgr_data; + + if (!bo_data) + return HAL_TBM_ERROR_INVALID_PARAMETER; + + bufmgr_data = bo_data->bufmgr_data; + if (!bufmgr_data) + return HAL_TBM_ERROR_INVALID_PARAMETER; + + if (!bo_data->gem) + return HAL_TBM_ERROR_INVALID_PARAMETER; + + bo_data->map_cnt--; + + if (bo_data->map_cnt == 0) + _bo_save_cache_state(bufmgr_data, bo_data); + + TBM_BACKEND_DBG(" bo_data:%p, gem:%d(%d), fd:%d\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf); + + return HAL_TBM_ERROR_NONE; +} + +static hal_tbm_fd +tbm_sprd_bo_export_fd(hal_tbm_bo *bo, hal_tbm_error *error) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + struct drm_prime_handle arg = {0, }; + int ret; + char buf[STRERR_BUFSIZE]; + + if (!bo_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return -1; + } + + arg.handle = bo_data->gem; + ret = drmIoctl(bo_data->fd, DRM_IOCTL_PRIME_HANDLE_TO_FD, &arg); + if (ret) { + TBM_BACKEND_ERR("bo_data:%p Cannot dmabuf=%d (%s)\n", + bo_data, bo_data->gem, strerror_r(errno, buf, STRERR_BUFSIZE)); + if (error) + *error = HAL_TBM_ERROR_INVALID_OPERATION; + return (hal_tbm_fd) ret; + } + + TBM_BACKEND_DBG("bo_data:%p, gem:%d(%d), fd:%d, key_fd:%d, flags:%d(%d), size:%d\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + arg.fd, + bo_data->flags_tbm, bo_data->flags_sprd, + bo_data->size); + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return (hal_tbm_fd)arg.fd; +} + +static hal_tbm_key +tbm_sprd_bo_export_key(hal_tbm_bo *bo, hal_tbm_error *error) +{ + tbm_sprd_bo *bo_data = (tbm_sprd_bo *)bo; + + if (!bo_data) { + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return 0; + } + + if (!bo_data->name) { + bo_data->name = _get_name(bo_data->fd, bo_data->gem); + if (!bo_data->name) { + TBM_BACKEND_ERR("error Cannot get name\n"); + if (error) + *error = HAL_TBM_ERROR_INVALID_PARAMETER; + return 0; + } + } + + TBM_BACKEND_DBG(" bo_data:%p, gem:%d(%d), fd:%d, flags:%d(%d), size:%d\n", + bo_data, + bo_data->gem, bo_data->name, + bo_data->dmabuf, + bo_data->flags_tbm, bo_data->flags_sprd, + bo_data->size); + + if (error) + *error = HAL_TBM_ERROR_NONE; + + return (hal_tbm_key)bo_data->name; +} + +static hal_tbm_error +_tbm_sprd_authenticated_drm_fd_handler(hal_tbm_fd auth_fd, void *user_data) +{ + tbm_sprd_bufmgr *bufmgr_data = (tbm_sprd_bufmgr *) user_data; + + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, HAL_TBM_ERROR_INVALID_PARAMETER); + + bufmgr_data->fd = auth_fd; + TBM_BACKEND_INFO("Get the authenticated drm_fd(%d)!\n", bufmgr_data->fd); + + return HAL_TBM_ERROR_NONE; +} + +static int +hal_backend_tbm_sprd_exit(void *data) +{ + hal_tbm_backend_data *backend_data = (hal_tbm_backend_data *)data; + tbm_sprd_bufmgr *bufmgr_data; + unsigned long key; + void *value; + + TBM_BACKEND_RETURN_VAL_IF_FAIL(backend_data != NULL, -1); + + bufmgr_data = (tbm_sprd_bufmgr *)backend_data->bufmgr; + TBM_BACKEND_RETURN_VAL_IF_FAIL(bufmgr_data != NULL, -1); + + if (backend_data->bufmgr_funcs) + free(backend_data->bufmgr_funcs); + if (backend_data->bo_funcs) + free(backend_data->bo_funcs); + + if (bufmgr_data->hashBos) { + while (drmHashFirst(bufmgr_data->hashBos, &key, &value) > 0) { + free(value); + drmHashDelete(bufmgr_data->hashBos, key); + } + + drmHashDestroy(bufmgr_data->hashBos); + bufmgr_data->hashBos = NULL; + } + + _bufmgr_deinit_cache_state(bufmgr_data); + + close(bufmgr_data->fd); + + free(backend_data->bufmgr); + free(backend_data); + + return HAL_TBM_ERROR_NONE; +} + +static int +hal_backend_tbm_sprd_init(void **data) +{ + hal_tbm_backend_data *backend_data = NULL; + hal_tbm_bufmgr_funcs *bufmgr_funcs = NULL; + hal_tbm_bo_funcs *bo_funcs = NULL; + tbm_sprd_bufmgr *bufmgr_data = NULL; + int drm_fd = -1; + int fp; + + if (!*data) { + TBM_BACKEND_ERR("*data is null.\n"); + return -1; + } + + /* allocate a hal_tbm_backend_data */ + backend_data = calloc(1, sizeof(struct _hal_tbm_backend_data)); + if (!backend_data) { + TBM_BACKEND_ERR("fail to alloc backend_data!\n"); + *data = NULL; + return -1; + } + *data = backend_data; + + /* allocate a hal_tbm_bufmgr */ + bufmgr_data = calloc(1, sizeof(struct _tbm_sprd_bufmgr)); + if (!bufmgr_data) { + TBM_BACKEND_ERR("fail to alloc bufmgr_data!\n"); + goto fail_alloc_bufmgr_data; + } + backend_data->bufmgr = (hal_tbm_bufmgr *)bufmgr_data; + + // open drm_fd + drm_fd = _tbm_sprd_open_drm(); + if (drm_fd < 0) { + TBM_BACKEND_ERR("fail to open drm!\n"); + goto fail_open_drm; + } + + // set true when backend has a drm_device. + backend_data->has_drm_device = 1; + + // check if drm_fd is master_drm_fd. + if (drmIsMaster(drm_fd)) { + // drm_fd is a master_drm_fd. + backend_data->drm_info.drm_fd = drm_fd; + backend_data->drm_info.is_master = 1; + + bufmgr_data->fd = drm_fd; + TBM_BACKEND_INFO("Get the master drm_fd(%d)!\n", bufmgr_data->fd); + } else { + // drm_fd is not a master_drm_fd. + // request authenticated fd + close(drm_fd); + backend_data->drm_info.drm_fd = -1; + backend_data->drm_info.is_master = 0; + backend_data->drm_info.auth_drm_fd_func = _tbm_sprd_authenticated_drm_fd_handler; + backend_data->drm_info.user_data = bufmgr_data; + + TBM_BACKEND_INFO("A backend requests an authenticated drm_fd.\n"); + } + + //Check if the tbm manager supports dma fence or not. + fp = open("/sys/module/dmabuf_sync/parameters/enabled", O_RDONLY); + if (fp != -1) { + char buf[1]; + int length = read(fp, buf, 1); + + if (length == 1 && buf[0] == '1') + bufmgr_data->use_dma_fence = 1; + + close(fp); + } + + TBM_BACKEND_DBG("DMABUF FENCE is %s\n", + bufmgr_data->use_dma_fence ? "supported!" : "NOT supported!"); + + if (!_bufmgr_init_cache_state(bufmgr_data)) { + TBM_BACKEND_ERR("fail to init bufmgr cache state\n"); + goto fail_init_cache_state; + } + + /*Create Hash Table*/ + bufmgr_data->hashBos = drmHashCreate(); + + /* alloc and register bufmgr_funcs */ + bufmgr_funcs = calloc(1, sizeof(struct _hal_tbm_bufmgr_funcs)); + if (!bufmgr_funcs) { + TBM_BACKEND_ERR("fail to alloc bufmgr_funcs!\n"); + goto fail_alloc_bufmgr_funcs; + } + backend_data->bufmgr_funcs = bufmgr_funcs; + + bufmgr_funcs->bufmgr_get_capabilities = tbm_sprd_bufmgr_get_capabilities; + bufmgr_funcs->bufmgr_get_supported_formats = tbm_sprd_bufmgr_get_supported_formats; + bufmgr_funcs->bufmgr_get_plane_data = tbm_sprd_bufmgr_get_plane_data; + bufmgr_funcs->bufmgr_alloc_bo = tbm_sprd_bufmgr_alloc_bo; + bufmgr_funcs->bufmgr_alloc_bo_with_format = NULL; + bufmgr_funcs->bufmgr_import_fd = tbm_sprd_bufmgr_import_fd; + bufmgr_funcs->bufmgr_import_key = tbm_sprd_bufmgr_import_key; + bufmgr_funcs->bufmgr_alloc_bo_with_tiled_format = NULL; + + /* alloc and register bo_funcs */ + bo_funcs = calloc(1, sizeof(struct _hal_tbm_bo_funcs)); + if (!bo_funcs) { + TBM_BACKEND_ERR("fail to alloc bo_funcs!\n"); + goto fail_alloc_bo_funcs; + } + backend_data->bo_funcs = bo_funcs; + + bo_funcs->bo_free = tbm_sprd_bo_free; + bo_funcs->bo_get_size = tbm_sprd_bo_get_size; + bo_funcs->bo_get_memory_types = tbm_sprd_bo_get_memory_type; + bo_funcs->bo_get_handle = tbm_sprd_bo_get_handle; + bo_funcs->bo_map = tbm_sprd_bo_map; + bo_funcs->bo_unmap = tbm_sprd_bo_unmap; + bo_funcs->bo_lock = NULL;; + bo_funcs->bo_unlock = NULL; + bo_funcs->bo_export_fd = tbm_sprd_bo_export_fd; + bo_funcs->bo_export_key = tbm_sprd_bo_export_key; + + return HAL_TBM_ERROR_NONE; + +fail_alloc_bo_funcs: + free(bufmgr_funcs); +fail_alloc_bufmgr_funcs: + _bufmgr_deinit_cache_state(bufmgr_data); + if (bufmgr_data->hashBos) + drmHashDestroy(bufmgr_data->hashBos); +fail_init_cache_state: + close(bufmgr_data->fd); +fail_open_drm: + free(bufmgr_data); +fail_alloc_bufmgr_data: + free(backend_data); + + *data = NULL; + + return -1; +} + +hal_backend hal_backend_tbm_data = { + "sprd", + "Samsung", + HAL_ABI_VERSION_TIZEN_6_5, + hal_backend_tbm_sprd_init, + hal_backend_tbm_sprd_exit +}; diff --git a/src/libhal-backend-tbm-sprd/tbm_bufmgr_tgl.h b/src/libhal-backend-tbm-sprd/tbm_bufmgr_tgl.h new file mode 100644 index 0000000..cae2c04 --- /dev/null +++ b/src/libhal-backend-tbm-sprd/tbm_bufmgr_tgl.h @@ -0,0 +1,126 @@ +/************************************************************************** + * + * libtbm + * + * Copyright 2012 Samsung Electronics co., Ltd. All Rights Reserved. + * + * Contact: SooChan Lim , Sangjin Lee + * Boram Park , Changyeon Lee + * + * Permission is hereby granted, free of charge, to any person obtaining a + * copy of this software and associated documentation files (the + * "Software"), to deal in the Software without restriction, including + * without limitation the rights to use, copy, modify, merge, publish, + * distribute, sub license, and/or sell copies of the Software, and to + * permit persons to whom the Software is furnished to do so, subject to + * the following conditions: + * + * The above copyright notice and this permission notice (including the + * next paragraph) shall be included in all copies or substantial portions + * of the Software. + * + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS + * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF + * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. + * IN NO EVENT SHALL PRECISION INSIGHT AND/OR ITS SUPPLIERS BE LIABLE FOR + * ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, + * TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE + * SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. + * + * **************************************************************************/ + +#ifndef __TBM_BUFMGR_TGL_H__ +#define __TBM_BUFMGR_TGL_H__ + +#include + +static char tgl_devfile[] = "/dev/slp_global_lock"; +static char tgl_devfile1[] = "/dev/tgl"; + +#define TGL_IOCTL_BASE 0x32 +#define TGL_IO(nr) _IO(TGL_IOCTL_BASE, nr) +#define TGL_IOR(nr, type) _IOR(TGL_IOCTL_BASE, nr, type) +#define TGL_IOW(nr, type) _IOW(TGL_IOCTL_BASE, nr, type) +#define TGL_IOWR(nr, type) _IOWR(TGL_IOCTL_BASE, nr, type) + +/** + * struct tgl_ver_data - tgl version data structure + * @major: major version + * @minor: minor version + */ +struct tgl_ver_data { + unsigned int major; + unsigned int minor; +}; + +/** + * struct tgl_reg_data - tgl data structure + * @key: lookup key + * @timeout_ms: timeout value for waiting event + */ +struct tgl_reg_data { + unsigned int key; + unsigned int timeout_ms; +}; + +enum tgl_type_data { + TGL_TYPE_NONE = 0, + TGL_TYPE_READ = (1 << 0), + TGL_TYPE_WRITE = (1 << 1), +}; + +/** + * struct tgl_lock_data - tgl lock data structure + * @key: lookup key + * @type: lock type that is in tgl_type_data + */ +struct tgl_lock_data { + unsigned int key; + enum tgl_type_data type; +}; + +enum tgl_status_data { + TGL_STATUS_UNLOCKED, + TGL_STATUS_LOCKED, +}; + +/** + * struct tgl_usr_data - tgl user data structure + * @key: lookup key + * @data1: user data 1 + * @data2: user data 2 + * @status: lock status that is in tgl_status_data + */ +struct tgl_usr_data { + unsigned int key; + unsigned int data1; + unsigned int data2; + enum tgl_status_data status; +}; + +enum { + _TGL_GET_VERSION, + _TGL_REGISTER, + _TGL_UNREGISTER, + _TGL_LOCK, + _TGL_UNLOCK, + _TGL_SET_DATA, + _TGL_GET_DATA, +}; + +/* get version information */ +#define TGL_IOCTL_GET_VERSION TGL_IOR(_TGL_GET_VERSION, struct tgl_ver_data) +/* register key */ +#define TGL_IOCTL_REGISTER TGL_IOW(_TGL_REGISTER, struct tgl_reg_data) +/* unregister key */ +#define TGL_IOCTL_UNREGISTER TGL_IOW(_TGL_UNREGISTER, struct tgl_reg_data) +/* lock with key */ +#define TGL_IOCTL_LOCK TGL_IOW(_TGL_LOCK, struct tgl_lock_data) +/* unlock with key */ +#define TGL_IOCTL_UNLOCK TGL_IOW(_TGL_UNLOCK, struct tgl_lock_data) +/* set user data with key */ +#define TGL_IOCTL_SET_DATA TGL_IOW(_TGL_SET_DATA, struct tgl_usr_data) +/* get user data with key */ +#define TGL_IOCTL_GET_DATA TGL_IOR(_TGL_GET_DATA, struct tgl_usr_data) + +#endif /* __TBM_BUFMGR_TGL_H__ */ -- 2.7.4