drm/xen-front: Add support for Xen PV display frontend

Add support for Xen para-virtualized frontend display driver.
Accompanying backend [1] is implemented as a user-space application
and its helper library [2], capable of running as a Weston client
or DRM master.
Configuration of both backend and frontend is done via
Xen guest domain configuration options [3].

Driver limitations:
 1. Only primary plane without additional properties is supported.
 2. Only one video mode supported which resolution is configured
    via XenStore.
 3. All CRTCs operate at fixed frequency of 60Hz.

1. Implement Xen bus state machine for the frontend driver according to
the state diagram and recovery flow from display para-virtualized
protocol: xen/interface/io/displif.h.

2. Read configuration values from Xen store according
to xen/interface/io/displif.h protocol:
  - read connector(s) configuration
  - read buffer allocation mode (backend/frontend)

3. Handle Xen event channels:
  - create for all configured connectors and publish
    corresponding ring references and event channels in Xen store,
    so backend can connect
  - implement event channels interrupt handlers
  - create and destroy event channels with respect to Xen bus state

4. Implement shared buffer handling according to the
para-virtualized display device protocol at xen/interface/io/displif.h:
  - handle page directories according to displif protocol:
    - allocate and share page directories
    - grant references to the required set of pages for the
      page directory
  - allocate xen balllooned pages via Xen balloon driver
    with alloc_xenballooned_pages/free_xenballooned_pages
  - grant references to the required set of pages for the
    shared buffer itself
  - implement pages map/unmap for the buffers allocated by the
    backend (gnttab_map_refs/gnttab_unmap_refs)

5. Implement kernel modesetiing/connector handling using
DRM simple KMS helper pipeline:

- implement KMS part of the driver with the help of DRM
  simple pipepline helper which is possible due to the fact
  that the para-virtualized driver only supports a single
  (primary) plane:
  - initialize connectors according to XenStore configuration
  - handle frame done events from the backend
  - create and destroy frame buffers and propagate those
    to the backend
  - propagate set/reset mode configuration to the backend on display
    enable/disable callbacks
  - send page flip request to the backend and implement logic for
    reporting backend IO errors on prepare fb callback

- implement virtual connector handling:
  - support only pixel formats suitable for single plane modes
  - make sure the connector is always connected
  - support a single video mode as per para-virtualized driver
    configuration

6. Implement GEM handling depending on driver mode of operation:
depending on the requirements for the para-virtualized environment,
namely requirements dictated by the accompanying DRM/(v)GPU drivers
running in both host and guest environments, number of operating
modes of para-virtualized display driver are supported:
 - display buffers can be allocated by either
   frontend driver or backend
 - display buffers can be allocated to be contiguous
   in memory or not

Note! Frontend driver itself has no dependency on contiguous memory for
its operation.

6.1. Buffers allocated by the frontend driver.

The below modes of operation are configured at compile-time via
frontend driver's kernel configuration.

6.1.1. Front driver configured to use GEM CMA helpers
     This use-case is useful when used with accompanying DRM/vGPU driver
     in guest domain which was designed to only work with contiguous
     buffers, e.g. DRM driver based on GEM CMA helpers: such drivers can
     only import contiguous PRIME buffers, thus requiring frontend driver
     to provide such. In order to implement this mode of operation
     para-virtualized frontend driver can be configured to use
     GEM CMA helpers.

6.1.2. Front driver doesn't use GEM CMA
     If accompanying drivers can cope with non-contiguous memory then, to
     lower pressure on CMA subsystem of the kernel, driver can allocate
     buffers from system memory.

Note! If used with accompanying DRM/(v)GPU drivers this mode of operation
may require IOMMU support on the platform, so accompanying DRM/vGPU
hardware can still reach display buffer memory while importing PRIME
buffers from the frontend driver.

6.2. Buffers allocated by the backend

This mode of operation is run-time configured via guest domain
configuration through XenStore entries.

For systems which do not provide IOMMU support, but having specific
requirements for display buffers it is possible to allocate such buffers
at backend side and share those with the frontend.
For example, if host domain is 1:1 mapped and has DRM/GPU hardware
expecting physically contiguous memory, this allows implementing
zero-copying use-cases.

Note, while using this scenario the following should be considered:
  a) If guest domain dies then pages/grants received from the backend
     cannot be claimed back
  b) Misbehaving guest may send too many requests to the
     backend exhausting its grant references and memory
     (consider this from security POV).

Note! Configuration options 1.1 (contiguous display buffers) and 2
(backend allocated buffers) are not supported at the same time.

7. Handle communication with the backend:
 - send requests and wait for the responses according
   to the displif protocol
 - serialize access to the communication channel
 - time-out used for backend communication is set to 3000 ms
 - manage display buffers shared with the backend

[1] https://github.com/xen-troops/displ_be
[2] https://github.com/xen-troops/libxenbe
[3] https://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=docs/man/xl.cfg.pod.5.in;h=a699367779e2ae1212ff8f638eff0206ec1a1cc9;hb=refs/heads/master#l1257Signed-off-by: default avatarOleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
Reviewed-by: default avatarBoris Ostrovsky <boris.ostrovsky@oracle.com>
Reviewed-by: default avatarDaniel Vetter <daniel.vetter@ffwll.ch>
Link: https://patchwork.freedesktop.org/patch/msgid/20180403112317.28751-2-andr2000@gmail.com
parent 487da617
......@@ -12,6 +12,7 @@ GPU Driver Documentation
tve200
vc4
bridge/dw-hdmi
xen-front
.. only:: subproject and html
......
====================================================
drm/xen-front Xen para-virtualized frontend driver
====================================================
This frontend driver implements Xen para-virtualized display
according to the display protocol described at
include/xen/interface/io/displif.h
Driver modes of operation in terms of display buffers used
==========================================================
.. kernel-doc:: drivers/gpu/drm/xen/xen_drm_front.h
:doc: Driver modes of operation in terms of display buffers used
Buffers allocated by the frontend driver
----------------------------------------
.. kernel-doc:: drivers/gpu/drm/xen/xen_drm_front.h
:doc: Buffers allocated by the frontend driver
With GEM CMA helpers
~~~~~~~~~~~~~~~~~~~~
.. kernel-doc:: drivers/gpu/drm/xen/xen_drm_front.h
:doc: With GEM CMA helpers
Without GEM CMA helpers
~~~~~~~~~~~~~~~~~~~~~~~
.. kernel-doc:: drivers/gpu/drm/xen/xen_drm_front.h
:doc: Without GEM CMA helpers
Buffers allocated by the backend
--------------------------------
.. kernel-doc:: drivers/gpu/drm/xen/xen_drm_front.h
:doc: Buffers allocated by the backend
Driver limitations
==================
.. kernel-doc:: drivers/gpu/drm/xen/xen_drm_front.h
:doc: Driver limitations
......@@ -289,6 +289,8 @@ source "drivers/gpu/drm/pl111/Kconfig"
source "drivers/gpu/drm/tve200/Kconfig"
source "drivers/gpu/drm/xen/Kconfig"
# Keep legacy drivers last
menuconfig DRM_LEGACY
......
......@@ -103,3 +103,4 @@ obj-$(CONFIG_DRM_MXSFB) += mxsfb/
obj-$(CONFIG_DRM_TINYDRM) += tinydrm/
obj-$(CONFIG_DRM_PL111) += pl111/
obj-$(CONFIG_DRM_TVE200) += tve200/
obj-$(CONFIG_DRM_XEN) += xen/
config DRM_XEN
bool "DRM Support for Xen guest OS"
depends on XEN
help
Choose this option if you want to enable DRM support
for Xen.
config DRM_XEN_FRONTEND
tristate "Para-virtualized frontend driver for Xen guest OS"
depends on DRM_XEN
depends on DRM
select DRM_KMS_HELPER
select VIDEOMODE_HELPERS
select XEN_XENBUS_FRONTEND
help
Choose this option if you want to enable a para-virtualized
frontend DRM/KMS driver for Xen guest OSes.
config DRM_XEN_FRONTEND_CMA
bool "Use DRM CMA to allocate dumb buffers"
depends on DRM_XEN_FRONTEND
select DRM_KMS_CMA_HELPER
select DRM_GEM_CMA_HELPER
help
Use DRM CMA helpers to allocate display buffers.
This is useful for the use-cases when guest driver needs to
share or export buffers to other drivers which only expect
contiguous buffers.
Note: in this mode driver cannot use buffers allocated
by the backend.
# SPDX-License-Identifier: GPL-2.0 OR MIT
drm_xen_front-objs := xen_drm_front.o \
xen_drm_front_kms.o \
xen_drm_front_conn.o \
xen_drm_front_evtchnl.o \
xen_drm_front_shbuf.o \
xen_drm_front_cfg.o
ifeq ($(CONFIG_DRM_XEN_FRONTEND_CMA),y)
drm_xen_front-objs += xen_drm_front_gem_cma.o
else
drm_xen_front-objs += xen_drm_front_gem.o
endif
obj-$(CONFIG_DRM_XEN_FRONTEND) += drm_xen_front.o
This diff is collapsed.
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_H_
#define __XEN_DRM_FRONT_H_
#include <drm/drmP.h>
#include <drm/drm_simple_kms_helper.h>
#include <linux/scatterlist.h>
#include "xen_drm_front_cfg.h"
/**
* DOC: Driver modes of operation in terms of display buffers used
*
* Depending on the requirements for the para-virtualized environment, namely
* requirements dictated by the accompanying DRM/(v)GPU drivers running in both
* host and guest environments, number of operating modes of para-virtualized
* display driver are supported:
*
* - display buffers can be allocated by either frontend driver or backend
* - display buffers can be allocated to be contiguous in memory or not
*
* Note! Frontend driver itself has no dependency on contiguous memory for
* its operation.
*/
/**
* DOC: Buffers allocated by the frontend driver
*
* The below modes of operation are configured at compile-time via
* frontend driver's kernel configuration:
*/
/**
* DOC: With GEM CMA helpers
*
* This use-case is useful when used with accompanying DRM/vGPU driver in
* guest domain which was designed to only work with contiguous buffers,
* e.g. DRM driver based on GEM CMA helpers: such drivers can only import
* contiguous PRIME buffers, thus requiring frontend driver to provide
* such. In order to implement this mode of operation para-virtualized
* frontend driver can be configured to use GEM CMA helpers.
*/
/**
* DOC: Without GEM CMA helpers
*
* If accompanying drivers can cope with non-contiguous memory then, to
* lower pressure on CMA subsystem of the kernel, driver can allocate
* buffers from system memory.
*
* Note! If used with accompanying DRM/(v)GPU drivers this mode of operation
* may require IOMMU support on the platform, so accompanying DRM/vGPU
* hardware can still reach display buffer memory while importing PRIME
* buffers from the frontend driver.
*/
/**
* DOC: Buffers allocated by the backend
*
* This mode of operation is run-time configured via guest domain configuration
* through XenStore entries.
*
* For systems which do not provide IOMMU support, but having specific
* requirements for display buffers it is possible to allocate such buffers
* at backend side and share those with the frontend.
* For example, if host domain is 1:1 mapped and has DRM/GPU hardware expecting
* physically contiguous memory, this allows implementing zero-copying
* use-cases.
*
* Note, while using this scenario the following should be considered:
*
* #. If guest domain dies then pages/grants received from the backend
* cannot be claimed back
*
* #. Misbehaving guest may send too many requests to the
* backend exhausting its grant references and memory
* (consider this from security POV)
*/
/**
* DOC: Driver limitations
*
* #. Only primary plane without additional properties is supported.
*
* #. Only one video mode per connector supported which is configured
* via XenStore.
*
* #. All CRTCs operate at fixed frequency of 60Hz.
*/
/* timeout in ms to wait for backend to respond */
#define XEN_DRM_FRONT_WAIT_BACK_MS 3000
#ifndef GRANT_INVALID_REF
/*
* Note on usage of grant reference 0 as invalid grant reference:
* grant reference 0 is valid, but never exposed to a PV driver,
* because of the fact it is already in use/reserved by the PV console.
*/
#define GRANT_INVALID_REF 0
#endif
struct xen_drm_front_info {
struct xenbus_device *xb_dev;
struct xen_drm_front_drm_info *drm_info;
/* to protect data between backend IO code and interrupt handler */
spinlock_t io_lock;
int num_evt_pairs;
struct xen_drm_front_evtchnl_pair *evt_pairs;
struct xen_drm_front_cfg cfg;
/* display buffers */
struct list_head dbuf_list;
};
struct xen_drm_front_drm_pipeline {
struct xen_drm_front_drm_info *drm_info;
int index;
struct drm_simple_display_pipe pipe;
struct drm_connector conn;
/* These are only for connector mode checking */
int width, height;
struct drm_pending_vblank_event *pending_event;
struct delayed_work pflip_to_worker;
bool conn_connected;
};
struct xen_drm_front_drm_info {
struct xen_drm_front_info *front_info;
struct drm_device *drm_dev;
struct xen_drm_front_drm_pipeline pipeline[XEN_DRM_FRONT_MAX_CRTCS];
};
static inline u64 xen_drm_front_fb_to_cookie(struct drm_framebuffer *fb)
{
return (u64)fb;
}
static inline u64 xen_drm_front_dbuf_to_cookie(struct drm_gem_object *gem_obj)
{
return (u64)gem_obj;
}
int xen_drm_front_mode_set(struct xen_drm_front_drm_pipeline *pipeline,
u32 x, u32 y, u32 width, u32 height,
u32 bpp, u64 fb_cookie);
int xen_drm_front_dbuf_create_from_sgt(struct xen_drm_front_info *front_info,
u64 dbuf_cookie, u32 width, u32 height,
u32 bpp, u64 size, struct sg_table *sgt);
int xen_drm_front_dbuf_create_from_pages(struct xen_drm_front_info *front_info,
u64 dbuf_cookie, u32 width, u32 height,
u32 bpp, u64 size, struct page **pages);
int xen_drm_front_fb_attach(struct xen_drm_front_info *front_info,
u64 dbuf_cookie, u64 fb_cookie, u32 width,
u32 height, u32 pixel_format);
int xen_drm_front_fb_detach(struct xen_drm_front_info *front_info,
u64 fb_cookie);
int xen_drm_front_page_flip(struct xen_drm_front_info *front_info,
int conn_idx, u64 fb_cookie);
void xen_drm_front_on_frame_done(struct xen_drm_front_info *front_info,
int conn_idx, u64 fb_cookie);
#endif /* __XEN_DRM_FRONT_H_ */
// SPDX-License-Identifier: GPL-2.0 OR MIT
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#include <drm/drmP.h>
#include <linux/device.h>
#include <xen/interface/io/displif.h>
#include <xen/xenbus.h>
#include "xen_drm_front.h"
#include "xen_drm_front_cfg.h"
static int cfg_connector(struct xen_drm_front_info *front_info,
struct xen_drm_front_cfg_connector *connector,
const char *path, int index)
{
char *connector_path;
connector_path = devm_kasprintf(&front_info->xb_dev->dev,
GFP_KERNEL, "%s/%d", path, index);
if (!connector_path)
return -ENOMEM;
if (xenbus_scanf(XBT_NIL, connector_path, XENDISPL_FIELD_RESOLUTION,
"%d" XENDISPL_RESOLUTION_SEPARATOR "%d",
&connector->width, &connector->height) < 0) {
/* either no entry configured or wrong resolution set */
connector->width = 0;
connector->height = 0;
return -EINVAL;
}
connector->xenstore_path = connector_path;
DRM_INFO("Connector %s: resolution %dx%d\n",
connector_path, connector->width, connector->height);
return 0;
}
int xen_drm_front_cfg_card(struct xen_drm_front_info *front_info,
struct xen_drm_front_cfg *cfg)
{
struct xenbus_device *xb_dev = front_info->xb_dev;
int ret, i;
if (xenbus_read_unsigned(front_info->xb_dev->nodename,
XENDISPL_FIELD_BE_ALLOC, 0)) {
DRM_INFO("Backend can provide display buffers\n");
cfg->be_alloc = true;
}
cfg->num_connectors = 0;
for (i = 0; i < ARRAY_SIZE(cfg->connectors); i++) {
ret = cfg_connector(front_info, &cfg->connectors[i],
xb_dev->nodename, i);
if (ret < 0)
break;
cfg->num_connectors++;
}
if (!cfg->num_connectors) {
DRM_ERROR("No connector(s) configured at %s\n",
xb_dev->nodename);
return -ENODEV;
}
return 0;
}
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_CFG_H_
#define __XEN_DRM_FRONT_CFG_H_
#include <linux/types.h>
#define XEN_DRM_FRONT_MAX_CRTCS 4
struct xen_drm_front_cfg_connector {
int width;
int height;
char *xenstore_path;
};
struct xen_drm_front_cfg {
struct xen_drm_front_info *front_info;
/* number of connectors in this configuration */
int num_connectors;
/* connector configurations */
struct xen_drm_front_cfg_connector connectors[XEN_DRM_FRONT_MAX_CRTCS];
/* set if dumb buffers are allocated externally on backend side */
bool be_alloc;
};
int xen_drm_front_cfg_card(struct xen_drm_front_info *front_info,
struct xen_drm_front_cfg *cfg);
#endif /* __XEN_DRM_FRONT_CFG_H_ */
// SPDX-License-Identifier: GPL-2.0 OR MIT
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#include <drm/drm_atomic_helper.h>
#include <drm/drm_crtc_helper.h>
#include <video/videomode.h>
#include "xen_drm_front.h"
#include "xen_drm_front_conn.h"
#include "xen_drm_front_kms.h"
static struct xen_drm_front_drm_pipeline *
to_xen_drm_pipeline(struct drm_connector *connector)
{
return container_of(connector, struct xen_drm_front_drm_pipeline, conn);
}
static const u32 plane_formats[] = {
DRM_FORMAT_RGB565,
DRM_FORMAT_RGB888,
DRM_FORMAT_XRGB8888,
DRM_FORMAT_ARGB8888,
DRM_FORMAT_XRGB4444,
DRM_FORMAT_ARGB4444,
DRM_FORMAT_XRGB1555,
DRM_FORMAT_ARGB1555,
};
const u32 *xen_drm_front_conn_get_formats(int *format_count)
{
*format_count = ARRAY_SIZE(plane_formats);
return plane_formats;
}
static int connector_detect(struct drm_connector *connector,
struct drm_modeset_acquire_ctx *ctx,
bool force)
{
struct xen_drm_front_drm_pipeline *pipeline =
to_xen_drm_pipeline(connector);
if (drm_dev_is_unplugged(connector->dev))
pipeline->conn_connected = false;
return pipeline->conn_connected ? connector_status_connected :
connector_status_disconnected;
}
#define XEN_DRM_CRTC_VREFRESH_HZ 60
static int connector_get_modes(struct drm_connector *connector)
{
struct xen_drm_front_drm_pipeline *pipeline =
to_xen_drm_pipeline(connector);
struct drm_display_mode *mode;
struct videomode videomode;
int width, height;
mode = drm_mode_create(connector->dev);
if (!mode)
return 0;
memset(&videomode, 0, sizeof(videomode));
videomode.hactive = pipeline->width;
videomode.vactive = pipeline->height;
width = videomode.hactive + videomode.hfront_porch +
videomode.hback_porch + videomode.hsync_len;
height = videomode.vactive + videomode.vfront_porch +
videomode.vback_porch + videomode.vsync_len;
videomode.pixelclock = width * height * XEN_DRM_CRTC_VREFRESH_HZ;
mode->type = DRM_MODE_TYPE_PREFERRED | DRM_MODE_TYPE_DRIVER;
drm_display_mode_from_videomode(&videomode, mode);
drm_mode_probed_add(connector, mode);
return 1;
}
static const struct drm_connector_helper_funcs connector_helper_funcs = {
.get_modes = connector_get_modes,
.detect_ctx = connector_detect,
};
static const struct drm_connector_funcs connector_funcs = {
.dpms = drm_helper_connector_dpms,
.fill_modes = drm_helper_probe_single_connector_modes,
.destroy = drm_connector_cleanup,
.reset = drm_atomic_helper_connector_reset,
.atomic_duplicate_state = drm_atomic_helper_connector_duplicate_state,
.atomic_destroy_state = drm_atomic_helper_connector_destroy_state,
};
int xen_drm_front_conn_init(struct xen_drm_front_drm_info *drm_info,
struct drm_connector *connector)
{
struct xen_drm_front_drm_pipeline *pipeline =
to_xen_drm_pipeline(connector);
drm_connector_helper_add(connector, &connector_helper_funcs);
pipeline->conn_connected = true;
connector->polled = DRM_CONNECTOR_POLL_CONNECT |
DRM_CONNECTOR_POLL_DISCONNECT;
return drm_connector_init(drm_info->drm_dev, connector,
&connector_funcs, DRM_MODE_CONNECTOR_VIRTUAL);
}
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_CONN_H_
#define __XEN_DRM_FRONT_CONN_H_
#include <drm/drmP.h>
#include <drm/drm_crtc.h>
#include <drm/drm_encoder.h>
#include <linux/wait.h>
struct xen_drm_front_drm_info;
int xen_drm_front_conn_init(struct xen_drm_front_drm_info *drm_info,
struct drm_connector *connector);
const u32 *xen_drm_front_conn_get_formats(int *format_count);
#endif /* __XEN_DRM_FRONT_CONN_H_ */
// SPDX-License-Identifier: GPL-2.0 OR MIT
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#include <drm/drmP.h>
#include <linux/errno.h>
#include <linux/irq.h>
#include <xen/xenbus.h>
#include <xen/events.h>
#include <xen/grant_table.h>
#include "xen_drm_front.h"
#include "xen_drm_front_evtchnl.h"
static irqreturn_t evtchnl_interrupt_ctrl(int irq, void *dev_id)
{
struct xen_drm_front_evtchnl *evtchnl = dev_id;
struct xen_drm_front_info *front_info = evtchnl->front_info;
struct xendispl_resp *resp;
RING_IDX i, rp;
unsigned long flags;
if (unlikely(evtchnl->state != EVTCHNL_STATE_CONNECTED))
return IRQ_HANDLED;
spin_lock_irqsave(&front_info->io_lock, flags);
again:
rp = evtchnl->u.req.ring.sring->rsp_prod;
/* ensure we see queued responses up to rp */
virt_rmb();
for (i = evtchnl->u.req.ring.rsp_cons; i != rp; i++) {
resp = RING_GET_RESPONSE(&evtchnl->u.req.ring, i);
if (unlikely(resp->id != evtchnl->evt_id))
continue;
switch (resp->operation) {
case XENDISPL_OP_PG_FLIP:
case XENDISPL_OP_FB_ATTACH:
case XENDISPL_OP_FB_DETACH:
case XENDISPL_OP_DBUF_CREATE:
case XENDISPL_OP_DBUF_DESTROY:
case XENDISPL_OP_SET_CONFIG:
evtchnl->u.req.resp_status = resp->status;
complete(&evtchnl->u.req.completion);
break;
default:
DRM_ERROR("Operation %d is not supported\n",
resp->operation);
break;
}
}
evtchnl->u.req.ring.rsp_cons = i;
if (i != evtchnl->u.req.ring.req_prod_pvt) {
int more_to_do;
RING_FINAL_CHECK_FOR_RESPONSES(&evtchnl->u.req.ring,
more_to_do);
if (more_to_do)
goto again;
} else {
evtchnl->u.req.ring.sring->rsp_event = i + 1;
}
spin_unlock_irqrestore(&front_info->io_lock, flags);
return IRQ_HANDLED;
}
static irqreturn_t evtchnl_interrupt_evt(int irq, void *dev_id)
{
struct xen_drm_front_evtchnl *evtchnl = dev_id;
struct xen_drm_front_info *front_info = evtchnl->front_info;
struct xendispl_event_page *page = evtchnl->u.evt.page;
u32 cons, prod;
unsigned long flags;
if (unlikely(evtchnl->state != EVTCHNL_STATE_CONNECTED))
return IRQ_HANDLED;
spin_lock_irqsave(&front_info->io_lock, flags);
prod = page->in_prod;
/* ensure we see ring contents up to prod */
virt_rmb();
if (prod == page->in_cons)
goto out;
for (cons = page->in_cons; cons != prod; cons++) {
struct xendispl_evt *event;
event = &XENDISPL_IN_RING_REF(page, cons);
if (unlikely(event->id != evtchnl->evt_id++))
continue;
switch (event->type) {
case XENDISPL_EVT_PG_FLIP:
xen_drm_front_on_frame_done(front_info, evtchnl->index,
event->op.pg_flip.fb_cookie);
break;
}
}
page->in_cons = cons;
/* ensure ring contents */
virt_wmb();
out:
spin_unlock_irqrestore(&front_info->io_lock, flags);
return IRQ_HANDLED;
}
static void evtchnl_free(struct xen_drm_front_info *front_info,
struct xen_drm_front_evtchnl *evtchnl)
{
unsigned long page = 0;
if (evtchnl->type == EVTCHNL_TYPE_REQ)
page = (unsigned long)evtchnl->u.req.ring.sring;
else if (evtchnl->type == EVTCHNL_TYPE_EVT)
page = (unsigned long)evtchnl->u.evt.page;
if (!page)
return;
evtchnl->state = EVTCHNL_STATE_DISCONNECTED;
if (evtchnl->type == EVTCHNL_TYPE_REQ) {
/* release all who still waits for response if any */
evtchnl->u.req.resp_status = -EIO;
complete_all(&evtchnl->u.req.completion);
}
if (evtchnl->irq)
unbind_from_irqhandler(evtchnl->irq, evtchnl);
if (evtchnl->port)
xenbus_free_evtchn(front_info->xb_dev, evtchnl->port);
/* end access and free the page */
if (evtchnl->gref != GRANT_INVALID_REF)
gnttab_end_foreign_access(evtchnl->gref, 0, page);
memset(evtchnl, 0, sizeof(*evtchnl));
}
static int evtchnl_alloc(struct xen_drm_front_info *front_info, int index,
struct xen_drm_front_evtchnl *evtchnl,
enum xen_drm_front_evtchnl_type type)
{
struct xenbus_device *xb_dev = front_info->xb_dev;
unsigned long page;
grant_ref_t gref;
irq_handler_t handler;
int ret;
memset(evtchnl, 0, sizeof(*evtchnl));
evtchnl->type = type;
evtchnl->index = index;
evtchnl->front_info = front_info;
evtchnl->state = EVTCHNL_STATE_DISCONNECTED;
evtchnl->gref = GRANT_INVALID_REF;
page = get_zeroed_page(GFP_NOIO | __GFP_HIGH);
if (!page) {
ret = -ENOMEM;
goto fail;
}
if (type == EVTCHNL_TYPE_REQ) {
struct xen_displif_sring *sring;
init_completion(&evtchnl->u.req.completion);
mutex_init(&evtchnl->u.req.req_io_lock);
sring = (struct xen_displif_sring *)page;
SHARED_RING_INIT(sring);
FRONT_RING_INIT(&evtchnl->u.req.ring, sring, XEN_PAGE_SIZE);
ret = xenbus_grant_ring(xb_dev, sring, 1, &gref);
if (ret < 0) {
evtchnl->u.req.ring.sring = NULL;
free_page(page);
goto fail;
}
handler = evtchnl_interrupt_ctrl;
} else {
ret = gnttab_grant_foreign_access(xb_dev->otherend_id,
virt_to_gfn((void *)page), 0);
if (ret < 0) {
free_page(page);
goto fail;
}
evtchnl->u.evt.page = (struct xendispl_event_page *)page;
gref = ret;
handler = evtchnl_interrupt_evt;
}
evtchnl->gref = gref;
ret = xenbus_alloc_evtchn(xb_dev, &evtchnl->port);
if (ret < 0)
goto fail;
ret = bind_evtchn_to_irqhandler(evtchnl->port,
handler, 0, xb_dev->devicetype,
evtchnl);
if (ret < 0)
goto fail;
evtchnl->irq = ret;
return 0;
fail:
DRM_ERROR("Failed to allocate ring: %d\n", ret);
return ret;
}
int xen_drm_front_evtchnl_create_all(struct xen_drm_front_info *front_info)
{
struct xen_drm_front_cfg *cfg;
int ret, conn;
cfg = &front_info->cfg;
front_info->evt_pairs =
kcalloc(cfg->num_connectors,
sizeof(struct xen_drm_front_evtchnl_pair),
GFP_KERNEL);
if (!front_info->evt_pairs) {
ret = -ENOMEM;
goto fail;
}
for (conn = 0; conn < cfg->num_connectors; conn++) {
ret = evtchnl_alloc(front_info, conn,
&front_info->evt_pairs[conn].req,
EVTCHNL_TYPE_REQ);
if (ret < 0) {
DRM_ERROR("Error allocating control channel\n");
goto fail;
}
ret = evtchnl_alloc(front_info, conn,
&front_info->evt_pairs[conn].evt,
EVTCHNL_TYPE_EVT);
if (ret < 0) {
DRM_ERROR("Error allocating in-event channel\n");
goto fail;
}
}
front_info->num_evt_pairs = cfg->num_connectors;
return 0;
fail:
xen_drm_front_evtchnl_free_all(front_info);
return ret;
}
static int evtchnl_publish(struct xenbus_transaction xbt,
struct xen_drm_front_evtchnl *evtchnl,
const char *path, const char *node_ring,
const char *node_chnl)
{
struct xenbus_device *xb_dev = evtchnl->front_info->xb_dev;
int ret;
/* write control channel ring reference */
ret = xenbus_printf(xbt, path, node_ring, "%u", evtchnl->gref);
if (ret < 0) {
xenbus_dev_error(xb_dev, ret, "writing ring-ref");
return ret;
}
/* write event channel ring reference */
ret = xenbus_printf(xbt, path, node_chnl, "%u", evtchnl->port);
if (ret < 0) {
xenbus_dev_error(xb_dev, ret, "writing event channel");
return ret;
}
return 0;
}
int xen_drm_front_evtchnl_publish_all(struct xen_drm_front_info *front_info)
{
struct xenbus_transaction xbt;
struct xen_drm_front_cfg *plat_data;
int ret, conn;
plat_data = &front_info->cfg;
again:
ret = xenbus_transaction_start(&xbt);
if (ret < 0) {
xenbus_dev_fatal(front_info->xb_dev, ret,
"starting transaction");
return ret;
}
for (conn = 0; conn < plat_data->num_connectors; conn++) {
ret = evtchnl_publish(xbt, &front_info->evt_pairs[conn].req,
plat_data->connectors[conn].xenstore_path,
XENDISPL_FIELD_REQ_RING_REF,
XENDISPL_FIELD_REQ_CHANNEL);
if (ret < 0)
goto fail;
ret = evtchnl_publish(xbt, &front_info->evt_pairs[conn].evt,
plat_data->connectors[conn].xenstore_path,
XENDISPL_FIELD_EVT_RING_REF,
XENDISPL_FIELD_EVT_CHANNEL);
if (ret < 0)
goto fail;
}
ret = xenbus_transaction_end(xbt, 0);
if (ret < 0) {
if (ret == -EAGAIN)
goto again;
xenbus_dev_fatal(front_info->xb_dev, ret,
"completing transaction");
goto fail_to_end;
}
return 0;
fail:
xenbus_transaction_end(xbt, 1);
fail_to_end:
xenbus_dev_fatal(front_info->xb_dev, ret, "writing Xen store");
return ret;
}
void xen_drm_front_evtchnl_flush(struct xen_drm_front_evtchnl *evtchnl)
{
int notify;
evtchnl->u.req.ring.req_prod_pvt++;
RING_PUSH_REQUESTS_AND_CHECK_NOTIFY(&evtchnl->u.req.ring, notify);
if (notify)
notify_remote_via_irq(evtchnl->irq);
}
void xen_drm_front_evtchnl_set_state(struct xen_drm_front_info *front_info,
enum xen_drm_front_evtchnl_state state)
{
unsigned long flags;
int i;
if (!front_info->evt_pairs)
return;
spin_lock_irqsave(&front_info->io_lock, flags);
for (i = 0; i < front_info->num_evt_pairs; i++) {
front_info->evt_pairs[i].req.state = state;
front_info->evt_pairs[i].evt.state = state;
}
spin_unlock_irqrestore(&front_info->io_lock, flags);
}
void xen_drm_front_evtchnl_free_all(struct xen_drm_front_info *front_info)
{
int i;
if (!front_info->evt_pairs)
return;
for (i = 0; i < front_info->num_evt_pairs; i++) {
evtchnl_free(front_info, &front_info->evt_pairs[i].req);
evtchnl_free(front_info, &front_info->evt_pairs[i].evt);
}
kfree(front_info->evt_pairs);
front_info->evt_pairs = NULL;
}
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_EVTCHNL_H_
#define __XEN_DRM_FRONT_EVTCHNL_H_
#include <linux/completion.h>
#include <linux/types.h>
#include <xen/interface/io/ring.h>
#include <xen/interface/io/displif.h>
/*
* All operations which are not connector oriented use this ctrl event channel,
* e.g. fb_attach/destroy which belong to a DRM device, not to a CRTC.
*/
#define GENERIC_OP_EVT_CHNL 0
enum xen_drm_front_evtchnl_state {
EVTCHNL_STATE_DISCONNECTED,
EVTCHNL_STATE_CONNECTED,
};
enum xen_drm_front_evtchnl_type {
EVTCHNL_TYPE_REQ,
EVTCHNL_TYPE_EVT,
};
struct xen_drm_front_drm_info;
struct xen_drm_front_evtchnl {
struct xen_drm_front_info *front_info;
int gref;
int port;
int irq;
int index;
enum xen_drm_front_evtchnl_state state;
enum xen_drm_front_evtchnl_type type;
/* either response id or incoming event id */
u16 evt_id;
/* next request id or next expected event id */
u16 evt_next_id;
union {
struct {
struct xen_displif_front_ring ring;
struct completion completion;
/* latest response status */
int resp_status;
/* serializer for backend IO: request/response */
struct mutex req_io_lock;
} req;
struct {
struct xendispl_event_page *page;
} evt;
} u;
};
struct xen_drm_front_evtchnl_pair {
struct xen_drm_front_evtchnl req;
struct xen_drm_front_evtchnl evt;
};
int xen_drm_front_evtchnl_create_all(struct xen_drm_front_info *front_info);
int xen_drm_front_evtchnl_publish_all(struct xen_drm_front_info *front_info);
void xen_drm_front_evtchnl_flush(struct xen_drm_front_evtchnl *evtchnl);
void xen_drm_front_evtchnl_set_state(struct xen_drm_front_info *front_info,
enum xen_drm_front_evtchnl_state state);
void xen_drm_front_evtchnl_free_all(struct xen_drm_front_info *front_info);
#endif /* __XEN_DRM_FRONT_EVTCHNL_H_ */
// SPDX-License-Identifier: GPL-2.0 OR MIT
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#include "xen_drm_front_gem.h"
#include <drm/drmP.h>
#include <drm/drm_crtc_helper.h>
#include <drm/drm_fb_helper.h>
#include <drm/drm_gem.h>
#include <linux/dma-buf.h>
#include <linux/scatterlist.h>
#include <linux/shmem_fs.h>
#include <xen/balloon.h>
#include "xen_drm_front.h"
#include "xen_drm_front_shbuf.h"
struct xen_gem_object {
struct drm_gem_object base;
size_t num_pages;
struct page **pages;
/* set for buffers allocated by the backend */
bool be_alloc;
/* this is for imported PRIME buffer */
struct sg_table *sgt_imported;
};
static inline struct xen_gem_object *
to_xen_gem_obj(struct drm_gem_object *gem_obj)
{
return container_of(gem_obj, struct xen_gem_object, base);
}
static int gem_alloc_pages_array(struct xen_gem_object *xen_obj,
size_t buf_size)
{
xen_obj->num_pages = DIV_ROUND_UP(buf_size, PAGE_SIZE);
xen_obj->pages = kvmalloc_array(xen_obj->num_pages,
sizeof(struct page *), GFP_KERNEL);
return !xen_obj->pages ? -ENOMEM : 0;
}
static void gem_free_pages_array(struct xen_gem_object *xen_obj)
{
kvfree(xen_obj->pages);
xen_obj->pages = NULL;
}
static struct xen_gem_object *gem_create_obj(struct drm_device *dev,
size_t size)
{
struct xen_gem_object *xen_obj;
int ret;
xen_obj = kzalloc(sizeof(*xen_obj), GFP_KERNEL);
if (!xen_obj)
return ERR_PTR(-ENOMEM);
ret = drm_gem_object_init(dev, &xen_obj->base, size);
if (ret < 0) {
kfree(xen_obj);
return ERR_PTR(ret);
}
return xen_obj;
}
static struct xen_gem_object *gem_create(struct drm_device *dev, size_t size)
{
struct xen_drm_front_drm_info *drm_info = dev->dev_private;
struct xen_gem_object *xen_obj;
int ret;
size = round_up(size, PAGE_SIZE);
xen_obj = gem_create_obj(dev, size);
if (IS_ERR_OR_NULL(xen_obj))
return xen_obj;
if (drm_info->front_info->cfg.be_alloc) {
/*
* backend will allocate space for this buffer, so
* only allocate array of pointers to pages
*/
ret = gem_alloc_pages_array(xen_obj, size);
if (ret < 0)
goto fail;
/*
* allocate ballooned pages which will be used to map
* grant references provided by the backend
*/
ret = alloc_xenballooned_pages(xen_obj->num_pages,
xen_obj->pages);
if (ret < 0) {
DRM_ERROR("Cannot allocate %zu ballooned pages: %d\n",
xen_obj->num_pages, ret);
gem_free_pages_array(xen_obj);
goto fail;
}
xen_obj->be_alloc = true;
return xen_obj;
}
/*
* need to allocate backing pages now, so we can share those
* with the backend
*/
xen_obj->num_pages = DIV_ROUND_UP(size, PAGE_SIZE);
xen_obj->pages = drm_gem_get_pages(&xen_obj->base);
if (IS_ERR_OR_NULL(xen_obj->pages)) {
ret = PTR_ERR(xen_obj->pages);
xen_obj->pages = NULL;
goto fail;
}
return xen_obj;
fail:
DRM_ERROR("Failed to allocate buffer with size %zu\n", size);
return ERR_PTR(ret);
}
struct drm_gem_object *xen_drm_front_gem_create(struct drm_device *dev,
size_t size)
{
struct xen_gem_object *xen_obj;
xen_obj = gem_create(dev, size);
if (IS_ERR_OR_NULL(xen_obj))
return ERR_CAST(xen_obj);
return &xen_obj->base;
}
void xen_drm_front_gem_free_object_unlocked(struct drm_gem_object *gem_obj)
{
struct xen_gem_object *xen_obj = to_xen_gem_obj(gem_obj);
if (xen_obj->base.import_attach) {
drm_prime_gem_destroy(&xen_obj->base, xen_obj->sgt_imported);
gem_free_pages_array(xen_obj);
} else {
if (xen_obj->pages) {
if (xen_obj->be_alloc) {
free_xenballooned_pages(xen_obj->num_pages,
xen_obj->pages);
gem_free_pages_array(xen_obj);
} else {
drm_gem_put_pages(&xen_obj->base,
xen_obj->pages, true, false);
}
}
}
drm_gem_object_release(gem_obj);
kfree(xen_obj);
}
struct page **xen_drm_front_gem_get_pages(struct drm_gem_object *gem_obj)
{
struct xen_gem_object *xen_obj = to_xen_gem_obj(gem_obj);
return xen_obj->pages;
}
struct sg_table *xen_drm_front_gem_get_sg_table(struct drm_gem_object *gem_obj)
{
struct xen_gem_object *xen_obj = to_xen_gem_obj(gem_obj);
if (!xen_obj->pages)
return NULL;
return drm_prime_pages_to_sg(xen_obj->pages, xen_obj->num_pages);
}
struct drm_gem_object *
xen_drm_front_gem_import_sg_table(struct drm_device *dev,
struct dma_buf_attachment *attach,
struct sg_table *sgt)
{
struct xen_drm_front_drm_info *drm_info = dev->dev_private;
struct xen_gem_object *xen_obj;
size_t size;
int ret;
size = attach->dmabuf->size;
xen_obj = gem_create_obj(dev, size);
if (IS_ERR_OR_NULL(xen_obj))
return ERR_CAST(xen_obj);
ret = gem_alloc_pages_array(xen_obj, size);
if (ret < 0)
return ERR_PTR(ret);
xen_obj->sgt_imported = sgt;
ret = drm_prime_sg_to_page_addr_arrays(sgt, xen_obj->pages,
NULL, xen_obj->num_pages);
if (ret < 0)
return ERR_PTR(ret);
/*
* N.B. Although we have an API to create display buffer from sgt
* we use pages API, because we still need those for GEM handling,
* e.g. for mapping etc.
*/
ret = xen_drm_front_dbuf_create_from_pages(drm_info->front_info,
xen_drm_front_dbuf_to_cookie(&xen_obj->base),
0, 0, 0, size,
xen_obj->pages);
if (ret < 0)
return ERR_PTR(ret);
DRM_DEBUG("Imported buffer of size %zu with nents %u\n",
size, sgt->nents);
return &xen_obj->base;
}
static int gem_mmap_obj(struct xen_gem_object *xen_obj,
struct vm_area_struct *vma)
{
unsigned long addr = vma->vm_start;
int i;
/*
* clear the VM_PFNMAP flag that was set by drm_gem_mmap(), and set the
* vm_pgoff (used as a fake buffer offset by DRM) to 0 as we want to map
* the whole buffer.
*/
vma->vm_flags &= ~VM_PFNMAP;
vma->vm_flags |= VM_MIXEDMAP;
vma->vm_pgoff = 0;
vma->vm_page_prot =
pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
/*
* vm_operations_struct.fault handler will be called if CPU access
* to VM is here. For GPUs this isn't the case, because CPU
* doesn't touch the memory. Insert pages now, so both CPU and GPU are
* happy.
* FIXME: as we insert all the pages now then no .fault handler must
* be called, so don't provide one
*/
for (i = 0; i < xen_obj->num_pages; i++) {
int ret;
ret = vm_insert_page(vma, addr, xen_obj->pages[i]);
if (ret < 0) {
DRM_ERROR("Failed to insert pages into vma: %d\n", ret);
return ret;
}
addr += PAGE_SIZE;
}
return 0;
}
int xen_drm_front_gem_mmap(struct file *filp, struct vm_area_struct *vma)
{
struct xen_gem_object *xen_obj;
struct drm_gem_object *gem_obj;
int ret;
ret = drm_gem_mmap(filp, vma);
if (ret < 0)
return ret;
gem_obj = vma->vm_private_data;
xen_obj = to_xen_gem_obj(gem_obj);
return gem_mmap_obj(xen_obj, vma);
}
void *xen_drm_front_gem_prime_vmap(struct drm_gem_object *gem_obj)
{
struct xen_gem_object *xen_obj = to_xen_gem_obj(gem_obj);
if (!xen_obj->pages)
return NULL;
return vmap(xen_obj->pages, xen_obj->num_pages,
VM_MAP, pgprot_writecombine(PAGE_KERNEL));
}
void xen_drm_front_gem_prime_vunmap(struct drm_gem_object *gem_obj,
void *vaddr)
{
vunmap(vaddr);
}
int xen_drm_front_gem_prime_mmap(struct drm_gem_object *gem_obj,
struct vm_area_struct *vma)
{
struct xen_gem_object *xen_obj;
int ret;
ret = drm_gem_mmap_obj(gem_obj, gem_obj->size, vma);
if (ret < 0)
return ret;
xen_obj = to_xen_gem_obj(gem_obj);
return gem_mmap_obj(xen_obj, vma);
}
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_GEM_H
#define __XEN_DRM_FRONT_GEM_H
#include <drm/drmP.h>
struct drm_gem_object *xen_drm_front_gem_create(struct drm_device *dev,
size_t size);
struct drm_gem_object *
xen_drm_front_gem_import_sg_table(struct drm_device *dev,
struct dma_buf_attachment *attach,
struct sg_table *sgt);
struct sg_table *xen_drm_front_gem_get_sg_table(struct drm_gem_object *gem_obj);
struct page **xen_drm_front_gem_get_pages(struct drm_gem_object *obj);
void xen_drm_front_gem_free_object_unlocked(struct drm_gem_object *gem_obj);
#ifndef CONFIG_DRM_XEN_FRONTEND_CMA
int xen_drm_front_gem_mmap(struct file *filp, struct vm_area_struct *vma);
void *xen_drm_front_gem_prime_vmap(struct drm_gem_object *gem_obj);
void xen_drm_front_gem_prime_vunmap(struct drm_gem_object *gem_obj,
void *vaddr);
int xen_drm_front_gem_prime_mmap(struct drm_gem_object *gem_obj,
struct vm_area_struct *vma);
#endif
#endif /* __XEN_DRM_FRONT_GEM_H */
// SPDX-License-Identifier: GPL-2.0 OR MIT
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#include <drm/drmP.h>
#include <drm/drm_gem.h>
#include <drm/drm_fb_cma_helper.h>
#include <drm/drm_gem_cma_helper.h>
#include "xen_drm_front.h"
#include "xen_drm_front_gem.h"
struct drm_gem_object *
xen_drm_front_gem_import_sg_table(struct drm_device *dev,
struct dma_buf_attachment *attach,
struct sg_table *sgt)
{
struct xen_drm_front_drm_info *drm_info = dev->dev_private;
struct drm_gem_object *gem_obj;
struct drm_gem_cma_object *cma_obj;
int ret;
gem_obj = drm_gem_cma_prime_import_sg_table(dev, attach, sgt);
if (IS_ERR_OR_NULL(gem_obj))
return gem_obj;
cma_obj = to_drm_gem_cma_obj(gem_obj);
ret = xen_drm_front_dbuf_create_from_sgt(drm_info->front_info,
xen_drm_front_dbuf_to_cookie(gem_obj),
0, 0, 0, gem_obj->size,
drm_gem_cma_prime_get_sg_table(gem_obj));
if (ret < 0)
return ERR_PTR(ret);
DRM_DEBUG("Imported CMA buffer of size %zu\n", gem_obj->size);
return gem_obj;
}
struct sg_table *xen_drm_front_gem_get_sg_table(struct drm_gem_object *gem_obj)
{
return drm_gem_cma_prime_get_sg_table(gem_obj);
}
struct drm_gem_object *xen_drm_front_gem_create(struct drm_device *dev,
size_t size)
{
struct xen_drm_front_drm_info *drm_info = dev->dev_private;
struct drm_gem_cma_object *cma_obj;
if (drm_info->front_info->cfg.be_alloc) {
/* This use-case is not yet supported and probably won't be */
DRM_ERROR("Backend allocated buffers and CMA helpers are not supported at the same time\n");
return ERR_PTR(-EINVAL);
}
cma_obj = drm_gem_cma_create(dev, size);
if (IS_ERR_OR_NULL(cma_obj))
return ERR_CAST(cma_obj);
return &cma_obj->base;
}
void xen_drm_front_gem_free_object_unlocked(struct drm_gem_object *gem_obj)
{
drm_gem_cma_free_object(gem_obj);
}
struct page **xen_drm_front_gem_get_pages(struct drm_gem_object *gem_obj)
{
return NULL;
}
This diff is collapsed.
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_KMS_H_
#define __XEN_DRM_FRONT_KMS_H_
#include <linux/types.h>
struct xen_drm_front_drm_info;
struct xen_drm_front_drm_pipeline;
int xen_drm_front_kms_init(struct xen_drm_front_drm_info *drm_info);
void xen_drm_front_kms_fini(struct xen_drm_front_drm_info *drm_info);
void xen_drm_front_kms_on_frame_done(struct xen_drm_front_drm_pipeline *pipeline,
u64 fb_cookie);
#endif /* __XEN_DRM_FRONT_KMS_H_ */
This diff is collapsed.
/* SPDX-License-Identifier: GPL-2.0 OR MIT */
/*
* Xen para-virtual DRM device
*
* Copyright (C) 2016-2018 EPAM Systems Inc.
*
* Author: Oleksandr Andrushchenko <oleksandr_andrushchenko@epam.com>
*/
#ifndef __XEN_DRM_FRONT_SHBUF_H_
#define __XEN_DRM_FRONT_SHBUF_H_
#include <linux/kernel.h>
#include <linux/scatterlist.h>
#include <xen/grant_table.h>
struct xen_drm_front_shbuf {
/*
* number of references granted for the backend use:
* - for allocated/imported dma-buf's this holds number of grant
* references for the page directory and pages of the buffer
* - for the buffer provided by the backend this holds number of
* grant references for the page directory as grant references for
* the buffer will be provided by the backend
*/
int num_grefs;
grant_ref_t *grefs;
unsigned char *directory;
/*
* there are 2 ways to provide backing storage for this shared buffer:
* either pages or sgt. if buffer created from sgt then we own
* the pages and must free those ourselves on closure
*/
int num_pages;
struct page **pages;
struct sg_table *sgt;
struct xenbus_device *xb_dev;
/* these are the ops used internally depending on be_alloc mode */
const struct xen_drm_front_shbuf_ops *ops;
/* Xen map handles for the buffer allocated by the backend */
grant_handle_t *backend_map_handles;
};
struct xen_drm_front_shbuf_cfg {
struct xenbus_device *xb_dev;
size_t size;
struct page **pages;
struct sg_table *sgt;
bool be_alloc;
};
struct xen_drm_front_shbuf *
xen_drm_front_shbuf_alloc(struct xen_drm_front_shbuf_cfg *cfg);
grant_ref_t xen_drm_front_shbuf_get_dir_start(struct xen_drm_front_shbuf *buf);
int xen_drm_front_shbuf_map(struct xen_drm_front_shbuf *buf);
int xen_drm_front_shbuf_unmap(struct xen_drm_front_shbuf *buf);
void xen_drm_front_shbuf_flush(struct xen_drm_front_shbuf *buf);
void xen_drm_front_shbuf_free(struct xen_drm_front_shbuf *buf);
#endif /* __XEN_DRM_FRONT_SHBUF_H_ */
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment