| /* Copyright (c) 2015-2016 The Khronos Group Inc. |
| * Copyright (c) 2015-2016 Valve Corporation |
| * Copyright (c) 2015-2016 LunarG, Inc. |
| * Copyright (C) 2015-2016 Google Inc. |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| * |
| * Author: Ian Elliott <ian@lunarg.com> |
| * Author: Ian Elliott <ianelliott@google.com> |
| */ |
| |
| #include <mutex> |
| #include <stdio.h> |
| #include <string.h> |
| #include <vk_loader_platform.h> |
| #include <vulkan/vk_icd.h> |
| #include "swapchain.h" |
| #include "vk_layer_extension_utils.h" |
| #include "vk_enum_string_helper.h" |
| #include "vk_layer_utils.h" |
| |
| namespace swapchain { |
| |
| static std::mutex global_lock; |
| |
| // The following is for logging error messages: |
| static std::unordered_map<void *, layer_data *> layer_data_map; |
| |
| static const VkExtensionProperties instance_extensions[] = {{VK_EXT_DEBUG_REPORT_EXTENSION_NAME, VK_EXT_DEBUG_REPORT_SPEC_VERSION}}; |
| |
| static const VkLayerProperties swapchain_layer = { |
| "VK_LAYER_LUNARG_swapchain", VK_LAYER_API_VERSION, 1, "LunarG Validation Layer", |
| }; |
| |
| static void checkDeviceRegisterExtensions(VkPhysicalDevice physicalDevice, const VkDeviceCreateInfo *pCreateInfo, VkDevice device) { |
| uint32_t i; |
| layer_data *my_device_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| layer_data *my_instance_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_instance_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_instance_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| if (pPhysicalDevice) { |
| my_device_data->deviceMap[device].pPhysicalDevice = pPhysicalDevice; |
| pPhysicalDevice->pDevice = &my_device_data->deviceMap[device]; |
| } else { |
| // TBD: Should we leave error in (since Swapchain really needs this |
| // link)? |
| log_msg(my_instance_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(physicalDevice), __LINE__, SWAPCHAIN_INVALID_HANDLE, "Swapchain", |
| "vkCreateDevice() called with a non-valid VkPhysicalDevice."); |
| } |
| my_device_data->deviceMap[device].device = device; |
| my_device_data->deviceMap[device].swapchainExtensionEnabled = false; |
| |
| // Record whether the WSI device extension was enabled for this VkDevice. |
| // No need to check if the extension was advertised by |
| // vkEnumerateDeviceExtensionProperties(), since the loader handles that. |
| for (i = 0; i < pCreateInfo->enabledExtensionCount; i++) { |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_SWAPCHAIN_EXTENSION_NAME) == 0) { |
| |
| my_device_data->deviceMap[device].swapchainExtensionEnabled = true; |
| } |
| } |
| } |
| |
| static void checkInstanceRegisterExtensions(const VkInstanceCreateInfo *pCreateInfo, VkInstance instance) { |
| uint32_t i; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| |
| // Remember this instance, and whether the VK_KHR_surface extension |
| // was enabled for it: |
| my_data->instanceMap[instance].instance = instance; |
| my_data->instanceMap[instance].surfaceExtensionEnabled = false; |
| my_data->instanceMap[instance].displayExtensionEnabled = false; |
| #ifdef VK_USE_PLATFORM_ANDROID_KHR |
| my_data->instanceMap[instance].androidSurfaceExtensionEnabled = false; |
| #endif // VK_USE_PLATFORM_ANDROID_KHR |
| #ifdef VK_USE_PLATFORM_MIR_KHR |
| my_data->instanceMap[instance].mirSurfaceExtensionEnabled = false; |
| #endif // VK_USE_PLATFORM_MIR_KHR |
| #ifdef VK_USE_PLATFORM_WAYLAND_KHR |
| my_data->instanceMap[instance].waylandSurfaceExtensionEnabled = false; |
| #endif // VK_USE_PLATFORM_WAYLAND_KHR |
| #ifdef VK_USE_PLATFORM_WIN32_KHR |
| my_data->instanceMap[instance].win32SurfaceExtensionEnabled = false; |
| #endif // VK_USE_PLATFORM_WIN32_KHR |
| #ifdef VK_USE_PLATFORM_XCB_KHR |
| my_data->instanceMap[instance].xcbSurfaceExtensionEnabled = false; |
| #endif // VK_USE_PLATFORM_XCB_KHR |
| #ifdef VK_USE_PLATFORM_XLIB_KHR |
| my_data->instanceMap[instance].xlibSurfaceExtensionEnabled = false; |
| #endif // VK_USE_PLATFORM_XLIB_KHR |
| |
| // Look for one or more debug report create info structures, and copy the |
| // callback(s) for each one found (for use by vkDestroyInstance) |
| layer_copy_tmp_callbacks(pCreateInfo->pNext, &my_data->num_tmp_callbacks, &my_data->tmp_dbg_create_infos, |
| &my_data->tmp_callbacks); |
| |
| // Record whether the WSI instance extension was enabled for this |
| // VkInstance. No need to check if the extension was advertised by |
| // vkEnumerateInstanceExtensionProperties(), since the loader handles that. |
| for (i = 0; i < pCreateInfo->enabledExtensionCount; i++) { |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].surfaceExtensionEnabled = true; |
| } |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_DISPLAY_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].displayExtensionEnabled = true; |
| } |
| #ifdef VK_USE_PLATFORM_ANDROID_KHR |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_ANDROID_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].androidSurfaceExtensionEnabled = true; |
| } |
| #endif // VK_USE_PLATFORM_ANDROID_KHR |
| #ifdef VK_USE_PLATFORM_MIR_KHR |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_MIR_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].mirSurfaceExtensionEnabled = true; |
| } |
| #endif // VK_USE_PLATFORM_MIR_KHR |
| #ifdef VK_USE_PLATFORM_WAYLAND_KHR |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_WAYLAND_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].waylandSurfaceExtensionEnabled = true; |
| } |
| #endif // VK_USE_PLATFORM_WAYLAND_KHR |
| #ifdef VK_USE_PLATFORM_WIN32_KHR |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_WIN32_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].win32SurfaceExtensionEnabled = true; |
| } |
| #endif // VK_USE_PLATFORM_WIN32_KHR |
| #ifdef VK_USE_PLATFORM_XCB_KHR |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_XCB_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].xcbSurfaceExtensionEnabled = true; |
| } |
| #endif // VK_USE_PLATFORM_XCB_KHR |
| #ifdef VK_USE_PLATFORM_XLIB_KHR |
| if (strcmp(pCreateInfo->ppEnabledExtensionNames[i], VK_KHR_XLIB_SURFACE_EXTENSION_NAME) == 0) { |
| |
| my_data->instanceMap[instance].xlibSurfaceExtensionEnabled = true; |
| } |
| #endif // VK_USE_PLATFORM_XLIB_KHR |
| } |
| } |
| |
| #include "vk_dispatch_table_helper.h" |
| static void init_swapchain(layer_data *my_data, const VkAllocationCallbacks *pAllocator) { |
| |
| layer_debug_actions(my_data->report_data, my_data->logging_callback, pAllocator, "lunarg_swapchain"); |
| } |
| |
| static const char *surfaceTransformStr(VkSurfaceTransformFlagBitsKHR value) { |
| // Return a string corresponding to the value: |
| return string_VkSurfaceTransformFlagBitsKHR(value); |
| } |
| |
| static const char *surfaceCompositeAlphaStr(VkCompositeAlphaFlagBitsKHR value) { |
| // Return a string corresponding to the value: |
| return string_VkCompositeAlphaFlagBitsKHR(value); |
| } |
| |
| static const char *presentModeStr(VkPresentModeKHR value) { |
| // Return a string corresponding to the value: |
| return string_VkPresentModeKHR(value); |
| } |
| |
| static const char *sharingModeStr(VkSharingMode value) { |
| // Return a string corresponding to the value: |
| return string_VkSharingMode(value); |
| } |
| |
| static bool ValidateQueueFamilyIndex(layer_data *my_data, uint32_t queue_family_index, uint32_t queue_family_count, |
| VkPhysicalDevice physical_device, const char *function) { |
| bool skip_call = false; |
| if (queue_family_index >= queue_family_count) { |
| skip_call = log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(physical_device), __LINE__, SWAPCHAIN_QUEUE_FAMILY_INDEX_TOO_LARGE, |
| swapchain_layer_name, |
| "%s() called with a queueFamilyIndex that is too large (i.e. %d). The maximum value (returned by " |
| "vkGetPhysicalDeviceQueueFamilyProperties) is only %d.", |
| function, queue_family_index, queue_family_count); |
| } |
| return skip_call; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL CreateInstance(const VkInstanceCreateInfo *pCreateInfo, const VkAllocationCallbacks *pAllocator, |
| VkInstance *pInstance) { |
| VkLayerInstanceCreateInfo *chain_info = get_chain_info(pCreateInfo, VK_LAYER_LINK_INFO); |
| |
| assert(chain_info->u.pLayerInfo); |
| PFN_vkGetInstanceProcAddr fpGetInstanceProcAddr = chain_info->u.pLayerInfo->pfnNextGetInstanceProcAddr; |
| PFN_vkCreateInstance fpCreateInstance = (PFN_vkCreateInstance)fpGetInstanceProcAddr(NULL, "vkCreateInstance"); |
| if (fpCreateInstance == NULL) { |
| return VK_ERROR_INITIALIZATION_FAILED; |
| } |
| |
| // Advance the link info for the next element on the chain |
| chain_info->u.pLayerInfo = chain_info->u.pLayerInfo->pNext; |
| |
| VkResult result = fpCreateInstance(pCreateInfo, pAllocator, pInstance); |
| if (result != VK_SUCCESS) { |
| return result; |
| } |
| |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(*pInstance), layer_data_map); |
| my_data->instance = *pInstance; |
| my_data->instance_dispatch_table = new VkLayerInstanceDispatchTable; |
| layer_init_instance_dispatch_table(*pInstance, my_data->instance_dispatch_table, fpGetInstanceProcAddr); |
| |
| my_data->report_data = debug_report_create_instance(my_data->instance_dispatch_table, *pInstance, |
| pCreateInfo->enabledExtensionCount, pCreateInfo->ppEnabledExtensionNames); |
| |
| // Call the following function after my_data is initialized: |
| checkInstanceRegisterExtensions(pCreateInfo, *pInstance); |
| init_swapchain(my_data, pAllocator); |
| |
| return result; |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL DestroyInstance(VkInstance instance, const VkAllocationCallbacks *pAllocator) { |
| dispatch_key key = get_dispatch_key(instance); |
| layer_data *my_data = get_my_data_ptr(key, layer_data_map); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Call down the call chain: |
| my_data->instance_dispatch_table->DestroyInstance(instance, pAllocator); |
| |
| std::lock_guard<std::mutex> lock(global_lock); |
| |
| // Enable the temporary callback(s) here to catch cleanup issues: |
| bool callback_setup = false; |
| if (my_data->num_tmp_callbacks > 0) { |
| if (!layer_enable_tmp_callbacks(my_data->report_data, my_data->num_tmp_callbacks, my_data->tmp_dbg_create_infos, |
| my_data->tmp_callbacks)) { |
| callback_setup = true; |
| } |
| } |
| |
| // Do additional internal cleanup: |
| if (pInstance) { |
| // Delete all of the SwpPhysicalDevice's, SwpSurface's, and the |
| // SwpInstance associated with this instance: |
| for (auto it = pInstance->physicalDevices.begin(); it != pInstance->physicalDevices.end(); it++) { |
| |
| // Free memory that was allocated for/by this SwpPhysicalDevice: |
| SwpPhysicalDevice *pPhysicalDevice = it->second; |
| if (pPhysicalDevice) { |
| if (pPhysicalDevice->pDevice) { |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pDevice->device), __LINE__, |
| SWAPCHAIN_DEL_OBJECT_BEFORE_CHILDREN, swapchain_layer_name, |
| "VkDestroyInstance() called before all of its associated VkDevices were destroyed."); |
| } |
| free(pPhysicalDevice->pSurfaceFormats); |
| free(pPhysicalDevice->pPresentModes); |
| } |
| |
| // Erase the SwpPhysicalDevice's from the my_data->physicalDeviceMap (which |
| // are simply pointed to by the SwpInstance): |
| my_data->physicalDeviceMap.erase(it->second->physicalDevice); |
| } |
| for (auto it = pInstance->surfaces.begin(); it != pInstance->surfaces.end(); it++) { |
| |
| // Free memory that was allocated for/by this SwpPhysicalDevice: |
| SwpSurface *pSurface = it->second; |
| if (pSurface) { |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pInstance->instance), __LINE__, SWAPCHAIN_DEL_OBJECT_BEFORE_CHILDREN, |
| swapchain_layer_name, |
| "VkDestroyInstance() called before all of its associated VkSurfaceKHRs were destroyed."); |
| } |
| } |
| my_data->instanceMap.erase(instance); |
| } |
| |
| // Disable and cleanup the temporary callback(s): |
| if (callback_setup) { |
| layer_disable_tmp_callbacks(my_data->report_data, my_data->num_tmp_callbacks, my_data->tmp_callbacks); |
| } |
| if (my_data->num_tmp_callbacks > 0) { |
| layer_free_tmp_callbacks(my_data->tmp_dbg_create_infos, my_data->tmp_callbacks); |
| my_data->num_tmp_callbacks = 0; |
| } |
| |
| // Clean up logging callback, if any |
| while (my_data->logging_callback.size() > 0) { |
| VkDebugReportCallbackEXT callback = my_data->logging_callback.back(); |
| layer_destroy_msg_callback(my_data->report_data, callback, pAllocator); |
| my_data->logging_callback.pop_back(); |
| } |
| layer_debug_report_destroy_instance(my_data->report_data); |
| |
| delete my_data->instance_dispatch_table; |
| layer_data_map.erase(key); |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL GetPhysicalDeviceQueueFamilyProperties(VkPhysicalDevice physicalDevice, |
| uint32_t *pQueueFamilyPropertyCount, |
| VkQueueFamilyProperties *pQueueFamilyProperties) { |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| |
| // Call down the call chain: |
| my_data->instance_dispatch_table->GetPhysicalDeviceQueueFamilyProperties(physicalDevice, pQueueFamilyPropertyCount, |
| pQueueFamilyProperties); |
| |
| // Record the result of this query: |
| std::lock_guard<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| // Note: for poorly-written applications (e.g. that don't call this command |
| // twice, the first time with pQueueFamilyProperties set to NULL, and the |
| // second time with a non-NULL pQueueFamilyProperties and with the same |
| // count as returned the first time), record the count when |
| // pQueueFamilyProperties is non-NULL: |
| if (pPhysicalDevice && pQueueFamilyPropertyCount && pQueueFamilyProperties) { |
| pPhysicalDevice->gotQueueFamilyPropertyCount = true; |
| pPhysicalDevice->numOfQueueFamilies = *pQueueFamilyPropertyCount; |
| } |
| } |
| |
| #ifdef VK_USE_PLATFORM_ANDROID_KHR |
| VKAPI_ATTR VkResult VKAPI_CALL CreateAndroidSurfaceKHR(VkInstance instance, const VkAndroidSurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->androidSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateAndroidSurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_ANDROID_SURFACE_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->CreateAndroidSurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| #endif // VK_USE_PLATFORM_ANDROID_KHR |
| |
| #ifdef VK_USE_PLATFORM_MIR_KHR |
| VKAPI_ATTR VkResult VKAPI_CALL CreateMirSurfaceKHR(VkInstance instance, const VkMirSurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->mirSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateMirSurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_MIR_SURFACE_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->CreateMirSurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkBool32 VKAPI_CALL GetPhysicalDeviceMirPresentationSupportKHR(VkPhysicalDevice physicalDevice, |
| uint32_t queueFamilyIndex, MirConnection *connection) { |
| VkBool32 result = VK_FALSE; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->mirSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceMirPresentationSupportKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_MIR_SURFACE_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, queueFamilyIndex, pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkGetPhysicalDeviceMirPresentationSupportKHR"); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceMirPresentationSupportKHR(physicalDevice, queueFamilyIndex, |
| connection); |
| } |
| return result; |
| } |
| #endif // VK_USE_PLATFORM_MIR_KHR |
| |
| #ifdef VK_USE_PLATFORM_WAYLAND_KHR |
| VKAPI_ATTR VkResult VKAPI_CALL CreateWaylandSurfaceKHR(VkInstance instance, const VkWaylandSurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->waylandSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateWaylandSurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_WAYLAND_SURFACE_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->CreateWaylandSurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkBool32 VKAPI_CALL GetPhysicalDeviceWaylandPresentationSupportKHR(VkPhysicalDevice physicalDevice, |
| uint32_t queueFamilyIndex, |
| struct wl_display *display) { |
| VkBool32 result = VK_FALSE; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->waylandSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceWaylandPresentationSupportKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_WAYLAND_SURFACE_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, queueFamilyIndex, pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkGetPhysicalDeviceWaylandPresentationSupportKHR"); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceWaylandPresentationSupportKHR(physicalDevice, queueFamilyIndex, |
| display); |
| } |
| return result; |
| } |
| #endif // VK_USE_PLATFORM_WAYLAND_KHR |
| |
| #ifdef VK_USE_PLATFORM_WIN32_KHR |
| VKAPI_ATTR VkResult VKAPI_CALL CreateWin32SurfaceKHR(VkInstance instance, const VkWin32SurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->win32SurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateWin32SurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_WIN32_SURFACE_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->CreateWin32SurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkBool32 VKAPI_CALL GetPhysicalDeviceWin32PresentationSupportKHR(VkPhysicalDevice physicalDevice, |
| uint32_t queueFamilyIndex) { |
| VkBool32 result = VK_FALSE; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->win32SurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceWin32PresentationSupportKHR() called even though the %s extension " |
| "was not enabled for this VkInstance.", |
| VK_KHR_WIN32_SURFACE_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, queueFamilyIndex, pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkGetPhysicalDeviceWin32PresentationSupportKHR"); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceWin32PresentationSupportKHR(physicalDevice, queueFamilyIndex); |
| } |
| return result; |
| } |
| #endif // VK_USE_PLATFORM_WIN32_KHR |
| |
| #ifdef VK_USE_PLATFORM_XCB_KHR |
| VKAPI_ATTR VkResult VKAPI_CALL CreateXcbSurfaceKHR(VkInstance instance, const VkXcbSurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->xcbSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateXcbSurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_XCB_SURFACE_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->CreateXcbSurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkBool32 VKAPI_CALL GetPhysicalDeviceXcbPresentationSupportKHR(VkPhysicalDevice physicalDevice, |
| uint32_t queueFamilyIndex, xcb_connection_t *connection, |
| xcb_visualid_t visual_id) { |
| VkBool32 result = VK_FALSE; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->xcbSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceXcbPresentationSupportKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_XCB_SURFACE_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, queueFamilyIndex, pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkGetPhysicalDeviceXcbPresentationSupportKHR"); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceXcbPresentationSupportKHR(physicalDevice, queueFamilyIndex, |
| connection, visual_id); |
| } |
| return result; |
| } |
| #endif // VK_USE_PLATFORM_XCB_KHR |
| |
| #ifdef VK_USE_PLATFORM_XLIB_KHR |
| VKAPI_ATTR VkResult VKAPI_CALL CreateXlibSurfaceKHR(VkInstance instance, const VkXlibSurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->xlibSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateXlibSurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_XLIB_SURFACE_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->CreateXlibSurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkBool32 VKAPI_CALL GetPhysicalDeviceXlibPresentationSupportKHR(VkPhysicalDevice physicalDevice, |
| uint32_t queueFamilyIndex, Display *dpy, |
| VisualID visualID) { |
| VkBool32 result = VK_FALSE; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->xlibSurfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceXlibPresentationSupportKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_XLIB_SURFACE_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, queueFamilyIndex, pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkGetPhysicalDeviceXlibPresentationSupportKHR"); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceXlibPresentationSupportKHR(physicalDevice, queueFamilyIndex, |
| dpy, visualID); |
| } |
| return result; |
| } |
| #endif // VK_USE_PLATFORM_XLIB_KHR |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetPhysicalDeviceDisplayPropertiesKHR(VkPhysicalDevice physicalDevice, uint32_t *pPropertyCount, |
| VkDisplayPropertiesKHR *pProperties) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->displayExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceDisplayPropertiesKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| result = |
| my_data->instance_dispatch_table->GetPhysicalDeviceDisplayPropertiesKHR(physicalDevice, pPropertyCount, pProperties); |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetPhysicalDeviceDisplayPlanePropertiesKHR(VkPhysicalDevice physicalDevice, uint32_t *pPropertyCount, |
| VkDisplayPlanePropertiesKHR *pProperties) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->displayExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetPhysicalDeviceDisplayPlanePropertiesKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceDisplayPlanePropertiesKHR(physicalDevice, pPropertyCount, |
| pProperties); |
| |
| lock.lock(); |
| if (!pPhysicalDevice->gotDisplayPlanePropertyCount) { |
| pPhysicalDevice->displayPlanePropertyCount = *pPropertyCount; |
| pPhysicalDevice->gotDisplayPlanePropertyCount = true; |
| } |
| // TODO store the properties for later checks |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetDisplayPlaneSupportedDisplaysKHR(VkPhysicalDevice physicalDevice, uint32_t planeIndex, |
| uint32_t *pDisplayCount, VkDisplayKHR *pDisplays) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->displayExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, "vkGetDisplayPlaneSupportedDisplaysKHR() called even though the %s " |
| "extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| |
| if (!pPhysicalDevice->gotDisplayPlanePropertyCount) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_WARNING_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, |
| SWAPCHAIN_GET_SUPPORTED_DISPLAYS_WITHOUT_QUERY, swapchain_layer_name, |
| "Potential problem with calling vkGetDisplayPlaneSupportedDisplaysKHR() without first " |
| "querying vkGetPhysicalDeviceDisplayPlanePropertiesKHR."); |
| } |
| |
| if (pPhysicalDevice->gotDisplayPlanePropertyCount && planeIndex >= pPhysicalDevice->displayPlanePropertyCount) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_PLANE_INDEX_TOO_LARGE, |
| swapchain_layer_name, |
| "vkGetDisplayPlaneSupportedDisplaysKHR(): planeIndex must be in the range [0, %d] that was returned by " |
| "vkGetPhysicalDeviceDisplayPlanePropertiesKHR. Do you have the plane index hardcoded?", |
| pPhysicalDevice->displayPlanePropertyCount - 1); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| result = my_data->instance_dispatch_table->GetDisplayPlaneSupportedDisplaysKHR(physicalDevice, planeIndex, pDisplayCount, |
| pDisplays); |
| |
| return result; |
| } |
| // TODO validate the returned display objects |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetDisplayModePropertiesKHR(VkPhysicalDevice physicalDevice, VkDisplayKHR display, |
| uint32_t *pPropertyCount, VkDisplayModePropertiesKHR *pProperties) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->displayExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, |
| "vkGetDisplayModePropertiesKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| |
| lock.unlock(); |
| |
| if (!skip_call) { |
| result = |
| my_data->instance_dispatch_table->GetDisplayModePropertiesKHR(physicalDevice, display, pPropertyCount, pProperties); |
| return result; |
| } |
| // TODO store the displayMode for later checking |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL CreateDisplayModeKHR(VkPhysicalDevice physicalDevice, VkDisplayKHR display, |
| const VkDisplayModeCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkDisplayModeKHR *pMode) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->displayExtensionEnabled) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, |
| SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateDisplayModeKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| |
| lock.unlock(); |
| |
| // TODO more validation checks needed |
| if (!skip_call) { |
| result = my_data->instance_dispatch_table->CreateDisplayModeKHR(physicalDevice, display, pCreateInfo, pAllocator, pMode); |
| return result; |
| } |
| |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetDisplayPlaneCapabilitiesKHR(VkPhysicalDevice physicalDevice, VkDisplayModeKHR mode, |
| uint32_t planeIndex, VkDisplayPlaneCapabilitiesKHR *pCapabilities) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->displayExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, |
| "vkGetDisplayPlaneCapabilitiesKHR) called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| |
| if (!pPhysicalDevice->gotDisplayPlanePropertyCount) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_WARNING_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, |
| SWAPCHAIN_GET_SUPPORTED_DISPLAYS_WITHOUT_QUERY, swapchain_layer_name, |
| "Potential problem with calling vkGetDisplayPlaneCapabilitiesKHR() without first " |
| "querying vkGetPhysicalDeviceDisplayPlanePropertiesKHR."); |
| } |
| |
| if (pPhysicalDevice->gotDisplayPlanePropertyCount && planeIndex >= pPhysicalDevice->displayPlanePropertyCount) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, |
| SWAPCHAIN_PLANE_INDEX_TOO_LARGE, swapchain_layer_name, |
| "vkGetDisplayPlaneCapabilitiesKHR(): planeIndex must be in the range [0, %d] that was returned by " |
| "vkGetPhysicalDeviceDisplayPlanePropertiesKHR. Do you have the plane index hardcoded?", |
| pPhysicalDevice->displayPlanePropertyCount - 1); |
| } |
| |
| lock.unlock(); |
| |
| if (!skip_call) { |
| result = my_data->instance_dispatch_table->GetDisplayPlaneCapabilitiesKHR(physicalDevice, mode, planeIndex, pCapabilities); |
| return result; |
| } |
| |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL CreateDisplayPlaneSurfaceKHR(VkInstance instance, const VkDisplaySurfaceCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSurfaceKHR *pSurface) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = &(my_data->instanceMap[instance]); |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->displayExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateDisplayPlaneSurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| |
| // TODO more validation checks |
| if (!skip_call) { |
| // Call down the call chain: |
| lock.unlock(); |
| result = my_data->instance_dispatch_table->CreateDisplayPlaneSurfaceKHR(instance, pCreateInfo, pAllocator, pSurface); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| pInstance = &(my_data->instanceMap[instance]); |
| if ((result == VK_SUCCESS) && pInstance && pSurface) { |
| // Record the VkSurfaceKHR returned by the ICD: |
| my_data->surfaceMap[*pSurface].surface = *pSurface; |
| my_data->surfaceMap[*pSurface].pInstance = pInstance; |
| my_data->surfaceMap[*pSurface].usedAllocatorToCreate = (pAllocator != NULL); |
| my_data->surfaceMap[*pSurface].numQueueFamilyIndexSupport = 0; |
| my_data->surfaceMap[*pSurface].pQueueFamilyIndexSupport = NULL; |
| // Point to the associated SwpInstance: |
| pInstance->surfaces[*pSurface] = &my_data->surfaceMap[*pSurface]; |
| } |
| lock.unlock(); |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL DestroySurfaceKHR(VkInstance instance, VkSurfaceKHR surface, const VkAllocationCallbacks *pAllocator) { |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpSurface *pSurface = NULL; |
| { |
| auto it = my_data->surfaceMap.find(surface); |
| pSurface = (it == my_data->surfaceMap.end()) ? NULL : &it->second; |
| } |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the platform extension was enabled: |
| if (pInstance && !pInstance->surfaceExtensionEnabled) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkDestroySurfaceKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| |
| // Regardless of skip_call value, do some internal cleanup: |
| if (pSurface) { |
| // Delete the SwpSurface associated with this surface: |
| if (pSurface->pInstance) { |
| pSurface->pInstance->surfaces.erase(surface); |
| } |
| if (!pSurface->swapchains.empty()) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_DEL_OBJECT_BEFORE_CHILDREN, swapchain_layer_name, |
| "vkDestroySurfaceKHR() called before all of its associated VkSwapchainKHRs were destroyed."); |
| |
| // Empty and then delete all SwpSwapchains |
| for (auto it = pSurface->swapchains.begin(); it != pSurface->swapchains.end(); it++) { |
| // Delete all SwpImage's |
| it->second->images.clear(); |
| // In case the swapchain's device hasn't been destroyed yet |
| // (which isn't likely, but is possible), delete its |
| // association with this swapchain (i.e. so we can't point to |
| // this swpchain from that device, later on): |
| if (it->second->pDevice) { |
| it->second->pDevice->swapchains.clear(); |
| } |
| } |
| pSurface->swapchains.clear(); |
| } |
| if ((pAllocator != NULL) != pSurface->usedAllocatorToCreate) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(instance), __LINE__, SWAPCHAIN_INCOMPATIBLE_ALLOCATOR, swapchain_layer_name, |
| "vkDestroySurfaceKHR() called with incompatible pAllocator from when the object was created."); |
| } |
| my_data->surfaceMap.erase(surface); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| my_data->instance_dispatch_table->DestroySurfaceKHR(instance, surface, pAllocator); |
| } |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL EnumeratePhysicalDevices(VkInstance instance, uint32_t *pPhysicalDeviceCount, |
| VkPhysicalDevice *pPhysicalDevices) { |
| VkResult result = VK_SUCCESS; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->EnumeratePhysicalDevices(instance, pPhysicalDeviceCount, pPhysicalDevices); |
| |
| std::lock_guard<std::mutex> lock(global_lock); |
| SwpInstance *pInstance = NULL; |
| { |
| auto it = my_data->instanceMap.find(instance); |
| pInstance = (it == my_data->instanceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pInstance && pPhysicalDevices && (*pPhysicalDeviceCount > 0)) { |
| // Record the VkPhysicalDevices returned by the ICD: |
| for (uint32_t i = 0; i < *pPhysicalDeviceCount; i++) { |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].physicalDevice = pPhysicalDevices[i]; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].pInstance = pInstance; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].pDevice = NULL; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].gotQueueFamilyPropertyCount = false; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].gotSurfaceCapabilities = false; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].surfaceFormatCount = 0; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].pSurfaceFormats = NULL; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].presentModeCount = 0; |
| my_data->physicalDeviceMap[pPhysicalDevices[i]].pPresentModes = NULL; |
| // Point to the associated SwpInstance: |
| if (pInstance) { |
| pInstance->physicalDevices[pPhysicalDevices[i]] = &my_data->physicalDeviceMap[pPhysicalDevices[i]]; |
| } |
| } |
| } |
| return result; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL CreateDevice(VkPhysicalDevice physicalDevice, const VkDeviceCreateInfo *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkDevice *pDevice) { |
| layer_data *my_instance_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| VkLayerDeviceCreateInfo *chain_info = get_chain_info(pCreateInfo, VK_LAYER_LINK_INFO); |
| |
| assert(chain_info->u.pLayerInfo); |
| PFN_vkGetInstanceProcAddr fpGetInstanceProcAddr = chain_info->u.pLayerInfo->pfnNextGetInstanceProcAddr; |
| PFN_vkGetDeviceProcAddr fpGetDeviceProcAddr = chain_info->u.pLayerInfo->pfnNextGetDeviceProcAddr; |
| PFN_vkCreateDevice fpCreateDevice = (PFN_vkCreateDevice)fpGetInstanceProcAddr(my_instance_data->instance, "vkCreateDevice"); |
| if (fpCreateDevice == NULL) { |
| return VK_ERROR_INITIALIZATION_FAILED; |
| } |
| |
| // Advance the link info for the next element on the chain |
| chain_info->u.pLayerInfo = chain_info->u.pLayerInfo->pNext; |
| |
| VkResult result = fpCreateDevice(physicalDevice, pCreateInfo, pAllocator, pDevice); |
| if (result != VK_SUCCESS) { |
| return result; |
| } |
| |
| std::lock_guard<std::mutex> lock(global_lock); |
| layer_data *my_device_data = get_my_data_ptr(get_dispatch_key(*pDevice), layer_data_map); |
| |
| // Setup device dispatch table |
| my_device_data->device_dispatch_table = new VkLayerDispatchTable; |
| layer_init_device_dispatch_table(*pDevice, my_device_data->device_dispatch_table, fpGetDeviceProcAddr); |
| |
| my_device_data->report_data = layer_debug_report_create_device(my_instance_data->report_data, *pDevice); |
| checkDeviceRegisterExtensions(physicalDevice, pCreateInfo, *pDevice); |
| |
| return result; |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL DestroyDevice(VkDevice device, const VkAllocationCallbacks *pAllocator) { |
| dispatch_key key = get_dispatch_key(device); |
| layer_data *my_data = get_my_data_ptr(key, layer_data_map); |
| |
| // Call down the call chain: |
| my_data->device_dispatch_table->DestroyDevice(device, pAllocator); |
| |
| // Do some internal cleanup: |
| std::lock_guard<std::mutex> lock(global_lock); |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| if (pDevice) { |
| // Delete the SwpDevice associated with this device: |
| if (pDevice->pPhysicalDevice) { |
| pDevice->pPhysicalDevice->pDevice = NULL; |
| } |
| if (!pDevice->swapchains.empty()) { |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_DEL_OBJECT_BEFORE_CHILDREN, swapchain_layer_name, |
| "vkDestroyDevice() called before all of its associated VkSwapchainKHRs were destroyed."); |
| |
| // Empty and then delete all SwpSwapchain's |
| for (auto it = pDevice->swapchains.begin(); it != pDevice->swapchains.end(); it++) { |
| // Delete all SwpImage's |
| it->second->images.clear(); |
| // In case the swapchain's surface hasn't been destroyed yet |
| // (which is likely) delete its association with this swapchain |
| // (i.e. so we can't point to this swpchain from that surface, |
| // later on): |
| if (it->second->pSurface) { |
| it->second->pSurface->swapchains.clear(); |
| } |
| } |
| pDevice->swapchains.clear(); |
| } |
| my_data->deviceMap.erase(device); |
| } |
| delete my_data->device_dispatch_table; |
| layer_data_map.erase(key); |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetPhysicalDeviceSurfaceSupportKHR(VkPhysicalDevice physicalDevice, uint32_t queueFamilyIndex, |
| VkSurfaceKHR surface, VkBool32 *pSupported) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the surface extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->surfaceExtensionEnabled) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfaceSupportKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_SURFACE_EXTENSION_NAME); |
| } |
| if (!pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->physicalDevice), __LINE__, SWAPCHAIN_DID_NOT_QUERY_QUEUE_FAMILIES, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfaceSupportKHR() called before calling the vkGetPhysicalDeviceQueueFamilyProperties function."); |
| } else if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, queueFamilyIndex, pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkGetPhysicalDeviceSurfaceSupportKHR"); |
| } |
| |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceSurfaceSupportKHR(physicalDevice, queueFamilyIndex, surface, |
| pSupported); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pSupported && pPhysicalDevice) { |
| // Record the result of this query: |
| SwpInstance *pInstance = pPhysicalDevice->pInstance; |
| SwpSurface *pSurface = (pInstance) ? pInstance->surfaces[surface] : NULL; |
| if (pSurface) { |
| pPhysicalDevice->supportedSurfaces[surface] = pSurface; |
| if (!pSurface->numQueueFamilyIndexSupport) { |
| if (pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| pSurface->pQueueFamilyIndexSupport = |
| (VkBool32 *)malloc(pPhysicalDevice->numOfQueueFamilies * sizeof(VkBool32)); |
| if (pSurface->pQueueFamilyIndexSupport != NULL) { |
| pSurface->numQueueFamilyIndexSupport = pPhysicalDevice->numOfQueueFamilies; |
| } |
| } |
| } |
| if (pSurface->numQueueFamilyIndexSupport) { |
| pSurface->pQueueFamilyIndexSupport[queueFamilyIndex] = *pSupported; |
| } |
| } |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetPhysicalDeviceSurfaceCapabilitiesKHR(VkPhysicalDevice physicalDevice, VkSurfaceKHR surface, |
| VkSurfaceCapabilitiesKHR *pSurfaceCapabilities) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the surface extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->surfaceExtensionEnabled) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfaceCapabilitiesKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceSurfaceCapabilitiesKHR(physicalDevice, surface, |
| pSurfaceCapabilities); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pPhysicalDevice) { |
| // Record the result of this query: |
| pPhysicalDevice->gotSurfaceCapabilities = true; |
| // FIXME: NEED TO COPY THIS DATA, BECAUSE pSurfaceCapabilities POINTS TO APP-ALLOCATED DATA |
| pPhysicalDevice->surfaceCapabilities = *pSurfaceCapabilities; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetPhysicalDeviceSurfaceFormatsKHR(VkPhysicalDevice physicalDevice, VkSurfaceKHR surface, |
| uint32_t *pSurfaceFormatCount, |
| VkSurfaceFormatKHR *pSurfaceFormats) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the surface extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->surfaceExtensionEnabled) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfaceFormatsKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice && pSurfaceFormats) { |
| // Compare the preliminary value of *pSurfaceFormatCount with the value this time: |
| if (pPhysicalDevice->surfaceFormatCount == 0) { |
| // Since we haven't recorded a preliminary value of *pSurfaceFormatCount, that likely means that the application didn't |
| // previously call this function with a NULL value of pSurfaceFormats: |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_WARNING_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->physicalDevice), __LINE__, SWAPCHAIN_PRIOR_COUNT, swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfaceFormatsKHR() called with non-NULL pSurfaceFormatCount; but no prior positive " |
| "value has been seen for pSurfaceFormats."); |
| } else if (*pSurfaceFormatCount > pPhysicalDevice->surfaceFormatCount) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->physicalDevice), __LINE__, SWAPCHAIN_INVALID_COUNT, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfaceFormatsKHR() called with non-NULL pSurfaceFormatCount, and with pSurfaceFormats set to " |
| "a value (%d) that is greater than the value (%d) that was returned when pSurfaceFormatCount was NULL.", |
| *pSurfaceFormatCount, pPhysicalDevice->surfaceFormatCount); |
| } |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceSurfaceFormatsKHR(physicalDevice, surface, pSurfaceFormatCount, |
| pSurfaceFormats); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pPhysicalDevice && !pSurfaceFormats && pSurfaceFormatCount) { |
| // Record the result of this preliminary query: |
| pPhysicalDevice->surfaceFormatCount = *pSurfaceFormatCount; |
| } else if (((result == VK_SUCCESS) || (result == VK_INCOMPLETE)) && pPhysicalDevice && pSurfaceFormats && |
| pSurfaceFormatCount && (*pSurfaceFormatCount > 0)) { |
| // Record the result of this query: |
| |
| // Note: for poorly-written applications (e.g. that don't call this command |
| // twice, the first time with pSurfaceFormats set to NULL, and the second time |
| // with a non-NULL pSurfaceFormats and with the same count as returned the |
| // first time), record again the count when pSurfaceFormats is non-NULL: |
| pPhysicalDevice->surfaceFormatCount = *pSurfaceFormatCount; |
| pPhysicalDevice->pSurfaceFormats = (VkSurfaceFormatKHR *)malloc(*pSurfaceFormatCount * sizeof(VkSurfaceFormatKHR)); |
| if (pPhysicalDevice->pSurfaceFormats) { |
| for (uint32_t i = 0; i < *pSurfaceFormatCount; i++) { |
| pPhysicalDevice->pSurfaceFormats[i] = pSurfaceFormats[i]; |
| } |
| } else { |
| pPhysicalDevice->surfaceFormatCount = 0; |
| } |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetPhysicalDeviceSurfacePresentModesKHR(VkPhysicalDevice physicalDevice, VkSurfaceKHR surface, |
| uint32_t *pPresentModeCount, |
| VkPresentModeKHR *pPresentModes) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(physicalDevice), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpPhysicalDevice *pPhysicalDevice = NULL; |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the surface extension was enabled: |
| if (pPhysicalDevice && pPhysicalDevice->pInstance && !pPhysicalDevice->pInstance->surfaceExtensionEnabled) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_INSTANCE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->pInstance->instance), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfacePresentModesKHR() called even though the %s extension was not enabled for this VkInstance.", |
| VK_KHR_DISPLAY_EXTENSION_NAME); |
| } |
| if (pPhysicalDevice && pPresentModes) { |
| // Compare the preliminary value of *pPresentModeCount with the value this time: |
| if (pPhysicalDevice->presentModeCount == 0) { |
| // Since we haven't recorded a preliminary value of *pPresentModeCount, that likely means that the application didn't |
| // previously call this function with a NULL value of pPresentModes: |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_WARNING_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->physicalDevice), __LINE__, SWAPCHAIN_PRIOR_COUNT, swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfacePresentModesKHR() called with non-NULL pPresentModeCount; but no prior positive " |
| "value has been seen for pPresentModes."); |
| } else if (*pPresentModeCount > pPhysicalDevice->presentModeCount) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_PHYSICAL_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pPhysicalDevice->physicalDevice), __LINE__, SWAPCHAIN_INVALID_COUNT, |
| swapchain_layer_name, |
| "vkGetPhysicalDeviceSurfacePresentModesKHR() called with non-NULL pPresentModeCount, and with pPresentModes set to " |
| "a value (%d) that is greater than the value (%d) that was returned when pPresentModeCount was NULL.", |
| *pPresentModeCount, pPhysicalDevice->presentModeCount); |
| } |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->instance_dispatch_table->GetPhysicalDeviceSurfacePresentModesKHR(physicalDevice, surface, |
| pPresentModeCount, pPresentModes); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->physicalDeviceMap.find(physicalDevice); |
| pPhysicalDevice = (it == my_data->physicalDeviceMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pPhysicalDevice && !pPresentModes && pPresentModeCount) { |
| // Record the result of this preliminary query: |
| pPhysicalDevice->presentModeCount = *pPresentModeCount; |
| } else if (((result == VK_SUCCESS) || (result == VK_INCOMPLETE)) && pPhysicalDevice && |
| pPresentModes && pPresentModeCount && (*pPresentModeCount > 0)) { |
| // Record the result of this query: |
| |
| // Note: for poorly-written applications (e.g. that don't call this command |
| // twice, the first time with pPresentModes set to NULL, and the second time |
| // with a non-NULL pPresentModes and with the same count as returned the |
| // first time), record again the count when pPresentModes is non-NULL: |
| pPhysicalDevice->presentModeCount = *pPresentModeCount; |
| pPhysicalDevice->pPresentModes = (VkPresentModeKHR *)malloc(*pPresentModeCount * sizeof(VkPresentModeKHR)); |
| if (pPhysicalDevice->pPresentModes) { |
| for (uint32_t i = 0; i < *pPresentModeCount; i++) { |
| pPhysicalDevice->pPresentModes[i] = pPresentModes[i]; |
| } |
| } else { |
| pPhysicalDevice->presentModeCount = 0; |
| } |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| // This function does the up-front validation work for vkCreateSwapchainKHR(), |
| // and returns true if a logging callback indicates that the call down the |
| // chain should be skipped: |
| static bool validateCreateSwapchainKHR(VkDevice device, const VkSwapchainCreateInfoKHR *pCreateInfo, VkSwapchainKHR *pSwapchain) { |
| // TODO: Validate cases of re-creating a swapchain (the current code |
| // assumes a new swapchain is being created). |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| char fn[] = "vkCreateSwapchainKHR"; |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the swapchain extension was enabled: |
| if (pDevice && !pDevice->swapchainExtensionEnabled) { |
| return log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called even though the %s extension was not enabled for this VkDevice.", |
| VK_KHR_SWAPCHAIN_EXTENSION_NAME); |
| } |
| |
| // Keep around a useful pointer to pPhysicalDevice: |
| SwpPhysicalDevice *pPhysicalDevice = pDevice->pPhysicalDevice; |
| |
| // Validate pCreateInfo values with result of |
| // vkGetPhysicalDeviceQueueFamilyProperties |
| if (pPhysicalDevice && pPhysicalDevice->gotQueueFamilyPropertyCount) { |
| for (uint32_t i = 0; i < pCreateInfo->queueFamilyIndexCount; i++) { |
| skip_call |= ValidateQueueFamilyIndex(my_data, pCreateInfo->pQueueFamilyIndices[i], pPhysicalDevice->numOfQueueFamilies, |
| pPhysicalDevice->physicalDevice, "vkCreateSwapchainKHR"); |
| } |
| } |
| |
| // Validate pCreateInfo values with the results of |
| // vkGetPhysicalDeviceSurfaceCapabilitiesKHR(): |
| if (!pPhysicalDevice || !pPhysicalDevice->gotSurfaceCapabilities) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_WITHOUT_QUERY, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called before calling vkGetPhysicalDeviceSurfaceCapabilitiesKHR()."); |
| } else if (pCreateInfo) { |
| // Validate pCreateInfo->surface to make sure that |
| // vkGetPhysicalDeviceSurfaceSupportKHR() reported this as a supported |
| // surface: |
| SwpSurface *pSurface = ((pPhysicalDevice) ? pPhysicalDevice->supportedSurfaces[pCreateInfo->surface] : NULL); |
| if (!pSurface) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_UNSUPPORTED_SURFACE, swapchain_layer_name, |
| "The surface in pCreateInfo->surface, that was given to vkCreateSwapchainKHR(), must be a surface " |
| "that is supported by the device as determined by vkGetPhysicalDeviceSurfaceSupportKHR(). " |
| "However, vkGetPhysicalDeviceSurfaceSupportKHR() was never called with this surface."); |
| } |
| |
| // Validate pCreateInfo->minImageCount against |
| // VkSurfaceCapabilitiesKHR::{min|max}ImageCount: |
| VkSurfaceCapabilitiesKHR *pCapabilities = &pPhysicalDevice->surfaceCapabilities; |
| if ((pCreateInfo->minImageCount < pCapabilities->minImageCount) || |
| ((pCapabilities->maxImageCount > 0) && (pCreateInfo->minImageCount > pCapabilities->maxImageCount))) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_MIN_IMG_COUNT, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with pCreateInfo->minImageCount = %d, which is outside the bounds returned " |
| "by vkGetPhysicalDeviceSurfaceCapabilitiesKHR() (i.e. minImageCount = %d, maxImageCount = %d).", |
| pCreateInfo->minImageCount, pCapabilities->minImageCount, pCapabilities->maxImageCount); |
| } |
| // Validate pCreateInfo->imageExtent against |
| // VkSurfaceCapabilitiesKHR::{current|min|max}ImageExtent: |
| if ((pCapabilities->currentExtent.width == -1) && |
| ((pCreateInfo->imageExtent.width < pCapabilities->minImageExtent.width) || |
| (pCreateInfo->imageExtent.width > pCapabilities->maxImageExtent.width) || |
| (pCreateInfo->imageExtent.height < pCapabilities->minImageExtent.height) || |
| (pCreateInfo->imageExtent.height > pCapabilities->maxImageExtent.height))) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_OUT_OF_BOUNDS_EXTENTS, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with pCreateInfo->imageExtent = (%d,%d), which is outside the " |
| "bounds returned by vkGetPhysicalDeviceSurfaceCapabilitiesKHR(): currentExtent = (%d,%d), " |
| "minImageExtent = (%d,%d), maxImageExtent = (%d,%d).", |
| pCreateInfo->imageExtent.width, pCreateInfo->imageExtent.height, pCapabilities->currentExtent.width, |
| pCapabilities->currentExtent.height, pCapabilities->minImageExtent.width, pCapabilities->minImageExtent.height, |
| pCapabilities->maxImageExtent.width, pCapabilities->maxImageExtent.height); |
| } |
| if ((pCapabilities->currentExtent.width != -1) && |
| ((pCreateInfo->imageExtent.width != pCapabilities->currentExtent.width) || |
| (pCreateInfo->imageExtent.height != pCapabilities->currentExtent.height))) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_EXTENTS_NO_MATCH_WIN, |
| swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with pCreateInfo->imageExtent = (%d,%d), which is not equal to the " |
| "currentExtent = (%d,%d) returned by vkGetPhysicalDeviceSurfaceCapabilitiesKHR().", |
| pCreateInfo->imageExtent.width, pCreateInfo->imageExtent.height, |
| pCapabilities->currentExtent.width, pCapabilities->currentExtent.height); |
| } |
| // Validate pCreateInfo->preTransform has one bit set (1st two |
| // lines of if-statement), which bit is also set in |
| // VkSurfaceCapabilitiesKHR::supportedTransforms (3rd line of if-statement): |
| if (!pCreateInfo->preTransform || (pCreateInfo->preTransform & (pCreateInfo->preTransform - 1)) || |
| !(pCreateInfo->preTransform & pCapabilities->supportedTransforms)) { |
| // This is an error situation; one for which we'd like to give |
| // the developer a helpful, multi-line error message. Build it |
| // up a little at a time, and then log it: |
| std::string errorString = ""; |
| char str[1024]; |
| // Here's the first part of the message: |
| sprintf(str, "%s() called with a non-supported " |
| "pCreateInfo->preTransform (i.e. %s). " |
| "Supported values are:\n", |
| fn, surfaceTransformStr(pCreateInfo->preTransform)); |
| errorString += str; |
| for (int i = 0; i < 32; i++) { |
| // Build up the rest of the message: |
| if ((1 << i) & pCapabilities->supportedTransforms) { |
| const char *newStr = surfaceTransformStr((VkSurfaceTransformFlagBitsKHR)(1 << i)); |
| sprintf(str, " %s\n", newStr); |
| errorString += str; |
| } |
| } |
| // Log the message that we've built up: |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t &>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_PRE_TRANSFORM, |
| LAYER_NAME, "%s", errorString.c_str()); |
| } |
| // Validate pCreateInfo->compositeAlpha has one bit set (1st two |
| // lines of if-statement), which bit is also set in |
| // VkSurfaceCapabilitiesKHR::supportedCompositeAlpha (3rd line of if-statement): |
| if (!pCreateInfo->compositeAlpha || (pCreateInfo->compositeAlpha & (pCreateInfo->compositeAlpha - 1)) || |
| !((pCreateInfo->compositeAlpha) & pCapabilities->supportedCompositeAlpha)) { |
| // This is an error situation; one for which we'd like to give |
| // the developer a helpful, multi-line error message. Build it |
| // up a little at a time, and then log it: |
| std::string errorString = ""; |
| char str[1024]; |
| // Here's the first part of the message: |
| sprintf(str, "%s() called with a non-supported " |
| "pCreateInfo->compositeAlpha (i.e. %s). " |
| "Supported values are:\n", |
| fn, surfaceCompositeAlphaStr(pCreateInfo->compositeAlpha)); |
| errorString += str; |
| for (int i = 0; i < 32; i++) { |
| // Build up the rest of the message: |
| if ((1 << i) & pCapabilities->supportedCompositeAlpha) { |
| const char *newStr = surfaceCompositeAlphaStr((VkCompositeAlphaFlagBitsKHR)(1 << i)); |
| sprintf(str, " %s\n", newStr); |
| errorString += str; |
| } |
| } |
| // Log the message that we've built up: |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t &>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_COMPOSITE_ALPHA, |
| LAYER_NAME, "%s", errorString.c_str()); |
| } |
| // Validate pCreateInfo->imageArrayLayers against |
| // VkSurfaceCapabilitiesKHR::maxImageArrayLayers: |
| if ((pCreateInfo->imageArrayLayers < 1) || (pCreateInfo->imageArrayLayers > pCapabilities->maxImageArrayLayers)) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_IMG_ARRAY_LAYERS, |
| swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a non-supported pCreateInfo->imageArrayLayers (i.e. %d). " |
| "Minimum value is 1, maximum value is %d.", |
| pCreateInfo->imageArrayLayers, pCapabilities->maxImageArrayLayers); |
| } |
| // Validate pCreateInfo->imageUsage against |
| // VkSurfaceCapabilitiesKHR::supportedUsageFlags: |
| if (pCreateInfo->imageUsage != (pCreateInfo->imageUsage & pCapabilities->supportedUsageFlags)) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_IMG_USAGE_FLAGS, |
| swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a non-supported pCreateInfo->imageUsage (i.e. 0x%08x). " |
| "Supported flag bits are 0x%08x.", |
| pCreateInfo->imageUsage, pCapabilities->supportedUsageFlags); |
| } |
| } |
| |
| // Validate pCreateInfo values with the results of |
| // vkGetPhysicalDeviceSurfaceFormatsKHR(): |
| if (!pPhysicalDevice || !pPhysicalDevice->surfaceFormatCount) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_WITHOUT_QUERY, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called before calling vkGetPhysicalDeviceSurfaceFormatsKHR()."); |
| } else if (pCreateInfo) { |
| // Validate pCreateInfo->imageFormat against |
| // VkSurfaceFormatKHR::format: |
| bool foundFormat = false; |
| bool foundColorSpace = false; |
| bool foundMatch = false; |
| for (uint32_t i = 0; i < pPhysicalDevice->surfaceFormatCount; i++) { |
| if (pCreateInfo->imageFormat == pPhysicalDevice->pSurfaceFormats[i].format) { |
| // Validate pCreateInfo->imageColorSpace against |
| // VkSurfaceFormatKHR::colorSpace: |
| foundFormat = true; |
| if (pCreateInfo->imageColorSpace == pPhysicalDevice->pSurfaceFormats[i].colorSpace) { |
| foundMatch = true; |
| break; |
| } |
| } else { |
| if (pCreateInfo->imageColorSpace == pPhysicalDevice->pSurfaceFormats[i].colorSpace) { |
| foundColorSpace = true; |
| } |
| } |
| } |
| if (!foundMatch) { |
| if (!foundFormat) { |
| if (!foundColorSpace) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, |
| VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, reinterpret_cast<uint64_t>(device), __LINE__, |
| SWAPCHAIN_CREATE_SWAP_BAD_IMG_FMT_CLR_SP, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with neither a supported pCreateInfo->imageFormat " |
| "(i.e. %d) nor a supported " |
| "pCreateInfo->imageColorSpace (i.e. %d).", |
| pCreateInfo->imageFormat, pCreateInfo->imageColorSpace); |
| } else { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, |
| VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, reinterpret_cast<uint64_t>(device), __LINE__, |
| SWAPCHAIN_CREATE_SWAP_BAD_IMG_FORMAT, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a non-supported pCreateInfo->imageFormat (i.e. %d)", |
| pCreateInfo->imageFormat); |
| } |
| } else if (!foundColorSpace) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_IMG_COLOR_SPACE, |
| swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a non-supported pCreateInfo->imageColorSpace (i.e. %d).", |
| pCreateInfo->imageColorSpace); |
| } |
| } |
| } |
| |
| // Validate pCreateInfo values with the results of |
| // vkGetPhysicalDeviceSurfacePresentModesKHR(): |
| if (!pPhysicalDevice || !pPhysicalDevice->presentModeCount) { |
| if (!pCreateInfo || (pCreateInfo->presentMode != VK_PRESENT_MODE_FIFO_KHR)) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_WITHOUT_QUERY, |
| swapchain_layer_name, "vkCreateSwapchainKHR() called before calling " |
| "vkGetPhysicalDeviceSurfacePresentModesKHR()."); |
| } |
| } else if (pCreateInfo) { |
| // Validate pCreateInfo->presentMode against |
| // vkGetPhysicalDeviceSurfacePresentModesKHR(): |
| bool foundMatch = false; |
| for (uint32_t i = 0; i < pPhysicalDevice->presentModeCount; i++) { |
| if (pPhysicalDevice->pPresentModes[i] == pCreateInfo->presentMode) { |
| foundMatch = true; |
| break; |
| } |
| } |
| if (!foundMatch) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_PRESENT_MODE, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a non-supported pCreateInfo->presentMode (i.e. %s).", |
| presentModeStr(pCreateInfo->presentMode)); |
| } |
| } |
| |
| // Validate pCreateInfo->imageSharingMode and related values: |
| if (pCreateInfo->imageSharingMode == VK_SHARING_MODE_CONCURRENT) { |
| if ((pCreateInfo->queueFamilyIndexCount <= 1) || !pCreateInfo->pQueueFamilyIndices) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_SHARING_VALUES, |
| swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a supported pCreateInfo->sharingMode of (i.e. %s), but with a " |
| "bad value(s) for pCreateInfo->queueFamilyIndexCount or pCreateInfo->pQueueFamilyIndices).", |
| sharingModeStr(pCreateInfo->imageSharingMode)); |
| } |
| } else if (pCreateInfo->imageSharingMode != VK_SHARING_MODE_EXCLUSIVE) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_BAD_SHARING_MODE, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a non-supported pCreateInfo->imageSharingMode (i.e. %s).", |
| sharingModeStr(pCreateInfo->imageSharingMode)); |
| } |
| |
| // Validate pCreateInfo->clipped: |
| if (pCreateInfo && (pCreateInfo->clipped != VK_FALSE) && (pCreateInfo->clipped != VK_TRUE)) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_BAD_BOOL, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a VkBool32 value that is neither VK_TRUE nor VK_FALSE, but " |
| "has the numeric value of %d.", |
| pCreateInfo->clipped); |
| } |
| |
| // Validate pCreateInfo->oldSwapchain: |
| if (pCreateInfo && pCreateInfo->oldSwapchain) { |
| SwpSwapchain *pOldSwapchain = NULL; |
| { |
| auto it = my_data->swapchainMap.find(pCreateInfo->oldSwapchain); |
| pOldSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if (pOldSwapchain) { |
| if (device != pOldSwapchain->pDevice->device) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_DESTROY_SWAP_DIFF_DEVICE, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with a different VkDevice than the VkSwapchainKHR was created with."); |
| } |
| if (pCreateInfo->surface != pOldSwapchain->pSurface->surface) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_CREATE_SWAP_DIFF_SURFACE, swapchain_layer_name, |
| "vkCreateSwapchainKHR() called with pCreateInfo->oldSwapchain pCreateInfo->surface."); |
| } |
| } |
| } |
| |
| return skip_call; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL CreateSwapchainKHR(VkDevice device, const VkSwapchainCreateInfoKHR *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, VkSwapchainKHR *pSwapchain) { |
| VkResult result = VK_SUCCESS; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| bool skip_call = validateCreateSwapchainKHR(device, pCreateInfo, pSwapchain); |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->device_dispatch_table->CreateSwapchainKHR(device, pCreateInfo, pAllocator, pSwapchain); |
| lock.lock(); |
| |
| if (result == VK_SUCCESS) { |
| // Remember the swapchain's handle, and link it to the device: |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| |
| my_data->swapchainMap[*pSwapchain].swapchain = *pSwapchain; |
| if (pDevice) { |
| pDevice->swapchains[*pSwapchain] = &my_data->swapchainMap[*pSwapchain]; |
| } |
| my_data->swapchainMap[*pSwapchain].pDevice = pDevice; |
| my_data->swapchainMap[*pSwapchain].imageCount = 0; |
| my_data->swapchainMap[*pSwapchain].usedAllocatorToCreate = (pAllocator != NULL); |
| // Store a pointer to the surface |
| SwpPhysicalDevice *pPhysicalDevice = pDevice->pPhysicalDevice; |
| SwpInstance *pInstance = (pPhysicalDevice) ? pPhysicalDevice->pInstance : NULL; |
| layer_data *my_instance_data = |
| ((pInstance) ? get_my_data_ptr(get_dispatch_key(pInstance->instance), layer_data_map) : NULL); |
| SwpSurface *pSurface = ((my_data && pCreateInfo) ? &my_instance_data->surfaceMap[pCreateInfo->surface] : NULL); |
| my_data->swapchainMap[*pSwapchain].pSurface = pSurface; |
| if (pSurface) { |
| pSurface->swapchains[*pSwapchain] = &my_data->swapchainMap[*pSwapchain]; |
| } |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL DestroySwapchainKHR(VkDevice device, VkSwapchainKHR swapchain, const VkAllocationCallbacks *pAllocator) { |
| // TODOs: |
| // |
| // - Implement a check for validity language that reads: All uses of |
| // presentable images acquired from pname:swapchain must: have completed |
| // execution |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the swapchain extension was enabled: |
| if (pDevice && !pDevice->swapchainExtensionEnabled) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkDestroySwapchainKHR() called even though the %s extension was not enabled for this VkDevice.", |
| VK_KHR_SWAPCHAIN_EXTENSION_NAME); |
| } |
| |
| // Regardless of skip_call value, do some internal cleanup: |
| SwpSwapchain *pSwapchain = NULL; |
| { |
| auto it = my_data->swapchainMap.find(swapchain); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if (pSwapchain) { |
| // Delete the SwpSwapchain associated with this swapchain: |
| if (pSwapchain->pDevice) { |
| pSwapchain->pDevice->swapchains.erase(swapchain); |
| if (device != pSwapchain->pDevice->device) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_DESTROY_SWAP_DIFF_DEVICE, swapchain_layer_name, |
| "vkDestroySwapchainKHR() called with a different VkDevice than the VkSwapchainKHR was created with."); |
| } |
| } |
| if (pSwapchain->pSurface) { |
| pSwapchain->pSurface->swapchains.erase(swapchain); |
| } |
| if (pSwapchain->imageCount) { |
| pSwapchain->images.clear(); |
| } |
| if ((pAllocator != NULL) != pSwapchain->usedAllocatorToCreate) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_INCOMPATIBLE_ALLOCATOR, swapchain_layer_name, |
| "vkDestroySwapchainKHR() called with incompatible pAllocator from when the object was created."); |
| } |
| my_data->swapchainMap.erase(swapchain); |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| my_data->device_dispatch_table->DestroySwapchainKHR(device, swapchain, pAllocator); |
| } |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL GetSwapchainImagesKHR(VkDevice device, VkSwapchainKHR swapchain, uint32_t *pSwapchainImageCount, |
| VkImage *pSwapchainImages) { |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the swapchain extension was enabled: |
| if (pDevice && !pDevice->swapchainExtensionEnabled) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkGetSwapchainImagesKHR() called even though the %s extension was not enabled for this VkDevice.", |
| VK_KHR_SWAPCHAIN_EXTENSION_NAME); |
| } |
| SwpSwapchain *pSwapchain = NULL; |
| { |
| auto it = my_data->swapchainMap.find(swapchain); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if (pSwapchain && pSwapchainImages) { |
| // Compare the preliminary value of *pSwapchainImageCount with the value this time: |
| if (pSwapchain->imageCount == 0) { |
| // Since we haven't recorded a preliminary value of *pSwapchainImageCount, that likely means that the application didn't |
| // previously call this function with a NULL value of pSwapchainImages: |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_WARNING_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_PRIOR_COUNT, swapchain_layer_name, |
| "vkGetSwapchainImagesKHR() called with non-NULL pSwapchainImageCount; but no prior positive " |
| "value has been seen for pSwapchainImages."); |
| } else if (*pSwapchainImageCount > pSwapchain->imageCount) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_INVALID_COUNT, swapchain_layer_name, |
| "vkGetSwapchainImagesKHR() called with non-NULL pSwapchainImageCount, and with " |
| "pSwapchainImages set to a value (%d) that is greater than the value (%d) that was returned when " |
| "pSwapchainImageCount was NULL.", |
| *pSwapchainImageCount, pSwapchain->imageCount); |
| } |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->device_dispatch_table->GetSwapchainImagesKHR(device, swapchain, pSwapchainImageCount, pSwapchainImages); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->swapchainMap.find(swapchain); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if ((result == VK_SUCCESS) && pSwapchain && !pSwapchainImages && pSwapchainImageCount) { |
| // Record the result of this preliminary query: |
| pSwapchain->imageCount = *pSwapchainImageCount; |
| } else if ((result == VK_SUCCESS) && pSwapchain && pSwapchainImages && pSwapchainImageCount && |
| (*pSwapchainImageCount > 0)) { |
| // Record the images and their state: |
| pSwapchain->imageCount = *pSwapchainImageCount; |
| for (uint32_t i = 0; i < *pSwapchainImageCount; i++) { |
| pSwapchain->images[i].image = pSwapchainImages[i]; |
| pSwapchain->images[i].pSwapchain = pSwapchain; |
| pSwapchain->images[i].acquiredByApp = false; |
| } |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL AcquireNextImageKHR(VkDevice device, VkSwapchainKHR swapchain, uint64_t timeout, |
| VkSemaphore semaphore, VkFence fence, uint32_t *pImageIndex) { |
| // TODOs: |
| // |
| // - Address the timeout. Possibilities include looking at the state of the |
| // swapchain's images, depending on the timeout value. |
| // - Implement a check for validity language that reads: If pname:semaphore is |
| // not sname:VK_NULL_HANDLE it must: be unsignalled |
| // - Implement a check for validity language that reads: If pname:fence is not |
| // sname:VK_NULL_HANDLE it must: be unsignalled and mustnot: be associated |
| // with any other queue command that has not yet completed execution on that |
| // queue |
| // - Record/update the state of the swapchain, in case an error occurs |
| // (e.g. VK_ERROR_OUT_OF_DATE_KHR). |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| std::unique_lock<std::mutex> lock(global_lock); |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| |
| // Validate that the swapchain extension was enabled: |
| if (pDevice && !pDevice->swapchainExtensionEnabled) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkAcquireNextImageKHR() called even though the %s extension was not enabled for this VkDevice.", |
| VK_KHR_SWAPCHAIN_EXTENSION_NAME); |
| } |
| if ((semaphore == VK_NULL_HANDLE) && (fence == VK_NULL_HANDLE)) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_NO_SYNC_FOR_ACQUIRE, swapchain_layer_name, |
| "vkAcquireNextImageKHR() called with both the semaphore and fence parameters set to VK_NULL_HANDLE (at " |
| "least one should be used)."); |
| } |
| SwpSwapchain *pSwapchain = NULL; |
| { |
| auto it = my_data->swapchainMap.find(swapchain); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| SwpPhysicalDevice *pPhysicalDevice = pDevice->pPhysicalDevice; |
| if (pSwapchain && pPhysicalDevice && pPhysicalDevice->gotSurfaceCapabilities) { |
| // Look to see if the application has already acquired the maximum |
| // number of images, and this will push it past the spec-defined |
| // limits: |
| uint32_t minImageCount = pPhysicalDevice->surfaceCapabilities.minImageCount; |
| uint32_t imagesAcquiredByApp = 0; |
| for (uint32_t i = 0; i < pSwapchain->imageCount; i++) { |
| if (pSwapchain->images[i].acquiredByApp) { |
| imagesAcquiredByApp++; |
| } |
| } |
| if (imagesAcquiredByApp > (pSwapchain->imageCount - minImageCount)) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(device), __LINE__, SWAPCHAIN_APP_ACQUIRES_TOO_MANY_IMAGES, swapchain_layer_name, |
| "vkAcquireNextImageKHR() called when it cannot succeed. The application has acquired %d image(s) that have not " |
| "yet " |
| "been presented. The maximum number of images that the application can simultaneously acquire from this swapchain " |
| "(including this call to vkCreateSwapchainKHR()) is %d. That value is derived by subtracting " |
| "VkSurfaceCapabilitiesKHR::minImageCount (%d) from the number of images in the swapchain (%d) and adding 1.", |
| imagesAcquiredByApp, (pSwapchain->imageCount - minImageCount + 1), minImageCount, pSwapchain->imageCount); |
| } |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->device_dispatch_table->AcquireNextImageKHR(device, swapchain, timeout, semaphore, fence, pImageIndex); |
| lock.lock(); |
| |
| // Obtain this pointer again after locking: |
| { |
| auto it = my_data->swapchainMap.find(swapchain); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if (((result == VK_SUCCESS) || (result == VK_SUBOPTIMAL_KHR)) && pSwapchain) { |
| // Change the state of the image (now acquired by the application): |
| pSwapchain->images[*pImageIndex].acquiredByApp = true; |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL QueuePresentKHR(VkQueue queue, const VkPresentInfoKHR *pPresentInfo) { |
| // TODOs: |
| // |
| // - Implement a check for validity language that reads: Any given element of |
| // sname:VkSemaphore in pname:pWaitSemaphores must: refer to a prior signal |
| // of that sname:VkSemaphore that won't be consumed by any other wait on that |
| // semaphore |
| // - Record/update the state of the swapchain, in case an error occurs |
| // (e.g. VK_ERROR_OUT_OF_DATE_KHR). |
| VkResult result = VK_SUCCESS; |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(queue), layer_data_map); |
| |
| // Note: pPresentInfo->pResults is allowed to be NULL |
| |
| std::unique_lock<std::mutex> lock(global_lock); |
| for (uint32_t i = 0; pPresentInfo && (i < pPresentInfo->swapchainCount); i++) { |
| uint32_t index = pPresentInfo->pImageIndices[i]; |
| SwpSwapchain *pSwapchain = NULL; |
| { |
| auto it = my_data->swapchainMap.find(pPresentInfo->pSwapchains[i]); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if (pSwapchain) { |
| if (!pSwapchain->pDevice->swapchainExtensionEnabled) { |
| skip_call |= log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_DEVICE_EXT, |
| reinterpret_cast<uint64_t>(pSwapchain->pDevice->device), __LINE__, |
| SWAPCHAIN_EXT_NOT_ENABLED_BUT_USED, swapchain_layer_name, |
| "vkQueuePresentKHR() called even though the %s extension was not enabled for this VkDevice.", |
| VK_KHR_SWAPCHAIN_EXTENSION_NAME); |
| } |
| if (index >= pSwapchain->imageCount) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_SWAPCHAIN_KHR_EXT, |
| reinterpret_cast<const uint64_t &>(pPresentInfo->pSwapchains[i]), __LINE__, SWAPCHAIN_INDEX_TOO_LARGE, |
| swapchain_layer_name, |
| "vkQueuePresentKHR() called for an index that is too large (i.e. %d). There are only %d images in " |
| "this VkSwapchainKHR.", |
| index, pSwapchain->imageCount); |
| } else { |
| if (!pSwapchain->images[index].acquiredByApp) { |
| skip_call |= log_msg( |
| my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_SWAPCHAIN_KHR_EXT, |
| reinterpret_cast<const uint64_t &>(pPresentInfo->pSwapchains[i]), __LINE__, SWAPCHAIN_INDEX_NOT_IN_USE, |
| swapchain_layer_name, |
| "vkQueuePresentKHR() returned an index (i.e. %d) for an image that is not acquired by the application.", |
| index); |
| } |
| } |
| SwpQueue *pQueue = NULL; |
| { |
| auto it = my_data->queueMap.find(queue); |
| pQueue = (it == my_data->queueMap.end()) ? NULL : &it->second; |
| } |
| SwpSurface *pSurface = pSwapchain->pSurface; |
| if (pQueue && pSurface && pSurface->numQueueFamilyIndexSupport) { |
| uint32_t queueFamilyIndex = pQueue->queueFamilyIndex; |
| // Note: the 1st test is to ensure queueFamilyIndex is in range, |
| // and the 2nd test is the validation check: |
| if ((pSurface->numQueueFamilyIndexSupport > queueFamilyIndex) && |
| (!pSurface->pQueueFamilyIndexSupport[queueFamilyIndex])) { |
| skip_call |= |
| log_msg(my_data->report_data, VK_DEBUG_REPORT_ERROR_BIT_EXT, VK_DEBUG_REPORT_OBJECT_TYPE_SWAPCHAIN_KHR_EXT, |
| reinterpret_cast<const uint64_t &>(pPresentInfo->pSwapchains[i]), __LINE__, |
| SWAPCHAIN_SURFACE_NOT_SUPPORTED_WITH_QUEUE, swapchain_layer_name, |
| "vkQueuePresentKHR() called with a swapchain whose surface is not supported for presention " |
| "on this device with the queueFamilyIndex (i.e. %d) of the given queue.", |
| queueFamilyIndex); |
| } |
| } |
| } |
| } |
| lock.unlock(); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| result = my_data->device_dispatch_table->QueuePresentKHR(queue, pPresentInfo); |
| lock.lock(); |
| |
| if (pPresentInfo && ((result == VK_SUCCESS) || (result == VK_SUBOPTIMAL_KHR))) { |
| for (uint32_t i = 0; i < pPresentInfo->swapchainCount; i++) { |
| int index = pPresentInfo->pImageIndices[i]; |
| SwpSwapchain *pSwapchain = NULL; |
| { |
| auto it = my_data->swapchainMap.find(pPresentInfo->pSwapchains[i]); |
| pSwapchain = (it == my_data->swapchainMap.end()) ? NULL : &it->second; |
| } |
| if (pSwapchain) { |
| // Change the state of the image (no longer acquired by the |
| // application): |
| pSwapchain->images[index].acquiredByApp = false; |
| } |
| } |
| } |
| lock.unlock(); |
| |
| return result; |
| } |
| return VK_ERROR_VALIDATION_FAILED_EXT; |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL GetDeviceQueue(VkDevice device, uint32_t queueFamilyIndex, uint32_t queueIndex, VkQueue *pQueue) { |
| bool skip_call = false; |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| |
| if (!skip_call) { |
| // Call down the call chain: |
| my_data->device_dispatch_table->GetDeviceQueue(device, queueFamilyIndex, queueIndex, pQueue); |
| |
| // Remember the queue's handle, and link it to the device: |
| std::lock_guard<std::mutex> lock(global_lock); |
| SwpDevice *pDevice = NULL; |
| { |
| auto it = my_data->deviceMap.find(device); |
| pDevice = (it == my_data->deviceMap.end()) ? NULL : &it->second; |
| } |
| my_data->queueMap[&pQueue].queue = *pQueue; |
| if (pDevice) { |
| pDevice->queues[*pQueue] = &my_data->queueMap[*pQueue]; |
| } |
| my_data->queueMap[&pQueue].pDevice = pDevice; |
| my_data->queueMap[&pQueue].queueFamilyIndex = queueFamilyIndex; |
| } |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL CreateDebugReportCallbackEXT(VkInstance instance, |
| const VkDebugReportCallbackCreateInfoEXT *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, |
| VkDebugReportCallbackEXT *pMsgCallback) { |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| VkResult result = |
| my_data->instance_dispatch_table->CreateDebugReportCallbackEXT(instance, pCreateInfo, pAllocator, pMsgCallback); |
| if (VK_SUCCESS == result) { |
| std::lock_guard<std::mutex> lock(global_lock); |
| result = layer_create_msg_callback(my_data->report_data, false, pCreateInfo, pAllocator, pMsgCallback); |
| } |
| return result; |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL DestroyDebugReportCallbackEXT(VkInstance instance, VkDebugReportCallbackEXT msgCallback, |
| const VkAllocationCallbacks *pAllocator) { |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| my_data->instance_dispatch_table->DestroyDebugReportCallbackEXT(instance, msgCallback, pAllocator); |
| std::lock_guard<std::mutex> lock(global_lock); |
| layer_destroy_msg_callback(my_data->report_data, msgCallback, pAllocator); |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL DebugReportMessageEXT(VkInstance instance, VkDebugReportFlagsEXT flags, |
| VkDebugReportObjectTypeEXT objType, uint64_t object, size_t location, |
| int32_t msgCode, const char *pLayerPrefix, const char *pMsg) { |
| layer_data *my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| my_data->instance_dispatch_table->DebugReportMessageEXT(instance, flags, objType, object, location, msgCode, pLayerPrefix, |
| pMsg); |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL EnumerateInstanceLayerProperties(uint32_t *pCount, VkLayerProperties *pProperties) { |
| return util_GetLayerProperties(1, &swapchain_layer, pCount, pProperties); |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL EnumerateDeviceLayerProperties(VkPhysicalDevice physicalDevice, uint32_t *pCount, |
| VkLayerProperties *pProperties) { |
| return util_GetLayerProperties(1, &swapchain_layer, pCount, pProperties); |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL EnumerateInstanceExtensionProperties(const char *pLayerName, uint32_t *pCount, |
| VkExtensionProperties *pProperties) { |
| if (pLayerName && !strcmp(pLayerName, swapchain_layer.layerName)) |
| return util_GetExtensionProperties(1, instance_extensions, pCount, pProperties); |
| |
| return VK_ERROR_LAYER_NOT_PRESENT; |
| } |
| |
| VKAPI_ATTR VkResult VKAPI_CALL EnumerateDeviceExtensionProperties(VkPhysicalDevice physicalDevice, const char *pLayerName, |
| uint32_t *pCount, VkExtensionProperties *pProperties) { |
| if (pLayerName && !strcmp(pLayerName, swapchain_layer.layerName)) |
| return util_GetExtensionProperties(0, nullptr, pCount, pProperties); |
| |
| assert(physicalDevice); |
| |
| dispatch_key key = get_dispatch_key(physicalDevice); |
| layer_data *my_data = get_my_data_ptr(key, layer_data_map); |
| return my_data->instance_dispatch_table->EnumerateDeviceExtensionProperties(physicalDevice, NULL, pCount, pProperties); |
| } |
| |
| static PFN_vkVoidFunction intercept_core_instance_command(const char *name); |
| |
| static PFN_vkVoidFunction intercept_khr_surface_command(const char *name, VkInstance instance); |
| |
| static PFN_vkVoidFunction intercept_core_device_command(const char *name); |
| |
| static PFN_vkVoidFunction intercept_khr_swapchain_command(const char *name, VkDevice dev); |
| |
| VKAPI_ATTR PFN_vkVoidFunction VKAPI_CALL GetDeviceProcAddr(VkDevice device, const char *funcName) { |
| PFN_vkVoidFunction proc = intercept_core_device_command(funcName); |
| if (proc) |
| return proc; |
| |
| assert(device); |
| |
| layer_data *my_data; |
| |
| my_data = get_my_data_ptr(get_dispatch_key(device), layer_data_map); |
| VkLayerDispatchTable *pDisp = my_data->device_dispatch_table; |
| |
| proc = intercept_khr_swapchain_command(funcName, device); |
| if (proc) |
| return proc; |
| |
| if (pDisp->GetDeviceProcAddr == NULL) |
| return NULL; |
| return pDisp->GetDeviceProcAddr(device, funcName); |
| } |
| |
| VKAPI_ATTR PFN_vkVoidFunction VKAPI_CALL GetInstanceProcAddr(VkInstance instance, const char *funcName) { |
| PFN_vkVoidFunction proc = intercept_core_instance_command(funcName); |
| if (!proc) |
| proc = intercept_core_device_command(funcName); |
| if (!proc) |
| proc = intercept_khr_swapchain_command(funcName, VK_NULL_HANDLE); |
| if (proc) |
| return proc; |
| |
| assert(instance); |
| |
| layer_data *my_data; |
| my_data = get_my_data_ptr(get_dispatch_key(instance), layer_data_map); |
| VkLayerInstanceDispatchTable *pTable = my_data->instance_dispatch_table; |
| |
| proc = debug_report_get_instance_proc_addr(my_data->report_data, funcName); |
| if (!proc) |
| proc = intercept_khr_surface_command(funcName, instance); |
| if (proc) |
| return proc; |
| |
| if (pTable->GetInstanceProcAddr == NULL) |
| return NULL; |
| return pTable->GetInstanceProcAddr(instance, funcName); |
| } |
| |
| static PFN_vkVoidFunction intercept_core_instance_command(const char *name) { |
| static const struct { |
| const char *name; |
| PFN_vkVoidFunction proc; |
| } core_instance_commands[] = { |
| {"vkGetInstanceProcAddr", reinterpret_cast<PFN_vkVoidFunction>(GetInstanceProcAddr)}, |
| {"vkCreateInstance", reinterpret_cast<PFN_vkVoidFunction>(CreateInstance)}, |
| {"vkDestroyInstance", reinterpret_cast<PFN_vkVoidFunction>(DestroyInstance)}, |
| {"vkCreateDevice", reinterpret_cast<PFN_vkVoidFunction>(CreateDevice)}, |
| {"vkEnumeratePhysicalDevices", reinterpret_cast<PFN_vkVoidFunction>(EnumeratePhysicalDevices)}, |
| {"vkEnumerateInstanceLayerProperties", reinterpret_cast<PFN_vkVoidFunction>(EnumerateInstanceLayerProperties)}, |
| {"vkEnumerateDeviceLayerProperties", reinterpret_cast<PFN_vkVoidFunction>(EnumerateDeviceLayerProperties)}, |
| {"vkEnumerateInstanceExtensionProperties", reinterpret_cast<PFN_vkVoidFunction>(EnumerateInstanceExtensionProperties)}, |
| {"vkEnumerateDeviceExtensionProperties", reinterpret_cast<PFN_vkVoidFunction>(EnumerateDeviceExtensionProperties)}, |
| {"vkGetPhysicalDeviceQueueFamilyProperties", reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceQueueFamilyProperties)}, |
| }; |
| |
| for (size_t i = 0; i < ARRAY_SIZE(core_instance_commands); i++) { |
| if (!strcmp(core_instance_commands[i].name, name)) |
| return core_instance_commands[i].proc; |
| } |
| |
| return nullptr; |
| } |
| |
| static PFN_vkVoidFunction intercept_khr_surface_command(const char *name, VkInstance instance) { |
| static const struct { |
| const char *name; |
| PFN_vkVoidFunction proc; |
| } khr_surface_commands[] = { |
| #ifdef VK_USE_PLATFORM_ANDROID_KHR |
| {"vkCreateAndroidSurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateAndroidSurfaceKHR)}, |
| #endif // VK_USE_PLATFORM_ANDROID_KHR |
| #ifdef VK_USE_PLATFORM_MIR_KHR |
| {"vkCreateMirSurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateMirSurfaceKHR)}, |
| {"vkGetPhysicalDeviceMirPresentationSupportKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceMirPresentationSupportKHR)}, |
| #endif // VK_USE_PLATFORM_MIR_KHR |
| #ifdef VK_USE_PLATFORM_WAYLAND_KHR |
| {"vkCreateWaylandSurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateWaylandSurfaceKHR)}, |
| {"vkGetPhysicalDeviceWaylandPresentationSupportKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceWaylandPresentationSupportKHR)}, |
| #endif // VK_USE_PLATFORM_WAYLAND_KHR |
| #ifdef VK_USE_PLATFORM_WIN32_KHR |
| {"vkCreateWin32SurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateWin32SurfaceKHR)}, |
| {"vkGetPhysicalDeviceWin32PresentationSupportKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceWin32PresentationSupportKHR)}, |
| #endif // VK_USE_PLATFORM_WIN32_KHR |
| #ifdef VK_USE_PLATFORM_XCB_KHR |
| {"vkCreateXcbSurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateXcbSurfaceKHR)}, |
| {"vkGetPhysicalDeviceXcbPresentationSupportKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceXcbPresentationSupportKHR)}, |
| #endif // VK_USE_PLATFORM_XCB_KHR |
| #ifdef VK_USE_PLATFORM_XLIB_KHR |
| {"vkCreateXlibSurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateXlibSurfaceKHR)}, |
| {"vkGetPhysicalDeviceXlibPresentationSupportKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceXlibPresentationSupportKHR)}, |
| #endif // VK_USE_PLATFORM_XLIB_KHR |
| {"vkDestroySurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(DestroySurfaceKHR)}, |
| {"vkGetPhysicalDeviceSurfaceSupportKHR", reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceSurfaceSupportKHR)}, |
| {"vkGetPhysicalDeviceSurfaceCapabilitiesKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceSurfaceCapabilitiesKHR)}, |
| {"vkGetPhysicalDeviceSurfaceFormatsKHR", reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceSurfaceFormatsKHR)}, |
| {"vkGetPhysicalDeviceSurfacePresentModesKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceSurfacePresentModesKHR)}, |
| {"vkGetPhysicalDeviceDisplayPropertiesKHR", reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceDisplayPropertiesKHR)}, |
| {"vkGetPhysicalDeviceDisplayPlanePropertiesKHR", |
| reinterpret_cast<PFN_vkVoidFunction>(GetPhysicalDeviceDisplayPlanePropertiesKHR)}, |
| {"vkGetDisplayPlaneSupportedDisplaysKHR", reinterpret_cast<PFN_vkVoidFunction>(GetDisplayPlaneSupportedDisplaysKHR)}, |
| {"vkGetDisplayModePropertiesKHR", reinterpret_cast<PFN_vkVoidFunction>(GetDisplayModePropertiesKHR)}, |
| {"vkCreateDisplayModeKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateDisplayModeKHR)}, |
| {"vkGetDisplayPlaneCapabilitiesKHR", reinterpret_cast<PFN_vkVoidFunction>(GetDisplayPlaneCapabilitiesKHR)}, |
| {"vkCreateDisplayPlaneSurfaceKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateDisplayPlaneSurfaceKHR)}, |
| }; |
| |
| // do not check if VK_KHR_*_surface is enabled (why?) |
| |
| for (size_t i = 0; i < ARRAY_SIZE(khr_surface_commands); i++) { |
| if (!strcmp(khr_surface_commands[i].name, name)) |
| return khr_surface_commands[i].proc; |
| } |
| |
| return nullptr; |
| } |
| |
| static PFN_vkVoidFunction intercept_core_device_command(const char *name) { |
| static const struct { |
| const char *name; |
| PFN_vkVoidFunction proc; |
| } core_device_commands[] = { |
| {"vkGetDeviceProcAddr", reinterpret_cast<PFN_vkVoidFunction>(GetDeviceProcAddr)}, |
| {"vkDestroyDevice", reinterpret_cast<PFN_vkVoidFunction>(DestroyDevice)}, |
| {"vkGetDeviceQueue", reinterpret_cast<PFN_vkVoidFunction>(GetDeviceQueue)}, |
| }; |
| |
| for (size_t i = 0; i < ARRAY_SIZE(core_device_commands); i++) { |
| if (!strcmp(core_device_commands[i].name, name)) |
| return core_device_commands[i].proc; |
| } |
| |
| return nullptr; |
| } |
| |
| static PFN_vkVoidFunction intercept_khr_swapchain_command(const char *name, VkDevice dev) { |
| static const struct { |
| const char *name; |
| PFN_vkVoidFunction proc; |
| } khr_swapchain_commands[] = { |
| {"vkCreateSwapchainKHR", reinterpret_cast<PFN_vkVoidFunction>(CreateSwapchainKHR)}, |
| {"vkDestroySwapchainKHR", reinterpret_cast<PFN_vkVoidFunction>(DestroySwapchainKHR)}, |
| {"vkGetSwapchainImagesKHR", reinterpret_cast<PFN_vkVoidFunction>(GetSwapchainImagesKHR)}, |
| {"vkAcquireNextImageKHR", reinterpret_cast<PFN_vkVoidFunction>(AcquireNextImageKHR)}, |
| {"vkQueuePresentKHR", reinterpret_cast<PFN_vkVoidFunction>(QueuePresentKHR)}, |
| }; |
| |
| // do not check if VK_KHR_swapchain is enabled (why?) |
| |
| for (size_t i = 0; i < ARRAY_SIZE(khr_swapchain_commands); i++) { |
| if (!strcmp(khr_swapchain_commands[i].name, name)) |
| return khr_swapchain_commands[i].proc; |
| } |
| |
| return nullptr; |
| } |
| |
| } // namespace swapchain |
| |
| // vk_layer_logging.h expects these to be defined |
| |
| VKAPI_ATTR VkResult VKAPI_CALL vkCreateDebugReportCallbackEXT(VkInstance instance, |
| const VkDebugReportCallbackCreateInfoEXT *pCreateInfo, |
| const VkAllocationCallbacks *pAllocator, |
| VkDebugReportCallbackEXT *pMsgCallback) { |
| return swapchain::CreateDebugReportCallbackEXT(instance, pCreateInfo, pAllocator, pMsgCallback); |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL vkDestroyDebugReportCallbackEXT(VkInstance instance, VkDebugReportCallbackEXT msgCallback, |
| const VkAllocationCallbacks *pAllocator) { |
| swapchain::DestroyDebugReportCallbackEXT(instance, msgCallback, pAllocator); |
| } |
| |
| VKAPI_ATTR void VKAPI_CALL vkDebugReportMessageEXT(VkInstance instance, VkDebugReportFlagsEXT flags, |
| VkDebugReportObjectTypeEXT objType, uint64_t object, size_t location, |
| int32_t msgCode, const char *pLayerPrefix, const char *pMsg) { |
| swapchain::DebugReportMessageEXT(instance, flags, objType, object, location, msgCode, pLayerPrefix, pMsg); |
| } |
| |
| // loader-layer interface v0, just wrappers since there is only a layer |
| |
| VK_LAYER_EXPORT VKAPI_ATTR VkResult VKAPI_CALL vkEnumerateInstanceExtensionProperties(const char *pLayerName, uint32_t *pCount, |
| VkExtensionProperties *pProperties) { |
| return swapchain::EnumerateInstanceExtensionProperties(pLayerName, pCount, pProperties); |
| } |
| |
| VK_LAYER_EXPORT VKAPI_ATTR VkResult VKAPI_CALL vkEnumerateInstanceLayerProperties(uint32_t *pCount, |
| VkLayerProperties *pProperties) { |
| return swapchain::EnumerateInstanceLayerProperties(pCount, pProperties); |
| } |
| |
| VK_LAYER_EXPORT VKAPI_ATTR VkResult VKAPI_CALL vkEnumerateDeviceLayerProperties(VkPhysicalDevice physicalDevice, uint32_t *pCount, |
| VkLayerProperties *pProperties) { |
| // the layer command handles VK_NULL_HANDLE just fine internally |
| assert(physicalDevice == VK_NULL_HANDLE); |
| return swapchain::EnumerateDeviceLayerProperties(VK_NULL_HANDLE, pCount, pProperties); |
| } |
| |
| VK_LAYER_EXPORT VKAPI_ATTR VkResult VKAPI_CALL vkEnumerateDeviceExtensionProperties(VkPhysicalDevice physicalDevice, |
| const char *pLayerName, uint32_t *pCount, |
| VkExtensionProperties *pProperties) { |
| // the layer command handles VK_NULL_HANDLE just fine internally |
| assert(physicalDevice == VK_NULL_HANDLE); |
| return swapchain::EnumerateDeviceExtensionProperties(VK_NULL_HANDLE, pLayerName, pCount, pProperties); |
| } |
| |
| VK_LAYER_EXPORT VKAPI_ATTR PFN_vkVoidFunction VKAPI_CALL vkGetDeviceProcAddr(VkDevice dev, const char *funcName) { |
| return swapchain::GetDeviceProcAddr(dev, funcName); |
| } |
| |
| VK_LAYER_EXPORT VKAPI_ATTR PFN_vkVoidFunction VKAPI_CALL vkGetInstanceProcAddr(VkInstance instance, const char *funcName) { |
| return swapchain::GetInstanceProcAddr(instance, funcName); |
| } |