[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/4] Qemu-Xen-vTPM: Register Xen stubdom vTPM frontend driver
> -----Original Message----- > From: Stefano Stabellini [mailto:stefano.stabellini@xxxxxxxxxxxxx] > Sent: Thursday, November 06, 2014 2:24 AM > To: Xu, Quan > Cc: Stefano Stabellini; qemu-devel@xxxxxxxxxx; xen-devel@xxxxxxxxxxxxx > Subject: RE: [PATCH 2/4] Qemu-Xen-vTPM: Register Xen stubdom vTPM > frontend driver > > On Wed, 5 Nov 2014, Xu, Quan wrote: > > > -----Original Message----- > > > From: Stefano Stabellini [mailto:stefano.stabellini@xxxxxxxxxxxxx] > > > Sent: Wednesday, November 05, 2014 7:01 PM > > > To: Xu, Quan > > > Cc: Stefano Stabellini; qemu-devel@xxxxxxxxxx; > > > xen-devel@xxxxxxxxxxxxx > > > Subject: RE: [PATCH 2/4] Qemu-Xen-vTPM: Register Xen stubdom vTPM > > > frontend driver > > > > > > On Tue, 4 Nov 2014, Xu, Quan wrote: > > > > > -----Original Message----- > > > > > From: Stefano Stabellini > > > > > [mailto:stefano.stabellini@xxxxxxxxxxxxx] > > > > > Sent: Monday, November 03, 2014 7:54 PM > > > > > To: Xu, Quan > > > > > Cc: qemu-devel@xxxxxxxxxx; xen-devel@xxxxxxxxxxxxx; > > > > > stefano.stabellini@xxxxxxxxxxxxx > > > > > Subject: Re: [PATCH 2/4] Qemu-Xen-vTPM: Register Xen stubdom > > > > > vTPM frontend driver > > > > > > > > > > On Sun, 2 Nov 2014, Quan Xu wrote: > > > > > > This drvier transfers any request/repond between TPM > > > > > > xenstubdoms driver and Xen vTPM stubdom, and facilitates > > > > > > communications between Xen vTPM stubdom domain and vTPM > > > > > > xenstubdoms driver > > > > > > > > > > > > Signed-off-by: Quan Xu <quan.xu@xxxxxxxxx> > > > > > > > > > > Please describe what changes did make to xen_backend.c and why. > > > > > The commit message should contains info on all the changes made > > > > > by the patch below. > > > > > > > > > > > > > Thanks Stefano. > > > > one more day, I will explain in detail what changes did make to > > > > xen_backend.c and why. > > > > The following 2 sections are introduction and architecture. > > > > > > > > > Please also describe what is the "Xen vTPM stubdom", what is the > > > > > "vTPM xenstubdoms driver" and how the communicate with each > others. > > > > > > > > > > > > > > > > > Add 2 parts for detailed descriptions, introduction and architecture. > > > > > > > > *INTRODUCTION* > > > > > > > > The goal of virtual Trusted Platform Module (vTPM) is to provide a > > > > TPM functionality to virtual machines (Fedora, Ubuntu, Redhat, > > > > Windows .etc). This allows programs to interact with a TPM in a > > > > virtual machine the same way they interact with a TPM on the physical > system. > > > Each virtual machine gets its own unique, emulated, software TPM. > > > > Each major component of vTPM is implemented as a stubdom, > > > > providing secure separation guaranteed by the hypervisor. > > > > The vTPM stubdom is a Xen mini-OS domain that emulates a TPM for > > > > the virtual machine to use. It is a small wrapper around the > > > > Berlios TPM emulator. TPM commands are passed from mini-os TPM > backend driver. > > > > This patch series are only the Qemu part to enable Xen stubdom > > > > vTPM for HVM virtual machine. > > > > =========== > > > > > > > > *ARCHITECTURE* > > > > > > > > The architecture of stubdom vTPM for HVM virtual machine: > > > > > > > > +--------------------+ > > > > | Windows/Linux DomU | ... > > > > | | ^ | > > > > | v | | > > > > | Qemu tpm1.2 Tis | > > > > | | ^ | > > > > | v | | > > > > | vTPM | > > > > | XenStubdoms driver | (new ..) > > > > +--------------------+ > > > > | ^ > > > > v | > > > > +--------------------+ > > > > | xen_vtpmdev_ops | (new ..) > > > > +--------------------+ > > > > | ^ > > > > v | > > > > +--------------------+ > > > > | mini-os/tpmback | > > > > | | ^ | > > > > | v | | > > > > | vTPM stubdom | ... > > > > | | ^ | > > > > | v | | > > > > | mini-os/tpmfront | > > > > +--------------------+ > > > > | ^ > > > > v | > > > > +--------------------+ > > > > | mini-os/tpmback | > > > > | | ^ | > > > > | v | | > > > > | vtpmmgr stubdom | > > > > | | ^ | > > > > | v | | > > > > | mini-os/tpm_tis | > > > > +--------------------+ > > > > | ^ > > > > v | > > > > +--------------------+ > > > > | Hardware TPM | > > > > +--------------------+ > > > > > > > > > > > > * Windows/Linux DomU: > > > > The HVM based guest that wants to use a vTPM. There may be > > > > more than one of these. > > > > > > > > * Qemu tpm1.2 Tis: > > > > Implementation of the tpm1.2 Tis interface for HVM virtual > > > > machines. It is Qemu emulation device. > > > > > > It looks like you are running upstream QEMU within a Mini-OS stubdom? > > > If so, where are the patches to do that? As far as I know upstream > > > QEMU doesn't run on Mini-OS. Or maybe it is a Linux stubdom? Either > > > way, it is not clear. > > > > Not so. > > Refer to below further explanation. > > > > > > > > > > > > * vTPM xenstubdoms driver: > > > > Similar to a TPM passthrough backend driver, it is a new TPM > > > > backend for emulated TPM TIS interface. This driver provides > > > > vTPM initialization and sending data and commends to a Xen > > > > vTPM stubdom. > > > > > > This is patch #3, right? It is basically the internal QEMU "glue" to > > > connect the tpm emulator to xen_vtpmdev_ops, correct? > > > > > > > Yes, it is Patch #3. Agree with your description. :) > > > > > > > > > * xen_vtpmdev_ops: > > > > Register Xen stubdom vTPM backend, and transfer any request/ > > > > repond between TPM xenstubdoms driver and Xen vTPM > stubdom. > > > > Facilitate communications between Xen vTPM stubdom and vTPM > > > > xenstubdoms driver. > > > > > > It looks like this correspond to patch #2? If so, this is a regular > > > Xen PV > > > > Yes, it patch #2. > > > > > > > frontend, living in QEMU? It requires the gntalloc device so I guess > > > it is supposed to run on Linux. In that case is it just a tpmfront > > > implementation in QEMU? > > > > > > > > > Yes, it's tpmfront implementation in Qemu. also it supports PV Linux since > Xen 4.3.0. > > vTPM stubdom / vtpmmgr stubdom ware implemented by Matthew > Fioravante > > (JHUAPL), Linux pv vTPM frontend was implemented by Daniel De Graaf > > (NSA) > > > > > > > > > If you are running it on Linux, we might need to introduce Linux > > > based stundoms to the Xen build system. > > > > Not so. > > Maybe I should explain a bit further. TPM is a character device. 'Qemu > tpm1.2 Tis' > > Implement some TPM register hook of TPM, and enable TIS (TPM interface > Specification). > > The ' Qemu tpm1.2 Tis ' should deal with TPM commands. > > > > Such as TPM_ContinueSelfTest command, > > { 0x00, 0xc1, 0x00, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, 0x53}; If > > success, the TPM will respond, > > { 0x00, 0xc4, 0x00, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, 0x00}; > > > > Qemu upstream has supported TPM passthrough. actually, 'Qemu TPM > > passthrough' send These TPM commands from "Qemu tpm1.2 Tis" to TPM > hardware, and get the respond. > > > > " [PATCH 0/4] Qemu-Xen-vTPM: enable Xen stubdom vTPM for HVM > virtual > > machine " send These TPM commands from "Qemu tpm1.2 Tis" to Xen > > stubdom( explain in previous email) And get the respond. > > > > #(qemu-system-* --tpmdev help) > > #(passthrough Passthrough TPM backend driver) > > #( xenstubdoms Xenstubdoms TPM backend driver) > > > > The following is Qemu part. > > > > | | ^ | > > | v | | > > | vTPM | > > | XenStubdoms driver | (new ..) > > +------------------------------+ > > | ^ > > v | > > +------------------------------+ > > | xen_vtpmdev_ops | (new ..) > > +------------------------------+ "vTPM XenStubdoms driver" > > and "xen_vtpmdev_ops" are implemented to send These TPM commands > from > > "Qemu tpm1.2 Tis" to Xen stubdom. > > OK, so if I understand correctly in your architecture QEMU is running in > Dom0 as usual, right? Yes, > > > > > > > > > > * mini-os/tpmback: > > > > Mini-os TPM backend driver. The Linux frontend driver connects > > > > to this backend driver to facilitate communications between the > > > > Linux DomU and its vTPM. This driver is also used by vtpmmgr > > > > stubdom to communicate with vTPM stubdom. > > > > > > > > * vTPM stubdom: > > > > A mini-os stub domain that implements a vTPM. There is a > > > > one to one mapping between running vTPM stubdom instances > and > > > > logical vTPMs on the system. The vTPM Platform Configuration > > > > Registers (PCRs) are all initialized to zero. > > > > > > > > * mini-os/tpmfront: > > > > Mini-os TPM frontend driver. The vTPM mini-os domain vTPM > > > > stubdom uses this driver to communicate with > vtpmmgr-stubdom. > > > > This driver could also be used separately to implement a mini-os > > > > domain that wishes to use a vTPM of its own. > > > > > > > > * vtpmmgr stubdom: > > > > A mini-os domain that implements the vTPM manager. There is > only > > > > one vTPM manager and it should be running during the entire > lifetime > > > > of the machine. vtpmmgr domain securely stores encryption keys > for > > > > each of the vTPMs and accesses to the hardware TPM to get the > > > > root > > > of > > > > trust for the entire system. > > > > > > > > * mini-os/tpm_tis: > > > > Mini-os TPM version 1.2 TPM Interface Specification (TIS) driver. > > > > This driver used by vtpmmgr-stubdom to talk directly to the > hardware > > > > TPM. Communication is facilitated by mapping hardware memory > > > pages > > > > into vtpmmgr stubdom. > > > > > > Are all the Mini-OS component upstream, or do we need patches? > > > > > > > > > > * Hardware TPM: > > > > The physical TPM 1.2 that is soldered onto the motherboard. > > > > > > > > =========== > > > > > > > > > > > > > > > > > Where does the vTPM backend lives? > > > > The vTPM backend lives in Xen vTPM stubdom (Xen Mini-os) > > > > > > Thanks for the explanation, it is a bit clearer now. > > > > > > > > > Welcome, thanks for your careful review. > > > > > > > > > > > > > > > > > > > > > > > > > hw/xen/Makefile.objs | 1 + > > > > > > hw/xen/xen_backend.c | 182 > ++++++++++++++++++++++- > > > > > > hw/xen/xen_stubdom_vtpm.c | 333 > > > > > +++++++++++++++++++++++++++++++++++++++++++ > > > > > > include/hw/xen/xen_backend.h | 11 ++ > > > > > > include/hw/xen/xen_common.h | 6 + > > > > > > xen-hvm.c | 13 ++ > > > > > > 6 files changed, 544 insertions(+), 2 deletions(-) create > > > > > > mode > > > > > > 100644 hw/xen/xen_stubdom_vtpm.c > > > > > > > > > > > > diff --git a/hw/xen/Makefile.objs b/hw/xen/Makefile.objs index > > > > > > a0ca0aa..724df8d 100644 > > > > > > --- a/hw/xen/Makefile.objs > > > > > > +++ b/hw/xen/Makefile.objs > > > > > > @@ -1,5 +1,6 @@ > > > > > > # xen backend driver support > > > > > > common-obj-$(CONFIG_XEN_BACKEND) += xen_backend.o > > > > > xen_devconfig.o > > > > > > +common-obj-$(CONFIG_TPM_XENSTUBDOMS) += > > > xen_stubdom_vtpm.o > > > > > > > > > > > > obj-$(CONFIG_XEN_PCI_PASSTHROUGH) += xen-host-pci-device.o > > > > > > obj-$(CONFIG_XEN_PCI_PASSTHROUGH) += xen_pt.o > > > > > xen_pt_config_init.o xen_pt_msi.o > > > > > > diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c index > > > > > > b2cb22b..45a5778 100644 > > > > > > --- a/hw/xen/xen_backend.c > > > > > > +++ b/hw/xen/xen_backend.c > > > > > > @@ -194,6 +194,32 @@ int xen_be_set_state(struct XenDevice > > > > > > *xendev, > > > > > enum xenbus_state state) > > > > > > return 0; > > > > > > } > > > > > > > > > > > > +/*get stubdom backend*/ > > > > > > +static char *xen_stubdom_be(const char *type, int dom, int dev) { > > > > > > + char *val, *domu; > > > > > > + char path[XEN_BUFSIZE]; > > > > > > + unsigned int len, ival; > > > > > > + > > > > > > + /*front domu*/ > > > > > > + domu = xs_get_domain_path(xenstore, dom); > > > > > > + snprintf(path, sizeof(path), "%s/device/%s/%d/backend-id", > > > > > > + domu, type, dev); > > > > > > + g_free(domu); > > > > > > + > > > > > > + val = xs_read(xenstore, 0, path, &len); > > > > > > + if (!val || 1 != sscanf(val, "%d", &ival)) { > > > > > > + g_free(val); > > > > > > + return NULL; > > > > > > + } > > > > > > + g_free(val); > > > > > > + > > > > > > + /*backend domu*/ > > > > > > + domu = xs_get_domain_path(xenstore, ival); > > > > > > + > > > > > > + return domu; > > > > > > +} > > > > > > + > > > > > > /* > > > > > > ------------------------------------------------------------- > > > > > > */ > > > > > > > > > > > > struct XenDevice *xen_be_find_xendev(const char *type, int > > > > > > dom, int > > > > > dev) > > > > > > @@ -222,6 +248,7 @@ static struct XenDevice > > > > > > *xen_be_get_xendev(const > > > > > char *type, int dom, int dev, > > > > > > struct > XenDevOps > > > *ops) > > > > > > { > > > > > > struct XenDevice *xendev; > > > > > > + char *stub; > > > > > > > > > > > > xendev = xen_be_find_xendev(type, dom, dev); > > > > > > if (xendev) { > > > > > > @@ -235,8 +262,15 @@ static struct XenDevice > > > > > *xen_be_get_xendev(const char *type, int dom, int dev, > > > > > > xendev->dev = dev; > > > > > > xendev->ops = ops; > > > > > > > > > > > > - snprintf(xendev->be, sizeof(xendev->be), > "backend/%s/%d/%d", > > > > > > - xendev->type, xendev->dom, xendev->dev); > > > > > > + if (ops->flags & DEVOPS_FLAG_STUBDOM_BE) { > > > > > > + stub = xen_stubdom_be(xendev->type, xendev->dom, > > > > > xendev->dev); > > > > > > + snprintf(xendev->be, sizeof(xendev->be), > > > > > "%s/backend/%s/%d/%d", > > > > > > + stub, xendev->type, xendev->dom, > xendev->dev); > > > > > > + g_free(stub); > > > > > > + } else { > > > > > > + snprintf(xendev->be, sizeof(xendev->be), > > > "backend/%s/%d/%d", > > > > > > + xendev->type, xendev->dom, xendev->dev); > > > > > > + } > > > > > > snprintf(xendev->name, sizeof(xendev->name), "%s-%d", > > > > > > xendev->type, xendev->dev); > > > > > > > > > > > > @@ -611,6 +645,47 @@ static int xenstore_scan(const char > > > > > > *type, int > > > > > dom, struct XenDevOps *ops) > > > > > > return 0; > > > > > > } > > > > > > > > > > > > +static void stubdom_update_be(char *watch, char *type, int dom, > > > > > > + struct XenDevOps *ops) { > > > > > > + struct XenDevice *xendev; > > > > > > + char path[XEN_BUFSIZE]; > > > > > > + char *ptr, *bepath; > > > > > > + unsigned int len, dev; > > > > > > + > > > > > > + if (!(ops->flags & DEVOPS_FLAG_STUBDOM_BE)) { > > > > > > + return; > > > > > > + } > > > > > > + > > > > > > + len = snprintf(path, sizeof(path), "backend/%s/%d", type, > dom); > > > > > > + ptr = strstr(watch, path); > > > > > > + if (ptr == NULL) { > > > > > > + return; > > > > > > + } > > > > > > + > > > > > > + if (sscanf(ptr+len, "/%u/%255s", &dev, path) != 2) { > > > > > > + strcpy(path, ""); > > > > > > + if (sscanf(ptr+len, "/%u", &dev) != 1) { > > > > > > + dev = -1; > > > > > > + } > > > > > > + } > > > > > > + > > > > > > + if (dev == -1) { > > > > > > + return; > > > > > > + } > > > > > > + > > > > > > + xendev = xen_be_get_xendev(type, dom, dev, ops); > > > > > > + if (xendev != NULL) { > > > > > > + bepath = xs_read(xenstore, 0, xendev->be, &len); > > > > > > + if (bepath == NULL) { > > > > > > + xen_be_del_xendev(dom, dev); > > > > > > + } else { > > > > > > + free(bepath); > > > > > > + xen_be_backend_changed(xendev, path); > > > > > > + } > > > > > > + } > > > > > > +} > > > > > > + > > > > > > static void xenstore_update_be(char *watch, char *type, int dom, > > > > > > struct XenDevOps *ops) > { @@ > > > > > > -681,6 +756,10 @@ static void xenstore_update(void *unused) > > > > > > if (sscanf(vec[XS_WATCH_TOKEN], "fe:%" PRIxPTR, &ptr) == 1) > { > > > > > > xenstore_update_fe(vec[XS_WATCH_PATH], (void*)ptr); > > > > > > } > > > > > > + if (sscanf(vec[XS_WATCH_TOKEN], "stub:%" PRIxPTR ":%d:%" > > > > > PRIxPTR, > > > > > > + &type, &dom, &ops) == 3) { > > > > > > + stubdom_update_be(vec[XS_WATCH_PATH], (void > *)type, > > > dom, > > > > > (void *)ops); > > > > > > + } > > > > > > > > > > > > cleanup: > > > > > > free(vec); > > > > > > @@ -732,11 +811,74 @@ err: > > > > > > return -1; > > > > > > } > > > > > > > > > > > > +int xen_vtpm_register(struct XenDevOps *ops) { > > > > > > + struct XenDevice *xendev; > > > > > > + char path[XEN_BUFSIZE], token[XEN_BUFSIZE]; > > > > > > + char *domu; > > > > > > + unsigned int cdev, j, rc; > > > > > > + const char *type = "vtpm"; > > > > > > + char **dev = NULL; > > > > > > + > > > > > > + /*front domu*/ > > > > > > + domu = xs_get_domain_path(xenstore, xen_domid); > > > > > > + snprintf(path, sizeof(path), "%s/device/%s", > > > > > > + domu, type); > > > > > > + free(domu); > > > > > > + dev = xs_directory(xenstore, 0, path, &cdev); > > > > > > + if (dev == NULL) { > > > > > > + return 0; > > > > > > + } > > > > > > + > > > > > > + for (j = 0; j < cdev; j++) { > > > > > > + xendev = xen_be_get_xendev(type, xen_domid, > > > > > > + atoi(dev[j]), > > > > > ops); > > > > > > + if (xendev == NULL) { > > > > > > + xen_be_printf(xendev, 0, "xen_vtpm_register > > > > > > + xendev is > > > > > NULL.\n"); > > > > > > + continue; > > > > > > + } > > > > > > + > > > > > > + if (xendev->ops->initialise) { > > > > > > + rc = xendev->ops->initialise(xendev); > > > > > > + > > > > > > + /*if initialise failed, delete it*/ > > > > > > + if (rc != 0) { > > > > > > + xen_be_del_xendev(xen_domid, atoi(dev[j])); > > > > > > + continue; > > > > > > + } > > > > > > + } > > > > > > + > > > > > > + /*setup watch*/ > > > > > > + snprintf(token, sizeof(token), "stub:%p:%d:%p", > > > > > > + type, xen_domid, xendev->ops); > > > > > > + if (!xs_watch(xenstore, xendev->be, token)) { > > > > > > + xen_be_printf(xendev, 0, "xen_vtpm_register > > > > > > + xs_watch > > > > > failed.\n"); > > > > > > + return -1; > > > > > > + } > > > > > > + } > > > > > > + > > > > > > + free(dev); > > > > > > + return 0; > > > > > > +} > > > > > > > > > > What does this function do? I sholdn't need to guess from the > > > > > code, I should be able to tell from the patch description. > > > > > > > > > > > > > > > > int xen_be_register(const char *type, struct XenDevOps *ops) { > > > > > > return xenstore_scan(type, xen_domid, ops); } > > > > > > > > > > > > +int xen_be_alloc_unbound(struct XenDevice *xendev, int dom, > > > > > > +int > > > > > remote_dom) > > > > > > +{ > > > > > > + xendev->local_port = > > > > > xc_evtchn_bind_unbound_port(xendev->evtchndev, > > > > > > + > > > > > remote_dom); > > > > > > + if (xendev->local_port == -1) { > > > > > > + xen_be_printf(xendev, 0, "xc_evtchn_alloc_unbound > > > failed\n"); > > > > > > + return -1; > > > > > > + } > > > > > > + xen_be_printf(xendev, 2, "bind evtchn port %d\n", > > > > > xendev->local_port); > > > > > > + qemu_set_fd_handler(xc_evtchn_fd(xendev->evtchndev), > > > > > > + xen_be_evtchn_event, NULL, xendev); > > > > > > + return 0; > > > > > > +} > > > > > > + > > > > > > int xen_be_bind_evtchn(struct XenDevice *xendev) { > > > > > > if (xendev->local_port != -1) { @@ -770,6 +912,42 @@ int > > > > > > xen_be_send_notify(struct XenDevice > > > > > *xendev) > > > > > > return xc_evtchn_notify(xendev->evtchndev, > > > > > > xendev->local_port); } > > > > > > > > > > > > +int xen_vtpm_send(unsigned char *buf, size_t count) { > > > > > > + struct XenDevice *xendev; > > > > > > + int rc = -1; > > > > > > + > > > > > > + xendev = xen_be_find_xendev("vtpm", xen_domid, 0); > > > > > > + if (xendev == NULL) { > > > > > > + xen_be_printf(xendev, 0, "Con not find vtpm device\n"); > > > > > > + return -1; > > > > > > + } > > > > > > + > > > > > > + if (xendev->ops->send) { > > > > > > + rc = xendev->ops->send(xendev, buf, count); > > > > > > + } > > > > > > + > > > > > > + return rc; > > > > > > +} > > > > > > + > > > > > > +int xen_vtpm_recv(unsigned char *buf, size_t *count) { > > > > > > + struct XenDevice *xendev; > > > > > > + int rc = -1; > > > > > > + > > > > > > + xendev = xen_be_find_xendev("vtpm", xen_domid, 0); > > > > > > + if (xendev == NULL) { > > > > > > + xen_be_printf(xendev, 0, "Con not find vtpm device\n"); > > > > > > + return -1; > > > > > > + } > > > > > > + > > > > > > + if (xendev->ops->recv) { > > > > > > + xendev->ops->recv(xendev, buf, count); > > > > > > + } > > > > > > + > > > > > > + return rc; > > > > > > +} > > > > > > > > > > xen_backend.c is supposed to be generic, so stubdom functions > > > > > might be OK but vtpm specific functions should not be here. > > > > > > > > > > > > > > > > /* > > > > > > * msg_level: > > > > > > * 0 == errors (stderr + logfile). > > > > > > diff --git a/hw/xen/xen_stubdom_vtpm.c > > > b/hw/xen/xen_stubdom_vtpm.c > > > > > > new file mode 100644 index 0000000..0d740c1 > > > > > > --- /dev/null > > > > > > +++ b/hw/xen/xen_stubdom_vtpm.c > > > > > > @@ -0,0 +1,333 @@ > > > > > > +/* > > > > > > + * Connect to Xen vTPM stubdom domain > > > > > > + * > > > > > > + * Copyright (c) 2014 Intel Corporation > > > > > > + * Authors: > > > > > > + * Quan Xu <quan.xu@xxxxxxxxx> > > > > > > + * > > > > > > + * This library is free software; you can redistribute it > > > > > > +and/or > > > > > > + * modify it under the terms of the GNU Lesser General Public > > > > > > + * License as published by the Free Software Foundation; > > > > > > +either > > > > > > + * version 2 of the License, or (at your option) any later version. > > > > > > + * > > > > > > + * This library is distributed in the hope that it will be > > > > > > +useful, > > > > > > + * but WITHOUT ANY WARRANTY; without even the implied > > > > > > +warranty > > > of > > > > > > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. > See > > > the > > > > > GNU > > > > > > + * Lesser General Public License for more details. > > > > > > + * > > > > > > + * You should have received a copy of the GNU Lesser General > > > > > > + Public > > > > > > + * License along with this library; if not, see > > > > > <http://www.gnu.org/licenses/> > > > > > > + */ > > > > > > + > > > > > > +#include <stdio.h> > > > > > > +#include <stdlib.h> > > > > > > +#include <stdarg.h> > > > > > > +#include <string.h> > > > > > > +#include <unistd.h> > > > > > > +#include <signal.h> > > > > > > +#include <inttypes.h> > > > > > > +#include <time.h> > > > > > > +#include <fcntl.h> > > > > > > +#include <errno.h> > > > > > > +#include <sys/ioctl.h> > > > > > > +#include <sys/types.h> > > > > > > +#include <sys/stat.h> > > > > > > +#include <sys/mman.h> > > > > > > +#include <sys/uio.h> > > > > > > + > > > > > > +#include "hw/hw.h" > > > > > > +#include "block/aio.h" > > > > > > +#include "hw/xen/xen_backend.h" > > > > > > + > > > > > > +enum tpmif_state { > > > > > > + TPMIF_STATE_IDLE, /* no contents / vTPM idle / > cancel > > > > > complete */ > > > > > > + TPMIF_STATE_SUBMIT, /* request ready / vTPM > working */ > > > > > > + TPMIF_STATE_FINISH, /* response ready / vTPM idle */ > > > > > > + TPMIF_STATE_CANCEL, /* cancel requested / vTPM > > > working */ > > > > > > +}; > > > > > > + > > > > > > +static AioContext *vtpm_aio_ctx; > > > > > > + > > > > > > +enum status_bits { > > > > > > + VTPM_STATUS_RUNNING = 0x1, > > > > > > + VTPM_STATUS_IDLE = 0x2, > > > > > > + VTPM_STATUS_RESULT = 0x4, > > > > > > + VTPM_STATUS_CANCELED = 0x8, }; > > > > > > + > > > > > > +struct tpmif_shared_page { > > > > > > + uint32_t length; /* request/response length in > bytes */ > > > > > > + > > > > > > + uint8_t state; /* enum tpmif_state */ > > > > > > + uint8_t locality; /* for the current request */ > > > > > > + uint8_t pad; /* should be zero */ > > > > > > + > > > > > > + uint8_t nr_extra_pages; /* extra pages for long > > > > > > + packets; may be > > > > > zero */ > > > > > > + uint32_t extra_pages[0]; /* grant IDs; length is actually > > > > > nr_extra_pages */ > > > > > > +}; > > > > > > + > > > > > > +struct QEMUBH { > > > > > > + AioContext *ctx; > > > > > > + QEMUBHFunc *cb; > > > > > > + void *opaque; > > > > > > + QEMUBH *next; > > > > > > + bool scheduled; > > > > > > + bool idle; > > > > > > + bool deleted; > > > > > > +}; > > > > > > + > > > > > > +struct XenVtpmDev { > > > > > > + struct XenDevice xendev; /* must be first */ > > > > > > + struct tpmif_shared_page *shr; > > > > > > + xc_gntshr *xen_xcs; > > > > > > + int ring_ref; > > > > > > + int bedomid; > > > > > > + QEMUBH *sr_bh; > > > > > > +}; > > > > > > + > > > > > > +static uint8_t vtpm_status(struct XenVtpmDev *vtpmdev) { > > > > > > + switch (vtpmdev->shr->state) { > > > > > > + case TPMIF_STATE_IDLE: > > > > > > + case TPMIF_STATE_FINISH: > > > > > > + return VTPM_STATUS_IDLE; > > > > > > + case TPMIF_STATE_SUBMIT: > > > > > > + case TPMIF_STATE_CANCEL: > > > > > > + return VTPM_STATUS_RUNNING; > > > > > > + default: > > > > > > + return 0; > > > > > > + } > > > > > > +} > > > > > > + > > > > > > +static int xenbus_switch_state(struct XenDevice *xendev, enum > > > > > xenbus_state xbus) > > > > > > +{ > > > > > > + xs_transaction_t xbt = XBT_NULL; > > > > > > + > > > > > > + if (xendev->fe_state == xbus) { > > > > > > + return 0; > > > > > > + } > > > > > > + > > > > > > + xendev->fe_state = xbus; > > > > > > + > > > > > > +retry_transaction: > > > > > > + xbt = xs_transaction_start(xenstore); > > > > > > + if (xbt == XBT_NULL) { > > > > > > + goto abort_transaction; > > > > > > + } > > > > > > + > > > > > > + if (xenstore_write_int(xendev->fe, "state", xbus)) { > > > > > > + goto abort_transaction; > > > > > > + } > > > > > > + > > > > > > + if (!xs_transaction_end(xenstore, xbt, 0)) { > > > > > > + if (errno == EAGAIN) { > > > > > > + goto retry_transaction; > > > > > > + } > > > > > > + } > > > > > > + > > > > > > + return 0; > > > > > > + > > > > > > +abort_transaction: > > > > > > + xs_transaction_end(xenstore, xbt, 1); > > > > > > + return -1; > > > > > > +} > > > > > > + > > > > > > +static int vtpm_aio_wait(QEMUBH *qbh) { > > > > > > + return aio_poll(qbh->ctx, true); } > > > > > > + > > > > > > +static void sr_bh_handler(void *opaque) { } > > > > > > + > > > > > > +static int vtpm_recv(struct XenDevice *xendev, uint8_t* buf, > > > > > > +size_t > > > > > *count) > > > > > > +{ > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + struct tpmif_shared_page *shr = vtpmdev->shr; > > > > > > + unsigned int offset; > > > > > > + > > > > > > + if (shr->state == TPMIF_STATE_IDLE) { > > > > > > + return -ECANCELED; > > > > > > + } > > > > > > + > > > > > > + while (vtpm_status(vtpmdev) != VTPM_STATUS_IDLE) { > > > > > > + vtpm_aio_wait(vtpmdev->sr_bh); > > > > > > + } > > > > > > + > > > > > > + offset = sizeof(*shr) + 4*shr->nr_extra_pages; > > > > > > + memcpy(buf, offset + (uint8_t *)shr, shr->length); > > > > > > + *count = shr->length; > > > > > > + > > > > > > + return 0; > > > > > > +} > > > > > > + > > > > > > +static int vtpm_send(struct XenDevice *xendev, uint8_t* buf, > > > > > > +size_t > > > > > count) > > > > > > +{ > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + struct tpmif_shared_page *shr = vtpmdev->shr; > > > > > > + unsigned int offset = sizeof(*shr) + > > > > > > + 4*shr->nr_extra_pages; > > > > > > + > > > > > > + while (vtpm_status(vtpmdev) != VTPM_STATUS_IDLE) { > > > > > > + vtpm_aio_wait(vtpmdev->sr_bh); > > > > > > + } > > > > > > + > > > > > > + memcpy(offset + (uint8_t *)shr, buf, count); > > > > > > + shr->length = count; > > > > > > + barrier(); > > > > > > + shr->state = TPMIF_STATE_SUBMIT; > > > > > > + xen_wmb(); > > > > > > + xen_be_send_notify(&vtpmdev->xendev); > > > > > > + > > > > > > + while (vtpm_status(vtpmdev) != VTPM_STATUS_IDLE) { > > > > > > + vtpm_aio_wait(vtpmdev->sr_bh); > > > > > > + } > > > > > > + > > > > > > + return count; > > > > > > +} > > > > > > + > > > > > > +static int vtpm_initialise(struct XenDevice *xendev) { > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + xs_transaction_t xbt = XBT_NULL; > > > > > > + unsigned int ring_ref; > > > > > > + > > > > > > + vtpmdev->xendev.fe = > > > > > > + xenstore_read_be_str(&vtpmdev->xendev, > > > > > "frontend"); > > > > > > + if (vtpmdev->xendev.fe == NULL) { > > > > > > + return -1; > > > > > > + } > > > > > > + > > > > > > + /* Get backend domid */ > > > > > > + if (xenstore_read_fe_int(&vtpmdev->xendev, "backend-id", > > > > > > + &vtpmdev->bedomid)) { > > > > > > + return -1; > > > > > > + } > > > > > > + > > > > > > + /*alloc share page*/ > > > > > > + vtpmdev->shr = xc_gntshr_share_pages(vtpmdev->xen_xcs, > > > > > vtpmdev->bedomid, 1, > > > > > > + &ring_ref, > > > > > PROT_READ|PROT_WRITE); > > > > > > + vtpmdev->ring_ref = ring_ref; > > > > > > + if (vtpmdev->shr == NULL) { > > > > > > + return -1; > > > > > > + } > > > > > > + > > > > > > + /*Create event channel */ > > > > > > + if (xen_be_alloc_unbound(&vtpmdev->xendev, 0, > > > > > vtpmdev->bedomid)) { > > > > > > + xc_gntshr_munmap(vtpmdev->xen_xcs, vtpmdev->shr, > 1); > > > > > > + return -1; > > > > > > + } > > > > > > + > > > > > > + xc_evtchn_unmask(vtpmdev->xendev.evtchndev, > > > > > > + vtpmdev->xendev.local_port); > > > > > > + > > > > > > +again: > > > > > > + xbt = xs_transaction_start(xenstore); > > > > > > + if (xbt == XBT_NULL) { > > > > > > + goto abort_transaction; > > > > > > + } > > > > > > + > > > > > > + if (xenstore_write_int(vtpmdev->xendev.fe, "ring-ref", > > > > > > + vtpmdev->ring_ref)) { > > > > > > + goto abort_transaction; > > > > > > + } > > > > > > + > > > > > > + if (xenstore_write_int(vtpmdev->xendev.fe, "event-channel", > > > > > > + vtpmdev->xendev.local_port)) { > > > > > > + goto abort_transaction; > > > > > > + } > > > > > > + > > > > > > + /* Publish protocol v2 feature */ > > > > > > + if (xenstore_write_int(vtpmdev->xendev.fe, > > > > > > + "feature-protocol-v2", 1)) > > > > > { > > > > > > + goto abort_transaction; > > > > > > + } > > > > > > + > > > > > > + if (!xs_transaction_end(xenstore, xbt, 0)) { > > > > > > + if (errno == EAGAIN) { > > > > > > + goto again; > > > > > > + } > > > > > > + } > > > > > > + /* Tell vtpm backend that we are ready */ > > > > > > + xenbus_switch_state(&vtpmdev->xendev, > > > > > > + XenbusStateInitialised); > > > > > > + > > > > > > + return 0; > > > > > > + > > > > > > +abort_transaction: > > > > > > + xc_gntshr_munmap(vtpmdev->xen_xcs, vtpmdev->shr, 1); > > > > > > + xs_transaction_end(xenstore, xbt, 1); > > > > > > + return -1; > > > > > > +} > > > > > > + > > > > > > +static void vtpm_backend_changed(struct XenDevice *xendev, > > > > > > +const char > > > > > *node) > > > > > > +{ > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + int be_state; > > > > > > + > > > > > > + if (strcmp(node, "state") == 0) { > > > > > > + xenstore_read_be_int(&vtpmdev->xendev, node, > > > &be_state); > > > > > > + switch (be_state) { > > > > > > + case XenbusStateConnected: > > > > > > + /*TODO*/ > > > > > > + break; > > > > > > + case XenbusStateClosing: > > > > > > + case XenbusStateClosed: > > > > > > + xenbus_switch_state(&vtpmdev->xendev, > > > > > XenbusStateClosing); > > > > > > + break; > > > > > > + default: > > > > > > + break; > > > > > > + } > > > > > > + } > > > > > > +} > > > > > > + > > > > > > +static int vtpm_free(struct XenDevice *xendev) { > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + QEMUBH *qbh = vtpmdev->sr_bh; > > > > > > + > > > > > > + aio_poll(qbh->ctx, false); > > > > > > + qemu_bh_delete(vtpmdev->sr_bh); > > > > > > + if (vtpmdev->shr) { > > > > > > + xc_gntshr_munmap(vtpmdev->xen_xcs, vtpmdev->shr, > 1); > > > > > > + } > > > > > > + xc_interface_close(vtpmdev->xen_xcs); > > > > > > + return 0; > > > > > > +} > > > > > > + > > > > > > +static void vtpm_alloc(struct XenDevice *xendev) { > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + > > > > > > + vtpm_aio_ctx = aio_context_new(NULL); > > > > > > + if (vtpm_aio_ctx == NULL) { > > > > > > + return; > > > > > > + } > > > > > > + vtpmdev->sr_bh = aio_bh_new(vtpm_aio_ctx, > sr_bh_handler, > > > > > vtpmdev); > > > > > > + qemu_bh_schedule(vtpmdev->sr_bh); > > > > > > + vtpmdev->xen_xcs = xen_xc_gntshr_open(0, 0); } > > > > > > + > > > > > > +static void vtpm_event(struct XenDevice *xendev) { > > > > > > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct > > > > > XenVtpmDev, > > > > > > + xendev); > > > > > > + > > > > > > + qemu_bh_schedule(vtpmdev->sr_bh); } > > > > > > + > > > > > > +struct XenDevOps xen_vtpmdev_ops = { > > > > > > + .size = sizeof(struct XenVtpmDev), > > > > > > + .flags = DEVOPS_FLAG_IGNORE_STATE | > > > > > > + DEVOPS_FLAG_STUBDOM_BE, > > > > > > + .event = vtpm_event, > > > > > > + .free = vtpm_free, > > > > > > + .alloc = vtpm_alloc, > > > > > > + .initialise = vtpm_initialise, > > > > > > + .backend_changed = vtpm_backend_changed, > > > > > > + .recv = vtpm_recv, > > > > > > + .send = vtpm_send, > > > > > > +}; > > > > > > > > > > Is this the frontend, like the subject line would seem to imply? > > > > > If so, XenDevOps are made for backends, while this is a > > > > > frontend. In fact this is the first PV frontend in QEMU. We need > > > > > to introduce something generic and similar to struct XenDevOps > > > > > and xen_backend.c but for frontends. > > > > > > > > > > > > > > > > diff --git a/include/hw/xen/xen_backend.h > > > > > b/include/hw/xen/xen_backend.h > > > > > > index 3b4125e..45fd6d3 100644 > > > > > > --- a/include/hw/xen/xen_backend.h > > > > > > +++ b/include/hw/xen/xen_backend.h > > > > > > @@ -15,6 +15,8 @@ struct XenDevice; > > > > > > #define DEVOPS_FLAG_NEED_GNTDEV 1 > > > > > > /* don't expect frontend doing correct state transitions (aka > > > > > > console > > > > > quirk) */ > > > > > > #define DEVOPS_FLAG_IGNORE_STATE 2 > > > > > > +/*dev backend is stubdom*/ > > > > > > +#define DEVOPS_FLAG_STUBDOM_BE 4 > > > > > > > > > > > > struct XenDevOps { > > > > > > size_t size; > > > > > > @@ -26,6 +28,8 @@ struct XenDevOps { > > > > > > void (*event)(struct XenDevice *xendev); > > > > > > void (*disconnect)(struct XenDevice *xendev); > > > > > > int (*free)(struct XenDevice *xendev); > > > > > > + int (*send)(struct XenDevice *xendev, uint8_t* buf, > size_t > > > > > count); > > > > > > + int (*recv)(struct XenDevice *xendev, uint8_t* buf, > size_t > > > > > *count); > > > > > > void (*backend_changed)(struct XenDevice *xendev, > const > > > > > char *node); > > > > > > void (*frontend_changed)(struct XenDevice *xendev, > const > > > > > char *node); > > > > > > }; > > > > > > @@ -91,12 +95,19 @@ int xen_be_send_notify(struct XenDevice > > > > > *xendev); > > > > > > void xen_be_printf(struct XenDevice *xendev, int msg_level, > > > > > > const char > > > > > *fmt, ...) > > > > > > GCC_FMT_ATTR(3, 4); > > > > > > > > > > > > +/*Xen stubdom vtpm*/ > > > > > > +int xen_vtpm_register(struct XenDevOps *ops); int > > > > > > +xen_be_alloc_unbound(struct XenDevice *xendev, int dom, int > > > > > remote_dom); > > > > > > +int xen_vtpm_send(unsigned char *buf, size_t count); int > > > > > > +xen_vtpm_recv(unsigned char *buf, size_t *count); > > > > > > + > > > > > > /* actual backend drivers */ > > > > > > extern struct XenDevOps xen_console_ops; /* > xen_console.c > > > > > */ > > > > > > extern struct XenDevOps xen_kbdmouse_ops; /* > > > xen_framebuffer.c > > > > > */ > > > > > > extern struct XenDevOps xen_framebuffer_ops; /* > > > xen_framebuffer.c */ > > > > > > extern struct XenDevOps xen_blkdev_ops; /* xen_disk.c > > > > > */ > > > > > > extern struct XenDevOps xen_netdev_ops; /* xen_nic.c > > > > > */ > > > > > > +extern struct XenDevOps xen_vtpmdev_ops; /* > > > > > xen_stubdom_vtpm.c*/ > > > > > > > > > > > > void xen_init_display(int domid); > > > > > > > > > > > > diff --git a/include/hw/xen/xen_common.h > > > > > b/include/hw/xen/xen_common.h > > > > > > index 95612a4..fb43084 100644 > > > > > > --- a/include/hw/xen/xen_common.h > > > > > > +++ b/include/hw/xen/xen_common.h > > > > > > @@ -130,6 +130,12 @@ static inline XenXC > > > > > > xen_xc_interface_open(void > > > > > *logger, void *dombuild_logger, > > > > > > return xc_interface_open(logger, dombuild_logger, > > > > > > open_flags); } > > > > > > > > > > > > +static inline xc_gntshr *xen_xc_gntshr_open(void *logger, > > > > > > + unsigned int > > > > > > +open_flags) { > > > > > > + return xc_gntshr_open(logger, open_flags); } > > > > > > + > > > > > > /* FIXME There is now way to have the xen fd */ static > > > > > > inline int xc_fd(xc_interface *xen_xc) { diff --git > > > > > > a/xen-hvm.c b/xen-hvm.c index 21f1cbb..c99ace8 100644 > > > > > > --- a/xen-hvm.c > > > > > > +++ b/xen-hvm.c > > > > > > @@ -1067,6 +1067,11 @@ int xen_hvm_init(ram_addr_t > > > > > *below_4g_mem_size, ram_addr_t *above_4g_mem_size, > > > > > > int i, rc; > > > > > > unsigned long ioreq_pfn; > > > > > > unsigned long bufioreq_evtchn; > > > > > > + > > > > > > +#ifdef CONFIG_TPM_XENSTUBDOMS > > > > > > + unsigned long stubdom_vtpm = 0; #endif > > > > > > + > > > > > > XenIOState *state; > > > > > > > > > > > > state = g_malloc0(sizeof (XenIOState)); @@ -1169,6 > > > > > > +1174,14 @@ int xen_hvm_init(ram_addr_t > > > > > *below_4g_mem_size, ram_addr_t *above_4g_mem_size, > > > > > > fprintf(stderr, "%s: xen backend core setup > > > > > > failed\n", > > > > > __FUNCTION__); > > > > > > return -1; > > > > > > } > > > > > > + > > > > > > +#ifdef CONFIG_TPM_XENSTUBDOMS > > > > > > + xc_get_hvm_param(xen_xc, xen_domid, > > > > > HVM_PARAM_STUBDOM_VTPM, &stubdom_vtpm); > > > > > > + if (stubdom_vtpm) { > > > > > > + xen_vtpm_register(&xen_vtpmdev_ops); > > > > > > + } > > > > > > +#endif > > > > > > > > > > Given that vtpm is just a PV frontend, can't you just detect > > > > > whether is present on xenstore and initialize it based on that? > > > > > Like all the backend below? > > > > > > > > Also I will explain in my next email. > > > > > > > > > > > > > > > > > > > > > > > > xen_be_register("console", &xen_console_ops); > > > > > > xen_be_register("vkbd", &xen_kbdmouse_ops); > > > > > > xen_be_register("qdisk", &xen_blkdev_ops); > > > > > > -- > > > > > > 1.8.3.2 > > > > > > > > > > > > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |