[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v2 2/4] Qemu-Xen-vTPM: Register Xen stubdom vTPM frontend driver
On Sun, 23 Nov 2014, Quan Xu wrote: > This drvier transfers any request/repond between TPM xenstubdoms > driver and Xen vTPM stubdom, and facilitates communications between > Xen vTPM stubdom domain and vTPM xenstubdoms driver > > Signed-off-by: Quan Xu <quan.xu@xxxxxxxxx> This patch needs a better description, see my past request: http://marc.info/?l=xen-devel&m=141501570709022&w=2 > hw/tpm/Makefile.objs | 1 + > hw/tpm/xen_stubdom_vtpm.c | 321 > +++++++++++++++++++++++++++++++++++++++++++ > hw/xen/xen_backend.c | 272 ++++++++++++++++++++++++++++++++++++ > include/hw/xen/xen_backend.h | 11 ++ > include/hw/xen/xen_common.h | 6 + > xen-hvm.c | 13 ++ > 6 files changed, 624 insertions(+) > create mode 100644 hw/tpm/xen_stubdom_vtpm.c > > diff --git a/hw/tpm/Makefile.objs b/hw/tpm/Makefile.objs > index 99f5983..87efb01 100644 > --- a/hw/tpm/Makefile.objs > +++ b/hw/tpm/Makefile.objs > @@ -1,2 +1,3 @@ > common-obj-$(CONFIG_TPM_TIS) += tpm_tis.o > common-obj-$(CONFIG_TPM_PASSTHROUGH) += tpm_passthrough.o > +common-obj-$(CONFIG_TPM_XENSTUBDOMS) += xen_stubdom_vtpm.o > diff --git a/hw/tpm/xen_stubdom_vtpm.c b/hw/tpm/xen_stubdom_vtpm.c > new file mode 100644 > index 0000000..4fd6053 > --- /dev/null > +++ b/hw/tpm/xen_stubdom_vtpm.c I would just call it xen_vtpm_frontend.c I don't think that the fact that the backend is probably run in a stubdom is relevant here. The only thing that matter is that this is a PV frontend. Also if this is the vtpm specific frontend, where is the file that introduces the generic frontend registration framework, as previously discussed? http://marc.info/?l=xen-devel&m=141528935207946&w=2 I think we should have a hw/xen/xen_frontend.c file, introducing xen_fe_register etc, and a separate hw/tpm/xen_stubdom_vtpm.c with the vtpm specific stuff. > @@ -0,0 +1,321 @@ > +/* > + * Connect to Xen vTPM stubdom domain > + * > + * Copyright (c) 2014 Intel Corporation > + * Authors: > + * Quan Xu <quan.xu@xxxxxxxxx> > + * > + * This library is free software; you can redistribute it and/or > + * modify it under the terms of the GNU Lesser General Public > + * License as published by the Free Software Foundation; either > + * version 2 of the License, or (at your option) any later version. > + * > + * This library is distributed in the hope that it will be useful, > + * but WITHOUT ANY WARRANTY; without even the implied warranty of > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > + * Lesser General Public License for more details. > + * > + * You should have received a copy of the GNU Lesser General Public > + * License along with this library; if not, see > <http://www.gnu.org/licenses/> > + */ > + > +#include <stdio.h> > +#include <stdlib.h> > +#include <stdarg.h> > +#include <string.h> > +#include <unistd.h> > +#include <signal.h> > +#include <inttypes.h> > +#include <time.h> > +#include <fcntl.h> > +#include <errno.h> > +#include <sys/ioctl.h> > +#include <sys/types.h> > +#include <sys/stat.h> > +#include <sys/mman.h> > +#include <sys/uio.h> > + > +#include "hw/hw.h" > +#include "block/aio.h" > +#include "hw/xen/xen_backend.h" > + > +enum tpmif_state { > + TPMIF_STATE_IDLE, /* no contents / vTPM idle / cancel complete */ > + TPMIF_STATE_SUBMIT, /* request ready / vTPM working */ > + TPMIF_STATE_FINISH, /* response ready / vTPM idle */ > + TPMIF_STATE_CANCEL, /* cancel requested / vTPM working */ > +}; > + > +static AioContext *vtpm_aio_ctx; > + > +enum status_bits { > + VTPM_STATUS_RUNNING = 0x1, > + VTPM_STATUS_IDLE = 0x2, > + VTPM_STATUS_RESULT = 0x4, > + VTPM_STATUS_CANCELED = 0x8, > +}; > + > +struct tpmif_shared_page { > + uint32_t length; /* request/response length in bytes */ > + > + uint8_t state; /* enum tpmif_state */ > + uint8_t locality; /* for the current request */ > + uint8_t pad; /* should be zero */ > + > + uint8_t nr_extra_pages; /* extra pages for long packets; may be zero */ > + uint32_t extra_pages[0]; /* grant IDs; length is actually nr_extra_pages > */ > +}; > + > +struct XenVtpmDev { > + struct XenDevice xendev; /* must be first */ > + struct tpmif_shared_page *shr; > + xc_gntshr *xen_xcs; > + int ring_ref; > + int bedomid; > + QEMUBH *sr_bh; > +}; > + > +static uint8_t vtpm_status(struct XenVtpmDev *vtpmdev) > +{ > + switch (vtpmdev->shr->state) { > + case TPMIF_STATE_IDLE: > + case TPMIF_STATE_FINISH: > + return VTPM_STATUS_IDLE; > + case TPMIF_STATE_SUBMIT: > + case TPMIF_STATE_CANCEL: > + return VTPM_STATUS_RUNNING; > + default: > + return 0; > + } > +} > + > +static int xenbus_switch_state(struct XenDevice *xendev, enum xenbus_state > xbus) > +{ > + xs_transaction_t xbt = XBT_NULL; > + > + if (xendev->fe_state == xbus) { > + return 0; > + } > + > + xendev->fe_state = xbus; > + > +retry_transaction: > + xbt = xs_transaction_start(xenstore); > + if (xbt == XBT_NULL) { > + goto abort_transaction; > + } > + > + if (xenstore_write_int(xendev->fe, "state", xbus)) { > + goto abort_transaction; > + } > + > + if (!xs_transaction_end(xenstore, xbt, 0)) { > + if (errno == EAGAIN) { > + goto retry_transaction; > + } > + } > + > + return 0; > + > +abort_transaction: > + xs_transaction_end(xenstore, xbt, 1); > + return -1; > +} This would probably end up in xen_frontend.c > +static bool vtpm_aio_wait(AioContext *ctx) > +{ > + return aio_poll(ctx, true); > +} > + > +static void sr_bh_handler(void *opaque) > +{ > +} > + > +static int vtpm_recv(struct XenDevice *xendev, uint8_t* buf, size_t *count) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + struct tpmif_shared_page *shr = vtpmdev->shr; > + unsigned int offset; > + > + if (shr->state == TPMIF_STATE_IDLE) { > + return -ECANCELED; > + } > + > + while (vtpm_status(vtpmdev) != VTPM_STATUS_IDLE) { > + vtpm_aio_wait(vtpm_aio_ctx); > + } > + > + offset = sizeof(*shr) + 4*shr->nr_extra_pages; > + memcpy(buf, offset + (uint8_t *)shr, shr->length); > + *count = shr->length; > + > + return 0; > +} > + > +static int vtpm_send(struct XenDevice *xendev, uint8_t* buf, size_t count) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + struct tpmif_shared_page *shr = vtpmdev->shr; > + unsigned int offset = sizeof(*shr) + 4*shr->nr_extra_pages; > + > + while (vtpm_status(vtpmdev) != VTPM_STATUS_IDLE) { > + vtpm_aio_wait(vtpm_aio_ctx); > + } > + > + memcpy(offset + (uint8_t *)shr, buf, count); > + shr->length = count; > + barrier(); > + shr->state = TPMIF_STATE_SUBMIT; > + xen_wmb(); > + xen_be_send_notify(&vtpmdev->xendev); > + > + while (vtpm_status(vtpmdev) != VTPM_STATUS_IDLE) { > + vtpm_aio_wait(vtpm_aio_ctx); > + } > + > + return count; > +} > + > +static int vtpm_initialise(struct XenDevice *xendev) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + xs_transaction_t xbt = XBT_NULL; > + unsigned int ring_ref; > + > + vtpmdev->xendev.fe = xenstore_read_be_str(&vtpmdev->xendev, "frontend"); > + if (vtpmdev->xendev.fe == NULL) { > + return -1; > + } > + > + /* Get backend domid */ > + if (xenstore_read_fe_int(&vtpmdev->xendev, "backend-id", > + &vtpmdev->bedomid)) { > + return -1; > + } > + > + /*alloc share page*/ > + vtpmdev->shr = xc_gntshr_share_pages(vtpmdev->xen_xcs, vtpmdev->bedomid, > 1, > + &ring_ref, PROT_READ|PROT_WRITE); > + vtpmdev->ring_ref = ring_ref; > + if (vtpmdev->shr == NULL) { > + return -1; > + } > + > + /*Create event channel */ > + if (xen_be_alloc_unbound(&vtpmdev->xendev, 0, vtpmdev->bedomid)) { > + xc_gntshr_munmap(vtpmdev->xen_xcs, vtpmdev->shr, 1); > + return -1; > + } > + > + xc_evtchn_unmask(vtpmdev->xendev.evtchndev, > + vtpmdev->xendev.local_port); > + > +again: > + xbt = xs_transaction_start(xenstore); > + if (xbt == XBT_NULL) { > + goto abort_transaction; > + } > + > + if (xenstore_write_int(vtpmdev->xendev.fe, "ring-ref", > + vtpmdev->ring_ref)) { > + goto abort_transaction; > + } > + > + if (xenstore_write_int(vtpmdev->xendev.fe, "event-channel", > + vtpmdev->xendev.local_port)) { > + goto abort_transaction; > + } > + > + /* Publish protocol v2 feature */ > + if (xenstore_write_int(vtpmdev->xendev.fe, "feature-protocol-v2", 1)) { > + goto abort_transaction; > + } > + > + if (!xs_transaction_end(xenstore, xbt, 0)) { > + if (errno == EAGAIN) { > + goto again; > + } > + } > + /* Tell vtpm backend that we are ready */ > + xenbus_switch_state(&vtpmdev->xendev, XenbusStateInitialised); > + > + return 0; > + > +abort_transaction: > + xc_gntshr_munmap(vtpmdev->xen_xcs, vtpmdev->shr, 1); > + xs_transaction_end(xenstore, xbt, 1); > + return -1; > +} > + > +static void vtpm_backend_changed(struct XenDevice *xendev, const char *node) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + int be_state; > + > + if (strcmp(node, "state") == 0) { > + xenstore_read_be_int(&vtpmdev->xendev, node, &be_state); > + switch (be_state) { > + case XenbusStateConnected: > + /*TODO*/ > + break; > + case XenbusStateClosing: > + case XenbusStateClosed: > + xenbus_switch_state(&vtpmdev->xendev, XenbusStateClosing); > + break; > + default: > + break; > + } > + } > +} This would probably end up in xen_backend.c > +static int vtpm_free(struct XenDevice *xendev) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + aio_poll(vtpm_aio_ctx, false); > + qemu_bh_delete(vtpmdev->sr_bh); > + if (vtpmdev->shr) { > + xc_gntshr_munmap(vtpmdev->xen_xcs, vtpmdev->shr, 1); > + } > + xc_interface_close(vtpmdev->xen_xcs); > + return 0; > +} > + > +static void vtpm_alloc(struct XenDevice *xendev) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + > + vtpm_aio_ctx = aio_context_new(NULL); > + if (vtpm_aio_ctx == NULL) { > + return; > + } > + vtpmdev->sr_bh = aio_bh_new(vtpm_aio_ctx, sr_bh_handler, vtpmdev); > + qemu_bh_schedule(vtpmdev->sr_bh); > + vtpmdev->xen_xcs = xen_xc_gntshr_open(0, 0); > +} > + > +static void vtpm_event(struct XenDevice *xendev) > +{ > + struct XenVtpmDev *vtpmdev = container_of(xendev, struct XenVtpmDev, > + xendev); > + > + qemu_bh_schedule(vtpmdev->sr_bh); > +} > + > +struct XenDevOps xen_vtpmdev_ops = { > + .size = sizeof(struct XenVtpmDev), > + .flags = DEVOPS_FLAG_IGNORE_STATE | > + DEVOPS_FLAG_STUBDOM_BE, > + .event = vtpm_event, > + .free = vtpm_free, > + .alloc = vtpm_alloc, > + .initialise = vtpm_initialise, > + .backend_changed = vtpm_backend_changed, > + .recv = vtpm_recv, > + .send = vtpm_send, I don't think that recv and send should be part of the XenDevOps interface. This interface is supposed to be a generic interface to implement a Xen PV backend (or frontend maybe). recv and send are specific to the vtpm driver, so they should not be here. > +}; > diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c > index b2cb22b..5e7cfe5 100644 > --- a/hw/xen/xen_backend.c > +++ b/hw/xen/xen_backend.c > @@ -194,6 +194,32 @@ int xen_be_set_state(struct XenDevice *xendev, enum > xenbus_state state) > return 0; > } > > +/*get stubdom backend*/ > +static char *xen_stubdom_be(const char *type, int dom, int dev) > +{ > + char *val, *domu; > + char path[XEN_BUFSIZE]; > + unsigned int len, ival; > + > + /*front domu*/ > + domu = xs_get_domain_path(xenstore, dom); > + snprintf(path, sizeof(path), "%s/device/%s/%d/backend-id", > + domu, type, dev); > + g_free(domu); > + > + val = xs_read(xenstore, 0, path, &len); > + if (!val || 1 != sscanf(val, "%d", &ival)) { > + g_free(val); > + return NULL; > + } > + g_free(val); > + > + /*backend domu*/ > + domu = xs_get_domain_path(xenstore, ival); > + > + return domu; > +} This looks like a function to find the backend path. Instead of duplicating functionalities with xenstore_read_be_str, we should just make sure that xenstore_read_be_str works with backends other than dom0. If we really do need a new function, that I don't think is the case, it should be as generic as possible, so it should be called something like xenstore_read_be_str and be in xen_frontend.c. > /* ------------------------------------------------------------- */ > > struct XenDevice *xen_be_find_xendev(const char *type, int dom, int dev) > @@ -273,6 +299,68 @@ static struct XenDevice *xen_be_get_xendev(const char > *type, int dom, int dev, > } > > /* > + * get xen stubdom backend device, allocate a new one if it doesn't exist. > + */ > +static struct XenDevice *xen_stubdom_be_get_xendev(const char *type, > + int dom, int dev, struct XenDevOps *ops) > +{ > + struct XenDevice *xendev; > + char *stub; > + > + xendev = xen_be_find_xendev(type, dom, dev); > + if (xendev) { > + return xendev; > + } > + > + /* init new xendev */ > + xendev = g_malloc0(ops->size); > + xendev->type = type; > + xendev->dom = dom; > + xendev->dev = dev; > + xendev->ops = ops; > + > + if (ops->flags & DEVOPS_FLAG_STUBDOM_BE) { > + stub = xen_stubdom_be(xendev->type, xendev->dom, xendev->dev); > + snprintf(xendev->be, sizeof(xendev->be), "%s/backend/%s/%d/%d", > + stub, xendev->type, xendev->dom, xendev->dev); > + g_free(stub); > + } > + snprintf(xendev->name, sizeof(xendev->name), "%s-%d", > + xendev->type, xendev->dev); > + > + xendev->debug = debug; > + xendev->local_port = -1; > + > + xendev->evtchndev = xen_xc_evtchn_open(NULL, 0); > + if (xendev->evtchndev == XC_HANDLER_INITIAL_VALUE) { > + xen_be_printf(NULL, 0, "can't open evtchn device\n"); > + g_free(xendev); > + return NULL; > + } > + fcntl(xc_evtchn_fd(xendev->evtchndev), F_SETFD, FD_CLOEXEC); > + > + if (ops->flags & DEVOPS_FLAG_NEED_GNTDEV) { > + xendev->gnttabdev = xen_xc_gnttab_open(NULL, 0); > + if (xendev->gnttabdev == XC_HANDLER_INITIAL_VALUE) { > + xen_be_printf(NULL, 0, "can't open gnttab device\n"); > + xc_evtchn_close(xendev->evtchndev); > + g_free(xendev); > + return NULL; > + } > + } else { > + xendev->gnttabdev = XC_HANDLER_INITIAL_VALUE; > + } > + > + QTAILQ_INSERT_TAIL(&xendevs, xendev, next); > + > + if (xendev->ops->alloc) { > + xendev->ops->alloc(xendev); > + } > + > + return xendev; > +} Same here: this should be called xen_fe_get_xendev and be in xen_frontend.c Nothing should be called *_stubdom_*: we don't care about stubdoms in QEMU, only about frontends and backends. > +/* > * release xen backend device. > */ > static struct XenDevice *xen_be_del_xendev(int dom, int dev) > @@ -611,6 +699,47 @@ static int xenstore_scan(const char *type, int dom, > struct XenDevOps *ops) > return 0; > } > > +static void stubdom_update_be(char *watch, char *type, int dom, > + struct XenDevOps *ops) > +{ > + struct XenDevice *xendev; > + char path[XEN_BUFSIZE]; > + char *ptr, *bepath; > + unsigned int len, dev; > + > + if (!(ops->flags & DEVOPS_FLAG_STUBDOM_BE)) { > + return; > + } > + > + len = snprintf(path, sizeof(path), "backend/%s/%d", type, dom); > + ptr = strstr(watch, path); > + if (ptr == NULL) { > + return; > + } > + > + if (sscanf(ptr+len, "/%u/%255s", &dev, path) != 2) { > + strcpy(path, ""); > + if (sscanf(ptr+len, "/%u", &dev) != 1) { > + dev = -1; > + } > + } > + > + if (dev == -1) { > + return; > + } > + > + xendev = xen_be_get_xendev(type, dom, dev, ops); > + if (xendev != NULL) { > + bepath = xs_read(xenstore, 0, xendev->be, &len); > + if (bepath == NULL) { > + xen_be_del_xendev(dom, dev); > + } else { > + free(bepath); > + xen_be_backend_changed(xendev, path); > + } > + } > +} ditto > static void xenstore_update_be(char *watch, char *type, int dom, > struct XenDevOps *ops) > { > @@ -681,6 +810,10 @@ static void xenstore_update(void *unused) > if (sscanf(vec[XS_WATCH_TOKEN], "fe:%" PRIxPTR, &ptr) == 1) { > xenstore_update_fe(vec[XS_WATCH_PATH], (void*)ptr); > } > + if (sscanf(vec[XS_WATCH_TOKEN], "stub:%" PRIxPTR ":%d:%" PRIxPTR, > + &type, &dom, &ops) == 3) { > + stubdom_update_be(vec[XS_WATCH_PATH], (void *)type, dom, (void > *)ops); > + } > > cleanup: > free(vec); > @@ -732,11 +865,114 @@ err: > return -1; > } > > +static int stubdom_check(struct XenDevice *xendev, uint32_t domid, > + int handle) > +{ > + int rc = 0; > + > + if (xendev->ops->init) { > + rc = xendev->ops->init(xendev); > + } > + > + if (rc != 0) { > + xen_be_printf(xendev, 0, "xendev %s init error\n", > + xendev->name); > + goto err; > + } > + > + if (xendev->ops->initialise) { > + rc = xendev->ops->initialise(xendev); > + } > + > + if (rc != 0) { > + xen_be_printf(xendev, 0, "xendev %s initialise error\n", > + xendev->name); > + goto err; > + } > + > + if (xendev->ops->connected) { > + xendev->ops->connected(xendev); > + } > + > + return rc; > + > +err: > + xen_be_del_xendev(domid, handle); > + return -1; > +} ditto > +static int xenstore_stubdom_scan(const char *type, uint32_t domid, > + struct XenDevOps *ops) > +{ > + struct XenDevice *xendev; > + char path[XEN_BUFSIZE], token[XEN_BUFSIZE]; > + char *domu; > + unsigned int cdev, j; > + char **dev = NULL; > + > + /*stubom : /local/domain/ID */ > + domu = xs_get_domain_path(xenstore, domid); > + snprintf(path, sizeof(path), "%s/device/%s", > + domu, type); > + free(domu); > + dev = xs_directory(xenstore, 0, path, &cdev); > + if (dev == NULL) { > + return 0; > + } > + > + for (j = 0; j < cdev; j++) { > + xendev = xen_stubdom_be_get_xendev(type, domid, > + atoi(dev[j]), ops); > + if (xendev == NULL) { > + xen_be_printf(xendev, 0, "xendev is NULL.\n"); > + continue; > + } > + > + /* simplify QEMU side, a thread is running in Xen stubdom, which will > + * connect frontend when the frontend is initialised. > + */ > + if (stubdom_check(xendev, domid, atoi(dev[j])) < 0) { > + xen_be_printf(xendev, 0, "xendev stubdom_check error.\n"); > + continue; > + } > + > + /*setup watch*/ > + snprintf(token, sizeof(token), "stub:%p:%d:%p", > + type, domid, xendev->ops); > + if (!xs_watch(xenstore, xendev->be, token)) { > + xen_be_printf(xendev, 0, "xs_watch failed.\n"); > + continue; > + } > + } > + > + free(dev); > + return 0; > +} ditto > +int xen_fe_register(const char *type, struct XenDevOps *ops) > +{ > + return xenstore_stubdom_scan(type, xen_domid, ops); > +} > + > int xen_be_register(const char *type, struct XenDevOps *ops) > { > return xenstore_scan(type, xen_domid, ops); > } > > +int xen_be_alloc_unbound(struct XenDevice *xendev, int dom, int remote_dom) > +{ > + xendev->local_port = xc_evtchn_bind_unbound_port(xendev->evtchndev, > + remote_dom); > + if (xendev->local_port == -1) { > + xen_be_printf(xendev, 0, "xc_evtchn_alloc_unbound failed\n"); > + return -1; > + } > + xen_be_printf(xendev, 2, "bind evtchn port %d\n", xendev->local_port); > + qemu_set_fd_handler(xc_evtchn_fd(xendev->evtchndev), > + xen_be_evtchn_event, NULL, xendev); > + return 0; > +} > + > int xen_be_bind_evtchn(struct XenDevice *xendev) > { > if (xendev->local_port != -1) { > @@ -770,6 +1006,42 @@ int xen_be_send_notify(struct XenDevice *xendev) > return xc_evtchn_notify(xendev->evtchndev, xendev->local_port); > } > > +int xen_vtpm_send(unsigned char *buf, size_t count) > +{ > + struct XenDevice *xendev; > + int rc = -1; > + > + xendev = xen_be_find_xendev("vtpm", xen_domid, 0); > + if (xendev == NULL) { > + xen_be_printf(xendev, 0, "Con not find vtpm device\n"); > + return -1; > + } > + > + if (xendev->ops->send) { > + rc = xendev->ops->send(xendev, buf, count); > + } > + > + return rc; > +} > + > +int xen_vtpm_recv(unsigned char *buf, size_t *count) > +{ > + struct XenDevice *xendev; > + int rc = -1; > + > + xendev = xen_be_find_xendev("vtpm", xen_domid, 0); > + if (xendev == NULL) { > + xen_be_printf(xendev, 0, "Con not find vtpm device\n"); > + return -1; > + } > + > + if (xendev->ops->recv) { > + xendev->ops->recv(xendev, buf, count); > + } > + > + return rc; > +} I don't these we should have these two functions here, they don't belong to the QEMU internal Xen backend (or frontend) interface. > /* > * msg_level: > * 0 == errors (stderr + logfile). > diff --git a/include/hw/xen/xen_backend.h b/include/hw/xen/xen_backend.h > index 3b4125e..f2d5489 100644 > --- a/include/hw/xen/xen_backend.h > +++ b/include/hw/xen/xen_backend.h > @@ -15,6 +15,8 @@ struct XenDevice; > #define DEVOPS_FLAG_NEED_GNTDEV 1 > /* don't expect frontend doing correct state transitions (aka console quirk) > */ > #define DEVOPS_FLAG_IGNORE_STATE 2 > +/*dev backend is stubdom*/ > +#define DEVOPS_FLAG_STUBDOM_BE 4 > > struct XenDevOps { > size_t size; > @@ -26,6 +28,8 @@ struct XenDevOps { > void (*event)(struct XenDevice *xendev); > void (*disconnect)(struct XenDevice *xendev); > int (*free)(struct XenDevice *xendev); > + int (*send)(struct XenDevice *xendev, uint8_t* buf, size_t count); > + int (*recv)(struct XenDevice *xendev, uint8_t* buf, size_t *count); > void (*backend_changed)(struct XenDevice *xendev, const char *node); > void (*frontend_changed)(struct XenDevice *xendev, const char > *node); > }; > @@ -91,12 +95,19 @@ int xen_be_send_notify(struct XenDevice *xendev); > void xen_be_printf(struct XenDevice *xendev, int msg_level, const char *fmt, > ...) > GCC_FMT_ATTR(3, 4); > > +/*Xen stubdom vtpm*/ > +int xen_fe_register(const char *type, struct XenDevOps *ops); > +int xen_be_alloc_unbound(struct XenDevice *xendev, int dom, int remote_dom); > +int xen_vtpm_send(unsigned char *buf, size_t count); > +int xen_vtpm_recv(unsigned char *buf, size_t *count); > + > /* actual backend drivers */ > extern struct XenDevOps xen_console_ops; /* xen_console.c */ > extern struct XenDevOps xen_kbdmouse_ops; /* xen_framebuffer.c */ > extern struct XenDevOps xen_framebuffer_ops; /* xen_framebuffer.c */ > extern struct XenDevOps xen_blkdev_ops; /* xen_disk.c */ > extern struct XenDevOps xen_netdev_ops; /* xen_nic.c */ > +extern struct XenDevOps xen_vtpmdev_ops; /* xen_stubdom_vtpm.c*/ > > void xen_init_display(int domid); > > diff --git a/include/hw/xen/xen_common.h b/include/hw/xen/xen_common.h > index 95612a4..fb43084 100644 > --- a/include/hw/xen/xen_common.h > +++ b/include/hw/xen/xen_common.h > @@ -130,6 +130,12 @@ static inline XenXC xen_xc_interface_open(void *logger, > void *dombuild_logger, > return xc_interface_open(logger, dombuild_logger, open_flags); > } > > +static inline xc_gntshr *xen_xc_gntshr_open(void *logger, > + unsigned int open_flags) > +{ > + return xc_gntshr_open(logger, open_flags); > +} > + > /* FIXME There is now way to have the xen fd */ > static inline int xc_fd(xc_interface *xen_xc) > { > diff --git a/xen-hvm.c b/xen-hvm.c > index 21f1cbb..854b8f7 100644 > --- a/xen-hvm.c > +++ b/xen-hvm.c > @@ -1067,6 +1067,11 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, > ram_addr_t *above_4g_mem_size, > int i, rc; > unsigned long ioreq_pfn; > unsigned long bufioreq_evtchn; > + > +#ifdef CONFIG_TPM_XENSTUBDOMS > + unsigned long stubdom_vtpm = 0; > +#endif > + > XenIOState *state; > > state = g_malloc0(sizeof (XenIOState)); > @@ -1169,6 +1174,14 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, > ram_addr_t *above_4g_mem_size, > fprintf(stderr, "%s: xen backend core setup failed\n", __FUNCTION__); > return -1; > } > + > +#ifdef CONFIG_TPM_XENSTUBDOMS > + xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_STUBDOM_VTPM, > &stubdom_vtpm); HVM params are used for domain wide configuration, visible to the guest too. I don't think that this parameter is actually supposed to be guest visible? If not, it should be passed to QEMU via command line or hmp/qmp. > + if (stubdom_vtpm) { > + xen_fe_register("vtpm", &xen_vtpmdev_ops); > + } > +#endif > + > xen_be_register("console", &xen_console_ops); > xen_be_register("vkbd", &xen_kbdmouse_ops); > xen_be_register("qdisk", &xen_blkdev_ops); > -- > 1.8.3.2 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |