hw/vmapple/bdif: Introduce vmapple backdoor interface
authorAlexander Graf <graf@amazon.com>
Wed, 14 Jun 2023 22:56:26 +0000 (22:56 +0000)
committerPhilippe Mathieu-Daudé <philmd@linaro.org>
Tue, 4 Mar 2025 13:45:34 +0000 (14:45 +0100)
commit0179bb3c48cfb915da64305b3cfbc110766d4078
tree9f0181195d942c7aff5f932dc770ec1ca408f994
parentc960b389554bd04e645e321e1cee1d3b4590cc83
hw/vmapple/bdif: Introduce vmapple backdoor interface

The VMApple machine exposes AUX and ROOT block devices (as well as USB OTG
emulation) via virtio-pci as well as a special, simple backdoor platform
device.

This patch implements this backdoor platform device to the best of my
understanding. I left out any USB OTG parts; they're only needed for
guest recovery and I don't understand the protocol yet.

Signed-off-by: Alexander Graf <graf@amazon.com>
Signed-off-by: Phil Dennis-Jordan <phil@philjordan.eu>
Reviewed-by: Akihiko Odaki <akihiko.odaki@daynix.com>
Tested-by: Akihiko Odaki <akihiko.odaki@daynix.com>
Message-ID: <20241223221645.29911-11-phil@philjordan.eu>
Signed-off-by: Philippe Mathieu-Daudé <philmd@linaro.org>
hw/vmapple/Kconfig
hw/vmapple/bdif.c [new file with mode: 0644]
hw/vmapple/meson.build
hw/vmapple/trace-events
include/hw/vmapple/vmapple.h