petri/vm/openvmm/
modify.rsuse super::MANA_INSTANCE;
use super::PetriVmConfigOpenVmm;
use chipset_resources::battery::BatteryDeviceHandleX64;
use chipset_resources::battery::HostBatteryUpdate;
use fs_err::File;
use gdma_resources::GdmaDeviceHandle;
use gdma_resources::VportDefinition;
use hvlite_defs::config::Config;
use hvlite_defs::config::DeviceVtl;
use hvlite_defs::config::LoadMode;
use hvlite_defs::config::VpciDeviceConfig;
use hvlite_defs::config::Vtl2BaseAddressType;
use petri_artifacts_common::tags::IsOpenhclIgvm;
use petri_artifacts_core::ResolvedArtifact;
use tpm_resources::TpmDeviceHandle;
use tpm_resources::TpmRegisterLayout;
use vm_resource::IntoResource;
use vmcore::non_volatile_store::resources::EphemeralNonVolatileStoreHandle;
use vmotherboard::ChipsetDeviceHandle;
use vtl2_settings_proto::Vtl2Settings;
impl PetriVmConfigOpenVmm {
pub fn with_vmbus_redirect(mut self) -> Self {
self.config
.vmbus
.as_mut()
.expect("vmbus not configured")
.vtl2_redirect = true;
let Some(ged) = &mut self.ged else {
panic!("VMBus redirection is only supported for OpenHCL.")
};
ged.vmbus_redirection = true;
self
}
pub fn with_vtl0_alias_map(mut self) -> Self {
self.config
.hypervisor
.with_vtl2
.as_mut()
.expect("Not an openhcl config.")
.vtl0_alias_map = true;
self
}
pub fn with_tpm(mut self) -> Self {
if self.firmware.is_openhcl() {
self.ged.as_mut().unwrap().enable_tpm = true;
} else {
self.config.chipset_devices.push(ChipsetDeviceHandle {
name: "tpm".to_string(),
resource: TpmDeviceHandle {
ppi_store: EphemeralNonVolatileStoreHandle.into_resource(),
nvram_store: EphemeralNonVolatileStoreHandle.into_resource(),
refresh_tpm_seeds: false,
ak_cert_type: tpm_resources::TpmAkCertTypeResource::None,
register_layout: TpmRegisterLayout::IoPort,
guest_secret_key: None,
}
.into_resource(),
});
if let LoadMode::Uefi { enable_tpm, .. } = &mut self.config.load_mode {
*enable_tpm = true;
}
}
self
}
pub fn with_single_processor(mut self) -> Self {
self.config.processor_topology.proc_count = 1;
self
}
pub fn with_secure_boot(mut self) -> Self {
if !self.firmware.is_uefi() {
panic!("Secure boot is only supported for UEFI firmware.");
}
if self.firmware.is_openhcl() {
self.ged.as_mut().unwrap().secure_boot_enabled = true;
} else {
self.config.secure_boot_enabled = true;
}
self
}
pub fn with_windows_secure_boot_template(mut self) -> Self {
if !self.firmware.is_uefi() {
panic!("Secure boot templates are only supported for UEFI firmware.");
}
if self.firmware.is_openhcl() {
self.ged.as_mut().unwrap().secure_boot_template =
get_resources::ged::GuestSecureBootTemplateType::MicrosoftWindows;
} else {
self.config.custom_uefi_vars = hyperv_secure_boot_templates::x64::microsoft_windows();
}
self
}
pub fn with_battery(mut self) -> Self {
if self.firmware.is_openhcl() {
self.ged.as_mut().unwrap().enable_battery = true;
} else {
self.config.chipset_devices.push(ChipsetDeviceHandle {
name: "battery".to_string(),
resource: BatteryDeviceHandleX64 {
battery_status_recv: {
let (tx, rx) = mesh::channel();
tx.send(HostBatteryUpdate::default_present());
rx
},
}
.into_resource(),
});
if let LoadMode::Uefi { enable_battery, .. } = &mut self.config.load_mode {
*enable_battery = true;
}
}
self
}
pub fn with_tpm_state_persistence(mut self) -> Self {
if !self.firmware.is_openhcl() {
panic!("TPM state persistence is only supported for OpenHCL.")
};
let ged = self.ged.as_mut().expect("No GED to configure TPM");
ged.no_persistent_secrets = false;
self
}
pub fn with_nic(mut self) -> Self {
self.config.vpci_devices.push(VpciDeviceConfig {
vtl: DeviceVtl::Vtl2,
instance_id: MANA_INSTANCE,
resource: GdmaDeviceHandle {
vports: vec![VportDefinition {
mac_address: [0x00, 0x15, 0x5D, 0x12, 0x12, 0x12].into(),
endpoint: net_backend_resources::consomme::ConsommeHandle { cidr: None }
.into_resource(),
}],
}
.into_resource(),
});
self.vtl2_settings
.as_mut()
.unwrap()
.dynamic
.as_mut()
.unwrap()
.nic_devices
.push(vtl2_settings_proto::NicDeviceLegacy {
instance_id: MANA_INSTANCE.to_string(),
subordinate_instance_id: None,
max_sub_channels: None,
});
self
}
pub fn with_uefi_frontpage(mut self, enable_frontpage: bool) -> Self {
match self.config.load_mode {
LoadMode::Uefi {
ref mut disable_frontpage,
..
} => {
*disable_frontpage = !enable_frontpage;
}
LoadMode::Igvm { .. } => {
let ged = self.ged.as_mut().expect("no GED to configure DPS");
match ged.firmware {
get_resources::ged::GuestFirmwareConfig::Uefi {
ref mut disable_frontpage,
..
} => {
*disable_frontpage = !enable_frontpage;
}
_ => {
panic!("not a UEFI boot");
}
}
}
_ => panic!("not a UEFI boot"),
}
self
}
pub fn with_openhcl_command_line(mut self, additional_cmdline: &str) -> Self {
if !self.firmware.is_openhcl() {
panic!("Not an OpenHCL firmware.");
}
let LoadMode::Igvm { cmdline, .. } = &mut self.config.load_mode else {
unreachable!()
};
cmdline.push(' ');
cmdline.push_str(additional_cmdline);
self
}
pub fn with_confidential_filtering(self) -> Self {
if !self.firmware.is_openhcl() {
panic!("Confidential filtering is only supported for OpenHCL");
}
self.with_openhcl_command_line(&format!(
"{}=1 {}=0",
underhill_confidentiality::OPENHCL_CONFIDENTIAL_ENV_VAR_NAME,
underhill_confidentiality::OPENHCL_CONFIDENTIAL_DEBUG_ENV_VAR_NAME
))
}
pub fn with_custom_openhcl<A: IsOpenhclIgvm>(mut self, artifact: ResolvedArtifact<A>) -> Self {
let LoadMode::Igvm { file, .. } = &mut self.config.load_mode else {
panic!("Custom OpenHCL is only supported for OpenHCL firmware.")
};
*file = File::open(artifact)
.expect("Failed to open custom OpenHCL file")
.into();
self
}
pub fn with_custom_vtl2_settings(mut self, f: impl FnOnce(&mut Vtl2Settings)) -> Self {
f(self
.vtl2_settings
.as_mut()
.expect("Custom VTL 2 settings are only supported with OpenHCL."));
self
}
pub fn with_vtl2_relocation_mode(mut self, mode: Vtl2BaseAddressType) -> Self {
let LoadMode::Igvm {
vtl2_base_address, ..
} = &mut self.config.load_mode
else {
panic!("vtl2 relocation mode is only supported for OpenHCL firmware")
};
*vtl2_base_address = mode;
self
}
pub fn with_custom_config(mut self, f: impl FnOnce(&mut Config)) -> Self {
f(&mut self.config);
self
}
}