From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([208.118.235.92]:38488) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1ehOIh-0005IY-Vx for qemu-devel@nongnu.org; Thu, 01 Feb 2018 18:30:58 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1ehOCm-0001um-Qz for qemu-devel@nongnu.org; Thu, 01 Feb 2018 18:24:51 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:54172 helo=mx0a-001b2d01.pphosted.com) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1ehOCm-0001tL-8x for qemu-devel@nongnu.org; Thu, 01 Feb 2018 18:23:44 -0500 Received: from pps.filterd (m0098417.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w11NJ9rA128730 for ; Thu, 1 Feb 2018 18:23:43 -0500 Received: from e18.ny.us.ibm.com (e18.ny.us.ibm.com [129.33.205.208]) by mx0a-001b2d01.pphosted.com with ESMTP id 2fv9tmp7mw-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 01 Feb 2018 18:23:43 -0500 Received: from localhost by e18.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 1 Feb 2018 18:23:42 -0500 From: Stefan Berger Date: Thu, 1 Feb 2018 18:23:35 -0500 In-Reply-To: <1517527416-31328-1-git-send-email-stefanb@linux.vnet.ibm.com> References: <1517527416-31328-1-git-send-email-stefanb@linux.vnet.ibm.com> Message-Id: <1517527416-31328-2-git-send-email-stefanb@linux.vnet.ibm.com> Subject: [Qemu-devel] [PATCH 1/2] tpm: Split off tpm_crb_reset function List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: stefanb@linux.vnet.ibm.com, marcandre.lureau@redhat.com Split off the tpm_crb_reset function part from tpm_crb_realize that we need to run every time the machine resets. Signed-off-by: Stefan Berger --- hw/tpm/tpm_crb.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/hw/tpm/tpm_crb.c b/hw/tpm/tpm_crb.c index 687d255..624e2e9 100644 --- a/hw/tpm/tpm_crb.c +++ b/hw/tpm/tpm_crb.c @@ -232,6 +232,11 @@ static void tpm_crb_realize(DeviceState *dev, Error **errp) TPM_CRB_ADDR_BASE, &s->mmio); memory_region_add_subregion(get_system_memory(), TPM_CRB_ADDR_BASE + sizeof(s->regs), &s->cmdmem); +} + +static void tpm_crb_reset(DeviceState *dev) +{ + CRBState *s = CRB(dev); tpm_backend_reset(s->tpmbe); @@ -274,6 +279,7 @@ static void tpm_crb_class_init(ObjectClass *klass, void *data) dc->realize = tpm_crb_realize; dc->props = tpm_crb_properties; + dc->reset = tpm_crb_reset; dc->vmsd = &vmstate_tpm_crb; dc->user_creatable = true; tc->model = TPM_MODEL_TPM_CRB; -- 2.5.5