On Tue, Aug 05, 2025 at 04:28:18PM +0100, Daniel P. Berrangé wrote:
> On Tue, Aug 05, 2025 at 08:54:02AM -0500, Andrea Bolognani wrote:
> > On Thu, Jul 31, 2025 at 07:33:21PM +0100, Daniel P. Berrangé via Devel
> > wrote:
> > > +++ b/src/qemu/qemu_firmware.c
> > > @@ -1540,6 +1540,7 @@ qemuFirmwareSanityCheck(const qemuFirmware *fw,
> > > bool requiresSMM = false;
> > > bool supportsSecureBoot = false;
> > > bool hasEnrolledKeys = false;
> > > + bool cvm = false;
> >
> > Maybe isConfidential instead, to follow the existing convention and
> > be a little more descriptive?
> >
> > > @@ -1566,7 +1569,8 @@ qemuFirmwareSanityCheck(const qemuFirmware *fw,
> > > }
> > > }
> > >
> > > - if ((supportsSecureBoot != requiresSMM) ||
> > > + if ((!cvm &&
> > > + (supportsSecureBoot != requiresSMM)) ||
> > > (hasEnrolledKeys && !supportsSecureBoot)) {
> > > VIR_WARN("Firmware description '%s' has invalid set of features:
> > > "
> > > "%s = %d, %s = %d, %s = %d",
> >
> > This could use a short comment explaining why firmware intended for
> > CVM doesn't need SSM for Secure Boot.
> >
> > Regardless of whether you want to act on any of the above
> > suggestions, the change makes sense so
>
> I made both those changes and pushed.
Looks great, thank you!
--
Andrea Bolognani / Red Hat / Virtualization