vDPA devices and random MAC address assignment

2025-09-10 Thread Beñat Gartzia Arruabarrena via Devel
Hello, I am trying to find a solution to an issue related to vhost-vdpa devices and random mac addresses being assigned to them, if not set by the user. vDPA devices are assigned a MAC address the time they are created. That happens before creating the VM with qemu or libvirt. If the mac address

[PATCH 3/6] qemuMigrationSrcIsSafeDisk: Extract safe migration checks for one storage source

2025-09-10 Thread Peter Krempa via Devel
From: Peter Krempa Further split up the code originally in 'qemuMigrationSrcIsSafe' to separate checks concerning a single storage source. The code will then be reused to check the safe migration state also for the data file (qcow2 feature that allows store of data separated from the qcow2 metad

Re: [PATCH v3 4/9] tests: Add tests for SEV firmware selection

2025-09-10 Thread Jim Fehlig via Devel
On 9/10/25 07:57, Andrea Bolognani via Devel wrote: One of the new test cases demonstrates how firmware autoselection doesn't currently work correctly for domains using SEV-SNP: the descriptor for a suitable firmware exists, and yet it doesn't get picked up. Another test cases shows that, while

[PATCH 0/4] ch: Disk attach/detach fixes

2025-09-10 Thread Michal Privoznik via Devel
While reviewing Stefan patches [1] I've changed some of them before merging and oopsie, I've introduced a bug (patch 1/4) but fortunately forgot to remove the code I intended to move so it actually works :-D. 1: https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/HAZRW5NYFJFBG

Re: [PATCH 4/6] qemuMigrationSrcIsSafeDisk: Check also data file propertiues for migrability

2025-09-10 Thread Ján Tomko via Devel
In the commit summary: *properties On a Wednesday in 2025, Peter Krempa via Devel wrote: From: Peter Krempa If the qcow2 data file feature (which separates the data into a separate file from the metadata) is in use the migration safety check ought co ought to Jano consider both the metad

Re: [PATCH v2 00/10] qemu: Fixes to firmware selection

2025-09-10 Thread Andrea Bolognani via Devel
On Wed, Sep 10, 2025 at 08:21:17AM -0500, Andrea Bolognani wrote: > On Mon, Sep 08, 2025 at 04:00:06PM -0600, Jim Fehlig wrote: > > Were you planning to spin another version which includes > > patch 8? > > Not necessarily, but I have just opened > > https://src.fedoraproject.org/rpms/edk2/pull-re

[PATCH v3 8/9] DONOTMERGE update firmware data

2025-09-10 Thread Andrea Bolognani via Devel
Based on proposed changes in the Fedora edk2 package: https://src.fedoraproject.org/rpms/edk2/pull-request/14 A new firmware descriptor exists for the stateful SEV use case, and the regular edk2 descriptor no longer advertises support for SEV/SEV-ES. Additionally, all stateless SEV use cases a

[PATCH v3 7/9] news: Update for firmware selection fixes

2025-09-10 Thread Andrea Bolognani via Devel
Signed-off-by: Andrea Bolognani --- NEWS.rst | 5 + 1 file changed, 5 insertions(+) diff --git a/NEWS.rst b/NEWS.rst index 1b8e188f5e..847dcb390b 100644 --- a/NEWS.rst +++ b/NEWS.rst @@ -36,6 +36,11 @@ v11.8.0 (unreleased) * **Bug fixes** + * qemu: Fix selection of stateless/combined f

[PATCH v3 5/9] qemu: Fix matching for stateless/combined firmware

2025-09-10 Thread Andrea Bolognani via Devel
The current code assumes that a stateless firmware has to be explicitly requested by the user, and should never be picked otherwise. This means that, for example, domains configured to use SEV-SNP are forced to explicitly request for the firmware to be stateless. Additionally, we assume that only

[PATCH v3 4/9] tests: Add tests for SEV firmware selection

2025-09-10 Thread Andrea Bolognani via Devel
One of the new test cases demonstrates how firmware autoselection doesn't currently work correctly for domains using SEV-SNP: the descriptor for a suitable firmware exists, and yet it doesn't get picked up. Another test cases shows that, while firmware autoselection succeeds for non-SNP SEV domain

[PATCH v3 3/9] tests: Improve AMD SEV-related tests

2025-09-10 Thread Andrea Bolognani via Devel
From: Jim Fehlig SEV and SEV-ES guests should use q35 machine type and uefi. Adjust existing tests accordingly. Signed-off-by: Jim Fehlig Reviewed-by: Andrea Bolognani --- ...curity-sev-direct.x86_64-latest+amdsev.args | 4 +++- ...ecurity-sev-direct.x86_64-latest+amdsev.xml | 8 ++-- .

[PATCH v3 2/9] tests: Minimize SEV tests

2025-09-10 Thread Andrea Bolognani via Devel
Removing all unnecessary devices and elements makes it easier to focus on the actual purpose of these tests (configuring the SEV-specific bits). Signed-off-by: Andrea Bolognani Reviewed-by: Jim Fehlig --- ...urity-sev-direct.x86_64-latest+amdsev.args | 3 -- ...curity-sev-direct.x86_64-latest+

[PATCH v3 1/9] tests: Tweak descriptor for combined firmware

2025-09-10 Thread Andrea Bolognani via Devel
This kind of firmware build is not shipped in Fedora, where most descriptors in our test suite come from, so we had to make it up. It was based off the Secure Boot-enabled edk2 build, and the filename it points to is the same. That has been fine so far since it's not actually being picked up by an

[PATCH 5/6] qemuBlockGetNamedNodeData: Extract 'data_file_raw' flag

2025-09-10 Thread Peter Krempa via Devel
From: Peter Krempa The 'data_file_raw' flag of qcow2 notifies that all data inside the 'data_file' is a raw image so can be used standalone without the metadata without any problem (except for not updating the dirty bitmaps). Our migration safety checks will allow skipping the migration safety c

[PATCH 1/6] qemuMigrationSrcIsSafe: Drop 'DEBUG' message about qemu supporting cache dropping

2025-09-10 Thread Peter Krempa via Devel
From: Peter Krempa The feature exists for a long time, no need to add extra notice about it. Signed-off-by: Peter Krempa --- src/qemu/qemu_migration.c | 8 ++-- 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/src/qemu/qemu_migration.c b/src/qemu/qemu_migration.c index a8f4dd4

[PATCH 0/6] qemu: refactor disk migration safety check and add corner case exemption for Kubevirt's usage

2025-09-10 Thread Peter Krempa via Devel
Patches 1-3 are refactors that simplify the code and prepare it. Patch 4 fixed bug where 'data_file' is not checked Patches 5 and 6 add a workaround for Kubevirt's corner case migration approach. Peter Krempa (6): qemuMigrationSrcIsSafe: Drop 'DEBUG' message about qemu supporting cache dropp

Re: [PATCH v2 00/10] qemu: Fixes to firmware selection

2025-09-10 Thread Andrea Bolognani via Devel
On Mon, Sep 08, 2025 at 04:00:06PM -0600, Jim Fehlig wrote: > Hi Andrea, > > Is there anything I can do to help move this series forward? I think 8/10 > can now be considered for merging, correct? Well, yes, but I'm not particularly keen on updating libvirt's test suite when the status in the Fedo

Re: [libvirt-python PATCH] build: Adapt to PEP 625 distribution file naming

2025-09-10 Thread Michal Prívozník via Devel
On 9/10/25 14:04, Jiri Denemark via Devel wrote: > The version of setuptools shipped by Fedora 42 is PEP 625 compliant, > which requires distribution files to contain a normalized package name. > Thus the generated tarball is called libvirt_python-$VER.tar.gz rather > than libvirt-python-$VER.tar.g

[libvirt PATCH 2/2] util: remove glibcompat.c

2025-09-10 Thread Ján Tomko via Devel
From: Ján Tomko There are no functions reimplemented here anymore. Signed-off-by: Ján Tomko --- src/util/glibcompat.c | 64 --- src/util/meson.build | 1 - 2 files changed, 65 deletions(-) delete mode 100644 src/util/glibcompat.c diff --git a/src/uti

[libvirt PATCH 1/2] build: bump minimum glib version to 2.68

2025-09-10 Thread Ján Tomko via Devel
From: Ján Tomko We removed support for Debian 11 which only had 2.66.8. Next stop: 2.72 after we drop Ubuntu 22.04 For libvirt, the update to the 2.68 GLib release: * introduces g_string_replace * deprecates g_memdup in favor of g_memdup2 * removes the need for some warning workarounds * depreca

[libvirt PATCH 0/2] bump minimum glib version to 2.68

2025-09-10 Thread Ján Tomko via Devel
Ján Tomko (2): build: bump minimum glib version to 2.68 util: remove glibcompat.c meson.build | 2 +- src/conf/virdomainjob.c | 6 +- src/esx/esx_vi_types.c | 9 +- src/internal.h | 24 src/libvirt_private.syms | 4 - src/qemu/qemu_c

[PATCH 4/4] ch: Avoid memleak on disk detach in chDomainRemoveDevice()

2025-09-10 Thread Michal Privoznik via Devel
From: Michal Privoznik The aim of chDomainRemoveDevice() is to remove device from virDomainDef. Well, in case of disks this is done by calling virDomainDiskRemove() which merely just removes it from the array of virDomainDiskDef-s but leaves it up to the caller to actually free the disk def. 1,2

[PATCH 3/4] ch: Drop useless variable in chDomainFindDisk()

2025-09-10 Thread Michal Privoznik via Devel
From: Michal Privoznik The 'disk' variable inside of chDomainFindDisk() is not used really. Drop it. Signed-off-by: Michal Privoznik --- src/ch/ch_hotplug.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/src/ch/ch_hotplug.c b/src/ch/ch_hotplug.c index aa723dd123..cfa11cc

[PATCH 1/4] ch: Actually remove device in chDomainDetachDeviceLive()

2025-09-10 Thread Michal Privoznik via Devel
From: Michal Privoznik Inside of chDomainDetachDeviceLive() there are two variables that are important in this case: 'match' and 'detach'. The first one contains device definition as parsed from user provided XML, the other contains pointer to the device definition inside virDomainDef (as returne

[PATCH] ch: Avoid memleak in virCHDriverConfigDispose()

2025-09-10 Thread Michal Privoznik via Devel
From: Michal Privoznik When virCHDriverConfig struct is initialized in virCHDriverConfigNew() the 'configDir' member is allocated but corresponding free is missing in virCHDriverConfigDispose(). While at it, reorder the free calls to match the order in which they are declared in the struct so it'