On Thu, Jul 31, 2025 at 07:33:21PM +0100, Daniel P. Berrangé via Devel wrote:
> +++ b/src/qemu/qemu_firmware.c
> @@ -1540,6 +1540,7 @@ qemuFirmwareSanityCheck(const qemuFirmware *fw,
>      bool requiresSMM = false;
>      bool supportsSecureBoot = false;
>      bool hasEnrolledKeys = false;
> +    bool cvm = false;

Maybe isConfidential instead, to follow the existing convention and
be a little more descriptive?

> @@ -1566,7 +1569,8 @@ qemuFirmwareSanityCheck(const qemuFirmware *fw,
>          }
>      }
>
> -    if ((supportsSecureBoot != requiresSMM) ||
> +    if ((!cvm &&
> +         (supportsSecureBoot != requiresSMM)) ||
>          (hasEnrolledKeys && !supportsSecureBoot)) {
>          VIR_WARN("Firmware description '%s' has invalid set of features: "
>                   "%s = %d, %s = %d, %s = %d",

This could use a short comment explaining why firmware intended for
CVM doesn't need SSM for Secure Boot.

Regardless of whether you want to act on any of the above
suggestions, the change makes sense so

  Reviewed-by: Andrea Bolognani <abolo...@redhat.com>

-- 
Andrea Bolognani / Red Hat / Virtualization

Reply via email to