- qemu_firmware: Drop support for kernel descriptors (RHEL-82645) - qemu_firmware: Drop 'nvram' local variable (RHEL-82645) - qemu_firmware: Move format=raw compat exception (RHEL-82645) - qemu_firmware: Move copying of nvram.format to loader.format (RHEL-82645) - tests: Add firmware-manual-efi-rw-nvram (RHEL-82645) - domain_validate: Reject NVRAM with read/write firmware (RHEL-82645) - tests: Add firmware-auto-bios-rw (RHEL-82645) - tests: Add firmware-manual-bios-rw (RHEL-82645) - domain_validate: Reject read/write ROMs (RHEL-82645) - tests: Add firmware-auto-efi-format-loader-qcow2-rom (RHEL-82645) - domain_validate: Reject ROMs with format other than raw (RHEL-82645) - qemu_firmware: Ignore stateless/combined when NVRAM is configured (RHEL-82645) - qemu_firmware: Drop fallback for absent nvramTemplateFormat (RHEL-82645) - schemas: Allow templateFormat without template path (RHEL-82645) - tests: Add firmware-manual-efi-nvram-template-nonstandard-format (RHEL-82645) - tests: Add firmware-manual-efi-nvram-template-nonstandard-legacy-paths (RHEL-82645) - tests: Add firmware-auto-efi-format-nvram-raw (RHEL-82645) - tests: Add firmware-auto-efi-format-nvram-raw-loader-path (RHEL-82645) - tests: Add firmware-auto-efi-format-nvram-raw-nvramtemplate-path (RHEL-82645) - tests: Add firmware-auto-efi-format-nvramtemplate-qcow2 (RHEL-82645) - tests: Add firmware-auto-efi-format-mismatch-nvramtemplate (RHEL-82645) - qemu_firmware: Introduce qemuFirmwareFillDomainCustom() (RHEL-82645) - qemu_firmware: Set templateFormat for custom paths (RHEL-82645) - qemu_firmware: Simplify handling of legacy paths (RHEL-82645) - qemu_firmware: Refactor setting NVRAM format (RHEL-82645) - qemu_firmware: Prefer template format to loader format (RHEL-82645) - qemu_firmware: Retain user-specified NVRAM format (RHEL-82645) - qemu_firmware: Take templateFormat into account when matching (RHEL-82645) - qemu_firmware: Take NVRAM format into account when matching (RHEL-82645) - qemu_firmware: Remove NVRAM to loader format copy hack (RHEL-82645) - tests: Add firmware-manual-efi-sev-snp (RHEL-82645) - tests: Add firmware-manual-efi-tdx (RHEL-82645) - qemu_firmware: ROM firmware is always in raw format (RHEL-82645) - qemu_firmware: Don't skip autoselection for ROM (RHEL-82645) - qemu_firmware: Allow matching both UEFI and BIOS for ROM loader (RHEL-82645) - schema: Add firmwareFeatures element for domaincaps (RHEL-82645) - conf: Add firmwareFeatures element for domaincaps (RHEL-82645) - qemu: Fill in firmwareFeature element for domaincaps (RHEL-82645) - docs: Document firmwareFeature element for domaincaps (RHEL-82645) - docs: Rename "BIOS bootloader" section to "guest firmware" (RHEL-82645) - docs: Improvement related to firmware selection (RHEL-82645) - qemu_firmware: Only set format for custom loader if path is present (RHEL-82645) - conf: Move type=rom default for loader to drivers (RHEL-82645) - tests: Rename custom JSON firmware descriptors (RHEL-82645) - schema: Introduce osnvram define (RHEL-82645) - conf: Parse and format varstore element (RHEL-82645) - conf: Update validation to consider varstore element (RHEL-82645) - qemu_capabilities: Introduce QEMU_CAPS_DEVICE_UEFI_VARS (RHEL-82645) - qemu: Validate presence of uefi-vars device (RHEL-82645) - tests: Add firmware-manual-efi-varstore-q35 (RHEL-82645) - tests: Add firmware-manual-efi-varstore-aarch64 (RHEL-82645) - tests: Add firmware-auto-efi-varstore-q35 (RHEL-82645) - tests: Add firmware-auto-efi-varstore-aarch64 (RHEL-82645) - tests: Add firmware-auto-efi-enrolled-keys-aarch64 (RHEL-82645) - qemu_firmware: Parse host-uefi-vars firmware feature (RHEL-82645) - qemu_firmware: Split sanity check (RHEL-82645) - qemu_firmware: Consider host-uefi-vars feature in sanity check (RHEL-82645) - qemu_firmware: Support extended syntax for ROM firmware descriptors (RHEL-82645) - qemu_firmware: Report NVRAM template path for ROMs (RHEL-82645) - conf: Include varstore element in domcaps (RHEL-82645) - qemu: Fill in varstore element in domcaps (RHEL-82645) - qemu_firmware: Use of NVRAM implies stateful firmware (RHEL-82645) - qemu_firmware: Allow matching stateful ROMs (RHEL-82645) - qemu_firmware: Fill in varstore information (RHEL-82645) - qemu: Introduce varstoreDir (RHEL-82645) - qemu_firmware: Generate varstore path when necessary (RHEL-82645) - qemu: Introduce qemuPrepareNVRAMFileCommon() (RHEL-82645) - qemu: Create and delete varstore file (RHEL-82645) - security: Mark ROMs as read only when using AppArmor (RHEL-82645) - security: Handle varstore file (RHEL-82645) - tests: Add firmware descriptors for uefi-vars builds (RHEL-82645) - qemu_command: Use uefi-vars device where appropriate (RHEL-82645) - include: Mention varstore where applicable (RHEL-82645) - virsh: Update for varstore handling (RHEL-82645) - domain_conf: initialize network hostdev private data (RHEL-151916) - qemu_hotplug: enter monitor in order to rollback passed FD (RHEL-151916) Resolves: RHEL-151916, RHEL-82645
136 lines
6.1 KiB
Diff
136 lines
6.1 KiB
Diff
From b59cc7646f454eb6626e976f20649d2bce3f21e6 Mon Sep 17 00:00:00 2001
|
|
Message-ID: <b59cc7646f454eb6626e976f20649d2bce3f21e6.1772815313.git.jdenemar@redhat.com>
|
|
From: Andrea Bolognani <abologna@redhat.com>
|
|
Date: Wed, 4 Feb 2026 17:43:36 +0100
|
|
Subject: [PATCH] qemu: Introduce varstoreDir
|
|
MIME-Version: 1.0
|
|
Content-Type: text/plain; charset=UTF-8
|
|
Content-Transfer-Encoding: 8bit
|
|
|
|
This is the same as the existing nvramDir, except it will be
|
|
used to store the files used with the uefi-vars QEMU device.
|
|
|
|
Signed-off-by: Andrea Bolognani <abologna@redhat.com>
|
|
Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
|
|
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
|
|
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
|
|
(cherry picked from commit df3121d21ef257c601c0f15deb78deadcc6bffad)
|
|
|
|
https://issues.redhat.com/browse/RHEL-82645
|
|
|
|
Signed-off-by: Andrea Bolognani <abologna@redhat.com>
|
|
---
|
|
libvirt.spec.in | 1 +
|
|
src/qemu/meson.build | 1 +
|
|
src/qemu/qemu_conf.c | 4 ++++
|
|
src/qemu/qemu_conf.h | 1 +
|
|
src/qemu/qemu_driver.c | 12 ++++++++++++
|
|
tests/testutilsqemu.c | 2 ++
|
|
6 files changed, 21 insertions(+)
|
|
|
|
diff --git a/src/qemu/meson.build b/src/qemu/meson.build
|
|
index ff9a904277..b4fb62f14f 100644
|
|
--- a/src/qemu/meson.build
|
|
+++ b/src/qemu/meson.build
|
|
@@ -223,6 +223,7 @@ if conf.has('WITH_QEMU')
|
|
localstatedir / 'lib' / 'libvirt' / 'qemu' / 'ram',
|
|
localstatedir / 'lib' / 'libvirt' / 'qemu' / 'save',
|
|
localstatedir / 'lib' / 'libvirt' / 'qemu' / 'snapshot',
|
|
+ localstatedir / 'lib' / 'libvirt' / 'qemu' / 'varstore',
|
|
localstatedir / 'lib' / 'libvirt' / 'swtpm',
|
|
localstatedir / 'log' / 'libvirt' / 'qemu',
|
|
localstatedir / 'log' / 'swtpm' / 'libvirt' / 'qemu',
|
|
diff --git a/src/qemu/qemu_conf.c b/src/qemu/qemu_conf.c
|
|
index 242955200a..0a2eae3d76 100644
|
|
--- a/src/qemu/qemu_conf.c
|
|
+++ b/src/qemu/qemu_conf.c
|
|
@@ -167,6 +167,7 @@ virQEMUDriverConfig *virQEMUDriverConfigNew(bool privileged,
|
|
cfg->checkpointDir = g_strdup_printf("%s/checkpoint", cfg->libDir);
|
|
cfg->autoDumpPath = g_strdup_printf("%s/dump", cfg->libDir);
|
|
cfg->nvramDir = g_strdup_printf("%s/nvram", cfg->libDir);
|
|
+ cfg->varstoreDir = g_strdup_printf("%s/varstore", cfg->libDir);
|
|
cfg->memoryBackingDir = g_strdup_printf("%s/ram", cfg->libDir);
|
|
} else if (privileged) {
|
|
cfg->logDir = g_strdup_printf("%s/log/libvirt/qemu", LOCALSTATEDIR);
|
|
@@ -188,6 +189,7 @@ virQEMUDriverConfig *virQEMUDriverConfigNew(bool privileged,
|
|
cfg->checkpointDir = g_strdup_printf("%s/checkpoint", cfg->libDir);
|
|
cfg->autoDumpPath = g_strdup_printf("%s/dump", cfg->libDir);
|
|
cfg->nvramDir = g_strdup_printf("%s/nvram", cfg->libDir);
|
|
+ cfg->varstoreDir = g_strdup_printf("%s/varstore", cfg->libDir);
|
|
cfg->memoryBackingDir = g_strdup_printf("%s/ram", cfg->libDir);
|
|
cfg->swtpmStorageDir = g_strdup_printf("%s/lib/libvirt/swtpm",
|
|
LOCALSTATEDIR);
|
|
@@ -215,6 +217,7 @@ virQEMUDriverConfig *virQEMUDriverConfigNew(bool privileged,
|
|
cfg->configBaseDir);
|
|
cfg->autoDumpPath = g_strdup_printf("%s/qemu/dump", cfg->configBaseDir);
|
|
cfg->nvramDir = g_strdup_printf("%s/qemu/nvram", cfg->configBaseDir);
|
|
+ cfg->varstoreDir = g_strdup_printf("%s/qemu/varstore", cfg->configBaseDir);
|
|
cfg->memoryBackingDir = g_strdup_printf("%s/qemu/ram", cfg->configBaseDir);
|
|
cfg->swtpmStorageDir = g_strdup_printf("%s/qemu/swtpm",
|
|
cfg->configBaseDir);
|
|
@@ -367,6 +370,7 @@ static void virQEMUDriverConfigDispose(void *obj)
|
|
g_free(cfg->checkpointDir);
|
|
g_free(cfg->channelTargetDir);
|
|
g_free(cfg->nvramDir);
|
|
+ g_free(cfg->varstoreDir);
|
|
|
|
g_free(cfg->defaultTLSx509certdir);
|
|
g_free(cfg->defaultTLSx509secretUUID);
|
|
diff --git a/src/qemu/qemu_conf.h b/src/qemu/qemu_conf.h
|
|
index edb65c99f4..3b97d24622 100644
|
|
--- a/src/qemu/qemu_conf.h
|
|
+++ b/src/qemu/qemu_conf.h
|
|
@@ -120,6 +120,7 @@ struct _virQEMUDriverConfig {
|
|
char *checkpointDir;
|
|
char *channelTargetDir;
|
|
char *nvramDir;
|
|
+ char *varstoreDir;
|
|
char *swtpmStorageDir;
|
|
|
|
char *defaultTLSx509certdir;
|
|
diff --git a/src/qemu/qemu_driver.c b/src/qemu/qemu_driver.c
|
|
index f3e7410f9e..d314aa94ce 100644
|
|
--- a/src/qemu/qemu_driver.c
|
|
+++ b/src/qemu/qemu_driver.c
|
|
@@ -626,6 +626,11 @@ qemuStateInitialize(bool privileged,
|
|
cfg->nvramDir);
|
|
goto error;
|
|
}
|
|
+ if (g_mkdir_with_parents(cfg->varstoreDir, 0777) < 0) {
|
|
+ virReportSystemError(errno, _("Failed to create varstore dir %1$s"),
|
|
+ cfg->varstoreDir);
|
|
+ goto error;
|
|
+ }
|
|
if (g_mkdir_with_parents(cfg->memoryBackingDir, 0777) < 0) {
|
|
virReportSystemError(errno, _("Failed to create memory backing dir %1$s"),
|
|
cfg->memoryBackingDir);
|
|
@@ -784,6 +789,13 @@ qemuStateInitialize(bool privileged,
|
|
(int)cfg->group);
|
|
goto error;
|
|
}
|
|
+ if (chown(cfg->varstoreDir, cfg->user, cfg->group) < 0) {
|
|
+ virReportSystemError(errno,
|
|
+ _("unable to set ownership of '%1$s' to %2$d:%3$d"),
|
|
+ cfg->varstoreDir, (int)cfg->user,
|
|
+ (int)cfg->group);
|
|
+ goto error;
|
|
+ }
|
|
if (chown(cfg->memoryBackingDir, cfg->user, cfg->group) < 0) {
|
|
virReportSystemError(errno,
|
|
_("unable to set ownership of '%1$s' to %2$d:%3$d"),
|
|
diff --git a/tests/testutilsqemu.c b/tests/testutilsqemu.c
|
|
index 78ec521266..21dfd3141d 100644
|
|
--- a/tests/testutilsqemu.c
|
|
+++ b/tests/testutilsqemu.c
|
|
@@ -336,6 +336,8 @@ int qemuTestDriverInit(virQEMUDriver *driver)
|
|
cfg->memoryBackingDir = g_strdup("/var/lib/libvirt/qemu/ram");
|
|
VIR_FREE(cfg->nvramDir);
|
|
cfg->nvramDir = g_strdup("/var/lib/libvirt/qemu/nvram");
|
|
+ VIR_FREE(cfg->varstoreDir);
|
|
+ cfg->varstoreDir = g_strdup("/var/lib/libvirt/qemu/varstore");
|
|
VIR_FREE(cfg->passtStateDir);
|
|
cfg->passtStateDir = g_strdup("/var/run/libvirt/qemu/passt");
|
|
VIR_FREE(cfg->dbusStateDir);
|
|
--
|
|
2.53.0
|