mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 05:35:25 +00:00
tests: Update firmware descriptors
Sync with the edk2-20240524-4.fc39 package from Fedora. The only notable change is that the inteltdx variant now declares support for Secure Boot and is a ROM image instead of a stateless pflash one. The latter causes it to be considered eligible for the configuration described by the firmware-auto-efi-rw test cases, which now passes instead of failing. Of course that doesn't make any sense, because a ROM image by definition cannot be read/write. So this indicates the presence of a bug in our firmware selection algorithm, which we're going to address with an upcoming commit. Signed-off-by: Andrea Bolognani <abologna@redhat.com> Reviewed-by: Ján Tomko <jtomko@redhat.com>
This commit is contained in:
parent
ea6c3ea2d5
commit
79941dd3c9
@ -3,12 +3,8 @@
|
|||||||
"uefi"
|
"uefi"
|
||||||
],
|
],
|
||||||
"mapping": {
|
"mapping": {
|
||||||
"device": "flash",
|
"device": "memory",
|
||||||
"mode": "stateless",
|
"filename": "/usr/share/edk2/ovmf/OVMF.inteltdx.secboot.fd"
|
||||||
"executable": {
|
|
||||||
"filename": "/usr/share/edk2/ovmf/OVMF.inteltdx.fd",
|
|
||||||
"format": "raw"
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
"targets": [
|
"targets": [
|
||||||
{
|
{
|
||||||
@ -19,6 +15,8 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"features": [
|
"features": [
|
||||||
|
"enrolled-keys",
|
||||||
|
"secure-boot",
|
||||||
"verbose-dynamic"
|
"verbose-dynamic"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -4,12 +4,8 @@
|
|||||||
"uefi"
|
"uefi"
|
||||||
],
|
],
|
||||||
"mapping": {
|
"mapping": {
|
||||||
"device": "flash",
|
"device": "memory",
|
||||||
"mode": "stateless",
|
"filename": "/usr/share/edk2/ovmf/OVMF.inteltdx.secboot.fd"
|
||||||
"executable": {
|
|
||||||
"filename": "/usr/share/edk2/ovmf/OVMF.inteltdx.fd",
|
|
||||||
"format": "raw"
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
"targets": [
|
"targets": [
|
||||||
{
|
{
|
||||||
@ -20,7 +16,9 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"features": [
|
"features": [
|
||||||
|
"enrolled-keys",
|
||||||
"intel-tdx",
|
"intel-tdx",
|
||||||
|
"secure-boot",
|
||||||
"verbose-dynamic"
|
"verbose-dynamic"
|
||||||
],
|
],
|
||||||
"tags": [
|
"tags": [
|
||||||
|
@ -317,7 +317,7 @@ mymain(void)
|
|||||||
"/usr/share/edk2/ovmf/OVMF_CODE.fd:/usr/share/edk2/ovmf/OVMF_VARS.fd:"
|
"/usr/share/edk2/ovmf/OVMF_CODE.fd:/usr/share/edk2/ovmf/OVMF_VARS.fd:"
|
||||||
"/usr/share/edk2/ovmf/OVMF.secboot.fd:NULL:"
|
"/usr/share/edk2/ovmf/OVMF.secboot.fd:NULL:"
|
||||||
"/usr/share/edk2/ovmf/OVMF.amdsev.fd:NULL:"
|
"/usr/share/edk2/ovmf/OVMF.amdsev.fd:NULL:"
|
||||||
"/usr/share/edk2/ovmf/OVMF.inteltdx.fd:NULL",
|
"/usr/share/edk2/ovmf/OVMF.inteltdx.secboot.fd:NULL",
|
||||||
VIR_DOMAIN_OS_DEF_FIRMWARE_BIOS,
|
VIR_DOMAIN_OS_DEF_FIRMWARE_BIOS,
|
||||||
VIR_DOMAIN_OS_DEF_FIRMWARE_EFI);
|
VIR_DOMAIN_OS_DEF_FIRMWARE_EFI);
|
||||||
DO_SUPPORTED_TEST("pc-q35-3.1", VIR_ARCH_I686, false,
|
DO_SUPPORTED_TEST("pc-q35-3.1", VIR_ARCH_I686, false,
|
||||||
|
@ -1 +0,0 @@
|
|||||||
operation failed: Unable to find 'efi' firmware that is compatible with the current configuration
|
|
@ -0,0 +1,34 @@
|
|||||||
|
LC_ALL=C \
|
||||||
|
PATH=/bin \
|
||||||
|
HOME=/var/lib/libvirt/qemu/domain--1-guest \
|
||||||
|
USER=test \
|
||||||
|
LOGNAME=test \
|
||||||
|
XDG_DATA_HOME=/var/lib/libvirt/qemu/domain--1-guest/.local/share \
|
||||||
|
XDG_CACHE_HOME=/var/lib/libvirt/qemu/domain--1-guest/.cache \
|
||||||
|
XDG_CONFIG_HOME=/var/lib/libvirt/qemu/domain--1-guest/.config \
|
||||||
|
/usr/bin/qemu-system-x86_64 \
|
||||||
|
-name guest=guest,debug-threads=on \
|
||||||
|
-S \
|
||||||
|
-object '{"qom-type":"secret","id":"masterKey0","format":"raw","file":"/var/lib/libvirt/qemu/domain--1-guest/master-key.aes"}' \
|
||||||
|
-machine pc-q35-4.0,usb=off,dump-guest-core=off,memory-backend=pc.ram,acpi=on \
|
||||||
|
-accel kvm \
|
||||||
|
-cpu qemu64 \
|
||||||
|
-bios /usr/share/edk2/ovmf/OVMF.inteltdx.secboot.fd \
|
||||||
|
-m size=1048576k \
|
||||||
|
-object '{"qom-type":"memory-backend-ram","id":"pc.ram","size":1073741824}' \
|
||||||
|
-overcommit mem-lock=off \
|
||||||
|
-smp 1,sockets=1,cores=1,threads=1 \
|
||||||
|
-uuid 63840878-0deb-4095-97e6-fc444d9bc9fa \
|
||||||
|
-display none \
|
||||||
|
-no-user-config \
|
||||||
|
-nodefaults \
|
||||||
|
-chardev socket,id=charmonitor,fd=1729,server=on,wait=off \
|
||||||
|
-mon chardev=charmonitor,id=monitor,mode=control \
|
||||||
|
-rtc base=utc \
|
||||||
|
-no-shutdown \
|
||||||
|
-boot strict=on \
|
||||||
|
-audiodev '{"id":"audio1","driver":"none"}' \
|
||||||
|
-global ICH9-LPC.noreboot=off \
|
||||||
|
-watchdog-action reset \
|
||||||
|
-sandbox on,obsolete=deny,elevateprivileges=deny,spawn=deny,resourcecontrol=deny \
|
||||||
|
-msg timestamp=on
|
@ -1 +0,0 @@
|
|||||||
operation failed: Unable to find 'efi' firmware that is compatible with the current configuration
|
|
@ -6,7 +6,11 @@
|
|||||||
<vcpu placement='static'>1</vcpu>
|
<vcpu placement='static'>1</vcpu>
|
||||||
<os firmware='efi'>
|
<os firmware='efi'>
|
||||||
<type arch='x86_64' machine='pc-q35-4.0'>hvm</type>
|
<type arch='x86_64' machine='pc-q35-4.0'>hvm</type>
|
||||||
<loader readonly='no'/>
|
<firmware>
|
||||||
|
<feature enabled='yes' name='enrolled-keys'/>
|
||||||
|
<feature enabled='yes' name='secure-boot'/>
|
||||||
|
</firmware>
|
||||||
|
<loader readonly='no' type='rom'>/usr/share/edk2/ovmf/OVMF.inteltdx.secboot.fd</loader>
|
||||||
<boot dev='hd'/>
|
<boot dev='hd'/>
|
||||||
</os>
|
</os>
|
||||||
<features>
|
<features>
|
||||||
|
@ -1422,8 +1422,7 @@ mymain(void)
|
|||||||
DO_TEST_CAPS_LATEST("firmware-auto-efi");
|
DO_TEST_CAPS_LATEST("firmware-auto-efi");
|
||||||
DO_TEST_CAPS_LATEST_ABI_UPDATE("firmware-auto-efi");
|
DO_TEST_CAPS_LATEST_ABI_UPDATE("firmware-auto-efi");
|
||||||
DO_TEST_CAPS_LATEST("firmware-auto-efi-stateless");
|
DO_TEST_CAPS_LATEST("firmware-auto-efi-stateless");
|
||||||
DO_TEST_CAPS_LATEST_FAILURE("firmware-auto-efi-rw");
|
DO_TEST_CAPS_LATEST("firmware-auto-efi-rw");
|
||||||
DO_TEST_CAPS_LATEST_ABI_UPDATE_PARSE_ERROR("firmware-auto-efi-rw");
|
|
||||||
DO_TEST_CAPS_LATEST("firmware-auto-efi-loader-secure");
|
DO_TEST_CAPS_LATEST("firmware-auto-efi-loader-secure");
|
||||||
DO_TEST_CAPS_LATEST_ABI_UPDATE("firmware-auto-efi-loader-secure");
|
DO_TEST_CAPS_LATEST_ABI_UPDATE("firmware-auto-efi-loader-secure");
|
||||||
DO_TEST_CAPS_LATEST("firmware-auto-efi-loader-insecure");
|
DO_TEST_CAPS_LATEST("firmware-auto-efi-loader-insecure");
|
||||||
|
Loading…
Reference in New Issue
Block a user