mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 05:35:25 +00:00
vmx: Get the VMware boolean uefi.secureBoot.enabled
Some VMware guests have a boolean uefi.secureBoot.enabled. If found, and it's set to "TRUE", and if it's a UEFI guest, then add this clause into the domain XML: <os firmware='efi'> <firmware> <feature enabled='yes' name='enrolled-keys'/> <feature enabled='yes' name='secure-boot'/> </firmware> </os> This approximates the meaning of this VMware flag. Signed-off-by: Richard W.M. Jones <rjones@redhat.com> Fixes: https://issues.redhat.com/browse/RHEL-67836 Reviewed-by: Michal Privoznik <mprivozn@redhat.com>
This commit is contained in:
parent
ec8be9aceb
commit
7b73e681a2
@ -1387,6 +1387,7 @@ virVMXParseConfig(virVMXContext *ctx,
|
|||||||
char *sched_cpu_shares = NULL;
|
char *sched_cpu_shares = NULL;
|
||||||
char *guestOS = NULL;
|
char *guestOS = NULL;
|
||||||
bool smbios_reflecthost = false;
|
bool smbios_reflecthost = false;
|
||||||
|
bool uefi_secureboot = false;
|
||||||
int controller;
|
int controller;
|
||||||
int bus;
|
int bus;
|
||||||
int port;
|
int port;
|
||||||
@ -1963,6 +1964,27 @@ virVMXParseConfig(virVMXContext *ctx,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* vmx:uefi.secureBoot.enabled */
|
||||||
|
if (virVMXGetConfigBoolean(conf, "uefi.secureBoot.enabled",
|
||||||
|
&uefi_secureboot, false, true) < 0) {
|
||||||
|
goto cleanup;
|
||||||
|
}
|
||||||
|
if (uefi_secureboot &&
|
||||||
|
def->os.firmware == VIR_DOMAIN_OS_DEF_FIRMWARE_EFI) {
|
||||||
|
int *features = def->os.firmwareFeatures;
|
||||||
|
|
||||||
|
if (!features) {
|
||||||
|
features = g_new0(int, VIR_DOMAIN_OS_DEF_FIRMWARE_FEATURE_LAST);
|
||||||
|
def->os.firmwareFeatures = features;
|
||||||
|
}
|
||||||
|
/* Just set both to true, as VMware doesn't have any concept
|
||||||
|
* of the two features separately.
|
||||||
|
*/
|
||||||
|
features[VIR_DOMAIN_OS_DEF_FIRMWARE_FEATURE_SECURE_BOOT] =
|
||||||
|
features[VIR_DOMAIN_OS_DEF_FIRMWARE_FEATURE_ENROLLED_KEYS] =
|
||||||
|
VIR_TRISTATE_BOOL_YES;
|
||||||
|
}
|
||||||
|
|
||||||
if (virDomainDefPostParse(def, VIR_DOMAIN_DEF_PARSE_ABI_UPDATE,
|
if (virDomainDefPostParse(def, VIR_DOMAIN_DEF_PARSE_ABI_UPDATE,
|
||||||
xmlopt, NULL) < 0)
|
xmlopt, NULL) < 0)
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
|
@ -9,6 +9,10 @@
|
|||||||
</cputune>
|
</cputune>
|
||||||
<os firmware='efi'>
|
<os firmware='efi'>
|
||||||
<type arch='x86_64'>hvm</type>
|
<type arch='x86_64'>hvm</type>
|
||||||
|
<firmware>
|
||||||
|
<feature enabled='yes' name='enrolled-keys'/>
|
||||||
|
<feature enabled='yes' name='secure-boot'/>
|
||||||
|
</firmware>
|
||||||
</os>
|
</os>
|
||||||
<clock offset='utc'/>
|
<clock offset='utc'/>
|
||||||
<on_poweroff>destroy</on_poweroff>
|
<on_poweroff>destroy</on_poweroff>
|
||||||
|
Loading…
Reference in New Issue
Block a user