Hi,
libvirt requires the firmware to support SMM to enable secure boot.
But is
SMM a strict requirement for secure boot? IIUC, lack of SMM makes the
securely booted stack less secure since it is easier to tamper with it, but
it does not prevent securely booting the components.
Well, 'less secure' is an *ahem* interesting way to frame it. It's not
secure at all. The guest OS can go ahead modify uefi variables in flash
directly, and the firmware can't stop it.
It's possible to use a build without SMM support for niche use cases,
for example for test setups verifying the secure boot certificate
checking, where broken security isn't much of a problem.
That actually was useful before x86 got SMM support, now there is little
reason to do that.
take care,
Gerd