On 01.08.2016 21:10, Laszlo Ersek wrote:
On 08/01/16 19:05, Gerd Hoffmann wrote:
> Hi,
>
>> If it does, then the host kernel should be 4.4 or later. (If we want to
>> capture version numbers, then for each minor release, the latest patch
>> level should be required: 4.4.16, 4.5.7, 4.6.5, 4.7.0, because there
>> have been a number of KVM tweaks and stable backports for SMM support.)
>
> Better check /dev/kvm for the KVM_CAP_X86_SMM capability, otherwise the
> rhel-7 kernel is out even though smm is backported.
>
> Probably libvirt already has checks for other caps so it should be easy.
The problem is that KVM_CAP_X86_SMM does not guarantee that all the
tricky bugfixes are present in the host kernel.
Moreover, libvirt does not validate nor check guest kernel. And the only
/dev/kvm/ caps we check are:
KVM_CAP_IOMMU - to see if legacy PCI passthrough works
KVM_CAP_PPC_SMT -
KVM_CAP_MAX_VCPUS -
KVM_CAP_NR_VCPUS - for some vCPUs counts
I don't think libvirt should check for KVM_CAP_x86_SMM. I mean, if we go
down the rabbit hole, libvirt would have to check everything. The buck
has to stop somewhere.
Michal