On Wed, Jun 06, 2018 at 12:50:13PM -0500, Brijesh Singh wrote: > QEMU uses /dev/sev device while creating the SEV guest, lets add /dev/sev > in the list of devices allowed to be accessed by the QEMU. > > Signed-off-by: Brijesh Singh <<brijesh.singh@xxxxxxx>> > Reviewed-by: Erik Skultety <eskultet@xxxxxxxxxx> > --- > docs/drvqemu.html.in | 1 + > src/qemu/qemu.conf | 2 +- > src/qemu/qemu_cgroup.c | 2 +- > src/qemu/test_libvirtd_qemu.aug.in | 1 + > 4 files changed, 4 insertions(+), 2 deletions(-) > > diff --git a/docs/drvqemu.html.in b/docs/drvqemu.html.in > index cbd159d..7c33a18 100644 > --- a/docs/drvqemu.html.in > +++ b/docs/drvqemu.html.in > @@ -397,6 +397,7 @@ chmod o+x /path/to/directory > /dev/random, /dev/urandom, > /dev/ptmx, /dev/kvm, /dev/kqemu, > /dev/rtc, /dev/hpet, /dev/net/tun missing comma at the end of the line... > +/dev/sev > </pre> Reviewed-by: Erik Skultety <eskultet@xxxxxxxxxx> -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list