On Wed, Jun 06, 2018 at 12:50:13PM -0500, Brijesh Singh wrote:
QEMU uses /dev/sev device while creating the SEV guest, lets add
/dev/sev
in the list of devices allowed to be accessed by the QEMU.
Signed-off-by: Brijesh Singh <<brijesh.singh(a)amd.com>>
Reviewed-by: Erik Skultety <eskultet(a)redhat.com>
---
docs/drvqemu.html.in | 1 +
src/qemu/qemu.conf | 2 +-
src/qemu/qemu_cgroup.c | 2 +-
src/qemu/test_libvirtd_qemu.aug.in | 1 +
4 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/docs/drvqemu.html.in b/docs/drvqemu.html.in
index cbd159d..7c33a18 100644
--- a/docs/drvqemu.html.in
+++ b/docs/drvqemu.html.in
@@ -397,6 +397,7 @@ chmod o+x /path/to/directory
/dev/random, /dev/urandom,
/dev/ptmx, /dev/kvm, /dev/kqemu,
/dev/rtc, /dev/hpet, /dev/net/tun
missing comma at the end of the line...
+/dev/sev
</pre>
Reviewed-by: Erik Skultety <eskultet(a)redhat.com>