On Wed, Jun 06, 2018 at 12:50:13PM -0500, Brijesh Singh wrote:
> QEMU uses /dev/sev device while creating the SEV guest, lets add /dev/sev
> in the list of devices allowed to be accessed by the QEMU.
>
> Signed-off-by: Brijesh Singh <<[email protected]>>
> Reviewed-by: Erik Skultety <[email protected]>
> ---
>  docs/drvqemu.html.in               | 1 +
>  src/qemu/qemu.conf                 | 2 +-
>  src/qemu/qemu_cgroup.c             | 2 +-
>  src/qemu/test_libvirtd_qemu.aug.in | 1 +
>  4 files changed, 4 insertions(+), 2 deletions(-)
>
> diff --git a/docs/drvqemu.html.in b/docs/drvqemu.html.in
> index cbd159d..7c33a18 100644
> --- a/docs/drvqemu.html.in
> +++ b/docs/drvqemu.html.in
> @@ -397,6 +397,7 @@ chmod o+x /path/to/directory
>  /dev/random, /dev/urandom,
>  /dev/ptmx, /dev/kvm, /dev/kqemu,
>  /dev/rtc, /dev/hpet, /dev/net/tun

missing comma at the end of the line...

> +/dev/sev
>  </pre>

Reviewed-by: Erik Skultety <[email protected]>

--
libvir-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/libvir-list

Reply via email to