summaryrefslogtreecommitdiff
path: root/rules.d
diff options
context:
space:
mode:
authorJarkko Sakkinen <jarkko.sakkinen@iki.fi>2021-12-11 06:39:59 +0200
committerLuca Boccassi <luca.boccassi@gmail.com>2021-12-12 11:02:21 +0000
commitb5d3138f9177bbc3505f42ba073d08d4f90b4888 (patch)
tree534fad0c09c417de49748c0f44b075a4f7e2007b /rules.d
parent6d7bc744ce851e3ea5ee1dd15142c27ba90ff0b6 (diff)
downloadsystemd-b5d3138f9177bbc3505f42ba073d08d4f90b4888.tar.gz
Enable /dev/sgx_vepc access for the group 'sgx'
Enable /dev/sgx_vepc access for the group 'sgx', which allows KVM-backed VMs to host Intel Software Guard eXtension (SGX) enclaves. The upcoming QEMU 6.2 uses /dev/sgx_vepc to reserve portions of Enclave Page Cache (EPC) for VMs. EPC is the reserved physical memory used for hosting enclaves.
Diffstat (limited to 'rules.d')
-rw-r--r--rules.d/50-udev-default.rules.in1
1 files changed, 1 insertions, 0 deletions
diff --git a/rules.d/50-udev-default.rules.in b/rules.d/50-udev-default.rules.in
index aead6b9ca2..8fae58f115 100644
--- a/rules.d/50-udev-default.rules.in
+++ b/rules.d/50-udev-default.rules.in
@@ -41,6 +41,7 @@ SUBSYSTEM=="drm", KERNEL=="renderD*", GROUP="render", MODE="{{GROUP_RENDER_MODE}
SUBSYSTEM=="kfd", GROUP="render", MODE="{{GROUP_RENDER_MODE}}"
SUBSYSTEM=="misc", KERNEL=="sgx_enclave", GROUP="sgx", MODE="0660"
+SUBSYSTEM=="misc", KERNEL=="sgx_vepc", GROUP="sgx", MODE="0660"
# When using static_node= with non-default permissions, also update
# tmpfiles.d/static-nodes-permissions.conf.in to keep permissions synchronized.