From b5d3138f9177bbc3505f42ba073d08d4f90b4888 Mon Sep 17 00:00:00 2001 From: Jarkko Sakkinen Date: Sat, 11 Dec 2021 06:39:59 +0200 Subject: Enable /dev/sgx_vepc access for the group 'sgx' Enable /dev/sgx_vepc access for the group 'sgx', which allows KVM-backed VMs to host Intel Software Guard eXtension (SGX) enclaves. The upcoming QEMU 6.2 uses /dev/sgx_vepc to reserve portions of Enclave Page Cache (EPC) for VMs. EPC is the reserved physical memory used for hosting enclaves. --- rules.d/50-udev-default.rules.in | 1 + 1 file changed, 1 insertion(+) (limited to 'rules.d') diff --git a/rules.d/50-udev-default.rules.in b/rules.d/50-udev-default.rules.in index aead6b9ca2..8fae58f115 100644 --- a/rules.d/50-udev-default.rules.in +++ b/rules.d/50-udev-default.rules.in @@ -41,6 +41,7 @@ SUBSYSTEM=="drm", KERNEL=="renderD*", GROUP="render", MODE="{{GROUP_RENDER_MODE} SUBSYSTEM=="kfd", GROUP="render", MODE="{{GROUP_RENDER_MODE}}" SUBSYSTEM=="misc", KERNEL=="sgx_enclave", GROUP="sgx", MODE="0660" +SUBSYSTEM=="misc", KERNEL=="sgx_vepc", GROUP="sgx", MODE="0660" # When using static_node= with non-default permissions, also update # tmpfiles.d/static-nodes-permissions.conf.in to keep permissions synchronized. -- cgit v1.2.1