4fe08d31e4
Starting with Linux 4.18, there is new device node for issuing hypercalls from user space - /dev/xen/hypercall (partially duplicating functionality of /dev/xen/privcmd). New Xen tools (4.12) make use of it, so make it available for them. Otherwise such tools will fail the operation (there is no fallback to privcmd on EACCESS).
8 lines
365 B
Plaintext
8 lines
365 B
Plaintext
# Setup permissions to allow libvchan connections as normal user
|
|
KERNEL=="xen/evtchn", MODE="0660", GROUP="qubes"
|
|
KERNEL=="xen/gntdev", MODE="0660", GROUP="qubes"
|
|
KERNEL=="xen/gntalloc", MODE="0660", GROUP="qubes"
|
|
KERNEL=="xen/privcmd", MODE="0660", GROUP="qubes"
|
|
KERNEL=="xen/xenbus", MODE="0660", GROUP="qubes"
|
|
KERNEL=="xen/hypercall", MODE="0660", GROUP="qubes"
|