mirror of https://gitee.com/openkylin/libvirt.git
958d6ebe53
When using command line passthrough users will often trip up over the security protections like SELinux, DAC, namespaces, etc which will deny access to files they are passing. This document explains the various protections and how to deal with their policy, and/or how to disable them. Reviewed-by: Kashyap Chamarthy <kchamart@redhat.com> Reviewed-by: Ján Tomko <jtomko@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com> |
||
---|---|---|
.. | ||
backing_chains.rst | ||
domainstatecapture.rst | ||
launch_security_sev.rst | ||
locking-lockd.rst | ||
locking-sanlock.rst | ||
locking.rst | ||
qemu-passthrough-security.rst | ||
rpm-deployment.rst | ||
secureusage.rst |