Package: libvirt-bin
Version: 0.8.3-5+squeeze1
Severity: important
Tags: upstream


If you configure libvirt to spawn qemu with it's own user you can run into
problems getting KVM to work. This is because although the qemu user belongs
to the kvm and disk groups without calling initgroups the spawned process
won't be able to access /dev/kvm (root:kvm) and much hilarity/head scratching
will ensue.

This problem has been documented upstream and has been patched in recent 
releases:

https://bugzilla.redhat.com/show_bug.cgi?id=664406

In the end the workaround I applied was to nail the /dev/kvm device to:

ls -l /dev/kvm
crw-rw---- 1 root qemu 10, 232 Jun 12 11:51 /dev/kvm

And nailed it up with:

cat /etc/udev/rules.d/99-local-permissions.rules
# Make kvm available to qemu
KERNEL=="kvm", GROUP="qemu", MODE="0660"

-- System Information:
Debian Release: 6.0.1
  APT prefers stable
  APT policy: (990, 'stable'), (500, 'stable-updates')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8) (ignored: LC_ALL 
set to en_GB.UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to