[Pkg-libvirt-maintainers] Bug#703208: Bug#703208: libvirt0: segfault after upgrade from version 0.8.3-5+squeeze2 to 0.8.3-5+squeeze4

Guido Günther agx at sigxcpu.org
Sun Mar 17 11:08:05 UTC 2013


Hi Salvatore,
On Sun, Mar 17, 2013 at 08:56:51AM +0100, Salvatore Bonaccorso wrote:
> Control: severity -1 grave
> 
> Hi
> 
> On Sun, Mar 17, 2013 at 12:16:19AM +0100, TomaszSz wrote:
> > Package: libvirt0
> > Version: 0.8.3-5+squeeze4
> > Severity: normal
> [...]
> > My virtual machines doesn't start also.
> > In my /var/log/libvirt/qemu/mymachine.log i get this information:
> > "LC_ALL=C PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin HOME=/ QEMU_AUDIO_DRV=none /usr/bin/kvm -S -M pc-0.12 -enable-kvm -m 16384 -smp 
> > 4,sockets=4,cores=1,threads=1 -name win2008-STD-orion -uuid 66a2dc8c-dd85-38da-ab66-405784525dce -nodefaults -chardev 
> > socket,id=monitor,path=/var/lib/libvirt/qemu/win2008-STD-orion.monitor,server,nowait -mon chardev=monitor,mode=readline -rtc base=localtime -boot c -drive 
> > if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw -device ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0 -drive 
> > file=/home/images/win2k8_std_orion.qcow2,if=none,id=drive-ide0-0-0,boot=on,format=raw -device ide-drive,bus=ide.0,unit=0,drive=drive-ide0-0-0,id=ide0-0-0 
> > -device e1000,vlan=0,id=net0,mac=52:54:00:f5:78:57,bus=pci.0,addr=0x3 -net tap,fd=63,vlan=0,name=hostnet0 -chardev pty,id=serial0 -device 
> > isa-serial,chardev=serial0 -usb -device usb-tablet,id=input0 -vnc 127.0.0.1:1 -k pl -vga std -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x4 char 
> > device redirected to /dev/pts/3 open /dev/kvm: Permission denied Could not initialize KVM, will disable KVM support "
> 
> I can confirm this, upgrading from 0.8.3-5+squeeze2 to
> 0.8.3-5+squeeze4 is causing this regression:
> 
> open /dev/kvm: Permission denied
> Could not initialize KVM, will disable KVM support
> 
> This seems related to the changes done for #701649, but I had not time
> to check further.

Thanks for double checking. I do wonder why I didn't see this during my
test though. A temporary work around is to set "group = kvm" in
/etc/libvirt/qemu.conf .

This of course results in files being owned by the kvm group (which is
what we wanted to avoid in the first place).

Cheers, 
 -- Guido

> 
> Cc'ing also the security team.
> 
> Regards,
> Salvatore
> 
> _______________________________________________
> Pkg-libvirt-maintainers mailing list
> Pkg-libvirt-maintainers at lists.alioth.debian.org
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-libvirt-maintainers
> 



More information about the Pkg-libvirt-maintainers mailing list