[Pkg-libvirt-maintainers] Bug#892945: Bug#892945: Cannot start domain using user session
Laurent Bigonville
bigon at debian.org
Wed Mar 14 23:34:33 UTC 2018
reassign 892945 qemu-system-common 1:2.11+dfsg-1
thanks
On Wed, 14 Mar 2018 22:37:14 +0100 Guido =?iso-8859-1?Q?G=FCnther?=
<agx at sigxcpu.org> wrote:
> On Wed, Mar 14, 2018 at 08:42:32PM +0100, Laurent Bigonville wrote:
> > Hi,
> >
> > OK I got confused. polkit and the libvirt group has noththing to do
with
> > that.
> >
> > It's happening because of the permissions on the /dev/kvm device.
> >
> > Would it be an option to tag /dev/kvm with uaccess? So users that are
> > logged in have access to it by default or set the permissions to 666?
>
> Sorry. I closed the bug before I saw your reply. This is already
> happening automatically for me. What would libvirt do about it,
> shouldn't systemd/udev set this up?
It's definitely not working here (anymore?)
$ getfacl /dev/kvm
getfacl : suppression du premier « / » des noms de chemins absolus
# file: dev/kvm
# owner: root
# group: kvm
user::rw-
group::rw-
other::---
$ udevadm info --name /dev/kvm
P: /devices/virtual/misc/kvm
N: kvm
E: DEVNAME=/dev/kvm
E: DEVPATH=/devices/virtual/misc/kvm
E: MAJOR=10
E: MINOR=232
E: SUBSYSTEM=misc
You should have something like "TAGS=:uaccess:"
$ cat /lib/udev/rules.d/60-qemu-system-common.rules
KERNEL=="kvm", GROUP="kvm", MODE="0660"
Argh that file belong to qemu not libvirt...
I'm reassigning it.
More information about the Pkg-libvirt-maintainers
mailing list