[Pkg-libvirt-maintainers] Bug#892945: Bug#892945: Cannot start domain using user session

Laurent Bigonville bigon at debian.org
Wed Mar 14 23:34:33 UTC 2018


reassign 892945 qemu-system-common 1:2.11+dfsg-1
thanks

On Wed, 14 Mar 2018 22:37:14 +0100 Guido =?iso-8859-1?Q?G=FCnther?= 
<agx at sigxcpu.org> wrote:
 > On Wed, Mar 14, 2018 at 08:42:32PM +0100, Laurent Bigonville wrote:

 > > Hi,
 > >
 > > OK I got confused. polkit and the libvirt group has noththing to do 
with
 > > that.
 > >
 > > It's happening because of the permissions on the /dev/kvm device.
 > >
 > > Would it be an option to tag /dev/kvm with uaccess? So users that are
 > > logged in have access to it by default or set the permissions to 666?
 >
 > Sorry. I closed the bug before I saw your reply. This is already
 > happening automatically for me. What would libvirt do about it,
 > shouldn't systemd/udev set this up?

It's definitely not working here (anymore?)

$ getfacl /dev/kvm
getfacl : suppression du premier « / » des noms de chemins absolus
# file: dev/kvm
# owner: root
# group: kvm
user::rw-
group::rw-
other::---

$ udevadm info --name /dev/kvm
P: /devices/virtual/misc/kvm
N: kvm
E: DEVNAME=/dev/kvm
E: DEVPATH=/devices/virtual/misc/kvm
E: MAJOR=10
E: MINOR=232
E: SUBSYSTEM=misc

You should have something like "TAGS=:uaccess:"

$ cat /lib/udev/rules.d/60-qemu-system-common.rules
KERNEL=="kvm", GROUP="kvm", MODE="0660"

Argh that file belong to qemu not libvirt...

I'm reassigning it.



More information about the Pkg-libvirt-maintainers mailing list