On Sun, Dec 09, 2018 at 04:32:00PM -0500, Mark H Weaver wrote:
> Hi Danny and Ludovic,
> 
> Danny Milosavljevic <dan...@scratchpost.org> writes:
> 
> > After the change, I get the following on Hydra 
> > <https://hydra.gnu.org/build/3253608/log/raw>:
> >
> > ---------------------------------------------------------------------------
> > @ build-started /gnu/store/scnqgfc3k4434h3gch22hnh0z8qdbvdb-disk-image.drv 
> > - x86_64-linux 
> > /var/log/guix/drvs/sc//nqgfc3k4434h3gch22hnh0z8qdbvdb-disk-image.drv.bz2
> > environment variable `PATH' set to 
> > `/gnu/store/5ka9gmcwcj2919q0cj0wkjng058lwrgq-qemu-minimal-3.0.0/bin:/gnu/store/5s2nib1lrd2101bbrivcl17kjx1mspw6-coreutils-8.30/bin'
> > creating raw image of 1024.00 MiB...
> > Formatting '/gnu/store/4yp6s4jlq2frb2jqzd7q3kp99vzmnpm5-disk-image', 
> > fmt=raw size=1073741824
> > Could not access KVM kernel module: Permission denied
> > qemu-system-x86_64: failed to initialize KVM: Permission denied
> 
> This indicates that /dev/kvm on hydra.gnunet.org has permissions that
> prevent the guix build user from accessing it.
> 
> I raised this issue long ago (2015) on the guix-sysadmin mailing list.
> In that message, I noted that on hydra.gnunet.org, /dev/kvm has mode
> 0600 and is owned by root, which caused our disk image derivations to
> fail.
> 
> At the time, Ludovic chmod'd /dev/kvm, and mentioned that he had tried
> to make this persistent via /etc/udev/rules.d/70-persistent-net.rules,
> but that for some reason that didn't seem to work, possibly because it
> was being overridden by another rule or startup script.  As far as I
> know, we never implemented a proper fix.
> 
> Ludovic, for now, can you chmod it again?
> 
>      Thanks,
>        Mark

time for a crontab hack job?

-- 
Efraim Flashner   <efr...@flashner.co.il>   אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D  14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted

Attachment: signature.asc
Description: PGP signature

Reply via email to