** Description changed: When qemu-system gets installed, the newly installed udev rule causes /dev/kvm to gets chgrpd to kvm and its mode to get set to g+rw. However, because /dev/kvm was tagged with ACL previously, there is a group:: acl on /dev/kvm which does not get removed. Therefore /dev/kvm is g+rw in the file mode, but the acl denies group read/write access. After a reboot all is fine. I have not seen a clean way to have udev remove that acl, and there is no reason for it. So please update the 70-udev-acl.rules file to set MODE=0660 on /dev/kvm + + ================ + SRU Justification + 1. Impact: when qemu-kvm is first installed, /dev/kvm is not owned by group kvm (until subsequent reboot). This prevents libvirt from using kvm until a reboot. + 2. Development fix: add group kvm during preinst. (this was done in precise, but accidentally dropped in a merge from debian in quantal) + 3. Stable fix: same as development fix + 4. Test case: Create a new quantal vm. sudo apt-get install qemu-kvm. ls -l /dev/kvm, check that it is owned by group kvm. + 5. Regression potential: none
** Tags removed: patch -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to qemu-kvm in Ubuntu. https://bugs.launchpad.net/bugs/1103022 Title: 70-udev-acl.rules needs to put g+rw on /dev/kvm To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1103022/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs