** Description changed:

  When qemu-system gets installed, the newly installed udev rule causes
  /dev/kvm to gets chgrpd to kvm and its mode to get set to g+rw.
  However, because /dev/kvm was tagged with ACL previously, there is a
  group:: acl on /dev/kvm which does not get removed.  Therefore /dev/kvm
  is g+rw in the file mode, but the acl denies group read/write access.
  After a reboot all is fine.
  
  I have not seen a clean way to have udev remove that acl, and there is
  no reason for it.  So please update the 70-udev-acl.rules file to set
  MODE=0660 on /dev/kvm
+ 
+ ================
+ SRU Justification
+ 1. Impact: when qemu-kvm is first installed, /dev/kvm is not owned by group 
kvm (until subsequent reboot).  This prevents libvirt from using kvm until a 
reboot.
+ 2. Development fix: add group kvm during preinst.  (this was done in precise, 
but accidentally dropped in a merge from debian in quantal)
+ 3. Stable fix: same as development fix
+ 4. Test case: Create a new quantal vm.  sudo apt-get install qemu-kvm.  ls -l 
/dev/kvm, check that it is owned by group kvm.
+ 5. Regression potential: none

** Tags removed: patch

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to qemu-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1103022

Title:
  70-udev-acl.rules needs to put g+rw on /dev/kvm

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1103022/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to