Instance fails to boot: Could not access KVM kernel module: Permission denied
Bug #1681461 reported by
Mohammed Naser
This bug affects 10 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
kolla-ansible |
Fix Released
|
High
|
Radosław Piliszek |
Bug Description
Could not access KVM kernel module: Permission denied
failed to initialize KVM: Permission denied
It seems like libvirt is unable to access /dev/kvm
Changed in kolla: | |
assignee: | Mohammed Naser (mnaser) → nobody |
importance: | Undecided → High |
Changed in kolla: | |
assignee: | nobody → Chason Chan (chen-xing) |
Changed in kolla: | |
assignee: | Chason Chan (chen-xing) → nobody |
To post a comment you must log in.
This seems to have caused the issue:
https:/ /bugs.launchpad .net/ubuntu/ +source/ libvirt/ +bug/1637601
The patch for xenial:
https:/ /launchpadlibra rian.net/ 291206176/ xenial_ libvirt_ uidgid. debdiff
- --with- qemu-group= kvm \ qemu-group= libvirt- qemu \
+ --with-
KVM is now built with qemu group `libvirt-qemu` rather than `kvm`. It looks like this change broke our behaviour, so I've looked at the following in the libvirt docs:
https:/ /libvirt. org/drvqemu. html qemu.conf configuration file via the user=$USERNAME and group=$GROUPNAME parameters. When a non-root user or group is configured, the libvirt QEMU driver will change uid/gid to match immediately before executing the QEMU binary for a virtual machine."
"Regardless of this build time default, administrators can set a per-host default setting in the /etc/libvirt/
We don't enforce a user so if the OS one changes, we break. I'll propose a patch which adds it to qemu.conf which should avoid causing issues like this for us.