Bug 245728

Summary: running kvm via a normal user
Product: [Fedora] Fedora Reporter: Deependra Singh Shekhawat <jeevanullas>
Component: kvmAssignee: Jeremy Katz <katzj>
Status: CLOSED WONTFIX QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: low Docs Contact:
Priority: low    
Version: 7CC: avi, jjcogliati-r1
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-06-26 18:25:43 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:

Description Deependra Singh Shekhawat 2007-06-26 07:12:42 EDT
Description of problem:

I want to use virt-manager to utilize full virtualization provided by kvm as a
normal user. But I found that it is not possible. Either I need to run
virt-manager as root user or I need to add the normal user to sudoers list.
Isn't it possible to provide virtualization access to normal users too via
having some kind of udev rules.


Version-Release number of selected component (if applicable):
kvm-24-1
kernel-2.6.21-1.3228.fc7
Comment 1 Jeremy Katz 2007-06-26 18:25:43 EDT
The problem is that this allows the user to lock large amounts of memory on the
system which could be a DoS.  
Comment 2 Josh Cogliati 2007-10-19 16:09:43 EDT
An alternative is to at least create a group kvm and then allow anyone in the
group to run kvm.  
All that needs to be done is add a kvm group and the following line somewhere in
a file in /etc/udev/rules.d/
KERNEL=="kvm",MODE="0660",GROUP="kvm"

Then the system admin can add users to kvm or not depending on whether they are
worried about the DoS possibilities.

Comment 3 Josh Cogliati 2007-11-14 13:30:26 EST
See bug 346151 for a similar request.