Red Hat Bugzilla – Full Text Bug Listing
|Summary:||running kvm via a normal user|
|Product:||[Fedora] Fedora||Reporter:||Deependra Singh Shekhawat <jeevanullas>|
|Component:||kvm||Assignee:||Jeremy Katz <katzj>|
|Status:||CLOSED WONTFIX||QA Contact:||Fedora Extras Quality Assurance <extras-qa>|
|Fixed In Version:||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||2007-06-26 18:25:43 EDT||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
Description Deependra Singh Shekhawat 2007-06-26 07:12:42 EDT
Description of problem: I want to use virt-manager to utilize full virtualization provided by kvm as a normal user. But I found that it is not possible. Either I need to run virt-manager as root user or I need to add the normal user to sudoers list. Isn't it possible to provide virtualization access to normal users too via having some kind of udev rules. Version-Release number of selected component (if applicable): kvm-24-1 kernel-2.6.21-1.3228.fc7
Comment 1 Jeremy Katz 2007-06-26 18:25:43 EDT
The problem is that this allows the user to lock large amounts of memory on the system which could be a DoS.
Comment 2 Josh Cogliati 2007-10-19 16:09:43 EDT
An alternative is to at least create a group kvm and then allow anyone in the group to run kvm. All that needs to be done is add a kvm group and the following line somewhere in a file in /etc/udev/rules.d/ KERNEL=="kvm",MODE="0660",GROUP="kvm" Then the system admin can add users to kvm or not depending on whether they are worried about the DoS possibilities.