Changeset 9a04a8e9
- Timestamp:
- 12/11/2013 01:00:40 PM (10 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 7.10, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- c9ba90cb
- Parents:
- ef5a37b
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/virtualization/qemu.xml
ref5a37b r9a04a8e9 160 160 <screen role="root"><userinput>make install && 161 161 [ -e /usr/lib/libcacard.so ] && chmod -v 755 /usr/lib/libcacard.so</userinput></screen> 162 162 163 <para> 164 You will need a dedicated group that will contain users (other than root) 165 allowed to access the KVM device. Add the group by running the following 166 command as the <systemitem class="username">root</systemitem> user: 167 </para> 168 169 <screen role="root"><userinput>groupadd -g 61 kvm</userinput></screen> 170 171 <para> 172 Add any users that might use the KVM device to that group: 173 </para> 174 175 <screen role="root"><userinput>usermod -a -G kvm <replaceable><username></replaceable></userinput></screen> 176 177 <para> 178 You will also need to add an Udev rule so that the KVM device gets correct 179 permissions: 180 </para> 181 182 <screen role="root"><userinput>cat > /lib/udev/rules.d/65-kvm.rules << "EOF" 183 <literal>KERNEL=="kvm", NAME="%k", GROUP="kvm", MODE="0660"</literal> 184 EOF</userinput></screen> 185 163 186 <note><!--<para>The main program <command>qemu-system-x86_64</command> doesn't 164 187 make a distinction between i386 and x86_64 so even on an i386 system you
Note:
See TracChangeset
for help on using the changeset viewer.