On Mon, Apr 21, 2008 at 01:06:02PM +0400, Anton Protopopov wrote: > 2008/4/17, Daniel Veillard <veillard@xxxxxxxxxx>: > > > > On Mon, Apr 14, 2008 at 07:37:56PM +0400, Anton Protopopov wrote: > > > Hi, > > > > > > Non-root can't use /var/run/libvirt/libvirt-sock even in the case > > > "unix_sock_group" and "unix_sock_rw_perms" are set properly. > > > > > > The reason: > > > # ls -l /var/run /var/run/libvirt | grep libvirt | grep -v pid > > > drwx------ 2 root root 4096 Apr 14 19:14 libvirt > > > srwxrwx--- 1 root libvirt 0 Apr 14 19:14 libvirt-sock > > > srwxrwxrwx 1 root libvirt 0 Apr 14 19:14 libvirt-sock-ro > > > > > > i.e., bad permissions on /var/run/libvirt > > > > > > Hum, how did you get this ? Maybe this is more a packaging problem than > > anything else > > > Yes, it was, sorry... So do you think the patch really make sense in a more general way. Except for the group from the configuration this looks like the wrong way to fix this. Do you agree ? If yes what about making a subset of the patch just for the socket group rights ? Daniel -- Red Hat Virtualization group http://redhat.com/virtualization/ Daniel Veillard | virtualization library http://libvirt.org/ veillard@xxxxxxxxxx | libxml GNOME XML XSLT toolkit http://xmlsoft.org/ http://veillard.com/ | Rpmfind RPM search engine http://rpmfind.net/ -- Libvir-list mailing list Libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list