Set correct permissions for vhostuser sockets
The latest updates to DPDK in 16.04 and above introduce two new parameters for DPDK initialization which avoid the need to run qemu processes with vhostuser sockets as root. Use these options to ensure that sockets are created with the correct ownership and permissions for OpenStack/KVM. Change-Id: I04bbd514d1bdb9b3249ed69e8d64eb66d9839944 Closes-Bug: 1546565
This commit is contained in:
parent
236bb562f1
commit
4f6e2ca251
@ -5,5 +5,5 @@
|
||||
# Configuration managed by neutron-openvswitch charm
|
||||
###############################################################################
|
||||
{% if dpdk_enabled -%}
|
||||
DPDK_OPTS='--dpdk -c {{ cpu_mask }} -n 4 --socket-mem {{ socket_memory }} {{ device_whitelist }}'
|
||||
DPDK_OPTS='--dpdk -c {{ cpu_mask }} -n 4 --socket-mem {{ socket_memory }} {{ device_whitelist }} --vhost-owner libvirt-qemu:kvm --vhost-perm 0660'
|
||||
{% endif -%}
|
Loading…
Reference in New Issue
Block a user