http://bugzilla.opensuse.org/show_bug.cgi?id=1140835
http://bugzilla.opensuse.org/show_bug.cgi?id=1140835#c2
Oliver Kurz
Could you share a bit of details in your case of what other component is using /dev/hugepages and with what priviledges does it run?
gladly. I hope you can see https://progress.opensuse.org/issues/53234 for the initial ticket we had created within the "openQA infrastructure" issue tracker. The first time we have seen this was just after I installed the openvswitch package and triggered some test runs. https://openqa.opensuse.org/tests/961910/file/autoinst-log.txt at the end of the file shows one line: `` QEMU: qemu-system-aarch64: can't open backing store /dev/hugepages/ for guest RAM: Permission denied ``` which shows the problem. We have configured the system with kernel command line parameters to use hugepages: ``` # cat /proc/cmdline BOOT_IMAGE=/boot/Image-4.12.14-lp151.28.7-default root=UUID=25944857-5dd8-410b-8eb3-ce80dcd6b21a console=ttyAMA0,115200 splash=silent quiet showopts nospec spectre_v2=off pti=off kpti=off default_hugepagesz=1G hugepagesz=1G hugepages=64 crashkernel=167M ``` and qemu is started with the parameters: ``` -mem-prealloc -mem-path /dev/hugepages/ ``` and runs as an unprivileged user "_openqa-worker" which is part of "nogroup" and "kvm" but when the OVS service calls "chown" then of course that unprivileged user can not r/w/x the dir anymore. guillaume.gardet@arm.com from ARM can give more details why and how "hugepages" are used on this machine. -- You are receiving this mail because: You are on the CC list for the bug.