blob: 59bdd40a5f117d9ee83d6ed1c9d4aa7fd01eb225 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
|
libvirt (1.1.4-2~) unstable; urgency=low
If you're using cgroups make sure you're using a different mount per cgroup
controller (cpu, memory, ...) that is mounted to /sys/fs/cgroup/<controller>.
This can be achieved using mount_cgroups in /etc/default/libvirt-bin or by
using systemd. Using a single mount point /sys/fs/cgroup for all controllers
will no longer work and will prevent vms from starting. See
http://libvirt.org/cgroups.html
for more information. If you're not using cgroups nothing has to be changed.
-- Guido Günther <agx@sigxcpu.org> Sun, 01 Dec 2013 19:33:56 +0100
libvirt (1.0.2-3) experimental; urgency=low
For qemu:///system KVM/QEMU processes now run as group libvirt-qemu. This
makes sure image files and volumes aren't accessible by users in the more
general and previously used kvm group. To change this behaviour adjust the
group option in /etc/libvirt/qemu.conf.
-- Guido Günther <agx@sigxcpu.org> Tue, 26 Feb 2013 06:30:48 +0100
libvirt (0.8.3-2) unstable; urgency=low
Disk format probing is disabled now by default for security reasons
(CVE-2010-2237). You need to explicitly add a driver type element to your
disk devices in the domain XML:
<disk ...>
<driver name='qemu' type='qcow2'/>
...
</disk>
Alternatively you can re-enable probing by setting
allow_disk_format_probing=1 in /etc/libvirt/qemu.conf but this is insecure.
-- Guido Günther <agx@sigxcpu.org> Wed, 29 Sep 2010 13:10:02 +0200
libvirt (0.8.1-2) unstable; urgency=low
If you're using a script such as /etc/qemu-ifup to set up QEMU network
interfaces, have a look at README.Debian about the new config option
clear_emulator_capabilities in /etc/libvirt/qemu.conf.
When using NAT via libvirt's default network you don't have to change
anything.
-- Guido Günther <agx@sigxcpu.org> Mon, 12 Jul 2010 19:58:35 +0200
|