Set correct permissions for vhostuser sockets

The latest updates to DPDK in 16.04 and above introduce two new
parameters for DPDK initialization which avoid the need to run
qemu processes with vhostuser sockets as root.

Use these options to ensure that sockets are created with the
correct ownership and permissions for OpenStack/KVM.

Change-Id: I04bbd514d1bdb9b3249ed69e8d64eb66d9839944
Closes-Bug: 1546565
This commit is contained in:
James Page 2016-05-10 10:16:06 +01:00
parent 236bb562f1
commit 4f6e2ca251
1 changed files with 2 additions and 2 deletions

View File

@ -5,5 +5,5 @@
# Configuration managed by neutron-openvswitch charm
###############################################################################
{% if dpdk_enabled -%}
DPDK_OPTS='--dpdk -c {{ cpu_mask }} -n 4 --socket-mem {{ socket_memory }} {{ device_whitelist }}'
{% endif -%}
DPDK_OPTS='--dpdk -c {{ cpu_mask }} -n 4 --socket-mem {{ socket_memory }} {{ device_whitelist }} --vhost-owner libvirt-qemu:kvm --vhost-perm 0660'
{% endif -%}