From c9e8de334a4c55462846d9b3437a410185c10c57 Mon Sep 17 00:00:00 2001 From: Quantum Date: Sat, 16 Oct 2021 23:48:35 -0400 Subject: [PATCH] [doc] module: make cgroups configuration more visible --- doc/module.rst | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/doc/module.rst b/doc/module.rst index fb748723..add74294 100644 --- a/doc/module.rst +++ b/doc/module.rst @@ -174,19 +174,19 @@ Create the following XML block in your domain: Running libvirt this way violates AppArmor and cgroups policies, which will block the VM from running. These policies must be amended to allow the VM -to start. +to start: -For AppArmor, create ``/etc/apparmor.d/local/abstractions/libvirt-qemu`` if -it doesn't exist, and add the following:: +- For AppArmor, create ``/etc/apparmor.d/local/abstractions/libvirt-qemu`` if + it doesn't exist, and add the following:: - # Looking Glass - /dev/kvmfr0 rw, + # Looking Glass + /dev/kvmfr0 rw, -For cgroups, edit ``/etc/libvirt/qemu.conf``, uncomment the -``cgroup_device_acl`` block, and add ``/dev/kvmfr0`` to the list. -Then restart ``libvirtd``: +- For cgroups, edit ``/etc/libvirt/qemu.conf``, uncomment the + ``cgroup_device_acl`` block, and add ``/dev/kvmfr0`` to the list. + Then restart ``libvirtd``: -.. code:: bash + .. code:: bash sudo systemctl restart libvirtd.service