When this check was introduced, virtiofsd required root privileges.

This has changed since then - now it does not need to set up all the
sandboxing when running as non-root. It even gained support for
id mapping, which makes running unprivileged even more useful.

Signed-off-by: Ján Tomko <jto...@redhat.com>
---
 src/qemu/qemu_virtiofs.c | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/src/qemu/qemu_virtiofs.c b/src/qemu/qemu_virtiofs.c
index af51d58673..4dacd37a1c 100644
--- a/src/qemu/qemu_virtiofs.c
+++ b/src/qemu/qemu_virtiofs.c
@@ -257,10 +257,6 @@ qemuVirtioFSStart(virQEMUDriver *driver,
     if (!(cmd = qemuVirtioFSBuildCommandLine(cfg, fs, &fd)))
         goto error;
 
-    /* so far only running as root is supported */
-    virCommandSetUID(cmd, 0);
-    virCommandSetGID(cmd, 0);
-
     virCommandSetPidFile(cmd, pidfile);
     virCommandSetOutputFD(cmd, &logfd);
     virCommandSetErrorFD(cmd, &logfd);
-- 
2.42.0
_______________________________________________
Devel mailing list -- devel@lists.libvirt.org
To unsubscribe send an email to devel-le...@lists.libvirt.org

Reply via email to