----> Another obvious but very insecure option is to instruct libvirt to
run the VM as the root user.

Is what I do,currently. Did you see my login prompt ?

*root*
@devuan-bunsen:/mnt/zroot2/zroot2/OS/Chromebook/FreeBSD-guestOS/freebsd-kvm#

It means that I do launch libvirtd & and virtlogd & as root. And this is
the reason why I use "-o
allow_root" on the sshfs command. But despite this,I can't access the image
file stored on the zfs disk.

On Wed, Nov 29, 2023 at 9:28 AM Peter Krempa <pkre...@redhat.com> wrote:

> On Tue, Nov 28, 2023 at 21:32:39 -0000, marietto2...@gmail.com wrote:
> > Hello to everyone.
> >
> > I would like to boot the FreeBSD 13.2 image file using Libvirt +
> virt-manager. I have stored the image on the external hard
> drive,"formatted" with ZFS while I'm using Devuan 5 installed on my ARM (32
> bit) Chromebook,where I have access to the ZFS disk using sshfs using this
> command :
> >
> > sshfs -o Compression=no -o allow_root -o transform_symlinks -o
> password_stdin root@192.168.1.2:/mnt/zroot2/zroot2 /mnt/zroot2/zroot2 <<<
> 'pass'
> >
> > This is the error I get when I try to boot the image file using
> virt-manager :
> >
> > error : qemuProcessReportLogError:1990 : internal error: process exited
> while connecting to monitor: 2023-11-28T20:53:46.882586Z qemu-system-arm:
> -blockdev
> {"driver":"file","filename":"/mnt/zroot2/zroot2/OS/Chromebook/FreeBSD-guestOS/freebsd-kvm/FreeBSD-13.2-RELEASE-armv7.img","node-name":"libvirt-1-storage","auto-read-only":true,"discard":"unmap"}:
> Could not open
> '/mnt/zroot2/zroot2/OS/Chromebook/FreeBSD-guestOS/freebsd-kvm/FreeBSD-13.2-RELEASE-armv7.img':
> Permission denied
>
> Note that you didn't provide the VM xml or details on how the VM is
> configured so I'll speculate based on what most users would use.
>
> Important fact is that 'sshfs' by default doesn't allow other users to
> access the mounted directory. You partially bypassed that with "-o
> allow_root" but only for the root user.
>
> When a VM is run in the systme context (libvirt uri 'qemu:///system')
> then the VM process itself runs as the 'qemu' user and not root.
>
> So unless you've mounted the 'sshfs' as the qemu user, which would be
> hard to do it's most likely what's causing your problem.
>
> You can use -o allow_others, but beware that it indeed allows any
> user to access the sshfs mount.
>
> Some distros compile qemu with a direct ssh driver for disks, but that
> requires a very new libvirt and also you must setup SSH key
> authentication accessible from the user running your vm.
>
> Another obvious but very insecure option is to instruct libvirt to run
> the VM as the root user.
>
>

-- 
Mario.
_______________________________________________
Users mailing list -- users@lists.libvirt.org
To unsubscribe send an email to users-le...@lists.libvirt.org

Reply via email to