8,560
edits
(Importing a new version from external source) |
(Importing a new version from external source) |
||
Line 2: | Line 2: | ||
<br clear="all" /> | <br clear="all" /> | ||
From terminal: | From terminal: | ||
{{UserCmd|command=sudo pacman -S --needed virt-manager qemu-desktop libvirt edk2-ovmf dnsmasq iptables-nft}} | |||
For TPM support: | For TPM support: | ||
{{UserCmd|command=sudo pacman -S --asdeps swtpm}} | |||
Enable and start service | Enable and start service | ||
{{UserCmd|command=sudo systemctl enable libvirtd.service}} | |||
Add user to ''libvirt,'' ''libvirt-qemu'' and ''kvm'' groups to use the '''system'''-level virtual machines (qemu:///system). | |||
Add user to ''libvirt,'' ''libvirt-qemu'' and ''kvm'' groups to use the '''system'''-level virtual machines (qemu:///system) | {{UserCmd|command=sudo usermod -a -G libvirt,libvirt-qemu,kvm $USER}} | ||
Note that you will need to restart userspace for the groups to become active. To restart userspace | |||
{{UserCmd|command=systemctl soft-reboot}} | |||
{{note| | {{note| | ||
# You don't need this step to run system-level virtual machines. However, virt-manager will prompt for sudoer's password when launch if the user is not in the ''libvirt'' group | # You don't need this step to run system-level virtual machines. However, virt-manager will prompt for sudoer's password when launch if the user is not in the ''libvirt'' group | ||
# You can also create '''user'''-level virtual machines (qemu:///session) and use without sudoer's privelige. However, some features such as [https://libvirt.org/kbase/virtiofs.html VirtioFS file sharing] may be unavailable in qemu:///session}} | # You can also create '''user'''-level virtual machines (qemu:///session) and use without sudoer's privelige. However, some features such as [https://libvirt.org/kbase/virtiofs.html VirtioFS file sharing] may be unavailable in qemu:///session}} |