The permissions set by libvirtd on new LVM volumes do not allow non-root access.
Issue
-
How can I set permissions for new LVM volumes created with libvirt? Is this in udev, libvirt, lvm?
-
There is a requirement to be able to provide non-root users with access to volumes created by 'virt-manager'. An example of this type of access would be via the 'virt-copy-out' command.
If a new volume is created in an LVM pool via the 'virt-manager', the '/dev/dm' device files will have permissions set to 600;
ls -l /dev | grep dm brw------- 1 hjenkins qemu 253, 9 Sep 26 18:00 dm-9 brw------- 1 hjenkins qemu 253, 10 Sep 26 18:00 dm-10 brw------- 1 hjenkins qemu 253, 11 Sep 26 18:00 dm-11This does not allow any non-root user to access these volumes.
Even if the
/lib/udev/rules.d/12-dm-permissions.rulesudev rules file is used and a rule is specified to modify the permissions, the permissions will remain set to 600.
Environment
- Red Hat Enterprise Linux (RHEL) 6.3
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.