The permissions set by libvirtd on new LVM volumes do not allow non-root access.

Solution Verified - Updated -

Issue

  • How can I set permissions for new LVM volumes created with libvirt? Is this in udev, libvirt, lvm?

  • There is a requirement to be able to provide non-root users with access to volumes created by 'virt-manager'. An example of this type of access would be via the 'virt-copy-out' command.

    If a new volume is created in an LVM pool via the 'virt-manager', the '/dev/dm' device files will have permissions set to 600;

    ls -l /dev | grep dm
    brw-------  1 hjenkins qemu    253,   9 Sep 26 18:00 dm-9
    brw-------  1 hjenkins qemu    253,  10 Sep 26 18:00 dm-10
    brw-------  1 hjenkins qemu    253,  11 Sep 26 18:00 dm-11
    

    This does not allow any non-root user to access these volumes.

    Even if the /lib/udev/rules.d/12-dm-permissions.rules udev rules file is used and a rule is specified to modify the permissions, the permissions will remain set to 600.

Environment

  • Red Hat Enterprise Linux (RHEL) 6.3

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content