The permissions set by libvirtd on new LVM volumes do not allow non-root access.

Solution Verified - Updated -

Issue

  • How can I set permissions for new LVM volumes created with libvirt? Is this in udev, libvirt, lvm?

  • There is a requirement to be able to provide non-root users with access to volumes created by 'virt-manager'. An example of this type of access would be via the 'virt-copy-out' command.

    If a new volume is created in an LVM pool via the 'virt-manager', the '/dev/dm' device files will have permissions set to 600;

    ls -l /dev | grep dm
    brw-------  1 hjenkins qemu    253,   9 Sep 26 18:00 dm-9
    brw-------  1 hjenkins qemu    253,  10 Sep 26 18:00 dm-10
    brw-------  1 hjenkins qemu    253,  11 Sep 26 18:00 dm-11
    

    This does not allow any non-root user to access these volumes.

    Even if the /lib/udev/rules.d/12-dm-permissions.rules udev rules file is used and a rule is specified to modify the permissions, the permissions will remain set to 600.

Environment

  • Red Hat Enterprise Linux (RHEL) 6.3

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.