The permissions set by libvirtd on new LVM volumes do not allow non-root access.
Issue
-
How can I set permissions for new LVM volumes created with libvirt? Is this in udev, libvirt, lvm?
-
There is a requirement to be able to provide non-root users with access to volumes created by 'virt-manager'. An example of this type of access would be via the 'virt-copy-out' command.
If a new volume is created in an LVM pool via the 'virt-manager', the '/dev/dm' device files will have permissions set to 600;
ls -l /dev | grep dm brw------- 1 hjenkins qemu 253, 9 Sep 26 18:00 dm-9 brw------- 1 hjenkins qemu 253, 10 Sep 26 18:00 dm-10 brw------- 1 hjenkins qemu 253, 11 Sep 26 18:00 dm-11This does not allow any non-root user to access these volumes.
Even if the
/lib/udev/rules.d/12-dm-permissions.rulesudev rules file is used and a rule is specified to modify the permissions, the permissions will remain set to 600.
Environment
- Red Hat Enterprise Linux (RHEL) 6.3
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
