== sanity-sec test 72c: child_raise_privileges nodemap property ========================================================== 10:27:02 (1773671222) On MGS 192.168.201.108, mgsnm.rbac = nodemap.mgsnm.rbac=file_perms,quota_ops,byfid_ops oleg108-server: error: invalid ioctl: 000ce049 errno: 1: Operation not permitted oleg108-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'admin': value '1': Operation not permitted pdsh@oleg108-client: oleg108-server: ssh exited with exit code 1 oleg108-server: error: invalid ioctl: 000ce05f errno: 1: Operation not permitted oleg108-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'rbac': value 'file_perms,quota_ops,byfid_ops,dne_ops': Operation not permitted pdsh@oleg108-client: oleg108-server: ssh exited with exit code 1 oleg108-server: error: invalid ioctl: 000ce061 errno: 1: Operation not permitted oleg108-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'child_raise_privileges': value 'trusted,admin': Operation not permitted pdsh@oleg108-client: oleg108-server: ssh exited with exit code 1 oleg108-server: error: invalid ioctl: 000ce060 errno: 1: Operation not permitted oleg108-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'deny_mount': value '0': Operation not permitted pdsh@oleg108-client: oleg108-server: ssh exited with exit code 1 On MGS 192.168.201.108, mgsnm.child_raise_privileges = nodemap.mgsnm.child_raise_privileges=trusted,dne_ops oleg108-server: error: invalid ioctl: 000ce05f errno: 1: Operation not permitted oleg108-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'rbac': value 'file_perms,quota_ops,byfid_ops,chlg_ops': Operation not permitted pdsh@oleg108-client: oleg108-server: ssh exited with exit code 1 On MGS 192.168.201.108, mgsnm.child_raise_privileges = nodemap.mgsnm.child_raise_privileges=child_raise_privs,trusted,dne_ops nodemap.active=0 nodemap.default.admin_nodemap=0 nodemap.default.audit_mode=1 nodemap.default.banlist=[] nodemap.default.child_raise_privileges=none nodemap.default.deny_mount=0 nodemap.default.deny_unknown=0 nodemap.default.dt_stats= snapshot_time 1773671238.026419789 secs.nsecs start_time 1773668291.539863880 secs.nsecs elapsed_time 2946.486555909 secs.nsecs write_bytes 3 samples [bytes] 38408 96232 206688 15926686592 write 3 samples [usecs] 1478 4878 8537 30736129 setattr 9 samples [usecs] 72 495 1634 426140 sync 3 samples [usecs] 5 12 22 194 destroy 78 samples [usecs] 204 32316 596508 7264761204 create 4 samples [usecs] 2094 5755 13976 56275346 statfs 1167 samples [usecs] 1 6174 37313 55321153 nodemap.default.enable_cap_mask=off nodemap.default.exports= [ { nid: 192.168.201.8@tcp, uuid: d1629171-4b8b-46a9-a16d-550792f7755d, dev: lustre-MDT0001 }, { nid: 192.168.201.8@tcp, uuid: d1629171-4b8b-46a9-a16d-550792f7755d, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-OST0001 }, { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-OST0000 }, { nid: 0@lo, uuid: lustre-MDT0001-mdtlov_UUID, dev: lustre-OST0001 }, { nid: 0@lo, uuid: lustre-MDT0001-lwp-OST0001_UUID, dev: lustre-MDT0001 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-OST0001_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0001-mdtlov_UUID, dev: lustre-OST0000 }, { nid: 0@lo, uuid: lustre-MDT0001-lwp-OST0000_UUID, dev: lustre-MDT0001 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-OST0000_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-MDT0001 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-MDT0001_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0001-mdtlov_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-MDT0000_UUID, dev: lustre-MDT0000 } ] nodemap.default.fileset= [ { primary: /deffset } ] nodemap.default.forbid_encryption=0 nodemap.default.id=0 nodemap.default.map_mode=all nodemap.default.md_stats= snapshot_time 1773671238.026830736 secs.nsecs start_time 1773668275.643810510 secs.nsecs elapsed_time 2962.383020226 secs.nsecs open 2 samples [usecs] 672 1154 1826 1783300 close 2 samples [usecs] 165 166 331 54781 mknod 2 samples [usecs] 570 1049 1619 1425301 unlink 2 samples [usecs] 570 770 1340 917800 getattr 7 samples [usecs] 9 229 443 61377 setattr 4 samples [usecs] 162 533 1277 481743 getxattr 2 samples [usecs] 56 73 129 8465 statfs 590 samples [usecs] 7 2911 25738 18983634 nodemap.default.readonly_mount=0 nodemap.default.squash_gid=65534 nodemap.default.squash_projid=65534 nodemap.default.squash_uid=65534 nodemap.default.trusted_nodemap=0 nodemap.mgsnm.admin_nodemap=0 nodemap.mgsnm.audit_mode=1 nodemap.mgsnm.banlist=[] nodemap.mgsnm.child_raise_privileges=child_raise_privs,trusted,dne_ops nodemap.mgsnm.deny_mount=1 nodemap.mgsnm.deny_unknown=0 nodemap.mgsnm.enable_cap_mask=off nodemap.mgsnm.exports=[] nodemap.mgsnm.fileset= [ ] nodemap.mgsnm.forbid_encryption=0 nodemap.mgsnm.gssonly_identification=0 nodemap.mgsnm.id=19 nodemap.mgsnm.idmap=[] nodemap.mgsnm.map_mode=all nodemap.mgsnm.offset= { start_uid: 0, limit_uid: 0, start_gid: 0, limit_gid: 0, start_projid: 0, limit_projid: 0 } nodemap.mgsnm.parent= nodemap.mgsnm.ranges=[] nodemap.mgsnm.rbac=file_perms,quota_ops,byfid_ops nodemap.mgsnm.readonly_mount=0 nodemap.mgsnm.sepol= nodemap.mgsnm.squash_gid=65534 nodemap.mgsnm.squash_projid=65534 nodemap.mgsnm.squash_uid=65534 nodemap.mgsnm.trusted_nodemap=0 nodemap.nm_test72c.admin_nodemap=0 nodemap.nm_test72c.audit_mode=1 nodemap.nm_test72c.banlist=[] nodemap.nm_test72c.child_raise_privileges=child_raise_privs,admin,trusted,dne_ops nodemap.nm_test72c.deny_mount=1 nodemap.nm_test72c.deny_unknown=0 nodemap.nm_test72c.enable_cap_mask=off nodemap.nm_test72c.exports=[] nodemap.nm_test72c.fileset= [ ] nodemap.nm_test72c.forbid_encryption=0 nodemap.nm_test72c.gssonly_identification=0 nodemap.nm_test72c.id=22 nodemap.nm_test72c.idmap=[] nodemap.nm_test72c.map_mode=all nodemap.nm_test72c.offset= { start_uid: 0, limit_uid: 0, start_gid: 0, limit_gid: 0, start_projid: 0, limit_projid: 0 } nodemap.nm_test72c.parent=mgsnm nodemap.nm_test72c.ranges=[] nodemap.nm_test72c.rbac=file_perms,quota_ops,byfid_ops nodemap.nm_test72c.readonly_mount=0 nodemap.nm_test72c.sepol= nodemap.nm_test72c.squash_gid=65534 nodemap.nm_test72c.squash_projid=65534 nodemap.nm_test72c.squash_uid=65534 nodemap.nm_test72c.trusted_nodemap=0