== sanity-sec test 25c: test yaml-compliance for nodemap ========================================================== 10:04:08 (1773669848) mdt.lustre-MDT0000.identity_upcall=NONE On MGS 192.168.203.109, active = nodemap.active=1 On MGS 192.168.203.109, c0.offset = nodemap.c0.offset= { start_uid: 1000000, limit_uid: 100000, start_gid: 1000000, limit_gid: 100000, start_projid: 1000000, limit_projid: 100000 } Stopping clients: oleg309-client.virtnet /mnt/lustre (opts:) Stopping client oleg309-client.virtnet /mnt/lustre opts: Starting client oleg309-client.virtnet: -o user_xattr,flock 192.168.203.109@tcp:/lustre/ /mnt/lustre Mount client oleg309-client.virtnet: mount -t lustre -o user_xattr,flock 192.168.203.109@tcp:/lustre/ /mnt/lustre Started clients oleg309-client.virtnet: 192.168.203.109@tcp:/lustre/ on /mnt/lustre type lustre (rw,checksum,encrypt,flock,lazystatfs,lruresize,nolock,statfs_project,nouser_fid2path,user_xattr,verbose) Filtered nodemap output: nodemap.active: 1 nodemap.c0.admin_nodemap: 0 nodemap.c0.audit_mode: 1 nodemap.c0.banlist: [] nodemap.c0.child_raise_privileges: none nodemap.c0.deny_mount: 0 nodemap.c0.deny_unknown: 0 nodemap.c0.enable_cap_mask: off nodemap.c0.exports: [ { nid: 192.168.203.9@tcp, uuid: 837605a0-7127-4681-a124-61b1c79b8b06, dev: lustre-OST0000 }, { nid: 192.168.203.9@tcp, uuid: 837605a0-7127-4681-a124-61b1c79b8b06, dev: lustre-OST0001 }, { nid: 192.168.203.9@tcp, uuid: 837605a0-7127-4681-a124-61b1c79b8b06, dev: lustre-MDT0000 } ] nodemap.c0.fileset: [ { primary: /d25c.sanity-sec } ] nodemap.c0.forbid_encryption: 0 nodemap.c0.gssonly_identification: 0 nodemap.c0.id: 43 nodemap.c0.idmap: [ { idtype: uid, client_id: 60003, fs_id: 60000 }, { idtype: uid, client_id: 60004, fs_id: 60002 }, { idtype: gid, client_id: 60003, fs_id: 60000 }, { idtype: gid, client_id: 60004, fs_id: 60002 } ] nodemap.c0.map_mode: all nodemap.c0.offset: { start_uid: 1000000, limit_uid: 100000, start_gid: 1000000, limit_gid: 100000, start_projid: 1000000, limit_projid: 100000 } nodemap.c0.parent: nodemap.c0.ranges: [ { id: 44, start_nid: 192.168.203.9@tcp, end_nid: 192.168.203.9@tcp } ] nodemap.c0.rbac: file_perms,dne_ops,quota_ops,byfid_ops,chlg_ops,fscrypt_admin,server_upcall,ignore_root_prjquota,hsm_ops,local_admin,pool_quota_ops nodemap.c0.readonly_mount: 0 nodemap.c0.sepol: nodemap.c0.squash_gid: 65534 nodemap.c0.squash_projid: 65534 nodemap.c0.squash_uid: 65534 nodemap.c0.trusted_nodemap: 0 nodemap.default.admin_nodemap: 1 nodemap.default.audit_mode: 1 nodemap.default.banlist: [] nodemap.default.child_raise_privileges: none nodemap.default.deny_mount: 0 nodemap.default.deny_unknown: 0 nodemap.default.enable_cap_mask: off nodemap.default.exports: [ { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-OST0001 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-OST0001_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-OST0000 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-MDT0000_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-OST0000_UUID, dev: lustre-MDT0000 } ] nodemap.default.fileset: [ ] nodemap.default.forbid_encryption: 0 nodemap.default.id: 0 nodemap.default.map_mode: all nodemap.default.readonly_mount: 0 nodemap.default.squash_gid: 65534 nodemap.default.squash_projid: 65534 nodemap.default.squash_uid: 65534 nodemap.default.trusted_nodemap: 1 Stopping clients: oleg309-client.virtnet /mnt/lustre (opts:) Stopping client oleg309-client.virtnet /mnt/lustre opts: On MGS 192.168.203.109, default.trusted_nodemap = nodemap.default.trusted_nodemap=0 On MGS 192.168.203.109, active = nodemap.active=0 Starting client oleg309-client.virtnet: -o user_xattr,flock 192.168.203.109@tcp:/lustre /mnt/lustre Mount client oleg309-client.virtnet: mount -t lustre -o user_xattr,flock 192.168.203.109@tcp:/lustre /mnt/lustre Started clients oleg309-client.virtnet: 192.168.203.109@tcp:/lustre on /mnt/lustre type lustre (rw,checksum,encrypt,flock,lazystatfs,lruresize,nolock,statfs_project,nouser_fid2path,user_xattr,verbose)