== sanity-sec test 72c: child_raise_privileges nodemap property ========================================================== 10:13:51 (1773670431) On MGS 192.168.203.109, mgsnm.rbac = nodemap.mgsnm.rbac=file_perms,quota_ops,byfid_ops oleg309-server: error: invalid ioctl: 000ce049 errno: 1: Operation not permitted oleg309-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'admin': value '1': Operation not permitted pdsh@oleg309-client: oleg309-server: ssh exited with exit code 1 oleg309-server: error: invalid ioctl: 000ce05f errno: 1: Operation not permitted oleg309-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'rbac': value 'file_perms,quota_ops,byfid_ops,dne_ops': Operation not permitted pdsh@oleg309-client: oleg309-server: ssh exited with exit code 1 oleg309-server: error: invalid ioctl: 000ce061 errno: 1: Operation not permitted oleg309-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'child_raise_privileges': value 'trusted,admin': Operation not permitted pdsh@oleg309-client: oleg309-server: ssh exited with exit code 1 oleg309-server: error: invalid ioctl: 000ce060 errno: 1: Operation not permitted oleg309-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'deny_mount': value '0': Operation not permitted pdsh@oleg309-client: oleg309-server: ssh exited with exit code 1 On MGS 192.168.203.109, mgsnm.child_raise_privileges = nodemap.mgsnm.child_raise_privileges=trusted,dne_ops oleg309-server: error: invalid ioctl: 000ce05f errno: 1: Operation not permitted oleg309-server: error: nodemap_modify: cannot modify nodemap 'nm_test72c' to param 'rbac': value 'file_perms,quota_ops,byfid_ops,chlg_ops': Operation not permitted pdsh@oleg309-client: oleg309-server: ssh exited with exit code 1 On MGS 192.168.203.109, mgsnm.child_raise_privileges = nodemap.mgsnm.child_raise_privileges=child_raise_privs,trusted,dne_ops nodemap.active=0 nodemap.default.admin_nodemap=0 nodemap.default.audit_mode=1 nodemap.default.banlist=[] nodemap.default.child_raise_privileges=none nodemap.default.deny_mount=0 nodemap.default.deny_unknown=0 nodemap.default.dt_stats= snapshot_time 1773670444.054973245 secs.nsecs start_time 1773668218.632367795 secs.nsecs elapsed_time 2225.422605450 secs.nsecs write_bytes 1 samples [bytes] 38408 38408 38408 1475174464 write 1 samples [usecs] 1318 1318 1318 1737124 setattr 8 samples [usecs] 102 263 1141 182839 sync 2 samples [usecs] 5 13 18 194 destroy 76 samples [usecs] 1836 28889 568004 7290526170 create 2 samples [usecs] 12776 37907 50683 1600166825 statfs 555 samples [usecs] 4 1280 16980 2789260 nodemap.default.enable_cap_mask=off nodemap.default.exports= [ { nid: 192.168.203.9@tcp, uuid: fa32c263-7cb1-4b16-8f4e-b75c698e045d, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-OST0001 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-OST0001_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-mdtlov_UUID, dev: lustre-OST0000 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-MDT0000_UUID, dev: lustre-MDT0000 }, { nid: 0@lo, uuid: lustre-MDT0000-lwp-OST0000_UUID, dev: lustre-MDT0000 } ] nodemap.default.fileset= [ { primary: /deffset } ] nodemap.default.forbid_encryption=0 nodemap.default.id=0 nodemap.default.map_mode=all nodemap.default.md_stats= snapshot_time 1773670444.055144387 secs.nsecs start_time 1773668217.768734670 secs.nsecs elapsed_time 2226.286409717 secs.nsecs open 2 samples [usecs] 547 778 1325 904493 close 2 samples [usecs] 101 201 302 50602 mknod 2 samples [usecs] 465 667 1132 661114 unlink 2 samples [usecs] 567 701 1268 812890 getattr 7 samples [usecs] 20 66 233 9153 setattr 4 samples [usecs] 120 537 1483 645829 getxattr 2 samples [usecs] 48 49 97 4705 statfs 2 samples [usecs] 6 16 22 292 nodemap.default.readonly_mount=0 nodemap.default.squash_gid=65534 nodemap.default.squash_projid=65534 nodemap.default.squash_uid=65534 nodemap.default.trusted_nodemap=0 nodemap.mgsnm.admin_nodemap=0 nodemap.mgsnm.audit_mode=1 nodemap.mgsnm.banlist=[] nodemap.mgsnm.child_raise_privileges=child_raise_privs,trusted,dne_ops nodemap.mgsnm.deny_mount=1 nodemap.mgsnm.deny_unknown=0 nodemap.mgsnm.enable_cap_mask=off nodemap.mgsnm.exports=[] nodemap.mgsnm.fileset= [ ] nodemap.mgsnm.forbid_encryption=0 nodemap.mgsnm.gssonly_identification=0 nodemap.mgsnm.id=66 nodemap.mgsnm.idmap=[] nodemap.mgsnm.map_mode=all nodemap.mgsnm.offset= { start_uid: 0, limit_uid: 0, start_gid: 0, limit_gid: 0, start_projid: 0, limit_projid: 0 } nodemap.mgsnm.parent= nodemap.mgsnm.ranges=[] nodemap.mgsnm.rbac=file_perms,quota_ops,byfid_ops nodemap.mgsnm.readonly_mount=0 nodemap.mgsnm.sepol= nodemap.mgsnm.squash_gid=65534 nodemap.mgsnm.squash_projid=65534 nodemap.mgsnm.squash_uid=65534 nodemap.mgsnm.trusted_nodemap=0 nodemap.nm_test72c.admin_nodemap=0 nodemap.nm_test72c.audit_mode=1 nodemap.nm_test72c.banlist=[] nodemap.nm_test72c.child_raise_privileges=child_raise_privs,admin,trusted,dne_ops nodemap.nm_test72c.deny_mount=1 nodemap.nm_test72c.deny_unknown=0 nodemap.nm_test72c.enable_cap_mask=off nodemap.nm_test72c.exports=[] nodemap.nm_test72c.fileset= [ ] nodemap.nm_test72c.forbid_encryption=0 nodemap.nm_test72c.gssonly_identification=0 nodemap.nm_test72c.id=69 nodemap.nm_test72c.idmap=[] nodemap.nm_test72c.map_mode=all nodemap.nm_test72c.offset= { start_uid: 0, limit_uid: 0, start_gid: 0, limit_gid: 0, start_projid: 0, limit_projid: 0 } nodemap.nm_test72c.parent=mgsnm nodemap.nm_test72c.ranges=[] nodemap.nm_test72c.rbac=file_perms,quota_ops,byfid_ops nodemap.nm_test72c.readonly_mount=0 nodemap.nm_test72c.sepol= nodemap.nm_test72c.squash_gid=65534 nodemap.nm_test72c.squash_projid=65534 nodemap.nm_test72c.squash_uid=65534 nodemap.nm_test72c.trusted_nodemap=0