Details
-
Bug
-
Resolution: Duplicate
-
Minor
-
None
-
Lustre 2.12.0, Lustre 2.10.5
-
3
-
9223372036854775807
Description
The code looks like this:
setgid = ((pud->pud_gid != pud->pud_fsgid) ||
(ucred->uc_identity &&
(pud->pud_gid != ucred->uc_identity->mi_gid)));
...
if (setgid && !(perm & CFS_SETGID_PERM)) {
CDEBUG(D_SEC, "mdt blocked setgid attempt (%u:%u/%u:%u -> %u) "
"from %s\n", pud->pud_uid, pud->pud_gid,
pud->pud_fsuid, pud->pud_fsgid,
ucred->uc_identity->mi_gid, libcfs_nid2str(peernid));
GOTO(out, rc = -EACCES);
}
So the posssibility seems to be pretty real though typically D_SEC is not defined so no crash like that by default.
Attachments
Issue Links
- duplicates
-
LU-17518 MDS still trust client-originated support GID on a Kerberos enabled filesystem
-
- Resolved
-