Details
-
Improvement
-
Resolution: Fixed
-
Minor
-
None
-
None
-
3
-
9223372036854775807
Description
For Lustre systems running in cloud environments or dark sites, there is a desire to avoid exposing customer private data from their runtime environment, while allowing debug logs to be collected from the system for analysis. In particular, logging of filenames and directory names on both the console and in the kernel debug logs should be optionally disabled.
A new global tunable parameter should be created, like "enable_filename_encoding" (default =0) that can be enabled (=1) when running in an environment where filenames may be considered private information.
Attachments
Issue Links
- is related to
-
LU-18873 unsafe access to user-supplied data
-
- Resolved
-
Merged for 2.17