Bug 2147460
| Summary: | [CEE][cephfs] cephfs-mirror service kept getting permission denied errors | |||
|---|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Scott Nipp <snipp> | |
| Component: | CephFS | Assignee: | Milind Changire <mchangir> | |
| Status: | CLOSED ERRATA | QA Contact: | Hemanth Kumar <hyelloji> | |
| Severity: | medium | Docs Contact: | Eliska <ekristov> | |
| Priority: | unspecified | |||
| Version: | 5.2 | CC: | bhull, ceph-eng-bugs, cephqe-warriors, ekristov, gfarnum, gjose, kdreyer, mchangir, sbaldwin, vereddy, vshankar | |
| Target Milestone: | --- | Keywords: | Rebase | |
| Target Release: | 6.0 | |||
| Hardware: | x86_64 | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | ceph-17.2.5-1.el9cp | Doc Type: | Bug Fix | |
| Doc Text: |
.The CephFS now has the correct directory access
Previously, directory access was denied even to the UID of 0 due to incorrect Discretionary Access Control (DAC) management.
With this fix, directory access is allowed to UID 0 even if the actual permissions for the directory user, group, and others are not permissible for UID 0.
This results in the correct Ceph File System (CephFS) behavior for directory access to UID 0 by effectively granting superuser privileges.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 2152849 2158286 2175175 (view as bug list) | Environment: | ||
| Last Closed: | 2023-03-20 18:59:40 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2126050, 2158286, 2175175 | |||
|
Comment 11
Ken Dreyer (Red Hat)
2023-01-04 16:35:51 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Red Hat Ceph Storage 6.0 Bug Fix update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2023:1360 |