On Thu, Nov 8, 2012 at 11:54 AM, Jerome Yanga <jerome.yanga@xxxxxxxxx> wrote: > The anonuid/anongid are valid UID/GID. > > The nohide option didn't work. > > Here is the logs from /var/log/messages of the Fedora machine while > the AIX machine performed a "ls". > > Nov 8 09:44:31 fedora1 kernel: [515749.246015] device em1 entered > promiscuous mode > Nov 8 09:44:34 fedora1 rpc.mountd[28150]: authenticated mount request > from 10.49.6.40:784 for /data (/data) > Nov 8 09:44:34 fedora1 rpc.mountd[28150]: authenticated mount request > from 10.49.6.40:789 for /data (/data) > Nov 8 09:44:34 fedora1 rpc.mountd[28150]: authenticated mount request > from 10.49.6.40:794 for /data (/data) > Nov 8 09:44:37 fedora1 kernel: [515755.643377] device em1 left promiscuous mode > > Here is the error I found from the network trace. > > 344 3.088711 10.10.10.1 10.10.10.2 NFS 102 V3 FSINFO Reply (Call In > 343) Error:NFS3ERR_PERM > > Regards, > j the root user on the aix system will get mapped to the anonuid/gid does that uid/gid have permissions to see files on the exported device? Have you tried no_root_squash on the export for the linux machine? that will make root on aix == to root on linux and is mostly used when the same admin group admins the set of machines and all can be equally trusted. -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org