Re: Permission denied mounting a DFS share with multiuser options

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,
I installed also the latest version of cifs-utils from source but nothing
changed.

Kernel: 5.6.0-rc4
cifs.upcall: version: 6.10
keyutils: keyctl from keyutils-1.6.1 (Built 2020-02-10)
sssd: 2.2.3
cifs module: 2.25

Best regards

Alberto

On Tue, 2020-03-03 at 16:40 +0100, abrosich@xxxxxxxx wrote:
> Hello,
> 
> I installed kernel version 5.6-rc4 but nothing changed.
> 
> This is the command line:
> 
> sudo kinit domainuser
> sudo mount --type cifs --verbose //server.domain/share /mnt/cifs --options
> sec=krb5i,username=domainuser,domain=AD.DOMAIN
> 
> And these are the dmesg logs:
> 
> [  374.413601] fs/cifs/cifsfs.c: Devname: //server.domain/share flags: 0
> [  374.413627] fs/cifs/connect.c: Domain name set
> [  374.413633] No dialect specified on mount. Default has changed to a more
> secure dialect, SMB2.1 or later (e.g. SMB3), from CIFS (SMB1). To use the less
> secure SMB1 dialect to access old servers which do not support SMB3 (or
> SMB2.1)
> specify vers=1.0 on mount.
> [  374.413635] fs/cifs/connect.c: Username: domainuser
> [  374.413639] fs/cifs/connect.c: file mode: 0755  dir mode: 0755
> [  374.413643] fs/cifs/connect.c: CIFS VFS: in mount_get_conns as Xid: 2 with
> uid: 0
> [  374.413645] fs/cifs/connect.c: UNC: \\server.domain\share
> [  374.413670] fs/cifs/connect.c: Socket created
> [  374.413673] fs/cifs/connect.c: sndbuf 16384 rcvbuf 131072 rcvtimeo 0x6d6
> [  374.414805] fs/cifs/fscache.c: cifs_fscache_get_client_cookie:
> (0x000000001802b6c5/0x00000000a61d46cb)
> [  374.414810] fs/cifs/connect.c: CIFS VFS: in cifs_get_smb_ses as Xid: 3 with
> uid: 0
> [  374.414812] fs/cifs/connect.c: Existing smb sess not found
> [  374.414818] fs/cifs/smb2pdu.c: Negotiate protocol
> [  374.414840] fs/cifs/transport.c: Sending smb: smb_len=252
> [  374.414898] fs/cifs/connect.c: Demultiplex PID: 969
> [  374.415589] fs/cifs/connect.c: RFC1002 header 0x134
> [  374.415599] fs/cifs/smb2misc.c: SMB2 data length 120 offset 128
> [  374.415601] fs/cifs/smb2misc.c: SMB2 len 248
> [  374.415603] fs/cifs/smb2misc.c: length of negcontexts 60 pad 0
> [  374.415620] fs/cifs/transport.c: cifs_sync_mid_result: cmd=0 mid=0 state=4
> [  374.415627] fs/cifs/misc.c: Null buffer passed to cifs_small_buf_release
> [  374.415630] fs/cifs/smb2pdu.c: mode 0x1
> [  374.415632] fs/cifs/smb2pdu.c: negotiated smb3.1.1 dialect
> [  374.415637] fs/cifs/asn1.c: OID len = 10 oid = 0x1 0x3 0x6 0x1
> [  374.415640] fs/cifs/asn1.c: OID len = 7 oid = 0x1 0x2 0x348 0xbb92
> [  374.415642] fs/cifs/asn1.c: OID len = 7 oid = 0x1 0x2 0x348 0x1bb92
> [  374.415644] fs/cifs/asn1.c: OID len = 8 oid = 0x1 0x2 0x348 0x1bb92
> [  374.415646] fs/cifs/asn1.c: OID len = 10 oid = 0x1 0x3 0x6 0x1
> [  374.415648] fs/cifs/smb2pdu.c: decoding 2 negotiate contexts
> [  374.415650] fs/cifs/smb2pdu.c: decode SMB3.11 encryption neg context of len
> 4
> [  374.415652] fs/cifs/smb2pdu.c: SMB311 cipher type:2
> [  374.415655] fs/cifs/connect.c: Security Mode: 0x1 Capabilities: 0x300067
> TimeAdjust: 0
> [  374.415657] fs/cifs/smb2pdu.c: Session Setup
> [  374.415659] fs/cifs/smb2pdu.c: sess setup type 5
> [  374.415664] fs/cifs/cifs_spnego.c: key description =
> ver=0x2;host=server.domain;ip4=xxx.xxx.xxx.xxx;sec=krb5;uid=0x0;creduid=0x0;us
> er
> =domainuser;pid=0x3c7
> [  374.431889] CIFS VFS: \\server.domain Send error in SessSetup = -126
> [  374.431898] fs/cifs/connect.c: CIFS VFS: leaving cifs_get_smb_ses (xid = 3)
> rc = -126
> [  374.431903] fs/cifs/connect.c: build_unc_path_to_root:
> full_path=\\server.domain\share
> [  374.431906] fs/cifs/connect.c: build_unc_path_to_root:
> full_path=\\server.domain\share
> [  374.431909] fs/cifs/connect.c: build_unc_path_to_root:
> full_path=\\server.domain\share
> [  374.431913] fs/cifs/dfs_cache.c: __dfs_cache_find: search path:
> \server.domain\share
> [  374.431917] fs/cifs/dfs_cache.c: get_dfs_referral: get an DFS referral for
> \server.domain\share
> [  374.431921] fs/cifs/dfs_cache.c: dfs_cache_noreq_find: path:
> \server.domain\share
> [  374.431932] fs/cifs/fscache.c: cifs_fscache_release_client_cookie:
> (0x000000001802b6c5/0x00000000a61d46cb)
> [  374.431944] fs/cifs/connect.c: CIFS VFS: leaving mount_put_conns (xid = 2)
> rc
> = 0
> [  374.431946] CIFS VFS: cifs_mount failed w/return code = -2
> 
> 
> Best regards
> 
> Alberto
> 
> On Mon, 2020-03-02 at 13:19 -0300, Paulo Alcantara wrote:
> > abrosich@xxxxxxxx writes:
> > 
> > > I've changed the environment.
> > > The linux client now is a Debian machine with testing flavour to have the
> > > latest
> > > versions of the involved softwares. These are the versions of some of
> > > them:
> > > 
> > > Kernel: #1 SMP Debian 5.4.19-1 (2020-02-13)
> > > cifs.upcall: version: 6.9
> > > keyutils: keyctl from keyutils-1.6.1 (Built 2020-02-10)
> > > sssd: 2.2.3
> > > cifs module: 2.23
> > 
> > I'd guess the following commit would fix your issue:
> > 
> >     5739375ee423 ("cifs: Fix mount options set in automount")
> > 
> > but could you please try it with 5.6-rc4?
> > 
> > Provide full dmesg logs as well.




[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux