https://bugs.kde.org/show_bug.cgi?id=430947
Bug ID: 430947 Summary: Can't find my Windows 10 Samba share in smb:/ Product: kio-extras Version: unspecified Platform: Other OS: Linux Status: REPORTED Severity: normal Priority: NOR Component: Samba Assignee: plasma-b...@kde.org Reporter: n...@kde.org Target Milestone: --- Everything KDE from git master. See also Bug 428342. I have a Windows 10 machine with a Samba share. I can connect to it directly via its IP address: smb://192.168.1.140/ However it does not show up in the smb:/ ioslave. Here is some debug logging: KDE_FORK_SLAVES=1 QT_LOGGING_RULES="kf5.*=true;kf5.kio.*=true;kio_smb=true" dolphin --new-window INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 Using netbios name LIBERATOR. Using workgroup WORKGROUP. INFO: Current debug levels: all: 10 tdb: 10 printdrivers: 10 lanman: 10 smb: 10 rpc_parse: 10 rpc_srv: 10 rpc_cli: 10 passdb: 10 sam: 10 auth: 10 winbind: 10 vfs: 10 idmap: 10 quota: 10 acls: 10 locking: 10 msdfs: 10 dmapi: 10 registry: 10 scavenger: 10 dns: 10 ldb: 10 tevent: 10 auth_audit: 10 auth_json_audit: 10 kerberos: 10 drs_repl: 10 smb2: 10 smb2_credits: 10 dsdb_audit: 10 dsdb_json_audit: 10 dsdb_password_audit: 10 dsdb_password_json_audit: 10 dsdb_transaction_audit: 10 dsdb_transaction_json_audit: 10 dsdb_group_audit: 10 dsdb_group_json_audit: 10 Using netbios name LIBERATOR. Using workgroup WORKGROUP. parsed path: fname='smb://' server='' share='' path='' options='' SMBC_check_options(): server='' share='' path='' options='' name_resolve_bcast: Attempting broadcast lookup for name __MSBROWSE__<0x1> parse_nmb: packet id = 3302 nmb packet from 192.168.1.124(35072) header: id=3302 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=__MSBROWSE__<01> rr_type=32 rr_class=1 ttl=259200 answers 0 char .....| hex 8000C0A8017C Got a positive name query response from 192.168.1.124 ( 192.168.1.124 ) validator failed parse_nmb: packet id = 3302 nmb packet from 192.168.1.124(35072) header: id=3302 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=__MSBROWSE__<01> rr_type=32 rr_class=1 ttl=259200 answers 0 char .....| hex 8000C0A8017C Got a positive name query response from 192.168.1.124 ( ) validator failed name_status_find: looking up *#00 at 192.168.1.124 Opening cache file at /var/lib/samba/lock/gencache.tdb tdb(/var/lib/samba/lock/gencache.tdb): tdb_open_ex: could not open file /var/lib/samba/lock/gencache.tdb: Permission denied gencache_init: Opening user cache file /home/nate/.cache/samba/gencache.tdb. gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.1D.192.168.1.124] and timeout=[Wed Dec 31 05:00:00 PM 1969 MST] (-1609262731 seconds in the past) namecache_status_fetch: no entry for NBT/*#00.1D.192.168.1.124 found. getlmhostsent: lmhost entry: 127.0.0.1 localhost parse_nmb: packet id = 31211 nmb packet from 192.168.1.124(35072) header: id=31211 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=*<00> rr_type=33 rr_class=1 ttl=0 answers 0 char .LIBERATOR hex 074C4942455241544F52202020202020 answers 10 char ...LIBERATOR hex 0004004C4942455241544F5220202020 answers 20 char ...LIBERATOR hex 20200304004C4942455241544F522020 answers 30 char ....__MSBRO hex 2020202020040001025F5F4D5342524F answers 40 char WSE__....WORKGRO hex 5753455F5F02018400574F524B47524F answers 50 char UP ...WORKG hex 5550202020202020008400574F524B47 answers 60 char ROUP ...WOR hex 524F55502020202020201D0400574F52 answers 70 char KGROUP .... hex 4B47524F55502020202020201E840000 answers 80 char ................ hex 00000000000000000000000000000000 answers 90 char ................ hex 00000000000000000000000000000000 answers a0 char ............. hex 00000000000000000000000000 LIBERATOR#00: flags = 0x04 LIBERATOR#03: flags = 0x04 LIBERATOR#20: flags = 0x04 __MSBROWSE__#01: flags = 0x84 WORKGROUP#00: flags = 0x84 WORKGROUP#1d: flags = 0x04 WORKGROUP#1e: flags = 0x84 gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.1D.192.168.1.124] and timeout=[Tue Dec 29 10:36:31 AM 2020 MST] (660 seconds ahead) namecache_status_store: entry NBT/*#00.1D.192.168.1.124 -> WORKGROUP name_status_find: name found, name WORKGROUP ip address is 192.168.1.124 internal_resolve_name: looking up WORKGROUP#1d (sitename (null)) gencache_set_data_blob: Adding cache entry with key=[NBT/WORKGROUP#1D] and timeout=[Wed Dec 31 05:00:00 PM 1969 MST] (-1609262731 seconds in the past) no entry for WORKGROUP#1D found. resolve_lmhosts: Attempting lmhosts lookup for name WORKGROUP<0x1d> getlmhostsent: lmhost entry: 127.0.0.1 localhost resolve_hosts: not appropriate for name type <0x1d> name_resolve_bcast: Attempting broadcast lookup for name WORKGROUP<0x1d> parse_nmb: packet id = 4021 nmb packet from 192.168.1.124(35072) header: id=4021 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=WORKGROUP<1d> rr_type=32 rr_class=1 ttl=259200 answers 0 char .....| hex 0000C0A8017C Got a positive name query response from 192.168.1.124 ( 192.168.1.124 ) remove_duplicate_addrs2: looking for duplicate address/port pairs namecache_store: storing 1 address for WORKGROUP#1d: 192.168.1.124 gencache_set_data_blob: Adding cache entry with key=[NBT/WORKGROUP#1D] and timeout=[Tue Dec 29 10:36:31 AM 2020 MST] (660 seconds ahead) internal_resolve_name: returning 1 addresses: 192.168.1.124:0 found master browser WORKGROUP, 192.168.1.124 Connecting to 192.168.1.124 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 2626560 SO_RCVBUF = 131072 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 TCP_USER_TIMEOUT = 0 name_status_find: looking up *#00 at 192.168.1.124 gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.00.192.168.1.124] and timeout=[Wed Dec 31 05:00:00 PM 1969 MST] (-1609262731 seconds in the past) namecache_status_fetch: no entry for NBT/*#00.00.192.168.1.124 found. getlmhostsent: lmhost entry: 127.0.0.1 localhost parse_nmb: packet id = 20268 nmb packet from 192.168.1.124(35072) header: id=20268 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=*<00> rr_type=33 rr_class=1 ttl=0 answers 0 char .LIBERATOR hex 074C4942455241544F52202020202020 answers 10 char ...LIBERATOR hex 0004004C4942455241544F5220202020 answers 20 char ...LIBERATOR hex 20200304004C4942455241544F522020 answers 30 char ....__MSBRO hex 2020202020040001025F5F4D5342524F answers 40 char WSE__....WORKGRO hex 5753455F5F02018400574F524B47524F answers 50 char UP ...WORKG hex 5550202020202020008400574F524B47 answers 60 char ROUP ...WOR hex 524F55502020202020201D0400574F52 answers 70 char KGROUP .... hex 4B47524F55502020202020201E840000 answers 80 char ................ hex 00000000000000000000000000000000 answers 90 char ................ hex 00000000000000000000000000000000 answers a0 char ............. hex 00000000000000000000000000 LIBERATOR#00: flags = 0x04 LIBERATOR#03: flags = 0x04 LIBERATOR#20: flags = 0x04 __MSBROWSE__#01: flags = 0x84 WORKGROUP#00: flags = 0x84 WORKGROUP#1d: flags = 0x04 WORKGROUP#1e: flags = 0x84 gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.00.192.168.1.124] and timeout=[Tue Dec 29 10:36:31 AM 2020 MST] (660 seconds ahead) namecache_status_store: entry NBT/*#00.00.192.168.1.124 -> LIBERATOR name_status_find: name found, name LIBERATOR ip address is 192.168.1.124 Connecting to 192.168.1.124 at port 445 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 2626560 SO_RCVBUF = 131072 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 TCP_USER_TIMEOUT = 0 -- You are receiving this mail because: You are watching all bug changes.