https://bugs.kde.org/show_bug.cgi?id=430947

            Bug ID: 430947
           Summary: Can't find my Windows 10 Samba share in smb:/
           Product: kio-extras
           Version: unspecified
          Platform: Other
                OS: Linux
            Status: REPORTED
          Severity: normal
          Priority: NOR
         Component: Samba
          Assignee: plasma-b...@kde.org
          Reporter: n...@kde.org
  Target Milestone: ---

Everything KDE from git master. See also Bug 428342.

I have a Windows 10 machine with a Samba share. I can connect to it directly
via its IP address: smb://192.168.1.140/

However it does not show up in the smb:/ ioslave. Here is some debug logging:

KDE_FORK_SLAVES=1 QT_LOGGING_RULES="kf5.*=true;kf5.kio.*=true;kio_smb=true"
dolphin --new-window
INFO: Current debug levels:
  all: 10
  tdb: 10
  printdrivers: 10
  lanman: 10
  smb: 10
  rpc_parse: 10
  rpc_srv: 10
  rpc_cli: 10
  passdb: 10
  sam: 10
  auth: 10
  winbind: 10
  vfs: 10
  idmap: 10
  quota: 10
  acls: 10
  locking: 10
  msdfs: 10
  dmapi: 10
  registry: 10
  scavenger: 10
  dns: 10
  ldb: 10
  tevent: 10
  auth_audit: 10
  auth_json_audit: 10
  kerberos: 10
  drs_repl: 10
  smb2: 10
  smb2_credits: 10
  dsdb_audit: 10
  dsdb_json_audit: 10
  dsdb_password_audit: 10
  dsdb_password_json_audit: 10
  dsdb_transaction_audit: 10
  dsdb_transaction_json_audit: 10
  dsdb_group_audit: 10
  dsdb_group_json_audit: 10
Using netbios name LIBERATOR.
Using workgroup WORKGROUP.
INFO: Current debug levels:
  all: 10
  tdb: 10
  printdrivers: 10
  lanman: 10
  smb: 10
  rpc_parse: 10
  rpc_srv: 10
  rpc_cli: 10
  passdb: 10
  sam: 10
  auth: 10
  winbind: 10
  vfs: 10
  idmap: 10
  quota: 10
  acls: 10
  locking: 10
  msdfs: 10
  dmapi: 10
  registry: 10
  scavenger: 10
  dns: 10
  ldb: 10
  tevent: 10
  auth_audit: 10
  auth_json_audit: 10
  kerberos: 10
  drs_repl: 10
  smb2: 10
  smb2_credits: 10
  dsdb_audit: 10
  dsdb_json_audit: 10
  dsdb_password_audit: 10
  dsdb_password_json_audit: 10
  dsdb_transaction_audit: 10
  dsdb_transaction_json_audit: 10
  dsdb_group_audit: 10
  dsdb_group_json_audit: 10
Using netbios name LIBERATOR.
Using workgroup WORKGROUP.
parsed path: fname='smb://' server='' share='' path='' options=''
SMBC_check_options(): server='' share='' path='' options=''
name_resolve_bcast: Attempting broadcast lookup for name __MSBROWSE__<0x1>
parse_nmb: packet id = 3302
nmb packet from 192.168.1.124(35072) header: id=3302 opcode=Query(0)
response=Yes
    header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=__MSBROWSE__<01> rr_type=32 rr_class=1 ttl=259200
    answers   0 char .....|   hex 8000C0A8017C
Got a positive name query response from 192.168.1.124 ( 192.168.1.124 )
validator failed
parse_nmb: packet id = 3302
nmb packet from 192.168.1.124(35072) header: id=3302 opcode=Query(0)
response=Yes
    header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=__MSBROWSE__<01> rr_type=32 rr_class=1 ttl=259200
    answers   0 char .....|   hex 8000C0A8017C
Got a positive name query response from 192.168.1.124 ( )
validator failed
name_status_find: looking up *#00 at 192.168.1.124
Opening cache file at /var/lib/samba/lock/gencache.tdb
tdb(/var/lib/samba/lock/gencache.tdb): tdb_open_ex: could not open file
/var/lib/samba/lock/gencache.tdb: Permission denied
gencache_init: Opening user cache file /home/nate/.cache/samba/gencache.tdb.
gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.1D.192.168.1.124]
and timeout=[Wed Dec 31 05:00:00 PM 1969 MST] (-1609262731 seconds in the past)
namecache_status_fetch: no entry for NBT/*#00.1D.192.168.1.124 found.
getlmhostsent: lmhost entry: 127.0.0.1 localhost 
parse_nmb: packet id = 31211
nmb packet from 192.168.1.124(35072) header: id=31211 opcode=Query(0)
response=Yes
    header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=*<00> rr_type=33 rr_class=1 ttl=0
    answers   0 char .LIBERATOR         hex 074C4942455241544F52202020202020
    answers  10 char ...LIBERATOR       hex 0004004C4942455241544F5220202020
    answers  20 char   ...LIBERATOR     hex 20200304004C4942455241544F522020
    answers  30 char      ....__MSBRO   hex 2020202020040001025F5F4D5342524F
    answers  40 char WSE__....WORKGRO   hex 5753455F5F02018400574F524B47524F
    answers  50 char UP      ...WORKG   hex 5550202020202020008400574F524B47
    answers  60 char ROUP      ...WOR   hex 524F55502020202020201D0400574F52
    answers  70 char KGROUP      ....   hex 4B47524F55502020202020201E840000
    answers  80 char ................   hex 00000000000000000000000000000000
    answers  90 char ................   hex 00000000000000000000000000000000
    answers  a0 char .............   hex 00000000000000000000000000
LIBERATOR#00: flags = 0x04
LIBERATOR#03: flags = 0x04
LIBERATOR#20: flags = 0x04
__MSBROWSE__#01: flags = 0x84
WORKGROUP#00: flags = 0x84
WORKGROUP#1d: flags = 0x04
WORKGROUP#1e: flags = 0x84
gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.1D.192.168.1.124]
and timeout=[Tue Dec 29 10:36:31 AM 2020 MST] (660 seconds ahead)
namecache_status_store: entry NBT/*#00.1D.192.168.1.124 -> WORKGROUP
name_status_find: name found, name WORKGROUP ip address is 192.168.1.124
internal_resolve_name: looking up WORKGROUP#1d (sitename (null))
gencache_set_data_blob: Adding cache entry with key=[NBT/WORKGROUP#1D] and
timeout=[Wed Dec 31 05:00:00 PM 1969 MST] (-1609262731 seconds in the past)
no entry for WORKGROUP#1D found.
resolve_lmhosts: Attempting lmhosts lookup for name WORKGROUP<0x1d>
getlmhostsent: lmhost entry: 127.0.0.1 localhost 
resolve_hosts: not appropriate for name type <0x1d>
name_resolve_bcast: Attempting broadcast lookup for name WORKGROUP<0x1d>
parse_nmb: packet id = 4021
nmb packet from 192.168.1.124(35072) header: id=4021 opcode=Query(0)
response=Yes
    header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=WORKGROUP<1d> rr_type=32 rr_class=1 ttl=259200
    answers   0 char .....|   hex 0000C0A8017C
Got a positive name query response from 192.168.1.124 ( 192.168.1.124 )
remove_duplicate_addrs2: looking for duplicate address/port pairs
namecache_store: storing 1 address for WORKGROUP#1d: 192.168.1.124
gencache_set_data_blob: Adding cache entry with key=[NBT/WORKGROUP#1D] and
timeout=[Tue Dec 29 10:36:31 AM 2020 MST] (660 seconds ahead)
internal_resolve_name: returning 1 addresses: 192.168.1.124:0 
found master browser WORKGROUP, 192.168.1.124
Connecting to 192.168.1.124 at port 445
Socket options:
        SO_KEEPALIVE = 0
        SO_REUSEADDR = 0
        SO_BROADCAST = 0
        TCP_NODELAY = 1
        TCP_KEEPCNT = 9
        TCP_KEEPIDLE = 7200
        TCP_KEEPINTVL = 75
        IPTOS_LOWDELAY = 0
        IPTOS_THROUGHPUT = 0
        SO_REUSEPORT = 0
        SO_SNDBUF = 2626560
        SO_RCVBUF = 131072
        SO_SNDLOWAT = 1
        SO_RCVLOWAT = 1
        SO_SNDTIMEO = 0
        SO_RCVTIMEO = 0
        TCP_QUICKACK = 1
        TCP_DEFER_ACCEPT = 0
        TCP_USER_TIMEOUT = 0
name_status_find: looking up *#00 at 192.168.1.124
gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.00.192.168.1.124]
and timeout=[Wed Dec 31 05:00:00 PM 1969 MST] (-1609262731 seconds in the past)
namecache_status_fetch: no entry for NBT/*#00.00.192.168.1.124 found.
getlmhostsent: lmhost entry: 127.0.0.1 localhost 
parse_nmb: packet id = 20268
nmb packet from 192.168.1.124(35072) header: id=20268 opcode=Query(0)
response=Yes
    header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=*<00> rr_type=33 rr_class=1 ttl=0
    answers   0 char .LIBERATOR         hex 074C4942455241544F52202020202020
    answers  10 char ...LIBERATOR       hex 0004004C4942455241544F5220202020
    answers  20 char   ...LIBERATOR     hex 20200304004C4942455241544F522020
    answers  30 char      ....__MSBRO   hex 2020202020040001025F5F4D5342524F
    answers  40 char WSE__....WORKGRO   hex 5753455F5F02018400574F524B47524F
    answers  50 char UP      ...WORKG   hex 5550202020202020008400574F524B47
    answers  60 char ROUP      ...WOR   hex 524F55502020202020201D0400574F52
    answers  70 char KGROUP      ....   hex 4B47524F55502020202020201E840000
    answers  80 char ................   hex 00000000000000000000000000000000
    answers  90 char ................   hex 00000000000000000000000000000000
    answers  a0 char .............   hex 00000000000000000000000000
LIBERATOR#00: flags = 0x04
LIBERATOR#03: flags = 0x04
LIBERATOR#20: flags = 0x04
__MSBROWSE__#01: flags = 0x84
WORKGROUP#00: flags = 0x84
WORKGROUP#1d: flags = 0x04
WORKGROUP#1e: flags = 0x84
gencache_set_data_blob: Adding cache entry with key=[NBT/*#00.00.192.168.1.124]
and timeout=[Tue Dec 29 10:36:31 AM 2020 MST] (660 seconds ahead)
namecache_status_store: entry NBT/*#00.00.192.168.1.124 -> LIBERATOR
name_status_find: name found, name LIBERATOR ip address is 192.168.1.124
Connecting to 192.168.1.124 at port 445
Socket options:
        SO_KEEPALIVE = 0
        SO_REUSEADDR = 0
        SO_BROADCAST = 0
        TCP_NODELAY = 1
        TCP_KEEPCNT = 9
        TCP_KEEPIDLE = 7200
        TCP_KEEPINTVL = 75
        IPTOS_LOWDELAY = 0
        IPTOS_THROUGHPUT = 0
        SO_REUSEPORT = 0
        SO_SNDBUF = 2626560
        SO_RCVBUF = 131072
        SO_SNDLOWAT = 1
        SO_RCVLOWAT = 1
        SO_SNDTIMEO = 0
        SO_RCVTIMEO = 0
        TCP_QUICKACK = 1
        TCP_DEFER_ACCEPT = 0
        TCP_USER_TIMEOUT = 0

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to