On Thu, Nov 8, 2012 at 11:54 AM, Jerome Yanga <jerome.ya...@gmail.com> wrote:
> The anonuid/anongid are valid UID/GID.
>
> The nohide option didn't work.
>
> Here is the logs from /var/log/messages of the Fedora machine while
> the AIX machine performed a "ls".
>
> Nov  8 09:44:31 fedora1 kernel: [515749.246015] device em1 entered
> promiscuous mode
> Nov  8 09:44:34 fedora1 rpc.mountd[28150]: authenticated mount request
> from 10.49.6.40:784 for /data (/data)
> Nov  8 09:44:34 fedora1 rpc.mountd[28150]: authenticated mount request
> from 10.49.6.40:789 for /data (/data)
> Nov  8 09:44:34 fedora1 rpc.mountd[28150]: authenticated mount request
> from 10.49.6.40:794 for /data (/data)
> Nov  8 09:44:37 fedora1 kernel: [515755.643377] device em1 left promiscuous 
> mode
>
> Here is the error I found from the network trace.
>
> 344     3.088711        10.10.10.1      10.10.10.2      NFS     102     V3 
> FSINFO Reply (Call In
> 343) Error:NFS3ERR_PERM
>
> Regards,
> j

the root user on the aix system will get mapped to the anonuid/gid
does that uid/gid have permissions to see files on the exported
device?

Have you tried no_root_squash on the export for the linux machine?
that will make root on aix == to root on linux and is mostly used when
the same admin group admins the set of machines and all can be equally
trusted.
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to