Thanks Chuck, I had a chance this evening to test with the Hardy alpha 4
live CD and indeed, I no longer see the kernel oops. The kernel oops I
used to get is below.

So the workaround mentioned in the Debian bug report now works. Changing
my /etc/auto.smb as follows enables me to connect to my Ubuntu Samba
server with autofs:


--- /etc/auto.smb       2007/03/29 15:27:45     1.1
+++ /etc/auto.smb       2008/01/18 16:08:28
@@ -24,6 +24,7 @@
        mountopts="$mountopts,credentials=$credfile"
        smbopts="-A $credfile"
 else
+       mountopts="$mountopts,sec=none"
        smbopts="-N"
 fi
  


So "mount.smb -o guest" works:


ket% sudo mount.smb //mog.local/share /mnt -o guest
Anonymous login successful
ket%


- but "mount.cifs -o guest" does not work:


ket% sudo mount.cifs //mog.local/share /mnt -o guest
mount error 13 = Permission denied
Refer to the mount.cifs(8) manual page (e.g.man mount.cifs)
ket%


- but "mount.cifs -o sec=none" does work:


ket% sudo mount.cifs //mog.local/share /mnt -o sec=none
ket% ls /mnt
Movies MythVideo
ket%


So, *should* "mount.cifs -o guest" work like "mount.smb -o guest", or should 
/etc/auto.smb use "sec=none"?

Much thanks for all your help with this issue Chuck, Jack


Jan 18 09:44:16 ket kernel:  CIFS VFS: Send error in SessSetup = -13
Jan 18 09:44:16 ket kernel:  CIFS VFS: cifs_mount failed w/return code =
-13
Jan 18 09:44:27 ket kernel:  CIFS VFS: Send error in SessSetup = -13
Jan 18 09:44:27 ket kernel:  CIFS VFS: cifs_mount failed w/return code =
-13
Jan 18 09:46:23 ket kernel: BUG: unable to handle kernel NULL pointer
dereference at virtual address 00000000
Jan 18 09:46:23 ket automount[4818]: mount(generic): failed to
mount //mog.local/print (type cifs) on /smb/mog.local/print
Jan 18 09:46:23 ket kernel:  printing eip:
Jan 18 09:46:23 ket kernel: f8f48183
Jan 18 09:46:23 ket kernel: *pde = 00000000
Jan 18 09:46:23 ket kernel: Oops: 0000 [#1]
Jan 18 09:46:23 ket kernel: SMP 
Jan 18 09:46:23 ket kernel: Modules linked in: nls_iso8859_1 cifs i915
drm rfcomm l2cap bluetooth ppdev parport_pc lp parport button ac battery
autofs4 ipv6 acpi_cpufreq cpufreq_conservative cpufreq_powersave
cpufreq_stats cpufreq_userspace cpufreq_ondemand freq_table fuse
firewire_sbp2 loop joydev tsdev snd_hda_intel pcmcia snd_pcm_oss
snd_mixer_oss snd_pcm sdhci ipw3945 snd_timer mmc_core ieee80211
ieee80211_crypt yenta_socket rsrc_nonstatic pcmcia_core rtc snd iTCO_wdt
firmware_class i2c_i801 i2c_core soundcore snd_page_alloc psmouse
serio_raw intel_agp agpgart evdev ext3 jbd mbcache dm_mirror dm_snapshot
dm_mod sg sr_mod sd_mod cdrom 8139cp ata_piix ata_generic libata
scsi_mod firewire_ohci firewire_core crc_itu_t 8139too mii ehci_hcd
generic ide_core uhci_hcd usbcore thermal processor fan
Jan 18 09:46:23 ket kernel: CPU:    0
Jan 18 09:46:23 ket kernel: EIP:    0060:[<f8f48183>]    Not tainted VLI
Jan 18 09:46:23 ket kernel: EFLAGS: 00010212   (2.6.22-3-686 #1)
Jan 18 09:46:23 ket kernel: EIP is at cifs_find_tcp_session+0x77/0xc0
[cifs]
Jan 18 09:46:23 ket kernel: eax: c747dd00   ebx: 00000000   ecx:
0000001f   edx: c747dd7c
Jan 18 09:46:23 ket kernel: esi: f688c569   edi: 00000000   ebp:
f688c500   esp: c747dca4
Jan 18 09:46:23 ket kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033
ss: 0068
Jan 18 09:46:23 ket kernel: Process mount.cifs (pid: 4823, ti=c747c000
task=d5d1fa90 task.ti=c747c000)
Jan 18 09:46:23 ket kernel: Stack: 00000000 c747dd7c f688c500 00000002
c7a2103d f8f5f7b1 00000003 f8f4a161 
Jan 18 09:46:23 ket kernel:        c747dd90 c747dd44 00000011 31f9ed23
f72f3dd4 00001000 eebdf7c0 ee8c0200 
Jan 18 09:46:23 ket automount[4818]: mount(generic): failed to
mount //mog.local/share (type cifs) on /smb/mog.local/share
Jan 18 09:46:23 ket kernel:        0000000d 00000000 c0178ae5 00000000
00000000 00000000 f69aaa80 c7a21019 
Jan 18 09:46:23 ket kernel: Call Trace:
Jan 18 09:46:23 ket kernel:  [<f8f4a161>] cifs_mount+0x1641/0x20ac
[cifs]
Jan 18 09:46:23 ket kernel:  [<c0178ae5>] __d_lookup+0x96/0xd9
Jan 18 09:46:23 ket kernel:  [<c01cc934>] idr_get_new+0xa/0x26
Jan 18 09:46:23 ket kernel:  [<c017b93d>] get_filesystem+0xf/0x29
Jan 18 09:46:23 ket kernel:  [<f8f3e610>] cifs_get_sb+0xa2/0x18f [cifs]
Jan 18 09:46:23 ket kernel:  [<c017c8e3>] alloc_vfsmnt+0x8d/0xb4
Jan 18 09:46:23 ket kernel:  [<c016b8f0>] vfs_kern_mount+0x83/0xf6
Jan 18 09:46:23 ket kernel:  [<c016b9af>] do_kern_mount+0x37/0xc7
Jan 18 09:46:23 ket kernel:  [<c017d379>] do_mount+0x627/0x69a
Jan 18 09:46:23 ket kernel:  [<f8985b08>] do_get_write_access
+0x430/0x45d [jbd]
Jan 18 09:46:23 ket kernel:  [<c014ee8b>] find_get_page+0x18/0x48
Jan 18 09:46:23 ket kernel:  [<c0151116>] filemap_nopage+0x184/0x295
Jan 18 09:46:23 ket kernel:  [<c015ade9>] __handle_mm_fault+0x305/0x955
Jan 18 09:46:23 ket kernel:  [<c015ae24>] __handle_mm_fault+0x340/0x955
Jan 18 09:46:23 ket kernel:  [<c017bed2>] copy_mount_options+0x90/0x109
Jan 18 09:46:23 ket kernel:  [<c01316db>] search_exception_tables
+0x14/0x25
Jan 18 09:46:23 ket kernel:  [<c0152f83>] __alloc_pages+0x52/0x294
Jan 18 09:46:23 ket kernel:  [<c02a51fa>] error_code+0x72/0x78
Jan 18 09:46:23 ket kernel:  [<c017be68>] copy_mount_options+0x26/0x109
Jan 18 09:46:23 ket kernel:  [<c017d463>] sys_mount+0x77/0xb3
Jan 18 09:46:23 ket kernel:  [<c0103d0e>] sysenter_past_esp+0x6b/0xa1
Jan 18 09:46:23 ket kernel:  [<c02a0000>] atm_dev_ioctl+0x4b5/0x567
Jan 18 09:46:23 ket kernel:  =======================
Jan 18 09:46:23 ket kernel: Code: 00 74 44 8b 14 24 8d 46 3c b9 10 00 00
00 e8 c3 6d 28 c7 85 c0 74 30 8b 44 24 20 b9 20 00 00 00 89 df 89 30 8d
75 68 49 78 08 ac <ae> 75 08 84 c0 75 f5 31 c0 eb 04 19 c0 0c 01 85 c0
75 09 f0 ff 
Jan 18 09:46:23 ket kernel: EIP: [<f8f48183>] cifs_find_tcp_session
+0x77/0xc0 [cifs] SS:ESP 0068:c747dca4
Jan 18 09:46:23 ket kernel: BUG: unable to handle kernel NULL pointer
dereference at virtual address 00000000
Jan 18 09:46:23 ket kernel:  printing eip:
Jan 18 09:46:23 ket kernel: f8f48183
Jan 18 09:46:23 ket kernel: *pde = 00000000
Jan 18 09:46:23 ket kernel: Oops: 0000 [#2]
Jan 18 09:46:23 ket kernel: SMP 
Jan 18 09:46:23 ket kernel: Modules linked in: nls_iso8859_1 cifs i915
drm rfcomm l2cap bluetooth ppdev parport_pc lp parport button ac battery
autofs4 ipv6 acpi_cpufreq cpufreq_conservative cpufreq_powersave
cpufreq_stats cpufreq_userspace cpufreq_ondemand freq_table fuse
firewire_sbp2 loop joydev tsdev snd_hda_intel pcmcia snd_pcm_oss
snd_mixer_oss snd_pcm sdhci ipw3945 snd_timer mmc_core ieee80211
ieee80211_crypt yenta_socket rsrc_nonstatic pcmcia_core rtc snd iTCO_wdt
firmware_class i2c_i801 i2c_core soundcore snd_page_alloc psmouse
serio_raw intel_agp agpgart evdev ext3 jbd mbcache dm_mirror dm_snapshot
dm_mod sg sr_mod sd_mod cdrom 8139cp ata_piix ata_generic libata
scsi_mod firewire_ohci firewire_core crc_itu_t 8139too mii ehci_hcd
generic ide_core uhci_hcd usbcore thermal processor fan
Jan 18 09:46:23 ket kernel: CPU:    0
Jan 18 09:46:23 ket kernel: EIP:    0060:[<f8f48183>]    Not tainted VLI
Jan 18 09:46:23 ket kernel: EFLAGS: 00010212   (2.6.22-3-686 #1)
Jan 18 09:46:23 ket kernel: EIP is at cifs_find_tcp_session+0x77/0xc0
[cifs]
Jan 18 09:46:23 ket kernel: eax: c7a35d00   ebx: 00000000   ecx:
0000001f   edx: c7a35d7c
Jan 18 09:46:23 ket kernel: esi: f688c569   edi: 00000000   ebp:
f688c500   esp: c7a35ca4
Jan 18 09:46:23 ket kernel: ds: 007b   es: 007b   fs: 00d8  gs: 0033
ss: 0068
Jan 18 09:46:23 ket kernel: Process mount.cifs (pid: 4828, ti=c7a34000
task=ef220a90 task.ti=c7a34000)
Jan 18 09:46:23 ket kernel: Stack: 00000000 c7a35d7c f688c500 00000002
c7a0903d f8f5f7b1 00000003 f8f4a161 
Jan 18 09:46:23 ket kernel:        c7a35d90 c7a35d44 00000492 c0326700
000000d0 00000001 ee034ac0 ecc2a200 
Jan 18 09:46:23 ket kernel:        0000000e 00000044 00000001 00000000
00000000 00000000 f61a3b40 c7a09019 
Jan 18 09:46:23 ket kernel: Call Trace:
Jan 18 09:46:23 ket kernel:  [<f8f4a161>] cifs_mount+0x1641/0x20ac
[cifs]
Jan 18 09:46:23 ket kernel:  [<c01cc934>] idr_get_new+0xa/0x26
Jan 18 09:46:23 ket kernel:  [<c017b93d>] get_filesystem+0xf/0x29
Jan 18 09:46:23 ket kernel:  [<f8f3e610>] cifs_get_sb+0xa2/0x18f [cifs]
Jan 18 09:46:23 ket kernel:  [<c017c8e3>] alloc_vfsmnt+0x8d/0xb4
Jan 18 09:46:23 ket kernel:  [<c016b8f0>] vfs_kern_mount+0x83/0xf6
Jan 18 09:46:23 ket kernel:  [<c016b9af>] do_kern_mount+0x37/0xc7
Jan 18 09:46:23 ket kernel:  [<c017d379>] do_mount+0x627/0x69a
Jan 18 09:46:23 ket kernel:  [<c011d458>] task_running_tick+0x11c/0x230
Jan 18 09:46:23 ket kernel:  [<c011fd75>] scheduler_tick+0x6d/0x188
Jan 18 09:46:23 ket kernel:  [<c013720b>] getnstimeofday+0x30/0xb9
Jan 18 09:46:23 ket kernel:  [<c01157af>] lapic_next_event+0xc/0x10
Jan 18 09:46:23 ket kernel:  [<c013905e>] clockevents_program_event
+0x9c/0xa3
Jan 18 09:46:23 ket kernel:  [<c01cb275>] cfq_idle_slice_timer+0x11/0x68
Jan 18 09:46:23 ket kernel:  [<c012a555>] run_timer_softirq+0x14c/0x189
Jan 18 09:46:23 ket kernel:  [<c01cb264>] cfq_idle_slice_timer+0x0/0x68
Jan 18 09:46:23 ket kernel:  [<c0131202>] __rcu_process_callbacks
+0xd8/0x173
Jan 18 09:46:23 ket kernel:  [<c012786a>] tasklet_action+0x58/0xb8
Jan 18 09:46:23 ket kernel:  [<c0127716>] irq_exit+0x53/0x6b
Jan 18 09:46:23 ket kernel:  [<c0115cc7>] smp_apic_timer_interrupt
+0x71/0x7d
Jan 18 09:46:23 ket kernel:  [<c0152f83>] __alloc_pages+0x52/0x294
Jan 18 09:46:23 ket kernel:  [<c0104830>] apic_timer_interrupt+0x28/0x30
Jan 18 09:46:23 ket kernel:  [<c017bece>] copy_mount_options+0x8c/0x109
Jan 18 09:46:23 ket kernel:  [<c017d463>] sys_mount+0x77/0xb3
Jan 18 09:46:23 ket kernel:  [<c0103d0e>] sysenter_past_esp+0x6b/0xa1
Jan 18 09:46:23 ket kernel:  [<c02a0000>] atm_dev_ioctl+0x4b5/0x567
Jan 18 09:46:23 ket kernel:  =======================
Jan 18 09:46:23 ket kernel: Code: 00 74 44 8b 14 24 8d 46 3c b9 10 00 00
00 e8 c3 6d 28 c7 85 c0 74 30 8b 44 24 20 b9 20 00 00 00 89 df 89 30 8d
75 68 49 78 08 ac <ae> 75 08 84 c0 75 f5 31 c0 eb 04 19 c0 0c 01 85 c0
75 09 f0 ff 
Jan 18 09:46:23 ket kernel: EIP: [<f8f48183>] cifs_find_tcp_session
+0x77/0xc0 [cifs] SS:ESP 0068:c7a35ca4

-- 
cifs doesn't support connecting as guest
https://bugs.launchpad.net/bugs/98658
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to