Until recently, my 3 main computers could all “see” each other over my home network:
Excalibur (dsktp. PC, Manjaro Linux)
Square Rigger (dsktp. PC, Manjaro Linux)
Ketch (notebook, MS Win 10)
However, about two weeks ago, Square Rigger became invisible to the other two computers, though they are visible to it.
By “Visible”, I mean that each computer could access specifically-shared directories on the other two. This was accomplished by Samba sharing (outbound) and CIFS mounting on lines in “/etc/fstab” (inbound).
But about two weeks ago, attempts to mount Square Rigger’s shared directories in Excalibur – say, “sudo mount /home/aragorn/net/SR/Lothlorien” – suddenly starting producing “mount error(13): Permission denied” errors. Whereas doing the opposite – getting on Square Rigger and doing “sudo mount /home/aragorn/net/EX/Celephais” – works fine.
So I did “sudo systemctl status smb.service” on both computers, with drastically different results:
I don’t see why not. Saves a lot of time, prevents typos, and preserves formatting, colors, non-text markings, etc.
Yes. But the real questions are “Why?” (something to do with that “unknown PAM error”?) and “What can be done about it?”.
That’s the first thing I thought, but no, that isn’t it. I made sure that OS user “aragorn” and Samba user “aragorn” both have the same password on both machines. And, passwords have not changed, and yet Square-Rigger stopped accepting incoming connections about 2 weeks ago. So it’s apparently not a password issue. Something else is going on, but I can’t tell what.
I just went through a similar issue adding a brand new Manjaro machine to my home network. I had the “smb_pam_account: PAM: UNKNOWN PAM ERROR (9)…” errors and it was super frustrating. I used the AppArmor commands I got from one of @linux-aarhus guides.
I’d be curious to know if that fixes your situation.
It’s true that a 177kB pic uses same space as a 30k-word novella. But considering that most drives these days are over 1,000,000,000kB, the importance of that fact is somewhat diluted.
Doesn’t capture interesting non-text tidbits.
Good point. Touché. Ok, I’ll try to limit use of pics when text will work.
Lemme check… yep, installed and loaded. However, it’s also installed and loaded on my main computer, but it doesn’t have this problem. Let me check some configuration files…
Oops, I can’t check any configuration files, even as root! What the devil??? What’s up with permissions on “/etc”??? Lemme do “la -al” on “/”… Ewww… what the heck is up with this mess???
Wow, lots of errors there! Even root is prohibited from reading “etc”, “lost+found”, “media”, “mnt”, “opt”, “root”, “share”. And “media” and “share” aren’t even supposed to be there!
Ok, I fixed the permissions errors (with many uses of “sudo chmod 0755 xxxxx”). I moved “media” back inside “/run” where it belongs. And “share” turned out to contain only an old 5.15 Linux kernel ISO file from 2022 so I just erased that. Let me restart system…
Ok, on restart, problem is fixed! Excalibur (my main computer) can now access shares on Square-Rigger (the computer that was having the sharing problems).
As for how the permissions got screwed-up, I have no clue. That’s not something I would do. And I don’t think the OS would do that. And most software doesn’t have permission to do that because the affected directories are owned by root. So apparently some piece of software with elevated permissions did it. Who when how where why, I have no idea; colour me puzzled. But for now it’s fixed. Hopefully this was a one-time fluke.
Yep. I’ve been using “aragorn” as my main user name on Linux computers since Jan 2022 (shortly before joining this forum).
Yep. “media” somehow got plucked out of “/run” and dumped into “/”. I’ll have to research where that “.config” came from; looks like it, too, got “plucked” from somewhere and dumped in “/”. The “share” just had one (old, unnecessary) file, so I just erased it. (Fortunately, “/usr/share” is intact, so that’s not where it was “plucked” from.) I dunno how those directories got “plucked”; puzzling.
Possibly. Whether that was the case here or not, one take-away is, when performing maintenance needing elevated privileges, navigate as far down the file-system tree as possible before issuing commands, to localize possible damage. Bad: navigate to “/” and do “sudo command /apple/orange/pear/tangerine”. Good: navigate to “/apple/orange/pear” and do “sudo command tangerine”.