Zoki, the files came from an NTFS disk that I used under Linux, it never saw a Windows machine. But regardless, you are right, none of the files should be executable. Good catch! Thank you.
Posts by JackElliott
-
-
Thank you.
For ACL I find on the drive's root:
Code$ getfacl /srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43 getfacl: Removing leading '/' from absolute path names # file: srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43 # owner: root # group: root user::rwx group::r-x other::r-x
For the shared folder I find:
Code
Display More$ getfacl /srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43/BMP getfacl: Removing leading '/' from absolute path names # file: srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43/BMP # owner: root # group: users # flags: -s- user::rwx user:jack:r-x group::rwx mask::rwx other::rwx default:user::rwx
I'm not used to dealing with ACLs. I see "-s-" in the "flags" line. Set SETUID is set, deeper reading than I have time for right now.
Code$ sudo setfacl -b -R /srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43 [sudo] password for jack: $ client_loop: send disconnect: Connection reset
I got kicked off. So ssh back in and,
Nothing has changed, so I'm not quite sure what, if anything, setfacl did. Moving on,
Code$ sudo chmod -R 775 /srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43/BMP $ ls -la /srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43/BMP total 2112704
Then,
Code
Display More$ ls -la /srv/dev-disk-by-uuid-1d4d5a04-39e8-4c30-8518-15271f3d1f43/BMP total 2112704 drwxrwsr-x 12 root users 4096 Nov 27 13:06 . drwxrwxr-x 4 root root 4096 Nov 26 11:31 .. drwxrwsr-x 7 root users 4096 Nov 26 16:16 '00 KPOV' drwxrwsr-x 28 root users 4096 Nov 26 16:16 0_Household drwxrwsr-x 4 root users 4096 Nov 26 16:16 Audio_Tools drwxrwsr-x 160 root users 12288 Nov 27 01:23 Classics drwxrwsr-x 4 root users 4096 Nov 27 01:23 DS_Homes_Backup -rwxrwxr-x 1 root users 794 Nov 27 03:24 'Desktop - Shortcut.lnk' -rwxrwxr-x 1 jack users 1188515 Jul 29 14:30 'KPOV FB TSC masked and stickered.png' drwxrwsr-x 70 root users 4096 Nov 27 04:25 LinXPS_Home_Jack drwxrwsr-x 8 root users 4096 Nov 27 04:36 'My Books' drwxrwsr-x 7 root users 4096 Nov 27 04:39 'Plex Media' drwxrwsr-x 2 root users 4096 Nov 27 04:39 'System Volume Information' drwxrwsr-x 14 root users 4096 Nov 27 04:40 'VST Plugins' -rwxrwxr-x 1 root users 315 Nov 27 04:40 inMotrion.xgeq -rwxrwxr-x 1 root users 2162147328 Nov 27 04:43 linuxmint-20.2-cinnamon-64bit.iso -rwxrwxr-x 1 root users 0 Nov 27 13:06 temp $
Well, do I now have write permissions as non-sudo/root? Let's test:
Code$ touch temp2 $ ls '00 KPOV' DS_Homes_Backup 'My Books' inMotrion.xgeq 0_Household 'Desktop - Shortcut.lnk' 'Plex Media' linuxmint-20.2-cinnamon-64bit.iso Audio_Tools 'KPOV FB TSC masked and stickered.png' 'System Volume Information' temp Classics LinXPS_Home_Jack 'VST Plugins' temp2 $
Couldn't do that before without sudo, AND it works from within Windows File Explorer: I can now copy/paste to the share.
I think you folk have cracked the case here.
I canse anyone is wondering how I got myself into this pickle, I let OMV wipe, mount a new disk, and copied all my files from an NTFS disk (created on a Linux machine) temporarily mounted on /media to the OMV share with cp -R
Probably not the cleanest way to do it, but I'm no wizard at these things.
Thank you!
(How do I mark this as "solved"?)
-
Thank you everyone, I'm the OP.
There's been a bit of discussion about the best way to solve my little problem while I was away, and I cannot tell whether a concensus was reached?
My goal:
I want any member of the group "users" to have rwx permisions on all files and folders.
Root can own everything, that's okay by me.
I don't need ACL.
-
Thank you -- here is what I see:
The root folder is bmp, it is the shared folder
Code$ ls -la total 44 drwxr-xr-x 4 root root 4096 Nov 26 11:31 . drwxr-xr-x 6 root root 4096 Nov 26 11:19 .. drwxrwsrwx+ 12 root users 4096 Nov 27 13:06 BMP -rw------- 1 root root 6144 Nov 26 11:20 aquota.group -rw------- 1 root root 7168 Nov 26 11:20 aquota.user drwx------ 2 root root 16384 Nov 26 11:06 lost+found
Dipping down into /bmp is this:
Code
Display More$ ls -la total 2112704 drwxrwsrwx+ 12 root users 4096 Nov 27 13:06 . drwxr-xr-x 4 root root 4096 Nov 26 11:31 .. drwxr-sr-x 7 root users 4096 Nov 26 16:16 '00 KPOV' drwxr-sr-x 28 root users 4096 Nov 26 16:16 0_Household drwxr-sr-x 4 root users 4096 Nov 26 16:16 Audio_Tools drwxr-sr-x 160 root users 12288 Nov 27 01:23 Classics drwxr-sr-x 4 root users 4096 Nov 27 01:23 DS_Homes_Backup -rwxr-xr-x 1 root users 794 Nov 27 03:24 'Desktop - Shortcut.lnk' -rw-rw-r-- 1 jack users 1188515 Jul 29 14:30 'KPOV FB TSC masked and stickered.png' drwxr-sr-x 70 root users 4096 Nov 27 04:25 LinXPS_Home_Jack drwxr-sr-x 8 root users 4096 Nov 27 04:36 'My Books' drwxr-sr-x 7 root users 4096 Nov 27 04:39 'Plex Media' drwxr-sr-x 2 root users 4096 Nov 27 04:39 'System Volume Information' drwxr-sr-x 14 root users 4096 Nov 27 04:40 'VST Plugins' -rwxr-xr-x 1 root users 315 Nov 27 04:40 inMotrion.xgeq -rwxr-xr-x 1 root users 2162147328 Nov 27 04:43 linuxmint-20.2-cinnamon-64bit.iso -rw-rw-rw-+ 1 root users 0 Nov 27 13:06 temp
"temp" (above) is the file I tried to write as user "jack" then had to sudo to do it. See my OP.
Thank you for looking at this.
-
This is a new OMV installation that I built following this guide: https://wiki.omv-extras.org/do…talling_omv5_raspberry_pi
I am experiencing a problem where I cannot write to the shared folder (or subfolders) from Windows 10 File Explorer from ssh'd Terminal as my username.
From Terminal I see this:
Code$ touch temp touch: cannot touch 'temp': Permission denied $ sudo touch temp [sudo] password for jack: $
My OMV user "jack" is a member of Groups _crony, adm, root, ssh, sudo and users.
The same problem when attempting to write using Windows File Explorer. I mapped my drive Z: to the OMV shared folder, and connected using my OMV username ("jack") and password. But cannot write.
How can I set the OMV permissions for the shared folder and subfolders to gain read/write priviledges for any member of the Group users?
Let me know if you need screenshots or whatever. Thank you!
-
Ah -- a sticky that I suppose I should have taken the trouble to look for before posting my question. Thank you!
-
Hi chente, you're a hero. Closing, reopening the page didn't help, reloading the page didn't help, but clearing the cache and reopening the page worked like a champ. Thank you!
Any idea about what happened?
-
Hi, I just installed OMV on a Raspberry Pi 3B+ and configured it with shared drives and it was working beautifully. I closed the WebGUI browser window (doing a little housekeeping) and reopened it and all I see is a sky-blue background. I had an open ssh connection and it was fine, so I used it to reboot the OMV and after it rebooted it came up again with a plain sky-blue background. I reconnected with ssh and from the terminal it doesn't look like there is any problem. The network shares are available, just no way to get to the WebGUI Dashboard. I'm stumped.
-
A followup: I followed the official guide and all went well. Thanks for pointing me to it.
-
Thank you, Macom. I'll start from scratch with the official guide you posted the link to. If the problem persists I'll pop back here.
-
Hi,
Raspberry Pi 3+B, OMV 6.0.4-2 (Shaitan), Linux 5.10.63-v7+, single HDD: WD My Passport 25E2
I just installed OMV per the instructions here: https://www.techradar.com/how-…-raspberry-pi-nas-1315968 and the installation went in smooth as silk.
I can log into my user share in File Explorer on my Windows 10 laptop. There's nothing to see because there are no files or folders on the HDD yet. But I can't put any there (copy/paste), it seems to be acting read-only. There is a shared folder on the HDD, and my user permissions under User Management > Users > Privileges are read/write, read-only, no access (in that order, left-to-right), and my Group memberships are openmediavault, sudo, users.
How can I get write privileges?
Thank you.
-
Thank you. 'sudo su' did the trick. Returned with no error. I'll see if the original error pops up again and will advise. Again, thanks.
-
Code
$ sudo echo 'exit 0' >> /etc/cron.daily/monitor-raspi-health -dash: 44: cannot create /etc/cron.daily/monitor-raspi-health: Permission denied $ ls -l /etc/cron.daily/monitor-raspi-health -rwxr-xr-x 1 root staff 273 Jul 14 04:32 /etc/cron.daily/monitor-raspi-health
Code$ cat /etc/cron.daily/monitor-raspi-health #!/bin/bash export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin sleep 10 Health=$(perl -e "printf \"%19b\n\", $(vcgencmd get_throttled | cut -f2 -d=)") grep -q 1 <<<${Health} && echo -e "$(date)\t$(printf "%019d" ${Health})" >>/var/log/raspihealth.log
-
All right then -- it's true, the enclosures are so old that the manufacturing date codes are in Roman numerals.
I'll track down some new ones. Many thanks for taking a look at this.
-
To be clear, all three of the USB HDDs are self-powered.
-
Indeed, my apologies. Yes, a Raspberry Pi; yes, we are talking about USB-attached drives; and yes there exists sda and sdb. Scary that I didn't think to provide that information, or a scary configuration?
Anyway, thank you for persevering. In response to your suggestions:
Code$ sudo armbianmonitor -u [sudo] password for jack: /var/log/armhwinfo.log has been uploaded to http://sprunge.us/cCKe Please post the URL in the Armbian forum where you've been asked for.
For your suggested smartctl loop, the forum isn't letting me post the output, "the message is too long, must be under 10,000 characters". This from posting the output into a Code box. Can I p-mail the output to you?PS. Apology for the double-post of the original post. I received a "fatal error" message in the browser from the forum when I first posted the topic. And it didn't appear, so I re-posted. Received the fatal error msg again, shrugged and crossed fingers.
-
"I'm getting this emailed alert:
Code
Display MoreThis message was generated by the smartd daemon running on: host name: serverpi DNS domain: [Empty] The following warning/error was logged by the smartd daemon: Device: /dev/disk/by-id/ata-ST31000528AS_5VP1PP7T [SAT], not capable of SMART self-check Device info: ST31000528AS, S/N:5VP1PP7T, WWN:5-000c50-01bbf743c, FW:CC44, 1.00 TB
In the webgui, under Storage > S.M.A.R.T. > Devices, dev/sdc has a red dot in its Status column.
The Information > Attributes tab for that device shows "Raw_Read_Error_Rate," and "Seek_Error_Rate," and "Spin_Retry_Count" all with green Status dots, "Reallocated_Sector_Ct" with a red status dot, and all of the other attributes are grayed out.
So it appears that at least some SMART attributes are being monitored (should I be worried about the Reallocated_Sector_Ct status?).
The Self-Test Logs show only "Completed without error" statuses. I can't read all the data in the log because there doesn't appear to be a way to make some of the columns labeled "Rem..." and "Life..." wide enough to read the full strings.
So . . . what's going on? Is SMART working or not? The Extended Information says "SMART support is: Available - device has SMART capability.
SMART support is: Enabled."So I don't know why I am getting an email saying the drive doesn't support SMART, and I am wondering whether the drive is failing.
Any insight would be appreciated! Thank you.
-
-
I get this, too. Can't find documentation online for monitor-raspi-health. Is a return code of 1 a good thing?
-
A share on that drive is referenced somewhere. You need to go through all the pages of the OMV user interface and remove any references to shares on that drive. Then you can remove the shares. Once all shares on that drive are removed, you can unmount the drive.
Ah-ha. There it was under Services > SMB/CIFS.
Thank you.
cabrio_leo: You have options on that page that I don't.