The Samba-Bugzilla – Attachment 11055 Details for
Bug 11274
samba_tevent: EPOLL_CTL_DEL EBADF from smbc_stat
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log for a successful attempt
log-success.txt (text/plain), 15.31 KB, created by
Ross Lagerwall
on 2015-05-13 21:43:31 UTC
(
hide
)
Description:
log for a successful attempt
Filename:
MIME Type:
Creator:
Ross Lagerwall
Created:
2015-05-13 21:43:31 UTC
Size:
15.31 KB
patch
obsolete
>Queued new job 0x19a91e0 (GVfsJobMount) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 >Using netbios name USERNAMEPC. >Using workgroup WORKGROUP. >### SMB: do_mount - URI = smb://pc/share >### SMB: do_mount - try #0 >smbc_stat(smb://pc/share) >### SMB: auth_callback - kerberos pass >### SMB: auth_callback - out: last_user = 'USERNAME', last_domain = 'WORKGROUP' >SMBC_server: server_n=[pc] server=[pc] > -> server_n=[pc] server=[pc] >Opening cache file at /var/cache/samba/gencache.tdb >tdb(/var/cache/samba/gencache.tdb): tdb_open_ex: could not open file /var/cache/samba/gencache.tdb: Permission denied >gencache_init: Opening cache file /var/cache/samba/gencache.tdb read-only. >Opening cache file at /var/run/samba/gencache_notrans.tdb >sitename_fetch: No stored sitename for >internal_resolve_name: looking up pc#20 (sitename (null)) >no entry for pc#20 found. >resolve_lmhosts: Attempting lmhosts lookup for name pc<0x20> >resolve_lmhosts: Attempting lmhosts lookup for name pc<0x20> >startlmhosts: Can't open lmhosts file /etc/samba/lmhosts. Error was No such file or directory >resolve_wins: WINS server resolution selected and no WINS servers listed. >resolve_hosts: Attempting host lookup for name pc<0x20> >resolve_hosts: getaddrinfo failed for name pc [Name or service not known] >name_resolve_bcast: Attempting broadcast lookup for name pc<0x20> >bind succeeded on port 0 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 1 > SO_BROADCAST = 1 > Could not test socket option TCP_NODELAY. > Could not test socket option TCP_KEEPCNT. > Could not test socket option TCP_KEEPIDLE. > Could not test socket option TCP_KEEPINTVL. > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 212992 > SO_RCVBUF = 212992 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > Could not test socket option TCP_QUICKACK. > Could not test socket option TCP_DEFER_ACCEPT. >parse_nmb: packet id = 14196 >nmb packet from 192.168.1.15(35072) header: id=14196 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=PC<20> rr_type=32 rr_class=1 ttl=259200 > answers 0 char ...... hex 0000C0A8010F >Got a positive name query response from 192.168.1.15 ( 192.168.1.15 ) >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 1 address for pc#20: 192.168.1.15 >Adding cache entry with key=[NBT/PC#20] and timeout=[Thu May 7 05:43:56 AM 2015 CDT] (660 seconds ahead) >internal_resolve_name: returning 1 addresses: 192.168.1.15:0 >Connecting to 192.168.1.15 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 372480 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >Doing spnego session setup (blob length=74) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=not_defined_in_RFC4178@please_ignore > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0009 (9) > DomainNameMaxLen : 0x0009 (9) > DomainName : * > DomainName : 'WORKGROUP' > WorkstationLen : 0x0009 (9) > WorkstationMaxLen : 0x0009 (9) > Workstation : * > Workstation : 'USERNAMEPC' > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0004 (4) > TargetNameMaxLen : 0x0004 (4) > TargetName : * > TargetName : 'PC' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 8afe6fd56402424a > Reserved : 0000000000000000 > TargetInfoLen : 0x0020 (32) > TargetNameInfoMaxLen : 0x0020 (32) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'PC' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'PC' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'pc' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 42fdb777bf3e0b50533b7b8b9b453d298d4b56aa64c52de0 > NtChallengeResponseLen : 0x004c (76) > NtChallengeResponseMaxLen: 0x004c (76) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 76) > v2: struct NTLMv2_RESPONSE > Response : 16332b3deb9104adfbf6f7815b296139 > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Thu May 7 05:32:56 AM 2015 CDT > ChallengeFromClient : 72bd2efd8d1e8813 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'PC' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'PC' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'pc' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x0012 (18) > DomainNameMaxLen : 0x0012 (18) > DomainName : * > DomainName : 'WORKGROUP' > UserNameLen : 0x000e (14) > UserNameMaxLen : 0x000e (14) > UserName : * > UserName : 'USERNAME' > WorkstationLen : 0x0012 (18) > WorkstationMaxLen : 0x0012 (18) > Workstation : * > Workstation : 'USERNAMEPC' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 5E B3 77 D6 E8 33 87 24 73 FF 17 F9 9A 42 D1 CC ^.w..3.$ s....B.. > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >cli_init_creds: user USERNAME domain WORKGROUP > session setup ok >num_setup=1, max_setup=0, param_total=22, this_param=22, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=92, data_pad=2, data_disp=0 > tconx ok >num_setup=1, max_setup=0, param_total=2, this_param=2, max_param=0, data_total=0, this_data=0, max_data=560, param_offset=68, param_pad=0, param_disp=0, data_offset=72, data_pad=2, data_disp=0 >Case sensitive: True >Server connect ok: //pc/share: 0x7fee9000b6b0 >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=8, this_param=8, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=76, data_pad=0, data_disp=0 >### SMB: do_mount - [smb://pc/share; 0] res = 0, cancelled = 0, errno = [0] 'Success' >### SMB: do_mount - login successful >send_reply, failed: 0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 11274
:
11054
| 11055