The Samba-Bugzilla – Attachment 11277 Details for
Bug 11407
smbclient refuses access to a resource with ACL constraints
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
gvfs log
log.kerberos.txt (text/plain), 46.68 KB, created by
Dariusz Gadomski
on 2015-07-21 11:56:44 UTC
(
hide
)
Description:
gvfs log
Filename:
MIME Type:
Creator:
Dariusz Gadomski
Created:
2015-07-21 11:56:44 UTC
Size:
46.68 KB
patch
obsolete
>Added new job source 0x6ad880 (GVfsBackendTrash) >Queued new job 0x6ae020 (GVfsJobMount) >send_reply, failed: 0 >backend_dbus_handler org.gtk.vfs.Mount:CreateFileMonitor >Queued new job 0x6ae4a0 (GVfsJobCreateMonitor) >send_reply(0x6ae4a0), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:Enumerate >Queued new job 0x6ab980 (GVfsJobEnumerate) >send_reply(0x6ab980), failed=0 () >### SMB-BROWSE: g_vfs_backend_smb_browse_init: default workgroup = 'NULL' >Added new job source 0x1fd50a0 (GVfsBackendSmbBrowse) >Queued new job 0x1fd9a80 (GVfsJobMount) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 >Using netbios name VBOX-UBU. >Using workgroup WORKGROUP. >### SMB-BROWSE: do_mount - URI = smb://10.0.2.4/ >### SMB-BROWSE: do_mount - try #0 >parsed path: fname='smb://10.0.2.4/' server='10.0.2.4' share='' path='' options='' >SMBC_check_options(): server='10.0.2.4' share='' path='' options='' >### SMB-BROWSE: looking up cached server '10.0.2.4'\'IPC$', user 'WORKGROUP';'user128' >### SMB-BROWSE: returning (nil) >### SMB-BROWSE: auth_callback - anonymous pass >### SMB-BROWSE: auth_callback - out: last_user = 'user128', last_domain = 'WORKGROUP' >### SMB-BROWSE: looking up cached server '10.0.2.4'\'IPC$', user 'WORKGROUP';'user128' >### SMB-BROWSE: returning (nil) >### SMB-BROWSE: looking up cached server '10.0.2.4'\'IPC$', user 'WORKGROUP';'user128' >### SMB-BROWSE: returning (nil) >### SMB-BROWSE: auth_callback - anonymous pass >### SMB-BROWSE: auth_callback - out: last_user = 'user128', last_domain = 'WORKGROUP' >### SMB-BROWSE: looking up cached server '10.0.2.4'\'IPC$', user 'WORKGROUP';'user128' >### SMB-BROWSE: returning (nil) >SMBC_server: server_n=[10.0.2.4] server=[10.0.2.4] > -> server_n=[10.0.2.4] server=[10.0.2.4] >Connecting to 10.0.2.4 at port 139 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 372480 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >Doing spnego session setup (blob length=74) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=not_defined_in_RFC4178@please_ignore > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0009 (9) > DomainNameMaxLen : 0x0009 (9) > DomainName : * > DomainName : 'WORKGROUP' > WorkstationLen : 0x0008 (8) > WorkstationMaxLen : 0x0008 (8) > Workstation : * > Workstation : 'VBOX-UBU' > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0010 (16) > TargetNameMaxLen : 0x0010 (16) > TargetName : * > TargetName : 'VBOX-UBU' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 30f7a95d1242d024 > Reserved : 0000000000000000 > TargetInfoLen : 0x0072 (114) > TargetNameInfoMaxLen : 0x0072 (114) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0016 (22) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'example.com' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0028 (40) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'vbox-ubu.example.com' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 8aa775b1a9de18a9b5a55c2274ce204e8cf4b33d3de35b5f > NtChallengeResponseLen : 0x009e (158) > NtChallengeResponseMaxLen: 0x009e (158) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 158) > v2: struct NTLMv2_RESPONSE > Response : efd620381e4218792da6416867b8f8a5 > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : wto lip 21 13:22:53 2015 CEST > ChallengeFromClient : 7662fe9ec376f00f > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0016 (22) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'example.com' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0028 (40) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'vbox-ubu.example.com' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x0012 (18) > DomainNameMaxLen : 0x0012 (18) > DomainName : * > DomainName : 'WORKGROUP' > UserNameLen : 0x000e (14) > UserNameMaxLen : 0x000e (14) > UserName : * > UserName : 'user128' > WorkstationLen : 0x0010 (16) > WorkstationMaxLen : 0x0010 (16) > Workstation : * > Workstation : 'VBOX-UBU' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 53 81 6D 5E 43 81 B7 F6 14 FD 5F 16 05 AD C7 6C S.m^C... .._....l > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >cli_init_creds: user user128 domain WORKGROUP > session setup ok > tconx ok >IPC$ so ignore case sensitivity >### SMB-BROWSE: adding cached server '10.0.2.4'\'IPC$', user 'WORKGROUP';'user128' with data 0x7fc1400102c0 >Server connect ok: //10.0.2.4/IPC$: 0x7fc1400102c0 >Bind RPC Pipe: host 10.0.2.4 auth_type 0, auth_level 1 > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0048 (72) > auth_length : 0x0000 (0) > call_id : 0x00000001 (1) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >rpc_api_pipe: host 10.0.2.4 >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=72, this_data=72, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0 >rpc_read_send: data_to_read: 52 > r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0044 (68) > auth_length : 0x0000 (0) > call_id : 0x00000001 (1) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x000053f0 (21488) > secondary_address_size : 0x000d (13) > secondary_address : '\PIPE\srvsvc' > _pad1 : DATA_BLOB length=1 >[0000] 00 . > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : 0x0000 (0) > reason : 0x0000 (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK >rpc_api_pipe: host 10.0.2.4 returned 68 bytes. >check_bind_response: accepted! >cli_rpc_pipe_open_noauth: opened pipe \srvsvc to machine 10.0.2.4 and bound anonymously. > srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll > in: struct srvsvc_NetShareEnumAll > server_unc : * > server_unc : '10.0.2.4' > info_ctr : * > info_ctr: struct srvsvc_NetShareInfoCtr > level : 0x00000001 (1) > ctr : union srvsvc_NetShareCtr(case 1) > ctr1 : * > ctr1: struct srvsvc_NetShareCtr1 > count : 0x00000000 (0) > array : NULL > max_buffer : 0xffffffff (4294967295) > resume_handle : * > resume_handle : 0x00000000 (0) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0018 (24) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000044 (68) > context_id : 0x0000 (0) > opnum : 0x000f (15) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > _pad : DATA_BLOB length=0 > stub_and_verifier : DATA_BLOB length=0 >rpc_api_pipe: host 10.0.2.4 >num_setup=2, max_setup=0, param_total=0, this_param=0, max_param=0, data_total=92, this_data=92, max_data=4280, param_offset=84, param_pad=2, param_disp=0, data_offset=84, data_pad=0, data_disp=0 >rpc_read_send: data_to_read: 516 > r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0214 (532) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x000001fc (508) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > _pad : DATA_BLOB length=1 >[0000] 00 . > stub_and_verifier : DATA_BLOB length=508 >[0000] 01 00 00 00 01 00 00 00 0C 00 02 00 06 00 00 00 ........ ........ >[0010] 10 00 02 00 06 00 00 00 14 00 02 00 03 00 00 80 ........ ........ >[0020] 18 00 02 00 1C 00 02 00 00 00 00 00 20 00 02 00 ........ .... ... >[0030] 24 00 02 00 00 00 00 00 28 00 02 00 2C 00 02 00 $....... (...,... >[0040] 00 00 00 00 30 00 02 00 34 00 02 00 00 00 00 00 ....0... 4....... >[0050] 38 00 02 00 3C 00 02 00 00 00 00 00 40 00 02 00 8...<... ....@... >[0060] 05 00 00 00 00 00 00 00 05 00 00 00 49 00 50 00 ........ ....I.P. >[0070] 43 00 24 00 00 00 00 00 2E 00 00 00 00 00 00 00 C.$..... ........ >[0080] 2E 00 00 00 49 00 50 00 43 00 20 00 53 00 65 00 ....I.P. C. .S.e. >[0090] 72 00 76 00 69 00 63 00 65 00 20 00 28 00 76 00 r.v.i.c. e. .(.v. >[00A0] 62 00 6F 00 78 00 2D 00 75 00 62 00 75 00 20 00 b.o.x.-. u.b.u. . >[00B0] 73 00 65 00 72 00 76 00 65 00 72 00 20 00 28 00 s.e.r.v. e.r. .(. >[00C0] 53 00 61 00 6D 00 62 00 61 00 2C 00 20 00 55 00 S.a.m.b. a.,. .U. >[00D0] 62 00 75 00 6E 00 74 00 75 00 29 00 29 00 00 00 b.u.n.t. u.).)... >[00E0] 06 00 00 00 00 00 00 00 06 00 00 00 73 00 68 00 ........ ....s.h. >[00F0] 61 00 72 00 65 00 00 00 01 00 00 00 00 00 00 00 a.r.e... ........ >[0100] 01 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ........ ........ >[0110] 04 00 00 00 74 00 6D 00 70 00 00 00 01 00 00 00 ....t.m. p....... >[0120] 00 00 00 00 01 00 00 00 00 00 00 00 09 00 00 00 ........ ........ >[0130] 00 00 00 00 09 00 00 00 68 00 6F 00 6D 00 65 00 ........ h.o.m.e. >[0140] 64 00 69 00 72 00 73 00 00 00 00 00 01 00 00 00 d.i.r.s. ........ >[0150] 00 00 00 00 01 00 00 00 00 00 00 00 07 00 00 00 ........ ........ >[0160] 00 00 00 00 07 00 00 00 70 00 72 00 69 00 6E 00 ........ p.r.i.n. >[0170] 74 00 24 00 00 00 00 00 10 00 00 00 00 00 00 00 t.$..... ........ >[0180] 10 00 00 00 50 00 72 00 69 00 6E 00 74 00 65 00 ....P.r. i.n.t.e. >[0190] 72 00 20 00 44 00 72 00 69 00 76 00 65 00 72 00 r. .D.r. i.v.e.r. >[01A0] 73 00 00 00 06 00 00 00 00 00 00 00 06 00 00 00 s....... ........ >[01B0] 68 00 6F 00 6D 00 65 00 73 00 00 00 11 00 00 00 h.o.m.e. s....... >[01C0] 00 00 00 00 11 00 00 00 48 00 6F 00 6D 00 65 00 ........ H.o.m.e. >[01D0] 20 00 44 00 69 00 72 00 65 00 63 00 74 00 6F 00 .D.i.r. e.c.t.o. >[01E0] 72 00 69 00 65 00 73 00 00 00 00 00 06 00 00 00 r.i.e.s. ........ >[01F0] 44 00 02 00 00 00 00 00 00 00 00 00 D....... .... >Got pdu len 532, data_len 508, ss_len 0 >rpc_api_pipe: got frag len of 532 at offset 0: NT_STATUS_OK >rpc_api_pipe: host 10.0.2.4 returned 508 bytes. > srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll > out: struct srvsvc_NetShareEnumAll > info_ctr : * > info_ctr: struct srvsvc_NetShareInfoCtr > level : 0x00000001 (1) > ctr : union srvsvc_NetShareCtr(case 1) > ctr1 : * > ctr1: struct srvsvc_NetShareCtr1 > count : 0x00000006 (6) > array : * > array: ARRAY(6) > array: struct srvsvc_NetShareInfo1 > name : * > name : 'IPC$' > type : STYPE_IPC_HIDDEN (0x80000003) > comment : * > comment : 'IPC Service (vbox-ubu server (Samba, Ubuntu))' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'share' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'tmp' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'homedirs' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'print$' > type : STYPE_DISKTREE (0x0) > comment : * > comment : 'Printer Drivers' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'homes' > type : STYPE_DISKTREE (0x0) > comment : * > comment : 'Home Directories' > totalentries : * > totalentries : 0x00000006 (6) > resume_handle : * > resume_handle : 0x00000000 (0) > result : WERR_OK >### SMB-BROWSE: do_mount - [smb://10.0.2.4/; 0] dir = 0x7fc140005210, cancelled = 0, errno = [0] 'Success' >### SMB-BROWSE: update_cache - updating... >### SMB-BROWSE: update_cache - done. >### SMB-BROWSE: do_mount - login successful, res = 1 >send_reply, failed: 0 >backend_dbus_handler org.gtk.vfs.Mount:QueryInfo >Queued new job 0x1fbea10 (GVfsJobQueryInfo) >send_reply(0x1fbea10), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:CreateDirectoryMonitor >Queued new job 0x1fd9f00 (GVfsJobCreateMonitor) >send_reply(0x1fd9f00), failed=1 (Operation not supported by backend) >backend_dbus_handler org.gtk.vfs.Mount:QueryFilesystemInfo >Queued new job 0x1fea050 (GVfsJobQueryFsInfo) >send_reply(0x1fea050), failed=1 (Operation not supported by backend) >backend_dbus_handler org.gtk.vfs.Mount:Enumerate >Queued new job 0x1fd2180 (GVfsJobEnumerate) >send_reply(0x1fd2180), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:MountMountable >Queued new job 0x1fbeb50 (GVfsJobMountMountable) >send_reply(0x1fbeb50), failed=0 () >### SMB: g_vfs_backend_smb_init: default workgroup = 'NULL' >Added new job source 0x22190a0 (GVfsBackendSmb) >Queued new job 0x221a1c0 (GVfsJobMount) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 >Using netbios name VBOX-UBU. >Using workgroup WORKGROUP. >### SMB: do_mount - URI = smb://10.0.2.4/share >### SMB: do_mount - try #0 >smbc_stat(smb://10.0.2.4/share) >### SMB: auth_callback - kerberos pass >### SMB: auth_callback - out: last_user = 'user128', last_domain = 'WORKGROUP' >SMBC_server: server_n=[10.0.2.4] server=[10.0.2.4] > -> server_n=[10.0.2.4] server=[10.0.2.4] >Connecting to 10.0.2.4 at port 445 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 372480 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >Doing spnego session setup (blob length=74) >got OID=1.3.6.1.4.1.311.2.2.10 >got principal=not_defined_in_RFC4178@please_ignore > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0009 (9) > DomainNameMaxLen : 0x0009 (9) > DomainName : * > DomainName : 'WORKGROUP' > WorkstationLen : 0x0008 (8) > WorkstationMaxLen : 0x0008 (8) > Workstation : * > Workstation : 'VBOX-UBU' > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0010 (16) > TargetNameMaxLen : 0x0010 (16) > TargetName : * > TargetName : 'VBOX-UBU' > NegotiateFlags : 0x608a8215 (1619690005) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 97f81425d2efdfd4 > Reserved : 0000000000000000 > TargetInfoLen : 0x0072 (114) > TargetNameInfoMaxLen : 0x0072 (114) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0016 (22) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'example.com' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0028 (40) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'vbox-ubu.example.com' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >Got challenge flags: >Got NTLMSSP neg_flags=0x608a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 27efc4c6decb72297c4c2ef0f2eb49003706981ecf4d69b6 > NtChallengeResponseLen : 0x009e (158) > NtChallengeResponseMaxLen: 0x009e (158) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 158) > v2: struct NTLMv2_RESPONSE > Response : da4e1813711a13f9d51a7ca67d01b19d > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : wto lip 21 13:22:55 2015 CEST > ChallengeFromClient : 851eb24726fca388 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'VBOX-UBU' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0016 (22) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'example.com' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0028 (40) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'vbox-ubu.example.com' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x0012 (18) > DomainNameMaxLen : 0x0012 (18) > DomainName : * > DomainName : 'WORKGROUP' > UserNameLen : 0x000e (14) > UserNameMaxLen : 0x000e (14) > UserName : * > UserName : 'user128' > WorkstationLen : 0x0010 (16) > WorkstationMaxLen : 0x0010 (16) > Workstation : * > Workstation : 'VBOX-UBU' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 12 C7 77 3B 41 80 8B A2 FE 29 FE C4 53 B4 CF FD ..w;A... .)..S... > NegotiateFlags : 0x60088215 (1611170325) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 0: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x60088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >cli_init_creds: user user128 domain WORKGROUP > session setup ok >num_setup=1, max_setup=0, param_total=34, this_param=34, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=104, data_pad=2, data_disp=0 > tconx ok >num_setup=1, max_setup=0, param_total=2, this_param=2, max_param=0, data_total=0, this_data=0, max_data=560, param_offset=68, param_pad=0, param_disp=0, data_offset=72, data_pad=2, data_disp=0 >Case sensitive: True >Server connect ok: //10.0.2.4/share: 0x7fb0c8007570 >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=8, this_param=8, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=76, data_pad=0, data_disp=0 >### SMB: do_mount - [smb://10.0.2.4/share; 0] res = 0, cancelled = 0, errno = [0] 'Success' >### SMB: do_mount - login successful >send_reply, failed: 0 >backend_dbus_handler org.gtk.vfs.Mount:QueryInfo >Queued new job 0x2203a10 (GVfsJobQueryInfo) >smbc_stat(smb://10.0.2.4/share) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=8, this_param=8, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=76, data_pad=0, data_disp=0 >send_reply(0x2203a10), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:QueryInfo >Queued new job 0x2203ab0 (GVfsJobQueryInfo) >smbc_stat(smb://10.0.2.4/share) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=8, this_param=8, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=76, data_pad=0, data_disp=0 >send_reply(0x2203ab0), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:CreateDirectoryMonitor >Queued new job 0x7fb0c80054f0 (GVfsJobCreateMonitor) >send_reply(0x7fb0c80054f0), failed=1 (Operation not supported by backend) >backend_dbus_handler org.gtk.vfs.Mount:QueryFilesystemInfo >Queued new job 0x7fb0c8005580 (GVfsJobQueryFsInfo) >smbc_stat(smb://10.0.2.4/share) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=8, this_param=8, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=76, data_pad=0, data_disp=0 >parsed path: fname='smb://10.0.2.4/share' server='10.0.2.4' share='share' path='' options='' >SMBC_check_options(): server='10.0.2.4' share='share' path='' options='' >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=10, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >no talloc stackframe at ../source3/libsmb/clifsinfo.c:497, leaking memory >num_setup=1, max_setup=0, param_total=2, this_param=2, max_param=0, data_total=0, this_data=0, max_data=560, param_offset=68, param_pad=0, param_disp=0, data_offset=72, data_pad=2, data_disp=0 >num_setup=1, max_setup=0, param_total=2, this_param=2, max_param=0, data_total=0, this_data=0, max_data=560, param_offset=68, param_pad=0, param_disp=0, data_offset=72, data_pad=2, data_disp=0 >send_reply(0x7fb0c8005580), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:Enumerate >Queued new job 0x22168d0 (GVfsJobEnumerate) >parsed path: fname='smb://10.0.2.4/share' server='10.0.2.4' share='share' path='' options='' >SMBC_check_options(): server='10.0.2.4' share='share' path='' options='' >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=10, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >send_reply(0x22168d0), failed=0 () >smbc_stat(smb://10.0.2.4/share/dir2) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >smbc_stat(smb://10.0.2.4/share/dir1) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >smbc_stat(smb://10.0.2.4/share/dir3) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >backend_dbus_handler org.gtk.vfs.Mount:QueryInfo >Queued new job 0x2203bf0 (GVfsJobQueryInfo) >smbc_stat(smb://10.0.2.4/share/dir3) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >send_reply(0x2203bf0), failed=0 () >backend_dbus_handler org.gtk.vfs.Mount:QueryFilesystemInfo >Queued new job 0x7fb0c8005610 (GVfsJobQueryFsInfo) >smbc_stat(smb://10.0.2.4/share/dir3) >SMBC_getatr: sending qpathinfo >num_setup=1, max_setup=0, param_total=18, this_param=18, max_param=2, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=88, data_pad=2, data_disp=0 >parsed path: fname='smb://10.0.2.4/share/dir3' server='10.0.2.4' share='share' path='\dir3' options='' >SMBC_check_options(): server='10.0.2.4' share='share' path='\dir3' options='' >num_setup=1, max_setup=0, param_total=28, this_param=28, max_param=10, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=96, data_pad=0, data_disp=0 >map_errno_from_nt_status: 32 bit codes: code=c0000022 >smbc errno NT_STATUS_ACCESS_DENIED -> 13 >send_reply(0x7fb0c8005610), failed=1 (Permission denied) >backend_dbus_handler org.gtk.vfs.Mount:CreateDirectoryMonitor >Queued new job 0x7fb0c80056a0 (GVfsJobCreateMonitor) >send_reply(0x7fb0c80056a0), failed=1 (Operation not supported by backend) >backend_dbus_handler org.gtk.vfs.Mount:Enumerate >Queued new job 0x2216980 (GVfsJobEnumerate) >parsed path: fname='smb://10.0.2.4/share/dir3' server='10.0.2.4' share='share' path='\dir3' options='' >SMBC_check_options(): server='10.0.2.4' share='share' path='\dir3' options='' >num_setup=1, max_setup=0, param_total=28, this_param=28, max_param=10, data_total=0, this_data=0, max_data=65535, param_offset=68, param_pad=0, param_disp=0, data_offset=96, data_pad=0, data_disp=0 >map_errno_from_nt_status: 32 bit codes: code=c0000022 >smbc errno NT_STATUS_ACCESS_DENIED -> 13 >send_reply(0x2216980), failed=1 (Permission denied)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 11407
: 11277 |
11278
|
11299