[2016/02/29 15:14:04.952589, 4, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1389(child_handler) child daemon request 20 [2016/02/29 15:14:04.952681, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:512(child_process_request) child_process_request: request fn LIST_TRUSTDOM [2016/02/29 15:14:04.952713, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_misc.c:161(winbindd_dual_list_trusted_domains) [ 1977]: list trusted domains [2016/02/29 15:14:04.952754, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_cache.c:2910(trusted_domains) trusted_domains: [Cached] - doing backend query for info for domain EXAMPLE [2016/02/29 15:14:04.952785, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_samr.c:293(sam_trusted_domains) samr: trusted domains [2016/02/29 15:14:04.952850, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:203(make_internal_rpc_pipe_p) Create pipe requested lsarpc [2016/02/29 15:14:04.952887, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:222(init_pipe_handles) init_pipe_handle_list: created handle list for pipe lsarpc [2016/02/29 15:14:04.952934, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:239(init_pipe_handles) init_pipe_handle_list: pipe_handles ref count = 1 for pipe lsarpc [2016/02/29 15:14:04.953004, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:243(make_internal_rpc_pipe_p) Created internal pipe lsarpc [2016/02/29 15:14:04.953047, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy in: struct lsa_OpenPolicy system_name : * system_name : 0x005c (92) attr : * attr: struct lsa_ObjectAttribute len : 0x00000018 (24) root_dir : NULL object_name : NULL attributes : 0x00000000 (0) sec_desc : NULL sec_qos : * sec_qos: struct lsa_QosInfo len : 0x0000000c (12) impersonation_level : 0x0002 (2) context_mode : 0x01 (1) effective_only : 0x00 (0) access_mask : 0x02000000 (33554432) 0: LSA_POLICY_VIEW_LOCAL_INFORMATION 0: LSA_POLICY_VIEW_AUDIT_INFORMATION 0: LSA_POLICY_GET_PRIVATE_INFORMATION 0: LSA_POLICY_TRUST_ADMIN 0: LSA_POLICY_CREATE_ACCOUNT 0: LSA_POLICY_CREATE_SECRET 0: LSA_POLICY_CREATE_PRIVILEGE 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS 0: LSA_POLICY_AUDIT_LOG_ADMIN 0: LSA_POLICY_SERVER_ADMIN 0: LSA_POLICY_LOOKUP_NAMES 0: LSA_POLICY_NOTIFICATION [2016/02/29 15:14:04.953306, 10, pid=2061, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:58(se_map_generic) se_map_generic(): mapped mask 0xb0000000 to 0x000f1fff [2016/02/29 15:14:04.953349, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:95(access_check_object) _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) but overritten by euid == initial uid [2016/02/29 15:14:04.953366, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:117(access_check_object) _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) [2016/02/29 15:14:04.953384, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:303(create_rpc_handle_internal) Opened policy hnd[1] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` [0010] 0D 08 00 00 .... [2016/02/29 15:14:04.953428, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy out: struct lsa_OpenPolicy handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000009-0000-0000-d456-3c600d080000 result : NT_STATUS_OK [2016/02/29 15:14:04.953510, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_EnumTrustedDomainsEx: struct lsa_EnumTrustedDomainsEx in: struct lsa_EnumTrustedDomainsEx handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000009-0000-0000-d456-3c600d080000 resume_handle : * resume_handle : 0x00000000 (0) max_size : 0xffffffff (4294967295) [2016/02/29 15:14:04.953599, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_EnumTrustDom: struct lsa_EnumTrustDom in: struct lsa_EnumTrustDom handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000009-0000-0000-d456-3c600d080000 resume_handle : * resume_handle : 0x00000000 (0) max_size : 0xffffffff (4294967295) [2016/02/29 15:14:04.953656, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` [0010] 0D 08 00 00 .... [2016/02/29 15:14:04.953704, 5, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) smbldap_search_ext: base => [sambaDomainName=EXAMPLE,dc=example,dc=com], filter => [(objectClass=sambaTrustedDomainPassword)], scope => [2] [2016/02/29 15:14:04.954836, 5, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_ldap.c:6351(ldapsam_enum_trusteddoms) ldapsam_enum_trusteddoms: got 0 domains [2016/02/29 15:14:04.954877, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_EnumTrustDom: struct lsa_EnumTrustDom out: struct lsa_EnumTrustDom resume_handle : * resume_handle : 0xffffffff (4294967295) domains : * domains: struct lsa_DomainList count : 0x00000000 (0) domains : NULL result : NT_STATUS_NO_MORE_ENTRIES [2016/02/29 15:14:04.954912, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_Close: struct lsa_Close in: struct lsa_Close handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000009-0000-0000-d456-3c600d080000 [2016/02/29 15:14:04.954974, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` [0010] 0D 08 00 00 .... [2016/02/29 15:14:04.955019, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` [0010] 0D 08 00 00 .... [2016/02/29 15:14:04.955060, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:387(close_policy_hnd) Closed policy [2016/02/29 15:14:04.955074, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_Close: struct lsa_Close out: struct lsa_Close handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 00000000-0000-0000-0000-000000000000 result : NT_STATUS_OK [2016/02/29 15:14:04.955131, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:417(close_policy_by_pipe) Deleted handle list for RPC connection lsarpc [2016/02/29 15:14:04.955157, 4, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1397(child_handler) Finished processing child request 20 [2016/02/29 15:14:04.955182, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:104(child_write_response) Writing 3496 bytes to parent [2016/02/29 15:14:26.077151, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:69(child_read_request) Need to read 52 extra bytes [2016/02/29 15:14:26.077211, 4, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1389(child_handler) child daemon request 59 [2016/02/29 15:14:26.077508, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:512(child_process_request) child_process_request: request fn NDRCMD [2016/02/29 15:14:26.077528, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual_ndr.c:315(winbindd_dual_ndrcmd) winbindd_dual_ndrcmd: Running command WBINT_LOOKUPNAME (EXAMPLE) [2016/02/29 15:14:26.077555, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) wbint_LookupName: struct wbint_LookupName in: struct wbint_LookupName domain : * domain : 'EXAMPLE' name : * name : 'ADMINISTRATOR' flags : 0x00000008 (8) [2016/02/29 15:14:26.077606, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_cache.c:1874(name_to_sid) name_to_sid: [Cached] - doing backend query for name for domain EXAMPLE [2016/02/29 15:14:26.077620, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_samr.c:548(sam_name_to_sid) sam_name_to_sid [2016/02/29 15:14:26.077662, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:203(make_internal_rpc_pipe_p) Create pipe requested lsarpc [2016/02/29 15:14:26.077695, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:222(init_pipe_handles) init_pipe_handle_list: created handle list for pipe lsarpc [2016/02/29 15:14:26.077712, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:239(init_pipe_handles) init_pipe_handle_list: pipe_handles ref count = 1 for pipe lsarpc [2016/02/29 15:14:26.077772, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:243(make_internal_rpc_pipe_p) Created internal pipe lsarpc [2016/02/29 15:14:26.077811, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy in: struct lsa_OpenPolicy system_name : * system_name : 0x005c (92) attr : * attr: struct lsa_ObjectAttribute len : 0x00000018 (24) root_dir : NULL object_name : NULL attributes : 0x00000000 (0) sec_desc : NULL sec_qos : * sec_qos: struct lsa_QosInfo len : 0x0000000c (12) impersonation_level : 0x0002 (2) context_mode : 0x01 (1) effective_only : 0x00 (0) access_mask : 0x02000000 (33554432) 0: LSA_POLICY_VIEW_LOCAL_INFORMATION 0: LSA_POLICY_VIEW_AUDIT_INFORMATION 0: LSA_POLICY_GET_PRIVATE_INFORMATION 0: LSA_POLICY_TRUST_ADMIN 0: LSA_POLICY_CREATE_ACCOUNT 0: LSA_POLICY_CREATE_SECRET 0: LSA_POLICY_CREATE_PRIVILEGE 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS 0: LSA_POLICY_AUDIT_LOG_ADMIN 0: LSA_POLICY_SERVER_ADMIN 0: LSA_POLICY_LOOKUP_NAMES 0: LSA_POLICY_NOTIFICATION [2016/02/29 15:14:26.078104, 10, pid=2061, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:58(se_map_generic) se_map_generic(): mapped mask 0xb0000000 to 0x000f1fff [2016/02/29 15:14:26.078144, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:95(access_check_object) _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) but overritten by euid == initial uid [2016/02/29 15:14:26.078187, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:117(access_check_object) _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) [2016/02/29 15:14:26.078222, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:303(create_rpc_handle_internal) Opened policy hnd[1] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 D4 56 52 60 ........ .....VR` [0010] 0D 08 00 00 .... [2016/02/29 15:14:26.078293, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_OpenPolicy: struct lsa_OpenPolicy out: struct lsa_OpenPolicy handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 0000000a-0000-0000-d456-52600d080000 result : NT_STATUS_OK [2016/02/29 15:14:26.078461, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_rpc.c:309(rpc_name_to_sid) name_to_sid: EXAMPLE\ADMINISTRATOR for domain EXAMPLE [2016/02/29 15:14:26.078516, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) lsa_LookupNames: struct lsa_LookupNames in: struct lsa_LookupNames handle : * handle: struct policy_handle handle_type : 0x00000000 (0) uuid : 0000000a-0000-0000-d456-52600d080000 num_names : 0x00000001 (1) names: ARRAY(1) names: struct lsa_String length : 0x002a (42) size : 0x002a (42) string : * string : 'EXAMPLE\ADMINISTRATOR' sids : * sids: struct lsa_TransSidArray count : 0x00000000 (0) sids : NULL level : LSA_LOOKUP_NAMES_ALL (1) count : * count : 0x00000000 (0) [2016/02/29 15:14:26.078883, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 D4 56 52 60 ........ .....VR` [0010] 0D 08 00 00 .... [2016/02/29 15:14:26.078954, 5, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/lsa/srv_lsa_nt.c:163(lookup_lsa_rids) lookup_lsa_rids: looking up name EXAMPLE\ADMINISTRATOR [2016/02/29 15:14:26.078986, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) lookup_name: EXAMPLE\ADMINISTRATOR => domain=[EXAMPLE], name=[ADMINISTRATOR] [2016/02/29 15:14:26.079037, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) lookup_name: flags = 0x073 [2016/02/29 15:14:26.079097, 5, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) smbldap_search_ext: base => [dc=example,dc=com], filter => [(&(uid=ADMINISTRATOR)(objectclass=sambaSamAccount))], scope => [2] [2016/02/29 15:14:26.080568, 2, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_ldap.c:524(init_sam_from_ldap) init_sam_from_ldap: Entry found for user: Administrator [2016/02/29 15:14:26.080632, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) pdb_set_username: setting username Administrator, was [2016/02/29 15:14:26.080666, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) pdb_set_domain: setting domain EXAMPLE, was [2016/02/29 15:14:26.080696, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) pdb_set_nt_username: setting nt username Administrator, was [2016/02/29 15:14:26.080734, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:508(pdb_set_user_sid_from_string) pdb_set_user_sid_from_string: setting user sid S-1-5-21-3433748774-3946474326-2194090801-500 [2016/02/29 15:14:26.080768, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) pdb_set_user_sid: setting user sid S-1-5-21-3433748774-3946474326-2194090801-500 [2016/02/29 15:14:26.080816, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaLogonTime does not exist [2016/02/29 15:14:26.080851, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaLogoffTime does not exist [2016/02/29 15:14:26.080884, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaKickoffTime does not exist [2016/02/29 15:14:26.080922, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) pdb_set_full_name: setting full name Administrator, was [2016/02/29 15:14:26.080957, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaHomeDrive does not exist [2016/02/29 15:14:26.080987, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) pdb_set_dir_drive: setting dir drive , was NULL [2016/02/29 15:14:26.081022, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaHomePath does not exist [2016/02/29 15:14:26.081073, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) pdb_set_homedir: setting home dir , was [2016/02/29 15:14:26.081109, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaLogonScript does not exist [2016/02/29 15:14:26.081140, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) pdb_set_logon_script: setting logon script , was [2016/02/29 15:14:26.081175, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaProfilePath does not exist [2016/02/29 15:14:26.081205, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) pdb_set_profile_path: setting profile path , was [2016/02/29 15:14:26.081296, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute description does not exist [2016/02/29 15:14:26.081399, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaUserWorkstations does not exist [2016/02/29 15:14:26.081434, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaMungedDial does not exist [2016/02/29 15:14:26.081468, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaLMPassword does not exist [2016/02/29 15:14:26.081560, 10, pid=2061, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:323(gencache_set_data_blob) Adding cache entry with key=[ACCT_POL/password history] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1456758866 seconds in the past) [2016/02/29 15:14:26.081641, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_ldap.c:3877(ldapsam_get_account_policy_from_ldap) ldapsam_get_account_policy_from_ldap [2016/02/29 15:14:26.081688, 5, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) smbldap_search_ext: base => [sambaDomainName=EXAMPLE,dc=example,dc=com], filter => [(objectClass=sambaDomain)], scope => [0] [2016/02/29 15:14:26.082863, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:425(cache_account_policy_set) cache_account_policy_set: updating account pol cache [2016/02/29 15:14:26.082938, 10, pid=2061, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:323(gencache_set_data_blob) Adding cache entry with key=[ACCT_POL/password history] and timeout=[Mon Feb 29 15:15:26 2016 GMT] (60 seconds ahead) [2016/02/29 15:14:26.083031, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaBadPasswordCount does not exist [2016/02/29 15:14:26.083069, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaBadPasswordTime does not exist [2016/02/29 15:14:26.083104, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute sambaLogonHours does not exist [2016/02/29 15:14:26.083148, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) attribute gecos does not exist [2016/02/29 15:14:26.083828, 0, pid=2061, effective(0, 0), real(0, 0)] ../lib/util/fault.c:78(fault_report) =============================================================== [2016/02/29 15:14:26.084559, 0, pid=2061, effective(0, 0), real(0, 0)] ../lib/util/fault.c:79(fault_report) INTERNAL ERROR: Signal 11 in pid 2061 (4.3.5) Please read the Trouble-Shooting section of the Samba HOWTO [2016/02/29 15:14:26.085513, 0, pid=2061, effective(0, 0), real(0, 0)] ../lib/util/fault.c:81(fault_report) =============================================================== [2016/02/29 15:14:26.085992, 0, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/util.c:789(smb_panic_s3) PANIC (pid 2061): internal error [2016/02/29 15:14:26.088209, 0, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/util.c:900(log_stack_trace) BACKTRACE: 48 stack frames: #0 /usr/local/samba/lib/libsmbconf.so.0(log_stack_trace+0x26) [0xb685a45b] #1 /usr/local/samba/lib/libsmbconf.so.0(smb_panic_s3+0x6a) [0xb685a2b1] #2 /usr/local/samba/lib/libsamba-util.so.0(smb_panic+0x2a) [0xb72e9b96] #3 /usr/local/samba/lib/libsamba-util.so.0(+0x1e87d) [0xb72e987d] #4 /usr/local/samba/lib/libsamba-util.so.0(+0x1e88e) [0xb72e988e] #5 linux-gate.so.1(__kernel_sigreturn+0) [0xb7661cf0] #6 /lib/i386-linux-gnu/i686/cmov/libc.so.6(+0x83b66) [0xb653fb66] #7 /usr/local/samba/lib/libsmbconf.so.0(tcopy_passwd+0x65) [0xb688d2ed] #8 /usr/local/samba/lib/libsamba-passdb.so.0(+0x200a4) [0xb738a0a4] #9 /usr/local/samba/lib/libsamba-passdb.so.0(+0x21c51) [0xb738bc51] #10 /usr/local/samba/lib/libsamba-passdb.so.0(pdb_getsampwnam+0x2f) [0xb73b1901] #11 /usr/local/samba/lib/libsamba-passdb.so.0(lookup_global_sam_name+0x8f) [0xb73a36e8] #12 /usr/local/samba/lib/libsamba-passdb.so.0(lookup_name+0x2ce) [0xb73a98f8] #13 /usr/local/samba/sbin/winbindd(+0xa18f8) [0xb77268f8] #14 /usr/local/samba/sbin/winbindd(_lsa_LookupNames+0x1de) [0xb772884e] #15 /usr/local/samba/sbin/winbindd(+0xac532) [0xb7731532] #16 /usr/local/samba/sbin/winbindd(+0x1d72d) [0xb76a272d] #17 /usr/local/samba/sbin/winbindd(+0x1d998) [0xb76a2998] #18 /usr/local/samba/lib/libdcerpc-binding.so.0(dcerpc_binding_handle_raw_call_send+0x93) [0xb7356e09] #19 /usr/local/samba/lib/libdcerpc-binding.so.0(dcerpc_binding_handle_call_send+0x340) [0xb735764a] #20 /usr/local/samba/lib/libdcerpc-binding.so.0(dcerpc_binding_handle_call+0x79) [0xb7357a05] #21 /usr/local/samba/lib/private/libdcerpc-samba-samba4.so(dcerpc_lsa_LookupNames_r+0x32) [0xb7106d74] #22 /usr/local/samba/lib/private/libdcerpc-samba-samba4.so(dcerpc_lsa_LookupNames+0x71) [0xb71071b8] #23 /usr/local/samba/lib/private/liblibcli-lsa3-samba4.so(dcerpc_lsa_lookup_names_generic+0x127) [0xb6933d74] #24 /usr/local/samba/lib/private/liblibcli-lsa3-samba4.so(dcerpc_lsa_lookup_names+0x3b) [0xb69341ba] #25 /usr/local/samba/lib/private/liblibcli-lsa3-samba4.so(rpccli_lsa_lookup_names+0x4c) [0xb6934213] #26 /usr/local/samba/sbin/winbindd(rpc_name_to_sid+0x184) [0xb76d8f40] #27 /usr/local/samba/sbin/winbindd(+0x5c571) [0xb76e1571] #28 /usr/local/samba/sbin/winbindd(+0x3630c) [0xb76bb30c] #29 /usr/local/samba/sbin/winbindd(_wbint_LookupName+0x76) [0xb76e790e] #30 /usr/local/samba/sbin/winbindd(+0xb8e8b) [0xb773de8b] #31 /usr/local/samba/sbin/winbindd(winbindd_dual_ndrcmd+0x16a) [0xb76e761e] #32 /usr/local/samba/sbin/winbindd(+0x5e901) [0xb76e3901] #33 /usr/local/samba/sbin/winbindd(+0x61086) [0xb76e6086] #34 /usr/local/samba/lib/private/libtevent.so.0(+0xaf10) [0xb7247f10] #35 /usr/local/samba/lib/private/libtevent.so.0(+0xb532) [0xb7248532] #36 /usr/local/samba/lib/private/libtevent.so.0(+0x86ab) [0xb72456ab] #37 /usr/local/samba/lib/private/libtevent.so.0(_tevent_loop_once+0xdb) [0xb72405ba] #38 /usr/local/samba/sbin/winbindd(+0x61b78) [0xb76e6b78] #39 /usr/local/samba/sbin/winbindd(+0x5d9cc) [0xb76e29cc] #40 /usr/local/samba/lib/private/libtevent.so.0(+0x4485) [0xb7241485] #41 /usr/local/samba/lib/private/libtevent.so.0(tevent_common_loop_immediate+0x18e) [0xb7241162] #42 /usr/local/samba/lib/private/libtevent.so.0(+0xb491) [0xb7248491] #43 /usr/local/samba/lib/private/libtevent.so.0(+0x86ab) [0xb72456ab] #44 /usr/local/samba/lib/private/libtevent.so.0(_tevent_loop_once+0xdb) [0xb72405ba] #45 /usr/local/samba/sbin/winbindd(main+0xd6b) [0xb76b269e] #46 /lib/i386-linux-gnu/i686/cmov/libc.so.6(__libc_start_main+0xf3) [0xb64d5a63] #47 /usr/local/samba/sbin/winbindd(+0x1a071) [0xb769f071] [2016/02/29 15:14:26.101195, 0, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/dumpcore.c:318(dump_core) dumping core in /usr/local/samba/var/cores/winbindd