The Samba-Bugzilla – Attachment 15716 Details for
Bug 14222
Software caused connection abort via GVFS
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
GVFS SMB log file
gvfsd_test.log (text/x-log), 25.23 KB, created by
boongl
on 2019-12-20 09:52:56 UTC
(
hide
)
Description:
GVFS SMB log file
Filename:
MIME Type:
Creator:
boongl
Created:
2019-12-20 09:52:56 UTC
Size:
25.23 KB
patch
obsolete
>smb: g_vfs_backend_smb_init: default workgroup = 'NULL' >smb: Added new job source 0x55f6e667c080 (GVfsBackendSmb) >smb: Queued new job 0x55f6e667d940 (GVfsJobMount) >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >Using netbios name CLIENT. >Using workgroup WORKGROUP. >smb: do_mount - URI = smb://server/test >smb: do_mount - try #0 >smbc_stat(smb://server/test) >smb: auth_callback - normal pass >smb: auth_callback - asking for password... >smb: auth_callback - out: last_user = 'user', last_domain = 'WORKGROUP' >SMBC_server: server_n=[server] server=[server] > -> server_n=[server] server=[server] >Opening cache file at /var/run/samba/gencache.tdb >tdb(/var/run/samba/gencache.tdb): tdb_open_ex: could not open file /var/run/samba/gencache.tdb: Permission denied >Opening /var/run/samba/gencache.tdb failed: Permission denied >sitename_fetch: No stored sitename for realm '' >internal_resolve_name: looking up server#20 (sitename (null)) >Opening cache file at /var/run/samba/gencache.tdb >tdb(/var/run/samba/gencache.tdb): tdb_open_ex: could not open file /var/run/samba/gencache.tdb: Permission denied >Opening /var/run/samba/gencache.tdb failed: Permission denied >no entry for server#20 found. >resolve_lmhosts: Attempting lmhosts lookup for name server<0x20> >startlmhosts: Can't open lmhosts file /etc/samba/lmhosts. Error was No such file or directory >resolve_wins: WINS server resolution selected and no WINS servers listed. >resolve_hosts: Attempting host lookup for name server<0x20> >resolve_hosts: getaddrinfo failed for name server [Temporary failure in name resolution] >name_resolve_bcast: Attempting broadcast lookup for name server<0x20> >parse_nmb: packet id = 27222 >nmb packet from 192.168.1.53(35072) header: id=27222 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=SERVER<20> rr_type=32 rr_class=1 ttl=259200 > answers 0 char ....$. hex 0000C0A82417 >Got a positive name query response from 192.168.1.53 ( 192.168.1.53 ) >remove_duplicate_addrs2: looking for duplicate address/port pairs >namecache_store: storing 1 address for server#20: 192.168.1.53 >Opening cache file at /var/run/samba/gencache.tdb >tdb(/var/run/samba/gencache.tdb): tdb_open_ex: could not open file /var/run/samba/gencache.tdb: Permission denied >Opening /var/run/samba/gencache.tdb failed: Permission denied >internal_resolve_name: returning 1 addresses: 192.168.1.53:0 >Connecting to 192.168.1.53 at port 445 >Connecting to 192.168.1.53 at port 139 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >got OID=1.3.6.1.4.1.311.2.2.10 >cli_session_setup_spnego_send: Connect to server as user@WORKGROUP using SPNEGO >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >GENSEC backend 'http_negotiate' registered >GENSEC backend 'krb5' registered >GENSEC backend 'fake_gssapi_krb5' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >gensec_update_send: ntlmssp[0x7fa69802a080]: subreq: 0x7fa698006290 >gensec_update_send: spnego[0x7fa698017960]: subreq: 0x7fa69802ee00 >gensec_update_done: ntlmssp[0x7fa69802a080]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fa698006290/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fa698006440)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] >gensec_update_done: spnego[0x7fa698017960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fa69802ee00/../../auth/gensec/spnego.c:1600]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fa69802efb0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2070] >Got challenge flags: >Got NTLMSSP neg_flags=0x628a8215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_SERVER > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >short string '', sent with NULL termination despite NOTERM flag in IDL > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0004 (4) > TargetNameMaxLen : 0x0004 (4) > TargetName : * > TargetName : 'SERVER' > NegotiateFlags : 0x628a8215 (1653244437) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : deab783e62794783 > Reserved : 0000000000000000 > TargetInfoLen : 0x0032 (50) > TargetInfoMaxLen : 0x0032 (50) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000006 (6) > pair: ARRAY(6) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'wxyz' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Fri Dec 20 12:49:35 2019 AEDT > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) > ProductBuild : 0x0000 (0) > Reserved : 000000 > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) >short string '', sent with NULL termination despite NOTERM flag in IDL >short string '', sent with NULL termination despite NOTERM flag in IDL > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24) > v1: struct LM_RESPONSE > Response : 000000000000000000000000000000000000000000000000 > NtChallengeResponseLen : 0x00c0 (192) > NtChallengeResponseMaxLen: 0x00c0 (192) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 192) > v2: struct NTLMv2_RESPONSE > Response : 0cca432e68914460e55e7232d0c6c656 > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Fri Dec 20 12:49:35 2019 AEDT > ChallengeFromClient : d8f0506833d89e4c > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'wxyz' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Fri Dec 20 12:49:35 2019 AEDT > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000000 (0) > TokenIL : 0x00000000 (0) > MachineId : 3a3e6388f4bdf6a88bafe30e818927b9eabe15ef393bd16a584fd0c940bac840 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x000e (14) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/server' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x000a (10) > DomainNameMaxLen : 0x000a (10) > DomainName : * > DomainName : 'WORKGROUP' > UserNameLen : 0x000a (10) > UserNameMaxLen : 0x000a (10) > UserName : * > UserName : 'user' > WorkstationLen : 0x0008 (8) > WorkstationMaxLen : 0x0008 (8) > Workstation : * > Workstation : 'CLIENT' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 >[0000] 94 E1 55 4A AB 02 4C 5B 71 FA 5C 45 D0 FB BC 9D ..UJ..L[ q.\E.... > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: ntlmssp[0x7fa69802a080]: subreq: 0x7fa698026f50 >gensec_update_send: spnego[0x7fa698017960]: subreq: 0x7fa698031590 >gensec_update_done: ntlmssp[0x7fa69802a080]: NT_STATUS_OK tevent_req[0x7fa698026f50/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fa698027100)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222] >gensec_update_done: spnego[0x7fa698017960]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fa698031590/../../auth/gensec/spnego.c:1600]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fa698031740)] timer[(nil)] finish[../../auth/gensec/spnego.c:2070] >ntlmssp_check_packet: NTLMSSP signature OK ! >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >gensec_update_send: spnego[0x7fa698017960]: subreq: 0x7fa698031590 >gensec_update_done: spnego[0x7fa698017960]: NT_STATUS_OK tevent_req[0x7fa698031590/../../auth/gensec/spnego.c:1600]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fa698031740)] timer[(nil)] finish[../../auth/gensec/spnego.c:2070] > session setup ok >signed SMB2 message >signed SMB2 message > tconx ok >Case sensitive: True >Server connect ok: //server/test: 0x7fa6980306d0 >SMBC_getatr: sending qpathinfo >smb: do_mount - [smb://server/test; 0] res = 0, cancelled = 0, errno = [17] 'File exists' >smb: do_mount - login successful >smb: send_reply(0x55f6e667d940), failed=0 () >smb: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=10448) >smb: Queued new job 0x55f6e6667a30 (GVfsJobQueryInfo) >smbc_stat(smb://server/test/0793_TCP.txt) >SMBC_getatr: sending qpathinfo >smb: send_reply(0x55f6e6667a30), failed=0 () >smb: backend_dbus_handler org.gtk.vfs.Mount:OpenForRead (pid=10448) >smb: Queued new job 0x55f6e6667b70 (GVfsJobOpenForRead) >map_open_params_to_ntcreate: fname = \0793_TCP.txt, deny_mode = 0x40, open_func = 0x1 >map_open_params_to_ntcreate: file \0793_TCP.txt, access_mask = 0x120089, share_mode = 0x3, create_disposition = 0x1, create_options = 0x40 private_flags = 0x0 >smb: send_reply(0x55f6e6667b70), failed=0 () >smb: Added new job source 0x7fa6a8003df0 (GVfsReadChannel) >smb: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=10448) >smb: Queued new job 0x55f6e6667c10 (GVfsJobQueryInfo) >smbc_stat(smb://server/test/0793_TCP.txt) >SMBC_getatr: sending qpathinfo >smb: send_reply(0x55f6e6667c10), failed=0 () >smb: Queued new job 0x55f6e667ddc0 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 8192) > --> 8192 >smb: send_reply(0x55f6e667ddc0), bytes=8192, failed=0 () >smb: Queued new job 0x55f6e667de50 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 8192) > --> 8192 >smb: send_reply(0x55f6e667de50), bytes=8192, failed=0 () >smb: Queued new job 0x55f6e667dee0 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 16384) > --> 16384 >smb: send_reply(0x55f6e667dee0), bytes=16384, failed=0 () >smb: Queued new job 0x7fa698018020 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 32768) > --> 32768 >smb: send_reply(0x7fa698018020), bytes=32768, failed=0 () >smb: Queued new job 0x7fa6980180b0 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 65536) > --> 65536 >smb: send_reply(0x7fa6980180b0), bytes=65536, failed=0 () >smb: Queued new job 0x7fa698018140 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 131072) > --> 41638 >smb: send_reply(0x7fa698018140), bytes=41638, failed=0 () >smb: Queued new job 0x7fa6980181d0 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 131072) > --> 0 >smb: send_reply(0x7fa6980181d0), bytes=0, failed=0 () >smb: Queued new job 0x7fa698018260 (GVfsJobRead) >smbc_read(0x7fa6980308a0, 131072) >map_errno_from_nt_status: 32 bit codes: code=c000020c >smbc_error 1 233 (0xe9) -> 103 >smb: send_reply(0x7fa698018260), bytes=0, failed=1 (Software caused connection abort) >smb: Queued new job 0x55f6e666c580 (GVfsJobCloseRead) >cli_close failed on smb://server/test/0793_TCP.txt. purging server. >map_errno_from_nt_status: 32 bit codes: code=c000020c >smbc_error 1 233 (0xe9) -> 103 >smbc_remove_usused_server: 0x7fa6980306d0 removed. >smb: send_reply(0x55f6e666c580), failed=1 (Software caused connection abort) >smb: backend_dbus_handler org.gtk.vfs.Mount:Unmount (pid=10487) >smb: g_vfs_job_unmount_new request: 0x55f6e666c5e0 >smb: Queued new job 0x55f6e667db80 (GVfsJobUnmount) >smb: gvfsjobunmount progress timeout start >Performing aggressive shutdown. >Context 0x7fa698007800 successfully freed >Freeing parametrics: >smb: unregister_mount_callback >smb: send_reply(0x55f6e667db80), failed=0 ()
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 14222
: 15716