The Samba-Bugzilla – Attachment 15845 Details for
Bug 14316
Using vfs_fruit alongside with vfs_recycle
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log level 10 from my lab
log.smbd (text/plain), 1.73 MB, created by
Isaac Boukris
on 2020-03-06 12:27:56 UTC
(
hide
)
Description:
log level 10 from my lab
Filename:
MIME Type:
Creator:
Isaac Boukris
Created:
2020-03-06 12:27:56 UTC
Size:
1.73 MB
patch
obsolete
>[2020/03/06 14:24:07.521003, 0] ../../source3/smbd/server.c:1781(main) > smbd version 4.13.0pre1-GIT-a4ed6ada500 started. > Copyright Andrew Tridgell and the Samba Team 1992-2020 >[2020/03/06 14:24:07.521299, 5, pid=734084, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 > doing parameter security = user > doing parameter passdb backend = tdbsam > doing parameter guest account = nobody > doing parameter load printers = no > doing parameter fruit:aapl = yes > doing parameter fruit:nfs_aces = no > doing parameter unix extensions = no >[2020/03/06 14:24:07.521453, 4, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3970(lp_load_ex) > pm_process() returned Yes >[2020/03/06 14:24:07.521465, 7, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4305(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2020/03/06 14:24:07.521493, 4, pid=734084, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:174(get_current_groups) > get_current_groups: user is in 1 groups: 0 >[2020/03/06 14:24:07.521842, 10, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2020/03/06 14:24:07.521887, 10, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 17798995184911625695 >[2020/03/06 14:24:07.522001, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 2 - private_data=(nil) >[2020/03/06 14:24:07.522020, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/03/06 14:24:07.522028, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 11 - private_data=(nil) >[2020/03/06 14:24:07.522039, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 12 - private_data=(nil) >[2020/03/06 14:24:07.522047, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/dmallocmsg.c:78(register_dmalloc_msgs) > Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >[2020/03/06 14:24:07.522053, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2020/03/06 14:24:07.522060, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 5 - private_data=(nil) >[2020/03/06 14:24:07.522067, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 51 - private_data=(nil) >[2020/03/06 14:24:07.522074, 10, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:611(messaging_init_internal) > messaging_init_internal: my id: 734084 >[2020/03/06 14:24:07.522096, 5, pid=734084, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:07.522255, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3928(lp_load_ex) > lp_load_ex: refreshing parameters >[2020/03/06 14:24:07.522270, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1364(free_param_opts) > Freeing parametrics: >[2020/03/06 14:24:07.522320, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:550(init_globals) > Initialising global parameters >[2020/03/06 14:24:07.522334, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:319(max_open_files) > rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >[2020/03/06 14:24:07.522401, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2840(lp_do_section) > Processing section "[global]" > doing parameter workgroup = WORKGROUP > doing parameter server string = Samba Server Version %v > doing parameter netbios name = PIXIES > doing parameter interfaces = lo 192.168.0.0/24 > doing parameter hosts allow = 127. 192.168.0. > doing parameter hostname lookups = yes > doing parameter log level = 10 >[2020/03/06 14:24:07.522472, 5, pid=734084, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 > doing parameter security = user > doing parameter passdb backend = tdbsam > doing parameter guest account = nobody > doing parameter load printers = no > doing parameter fruit:aapl = yes > doing parameter fruit:nfs_aces = no > doing parameter unix extensions = no >[2020/03/06 14:24:07.522596, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2857(lp_do_section) > Processing section "[User]" >[2020/03/06 14:24:07.522615, 8, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1479(add_a_service) > add_a_service: Creating snum = 0 for User >[2020/03/06 14:24:07.522622, 10, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1521(hash_a_service) > hash_a_service: creating servicehash >[2020/03/06 14:24:07.522630, 10, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1529(hash_a_service) > hash_a_service: hashing index 0 for service name User > doing parameter comment = User Files > doing parameter path = /share/samba/user > doing parameter directory mask = 0775 > doing parameter create mask = 0774 > doing parameter force directory mode = 0775 > doing parameter force create mode = 0774 > doing parameter writable = yes > doing parameter browseable = yes > doing parameter guest ok = no > doing parameter write list = @home, pcuser > doing parameter valid users = @home, macuser, pcuser > doing parameter veto files = /.AppleDB/.AppleDouble/.AppleDesktop/:2eDS_Store/Network Trash Folder/Temporary Items/TheVolumeSettingsFolder/.@__thumb/.@__desc/:2e*/.@__qini/.@upload_cache/.@qsys/.digest/ > doing parameter delete veto files = yes > doing parameter vfs objects = catia fruit streams_xattr recycle > doing parameter ea support = yes > doing parameter fruit:aapl = yes > doing parameter fruit:encoding = native > doing parameter fruit:locking = none > doing parameter fruit:metadata = stream > doing parameter fruit:resource = file > doing parameter recycle:repository = @RecycleBin > doing parameter recycle:directory_mode = 2775 > doing parameter recycle:keeptree = yes > doing parameter recycle:versions = yes > doing parameter recycle:touch = yes > doing parameter recycle:exclude = *.tmp,*.temp,*.o,*.obj,~$*,*.~??,~*.*,*.TMP,*.TEMP,lock.*,.~lock.*,LOCK.*,*.lock,*.~lock,*.LNK,*.lnk,*.ldb,._* > doing parameter recycle:minsize = 1 >[2020/03/06 14:24:07.522952, 4, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3970(lp_load_ex) > pm_process() returned Yes >[2020/03/06 14:24:07.522965, 7, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4305(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2020/03/06 14:24:07.522984, 8, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1479(add_a_service) > add_a_service: Creating snum = 1 for IPC$ >[2020/03/06 14:24:07.522991, 10, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1529(hash_a_service) > hash_a_service: hashing index 1 for service name IPC$ >[2020/03/06 14:24:07.523001, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1641(lp_add_ipc) > adding IPC service >[2020/03/06 14:24:07.523013, 5, pid=734084, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:07.523130, 6, pid=734084, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2356(lp_file_list_changed) > lp_file_list_changed() > file /usr/local/samba/etc/smb.conf -> /usr/local/samba/etc/smb.conf last mod_time: Fri Mar 6 14:21:52 2020 > >[2020/03/06 14:24:07.523154, 5, pid=734084, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:07.523466, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/interface.c:343(add_interface) > added interface lo ip=127.0.0.1 bcast=127.255.255.255 netmask=255.0.0.0 >[2020/03/06 14:24:07.523492, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/interface.c:568(interpret_interface) > interpret_interface: using netmask value 24 from config file on interface ens33 >[2020/03/06 14:24:07.523501, 2, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/interface.c:343(add_interface) > added interface ens33 ip=192.168.0.110 bcast=192.168.0.255 netmask=255.255.255.0 >[2020/03/06 14:24:07.523530, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1850(main) > loaded services >[2020/03/06 14:24:07.523542, 5, pid=734084, effective(0, 0), real(0, 0)] ../../source3/lib/util_names.c:149(init_names) > Netbios name list:- > my_netbios_names[0]="PIXIES" >[2020/03/06 14:24:07.523597, 1, pid=734084, effective(0, 0), real(0, 0)] ../../source3/profile/profile_dummy.c:30(set_profile_level) > INFO: Profiling support unavailable in this build. >[2020/03/06 14:24:07.523614, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1869(main) > Standard input is not a socket, assuming -D option >[2020/03/06 14:24:07.523621, 3, pid=734084, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1882(main) > Becoming a daemon. >[2020/03/06 14:24:07.524818, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/03/06 14:24:07.527012, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2020/03/06 14:24:07.527074, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 17278732840051133678 >[2020/03/06 14:24:07.527107, 2, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/03/06 14:24:07.527170, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend smbpasswd >[2020/03/06 14:24:07.527188, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'smbpasswd' >[2020/03/06 14:24:07.527199, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend tdbsam >[2020/03/06 14:24:07.527207, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'tdbsam' >[2020/03/06 14:24:07.527243, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend samba_dsdb >[2020/03/06 14:24:07.527259, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'samba_dsdb' >[2020/03/06 14:24:07.527266, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend samba4 >[2020/03/06 14:24:07.527272, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'samba4' >[2020/03/06 14:24:07.527284, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend ldapsam >[2020/03/06 14:24:07.527291, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'ldapsam' >[2020/03/06 14:24:07.527298, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend NDS_ldapsam >[2020/03/06 14:24:07.527305, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'NDS_ldapsam' >[2020/03/06 14:24:07.527314, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/03/06 14:24:07.527325, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/03/06 14:24:07.527358, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/03/06 14:24:07.530834, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_version_global.tdb >[2020/03/06 14:24:07.531007, 10, pid=734085, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_version_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:07.531026, 10, pid=734085, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 736D62587372765F7665 >[2020/03/06 14:24:07.531040, 10, pid=734085, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a11230 >[2020/03/06 14:24:07.531506, 10, pid=734085, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 736D62587372765F7665 >[2020/03/06 14:24:07.531529, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_version_global.tdb >[2020/03/06 14:24:07.531540, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_version.c:250(smbXsrv_version_global_init) > smbXsrv_version_global_init >[2020/03/06 14:24:07.531548, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_version.c:251(smbXsrv_version_global_init) >[2020/03/06 14:24:07.531554, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_version_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_version_globalU(case 0) > info0 : * > info0: struct smbXsrv_version_global0 > db_rec : NULL > num_nodes : 0x00000001 (1) > nodes: ARRAY(1) > nodes: struct smbXsrv_version_node0 > server_id: struct server_id > pid : 0x00000000000b3385 (734085) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xefca63f8ac1fccee (-1168011233658417938) > min_version : SMBXSRV_VERSION_0 (0) > max_version : SMBXSRV_VERSION_0 (0) > current_version : SMBXSRV_VERSION_0 (0) >[2020/03/06 14:24:07.537519, 3, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/util_procid.c:53(pid_to_procid) > pid_to_procid: messaging_dgm_get_unique failed: No such file or directory >[2020/03/06 14:24:07.538122, 10, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/03/06 14:24:07.538603, 10, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2020/03/06 14:24:07.538644, 10, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 15271018648894946928 >[2020/03/06 14:24:07.538666, 2, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/03/06 14:24:07.538702, 5, pid=734087, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/03/06 14:24:07.538722, 5, pid=734087, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/03/06 14:24:07.538754, 5, pid=734087, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/03/06 14:24:07.538775, 5, pid=734087, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:07.539366, 5, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 794 - private_data=0x55aaa1a139c0 >[2020/03/06 14:24:07.539383, 5, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 795 - private_data=0x55aaa1a139c0 >[2020/03/06 14:24:07.539391, 5, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 796 - private_data=0x55aaa1a139c0 >[2020/03/06 14:24:07.539895, 10, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1444(messaging_dgm_send) > messaging_dgm_send: Sending message to 734085 >[2020/03/06 14:24:07.540140, 10, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/03/06 14:24:07.541289, 10, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2020/03/06 14:24:07.541353, 10, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 12057976050853224089 >[2020/03/06 14:24:07.541384, 2, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/03/06 14:24:07.541420, 5, pid=734088, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/03/06 14:24:07.541445, 5, pid=734088, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/03/06 14:24:07.541478, 5, pid=734088, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/03/06 14:24:07.541495, 5, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 13 - private_data=0x55aaa1a13720 >[2020/03/06 14:24:07.541506, 5, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 788 - private_data=0x55aaa1a13720 >[2020/03/06 14:24:07.541674, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:619(cleanupd_init) > cleanupd_init: Started cleanupd pid=734088 >[2020/03/06 14:24:07.541792, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 789 - private_data=0x55aaa19cf980 >[2020/03/06 14:24:07.541882, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:769(regdb_init) > regdb_init: registry db openend. refcount reset (1) >[2020/03/06 14:24:07.541903, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:68(reghook_cache_init) > reghook_cache_init: new tree with default ops 0x7f25395602c0 for key [] >[2020/03/06 14:24:07.542013, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2020/03/06 14:24:07.542046, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Samba Printer Port] len[2] >[2020/03/06 14:24:07.542062, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2020/03/06 14:24:07.542079, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DefaultSpoolDirectory] len[70] >[2020/03/06 14:24:07.542088, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.542101, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2020/03/06 14:24:07.542110, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.542118, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.542132, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2020/03/06 14:24:07.542140, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.542153, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf680 for key [\HKLM\SYSTEM\CurrentControlSet\Control\Print\Printers] >[2020/03/06 14:24:07.542162, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542176, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Control\Print\Printers] to tree >[2020/03/06 14:24:07.542187, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542195, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f25395602c0 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2020/03/06 14:24:07.542202, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542215, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] to tree >[2020/03/06 14:24:07.542223, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542230, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f25395602c0 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2020/03/06 14:24:07.542237, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542246, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] to tree >[2020/03/06 14:24:07.542253, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542260, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f25395602c0 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\PackageInstallation] >[2020/03/06 14:24:07.542267, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542278, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\PackageInstallation] to tree >[2020/03/06 14:24:07.542285, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542292, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf6e0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] >[2020/03/06 14:24:07.542299, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542308, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] to tree >[2020/03/06 14:24:07.542315, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542326, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539560040 for key [\HKLM\SOFTWARE\Samba\smbconf] >[2020/03/06 14:24:07.542336, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542345, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Samba\smbconf] to tree >[2020/03/06 14:24:07.542351, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542358, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf740 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] >[2020/03/06 14:24:07.542366, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542375, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] to tree >[2020/03/06 14:24:07.542384, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542391, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf7a0 for key [\HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] >[2020/03/06 14:24:07.542398, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542407, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] to tree >[2020/03/06 14:24:07.542414, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542421, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf800 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters] >[2020/03/06 14:24:07.542428, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542437, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters] to tree >[2020/03/06 14:24:07.542444, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542450, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf860 for key [\HKPT] >[2020/03/06 14:24:07.542458, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542465, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKPT] to tree >[2020/03/06 14:24:07.542472, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542479, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf8c0 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] >[2020/03/06 14:24:07.542487, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542495, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] to tree >[2020/03/06 14:24:07.542502, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542509, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2539bbf920 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] >[2020/03/06 14:24:07.542516, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/03/06 14:24:07.542525, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] to tree >[2020/03/06 14:24:07.542532, 8, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/03/06 14:24:07.542538, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (1->0) >[2020/03/06 14:24:07.542653, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1107(auth3_session_info_create) > Could not convert SID S-1-5-18 to gid, ignoring it >[2020/03/06 14:24:07.542669, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (1): > SID[ 0]: S-1-5-18 > Privileges (0xFFFFFFFFFFFFFFFF): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2020/03/06 14:24:07.542720, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 1 supplementary groups > Group[ 0]: 0 >[2020/03/06 14:24:07.542747, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/03/06 14:24:07.542756, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/03/06 14:24:07.543687, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/03/06 14:24:07.543719, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user PIXIES\nobody >[2020/03/06 14:24:07.543727, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pixies\nobody >[2020/03/06 14:24:07.545017, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:127(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as given is PIXIES\nobody >[2020/03/06 14:24:07.545690, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:140(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is PIXIES\NOBODY >[2020/03/06 14:24:07.546515, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:152(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in pixies\nobody >[2020/03/06 14:24:07.546537, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [PIXIES\nobody]! >[2020/03/06 14:24:07.546548, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/03/06 14:24:07.546556, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/03/06 14:24:07.546567, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/03/06 14:24:07.546602, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:321(create_local_nt_token_from_info3) > Create local NT token for nobody >[2020/03/06 14:24:07.546622, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/03/06 14:24:07.546630, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/03/06 14:24:07.546639, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/03/06 14:24:07.546659, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2020/03/06 14:24:07.548671, 5, pid=734085, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:85(gencache_init) > Opening cache file at /usr/local/samba/var/lock/gencache.tdb >[2020/03/06 14:24:07.549375, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.549429, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.549441, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.549451, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.549460, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.549902, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.549941, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 99 -> S-1-22-2-99 fallback >[2020/03/06 14:24:07.549960, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.549971, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.549978, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.549986, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.549994, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550023, 3, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:688(finalize_local_nt_token) > Failed to fetch domain sid for WORKGROUP >[2020/03/06 14:24:07.550036, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550052, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550060, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550067, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550074, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550097, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550119, 10, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-544 >[2020/03/06 14:24:07.550138, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:162(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2020/03/06 14:24:07.550149, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550164, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550172, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550179, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550185, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550192, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550208, 10, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-545 >[2020/03/06 14:24:07.550219, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:132(create_builtin_users) > create_builtin_users: Failed to create Users >[2020/03/06 14:24:07.550229, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550240, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550248, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550254, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550261, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550268, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550283, 10, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/03/06 14:24:07.550293, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:205(create_builtin_guests) > create_builtin_guests: Failed to create Guests >[2020/03/06 14:24:07.550303, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550313, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550320, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550327, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550336, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550343, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550389, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550453, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2115043036-4192051364-4205911360-501] >[2020/03/06 14:24:07.550466, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2115043036-4192051364-4205911360-514] >[2020/03/06 14:24:07.550475, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-99] >[2020/03/06 14:24:07.550485, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:178(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2020/03/06 14:24:07.550497, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2020/03/06 14:24:07.550506, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-546] >[2020/03/06 14:24:07.550530, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:57(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2115043036-4192051364-4205911360-501]: value=[99:U] >[2020/03/06 14:24:07.550539, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2115043036-4192051364-4205911360-501]: id=[99], endptr=[:U] >[2020/03/06 14:24:07.550564, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1299(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2020/03/06 14:24:07.550574, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550583, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550590, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550596, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550603, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550617, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1759(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 514. >[2020/03/06 14:24:07.550626, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:07.550641, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550658, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:07.550665, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550675, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550728, 4, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:558(tdbsam_open) > tdbsam_open: successfully opened /usr/local/samba/private/passdb.tdb >[2020/03/06 14:24:07.550739, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:658(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 514 by key RID_00000202. >[2020/03/06 14:24:07.550756, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550764, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1836(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2020/03/06 14:24:07.550772, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1543(pdb_default_sid_to_id) > SID S-1-5-21-2115043036-4192051364-4205911360-514 belongs to our domain, but there is no corresponding object in the database. >[2020/03/06 14:24:07.550784, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550791, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2115043036-4192051364-4205911360-514 >[2020/03/06 14:24:07.550799, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550807, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550814, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550821, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550828, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550840, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1759(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 514. >[2020/03/06 14:24:07.550848, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:07.550856, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550862, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:07.550869, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550876, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550890, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:658(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 514 by key RID_00000202. >[2020/03/06 14:24:07.550904, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550915, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1836(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2020/03/06 14:24:07.550922, 5, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1543(pdb_default_sid_to_id) > SID S-1-5-21-2115043036-4192051364-4205911360-514 belongs to our domain, but there is no corresponding object in the database. >[2020/03/06 14:24:07.550933, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550940, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2115043036-4192051364-4205911360-514 >[2020/03/06 14:24:07.550949, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550956, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550963, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.550970, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.550976, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.550991, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.550999, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/03/06 14:24:07.551007, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551014, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551021, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551027, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551034, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551049, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551057, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/03/06 14:24:07.551064, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551072, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551078, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551085, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551092, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551108, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551116, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/03/06 14:24:07.551124, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551131, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551138, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551145, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551151, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551166, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551174, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/03/06 14:24:07.551181, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551189, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551195, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551202, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551209, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551224, 10, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/03/06 14:24:07.551236, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551243, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2020/03/06 14:24:07.551251, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551258, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551265, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551272, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551278, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551293, 10, pid=734085, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/03/06 14:24:07.551309, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551317, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2020/03/06 14:24:07.551325, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-5-21-2115043036-4192051364-4205911360-514 to gid, ignoring it >[2020/03/06 14:24:07.551334, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2020/03/06 14:24:07.551341, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2020/03/06 14:24:07.551348, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2020/03/06 14:24:07.551360, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2115043036-4192051364-4205911360-501 > SID[ 1]: S-1-5-21-2115043036-4192051364-4205911360-514 > SID[ 2]: S-1-22-2-99 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-99 > Privileges (0x 0): > Rights (0x 0): >[2020/03/06 14:24:07.551385, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 99 > Primary group is 99 and contains 1 supplementary groups > Group[ 0]: 99 >[2020/03/06 14:24:07.551407, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/03/06 14:24:07.551416, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/03/06 14:24:07.551426, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/03/06 14:24:07.551455, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1299(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2020/03/06 14:24:07.551468, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551476, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551483, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551490, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551497, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551512, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551520, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-7 >[2020/03/06 14:24:07.551528, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551535, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551544, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551551, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551557, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551572, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551580, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-7 >[2020/03/06 14:24:07.551587, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551595, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551601, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551608, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551615, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551629, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551636, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/03/06 14:24:07.551644, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551651, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551658, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551665, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551671, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551685, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551693, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/03/06 14:24:07.551701, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551708, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551715, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551721, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551729, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551746, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551753, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/03/06 14:24:07.551761, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551768, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551775, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.551782, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.551788, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.551803, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.551810, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/03/06 14:24:07.551838, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1107(auth3_session_info_create) > Could not convert SID S-1-5-7 to gid, ignoring it >[2020/03/06 14:24:07.551850, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1107(auth3_session_info_create) > Could not convert SID S-1-1-0 to gid, ignoring it >[2020/03/06 14:24:07.551857, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1107(auth3_session_info_create) > Could not convert SID S-1-5-2 to gid, ignoring it >[2020/03/06 14:24:07.551880, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2020/03/06 14:24:07.553285, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (5): > SID[ 0]: S-1-5-7 > SID[ 1]: S-1-1-0 > SID[ 2]: S-1-5-2 > SID[ 3]: S-1-22-1-99 > SID[ 4]: S-1-22-2-99 > Privileges (0x 0): > Rights (0x 0): >[2020/03/06 14:24:07.553369, 10, pid=734085, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 99 > Primary group is 99 and contains 1 supplementary groups > Group[ 0]: 99 >[2020/03/06 14:24:07.554217, 3, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/rpc_server/svcctl/srv_svcctl_reg.c:565(svcctl_init_winreg) > Initialise the svcctl registry keys if needed. >[2020/03/06 14:24:07.554248, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.554260, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.554268, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.554276, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.554284, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.554340, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.554351, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:886(regdb_open) > regdb_open: registry db opened. refcount reset (1) >[2020/03/06 14:24:07.554660, 5, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:248(make_internal_rpc_pipe_p) > make_internal_rpc_pipe_p: Create pipe requested winreg >[2020/03/06 14:24:07.554677, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe winreg >[2020/03/06 14:24:07.554688, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe winreg >[2020/03/06 14:24:07.554748, 4, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:288(make_internal_rpc_pipe_p) > Created internal pipe winreg >[2020/03/06 14:24:07.554795, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > in: struct winreg_OpenHKLM > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/03/06 14:24:07.554836, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2020/03/06 14:24:07.554854, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (1->2) >[2020/03/06 14:24:07.554864, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2020/03/06 14:24:07.554872, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2020/03/06 14:24:07.554881, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.554887, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM] >[2020/03/06 14:24:07.554919, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.554941, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > out: struct winreg_OpenHKLM > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > result : WERR_OK >[2020/03/06 14:24:07.555007, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > in: struct winreg_OpenKey > parent_handle : * > parent_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > keyname: struct winreg_String > name_len : 0x0044 (68) > name_size : 0x0044 (68) > name : * > name : 'SYSTEM\CurrentControlSet\Services' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/03/06 14:24:07.555121, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.555148, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.555160, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (2->3) >[2020/03/06 14:24:07.555170, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.555177, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.555186, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.555192, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.555210, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.555218, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.555226, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.555233, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.555242, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.555248, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.555266, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.555276, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.555285, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555292, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555300, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.555307, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555333, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.555342, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.555351, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.555370, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > out: struct winreg_OpenKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > result : WERR_OK >[2020/03/06 14:24:07.555449, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > in: struct winreg_QueryInfoKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL >[2020/03/06 14:24:07.555490, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.555512, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.555520, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555534, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:2131(regdb_get_secdesc) > regdb_get_secdesc: Getting secdesc of key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555551, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > out: struct winreg_QueryInfoKey > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL > num_subkeys : * > num_subkeys : 0x00000007 (7) > max_subkeylen : * > max_subkeylen : 0x0000001c (28) > max_classlen : * > max_classlen : 0x00000000 (0) > num_values : * > num_values : 0x00000000 (0) > max_valnamelen : * > max_valnamelen : 0x00000002 (2) > max_valbufsize : * > max_valbufsize : 0x00000000 (0) > secdescsize : * > secdescsize : 0x00000078 (120) > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.555634, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000000 (0) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.555688, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.555707, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555715, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x001a (26) > size : 0x001e (30) > name : * > name : 'LanmanServer' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.555781, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000001 (1) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.555832, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.555851, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.555858, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0012 (18) > size : 0x001e (30) > name : * > name : 'Eventlog' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.556007, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000002 (2) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.556088, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.556110, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.556120, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x000c (12) > size : 0x001e (30) > name : * > name : 'Tcpip' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.556186, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000003 (3) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.556238, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.556256, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.556264, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0012 (18) > size : 0x001e (30) > name : * > name : 'Netlogon' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.556324, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000004 (4) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.556376, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.556394, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.556401, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0010 (16) > size : 0x001e (30) > name : * > name : 'Spooler' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.556457, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000005 (5) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.556510, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.556528, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.556536, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x001e (30) > size : 0x001e (30) > name : * > name : 'RemoteRegistry' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.556597, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 > enum_index : 0x00000006 (6) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/03/06 14:24:07.556648, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.556666, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:421(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.556673, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x000a (10) > size : 0x001e (30) > name : * > name : 'WINS' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.556743, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0054 (84) > name_size : 0x0054 (84) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Spooler' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/03/06 14:24:07.556821, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.556840, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\Spooler' >[2020/03/06 14:24:07.556850, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.556862, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.556870, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.556878, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.556889, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.556897, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.556905, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.556912, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.556931, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.556939, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.556947, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.556955, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.556962, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.556970, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.556976, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.556993, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.557001, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.557009, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.557016, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.557024, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.557031, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.557039, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.557046, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.557070, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.557079, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Spooler] >[2020/03/06 14:24:07.557088, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.557096, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.557103, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.557113, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.557119, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.557134, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.557144, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.557162, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.557215, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.557265, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.557283, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Start] >[2020/03/06 14:24:07.557292, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.557303, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Spooler' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.557310, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.557324, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/03/06 14:24:07.557332, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/03/06 14:24:07.557340, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.557348, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/03/06 14:24:07.557356, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[28] >[2020/03/06 14:24:07.557364, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[66] >[2020/03/06 14:24:07.557372, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[106] >[2020/03/06 14:24:07.557380, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.557412, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.557461, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.557479, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Type] >[2020/03/06 14:24:07.557490, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.557499, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.557526, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.557573, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.557591, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ErrorControl] >[2020/03/06 14:24:07.557599, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.557607, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.557640, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/03/06 14:24:07.557733, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.557751, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ObjectName] >[2020/03/06 14:24:07.557759, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.557768, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.557797, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(28) > [0] : 0x50 (80) > [1] : 0x00 (0) > [2] : 0x72 (114) > [3] : 0x00 (0) > [4] : 0x69 (105) > [5] : 0x00 (0) > [6] : 0x6e (110) > [7] : 0x00 (0) > [8] : 0x74 (116) > [9] : 0x00 (0) > [10] : 0x20 (32) > [11] : 0x00 (0) > [12] : 0x53 (83) > [13] : 0x00 (0) > [14] : 0x70 (112) > [15] : 0x00 (0) > [16] : 0x6f (111) > [17] : 0x00 (0) > [18] : 0x6f (111) > [19] : 0x00 (0) > [20] : 0x6c (108) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x72 (114) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > size : 0x0000001c (28) >[2020/03/06 14:24:07.557899, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.557918, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:DisplayName] >[2020/03/06 14:24:07.557925, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.557934, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.557962, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(66) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x6f (111) > [13] : 0x00 (0) > [14] : 0x63 (99) > [15] : 0x00 (0) > [16] : 0x61 (97) > [17] : 0x00 (0) > [18] : 0x6c (108) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x61 (97) > [25] : 0x00 (0) > [26] : 0x6d (109) > [27] : 0x00 (0) > [28] : 0x62 (98) > [29] : 0x00 (0) > [30] : 0x61 (97) > [31] : 0x00 (0) > [32] : 0x2f (47) > [33] : 0x00 (0) > [34] : 0x6c (108) > [35] : 0x00 (0) > [36] : 0x69 (105) > [37] : 0x00 (0) > [38] : 0x62 (98) > [39] : 0x00 (0) > [40] : 0x2f (47) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x76 (118) > [45] : 0x00 (0) > [46] : 0x63 (99) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x74 (116) > [51] : 0x00 (0) > [52] : 0x6c (108) > [53] : 0x00 (0) > [54] : 0x2f (47) > [55] : 0x00 (0) > [56] : 0x73 (115) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x62 (98) > [61] : 0x00 (0) > [62] : 0x64 (100) > [63] : 0x00 (0) > [64] : 0x00 (0) > [65] : 0x00 (0) > size : 0x00000042 (66) >[2020/03/06 14:24:07.558149, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.558167, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ImagePath] >[2020/03/06 14:24:07.558175, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.558184, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.558211, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(106) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x66 (102) > [35] : 0x00 (0) > [36] : 0x6f (111) > [37] : 0x00 (0) > [38] : 0x72 (114) > [39] : 0x00 (0) > [40] : 0x20 (32) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x70 (112) > [45] : 0x00 (0) > [46] : 0x6f (111) > [47] : 0x00 (0) > [48] : 0x6f (111) > [49] : 0x00 (0) > [50] : 0x6c (108) > [51] : 0x00 (0) > [52] : 0x69 (105) > [53] : 0x00 (0) > [54] : 0x6e (110) > [55] : 0x00 (0) > [56] : 0x67 (103) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x66 (102) > [61] : 0x00 (0) > [62] : 0x69 (105) > [63] : 0x00 (0) > [64] : 0x6c (108) > [65] : 0x00 (0) > [66] : 0x65 (101) > [67] : 0x00 (0) > [68] : 0x73 (115) > [69] : 0x00 (0) > [70] : 0x20 (32) > [71] : 0x00 (0) > [72] : 0x74 (116) > [73] : 0x00 (0) > [74] : 0x6f (111) > [75] : 0x00 (0) > [76] : 0x20 (32) > [77] : 0x00 (0) > [78] : 0x70 (112) > [79] : 0x00 (0) > [80] : 0x72 (114) > [81] : 0x00 (0) > [82] : 0x69 (105) > [83] : 0x00 (0) > [84] : 0x6e (110) > [85] : 0x00 (0) > [86] : 0x74 (116) > [87] : 0x00 (0) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x64 (100) > [91] : 0x00 (0) > [92] : 0x65 (101) > [93] : 0x00 (0) > [94] : 0x76 (118) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x63 (99) > [99] : 0x00 (0) > [100] : 0x65 (101) > [101] : 0x00 (0) > [102] : 0x73 (115) > [103] : 0x00 (0) > [104] : 0x00 (0) > [105] : 0x00 (0) > size : 0x0000006a (106) >[2020/03/06 14:24:07.558489, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.558507, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Description] >[2020/03/06 14:24:07.558515, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.558523, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.558554, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.558575, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.558595, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.558612, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.558620, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.558628, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.558667, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0066 (102) > name_size : 0x0066 (102) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Spooler\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/03/06 14:24:07.558744, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.558763, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\Spooler\Security' >[2020/03/06 14:24:07.558772, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.558779, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.558789, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.558797, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.558805, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.558812, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.558820, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.558827, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.558843, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.558851, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.558858, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.558866, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.558873, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.558881, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.558888, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.558903, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.558912, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.558919, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.558926, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.558934, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.558941, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.558949, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.558956, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.558981, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.558990, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.558997, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Spooler] >[2020/03/06 14:24:07.559005, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.559012, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.559019, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.559028, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.559035, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/03/06 14:24:07.559049, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.559057, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/03/06 14:24:07.559065, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.559073, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/03/06 14:24:07.559080, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/03/06 14:24:07.559088, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.559095, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/03/06 14:24:07.559107, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.559116, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.559135, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000004-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.559243, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000004-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/03/06 14:24:07.559565, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.559587, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security:Security] >[2020/03/06 14:24:07.559596, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.559604, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.559612, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/03/06 14:24:07.559626, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/03/06 14:24:07.559636, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.559664, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000004-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.559685, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.559704, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.559721, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.559729, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.559736, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.559776, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0056 (86) > name_size : 0x0056 (86) > name : * > name : 'SYSTEM\CurrentControlSet\Services\NETLOGON' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/03/06 14:24:07.559965, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.560015, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\NETLOGON' >[2020/03/06 14:24:07.560036, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.560053, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.560069, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.560085, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.560100, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.560113, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.560133, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.560143, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.560171, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.560189, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.560207, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.560232, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.560250, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.560262, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.560269, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.560290, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.560299, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.560307, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.560314, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.560323, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.560330, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.560338, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.560345, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.560370, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.560378, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [NETLOGON] >[2020/03/06 14:24:07.560385, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.560393, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.560400, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.560409, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.560417, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.560444, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.560462, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.560482, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.560552, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.560602, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.560621, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Start] >[2020/03/06 14:24:07.560630, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.560638, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.560646, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.560659, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/03/06 14:24:07.560668, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/03/06 14:24:07.560676, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.560684, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/03/06 14:24:07.560696, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[20] >[2020/03/06 14:24:07.560705, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[66] >[2020/03/06 14:24:07.560713, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[164] >[2020/03/06 14:24:07.560722, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.560761, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.560817, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.560840, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Type] >[2020/03/06 14:24:07.560851, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.560863, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.560897, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.560964, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.560998, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ErrorControl] >[2020/03/06 14:24:07.561010, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.561021, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.561148, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/03/06 14:24:07.561318, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.561345, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ObjectName] >[2020/03/06 14:24:07.561369, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.561384, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.561464, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(20) > [0] : 0x4e (78) > [1] : 0x00 (0) > [2] : 0x65 (101) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x20 (32) > [7] : 0x00 (0) > [8] : 0x4c (76) > [9] : 0x00 (0) > [10] : 0x6f (111) > [11] : 0x00 (0) > [12] : 0x67 (103) > [13] : 0x00 (0) > [14] : 0x6f (111) > [15] : 0x00 (0) > [16] : 0x6e (110) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > size : 0x00000014 (20) >[2020/03/06 14:24:07.561556, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.561574, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:DisplayName] >[2020/03/06 14:24:07.561582, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.561592, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.561619, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(66) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x6f (111) > [13] : 0x00 (0) > [14] : 0x63 (99) > [15] : 0x00 (0) > [16] : 0x61 (97) > [17] : 0x00 (0) > [18] : 0x6c (108) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x61 (97) > [25] : 0x00 (0) > [26] : 0x6d (109) > [27] : 0x00 (0) > [28] : 0x62 (98) > [29] : 0x00 (0) > [30] : 0x61 (97) > [31] : 0x00 (0) > [32] : 0x2f (47) > [33] : 0x00 (0) > [34] : 0x6c (108) > [35] : 0x00 (0) > [36] : 0x69 (105) > [37] : 0x00 (0) > [38] : 0x62 (98) > [39] : 0x00 (0) > [40] : 0x2f (47) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x76 (118) > [45] : 0x00 (0) > [46] : 0x63 (99) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x74 (116) > [51] : 0x00 (0) > [52] : 0x6c (108) > [53] : 0x00 (0) > [54] : 0x2f (47) > [55] : 0x00 (0) > [56] : 0x73 (115) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x62 (98) > [61] : 0x00 (0) > [62] : 0x64 (100) > [63] : 0x00 (0) > [64] : 0x00 (0) > [65] : 0x00 (0) > size : 0x00000042 (66) >[2020/03/06 14:24:07.561809, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.561827, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ImagePath] >[2020/03/06 14:24:07.561835, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.561844, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.561872, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(164) > [0] : 0x46 (70) > [1] : 0x00 (0) > [2] : 0x69 (105) > [3] : 0x00 (0) > [4] : 0x6c (108) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x20 (32) > [9] : 0x00 (0) > [10] : 0x73 (115) > [11] : 0x00 (0) > [12] : 0x65 (101) > [13] : 0x00 (0) > [14] : 0x72 (114) > [15] : 0x00 (0) > [16] : 0x76 (118) > [17] : 0x00 (0) > [18] : 0x69 (105) > [19] : 0x00 (0) > [20] : 0x63 (99) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x20 (32) > [25] : 0x00 (0) > [26] : 0x70 (112) > [27] : 0x00 (0) > [28] : 0x72 (114) > [29] : 0x00 (0) > [30] : 0x6f (111) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x69 (105) > [35] : 0x00 (0) > [36] : 0x64 (100) > [37] : 0x00 (0) > [38] : 0x69 (105) > [39] : 0x00 (0) > [40] : 0x6e (110) > [41] : 0x00 (0) > [42] : 0x67 (103) > [43] : 0x00 (0) > [44] : 0x20 (32) > [45] : 0x00 (0) > [46] : 0x61 (97) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x63 (99) > [51] : 0x00 (0) > [52] : 0x65 (101) > [53] : 0x00 (0) > [54] : 0x73 (115) > [55] : 0x00 (0) > [56] : 0x73 (115) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x74 (116) > [61] : 0x00 (0) > [62] : 0x6f (111) > [63] : 0x00 (0) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x70 (112) > [67] : 0x00 (0) > [68] : 0x6f (111) > [69] : 0x00 (0) > [70] : 0x6c (108) > [71] : 0x00 (0) > [72] : 0x69 (105) > [73] : 0x00 (0) > [74] : 0x63 (99) > [75] : 0x00 (0) > [76] : 0x79 (121) > [77] : 0x00 (0) > [78] : 0x20 (32) > [79] : 0x00 (0) > [80] : 0x61 (97) > [81] : 0x00 (0) > [82] : 0x6e (110) > [83] : 0x00 (0) > [84] : 0x64 (100) > [85] : 0x00 (0) > [86] : 0x20 (32) > [87] : 0x00 (0) > [88] : 0x70 (112) > [89] : 0x00 (0) > [90] : 0x72 (114) > [91] : 0x00 (0) > [92] : 0x6f (111) > [93] : 0x00 (0) > [94] : 0x66 (102) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x6c (108) > [99] : 0x00 (0) > [100] : 0x65 (101) > [101] : 0x00 (0) > [102] : 0x20 (32) > [103] : 0x00 (0) > [104] : 0x64 (100) > [105] : 0x00 (0) > [106] : 0x61 (97) > [107] : 0x00 (0) > [108] : 0x74 (116) > [109] : 0x00 (0) > [110] : 0x61 (97) > [111] : 0x00 (0) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x28 (40) > [115] : 0x00 (0) > [116] : 0x6e (110) > [117] : 0x00 (0) > [118] : 0x6f (111) > [119] : 0x00 (0) > [120] : 0x74 (116) > [121] : 0x00 (0) > [122] : 0x72 (114) > [123] : 0x00 (0) > [124] : 0x65 (101) > [125] : 0x00 (0) > [126] : 0x6d (109) > [127] : 0x00 (0) > [128] : 0x6f (111) > [129] : 0x00 (0) > [130] : 0x74 (116) > [131] : 0x00 (0) > [132] : 0x65 (101) > [133] : 0x00 (0) > [134] : 0x6c (108) > [135] : 0x00 (0) > [136] : 0x79 (121) > [137] : 0x00 (0) > [138] : 0x20 (32) > [139] : 0x00 (0) > [140] : 0x6d (109) > [141] : 0x00 (0) > [142] : 0x61 (97) > [143] : 0x00 (0) > [144] : 0x6e (110) > [145] : 0x00 (0) > [146] : 0x61 (97) > [147] : 0x00 (0) > [148] : 0x67 (103) > [149] : 0x00 (0) > [150] : 0x65 (101) > [151] : 0x00 (0) > [152] : 0x61 (97) > [153] : 0x00 (0) > [154] : 0x62 (98) > [155] : 0x00 (0) > [156] : 0x6c (108) > [157] : 0x00 (0) > [158] : 0x65 (101) > [159] : 0x00 (0) > [160] : 0x29 (41) > [161] : 0x00 (0) > [162] : 0x00 (0) > [163] : 0x00 (0) > size : 0x000000a4 (164) >[2020/03/06 14:24:07.562278, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.562299, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Description] >[2020/03/06 14:24:07.562307, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.562316, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.562349, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.562371, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.562389, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.562406, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.562415, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.562424, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.562464, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0068 (104) > name_size : 0x0068 (104) > name : * > name : 'SYSTEM\CurrentControlSet\Services\NETLOGON\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/03/06 14:24:07.562545, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.562564, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\NETLOGON\Security' >[2020/03/06 14:24:07.562573, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.562581, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.562589, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.562597, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.562606, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.562613, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.562623, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.562629, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.562651, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.562659, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.562667, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.562675, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.562682, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.562691, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.562698, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.562716, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.562725, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.562732, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.562739, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.562747, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.562754, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.562763, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.562769, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.562793, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.562801, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.562809, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [NETLOGON] >[2020/03/06 14:24:07.562816, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.562823, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.562830, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.562840, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.562846, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/03/06 14:24:07.562862, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.562870, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/03/06 14:24:07.562878, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.562885, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/03/06 14:24:07.562894, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/03/06 14:24:07.562904, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.562910, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/03/06 14:24:07.562923, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.562932, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.562951, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000006-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.563004, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000006-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/03/06 14:24:07.563315, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.563334, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security:Security] >[2020/03/06 14:24:07.563342, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.563350, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.563357, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/03/06 14:24:07.563370, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/03/06 14:24:07.563379, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.563407, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000006-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.563429, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.563449, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.563467, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.563474, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.563481, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.563529, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0062 (98) > name_size : 0x0062 (98) > name : * > name : 'SYSTEM\CurrentControlSet\Services\RemoteRegistry' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/03/06 14:24:07.563617, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.563636, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\RemoteRegistry' >[2020/03/06 14:24:07.563644, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.563652, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.563673, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.563681, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.563689, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.563696, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.563858, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.563882, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.563924, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.563940, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.563952, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.563966, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.563977, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.563989, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.563998, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.564023, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.564036, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.564047, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.564059, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.564079, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.564092, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.564107, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.564117, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.564178, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.564196, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [RemoteRegistry] >[2020/03/06 14:24:07.564213, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.564230, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.564240, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.564261, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.564274, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.564300, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.564319, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.564359, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.564482, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.564590, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.564631, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Start] >[2020/03/06 14:24:07.564651, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.564666, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.564681, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.564710, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/03/06 14:24:07.564729, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/03/06 14:24:07.564747, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.564764, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/03/06 14:24:07.564782, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[48] >[2020/03/06 14:24:07.564801, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[66] >[2020/03/06 14:24:07.564818, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[126] >[2020/03/06 14:24:07.564832, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.564899, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.565005, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.565050, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Type] >[2020/03/06 14:24:07.565066, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.565084, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.565144, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.565243, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.565289, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ErrorControl] >[2020/03/06 14:24:07.565305, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.565322, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.565383, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/03/06 14:24:07.565565, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.565587, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ObjectName] >[2020/03/06 14:24:07.565596, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.565607, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.565646, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(48) > [0] : 0x52 (82) > [1] : 0x00 (0) > [2] : 0x65 (101) > [3] : 0x00 (0) > [4] : 0x6d (109) > [5] : 0x00 (0) > [6] : 0x6f (111) > [7] : 0x00 (0) > [8] : 0x74 (116) > [9] : 0x00 (0) > [10] : 0x65 (101) > [11] : 0x00 (0) > [12] : 0x20 (32) > [13] : 0x00 (0) > [14] : 0x52 (82) > [15] : 0x00 (0) > [16] : 0x65 (101) > [17] : 0x00 (0) > [18] : 0x67 (103) > [19] : 0x00 (0) > [20] : 0x69 (105) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x74 (116) > [25] : 0x00 (0) > [26] : 0x72 (114) > [27] : 0x00 (0) > [28] : 0x79 (121) > [29] : 0x00 (0) > [30] : 0x20 (32) > [31] : 0x00 (0) > [32] : 0x53 (83) > [33] : 0x00 (0) > [34] : 0x65 (101) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x76 (118) > [39] : 0x00 (0) > [40] : 0x69 (105) > [41] : 0x00 (0) > [42] : 0x63 (99) > [43] : 0x00 (0) > [44] : 0x65 (101) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > size : 0x00000030 (48) >[2020/03/06 14:24:07.565795, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.565814, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:DisplayName] >[2020/03/06 14:24:07.565822, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.565831, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.565860, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(66) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x6f (111) > [13] : 0x00 (0) > [14] : 0x63 (99) > [15] : 0x00 (0) > [16] : 0x61 (97) > [17] : 0x00 (0) > [18] : 0x6c (108) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x61 (97) > [25] : 0x00 (0) > [26] : 0x6d (109) > [27] : 0x00 (0) > [28] : 0x62 (98) > [29] : 0x00 (0) > [30] : 0x61 (97) > [31] : 0x00 (0) > [32] : 0x2f (47) > [33] : 0x00 (0) > [34] : 0x6c (108) > [35] : 0x00 (0) > [36] : 0x69 (105) > [37] : 0x00 (0) > [38] : 0x62 (98) > [39] : 0x00 (0) > [40] : 0x2f (47) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x76 (118) > [45] : 0x00 (0) > [46] : 0x63 (99) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x74 (116) > [51] : 0x00 (0) > [52] : 0x6c (108) > [53] : 0x00 (0) > [54] : 0x2f (47) > [55] : 0x00 (0) > [56] : 0x73 (115) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x62 (98) > [61] : 0x00 (0) > [62] : 0x64 (100) > [63] : 0x00 (0) > [64] : 0x00 (0) > [65] : 0x00 (0) > size : 0x00000042 (66) >[2020/03/06 14:24:07.566047, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.566069, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ImagePath] >[2020/03/06 14:24:07.566077, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.566086, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.566124, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(126) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x70 (112) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x6f (111) > [39] : 0x00 (0) > [40] : 0x76 (118) > [41] : 0x00 (0) > [42] : 0x69 (105) > [43] : 0x00 (0) > [44] : 0x64 (100) > [45] : 0x00 (0) > [46] : 0x69 (105) > [47] : 0x00 (0) > [48] : 0x6e (110) > [49] : 0x00 (0) > [50] : 0x67 (103) > [51] : 0x00 (0) > [52] : 0x20 (32) > [53] : 0x00 (0) > [54] : 0x72 (114) > [55] : 0x00 (0) > [56] : 0x65 (101) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x6f (111) > [61] : 0x00 (0) > [62] : 0x74 (116) > [63] : 0x00 (0) > [64] : 0x65 (101) > [65] : 0x00 (0) > [66] : 0x20 (32) > [67] : 0x00 (0) > [68] : 0x61 (97) > [69] : 0x00 (0) > [70] : 0x63 (99) > [71] : 0x00 (0) > [72] : 0x63 (99) > [73] : 0x00 (0) > [74] : 0x65 (101) > [75] : 0x00 (0) > [76] : 0x73 (115) > [77] : 0x00 (0) > [78] : 0x73 (115) > [79] : 0x00 (0) > [80] : 0x20 (32) > [81] : 0x00 (0) > [82] : 0x74 (116) > [83] : 0x00 (0) > [84] : 0x6f (111) > [85] : 0x00 (0) > [86] : 0x20 (32) > [87] : 0x00 (0) > [88] : 0x74 (116) > [89] : 0x00 (0) > [90] : 0x68 (104) > [91] : 0x00 (0) > [92] : 0x65 (101) > [93] : 0x00 (0) > [94] : 0x20 (32) > [95] : 0x00 (0) > [96] : 0x53 (83) > [97] : 0x00 (0) > [98] : 0x61 (97) > [99] : 0x00 (0) > [100] : 0x6d (109) > [101] : 0x00 (0) > [102] : 0x62 (98) > [103] : 0x00 (0) > [104] : 0x61 (97) > [105] : 0x00 (0) > [106] : 0x20 (32) > [107] : 0x00 (0) > [108] : 0x72 (114) > [109] : 0x00 (0) > [110] : 0x65 (101) > [111] : 0x00 (0) > [112] : 0x67 (103) > [113] : 0x00 (0) > [114] : 0x69 (105) > [115] : 0x00 (0) > [116] : 0x73 (115) > [117] : 0x00 (0) > [118] : 0x74 (116) > [119] : 0x00 (0) > [120] : 0x72 (114) > [121] : 0x00 (0) > [122] : 0x79 (121) > [123] : 0x00 (0) > [124] : 0x00 (0) > [125] : 0x00 (0) > size : 0x0000007e (126) >[2020/03/06 14:24:07.566446, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.566464, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Description] >[2020/03/06 14:24:07.566473, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.566482, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.566511, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.566533, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.566551, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.566568, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.566577, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.566585, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.566625, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0074 (116) > name_size : 0x0074 (116) > name : * > name : 'SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/03/06 14:24:07.566706, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.566725, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' >[2020/03/06 14:24:07.566735, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.566742, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.566750, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.566758, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.566766, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.566774, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.566783, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.566790, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.566809, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.566820, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.566828, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.566836, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.566843, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.566851, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.566858, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.566875, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.566883, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.566891, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.566898, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.566906, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.566913, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.566922, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.566928, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.566953, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.566962, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.566969, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [RemoteRegistry] >[2020/03/06 14:24:07.566976, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.566984, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.566991, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.567002, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.567009, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/03/06 14:24:07.567023, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.567031, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/03/06 14:24:07.567039, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.567046, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/03/06 14:24:07.567054, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/03/06 14:24:07.567062, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.567069, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/03/06 14:24:07.567081, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.567091, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.567110, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000008-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.567166, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000008-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/03/06 14:24:07.567479, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.567498, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security:Security] >[2020/03/06 14:24:07.567506, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.567514, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.567521, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/03/06 14:24:07.567536, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/03/06 14:24:07.567545, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.567718, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000008-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.567763, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.567785, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.567803, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.567811, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.567819, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.567869, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x004e (78) > name_size : 0x004e (78) > name : * > name : 'SYSTEM\CurrentControlSet\Services\WINS' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/03/06 14:24:07.567954, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.567973, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\WINS' >[2020/03/06 14:24:07.567983, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.567992, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.567999, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.568007, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.568016, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.568024, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.568033, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.568039, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.568059, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.568068, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.568075, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.568083, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.568090, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.568099, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.568105, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.568125, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.568134, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.568143, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.568150, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.568158, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.568165, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.568174, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.568180, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.568205, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.568213, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [WINS] >[2020/03/06 14:24:07.568221, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.568228, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.568235, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.568244, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.568251, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.568264, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.568274, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.568293, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.568342, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.568416, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.568437, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Start] >[2020/03/06 14:24:07.568446, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.568454, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\WINS' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.568462, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.568476, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/03/06 14:24:07.568486, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/03/06 14:24:07.568493, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.568501, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/03/06 14:24:07.568509, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[74] >[2020/03/06 14:24:07.568517, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[66] >[2020/03/06 14:24:07.568532, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[178] >[2020/03/06 14:24:07.568548, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.568583, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.568636, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.568654, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Type] >[2020/03/06 14:24:07.568662, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.568671, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.568698, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/03/06 14:24:07.568746, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.568764, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ErrorControl] >[2020/03/06 14:24:07.568771, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.568780, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.568810, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/03/06 14:24:07.568904, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.568922, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ObjectName] >[2020/03/06 14:24:07.568930, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.568938, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.568967, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(74) > [0] : 0x57 (87) > [1] : 0x00 (0) > [2] : 0x69 (105) > [3] : 0x00 (0) > [4] : 0x6e (110) > [5] : 0x00 (0) > [6] : 0x64 (100) > [7] : 0x00 (0) > [8] : 0x6f (111) > [9] : 0x00 (0) > [10] : 0x77 (119) > [11] : 0x00 (0) > [12] : 0x73 (115) > [13] : 0x00 (0) > [14] : 0x20 (32) > [15] : 0x00 (0) > [16] : 0x49 (73) > [17] : 0x00 (0) > [18] : 0x6e (110) > [19] : 0x00 (0) > [20] : 0x74 (116) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x72 (114) > [25] : 0x00 (0) > [26] : 0x6e (110) > [27] : 0x00 (0) > [28] : 0x65 (101) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x4e (78) > [35] : 0x00 (0) > [36] : 0x61 (97) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x65 (101) > [41] : 0x00 (0) > [42] : 0x20 (32) > [43] : 0x00 (0) > [44] : 0x53 (83) > [45] : 0x00 (0) > [46] : 0x65 (101) > [47] : 0x00 (0) > [48] : 0x72 (114) > [49] : 0x00 (0) > [50] : 0x76 (118) > [51] : 0x00 (0) > [52] : 0x69 (105) > [53] : 0x00 (0) > [54] : 0x63 (99) > [55] : 0x00 (0) > [56] : 0x65 (101) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x28 (40) > [61] : 0x00 (0) > [62] : 0x57 (87) > [63] : 0x00 (0) > [64] : 0x49 (73) > [65] : 0x00 (0) > [66] : 0x4e (78) > [67] : 0x00 (0) > [68] : 0x53 (83) > [69] : 0x00 (0) > [70] : 0x29 (41) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > size : 0x0000004a (74) >[2020/03/06 14:24:07.569174, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.569192, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:DisplayName] >[2020/03/06 14:24:07.569200, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.569209, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.569239, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(66) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x6f (111) > [13] : 0x00 (0) > [14] : 0x63 (99) > [15] : 0x00 (0) > [16] : 0x61 (97) > [17] : 0x00 (0) > [18] : 0x6c (108) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x61 (97) > [25] : 0x00 (0) > [26] : 0x6d (109) > [27] : 0x00 (0) > [28] : 0x62 (98) > [29] : 0x00 (0) > [30] : 0x61 (97) > [31] : 0x00 (0) > [32] : 0x2f (47) > [33] : 0x00 (0) > [34] : 0x6c (108) > [35] : 0x00 (0) > [36] : 0x69 (105) > [37] : 0x00 (0) > [38] : 0x62 (98) > [39] : 0x00 (0) > [40] : 0x2f (47) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x76 (118) > [45] : 0x00 (0) > [46] : 0x63 (99) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x74 (116) > [51] : 0x00 (0) > [52] : 0x6c (108) > [53] : 0x00 (0) > [54] : 0x2f (47) > [55] : 0x00 (0) > [56] : 0x6e (110) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x62 (98) > [61] : 0x00 (0) > [62] : 0x64 (100) > [63] : 0x00 (0) > [64] : 0x00 (0) > [65] : 0x00 (0) > size : 0x00000042 (66) >[2020/03/06 14:24:07.569427, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.569446, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ImagePath] >[2020/03/06 14:24:07.569454, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.569462, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.569489, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(178) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x70 (112) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x6f (111) > [39] : 0x00 (0) > [40] : 0x76 (118) > [41] : 0x00 (0) > [42] : 0x69 (105) > [43] : 0x00 (0) > [44] : 0x64 (100) > [45] : 0x00 (0) > [46] : 0x69 (105) > [47] : 0x00 (0) > [48] : 0x6e (110) > [49] : 0x00 (0) > [50] : 0x67 (103) > [51] : 0x00 (0) > [52] : 0x20 (32) > [53] : 0x00 (0) > [54] : 0x61 (97) > [55] : 0x00 (0) > [56] : 0x20 (32) > [57] : 0x00 (0) > [58] : 0x4e (78) > [59] : 0x00 (0) > [60] : 0x65 (101) > [61] : 0x00 (0) > [62] : 0x74 (116) > [63] : 0x00 (0) > [64] : 0x42 (66) > [65] : 0x00 (0) > [66] : 0x49 (73) > [67] : 0x00 (0) > [68] : 0x4f (79) > [69] : 0x00 (0) > [70] : 0x53 (83) > [71] : 0x00 (0) > [72] : 0x20 (32) > [73] : 0x00 (0) > [74] : 0x70 (112) > [75] : 0x00 (0) > [76] : 0x6f (111) > [77] : 0x00 (0) > [78] : 0x69 (105) > [79] : 0x00 (0) > [80] : 0x6e (110) > [81] : 0x00 (0) > [82] : 0x74 (116) > [83] : 0x00 (0) > [84] : 0x2d (45) > [85] : 0x00 (0) > [86] : 0x74 (116) > [87] : 0x00 (0) > [88] : 0x6f (111) > [89] : 0x00 (0) > [90] : 0x2d (45) > [91] : 0x00 (0) > [92] : 0x70 (112) > [93] : 0x00 (0) > [94] : 0x6f (111) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x6e (110) > [99] : 0x00 (0) > [100] : 0x74 (116) > [101] : 0x00 (0) > [102] : 0x20 (32) > [103] : 0x00 (0) > [104] : 0x6e (110) > [105] : 0x00 (0) > [106] : 0x61 (97) > [107] : 0x00 (0) > [108] : 0x6d (109) > [109] : 0x00 (0) > [110] : 0x65 (101) > [111] : 0x00 (0) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x73 (115) > [115] : 0x00 (0) > [116] : 0x65 (101) > [117] : 0x00 (0) > [118] : 0x72 (114) > [119] : 0x00 (0) > [120] : 0x76 (118) > [121] : 0x00 (0) > [122] : 0x65 (101) > [123] : 0x00 (0) > [124] : 0x72 (114) > [125] : 0x00 (0) > [126] : 0x28 (40) > [127] : 0x00 (0) > [128] : 0x6e (110) > [129] : 0x00 (0) > [130] : 0x6f (111) > [131] : 0x00 (0) > [132] : 0x74 (116) > [133] : 0x00 (0) > [134] : 0x20 (32) > [135] : 0x00 (0) > [136] : 0x72 (114) > [137] : 0x00 (0) > [138] : 0x65 (101) > [139] : 0x00 (0) > [140] : 0x6d (109) > [141] : 0x00 (0) > [142] : 0x6f (111) > [143] : 0x00 (0) > [144] : 0x74 (116) > [145] : 0x00 (0) > [146] : 0x65 (101) > [147] : 0x00 (0) > [148] : 0x6c (108) > [149] : 0x00 (0) > [150] : 0x79 (121) > [151] : 0x00 (0) > [152] : 0x20 (32) > [153] : 0x00 (0) > [154] : 0x6d (109) > [155] : 0x00 (0) > [156] : 0x61 (97) > [157] : 0x00 (0) > [158] : 0x6e (110) > [159] : 0x00 (0) > [160] : 0x61 (97) > [161] : 0x00 (0) > [162] : 0x67 (103) > [163] : 0x00 (0) > [164] : 0x65 (101) > [165] : 0x00 (0) > [166] : 0x61 (97) > [167] : 0x00 (0) > [168] : 0x62 (98) > [169] : 0x00 (0) > [170] : 0x6c (108) > [171] : 0x00 (0) > [172] : 0x65 (101) > [173] : 0x00 (0) > [174] : 0x29 (41) > [175] : 0x00 (0) > [176] : 0x00 (0) > [177] : 0x00 (0) > size : 0x000000b2 (178) >[2020/03/06 14:24:07.569927, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.569946, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Description] >[2020/03/06 14:24:07.569954, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.569962, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.569989, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.570012, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.570030, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.570048, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.570056, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.570064, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.570105, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0060 (96) > name_size : 0x0060 (96) > name : * > name : 'SYSTEM\CurrentControlSet\Services\WINS\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/03/06 14:24:07.570184, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.570203, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:701(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\WINS\Security' >[2020/03/06 14:24:07.570212, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.570222, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.570230, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.570237, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.570246, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.570253, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.570261, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.570268, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.570285, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.570293, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.570300, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.570308, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.570315, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.570324, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.570330, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.570347, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.570355, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.570363, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.570370, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.570378, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.570385, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.570393, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.570402, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.570426, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.570434, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 2 >[2020/03/06 14:24:07.570442, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [WINS] >[2020/03/06 14:24:07.570449, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.570457, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.570464, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.570472, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.570479, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/03/06 14:24:07.570493, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.570501, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/03/06 14:24:07.570509, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.570516, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/03/06 14:24:07.570523, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/03/06 14:24:07.570531, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.570538, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/03/06 14:24:07.570550, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.570560, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.570578, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-625e-e74085330b00 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/03/06 14:24:07.570632, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-625e-e74085330b00 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/03/06 14:24:07.570944, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.570963, 8, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:731(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security:Security] >[2020/03/06 14:24:07.570971, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/usr/local/samba/var/locks/registry.tdb): tdb_transaction_start: nesting 1 >[2020/03/06 14:24:07.570979, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.570986, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/03/06 14:24:07.570999, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/03/06 14:24:07.571008, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/03/06 14:24:07.571035, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.571056, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.571075, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.571092, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.571099, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.571107, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.571139, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.571162, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.571180, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.571197, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.571206, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (3->2) >[2020/03/06 14:24:07.571213, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.571247, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (2->1) >[2020/03/06 14:24:07.571265, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (1->0) >[2020/03/06 14:24:07.571296, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:416(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection winreg >[2020/03/06 14:24:07.571344, 3, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/rpc_server/eventlog/srv_eventlog_reg.c:59(eventlog_init_winreg) > Initialise the eventlog registry keys if needed. >[2020/03/06 14:24:07.571368, 5, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:248(make_internal_rpc_pipe_p) > make_internal_rpc_pipe_p: Create pipe requested winreg >[2020/03/06 14:24:07.571379, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe winreg >[2020/03/06 14:24:07.571389, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe winreg >[2020/03/06 14:24:07.571431, 4, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:288(make_internal_rpc_pipe_p) > Created internal pipe winreg >[2020/03/06 14:24:07.571452, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > in: struct winreg_OpenHKLM > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/03/06 14:24:07.571700, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2020/03/06 14:24:07.571748, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.571766, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.571775, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:07.571785, 5, pid=734085, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:07.571794, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:07.571885, 4, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:07.571898, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:886(regdb_open) > regdb_open: registry db opened. refcount reset (1) >[2020/03/06 14:24:07.571909, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2020/03/06 14:24:07.571917, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2020/03/06 14:24:07.571926, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.571933, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM] >[2020/03/06 14:24:07.571963, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 0B 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.571986, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > out: struct winreg_OpenHKLM > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000b-0000-0000-625e-e74085330b00 > result : WERR_OK >[2020/03/06 14:24:07.572053, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > in: struct winreg_OpenKey > parent_handle : * > parent_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000b-0000-0000-625e-e74085330b00 > keyname: struct winreg_String > name_len : 0x0056 (86) > name_size : 0x0056 (86) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Eventlog' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/03/06 14:24:07.572122, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0B 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.572147, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/03/06 14:24:07.572156, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (1->2) >[2020/03/06 14:24:07.572164, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/03/06 14:24:07.572172, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/03/06 14:24:07.572181, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.572187, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM] >[2020/03/06 14:24:07.572206, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/03/06 14:24:07.572215, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (2->3) >[2020/03/06 14:24:07.572223, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.572230, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.572238, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.572245, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/03/06 14:24:07.572263, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/03/06 14:24:07.572272, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/03/06 14:24:07.572280, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.572287, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.572295, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.572305, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/03/06 14:24:07.572334, 7, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Eventlog] >[2020/03/06 14:24:07.572342, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/03/06 14:24:07.572350, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.572358, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.572367, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/03/06 14:24:07.572374, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f25395602c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.572392, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/03/06 14:24:07.572403, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/03/06 14:24:07.572412, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (3->2) >[2020/03/06 14:24:07.572422, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:304(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.572444, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > out: struct winreg_OpenKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000c-0000-0000-625e-e74085330b00 > result : WERR_OK >[2020/03/06 14:24:07.572513, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > in: struct winreg_QueryInfoKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000c-0000-0000-625e-e74085330b00 > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL >[2020/03/06 14:24:07.572558, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.572584, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Eventlog' (ops 0x7f25395602c0) >[2020/03/06 14:24:07.572600, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.572757, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2020/03/06 14:24:07.572838, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2020/03/06 14:24:07.572854, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:2131(regdb_get_secdesc) > regdb_get_secdesc: Getting secdesc of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/03/06 14:24:07.572888, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > out: struct winreg_QueryInfoKey > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL > num_subkeys : * > num_subkeys : 0x00000000 (0) > max_subkeylen : * > max_subkeylen : 0x00000000 (0) > max_classlen : * > max_classlen : 0x00000000 (0) > num_values : * > num_values : 0x00000002 (2) > max_valnamelen : * > max_valnamelen : 0x0000001a (26) > max_valbufsize : * > max_valbufsize : 0x00000014 (20) > secdescsize : * > secdescsize : 0x00000078 (120) > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/03/06 14:24:07.573027, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000c-0000-0000-625e-e74085330b00 >[2020/03/06 14:24:07.573061, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.573158, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:339(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 62 5E E7 40 ........ ....b^.@ > [0010] 85 33 0B 00 .3.. >[2020/03/06 14:24:07.573185, 6, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:388(close_policy_hnd) > Closed policy >[2020/03/06 14:24:07.573195, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (2->1) >[2020/03/06 14:24:07.573205, 1, pid=734085, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:478(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/03/06 14:24:07.573255, 10, pid=734085, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (1->0) >[2020/03/06 14:24:07.573291, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:416(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection winreg >[2020/03/06 14:24:07.573326, 5, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_service_setup.c:624(dcesrv_ep_setup) > dcesrv_ep_setup: Initializing DCE/RPC modules >[2020/03/06 14:24:07.573344, 10, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/mdssvc/srv_mdssvc_nt.c:105(rpc_mdssvc_module_init) > rpc_mdssvc_module_init: Registering mdsvc RPC service >[2020/03/06 14:24:07.573356, 3, pid=734085, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_modules.c:64(register_rpc_module) > register_rpc_module: Successfully added RPC module 'mdssvc' >[2020/03/06 14:24:07.573402, 0, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/become_daemon.c:135(daemon_ready) > daemon_ready: daemon 'smbd' finished starting up and ready to serve connections >[2020/03/06 14:24:07.574120, 7, pid=734085, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4305(lp_servicenumber) > lp_servicenumber: couldn't find print$ >[2020/03/06 14:24:07.574140, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/printing/nt_printing.c:95(print_driver_directories_init) > No print$ share has been configured. >[2020/03/06 14:24:07.574165, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 515 - private_data=(nil) >[2020/03/06 14:24:07.574178, 3, pid=734085, effective(0, 0), real(0, 0)] ../../source3/printing/queue_process.c:329(start_background_queue) > start_background_queue: Starting background LPQ thread >[2020/03/06 14:24:07.574980, 5, pid=734089, effective(0, 0), real(0, 0)] ../../source3/printing/queue_process.c:365(start_background_queue) >[2020/03/06 14:24:07.575067, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > start_background_queue: background LPQ thread started > bind succeeded on port 445 >[2020/03/06 14:24:07.575168, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.575240, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.575364, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 139 >[2020/03/06 14:24:07.575710, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.575795, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 >[2020/03/06 14:24:07.575798, 10, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > msg_dgm_ref_destructor: refs=(nil) > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.576012, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 445 >[2020/03/06 14:24:07.576050, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.576113, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.576200, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 139 >[2020/03/06 14:24:07.576222, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.576285, 5, pid=734085, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: >[2020/03/06 14:24:07.576285, 10, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > messaging_dgm_ref: messaging_dgm_init returned Success > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 >[2020/03/06 14:24:07.576322, 10, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > SO_RCVLOWAT = 1 > messaging_dgm_ref: unique = 6625498308337155519 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:07.576350, 2, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/03/06 14:24:07.576361, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 13 - private_data=(nil) >[2020/03/06 14:24:07.576383, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 33 - private_data=0x55aaa19f3a40 >[2020/03/06 14:24:07.576395, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) >[2020/03/06 14:24:07.576386, 5, pid=734089, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Registering messaging pointer for type 783 - private_data=(nil) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/03/06 14:24:07.576406, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2020/03/06 14:24:07.576410, 5, pid=734089, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/03/06 14:24:07.576417, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:739(messaging_register) > Overriding messaging pointer for type 1 - private_data=(nil) >[2020/03/06 14:24:07.576426, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 770 - private_data=(nil) >[2020/03/06 14:24:07.576437, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 801 - private_data=(nil) >[2020/03/06 14:24:07.576447, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 790 - private_data=(nil) >[2020/03/06 14:24:07.576453, 5, pid=734089, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) >[2020/03/06 14:24:07.576457, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > pdb backend tdbsam has a valid init > Registering messaging pointer for type 791 - private_data=(nil) >[2020/03/06 14:24:07.576468, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2020/03/06 14:24:07.576478, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 16 - private_data=(nil) >[2020/03/06 14:24:07.576481, 5, pid=734089, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 >[2020/03/06 14:24:07.576489, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > printdrivers: 10 > lanman: 10 > smb: 10 > Registering messaging pointer for type 799 - private_data=(nil) > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 >[2020/03/06 14:24:07.576506, 5, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > auth: 10 > Registering messaging pointer for type 800 - private_data=(nil) > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:07.577453, 4, pid=734089, effective(0, 0), real(0, 0)] ../../source3/printing/queue_process.c:177(printing_subsystem_queue_tasks) > background print queue housekeeping disabled >[2020/03/06 14:24:07.577490, 5, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 33 - private_data=0x55aaa1a2f8f0 >[2020/03/06 14:24:07.577511, 5, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 517 - private_data=(nil) >[2020/03/06 14:24:07.577524, 5, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 515 - private_data=(nil) >[2020/03/06 14:24:07.577536, 5, pid=734089, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 515 - private_data=(nil) >[2020/03/06 14:24:07.577557, 3, pid=734089, effective(0, 0), real(0, 0)] ../../source3/printing/pcap.c:140(pcap_cache_reload) > reloading printcap cache >[2020/03/06 14:24:07.577570, 3, pid=734089, effective(0, 0), real(0, 0)] ../../source3/printing/pcap.c:143(pcap_cache_reload) > pcap_cache_reload: skipping reload - load printers disabled >[2020/03/06 14:24:07.577581, 5, pid=734089, effective(0, 0), real(0, 0)] ../../source3/printing/queue_process.c:419(start_background_queue) > start_background_queue: background LPQ thread waiting for messages >[2020/03/06 14:24:07.577815, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/avahi_register.c:119(avahi_client_callback) > avahi_client_callback: AVAHI_CLIENT_S_RUNNING >[2020/03/06 14:24:07.578055, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/avahi_register.c:92(avahi_entry_group_callback) > avahi_entry_group_callback: AVAHI_ENTRY_GROUP_UNCOMMITED >[2020/03/06 14:24:07.578701, 1, pid=734085, effective(0, 0), real(0, 0)] ../../source3/printing/printer_list.c:234(printer_list_get_last_refresh) > Failed to fetch record! >[2020/03/06 14:24:07.578738, 2, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1357(smbd_parent_loop) > waiting for connections >[2020/03/06 14:24:07.578759, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/avahi_register.c:95(avahi_entry_group_callback) > avahi_entry_group_callback: AVAHI_ENTRY_GROUP_REGISTERING >[2020/03/06 14:24:07.578786, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:426(messaging_recv_cb) > messaging_recv_cb: Received message 0x31f len 0 (num_fds:0) from 734087 >[2020/03/06 14:24:07.578846, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1444(messaging_dgm_send) > messaging_dgm_send: Sending message to 734088 >[2020/03/06 14:24:07.578886, 10, pid=734088, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:426(messaging_recv_cb) > messaging_recv_cb: Received message 0x31f len 0 (num_fds:0) from 734085 >[2020/03/06 14:24:07.578947, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1444(messaging_dgm_send) > messaging_dgm_send: Sending message to 734087 >[2020/03/06 14:24:07.578974, 10, pid=734087, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:426(messaging_recv_cb) > messaging_recv_cb: Received message 0x31f len 0 (num_fds:0) from 734085 >[2020/03/06 14:24:08.490423, 10, pid=734085, effective(0, 0), real(0, 0)] ../../source3/smbd/avahi_register.c:80(avahi_entry_group_callback) > avahi_entry_group_callback: AVAHI_ENTRY_GROUP_ESTABLISHED >[2020/03/06 14:24:13.061398, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/03/06 14:24:13.061986, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2020/03/06 14:24:13.062047, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 15857413161931127086 >[2020/03/06 14:24:13.062083, 2, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/03/06 14:24:13.062119, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/03/06 14:24:13.062153, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/03/06 14:24:13.062205, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/03/06 14:24:13.062248, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:535(smbXsrv_client_create) >[2020/03/06 14:24:13.062268, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:542(smbXsrv_client_create) > smbXsrv_client_create: client_guid[00000000-0000-0000-0000-000000000000] stored >[2020/03/06 14:24:13.062297, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : NULL > remote_address : NULL > remote_name : NULL > initial_connect_time : Fri Mar 6 02:24:13 PM 2020 IST > client_guid : 00000000-0000-0000-0000-000000000000 > stored : 0x00 (0) > sconn : NULL > session_table : NULL > tcon_table : NULL > open_table : NULL > connections : NULL > server_multi_channel_enabled: 0x00 (0) >[2020/03/06 14:24:13.062555, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 87040 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:13.062640, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 87040 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/03/06 14:24:13.075919, 0, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:823(matchname) > matchname: host name/name mismatch: 192.168.0.120 != (NULL) >[2020/03/06 14:24:13.076969, 0, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:1005(get_remote_hostname) > matchname failed on 192.168.0.120 >[2020/03/06 14:24:13.077090, 3, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/access.c:369(allow_access) > Allowed connection from 192.168.0.120 (192.168.0.120) >[2020/03/06 14:24:13.077133, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:3875(smbd_add_connection) > Connection allowed from ipv4:192.168.0.120:65140 to ipv4:192.168.0.110:445 >[2020/03/06 14:24:13.078047, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:13.078341, 6, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2356(lp_file_list_changed) > lp_file_list_changed() > file /usr/local/samba/etc/smb.conf -> /usr/local/samba/etc/smb.conf last mod_time: Fri Mar 6 14:21:52 2020 > >[2020/03/06 14:24:13.078406, 3, pid=734090, effective(0, 0), real(0, 0), class=locking] ../../source3/smbd/oplock.c:1413(init_oplocks) > init_oplocks: initializing messages. >[2020/03/06 14:24:13.078428, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 774 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.078462, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 778 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.078485, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 770 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079140, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 801 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079205, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 787 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079236, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 779 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079252, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2020/03/06 14:24:13.079265, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:739(messaging_register) > Overriding messaging pointer for type 15 - private_data=(nil) >[2020/03/06 14:24:13.079277, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 16 - private_data=(nil) >[2020/03/06 14:24:13.079304, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 16 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079325, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 33 - private_data=0x55aaa19f3a40 >[2020/03/06 14:24:13.079337, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 33 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079349, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 790 - private_data=(nil) >[2020/03/06 14:24:13.079367, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 790 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.079379, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 791 - private_data=(nil) >[2020/03/06 14:24:13.079391, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2020/03/06 14:24:13.079403, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2020/03/06 14:24:13.079424, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x55aaa1a28040 >[2020/03/06 14:24:13.079442, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x55aaa1a291d0 >[2020/03/06 14:24:13.079455, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x55aaa1a26810 >[2020/03/06 14:24:13.079513, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:248(read_smb_length_return_keepalive) > got smb length of 174 >[2020/03/06 14:24:13.079540, 6, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1955(process_smb) > got message type 0x0 of len 0xae >[2020/03/06 14:24:13.079553, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1957(process_smb) > Transaction 0 of length 178 (0 toread) >[2020/03/06 14:24:13.079572, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3643(smbd_smb2_process_negprot) > smbd_smb2_first_negprot: packet length 174 >[2020/03/06 14:24:13.079606, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 0 (position 0) from bitmap >[2020/03/06 14:24:13.079628, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 0 >[2020/03/06 14:24:13.079662, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.079694, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.079728, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.079797, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:493(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/03/06 14:24:13.079847, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.079866, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.079880, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.079894, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.079906, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.080017, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:1269(ra_parser) > ra_parser: Got remote arch [OSX] from cache >[2020/03/06 14:24:13.080045, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:1217(set_remote_arch) > set_remote_arch: Client arch is 'OSX' >[2020/03/06 14:24:13.080064, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.080096, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:13.080356, 6, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2356(lp_file_list_changed) > lp_file_list_changed() > file /usr/local/samba/etc/smb.conf -> /usr/local/samba/etc/smb.conf last mod_time: Fri Mar 6 14:21:52 2020 > >[2020/03/06 14:24:13.080400, 3, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_negprot.c:293(smbd_smb2_request_process_negprot) > Selected protocol SMB3_11 >[2020/03/06 14:24:13.080423, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/03/06 14:24:13.080449, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend anonymous >[2020/03/06 14:24:13.080471, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'anonymous' >[2020/03/06 14:24:13.080488, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend sam >[2020/03/06 14:24:13.080500, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'sam' >[2020/03/06 14:24:13.080511, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2020/03/06 14:24:13.080522, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2020/03/06 14:24:13.080534, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend sam_netlogon3 >[2020/03/06 14:24:13.080546, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'sam_netlogon3' >[2020/03/06 14:24:13.080558, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend winbind >[2020/03/06 14:24:13.080570, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'winbind' >[2020/03/06 14:24:13.080581, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend unix >[2020/03/06 14:24:13.080597, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'unix' >[2020/03/06 14:24:13.080608, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend samba4 >[2020/03/06 14:24:13.080619, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'samba4' >[2020/03/06 14:24:13.080630, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/03/06 14:24:13.080643, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/03/06 14:24:13.080655, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/03/06 14:24:13.080667, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/03/06 14:24:13.085007, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2020/03/06 14:24:13.085070, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2020/03/06 14:24:13.085086, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2020/03/06 14:24:13.085114, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'spnego' registered >[2020/03/06 14:24:13.085128, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'schannel' registered >[2020/03/06 14:24:13.085141, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'naclrpc_as_system' registered >[2020/03/06 14:24:13.085153, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2020/03/06 14:24:13.085166, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'ntlmssp' registered >[2020/03/06 14:24:13.085178, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'ntlmssp_resume_ccache' registered >[2020/03/06 14:24:13.085191, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'http_basic' registered >[2020/03/06 14:24:13.085204, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'http_ntlm' registered >[2020/03/06 14:24:13.085216, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'http_negotiate' registered >[2020/03/06 14:24:13.085232, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'krb5' registered >[2020/03/06 14:24:13.085245, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2020/03/06 14:24:13.085390, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC mechanism spnego >[2020/03/06 14:24:13.085503, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2020/03/06 14:24:13.085731, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55aaa1a36ad0]: subreq: 0x55aaa1a32f10 >[2020/03/06 14:24:13.085789, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: spnego[0x55aaa1a36ad0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55aaa1a32f10/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55aaa1a330c0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2020/03/06 14:24:13.085915, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [0] idx[1] status[NT_STATUS_OK] body[64] dyn[yes:140] at ../../source3/smbd/smb2_negprot.c:661 >[2020/03/06 14:24:13.085949, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 33, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/1/1 >[2020/03/06 14:24:13.087645, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.087738, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 1 (position 1) from bitmap >[2020/03/06 14:24:13.087770, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 1 >[2020/03/06 14:24:13.087796, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.087818, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.087841, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.087889, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:493(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/03/06 14:24:13.088020, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.088130, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.088178, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 645BCE8B >[2020/03/06 14:24:13.088230, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a2ad00 >[2020/03/06 14:24:13.088326, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.089300, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/03/06 14:24:13.089340, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '645BCE8B' stored >[2020/03/06 14:24:13.089402, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/03/06 14:24:13.089617, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.089635, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 645BCE8B >[2020/03/06 14:24:13.089651, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1324(smbXsrv_session_create) >[2020/03/06 14:24:13.089660, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1330(smbXsrv_session_create) > smbXsrv_session_create: global_id (0x645bce8b) stored >[2020/03/06 14:24:13.089671, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x645bce8b (1683738251) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2020/03/06 14:24:13.089999, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/03/06 14:24:13.090022, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/03/06 14:24:13.090037, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/03/06 14:24:13.090049, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/03/06 14:24:13.090104, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/03/06 14:24:13.090202, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC mechanism spnego >[2020/03/06 14:24:13.090221, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.090277, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.090322, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 645BCE8B >[2020/03/06 14:24:13.090351, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a2da50 >[2020/03/06 14:24:13.090445, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.090484, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/03/06 14:24:13.090500, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '645BCE8B' stored >[2020/03/06 14:24:13.090520, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/03/06 14:24:13.090812, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.090836, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 645BCE8B >[2020/03/06 14:24:13.090851, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/03/06 14:24:13.090860, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x645bce8b) stored >[2020/03/06 14:24:13.090872, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x645bce8b (1683738251) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > idle_time : Fri Mar 6 02:24:13 PM 2020 IST >[2020/03/06 14:24:13.091256, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.091277, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.091293, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.091309, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.091324, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.091431, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2020/03/06 14:24:13.091471, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe2088297 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_LM_KEY > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2020/03/06 14:24:13.092055, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0xe2088297 (3792208535) > 1: NTLMSSP_NEGOTIATE_UNICODE > 1: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 1: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : NULL > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : NULL > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (10) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0) > ProductBuild : 0x4563 (17763) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2020/03/06 14:24:13.092473, 6, pid=734090, effective(0, 0), real(0, 0)] ../../librpc/ndr/ndr_string.c:178(ndr_pull_string) > short string '', sent with NULL termination despite NOTERM flag in IDL >[2020/03/06 14:24:13.092505, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x000c (12) > TargetNameMaxLen : 0x000c (12) > TargetName : * > TargetName : 'PIXIES' > NegotiateFlags : 0xe28a8215 (3800728085) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 49b6064502dc4d1d > Reserved : 0000000000000000 > TargetInfoLen : 0x0040 (64) > TargetInfoMaxLen : 0x0040 (64) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000006 (6) > pair: ARRAY(6) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'PIXIES' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'PIXIES' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'fdc' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Fri Mar 6 02:24:13 PM 2020 IST > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) > ProductBuild : 0x0000 (0) > Reserved : 000000 > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) >[2020/03/06 14:24:13.092871, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: ntlmssp[0x55aaa1a2e7e0]: subreq: 0x55aaa19f4390 >[2020/03/06 14:24:13.092887, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55aaa1a19bb0]: subreq: 0x55aaa1a2dc30 >[2020/03/06 14:24:13.092915, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.092992, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: ntlmssp[0x55aaa1a2e7e0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55aaa19f4390/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x55aaa19f4540)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] >[2020/03/06 14:24:13.093038, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: spnego[0x55aaa1a19bb0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55aaa1a2dc30/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55aaa1a2dde0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2020/03/06 14:24:13.093103, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.093124, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.093136, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.093187, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.093204, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.093234, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.093252, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [1] idx[1] status[NT_STATUS_MORE_PROCESSING_REQUIRED] body[8] dyn[yes:163] at ../../source3/smbd/smb2_sesssetup.c:183 >[2020/03/06 14:24:13.093271, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 33, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/2/1 >[2020/03/06 14:24:13.094555, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.094648, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 2 (position 2) from bitmap >[2020/03/06 14:24:13.094679, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 2 >[2020/03/06 14:24:13.094717, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.094736, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.094757, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 645BCE8B >[2020/03/06 14:24:13.094777, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a2da50 >[2020/03/06 14:24:13.094820, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.094838, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/03/06 14:24:13.094847, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '645BCE8B' stored >[2020/03/06 14:24:13.094860, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/03/06 14:24:13.095156, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.095180, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 645BCE8B >[2020/03/06 14:24:13.095196, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/03/06 14:24:13.095205, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x645bce8b) stored >[2020/03/06 14:24:13.095216, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x645bce8b (1683738251) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > idle_time : Fri Mar 6 02:24:13 PM 2020 IST >[2020/03/06 14:24:13.095625, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.095651, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.095672, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.095713, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:493(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/03/06 14:24:13.095740, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.095867, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.095912, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 645BCE8B >[2020/03/06 14:24:13.095931, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a2da50 >[2020/03/06 14:24:13.095976, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.095997, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/03/06 14:24:13.096007, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '645BCE8B' stored >[2020/03/06 14:24:13.096020, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000004 (4) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/03/06 14:24:13.096204, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.096264, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 645BCE8B >[2020/03/06 14:24:13.096287, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/03/06 14:24:13.096296, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x645bce8b) stored >[2020/03/06 14:24:13.096308, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x645bce8b (1683738251) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > idle_time : Fri Mar 6 02:24:13 PM 2020 IST >[2020/03/06 14:24:13.096674, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.096690, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.096702, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.096714, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.096725, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.096821, 6, pid=734090, effective(0, 0), real(0, 0)] ../../librpc/ndr/ndr_string.c:178(ndr_pull_string) > short string '', sent with NULL termination despite NOTERM flag in IDL >[2020/03/06 14:24:13.096862, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24) > v1: struct LM_RESPONSE > Response : 000000000000000000000000000000000000000000000000 > NtChallengeResponseLen : 0x00e8 (232) > NtChallengeResponseMaxLen: 0x00e8 (232) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 232) > v2: struct NTLMv2_RESPONSE > Response : e01fcd13d8da3ceef42504c70c430115 > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Fri Mar 6 02:24:13 PM 2020 IST > ChallengeFromClient : 0b9ea429fee2d78b > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'PIXIES' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'PIXIES' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'fdc' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Fri Mar 6 02:24:13 PM 2020 IST > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000000 (0) > TokenIL : 0x00003000 (12288) > MachineId : ca7c3ce29b404cb66ef27c9452c7b6245189b6695446d80c7b7a240ad38ed5c4 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0024 (36) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/192.168.0.110' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x0008 (8) > DomainNameMaxLen : 0x0008 (8) > DomainName : * > DomainName : 'ACOM' > UserNameLen : 0x000c (12) > UserNameMaxLen : 0x000c (12) > UserName : * > UserName : 'pcuser' > WorkstationLen : 0x0006 (6) > WorkstationMaxLen : 0x0006 (6) > Workstation : * > Workstation : 'ADC' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 > [0000] 7E CC 5D C7 E9 25 F1 37 44 16 75 59 D4 A3 11 F4 ~.]..%.7 D.uY.... > NegotiateFlags : 0xe2888215 (3800597013) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (10) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0) > ProductBuild : 0x4563 (17763) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2020/03/06 14:24:13.097523, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:509(ntlmssp_server_preauth) > Got user=[pcuser] domain=[ACOM] workstation=[ADC] len1=24 len2=232 >[2020/03/06 14:24:13.097550, 6, pid=734090, effective(0, 0), real(0, 0)] ../../librpc/ndr/ndr_string.c:178(ndr_pull_string) > short string '', sent with NULL termination despite NOTERM flag in IDL >[2020/03/06 14:24:13.097630, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:544(ntlmssp_server_preauth) >[2020/03/06 14:24:13.097653, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &v2_resp: struct NTLMv2_RESPONSE > Response : e01fcd13d8da3ceef42504c70c430115 > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Fri Mar 6 02:24:13 PM 2020 IST > ChallengeFromClient : 0b9ea429fee2d78b > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'PIXIES' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'PIXIES' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'fdc' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Fri Mar 6 02:24:13 PM 2020 IST > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000000 (0) > TokenIL : 0x00003000 (12288) > MachineId : ca7c3ce29b404cb66ef27c9452c7b6245189b6695446d80c7b7a240ad38ed5c4 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0024 (36) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/192.168.0.110' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >[2020/03/06 14:24:13.098061, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:123(make_user_info_map) > Mapping user [ACOM]\[pcuser] from workstation [ADC] >[2020/03/06 14:24:13.098113, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:64(make_user_info) > attempting to make a user_info for pcuser (pcuser) >[2020/03/06 14:24:13.098208, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:72(make_user_info) > making strings for pcuser's user_info struct >[2020/03/06 14:24:13.098493, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:117(make_user_info) > making blobs for pcuser's user_info struct >[2020/03/06 14:24:13.098539, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:163(make_user_info) > made a user_info for pcuser (pcuser) >[2020/03/06 14:24:13.098567, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:200(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [ACOM]\[pcuser]@[ADC] with the new password interface >[2020/03/06 14:24:13.098599, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:203(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [ACOM]\[pcuser]@[ADC] >[2020/03/06 14:24:13.098616, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:213(auth_check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2020/03/06 14:24:13.098629, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:216(auth_check_ntlm_password) > challenge is: >[2020/03/06 14:24:13.098641, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/util.c:664(dump_data) > [0000] 49 B6 06 45 02 DC 4D 1D I..E..M. >[2020/03/06 14:24:13.098662, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_builtin.c:41(check_anonymous_security) > Check auth for: [pcuser] >[2020/03/06 14:24:13.098674, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:249(auth_check_ntlm_password) > auth_check_ntlm_password: anonymous had nothing to say >[2020/03/06 14:24:13.098686, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_sam.c:45(auth_sam_ignoredomain_auth) > auth_sam_ignoredomain_auth: Check auth for: [ACOM]\[pcuser] >[2020/03/06 14:24:13.098715, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.098809, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.098844, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.098859, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.098872, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.098984, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.099009, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.099022, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.099076, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.099098, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.099118, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.099133, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.099147, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.099160, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.099174, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.099187, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.099203, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.099258, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.099275, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.099288, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.099299, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.099339, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.099358, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.099382, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.099435, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.099462, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.099476, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.099488, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.099499, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.099510, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.099614, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.099638, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.099655, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.099668, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.099758, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.099966, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.099988, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.099999, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.100011, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.100022, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.100119, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100144, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.100165, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1605(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for pcuser >[2020/03/06 14:24:13.100181, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.100193, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100205, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.100216, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.100227, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.100251, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.100270, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100292, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.100305, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.100317, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.100371, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.100392, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.100410, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.100422, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.100435, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.100449, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.100463, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.100476, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.100491, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.100505, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100516, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.100528, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.100539, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.100568, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.100586, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100600, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.100614, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.100635, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:559(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.100658, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.100675, 4, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/auth/ntlm_check.c:406(ntlm_password_check) > ntlm_password_check: Checking NTLMv2 password with domain [ACOM] >[2020/03/06 14:24:13.100711, 4, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/check_samsec.c:183(sam_account_ok) > sam_account_ok: Checking SMB password for user pcuser >[2020/03/06 14:24:13.100788, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/check_samsec.c:164(logon_hours_ok) > logon_hours_ok: user pcuser allowed to logon at this time (Fri Mar 6 12:24:13 2020 > ) >[2020/03/06 14:24:13.100817, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100830, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.100842, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100853, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.100864, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.100894, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.100912, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.100928, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100940, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.100951, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.100962, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.100973, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.100993, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.101006, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.101021, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.101037, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.101049, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.101060, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.101071, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.101082, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.101105, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: minimum password age, val: 0 >[2020/03/06 14:24:13.101121, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.101176, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.101196, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.101208, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.101219, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.101230, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.101258, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.101276, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.101293, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.101307, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.101322, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.101359, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [pcuser] >[2020/03/06 14:24:13.102740, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.102844, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.102875, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2020/03/06 14:24:13.102901, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.102930, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.103343, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.103393, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.103418, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/server_info_sam.c:121(make_server_info_sam) > make_server_info_sam: made server info for user pcuser -> pcuser >[2020/03/06 14:24:13.103442, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.103463, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:267(auth_check_ntlm_password) > auth_check_ntlm_password: sam_ignoredomain authentication for user [pcuser] succeeded >[2020/03/06 14:24:13.103482, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.103496, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.103508, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.103634, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.103654, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.103685, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.103699, 5, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:294(auth_check_ntlm_password) > check_ntlm_password: PAM Account for user [pcuser] succeeded >[2020/03/06 14:24:13.103744, 3, pid=734090, effective(0, 0), real(0, 0), class=auth_audit] ../../auth/auth_log.c:635(log_authentication_event_human_readable) > Auth: [SMB2,(null)] user [ACOM]\[pcuser] at [Fri, 06 Mar 2020 14:24:13.103723 IST] with [NTLMv2] status [NT_STATUS_OK] workstation [ADC] remote host [ipv4:192.168.0.120:65140] became [PIXIES]\[pcuser] [S-1-5-21-2115043036-4192051364-4205911360-1000]. local host [ipv4:192.168.0.110:445] > {"timestamp": "2020-03-06T14:24:13.103870+0200", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "0", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "ipv4:192.168.0.110:445", "remoteAddress": "ipv4:192.168.0.120:65140", "serviceDescription": "SMB2", "authDescription": null, "clientDomain": "ACOM", "clientAccount": "pcuser", "workstation": "ADC", "becameAccount": "pcuser", "becameDomain": "PIXIES", "becameSid": "S-1-5-21-2115043036-4192051364-4205911360-1000", "mappedAccount": "pcuser", "mappedDomain": "ACOM", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 13860}} >[2020/03/06 14:24:13.103966, 2, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:323(auth_check_ntlm_password) > check_ntlm_password: authentication for user [pcuser] -> [pcuser] -> [pcuser] succeeded >[2020/03/06 14:24:13.103992, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3928(lp_load_ex) > lp_load_ex: refreshing parameters >[2020/03/06 14:24:13.104008, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1364(free_param_opts) > Freeing parametrics: >[2020/03/06 14:24:13.104229, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:550(init_globals) > Initialising global parameters >[2020/03/06 14:24:13.104358, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2840(lp_do_section) > Processing section "[global]" > doing parameter workgroup = WORKGROUP > doing parameter server string = Samba Server Version %v > doing parameter netbios name = PIXIES > doing parameter interfaces = lo 192.168.0.0/24 > doing parameter hosts allow = 127. 192.168.0. > doing parameter hostname lookups = yes > doing parameter log level = 10 >[2020/03/06 14:24:13.104472, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 > doing parameter security = user > doing parameter passdb backend = tdbsam > doing parameter guest account = nobody > doing parameter load printers = no > doing parameter fruit:aapl = yes > doing parameter fruit:nfs_aces = no > doing parameter unix extensions = no >[2020/03/06 14:24:13.104748, 2, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2857(lp_do_section) > Processing section "[User]" >[2020/03/06 14:24:13.104772, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1364(free_param_opts) > Freeing parametrics: > doing parameter comment = User Files > doing parameter path = /share/samba/user > doing parameter directory mask = 0775 > doing parameter create mask = 0774 > doing parameter force directory mode = 0775 > doing parameter force create mode = 0774 > doing parameter writable = yes > doing parameter browseable = yes > doing parameter guest ok = no > doing parameter write list = @home, pcuser > doing parameter valid users = @home, macuser, pcuser > doing parameter veto files = /.AppleDB/.AppleDouble/.AppleDesktop/:2eDS_Store/Network Trash Folder/Temporary Items/TheVolumeSettingsFolder/.@__thumb/.@__desc/:2e*/.@__qini/.@upload_cache/.@qsys/.digest/ > doing parameter delete veto files = yes > doing parameter vfs objects = catia fruit streams_xattr recycle > doing parameter ea support = yes > doing parameter fruit:aapl = yes > doing parameter fruit:encoding = native > doing parameter fruit:locking = none > doing parameter fruit:metadata = stream > doing parameter fruit:resource = file > doing parameter recycle:repository = @RecycleBin > doing parameter recycle:directory_mode = 2775 > doing parameter recycle:keeptree = yes > doing parameter recycle:versions = yes > doing parameter recycle:touch = yes > doing parameter recycle:exclude = *.tmp,*.temp,*.o,*.obj,~$*,*.~??,~*.*,*.TMP,*.TEMP,lock.*,.~lock.*,LOCK.*,*.lock,*.~lock,*.LNK,*.lnk,*.ldb,._* > doing parameter recycle:minsize = 1 >[2020/03/06 14:24:13.105326, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3970(lp_load_ex) > pm_process() returned Yes >[2020/03/06 14:24:13.105352, 7, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4305(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2020/03/06 14:24:13.105370, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1641(lp_add_ipc) > adding IPC service >[2020/03/06 14:24:13.105435, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/auth_ntlmssp.c:260(auth3_check_password_send) > auth3_check_password_send: Got NT session key of length 16 >[2020/03/06 14:24:13.105458, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/auth_ntlmssp.c:269(auth3_check_password_send) > auth3_check_password_send: Got LM session key of length 8 >[2020/03/06 14:24:13.105475, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: ntlmssp[0x55aaa1a2e7e0]: subreq: 0x55aaa19f4390 >[2020/03/06 14:24:13.105489, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55aaa1a19bb0]: subreq: 0x55aaa1a2dc30 >[2020/03/06 14:24:13.105512, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.105601, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:965(ntlmssp_server_postauth) > ntlmssp_server_auth: Using unmodified nt session key. >[2020/03/06 14:24:13.105691, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:623(ntlmssp_sign_reset) > NTLMSSP Sign/Seal - Initialising with flags: >[2020/03/06 14:24:13.105714, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe2088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2020/03/06 14:24:13.105796, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP send seal arc4 state: > >[2020/03/06 14:24:13.105823, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP recv seal arc4 state: > >[2020/03/06 14:24:13.105941, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: ntlmssp[0x55aaa1a2e7e0]: NT_STATUS_OK tevent_req[0x55aaa19f4390/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x55aaa19f4540)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:244] >[2020/03/06 14:24:13.106030, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:320(ntlmssp_check_packet) > ntlmssp_check_packet: NTLMSSP signature OK ! >[2020/03/06 14:24:13.106077, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:623(ntlmssp_sign_reset) > NTLMSSP Sign/Seal - Initialising with flags: >[2020/03/06 14:24:13.106098, 3, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe2088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2020/03/06 14:24:13.106170, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP send seal arc4 state: > >[2020/03/06 14:24:13.106206, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP recv seal arc4 state: > >[2020/03/06 14:24:13.106242, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:547(gensec_update_done) > gensec_update_done: spnego[0x55aaa1a19bb0]: NT_STATUS_OK tevent_req[0x55aaa1a2dc30/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55aaa1a2dde0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2020/03/06 14:24:13.106273, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.106288, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.106300, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.106312, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.106324, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.106355, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.106433, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:321(create_local_nt_token_from_info3) > Create local NT token for pcuser >[2020/03/06 14:24:13.106494, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:57(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2115043036-4192051364-4205911360-1000]: value=[1001:U] >[2020/03/06 14:24:13.106568, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2115043036-4192051364-4205911360-1000]: id=[1001], endptr=[:U] >[2020/03/06 14:24:13.106594, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1415(sid_to_uid) > sid S-1-5-21-2115043036-4192051364-4205911360-1000 -> uid 1001 >[2020/03/06 14:24:13.106694, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [pcuser] >[2020/03/06 14:24:13.108338, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.108391, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.108407, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.108698, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.108717, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.108842, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.108870, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.108896, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.108910, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.108922, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.108933, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.108944, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.108995, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:688(finalize_local_nt_token) > Failed to fetch domain sid for WORKGROUP >[2020/03/06 14:24:13.109014, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109037, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109050, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109061, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109072, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.109083, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.109111, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-544 >[2020/03/06 14:24:13.109187, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:162(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2020/03/06 14:24:13.109212, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109238, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109251, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109262, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109273, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.109285, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.109311, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-545 >[2020/03/06 14:24:13.109329, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:132(create_builtin_users) > create_builtin_users: Failed to create Users >[2020/03/06 14:24:13.109345, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109363, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109376, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109387, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109398, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.109411, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.109436, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/03/06 14:24:13.109454, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:205(create_builtin_guests) > create_builtin_guests: Failed to create Guests >[2020/03/06 14:24:13.109470, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109485, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109496, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109507, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.109518, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.109529, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.109680, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.109708, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2115043036-4192051364-4205911360-1000] >[2020/03/06 14:24:13.109725, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2115043036-4192051364-4205911360-513] >[2020/03/06 14:24:13.109740, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-1001] >[2020/03/06 14:24:13.109815, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:178(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2020/03/06 14:24:13.109856, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2020/03/06 14:24:13.109896, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-11] >[2020/03/06 14:24:13.109941, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:57(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2115043036-4192051364-4205911360-1000]: value=[1001:U] >[2020/03/06 14:24:13.109971, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2115043036-4192051364-4205911360-1000]: id=[1001], endptr=[:U] >[2020/03/06 14:24:13.110055, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1299(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2020/03/06 14:24:13.110074, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110088, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110101, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110112, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110124, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.110151, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1759(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 513. >[2020/03/06 14:24:13.110168, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.110180, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110192, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.110203, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110214, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.110246, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:658(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 513 by key RID_00000201. >[2020/03/06 14:24:13.110345, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110368, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1836(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2020/03/06 14:24:13.110380, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1543(pdb_default_sid_to_id) > SID S-1-5-21-2115043036-4192051364-4205911360-513 belongs to our domain, but there is no corresponding object in the database. >[2020/03/06 14:24:13.110399, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110412, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.110426, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110438, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110449, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110461, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110472, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.110492, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1759(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 513. >[2020/03/06 14:24:13.110506, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.110518, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110529, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.110540, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110550, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.110576, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:658(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 513 by key RID_00000201. >[2020/03/06 14:24:13.110600, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110614, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1836(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2020/03/06 14:24:13.110625, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1543(pdb_default_sid_to_id) > SID S-1-5-21-2115043036-4192051364-4205911360-513 belongs to our domain, but there is no corresponding object in the database. >[2020/03/06 14:24:13.110642, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110723, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.110744, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110756, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110768, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110779, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110790, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.110820, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110834, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/03/06 14:24:13.110846, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110858, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110869, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110880, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110890, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.110914, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110926, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/03/06 14:24:13.110938, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110950, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.110961, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.110972, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.110983, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.111006, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111018, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/03/06 14:24:13.111030, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.111083, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111099, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.111111, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.111122, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.111150, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111163, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/03/06 14:24:13.111176, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.111188, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111199, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.111210, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.111220, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.111243, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111256, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-11 >[2020/03/06 14:24:13.111268, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.111280, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111290, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.111301, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.111312, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.111335, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.111349, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-11 >[2020/03/06 14:24:13.111362, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-5-21-2115043036-4192051364-4205911360-513 to gid, ignoring it >[2020/03/06 14:24:13.111377, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2020/03/06 14:24:13.111389, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2020/03/06 14:24:13.111440, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:628(create_local_token) > Could not convert SID S-1-5-11 to gid, ignoring it >[2020/03/06 14:24:13.111461, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2115043036-4192051364-4205911360-1000 > SID[ 1]: S-1-5-21-2115043036-4192051364-4205911360-513 > SID[ 2]: S-1-22-2-1001 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-11 > SID[ 6]: S-1-22-1-1001 > Privileges (0x 0): > Rights (0x 0): >[2020/03/06 14:24:13.111502, 10, pid=734090, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1001 and contains 1 supplementary groups > Group[ 0]: 1001 >[2020/03/06 14:24:13.111556, 4, pid=734090, effective(0, 0), real(0, 0), class=auth_audit] ../../auth/auth_log.c:740(log_successful_authz_event_human_readable) > Successful AuthZ: [SMB2,NTLMSSP] user [PIXIES]\[pcuser] [S-1-5-21-2115043036-4192051364-4205911360-1000] at [Fri, 06 Mar 2020 14:24:13.111541 IST] Remote host [ipv4:192.168.0.120:65140] local host [ipv4:192.168.0.110:445] > {"timestamp": "2020-03-06T14:24:13.111594+0200", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:192.168.0.110:445", "remoteAddress": "ipv4:192.168.0.120:65140", "serviceDescription": "SMB2", "authType": "NTLMSSP", "domain": "PIXIES", "account": "pcuser", "sid": "S-1-5-21-2115043036-4192051364-4205911360-1000", "sessionId": "3529dde3-cad0-4be4-977c-73f4f1086a36", "logonServer": "PIXIES", "transportProtection": "SMB", "accountFlags": "0x00000010"}} >[2020/03/06 14:24:13.111632, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.111647, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.111664, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 760948FA >[2020/03/06 14:24:13.111692, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a071d0 >[2020/03/06 14:24:13.111709, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.111722, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 760948FA >[2020/03/06 14:24:13.111828, 7, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4305(lp_servicenumber) > lp_servicenumber: couldn't find pcuser >[2020/03/06 14:24:13.111845, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.111858, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.111872, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.111885, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/password.c:84(register_homes_share) > Adding homes service for user 'pcuser' using home directory: '/home/pcuser' >[2020/03/06 14:24:13.111908, 7, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4305(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2020/03/06 14:24:13.111998, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/03/06 14:24:13.112252, 6, pid=734090, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2356(lp_file_list_changed) > lp_file_list_changed() > file /usr/local/samba/etc/smb.conf -> /usr/local/samba/etc/smb.conf last mod_time: Fri Mar 6 14:21:52 2020 > >[2020/03/06 14:24:13.112311, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.112325, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.112340, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 645BCE8B >[2020/03/06 14:24:13.112356, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a2ddc0 >[2020/03/06 14:24:13.112422, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.112450, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/03/06 14:24:13.112461, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '645BCE8B' stored >[2020/03/06 14:24:13.112474, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000005 (5) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : Fri Mar 6 02:24:13 PM 2020 IST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x00000007 (7) > sids: ARRAY(7) > sids : S-1-5-21-2115043036-4192051364-4205911360-1000 > sids : S-1-5-21-2115043036-4192051364-4205911360-513 > sids : S-1-22-2-1001 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e9 (1001) > gid : 0x00000000000003e9 (1001) > ngroups : 0x00000001 (1) > groups: ARRAY(1) > groups : 0x00000000000003e9 (1001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'pcuser' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'PIXIES' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\PIXIES\pcuser\profile' > home_directory : * > home_directory : '\\PIXIES\pcuser' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'PIXIES' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 05:48:05 AM 30828 IDT > acct_expiry : Thu Sep 14 05:48:05 AM 30828 IDT > last_password_change : Fri Mar 6 12:19:31 PM 2020 IST > allow_password_change : Fri Mar 6 12:19:31 PM 2020 IST > force_password_change : Thu Sep 14 05:48:05 AM 30828 IDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'pcuser' > sanitized_username : * > sanitized_username : 'pcuser' > torture : NULL > credentials : NULL > unique_session_token : 3529dde3-cad0-4be4-977c-73f4f1086a36 > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : * > encryption_key : * > decryption_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > encryption_cipher : 0x0002 (2) >[2020/03/06 14:24:13.113294, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.113315, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 645BCE8B >[2020/03/06 14:24:13.113330, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/03/06 14:24:13.113339, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x645bce8b) stored >[2020/03/06 14:24:13.113351, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x645bce8b (1683738251) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : Fri Mar 6 02:24:13 PM 2020 IST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x00000007 (7) > sids: ARRAY(7) > sids : S-1-5-21-2115043036-4192051364-4205911360-1000 > sids : S-1-5-21-2115043036-4192051364-4205911360-513 > sids : S-1-22-2-1001 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e9 (1001) > gid : 0x00000000000003e9 (1001) > ngroups : 0x00000001 (1) > groups: ARRAY(1) > groups : 0x00000000000003e9 (1001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'pcuser' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'PIXIES' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\PIXIES\pcuser\profile' > home_directory : * > home_directory : '\\PIXIES\pcuser' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'PIXIES' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 05:48:05 AM 30828 IDT > acct_expiry : Thu Sep 14 05:48:05 AM 30828 IDT > last_password_change : Fri Mar 6 12:19:31 PM 2020 IST > allow_password_change : Fri Mar 6 12:19:31 PM 2020 IST > force_password_change : Thu Sep 14 05:48:05 AM 30828 IDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'pcuser' > sanitized_username : * > sanitized_username : 'pcuser' > torture : NULL > credentials : NULL > unique_session_token : 3529dde3-cad0-4be4-977c-73f4f1086a36 > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : * > encryption_key : * > decryption_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > encryption_cipher : 0x0002 (2) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > nonce_high_random : 0xb92e193addd15b0f (-5103113587143910641) > nonce_high_max : 0x00000000ffffffff (4294967295) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2020/03/06 14:24:13.114753, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [2] idx[1] status[NT_STATUS_OK] body[8] dyn[yes:29] at ../../source3/smbd/smb2_sesssetup.c:183 >[2020/03/06 14:24:13.114777, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 33, charge 1, granted 33, current possible/max 8192/8192, total granted/max/low/range 33/8192/3/33 >[2020/03/06 14:24:13.114927, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/smb/smb2_signing.c:174(smb2_signing_sign_pdu) > signed SMB2 message >[2020/03/06 14:24:13.116321, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.116389, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 3 (position 3) from bitmap >[2020/03/06 14:24:13.116408, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 3 >[2020/03/06 14:24:13.116440, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.116455, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.116473, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 645BCE8B >[2020/03/06 14:24:13.116495, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a45a50 >[2020/03/06 14:24:13.116555, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.116573, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/03/06 14:24:13.116583, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '645BCE8B' stored >[2020/03/06 14:24:13.116597, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000006 (6) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : Fri Mar 6 02:24:13 PM 2020 IST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x00000007 (7) > sids: ARRAY(7) > sids : S-1-5-21-2115043036-4192051364-4205911360-1000 > sids : S-1-5-21-2115043036-4192051364-4205911360-513 > sids : S-1-22-2-1001 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e9 (1001) > gid : 0x00000000000003e9 (1001) > ngroups : 0x00000001 (1) > groups: ARRAY(1) > groups : 0x00000000000003e9 (1001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'pcuser' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'PIXIES' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\PIXIES\pcuser\profile' > home_directory : * > home_directory : '\\PIXIES\pcuser' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'PIXIES' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 05:48:05 AM 30828 IDT > acct_expiry : Thu Sep 14 05:48:05 AM 30828 IDT > last_password_change : Fri Mar 6 12:19:31 PM 2020 IST > allow_password_change : Fri Mar 6 12:19:31 PM 2020 IST > force_password_change : Thu Sep 14 05:48:05 AM 30828 IDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'pcuser' > sanitized_username : * > sanitized_username : 'pcuser' > torture : NULL > credentials : NULL > unique_session_token : 3529dde3-cad0-4be4-977c-73f4f1086a36 > connection_dialect : 0x0311 (785) > signing_flags : 0x06 (6) > 0: SMBXSRV_SIGNING_REQUIRED > 1: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : * > encryption_key : * > decryption_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > encryption_cipher : 0x0002 (2) >[2020/03/06 14:24:13.117443, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_session_global.tdb >[2020/03/06 14:24:13.117465, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 645BCE8B >[2020/03/06 14:24:13.117480, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/03/06 14:24:13.117490, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x645bce8b) stored >[2020/03/06 14:24:13.117501, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x645bce8b (1683738251) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x645bce8b (1683738251) > session_wire_id : 0x00000000645bce8b (1683738251) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > expiration_time : Thu Sep 14 05:48:05 AM 30828 IDT > auth_time : Fri Mar 6 02:24:13 PM 2020 IST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x00000007 (7) > sids: ARRAY(7) > sids : S-1-5-21-2115043036-4192051364-4205911360-1000 > sids : S-1-5-21-2115043036-4192051364-4205911360-513 > sids : S-1-22-2-1001 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e9 (1001) > gid : 0x00000000000003e9 (1001) > ngroups : 0x00000001 (1) > groups: ARRAY(1) > groups : 0x00000000000003e9 (1001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'pcuser' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'PIXIES' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\PIXIES\pcuser\profile' > home_directory : * > home_directory : '\\PIXIES\pcuser' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'PIXIES' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 05:48:05 AM 30828 IDT > acct_expiry : Thu Sep 14 05:48:05 AM 30828 IDT > last_password_change : Fri Mar 6 12:19:31 PM 2020 IST > allow_password_change : Fri Mar 6 12:19:31 PM 2020 IST > force_password_change : Thu Sep 14 05:48:05 AM 30828 IDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'pcuser' > sanitized_username : * > sanitized_username : 'pcuser' > torture : NULL > credentials : NULL > unique_session_token : 3529dde3-cad0-4be4-977c-73f4f1086a36 > connection_dialect : 0x0311 (785) > signing_flags : 0x06 (6) > 0: SMBXSRV_SIGNING_REQUIRED > 1: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : * > encryption_key : * > decryption_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > local_address : 'ipv4:192.168.0.110:445' > remote_address : 'ipv4:192.168.0.120:65140' > remote_name : '192.168.0.120' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > encryption_cipher : 0x0002 (2) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > nonce_high_random : 0xb92e193addd15b0f (-5103113587143910641) > nonce_high_max : 0x00000000ffffffff (4294967295) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2020/03/06 14:24:13.118562, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.118581, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.118596, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.118635, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:493(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/03/06 14:24:13.118685, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_tcon.c:230(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\192.168.0.110\User] share[User] >[2020/03/06 14:24:13.118739, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_tcon_global.tdb >[2020/03/06 14:24:13.118758, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.118777, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 8EB3C8B3 >[2020/03/06 14:24:13.118820, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a071d0 >[2020/03/06 14:24:13.119652, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/03/06 14:24:13.119694, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key '8EB3C8B3' stored >[2020/03/06 14:24:13.119716, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0x8eb3c8b3 (2394146995) > tcon_wire_id : 0x8eb3c8b3 (2394146995) > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > share_name : NULL > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x00000000 (0) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/03/06 14:24:13.119900, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 8EB3C8B3 >[2020/03/06 14:24:13.119917, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_tcon_global.tdb >[2020/03/06 14:24:13.119931, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:832(smbXsrv_tcon_create) >[2020/03/06 14:24:13.119940, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:838(smbXsrv_tcon_create) > smbXsrv_tcon_create: global_id (0x8eb3c8b3) stored >[2020/03/06 14:24:13.119952, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0x8eb3c8b3 (2394146995) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0x8eb3c8b3 (2394146995) > tcon_wire_id : 0x8eb3c8b3 (2394146995) > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > share_name : NULL > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x00000000 (0) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_INTERNAL_ERROR > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : NULL >[2020/03/06 14:24:13.120135, 3, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/access.c:369(allow_access) > Allowed connection from 192.168.0.120 (192.168.0.120) >[2020/03/06 14:24:13.120211, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID @home is not in a valid format >[2020/03/06 14:24:13.120290, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:160(user_in_netgroup) > Unable to get default yp domain, let's try without specifying it >[2020/03/06 14:24:13.120312, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:164(user_in_netgroup) > looking for user pcuser of domain (ANY) in netgroup home >[2020/03/06 14:24:13.120960, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\home => domain=[PIXIES], name=[home] >[2020/03/06 14:24:13.120991, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.121011, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.121026, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.121039, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.121051, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.121064, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.121115, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.121135, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix Group\home => domain=[Unix Group], name=[home] >[2020/03/06 14:24:13.121147, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.123307, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:118(token_contains_name) > lookup_name home failed >[2020/03/06 14:24:13.123371, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID macuser is not in a valid format >[2020/03/06 14:24:13.123393, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\macuser => domain=[PIXIES], name=[macuser] >[2020/03/06 14:24:13.123408, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.123429, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.123725, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.123744, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.123758, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.123772, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.123821, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_macuser >[2020/03/06 14:24:13.123911, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.123935, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.123949, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.123964, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.123976, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.123989, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.124027, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.124046, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix User\macuser => domain=[Unix User], name=[macuser] >[2020/03/06 14:24:13.124059, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.124089, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user macuser >[2020/03/06 14:24:13.124103, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is macuser >[2020/03/06 14:24:13.126800, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:140(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is MACUSER >[2020/03/06 14:24:13.128947, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:152(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in macuser >[2020/03/06 14:24:13.129000, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [macuser]! >[2020/03/06 14:24:13.129019, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:102(token_contains_name) > lookup_name macuser failed >[2020/03/06 14:24:13.129045, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID pcuser is not in a valid format >[2020/03/06 14:24:13.129066, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\pcuser => domain=[PIXIES], name=[pcuser] >[2020/03/06 14:24:13.129080, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.129101, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.129116, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.129130, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.129143, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.129481, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.129705, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.129762, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.129779, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.129792, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.129810, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.129833, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.129846, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.129859, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.129872, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.129888, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.129902, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.129920, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.129934, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.129947, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.129959, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.129972, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.130005, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.130024, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130040, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.130055, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.130076, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.130089, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130162, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.130182, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.130194, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.130230, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.130249, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130272, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.130289, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.130314, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.130354, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.130371, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130384, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.130398, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.130414, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.130459, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130479, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.130501, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1605(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for pcuser >[2020/03/06 14:24:13.130521, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.130538, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130552, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.130565, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.130576, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.130601, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.130619, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.130869, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.130894, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.130907, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.130919, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.130936, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.130955, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.130969, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.130982, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.130995, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.131010, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.131023, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.131039, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.131052, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.131064, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.131076, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.131088, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.131122, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.131141, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.131155, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.131169, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.131191, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:559(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.131269, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.131299, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share User is ok for unix user pcuser >[2020/03/06 14:24:13.131391, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service User, connectpath = /share/samba/user >[2020/03/06 14:24:13.131424, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:630(make_connection_snum) > make_connection_snum: Connect path is '/share/samba/user' for service [User] >[2020/03/06 14:24:13.131445, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID @home is not in a valid format >[2020/03/06 14:24:13.131462, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:160(user_in_netgroup) > Unable to get default yp domain, let's try without specifying it >[2020/03/06 14:24:13.131474, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:164(user_in_netgroup) > looking for user pcuser of domain (ANY) in netgroup home >[2020/03/06 14:24:13.131673, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\home => domain=[PIXIES], name=[home] >[2020/03/06 14:24:13.131692, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.131711, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.131724, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.131735, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.131747, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.131758, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.131797, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.131813, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix Group\home => domain=[Unix Group], name=[home] >[2020/03/06 14:24:13.131825, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.133144, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:118(token_contains_name) > lookup_name home failed >[2020/03/06 14:24:13.133244, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID macuser is not in a valid format >[2020/03/06 14:24:13.133286, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\macuser => domain=[PIXIES], name=[macuser] >[2020/03/06 14:24:13.133310, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.133341, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.133367, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.133387, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.133789, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.133830, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.133906, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_macuser >[2020/03/06 14:24:13.133949, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.133983, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.134009, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.134028, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.134047, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.134064, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.134119, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.134151, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix User\macuser => domain=[Unix User], name=[macuser] >[2020/03/06 14:24:13.134174, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.134224, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user macuser >[2020/03/06 14:24:13.134250, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is macuser >[2020/03/06 14:24:13.135494, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:140(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is MACUSER >[2020/03/06 14:24:13.137185, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:152(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in macuser >[2020/03/06 14:24:13.137264, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [macuser]! >[2020/03/06 14:24:13.137287, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:102(token_contains_name) > lookup_name macuser failed >[2020/03/06 14:24:13.137330, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID pcuser is not in a valid format >[2020/03/06 14:24:13.137351, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\pcuser => domain=[PIXIES], name=[pcuser] >[2020/03/06 14:24:13.137570, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.137597, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.137608, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.137692, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.137704, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.137713, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.137757, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.137767, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.137775, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.137783, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.137793, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.137810, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.137820, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.137831, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.137839, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.137849, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.137857, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.137867, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.137875, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.137883, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.137890, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.137897, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.137916, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.137928, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.137938, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.137986, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.138007, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138017, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138024, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138032, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.138041, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.138065, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.138078, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138091, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.138102, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.138123, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.138156, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138167, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138176, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138184, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.138193, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.138223, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138237, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.138252, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1605(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for pcuser >[2020/03/06 14:24:13.138266, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138274, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138281, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138289, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.138373, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.138411, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.138424, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138445, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.138454, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.138462, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.138470, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.138482, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.138496, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.138505, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.138514, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.138522, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.138533, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.138542, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.138552, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138560, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138568, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.138575, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.138582, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.138598, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.138609, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138619, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.138687, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.138707, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:559(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.138729, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.138745, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share User is ok for unix user pcuser >[2020/03/06 14:24:13.138761, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID @home is not in a valid format >[2020/03/06 14:24:13.138773, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:160(user_in_netgroup) > Unable to get default yp domain, let's try without specifying it >[2020/03/06 14:24:13.138781, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:164(user_in_netgroup) > looking for user pcuser of domain (ANY) in netgroup home >[2020/03/06 14:24:13.138925, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\home => domain=[PIXIES], name=[home] >[2020/03/06 14:24:13.138937, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.138948, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138957, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.138964, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.138972, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.138979, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.139007, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.139018, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix Group\home => domain=[Unix Group], name=[home] >[2020/03/06 14:24:13.139026, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.140013, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:118(token_contains_name) > lookup_name home failed >[2020/03/06 14:24:13.140058, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID pcuser is not in a valid format >[2020/03/06 14:24:13.140073, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\pcuser => domain=[PIXIES], name=[pcuser] >[2020/03/06 14:24:13.140083, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.140097, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140151, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.140294, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140308, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.140317, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.140359, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.140371, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.140380, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.140389, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.140399, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.140413, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.140422, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.140432, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.140441, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.140451, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.140460, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.140471, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140482, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140491, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140499, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.140506, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.140525, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.140537, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140548, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.140615, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.140635, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140645, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140653, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140661, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.140669, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.140690, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.140703, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140714, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.140723, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.140736, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.140759, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140768, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140776, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140784, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.140792, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.140815, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140825, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.140838, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1605(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for pcuser >[2020/03/06 14:24:13.140849, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140857, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140865, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.140901, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.140914, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.140935, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.140947, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.140963, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.140972, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.141007, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.141027, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.141041, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.141057, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.141072, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.141086, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.141101, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.141117, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.141132, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.141151, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.141203, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.141218, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.141235, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.141252, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.141289, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.141308, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.141323, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.141408, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.141443, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:559(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.141481, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.141513, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:269(is_share_read_only_for_token) > is_share_read_only_for_user: share User is read-write for unix user pcuser >[2020/03/06 14:24:13.141574, 10, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:363(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2020/03/06 14:24:13.141592, 3, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:114(vfs_init_default) > Initialising default vfs hooks >[2020/03/06 14:24:13.141619, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2020/03/06 14:24:13.141632, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2020/03/06 14:24:13.141646, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for vfs_not_implemented >[2020/03/06 14:24:13.141658, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'vfs_not_implemented' >[2020/03/06 14:24:13.141669, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2020/03/06 14:24:13.141680, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2020/03/06 14:24:13.141697, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for dfs_samba4 >[2020/03/06 14:24:13.141708, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'dfs_samba4' >[2020/03/06 14:24:13.141726, 10, pid=734090, effective(0, 0), real(0, 0), class=dfs_samba4] ../../source3/modules/vfs_dfs_samba4.c:159(vfs_dfs_samba4_init) > vfs_dfs_samba4: Debug class number of 'fileid': 38 >[2020/03/06 14:24:13.141738, 3, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:140(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2020/03/06 14:24:13.141753, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2020/03/06 14:24:13.141770, 3, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:140(vfs_init_custom) > Initialising custom vfs hooks from [recycle] >[2020/03/06 14:24:13.141781, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for recycle >[2020/03/06 14:24:13.141792, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [recycle] not loaded - trying to load... >[2020/03/06 14:24:13.141890, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:158(load_module_absolute_path) > load_module_absolute_path: Loading module '/usr/local/samba/lib/vfs/recycle.so' >[2020/03/06 14:24:13.144045, 3, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:167(load_module_absolute_path) > load_module_absolute_path: Module '/usr/local/samba/lib/vfs/recycle.so' loaded >[2020/03/06 14:24:13.144095, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for recycle >[2020/03/06 14:24:13.144108, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'recycle' >[2020/03/06 14:24:13.144120, 10, pid=734090, effective(0, 0), real(0, 0), class=recycle] ../../source3/modules/vfs_recycle.c:752(samba_init_module) > vfs_recycle: Debug class number of 'recycle': 39 >[2020/03/06 14:24:13.144130, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for recycle > Successfully loaded vfs module [recycle] with the new modules system >[2020/03/06 14:24:13.144141, 3, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:140(vfs_init_custom) > Initialising custom vfs hooks from [streams_xattr] >[2020/03/06 14:24:13.144150, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for streams_xattr >[2020/03/06 14:24:13.144157, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [streams_xattr] not loaded - trying to load... >[2020/03/06 14:24:13.144167, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:158(load_module_absolute_path) > load_module_absolute_path: Loading module '/usr/local/samba/lib/vfs/streams_xattr.so' >[2020/03/06 14:24:13.146236, 3, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:167(load_module_absolute_path) > load_module_absolute_path: Module '/usr/local/samba/lib/vfs/streams_xattr.so' loaded >[2020/03/06 14:24:13.146283, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for streams_xattr >[2020/03/06 14:24:13.146296, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'streams_xattr' >[2020/03/06 14:24:13.146306, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for streams_xattr > Successfully loaded vfs module [streams_xattr] with the new modules system >[2020/03/06 14:24:13.146317, 3, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:140(vfs_init_custom) > Initialising custom vfs hooks from [fruit] >[2020/03/06 14:24:13.146326, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for fruit >[2020/03/06 14:24:13.146333, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [fruit] not loaded - trying to load... >[2020/03/06 14:24:13.146342, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:158(load_module_absolute_path) > load_module_absolute_path: Loading module '/usr/local/samba/lib/vfs/fruit.so' >[2020/03/06 14:24:13.148082, 3, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:167(load_module_absolute_path) > load_module_absolute_path: Module '/usr/local/samba/lib/vfs/fruit.so' loaded >[2020/03/06 14:24:13.148110, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for fruit >[2020/03/06 14:24:13.148120, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'fruit' >[2020/03/06 14:24:13.148185, 10, pid=734090, effective(0, 0), real(0, 0), class=fruit] ../../source3/modules/vfs_fruit.c:5152(samba_init_module) > vfs_fruit_init: Debug class number of 'fruit': 40 >[2020/03/06 14:24:13.148199, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for fruit > Successfully loaded vfs module [fruit] with the new modules system >[2020/03/06 14:24:13.148211, 3, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:140(vfs_init_custom) > Initialising custom vfs hooks from [catia] >[2020/03/06 14:24:13.148219, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for catia >[2020/03/06 14:24:13.148225, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [catia] not loaded - trying to load... >[2020/03/06 14:24:13.148234, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:158(load_module_absolute_path) > load_module_absolute_path: Loading module '/usr/local/samba/lib/vfs/catia.so' >[2020/03/06 14:24:13.150101, 3, pid=734090, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:167(load_module_absolute_path) > load_module_absolute_path: Module '/usr/local/samba/lib/vfs/catia.so' loaded >[2020/03/06 14:24:13.150148, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for catia >[2020/03/06 14:24:13.150161, 5, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:104(smb_register_vfs) > Successfully added vfs backend 'catia' >[2020/03/06 14:24:13.150173, 10, pid=734090, effective(0, 0), real(0, 0), class=catia] ../../source3/modules/vfs_catia.c:2543(samba_init_module) > vfs_catia: Debug class number of 'catia': 41 >[2020/03/06 14:24:13.150183, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:65(vfs_find_backend_entry) > vfs_find_backend_entry called for catia > Successfully loaded vfs module [catia] with the new modules system >[2020/03/06 14:24:13.150220, 10, pid=734090, effective(0, 0), real(0, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1260(fruit_connect) > fruit_connect >[2020/03/06 14:24:13.150232, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:902(streams_xattr_connect) > streams_xattr using stream prefix: user.DosStream. >[2020/03/06 14:24:13.150345, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/notify_msg.c:79(notify_init) > notify_init: notifyd=734087 >[2020/03/06 14:24:13.150360, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 784 - private_data=0x55aaa1a277f0 >[2020/03/06 14:24:13.150371, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 793 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.150378, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 799 - private_data=0x55aaa1a1ec90 >[2020/03/06 14:24:13.150571, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service User, connectpath = /share/samba/user >[2020/03/06 14:24:13.150625, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID @home is not in a valid format >[2020/03/06 14:24:13.150644, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:160(user_in_netgroup) > Unable to get default yp domain, let's try without specifying it >[2020/03/06 14:24:13.150652, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:164(user_in_netgroup) > looking for user pcuser of domain (ANY) in netgroup home >[2020/03/06 14:24:13.150817, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\home => domain=[PIXIES], name=[home] >[2020/03/06 14:24:13.150830, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.150841, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.150851, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.150858, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.150866, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.150874, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.150904, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.150915, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix Group\home => domain=[Unix Group], name=[home] >[2020/03/06 14:24:13.150923, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.152050, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:118(token_contains_name) > lookup_name home failed >[2020/03/06 14:24:13.152094, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID macuser is not in a valid format >[2020/03/06 14:24:13.152108, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\macuser => domain=[PIXIES], name=[macuser] >[2020/03/06 14:24:13.152117, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.152132, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.152142, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.152150, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.152159, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.152167, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.152335, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_macuser >[2020/03/06 14:24:13.152367, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.152380, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.152388, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.152396, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.152442, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.152454, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.152481, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.152493, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix User\macuser => domain=[Unix User], name=[macuser] >[2020/03/06 14:24:13.152503, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.152523, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user macuser >[2020/03/06 14:24:13.152532, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is macuser >[2020/03/06 14:24:13.153348, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:140(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is MACUSER >[2020/03/06 14:24:13.154708, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:152(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in macuser >[2020/03/06 14:24:13.154754, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [macuser]! >[2020/03/06 14:24:13.154767, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:102(token_contains_name) > lookup_name macuser failed >[2020/03/06 14:24:13.154785, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID pcuser is not in a valid format >[2020/03/06 14:24:13.154922, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\pcuser => domain=[PIXIES], name=[pcuser] >[2020/03/06 14:24:13.154937, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.154952, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.154963, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.154971, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.154979, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.154988, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.155029, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.155039, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.155047, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.155055, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.155110, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.155126, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.155136, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.155145, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.155153, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.155163, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.155171, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.155183, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155192, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155199, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155207, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.155215, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.155236, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.155248, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155258, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.155268, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.155282, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155290, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155298, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155305, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.155312, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.155358, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.155374, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155385, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.155394, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.155407, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.155430, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155438, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155446, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155455, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.155463, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.155526, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155545, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.155558, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1605(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for pcuser >[2020/03/06 14:24:13.155569, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155576, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155583, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155590, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.155597, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.155612, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.155623, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155637, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.155645, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.155652, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.155683, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.155698, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.155708, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.155716, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.155724, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.155732, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.155740, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.155748, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.155757, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155765, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155772, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.155779, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.155786, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.155804, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.155815, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.155824, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.155832, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.155845, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:559(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.155861, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.155874, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share User is ok for unix user pcuser >[2020/03/06 14:24:13.155887, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID @home is not in a valid format >[2020/03/06 14:24:13.155898, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:160(user_in_netgroup) > Unable to get default yp domain, let's try without specifying it >[2020/03/06 14:24:13.155931, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/user_util.c:164(user_in_netgroup) > looking for user pcuser of domain (ANY) in netgroup home >[2020/03/06 14:24:13.156055, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\home => domain=[PIXIES], name=[home] >[2020/03/06 14:24:13.156066, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.156076, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.156084, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.156091, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.156098, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.156105, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.156129, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.156139, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix Group\home => domain=[Unix Group], name=[home] >[2020/03/06 14:24:13.156146, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x077 >[2020/03/06 14:24:13.157421, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:118(token_contains_name) > lookup_name home failed >[2020/03/06 14:24:13.157473, 3, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/dom_sid.c:215(dom_sid_parse_endp) > string_to_sid: SID pcuser is not in a valid format >[2020/03/06 14:24:13.157488, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: PIXIES\pcuser => domain=[PIXIES], name=[pcuser] >[2020/03/06 14:24:13.157498, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/03/06 14:24:13.157512, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.157523, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.157532, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.157540, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.157549, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.157767, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.157792, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.157801, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.157855, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.157870, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.157883, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.157892, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.157901, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.157910, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.157919, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.157928, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.157940, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.157950, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.157958, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.157966, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.157974, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.157997, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.158009, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158020, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.158030, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.158044, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158052, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158060, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158067, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.158075, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.158123, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2020/03/06 14:24:13.158138, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158149, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user pcuser >[2020/03/06 14:24:13.158158, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is pcuser >[2020/03/06 14:24:13.158171, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [pcuser]! >[2020/03/06 14:24:13.158193, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158202, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158209, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158217, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.158224, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.158245, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158255, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.158267, 3, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1605(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for pcuser >[2020/03/06 14:24:13.158280, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158288, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158295, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158303, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.158310, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.158324, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.158336, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158350, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:572(pdb_set_username) > pdb_set_username: setting username pcuser, was >[2020/03/06 14:24:13.158358, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:595(pdb_set_domain) > pdb_set_domain: setting domain PIXIES, was >[2020/03/06 14:24:13.158366, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:618(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2020/03/06 14:24:13.158406, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:641(pdb_set_fullname) > pdb_set_full_name: setting full name , was >[2020/03/06 14:24:13.158419, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.158430, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:734(pdb_set_homedir) > pdb_set_homedir: setting home dir \\PIXIES\pcuser, was >[2020/03/06 14:24:13.158438, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:710(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2020/03/06 14:24:13.158447, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:664(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2020/03/06 14:24:13.158455, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/lib/substitute.c:344(automount_server) > Home server: PIXIES >[2020/03/06 14:24:13.158465, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:687(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\PIXIES\pcuser\profile, was >[2020/03/06 14:24:13.158473, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:777(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2020/03/06 14:24:13.158483, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158491, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158499, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.158506, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.158514, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.158532, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/passdb/account_pol.c:363(account_policy_get) > account_policy_get: name: password history, val: 0 >[2020/03/06 14:24:13.158544, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.158553, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:496(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 >[2020/03/06 14:24:13.158562, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2115043036-4192051364-4205911360-1000 from rid 1000 >[2020/03/06 14:24:13.158576, 10, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_get_set.c:559(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2115043036-4192051364-4205911360-513 >[2020/03/06 14:24:13.158593, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.158607, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:269(is_share_read_only_for_token) > is_share_read_only_for_user: share User is read-write for unix user pcuser >[2020/03/06 14:24:13.158629, 10, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:363(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2020/03/06 14:24:13.158769, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.158789, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2115043036-4192051364-4205911360-1000 > SID[ 1]: S-1-5-21-2115043036-4192051364-4205911360-513 > SID[ 2]: S-1-22-2-1001 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-11 > SID[ 6]: S-1-22-1-1001 > Privileges (0x 0): > Rights (0x 0): >[2020/03/06 14:24:13.158814, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1001 and contains 1 supplementary groups > Group[ 0]: 1001 >[2020/03/06 14:24:13.158847, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.158861, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:921(vfs_GetWd) > vfs_GetWd: couldn't stat "." error Permission denied (NFS problem ?) >[2020/03/06 14:24:13.158879, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/root] >[2020/03/06 14:24:13.158891, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.158898, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.158905, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.158920, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:493(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/03/06 14:24:13.158940, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service User, connectpath = /share/samba/user >[2020/03/06 14:24:13.158958, 10, pid=734090, effective(0, 0), real(0, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.158977, 10, pid=734090, effective(0, 0), real(0, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.158986, 10, pid=734090, effective(0, 0), real(0, 0), class=vfs] ../../source3/modules/vfs_default.c:175(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share User, directory /share/samba/user >[2020/03/06 14:24:13.158995, 2, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:877(make_connection_snum) > adc (ipv4:192.168.0.120:65140) connect to service User initially as user pcuser (uid=1001, gid=1001) (pid 734090) >[2020/03/06 14:24:13.159012, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_tcon_global.tdb >[2020/03/06 14:24:13.159020, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.159030, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 8EB3C8B3 >[2020/03/06 14:24:13.159040, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a33970 >[2020/03/06 14:24:13.159087, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/03/06 14:24:13.159096, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key '8EB3C8B3' stored >[2020/03/06 14:24:13.159104, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0x8eb3c8b3 (2394146995) > tcon_wire_id : 0x8eb3c8b3 (2394146995) > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > share_name : 'User' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x645bce8b (1683738251) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/03/06 14:24:13.159182, 10, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 8EB3C8B3 >[2020/03/06 14:24:13.159190, 5, pid=734090, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_tcon_global.tdb >[2020/03/06 14:24:13.159198, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:876(smbXsrv_tcon_update) >[2020/03/06 14:24:13.159203, 10, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:882(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0x8eb3c8b3) stored >[2020/03/06 14:24:13.159210, 1, pid=734090, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0x8eb3c8b3 (2394146995) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0x8eb3c8b3 (2394146995) > tcon_wire_id : 0x8eb3c8b3 (2394146995) > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > share_name : 'User' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x645bce8b (1683738251) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : * >[2020/03/06 14:24:13.159338, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [3] idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:186 >[2020/03/06 14:24:13.159350, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/4/33 >[2020/03/06 14:24:13.159365, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/smb/smb2_signing.c:174(smb2_signing_sign_pdu) > signed SMB2 message >[2020/03/06 14:24:13.159891, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.159938, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 4 (position 4) from bitmap >[2020/03/06 14:24:13.159951, 10, pid=734090, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 4 >[2020/03/06 14:24:13.159976, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.159989, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2115043036-4192051364-4205911360-1000 > SID[ 1]: S-1-5-21-2115043036-4192051364-4205911360-513 > SID[ 2]: S-1-22-2-1001 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-11 > SID[ 6]: S-1-22-1-1001 > Privileges (0x 0): > Rights (0x 0): >[2020/03/06 14:24:13.160020, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 1001 > Primary group is 1001 and contains 1 supplementary groups > Group[ 0]: 1001 >[2020/03/06 14:24:13.160049, 4, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:825(vfs_ChDir) > vfs_ChDir to /share/samba/user >[2020/03/06 14:24:13.160078, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.160163, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:887(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /share/samba/user >[2020/03/06 14:24:13.160200, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.160221, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.160289, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.160308, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_tcon_global.tdb >[2020/03/06 14:24:13.160317, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.160327, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 8EB3C8B3 >[2020/03/06 14:24:13.160341, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a33970 >[2020/03/06 14:24:13.160365, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/03/06 14:24:13.160371, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key '8EB3C8B3' stored >[2020/03/06 14:24:13.160380, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0x8eb3c8b3 (2394146995) > tcon_wire_id : 0x8eb3c8b3 (2394146995) > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > share_name : 'User' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x645bce8b (1683738251) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/03/06 14:24:13.160460, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 8EB3C8B3 >[2020/03/06 14:24:13.160470, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_tcon_global.tdb >[2020/03/06 14:24:13.160478, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_tcon.c:876(smbXsrv_tcon_update) >[2020/03/06 14:24:13.160484, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_tcon.c:882(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0x8eb3c8b3) stored >[2020/03/06 14:24:13.160491, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0x8eb3c8b3 (2394146995) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0x8eb3c8b3 (2394146995) > tcon_wire_id : 0x8eb3c8b3 (2394146995) > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > creation_time : Fri Mar 6 02:24:13 PM 2020 IST > share_name : 'User' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x645bce8b (1683738251) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : * >[2020/03/06 14:24:13.161146, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:714(smbd_smb2_create_send) > smbd_smb2_create_send: name [] >[2020/03/06 14:24:13.161178, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1271(smbd_smb2_create_before_exec) > Got lease request size 52 >[2020/03/06 14:24:13.161188, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > state->lease_ptr: struct smb2_lease > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b03bc2aa0 (-30189262460256) > data : 0x00000000000041fb (16891) > lease_state : 0x00000007 (7) > 1: SMB2_LEASE_READ > 1: SMB2_LEASE_HANDLE > 1: SMB2_LEASE_WRITE > lease_flags : 0x00000000 (0) > lease_duration : 0x0000000000000000 (0) > parent_lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > lease_version : 0x0002 (2) > lease_epoch : 0x0000 (0) >[2020/03/06 14:24:13.161273, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:819(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/03/06 14:24:13.161303, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "" >[2020/03/06 14:24:13.161323, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.161509, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:514(unix_convert) > conversion finished "" -> . >[2020/03/06 14:24:13.161563, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:897(is_in_path) > is_in_path: . >[2020/03/06 14:24:13.161585, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:921(is_in_path) > is_in_path: match not found >[2020/03/06 14:24:13.161595, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/share/samba/user] >[2020/03/06 14:24:13.161621, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [.] -> [/share/samba/user] >[2020/03/06 14:24:13.161632, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: . reduced to /share/samba/user >[2020/03/06 14:24:13.161644, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5905(create_file_default) > create_file_default: create_file: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = . >[2020/03/06 14:24:13.161658, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5353(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2020/03/06 14:24:13.161678, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.161696, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b03bc2aa0 (-30189262460256) > data : 0x00000000000041fb (16891) >[2020/03/06 14:24:13.161782, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.161794, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.161804, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 1451DBB4 >[2020/03/06 14:24:13.161819, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a071d0 >[2020/03/06 14:24:13.161829, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/03/06 14:24:13.162503, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '1451DBB4' stored >[2020/03/06 14:24:13.162543, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x1451dbb4 (340908980) > open_persistent_id : 0x000000001451dbb4 (340908980) > open_volatile_id : 0x000000008e24dda4 (2384780708) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.162793, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 1451DBB4 >[2020/03/06 14:24:13.162807, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.162816, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x1451dbb4) stored >[2020/03/06 14:24:13.162824, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x8e24dda4 (2384780708) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x1451dbb4 (340908980) > open_persistent_id : 0x000000001451dbb4 (340908980) > open_volatile_id : 0x000000008e24dda4 (2384780708) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.163001, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 2384780708 (1 used) >[2020/03/06 14:24:13.163027, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:757(file_name_hash) > file_name_hash: /share/samba/user/. hash 0xf13b0430 >[2020/03/06 14:24:13.163040, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(.) returning 0774 >[2020/03/06 14:24:13.163048, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3352(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x100081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0774 oplock_request=256 private_flags = 0x0 >[2020/03/06 14:24:13.163076, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2020/03/06 14:24:13.163092, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3538(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x100081 >[2020/03/06 14:24:13.163101, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3638(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0774, access_mask = 0x100081, open_access_mask = 0x100081 >[2020/03/06 14:24:13.163113, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.163123, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.163181, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.163193, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.163202, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.163209, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.163218, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.163394, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.163412, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.163420, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.163452, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.163463, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.163489, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.163502, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.163511, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.163524, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.163534, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.163555, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.163565, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.163572, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.163579, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.163586, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.163609, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.163618, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.163629, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.163636, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.163646, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.163655, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.163664, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.163729, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.163741, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.163749, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.163764, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x100081 returning 0x100001 (NT_STATUS_OK) >[2020/03/06 14:24:13.163782, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.163797, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.163809, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/share/samba/user] >[2020/03/06 14:24:13.163821, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [.] -> [/share/samba/user] >[2020/03/06 14:24:13.163829, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: . reduced to /share/samba/user >[2020/03/06 14:24:13.163838, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_open] >[2020/03/06 14:24:13.163847, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a4d030] cc->busy [0x7fff22134d28] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.163857, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1616(fruit_open) > fruit_open: Path [.] >[2020/03/06 14:24:13.163865, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:378(streams_xattr_open) > streams_xattr_open called for . with flags 0x20800 >[2020/03/06 14:24:13.163877, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_open] >[2020/03/06 14:24:13.163884, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a4d030] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.163894, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 04000 mode = 0774, fd = 36. >[2020/03/06 14:24:13.163905, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_fstat] >[2020/03/06 14:24:13.163912, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:361: cc [0x55aaa1a4d030] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.163948, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a4d030] cc->busy [0x7fff22135050] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.163965, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_fstat] >[2020/03/06 14:24:13.163973, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a4d030] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.163982, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1699(fruit_close) > fruit_close: Path [.] fd [36] >[2020/03/06 14:24:13.163990, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:508(streams_xattr_close) > streams_xattr_close: streams_xattr_close called [.] fd [36] >[2020/03/06 14:24:13.164010, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.164019, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.164028, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 1451DBB4 >[2020/03/06 14:24:13.164038, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a14920 >[2020/03/06 14:24:13.164053, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 1451DBB4 >[2020/03/06 14:24:13.164060, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.164072, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:569(file_free) > freed files structure 2384780708 (0 used) >[2020/03/06 14:24:13.164080, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:4240(open_directory) > open_directory: opening directory ., access_mask = 0x100081, share_access = 0x7 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x10 >[2020/03/06 14:24:13.164093, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.164101, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.164130, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.164140, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.164147, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.164154, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.164188, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.164314, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.164330, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.164338, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.164345, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.164352, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.164373, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.164386, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.164394, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.164424, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.164440, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.164456, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.164470, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.164491, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.164502, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.164510, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.164539, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.164549, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.164560, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.164567, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.164579, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.164673, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.164689, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.164708, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.164716, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.164723, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.164738, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x100081 returning 0x100001 (NT_STATUS_OK) >[2020/03/06 14:24:13.164763, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.164772, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.164781, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 07765F05 >[2020/03/06 14:24:13.164800, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a071d0 >[2020/03/06 14:24:13.164809, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/03/06 14:24:13.164836, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '07765F05' stored >[2020/03/06 14:24:13.164846, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x07765f05 (125198085) > open_persistent_id : 0x0000000007765f05 (125198085) > open_volatile_id : 0x00000000dd210f19 (3709931289) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.164965, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 07765F05 >[2020/03/06 14:24:13.164975, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.164984, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x07765f05) stored >[2020/03/06 14:24:13.164991, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xdd210f19 (3709931289) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x07765f05 (125198085) > open_persistent_id : 0x0000000007765f05 (125198085) > open_volatile_id : 0x00000000dd210f19 (3709931289) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.165129, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 3709931289 (1 used) >[2020/03/06 14:24:13.165145, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:757(file_name_hash) > file_name_hash: /share/samba/user/. hash 0xf13b0430 >[2020/03/06 14:24:13.165160, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.165175, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.165187, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/share/samba/user] >[2020/03/06 14:24:13.165228, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [.] -> [/share/samba/user] >[2020/03/06 14:24:13.165243, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: . reduced to /share/samba/user >[2020/03/06 14:24:13.165254, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_open] >[2020/03/06 14:24:13.165264, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a071f0] cc->busy [0x7fff22134f78] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.165274, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1616(fruit_open) > fruit_open: Path [.] >[2020/03/06 14:24:13.165283, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:378(streams_xattr_open) > streams_xattr_open called for . with flags 0x30000 >[2020/03/06 14:24:13.165297, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_open] >[2020/03/06 14:24:13.165306, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a071f0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.165316, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 36. >[2020/03/06 14:24:13.165326, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_fstat] >[2020/03/06 14:24:13.165334, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:361: cc [0x55aaa1a071f0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.165345, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a071f0] cc->busy [0x7fff22135170] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.165359, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_fstat] >[2020/03/06 14:24:13.165402, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a071f0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.165421, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.165431, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.165445, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 00FD00000000000039F7 >[2020/03/06 14:24:13.165484, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a4d070 >[2020/03/06 14:24:13.165504, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf13b0430 >[2020/03/06 14:24:13.165517, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.165525, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.165548, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1423(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/03/06 14:24:13.165557, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > op_mid : 0x0000000000000004 (4) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri Mar 6 02:24:13 PM 2020 IST.164756 > share_file_id : 0x0000000000000002 (2) > uid : 0x000003e9 (1001) > flags : 0x0000 (0) > name_hash : 0xf13b0430 (4047176752) > stale : 0x00 (0) >[2020/03/06 14:24:13.165647, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1551(set_share_mode_fn) > set_share_mode_fn: num_share_modes=0 >[2020/03/06 14:24:13.165655, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1566(set_share_mode_fn) > set_share_mode_fn: idx=0, found=0 >[2020/03/06 14:24:13.165662, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1592(set_share_mode_fn) > set_share_mode_fn: dbufs[0]=(0x7fff22134ec0, 132) >[2020/03/06 14:24:13.166436, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.166476, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/03/06 14:24:13.166487, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0x99e1570d0fb32e62 (-7358504602537087390) > flags : 0x0008 (8) > 0: SHARE_MODE_SHARE_DELETE > 0: SHARE_MODE_SHARE_WRITE > 0: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share/samba/user' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x01 (1) > modified : 0x01 (1) > have_share_modes : 0x01 (1) > id: struct file_id > devid : 0x000000000000fd00 (64768) > inode : 0x000000000280f739 (42006329) > extid : 0x0000000000000000 (0) >[2020/03/06 14:24:13.166584, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.167175, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.167205, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 00FD00000000000039F7 >[2020/03/06 14:24:13.167216, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:182(share_mode_memcache_store) > share_mode_memcache_store: stored entry for file . seq 99e1570d0fb32e63 key 64768:42006329:0 >[2020/03/06 14:24:13.167232, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5726(create_file_unixpath) > create_file_unixpath: info=1 >[2020/03/06 14:24:13.167240, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:6047(create_file_default) > create_file: info=1 >[2020/03/06 14:24:13.167251, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1327(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2020/03/06 14:24:13.167259, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/03/06 14:24:13.167288, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2020/03/06 14:24:13.167305, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/03/06 14:24:13.167316, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.167364, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.167415, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.167427, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.167435, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.167443, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.167452, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.167590, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.167604, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.167611, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.167618, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.167625, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.167646, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.167660, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.167669, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.167681, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.167691, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.167707, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.167716, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.167723, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.167730, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.167737, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.167760, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.167828, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.167844, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.167852, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.167862, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.167871, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.167880, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.167897, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.167905, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.167912, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.167927, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/access_check.c:214(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1f01ff, remaining = 0x1f01ff >[2020/03/06 14:24:13.167940, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.167949, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.167958, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 07765F05 >[2020/03/06 14:24:13.167968, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a14920 >[2020/03/06 14:24:13.167990, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '07765F05' stored >[2020/03/06 14:24:13.168000, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x07765f05 (125198085) > open_persistent_id : 0x0000000007765f05 (125198085) > open_volatile_id : 0x00000000dd210f19 (3709931289) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 2a2728c4-5e61-11ea-9382-000c2936c6a5 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.168117, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 07765F05 >[2020/03/06 14:24:13.168127, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.168139, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:1033(smbXsrv_open_update) > smbXsrv_open_update: global_id (0x07765f05) stored >[2020/03/06 14:24:13.168146, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xdd210f19 (3709931289) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x07765f05 (125198085) > open_persistent_id : 0x0000000007765f05 (125198085) > open_volatile_id : 0x00000000dd210f19 (3709931289) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 2a2728c4-5e61-11ea-9382-000c2936c6a5 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : * > flags : 0x02 (2) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 1: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.168286, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1391(smbd_smb2_create_after_exec) > smb2_create_send: smbXsrv_open_update returned NT_STATUS_OK >[2020/03/06 14:24:13.168299, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1556(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3709931289 >[2020/03/06 14:24:13.168356, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [4] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../../source3/smbd/smb2_create.c:405 >[2020/03/06 14:24:13.168371, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/5/33 >[2020/03/06 14:24:13.169057, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 9 vectors >[2020/03/06 14:24:13.169099, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 5 (position 5) from bitmap >[2020/03/06 14:24:13.169110, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 6 (position 6) from bitmap >[2020/03/06 14:24:13.169122, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_QUERY_DIRECTORY] mid = 5 >[2020/03/06 14:24:13.169138, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/03/06 14:24:13.169158, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.169179, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.169191, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.169210, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:97(smbd_smb2_request_process_query_directory) > smbd_smb2_request_find_done: in_output_buffer_length = 65536 >[2020/03/06 14:24:13.169223, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:288(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: . - fnum 3709931289 >[2020/03/06 14:24:13.169235, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 5, CreditCharge: 1, NeededCharge: 1 >[2020/03/06 14:24:13.169286, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:220(dptr_create) > dptr_create: dir=. >[2020/03/06 14:24:13.169335, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:321(dptr_create) > dptr_create: creating new dirptr [0] for path [.], expect_close = 0 >[2020/03/06 14:24:13.169380, 8, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:490(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 65528 >[2020/03/06 14:24:13.169418, 6, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55aaa1a06950 now at offset 0 >[2020/03/06 14:24:13.169433, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.169444, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/03/06 14:24:13.169463, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2020/03/06 14:24:13.169477, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/03/06 14:24:13.169486, 3, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:908(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found . fname=. (.) >[2020/03/06 14:24:13.169498, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:1909(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65528 >[2020/03/06 14:24:13.169511, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:2317(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2020/03/06 14:24:13.169524, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:387(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 17 >[2020/03/06 14:24:13.169546, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:302(get_ea_value) > get_ea_value: EA security.selinux is of length 35 >[2020/03/06 14:24:13.169554, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/util/util.c:664(dump_data) > [0000] 75 6E 63 6F 6E 66 69 6E 65 64 5F 75 3A 6F 62 6A unconfin ed_u:obj > [0010] 65 63 74 5F 72 3A 64 65 66 61 75 6C 74 5F 74 3A ect_r:de fault_t: > [0020] 73 30 00 s0. >[2020/03/06 14:24:13.169581, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:549(get_ea_list_from_file_path) > get_ea_list_from_file: total_len = 56, security.selinux, val len = 35 >[2020/03/06 14:24:13.169588, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:562(get_ea_list_from_file_path) > get_ea_list_from_file: total_len = 60 >[2020/03/06 14:24:13.169595, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:713(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 60 >[2020/03/06 14:24:13.169606, 6, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55aaa1a06950 now at offset 2147483648 >[2020/03/06 14:24:13.169616, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for .. >[2020/03/06 14:24:13.169626, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: .. >[2020/03/06 14:24:13.169682, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file ..: Error = No data available >[2020/03/06 14:24:13.169696, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/03/06 14:24:13.169704, 3, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:908(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found .. fname=.. (..) >[2020/03/06 14:24:13.169714, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:1909(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65416 >[2020/03/06 14:24:13.169722, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:2317(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2020/03/06 14:24:13.169733, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:387(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 17 >[2020/03/06 14:24:13.169748, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:302(get_ea_value) > get_ea_value: EA security.selinux is of length 35 >[2020/03/06 14:24:13.169756, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/util/util.c:664(dump_data) > [0000] 75 6E 63 6F 6E 66 69 6E 65 64 5F 75 3A 6F 62 6A unconfin ed_u:obj > [0010] 65 63 74 5F 72 3A 64 65 66 61 75 6C 74 5F 74 3A ect_r:de fault_t: > [0020] 73 30 00 s0. >[2020/03/06 14:24:13.169781, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:549(get_ea_list_from_file_path) > get_ea_list_from_file: total_len = 56, security.selinux, val len = 35 >[2020/03/06 14:24:13.169788, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:562(get_ea_list_from_file_path) > get_ea_list_from_file: total_len = 60 >[2020/03/06 14:24:13.169795, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:713(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 60 >[2020/03/06 14:24:13.169825, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:897(is_in_path) > is_in_path: test.txt >[2020/03/06 14:24:13.169837, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:921(is_in_path) > is_in_path: match not found >[2020/03/06 14:24:13.169844, 6, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55aaa1a06950 now at offset 512 >[2020/03/06 14:24:13.169852, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: test.txt >[2020/03/06 14:24:13.169911, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:284(parse_dos_attribute_blob) > parse_dos_attribute_blob: test.txt attr = >[2020/03/06 14:24:13.169927, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:342(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] creation time [Fri Mar 6 12:22:21 PM 2020 IST] >[2020/03/06 14:24:13.169941, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:365(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] itime [Fri Mar 6 12:22:21 PM 2020 IST] fileid [979889174f391ee4] >[2020/03/06 14:24:13.169952, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: parse_dos_attribute_blob returning (0x20): "a" >[2020/03/06 14:24:13.169961, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x20): "a" >[2020/03/06 14:24:13.169987, 3, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:908(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found test.txt fname=test.txt (test.txt) >[2020/03/06 14:24:13.170029, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:1909(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65304 >[2020/03/06 14:24:13.170041, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:2317(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2020/03/06 14:24:13.170054, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:387(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 32 >[2020/03/06 14:24:13.170072, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:302(get_ea_value) > get_ea_value: EA security.selinux is of length 35 >[2020/03/06 14:24:13.170080, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/util/util.c:664(dump_data) > [0000] 75 6E 63 6F 6E 66 69 6E 65 64 5F 75 3A 6F 62 6A unconfin ed_u:obj > [0010] 65 63 74 5F 72 3A 64 65 66 61 75 6C 74 5F 74 3A ect_r:de fault_t: > [0020] 73 30 00 s0. >[2020/03/06 14:24:13.170108, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:549(get_ea_list_from_file_path) > get_ea_list_from_file: total_len = 56, security.selinux, val len = 35 >[2020/03/06 14:24:13.170116, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:562(get_ea_list_from_file_path) > get_ea_list_from_file: total_len = 60 >[2020/03/06 14:24:13.170124, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:713(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 60 >[2020/03/06 14:24:13.170136, 6, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55aaa1a06950 now at offset -1 >[2020/03/06 14:24:13.170149, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:187(smbd_smb2_request_find_done) > smbd_smb2_request_find_done: out_output_buffer.length = 344 >[2020/03/06 14:24:13.170158, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [5] idx[1] status[NT_STATUS_OK] body[8] dyn[yes:344] at ../../source3/smbd/smb2_query_directory.c:192 >[2020/03/06 14:24:13.170177, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3126(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 9 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 32 > req->in.vector[4].iov_len = 8 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 32 > req->in.vector[8].iov_len = 2 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 344 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 >[2020/03/06 14:24:13.170213, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_QUERY_DIRECTORY] mid = 6 >[2020/03/06 14:24:13.170224, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/03/06 14:24:13.170235, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.170248, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.170288, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.170302, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:97(smbd_smb2_request_process_query_directory) > smbd_smb2_request_find_done: in_output_buffer_length = 1024 >[2020/03/06 14:24:13.170312, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:288(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: . - fnum 3709931289 >[2020/03/06 14:24:13.170322, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 6, CreditCharge: 1, NeededCharge: 1 >[2020/03/06 14:24:13.170354, 8, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:490(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 1016 >[2020/03/06 14:24:13.170375, 6, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55aaa1a06950 now at offset -1 >[2020/03/06 14:24:13.170386, 3, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3272(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[5] status[STATUS_NO_MORE_FILES] || at ../../source3/smbd/smb2_query_directory.c:159 >[2020/03/06 14:24:13.170395, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [6] idx[5] status[STATUS_NO_MORE_FILES] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:3322 >[2020/03/06 14:24:13.170405, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8161/8192, total granted/max/low/range 32/8192/7/32 >[2020/03/06 14:24:13.170413, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 2, charge 1, granted 2, current possible/max 8160/8192, total granted/max/low/range 34/8192/7/34 >[2020/03/06 14:24:13.171006, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.171045, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 7 (position 7) from bitmap >[2020/03/06 14:24:13.171058, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 7 >[2020/03/06 14:24:13.171073, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/03/06 14:24:13.171092, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.171111, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.171163, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.171184, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: . - fnum 3709931289 >[2020/03/06 14:24:13.171198, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.171207, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.171219, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 00FD00000000000039F7 >[2020/03/06 14:24:13.171233, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a3f530 >[2020/03/06 14:24:13.171246, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:359(share_mode_memcache_fetch) > share_mode_memcache_fetch: fetched entry for file . seq 99e1570d0fb32e63 key 64768:42006329:0 >[2020/03/06 14:24:13.171257, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf13b0430 >[2020/03/06 14:24:13.171267, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.171275, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.171287, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1936(share_mode_entry_do_fn) > share_mode_entry_do_fn: state->num_share_modes=1 >[2020/03/06 14:24:13.171295, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1479(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0 >[2020/03/06 14:24:13.171303, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1489(share_mode_entry_find) > share_mode_entry_find: blob.data=0x55aaa1a44cf0, blob.length=132 >[2020/03/06 14:24:13.171321, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.171330, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/03/06 14:24:13.171338, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0x99e1570d0fb32e63 (-7358504602537087389) > flags : 0x0008 (8) > 0: SHARE_MODE_SHARE_DELETE > 0: SHARE_MODE_SHARE_WRITE > 0: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share/samba/user' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x01 (1) > have_share_modes : 0x00 (0) > id: struct file_id > devid : 0x000000000000fd00 (64768) > inode : 0x000000000280f739 (42006329) > extid : 0x0000000000000000 (0) >[2020/03/06 14:24:13.171442, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.171463, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.171473, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 00FD00000000000039F7 >[2020/03/06 14:24:13.171484, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dir.c:348(dptr_CloseDir) > dptr_CloseDir: closing dptr key 0 >[2020/03/06 14:24:13.171502, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.171511, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.171521, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 07765F05 >[2020/03/06 14:24:13.171530, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a14920 >[2020/03/06 14:24:13.171544, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 07765F05 >[2020/03/06 14:24:13.171552, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.171564, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:569(file_free) > freed files structure 3709931289 (0 used) >[2020/03/06 14:24:13.171574, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.171585, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/03/06 14:24:13.171604, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2020/03/06 14:24:13.171619, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/03/06 14:24:13.171633, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [7] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/03/06 14:24:13.171644, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8159/8192, total granted/max/low/range 34/8192/8/34 >[2020/03/06 14:24:13.172318, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.172374, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 8 (position 8) from bitmap >[2020/03/06 14:24:13.172394, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 8 >[2020/03/06 14:24:13.172417, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/03/06 14:24:13.172446, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.172476, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.172498, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.172532, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:714(smbd_smb2_create_send) > smbd_smb2_create_send: name [test.txt] >[2020/03/06 14:24:13.172560, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1271(smbd_smb2_create_before_exec) > Got lease request size 52 >[2020/03/06 14:24:13.172579, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > state->lease_ptr: struct smb2_lease > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) > lease_state : 0x00000000 (0) > 0: SMB2_LEASE_READ > 0: SMB2_LEASE_HANDLE > 0: SMB2_LEASE_WRITE > lease_flags : 0x00000000 (0) > lease_duration : 0x0000000000000000 (0) > parent_lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > lease_version : 0x0002 (2) > lease_epoch : 0x0000 (0) >[2020/03/06 14:24:13.172649, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:819(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/03/06 14:24:13.172672, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "test.txt" >[2020/03/06 14:24:13.172696, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [TEST.TXT] >[2020/03/06 14:24:13.172708, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:681(unix_convert) > unix_convert begin: name = test.txt, dirpath = ., start = test.txt >[2020/03/06 14:24:13.172718, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for test.txt >[2020/03/06 14:24:13.172730, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:704(unix_convert) > conversion of base_name finished test.txt -> test.txt >[2020/03/06 14:24:13.172826, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:897(is_in_path) > is_in_path: test.txt >[2020/03/06 14:24:13.172846, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:921(is_in_path) > is_in_path: match not found >[2020/03/06 14:24:13.172855, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [test.txt] [/share/samba/user] >[2020/03/06 14:24:13.172932, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [test.txt] -> [/share/samba/user/test.txt] >[2020/03/06 14:24:13.172948, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: test.txt reduced to /share/samba/user/test.txt >[2020/03/06 14:24:13.172960, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5905(create_file_default) > create_file_default: create_file: access_mask = 0x110080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = test.txt >[2020/03/06 14:24:13.172972, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5353(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x110080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = test.txt >[2020/03/06 14:24:13.172983, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.172991, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) >[2020/03/06 14:24:13.173028, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3767(fruit_streaminfo) > fruit_streaminfo: Path [test.txt] >[2020/03/06 14:24:13.173039, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for test.txt >[2020/03/06 14:24:13.173057, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/trans2.c:387(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 32 >[2020/03/06 14:24:13.173071, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for test.txt >[2020/03/06 14:24:13.173083, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/adouble.c:2389(ad_get_internal) > ad_get(rsrc) called for test.txt >[2020/03/06 14:24:13.173401, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/adouble.c:2124(ad_open) > ad_open: Path [test.txt] type [rsrc] >[2020/03/06 14:24:13.173455, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for ./._test.txt >[2020/03/06 14:24:13.173478, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/adouble.c:2408(ad_get_internal) > ad_get_internal: ad_open [test.txt] error [No such file or directory] >[2020/03/06 14:24:13.173491, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/adouble.c:2423(ad_get_internal) > ad_get(rsrc) for test.txt returning -1 >[2020/03/06 14:24:13.173567, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:4726(open_streams_for_delete) > open_streams_for_delete found 1 streams >[2020/03/06 14:24:13.173601, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.173610, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.173620, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 6928A37A >[2020/03/06 14:24:13.173633, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a39680 >[2020/03/06 14:24:13.173642, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/03/06 14:24:13.173672, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '6928A37A' stored >[2020/03/06 14:24:13.173682, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x6928a37a (1764270970) > open_persistent_id : 0x000000006928a37a (1764270970) > open_volatile_id : 0x0000000085700ef6 (2238713590) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.173769, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 6928A37A >[2020/03/06 14:24:13.173777, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.173785, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x6928a37a) stored >[2020/03/06 14:24:13.173792, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x85700ef6 (2238713590) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x6928a37a (1764270970) > open_persistent_id : 0x000000006928a37a (1764270970) > open_volatile_id : 0x0000000085700ef6 (2238713590) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.173940, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 2238713590 (1 used) >[2020/03/06 14:24:13.173953, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:757(file_name_hash) > file_name_hash: /share/samba/user/test.txt hash 0x65865d48 >[2020/03/06 14:24:13.173965, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(test.txt) returning 0774 >[2020/03/06 14:24:13.173973, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3352(open_file_ntcreate) > open_file_ntcreate: fname=test.txt, dos_attrs=0x0 access_mask=0x110080 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0774 oplock_request=256 private_flags = 0x0 >[2020/03/06 14:24:13.174005, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:284(parse_dos_attribute_blob) > parse_dos_attribute_blob: test.txt attr = >[2020/03/06 14:24:13.174014, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:342(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] creation time [Fri Mar 6 12:22:21 PM 2020 IST] >[2020/03/06 14:24:13.174026, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:365(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] itime [Fri Mar 6 12:22:21 PM 2020 IST] fileid [979889174f391ee4] >[2020/03/06 14:24:13.174061, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: parse_dos_attribute_blob returning (0x20): "a" >[2020/03/06 14:24:13.174077, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3538(open_file_ntcreate) > open_file_ntcreate: fname=test.txt, after mapping access_mask=0x110080 >[2020/03/06 14:24:13.174087, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3638(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0774, access_mask = 0x110080, open_access_mask = 0x110080 >[2020/03/06 14:24:13.174100, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file test.txt >[2020/03/06 14:24:13.174110, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for test.txt >[2020/03/06 14:24:13.174161, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1171(xid_to_sid) > xid_to_sid: UID 1001 -> S-1-5-21-2115043036-4192051364-4205911360-1000 from cache >[2020/03/06 14:24:13.174187, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.174198, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.174206, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.174213, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.174221, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.174261, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.174272, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.174283, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.174291, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-- >[2020/03/06 14:24:13.174300, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1001 gid 1001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.174309, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2115043036-4192051364-4205911360-1000 uid 1001 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.174318, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2115043036-4192051364-4205911360-1000 uid 1001 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1001 gid 1001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-- >[2020/03/06 14:24:13.174365, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2020/03/06 14:24:13.174377, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2020/03/06 14:24:13.174384, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 100 to (NT) 120089 >[2020/03/06 14:24:13.174399, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file test.txt requesting 0x110080 returning 0x10000 (NT_STATUS_ACCESS_DENIED) >[2020/03/06 14:24:13.174410, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:200(smbd_check_access_rights) > smbd_check_access_rights: acl for test.txt is: >[2020/03/06 14:24:13.174418, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > sd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2115043036-4192051364-4205911360-1000 > group_sid : * > group_sid : S-1-22-2-1001 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2115043036-4192051364-4205911360-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-1001 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00120089 (1179785) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2020/03/06 14:24:13.174642, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.174658, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.174667, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.174695, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.174705, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.174712, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.174720, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.174727, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.174866, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.174880, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.174887, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.174895, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.174901, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.174956, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.174972, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.174981, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.174993, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.175002, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.175018, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.175027, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.175034, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.175041, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.175048, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.175070, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.175079, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.175088, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.175096, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.175105, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.175114, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.175122, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.175139, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.175147, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.175180, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.175196, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x40 returning 0x40 (NT_STATUS_OK) >[2020/03/06 14:24:13.175207, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:247(smbd_check_access_rights) > smbd_check_access_rights: overrode DELETE_ACCESS on file test.txt >[2020/03/06 14:24:13.175215, 2, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:1454(open_file) > pcuser opened file test.txt read=No write=No (numopen=1) >[2020/03/06 14:24:13.175226, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.175233, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.175244, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 00FD0000000000003AF7 >[2020/03/06 14:24:13.175254, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a4fb10 >[2020/03/06 14:24:13.175267, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.175275, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.175296, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1780(share_mode_forall_entries_fn) > share_mode_forall_entries_fn: num_share_modes=0 >[2020/03/06 14:24:13.175305, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1791(share_mode_forall_entries_fn) > share_mode_forall_entries_fn: num_share_modes=0, writeback=0 >[2020/03/06 14:24:13.175313, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.175321, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x65865d48 >[2020/03/06 14:24:13.175330, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.175337, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.175345, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1780(share_mode_forall_entries_fn) > share_mode_forall_entries_fn: num_share_modes=0 >[2020/03/06 14:24:13.175352, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1791(share_mode_forall_entries_fn) > share_mode_forall_entries_fn: num_share_modes=0, writeback=0 >[2020/03/06 14:24:13.175360, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.175393, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:2514(delay_for_oplock) > No read or write lease requested >[2020/03/06 14:24:13.175404, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/brlock.c:1900(brl_get_locks_readonly) > seqnum=0, fsp->brlock_seqnum=0 >[2020/03/06 14:24:13.175431, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.175439, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) >[2020/03/06 14:24:13.175467, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.175475, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) >[2020/03/06 14:24:13.175495, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 4 for /usr/local/samba/var/lock/leases.tdb >[2020/03/06 14:24:13.175503, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:/usr/local/samba/var/lock/leases.tdb >[2020/03/06 14:24:13.175520, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:159(leases_db_do_locked_fn) > leases_db_do_locked_fn: >[2020/03/06 14:24:13.175528, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > value: struct leases_db_value > current_state : 0x00000000 (0) > 0: SMB2_LEASE_READ > 0: SMB2_LEASE_HANDLE > 0: SMB2_LEASE_WRITE > breaking : 0x00 (0) > breaking_to_requested : 0x00000000 (0) > 0: SMB2_LEASE_READ > 0: SMB2_LEASE_HANDLE > 0: SMB2_LEASE_WRITE > breaking_to_required : 0x00000000 (0) > 0: SMB2_LEASE_READ > 0: SMB2_LEASE_HANDLE > 0: SMB2_LEASE_WRITE > lease_version : 0x0002 (2) > epoch : 0x0001 (1) > num_files : 0x00000001 (1) > files: ARRAY(1) > files: struct leases_db_file > id: struct file_id > devid : 0x000000000000fd00 (64768) > inode : 0x000000000280f73a (42006330) > extid : 0x0000000000000000 (0) > servicepath : * > servicepath : '/share/samba/user' > base_name : * > base_name : 'test.txt' > stream_name : NULL >[2020/03/06 14:24:13.176320, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 4 for /usr/local/samba/var/lock/leases.tdb >[2020/03/06 14:24:13.176424, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:2566(delay_for_oplock) > delay_for_oplock: lease_state=0 >[2020/03/06 14:24:13.176454, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:2589(delay_for_oplock) > delay_for_oplock: oplock type 0x100 on file test.txt >[2020/03/06 14:24:13.176474, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.176482, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.176496, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1423(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/03/06 14:24:13.176506, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > op_mid : 0x0000000000000008 (8) > op_type : 0x0100 (256) > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) > access_mask : 0x00110080 (1114240) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri Mar 6 02:24:13 PM 2020 IST.173591 > share_file_id : 0x0000000000000003 (3) > uid : 0x000003e9 (1001) > flags : 0x0000 (0) > name_hash : 0x65865d48 (1703304520) > stale : 0x00 (0) >[2020/03/06 14:24:13.176586, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1551(set_share_mode_fn) > set_share_mode_fn: num_share_modes=0 >[2020/03/06 14:24:13.176595, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1566(set_share_mode_fn) > set_share_mode_fn: idx=0, found=0 >[2020/03/06 14:24:13.176602, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1592(set_share_mode_fn) > set_share_mode_fn: dbufs[0]=(0x7fff22134d90, 132) >[2020/03/06 14:24:13.176613, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.176625, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/03/06 14:24:13.176633, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0xcd576e0cdeb1e060 (-3650327971405635488) > flags : 0x0020 (32) > 0: SHARE_MODE_SHARE_DELETE > 0: SHARE_MODE_SHARE_WRITE > 0: SHARE_MODE_SHARE_READ > 1: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 0: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share/samba/user' > base_name : * > base_name : 'test.txt' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Fri Mar 6 12:22:33 PM 2020 IST > changed_write_time : NTTIME(0) > fresh : 0x01 (1) > modified : 0x01 (1) > have_share_modes : 0x01 (1) > id: struct file_id > devid : 0x000000000000fd00 (64768) > inode : 0x000000000280f73a (42006330) > extid : 0x0000000000000000 (0) >[2020/03/06 14:24:13.176809, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.176830, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.176841, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 00FD0000000000003AF7 >[2020/03/06 14:24:13.176849, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:182(share_mode_memcache_store) > share_mode_memcache_store: stored entry for file test.txt seq cd576e0cdeb1e061 key 64768:42006330:0 >[2020/03/06 14:24:13.176864, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5726(create_file_unixpath) > create_file_unixpath: info=1 >[2020/03/06 14:24:13.176872, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:6047(create_file_default) > create_file: info=1 >[2020/03/06 14:24:13.176882, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1327(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2020/03/06 14:24:13.176890, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: test.txt >[2020/03/06 14:24:13.176928, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:284(parse_dos_attribute_blob) > parse_dos_attribute_blob: test.txt attr = >[2020/03/06 14:24:13.176938, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:342(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] creation time [Fri Mar 6 12:22:21 PM 2020 IST] >[2020/03/06 14:24:13.176950, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:365(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] itime [Fri Mar 6 12:22:21 PM 2020 IST] fileid [979889174f391ee4] >[2020/03/06 14:24:13.176962, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: parse_dos_attribute_blob returning (0x20): "a" >[2020/03/06 14:24:13.176972, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x20): "a" >[2020/03/06 14:24:13.176985, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file test.txt >[2020/03/06 14:24:13.176996, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for test.txt >[2020/03/06 14:24:13.177131, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1171(xid_to_sid) > xid_to_sid: UID 1001 -> S-1-5-21-2115043036-4192051364-4205911360-1000 from cache >[2020/03/06 14:24:13.177183, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177199, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.177209, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177222, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.177234, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.177310, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.177329, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 1001 -> S-1-22-2-1001 fallback >[2020/03/06 14:24:13.177341, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.177350, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-- >[2020/03/06 14:24:13.177362, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1001 gid 1001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.177372, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2115043036-4192051364-4205911360-1000 uid 1001 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.177383, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2115043036-4192051364-4205911360-1000 uid 1001 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1001 gid 1001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-- >[2020/03/06 14:24:13.177403, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2020/03/06 14:24:13.177411, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2020/03/06 14:24:13.177419, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 100 to (NT) 120089 >[2020/03/06 14:24:13.177436, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/access_check.c:214(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1e01ff, remaining = 0x1e01ff >[2020/03/06 14:24:13.177452, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.177568, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.177584, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.177625, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177637, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.177645, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177652, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.177660, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.177804, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.177818, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177826, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.177833, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.177840, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.177861, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.177875, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177883, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.177895, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.177904, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.177919, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177928, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.177935, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.177942, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.177949, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.178010, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.178023, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.178033, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.178041, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.178050, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.178058, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.178067, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.178083, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.178091, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.178098, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.178111, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x40 returning 0x40 (NT_STATUS_OK) >[2020/03/06 14:24:13.178127, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.178136, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) >[2020/03/06 14:24:13.178168, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.178177, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.178187, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 6928A37A >[2020/03/06 14:24:13.178196, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a14920 >[2020/03/06 14:24:13.178246, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '6928A37A' stored >[2020/03/06 14:24:13.178259, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x6928a37a (1764270970) > open_persistent_id : 0x000000006928a37a (1764270970) > open_volatile_id : 0x0000000085700ef6 (2238713590) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 2a2728c5-5e61-11ea-9382-000c2936c6a5 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.178340, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 6928A37A >[2020/03/06 14:24:13.178348, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.178359, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:1033(smbXsrv_open_update) > smbXsrv_open_update: global_id (0x6928a37a) stored >[2020/03/06 14:24:13.178366, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x85700ef6 (2238713590) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x6928a37a (1764270970) > open_persistent_id : 0x000000006928a37a (1764270970) > open_volatile_id : 0x0000000085700ef6 (2238713590) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 2a2728c5-5e61-11ea-9382-000c2936c6a5 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : * > flags : 0x02 (2) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 1: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.178504, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1391(smbd_smb2_create_after_exec) > smb2_create_send: smbXsrv_open_update returned NT_STATUS_OK >[2020/03/06 14:24:13.178520, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1556(smbd_smb2_create_finish) > smbd_smb2_create_finish: test.txt - fnum 2238713590 >[2020/03/06 14:24:13.178540, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [8] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:164] at ../../source3/smbd/smb2_create.c:405 >[2020/03/06 14:24:13.178551, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8159/8192, total granted/max/low/range 34/8192/9/34 >[2020/03/06 14:24:13.179262, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.179306, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 9 (position 9) from bitmap >[2020/03/06 14:24:13.179319, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 9 >[2020/03/06 14:24:13.179335, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/03/06 14:24:13.179356, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.179377, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.179389, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.179410, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: test.txt - fnum 2238713590 >[2020/03/06 14:24:13.179466, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.179480, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.179493, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 00FD0000000000003AF7 >[2020/03/06 14:24:13.179506, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a3f530 >[2020/03/06 14:24:13.179519, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:359(share_mode_memcache_fetch) > share_mode_memcache_fetch: fetched entry for file test.txt seq cd576e0cdeb1e061 key 64768:42006330:0 >[2020/03/06 14:24:13.179531, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/smbd/oplock.c:205(remove_oplock) > remove_oplock: remove_oplock called for test.txt >[2020/03/06 14:24:13.179541, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.179549, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.179560, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1936(share_mode_entry_do_fn) > share_mode_entry_do_fn: state->num_share_modes=1 >[2020/03/06 14:24:13.179569, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1479(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0 >[2020/03/06 14:24:13.179577, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1489(share_mode_entry_find) > share_mode_entry_find: blob.data=0x55aaa1a44cf0, blob.length=132 >[2020/03/06 14:24:13.179592, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1423(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/03/06 14:24:13.179600, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > op_mid : 0x0000000000000008 (8) > op_type : 0x0000 (0) > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) > access_mask : 0x00110080 (1114240) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri Mar 6 02:24:13 PM 2020 IST.173591 > share_file_id : 0x0000000000000003 (3) > uid : 0x000003e9 (1001) > flags : 0x0000 (0) > name_hash : 0x65865d48 (1703304520) > stale : 0x00 (0) >[2020/03/06 14:24:13.179738, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.179752, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.179761, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.179772, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1780(share_mode_forall_entries_fn) > share_mode_forall_entries_fn: num_share_modes=1 >[2020/03/06 14:24:13.179783, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1697(share_mode_for_one_entry) > share_mode_for_one_entry: entry[0]: >[2020/03/06 14:24:13.179791, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > op_mid : 0x0000000000000008 (8) > op_type : 0x0000 (0) > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) > access_mask : 0x00110080 (1114240) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri Mar 6 02:24:13 PM 2020 IST.173591 > share_file_id : 0x0000000000000003 (3) > uid : 0x000003e9 (1001) > flags : 0x0000 (0) > name_hash : 0x65865d48 (1703304520) > stale : 0x00 (0) >[2020/03/06 14:24:13.179853, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1706(share_mode_for_one_entry) > share_mode_for_one_entry: entry[0]: modified=0, e.stale=0 >[2020/03/06 14:24:13.179861, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1791(share_mode_forall_entries_fn) > share_mode_forall_entries_fn: num_share_modes=1, writeback=0 >[2020/03/06 14:24:13.179869, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.179878, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.179886, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b041faaa0 (-30189255939424) > data : 0x00000000000041fc (16892) >[2020/03/06 14:24:13.179909, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 4 for /usr/local/samba/var/lock/leases.tdb >[2020/03/06 14:24:13.179959, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:/usr/local/samba/var/lock/leases.tdb >[2020/03/06 14:24:13.179991, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 4 for /usr/local/samba/var/lock/leases.tdb >[2020/03/06 14:24:13.180004, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.180018, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x65865d48 >[2020/03/06 14:24:13.180046, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.180055, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.180066, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1936(share_mode_entry_do_fn) > share_mode_entry_do_fn: state->num_share_modes=1 >[2020/03/06 14:24:13.180074, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1479(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0 >[2020/03/06 14:24:13.180082, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1489(share_mode_entry_find) > share_mode_entry_find: blob.data=0x55aaa1a44cf0, blob.length=132 >[2020/03/06 14:24:13.180094, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.180102, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/03/06 14:24:13.180110, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0xcd576e0cdeb1e061 (-3650327971405635487) > flags : 0x0020 (32) > 0: SHARE_MODE_SHARE_DELETE > 0: SHARE_MODE_SHARE_WRITE > 0: SHARE_MODE_SHARE_READ > 1: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 0: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share/samba/user' > base_name : * > base_name : 'test.txt' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Fri Mar 6 12:22:33 PM 2020 IST > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x01 (1) > have_share_modes : 0x00 (0) > id: struct file_id > devid : 0x000000000000fd00 (64768) > inode : 0x000000000280f73a (42006330) > extid : 0x0000000000000000 (0) >[2020/03/06 14:24:13.181727, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:408(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/03/06 14:24:13.181770, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.181796, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 00FD0000000000003AF7 >[2020/03/06 14:24:13.181822, 2, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/close.c:817(close_normal_file) > pcuser closed file test.txt (numopen=0) NT_STATUS_OK >[2020/03/06 14:24:13.181837, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.181845, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.181855, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 6928A37A >[2020/03/06 14:24:13.181864, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a14920 >[2020/03/06 14:24:13.181878, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 6928A37A >[2020/03/06 14:24:13.181886, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.181899, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:569(file_free) > freed files structure 2238713590 (0 used) >[2020/03/06 14:24:13.181913, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for test.txt >[2020/03/06 14:24:13.181929, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: test.txt >[2020/03/06 14:24:13.181960, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:284(parse_dos_attribute_blob) > parse_dos_attribute_blob: test.txt attr = >[2020/03/06 14:24:13.181969, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:342(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] creation time [Fri Mar 6 12:22:21 PM 2020 IST] >[2020/03/06 14:24:13.181983, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:365(parse_dos_attribute_blob) > parse_dos_attribute_blob: file [test.txt] itime [Fri Mar 6 12:22:21 PM 2020 IST] fileid [979889174f391ee4] >[2020/03/06 14:24:13.181994, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: parse_dos_attribute_blob returning (0x20): "a" >[2020/03/06 14:24:13.182004, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x20): "a" >[2020/03/06 14:24:13.182020, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:3158(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [9] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/03/06 14:24:13.182032, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8159/8192, total granted/max/low/range 34/8192/10/34 >[2020/03/06 14:24:13.183640, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:4053(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/03/06 14:24:13.183711, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 10 (position 10) from bitmap >[2020/03/06 14:24:13.183728, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_server.c:2357(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 10 >[2020/03/06 14:24:13.183748, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/03/06 14:24:13.183775, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.183799, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.183810, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1001,1001), gid=(0,1001), cwd=[/share/samba/user] >[2020/03/06 14:24:13.183834, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:714(smbd_smb2_create_send) > smbd_smb2_create_send: name [] >[2020/03/06 14:24:13.183855, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:1271(smbd_smb2_create_before_exec) > Got lease request size 52 >[2020/03/06 14:24:13.183865, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > state->lease_ptr: struct smb2_lease > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b0bf8caa0 (-30189124269408) > data : 0x00000000000041ff (16895) > lease_state : 0x00000007 (7) > 1: SMB2_LEASE_READ > 1: SMB2_LEASE_HANDLE > 1: SMB2_LEASE_WRITE > lease_flags : 0x00000000 (0) > lease_duration : 0x0000000000000000 (0) > parent_lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > lease_version : 0x0002 (2) > lease_epoch : 0x0000 (0) >[2020/03/06 14:24:13.183914, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=smb2] ../../source3/smbd/smb2_create.c:819(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/03/06 14:24:13.183958, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "" >[2020/03/06 14:24:13.184001, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.184021, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/filename.c:514(unix_convert) > conversion finished "" -> . >[2020/03/06 14:24:13.184033, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:897(is_in_path) > is_in_path: . >[2020/03/06 14:24:13.184052, 8, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/lib/util.c:921(is_in_path) > is_in_path: match not found >[2020/03/06 14:24:13.184137, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/share/samba/user] >[2020/03/06 14:24:13.184183, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [.] -> [/share/samba/user] >[2020/03/06 14:24:13.184201, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: . reduced to /share/samba/user >[2020/03/06 14:24:13.184222, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5905(create_file_default) > create_file_default: create_file: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = . >[2020/03/06 14:24:13.184246, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:5353(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2020/03/06 14:24:13.184270, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/03/06 14:24:13.184285, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffe48b0bf8caa0 (-30189124269408) > data : 0x00000000000041ff (16895) >[2020/03/06 14:24:13.184361, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.184380, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.184398, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 057AE572 >[2020/03/06 14:24:13.184414, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a39680 >[2020/03/06 14:24:13.184427, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/03/06 14:24:13.184467, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '057AE572' stored >[2020/03/06 14:24:13.184486, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x057ae572 (91940210) > open_persistent_id : 0x00000000057ae572 (91940210) > open_volatile_id : 0x000000007aaead35 (2058267957) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.184694, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 057AE572 >[2020/03/06 14:24:13.184706, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.184715, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x057ae572) stored >[2020/03/06 14:24:13.184723, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x7aaead35 (2058267957) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x057ae572 (91940210) > open_persistent_id : 0x00000000057ae572 (91940210) > open_volatile_id : 0x000000007aaead35 (2058267957) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.184909, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 2058267957 (1 used) >[2020/03/06 14:24:13.184943, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:757(file_name_hash) > file_name_hash: /share/samba/user/. hash 0xf13b0430 >[2020/03/06 14:24:13.184958, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(.) returning 0774 >[2020/03/06 14:24:13.184967, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3352(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x100081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0774 oplock_request=256 private_flags = 0x0 >[2020/03/06 14:24:13.185000, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2020/03/06 14:24:13.185020, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3538(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x100081 >[2020/03/06 14:24:13.185031, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:3638(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0774, access_mask = 0x100081, open_access_mask = 0x100081 >[2020/03/06 14:24:13.185044, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.185056, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.185120, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.185137, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.185145, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.185153, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.185161, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.185326, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.185341, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.185349, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.185356, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.185363, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.185453, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.185475, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.185484, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.185498, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.185508, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.185527, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.185536, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.185544, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.185551, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.185558, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.185581, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.185591, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.185601, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.185609, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.185619, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.185627, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.185636, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.185653, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.185661, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.185717, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.185746, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x100081 returning 0x100001 (NT_STATUS_OK) >[2020/03/06 14:24:13.185766, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.185783, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.185794, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/share/samba/user] >[2020/03/06 14:24:13.185807, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [.] -> [/share/samba/user] >[2020/03/06 14:24:13.185815, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: . reduced to /share/samba/user >[2020/03/06 14:24:13.185824, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_open] >[2020/03/06 14:24:13.185833, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a525f0] cc->busy [0x7fff22134d28] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.185842, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1616(fruit_open) > fruit_open: Path [.] >[2020/03/06 14:24:13.185851, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:378(streams_xattr_open) > streams_xattr_open called for . with flags 0x20800 >[2020/03/06 14:24:13.185863, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_open] >[2020/03/06 14:24:13.185870, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a525f0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.185880, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 04000 mode = 0774, fd = 36. >[2020/03/06 14:24:13.185890, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_fstat] >[2020/03/06 14:24:13.185898, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:361: cc [0x55aaa1a525f0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.185907, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a525f0] cc->busy [0x7fff22135050] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.185918, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_fstat] >[2020/03/06 14:24:13.185952, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a525f0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.185965, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1699(fruit_close) > fruit_close: Path [.] fd [36] >[2020/03/06 14:24:13.185974, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:508(streams_xattr_close) > streams_xattr_close: streams_xattr_close called [.] fd [36] >[2020/03/06 14:24:13.185989, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.185998, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.186008, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 057AE572 >[2020/03/06 14:24:13.186019, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a14920 >[2020/03/06 14:24:13.186034, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 057AE572 >[2020/03/06 14:24:13.186041, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.186053, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:569(file_free) > freed files structure 2058267957 (0 used) >[2020/03/06 14:24:13.186062, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:4240(open_directory) > open_directory: opening directory ., access_mask = 0x100081, share_access = 0x7 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x10 >[2020/03/06 14:24:13.186075, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:3519(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2020/03/06 14:24:13.186084, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.186113, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.186123, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.186131, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.186138, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.186145, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.186237, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.186277, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.186290, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/03/06 14:24:13.186297, 5, pid=734090, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.186304, 5, pid=734090, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.186324, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/03/06 14:24:13.186337, 4, pid=734090, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.186345, 5, pid=734090, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1424(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2020/03/06 14:24:13.186357, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.186366, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2020/03/06 14:24:13.186382, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(1001, 1001) : sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.186391, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/uid.c:561(push_conn_ctx) > push_conn_ctx(1683738251) : conn_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.186398, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/03/06 14:24:13.186405, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/03/06 14:24:13.186412, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/03/06 14:24:13.186435, 4, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (1001, 1001) - sec_ctx_stack_ndx = 0 >[2020/03/06 14:24:13.186444, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/03/06 14:24:13.186454, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2763(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2020/03/06 14:24:13.186461, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.186470, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.186479, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:2776(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.186488, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2020/03/06 14:24:13.186543, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.186555, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.186562, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=acls] ../../source3/smbd/posix_acls.c:1111(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2020/03/06 14:24:13.186575, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x100081 returning 0x100001 (NT_STATUS_OK) >[2020/03/06 14:24:13.186597, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.186606, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.186615, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 8F6C0F17 >[2020/03/06 14:24:13.186624, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a39680 >[2020/03/06 14:24:13.186632, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/03/06 14:24:13.186658, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '8F6C0F17' stored >[2020/03/06 14:24:13.186668, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x8f6c0f17 (2406223639) > open_persistent_id : 0x000000008f6c0f17 (2406223639) > open_volatile_id : 0x00000000f177fd83 (4051172739) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/03/06 14:24:13.186780, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 8F6C0F17 >[2020/03/06 14:24:13.186792, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /usr/local/samba/var/lock/smbXsrv_open_global.tdb >[2020/03/06 14:24:13.186800, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x8f6c0f17) stored >[2020/03/06 14:24:13.186808, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xf177fd83 (4051172739) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > open_global_id : 0x8f6c0f17 (2406223639) > open_persistent_id : 0x000000008f6c0f17 (2406223639) > open_volatile_id : 0x00000000f177fd83 (4051172739) > open_owner : S-1-5-21-2115043036-4192051364-4205911360-1000 > open_time : Fri Mar 6 02:24:13 PM 2020 IST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 2a272745-5e61-11ea-9382-000c2936c6a5 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Fri Mar 6 02:24:13 PM 2020 IST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/03/06 14:24:13.186919, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 4051172739 (1 used) >[2020/03/06 14:24:13.186931, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/files.c:757(file_name_hash) > file_name_hash: /share/samba/user/. hash 0xf13b0430 >[2020/03/06 14:24:13.186944, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for . >[2020/03/06 14:24:13.186985, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:3153(fruit_stat) > fruit_stat called for /share/samba/user >[2020/03/06 14:24:13.186999, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1220(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/share/samba/user] >[2020/03/06 14:24:13.187013, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1283(check_reduced_name) > check_reduced_name realpath [.] -> [/share/samba/user] >[2020/03/06 14:24:13.187021, 5, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/smbd/vfs.c:1395(check_reduced_name) > check_reduced_name: . reduced to /share/samba/user >[2020/03/06 14:24:13.187030, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_open] >[2020/03/06 14:24:13.187038, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a396a0] cc->busy [0x7fff22134f78] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.187047, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=fruit] ../../source3/modules/vfs_fruit.c:1616(fruit_open) > fruit_open: Path [.] >[2020/03/06 14:24:13.187055, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=vfs] ../../source3/modules/vfs_streams_xattr.c:378(streams_xattr_open) > streams_xattr_open called for . with flags 0x30000 >[2020/03/06 14:24:13.187067, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_open] >[2020/03/06 14:24:13.187075, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a396a0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.187084, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 36. >[2020/03/06 14:24:13.187093, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:398(catia_fetch_fsp_pre_next) > catia_fetch_fsp_pre_next: Called from [catia_fstat] >[2020/03/06 14:24:13.187100, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:361: cc [0x55aaa1a396a0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.187110, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:471: cc [0x55aaa1a396a0] cc->busy [0x7fff22135170] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.187119, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:492(catia_fetch_fsp_post_next) > catia_fetch_fsp_post_next: Called from [catia_fstat] >[2020/03/06 14:24:13.187127, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=catia] ../../source3/modules/vfs_catia.c:267(catia_debug_cc) > ../../source3/modules/vfs_catia.c:517: cc [0x55aaa1a396a0] cc->busy [(nil)] is_fsp_ext [yes] fsp [0x55aaa1a4c7f0] fsp name [.] orig_fname [.] fname [.] orig_base_fname [(null)] base_fname [(null)] >[2020/03/06 14:24:13.187137, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /usr/local/samba/var/lock/locking.tdb >[2020/03/06 14:24:13.187170, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/03/06 14:24:13.187184, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 00FD00000000000039F7 >[2020/03/06 14:24:13.187194, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55aaa1a4fb10 >[2020/03/06 14:24:13.187205, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf13b0430 >[2020/03/06 14:24:13.187215, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.187223, 10, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/usr/local/samba/var/lock/locking.tdb 2:<none> 3:/usr/local/samba/var/lock/share_entries.tdb 4:<none> >[2020/03/06 14:24:13.187233, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1423(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/03/06 14:24:13.187241, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000b338a (734090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xdc10d9412d82392e (-2589330911778424530) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri Mar 6 02:24:13 PM 2020 IST.186590 > share_file_id : 0x0000000000000005 (5) > uid : 0x000003e9 (1001) > flags : 0x0000 (0) > name_hash : 0xf13b0430 (4047176752) > stale : 0x00 (0) >[2020/03/06 14:24:13.187305, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1551(set_share_mode_fn) > set_share_mode_fn: num_share_modes=0 >[2020/03/06 14:24:13.187312, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1566(set_share_mode_fn) > set_share_mode_fn: idx=0, found=0 >[2020/03/06 14:24:13.187320, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:1592(set_share_mode_fn) > set_share_mode_fn: dbufs[0]=(0x7fff22134ec0, 132) >[2020/03/06 14:24:13.187329, 5, pid=734090, effective(1001, 1001), real(1001, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /usr/local/samba/var/lock/share_entries.tdb >[2020/03/06 14:24:13.187338, 10, pid=734090, effective(1001, 1001), real(1001, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/03/06 14:24:13.187376, 1, pid=734090, effective(1001, 1001), real(1001, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:429(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0x16ec94f744119c03 (1651858953057967107) > flags : 0x0008 (8) > 0: SHARE_MODE_SHARE_DELETE > 0: SHARE_MODE_SHARE_WRITE > 0: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share/samba/user' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NT