The Samba-Bugzilla – Attachment 16010 Details for
Bug 14391
DFS links broken in 4.12
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log level 10
log.smbd (text/plain), 1.27 MB, created by
docmax
on 2020-05-27 15:19:47 UTC
(
hide
)
Description:
log level 10
Filename:
MIME Type:
Creator:
docmax
Created:
2020-05-27 15:19:47 UTC
Size:
1.27 MB
patch
obsolete
>[2020/05/27 16:56:12.078853, 0] ../../source3/smbd/server.c:1782(main) > smbd version 4.12.3 started. > Copyright Andrew Tridgell and the Samba Team 1992-2020 >[2020/05/27 16:56:12.083373, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3932(lp_load_ex) > lp_load_ex: refreshing parameters >[2020/05/27 16:56:12.083410, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1368(free_param_opts) > Freeing parametrics: >[2020/05/27 16:56:12.083475, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:550(init_globals) > Initialising global parameters >[2020/05/27 16:56:12.083561, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2844(lp_do_section) > Processing section "[global]" > doing parameter workgroup = WORKGROUP > doing parameter local master = no > doing parameter store dos attributes = yes > doing parameter map archive = no > doing parameter map hidden = no > doing parameter map system = no > doing parameter map readonly = no > doing parameter map to guest = Bad User > doing parameter allow insecure wide links = yes > doing parameter load printers = no > doing parameter printing = bsd > doing parameter printcap name = /dev/null > doing parameter disable spoolss = yes > doing parameter acl allow execute always = yes > doing parameter host msdfs = yes > doing parameter log level = 10 >[2020/05/27 16:56:12.083720, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:12.083905, 2, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2861(lp_do_section) > Processing section "[dfs]" >[2020/05/27 16:56:12.083931, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1483(add_a_service) > add_a_service: Creating snum = 0 for dfs >[2020/05/27 16:56:12.083946, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1525(hash_a_service) > hash_a_service: creating servicehash >[2020/05/27 16:56:12.083960, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1533(hash_a_service) > hash_a_service: hashing index 0 for service name dfs > doing parameter path = /mnt/dfs > doing parameter msdfs root = yes > doing parameter read only = no > doing parameter guest ok = yes > doing parameter force user = root > doing parameter follow symlinks = yes >[2020/05/27 16:56:12.084033, 2, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2861(lp_do_section) > Processing section "[root]" >[2020/05/27 16:56:12.084060, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1483(add_a_service) > add_a_service: Creating snum = 1 for root >[2020/05/27 16:56:12.084076, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1533(hash_a_service) > hash_a_service: hashing index 1 for service name root > doing parameter path = / > doing parameter guest ok = yes > doing parameter writeable = yes > doing parameter force user = root > doing parameter browsable = yes >[2020/05/27 16:56:12.084136, 2, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2861(lp_do_section) > Processing section "[root-docmax]" >[2020/05/27 16:56:12.084158, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1483(add_a_service) > add_a_service: Creating snum = 2 for root-docmax >[2020/05/27 16:56:12.084182, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1533(hash_a_service) > hash_a_service: hashing index 2 for service name root-docmax > doing parameter path = / > doing parameter guest ok = yes > doing parameter writeable = yes > doing parameter force user = docmax > doing parameter browsable = yes >[2020/05/27 16:56:12.084251, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3974(lp_load_ex) > pm_process() returned Yes >[2020/05/27 16:56:12.084273, 7, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4309(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2020/05/27 16:56:12.084296, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1483(add_a_service) > add_a_service: Creating snum = 3 for IPC$ >[2020/05/27 16:56:12.084311, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1533(hash_a_service) > hash_a_service: hashing index 3 for service name IPC$ >[2020/05/27 16:56:12.084333, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1645(lp_add_ipc) > adding IPC service >[2020/05/27 16:56:12.084367, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:12.084614, 6, pid=136415, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:12.084655, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:12.085075, 2, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/interface.c:343(add_interface) > added interface eth0 ip=192.168.1.2 bcast=192.168.1.255 netmask=255.255.255.0 >[2020/05/27 16:56:12.085180, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1851(main) > loaded services >[2020/05/27 16:56:12.085211, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/util_names.c:152(init_names) > Netbios name list:- > my_netbios_names[0]="SERVER" >[2020/05/27 16:56:12.088297, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 4 - private_data=(nil) >[2020/05/27 16:56:12.088469, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 7 - private_data=(nil) >[2020/05/27 16:56:12.088656, 1, pid=136415, effective(0, 0), real(0, 0)] ../../source3/profile/profile.c:54(set_profile_level) > INFO: Profiling turned OFF from pid 136415 >[2020/05/27 16:56:12.088714, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1870(main) > Standard input is not a socket, assuming -D option >[2020/05/27 16:56:12.088742, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1883(main) > Becoming a daemon. >[2020/05/27 16:56:12.089085, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/05/27 16:56:12.089311, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Erfolg >[2020/05/27 16:56:12.089401, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 12821321390310324031 >[2020/05/27 16:56:12.089436, 2, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:87(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/05/27 16:56:12.089526, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend samba_dsdb >[2020/05/27 16:56:12.089562, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'samba_dsdb' >[2020/05/27 16:56:12.089586, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend samba4 >[2020/05/27 16:56:12.089610, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'samba4' >[2020/05/27 16:56:12.089633, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/05/27 16:56:12.089656, 2, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:161(make_pdb_method_name) > No builtin backend found, trying to load plugin >[2020/05/27 16:56:12.089702, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:158(load_module_absolute_path) > load_module_absolute_path: Probing module '/usr/lib/samba/pdb/tdbsam.so' >[2020/05/27 16:56:12.096747, 3, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/modules.c:167(load_module_absolute_path) > load_module_absolute_path: Module '/usr/lib/samba/pdb/tdbsam.so' loaded >[2020/05/27 16:56:12.096834, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:79(smb_register_passdb) > Attempting to register passdb backend tdbsam >[2020/05/27 16:56:12.096872, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:92(smb_register_passdb) > Successfully added passdb backend 'tdbsam' >[2020/05/27 16:56:12.096904, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/05/27 16:56:12.096946, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/05/27 16:56:12.097911, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_version_global.tdb >[2020/05/27 16:56:12.097965, 10, pid=136415, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_version_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:12.098001, 10, pid=136415, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 736D62587372765F7665 >[2020/05/27 16:56:12.098032, 10, pid=136415, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb47567e0 >[2020/05/27 16:56:12.098228, 10, pid=136415, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 736D62587372765F7665 >[2020/05/27 16:56:12.098272, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_version_global.tdb >[2020/05/27 16:56:12.098290, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_version.c:250(smbXsrv_version_global_init) > smbXsrv_version_global_init >[2020/05/27 16:56:12.098335, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_version.c:251(smbXsrv_version_global_init) >[2020/05/27 16:56:12.098372, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_version_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_version_globalU(case 0) > info0 : * > info0: struct smbXsrv_version_global0 > db_rec : NULL > num_nodes : 0x00000001 (1) > nodes: ARRAY(1) > nodes: struct smbXsrv_version_node0 > server_id: struct server_id > pid : 0x00000000000214df (136415) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xb1ee7bdfcc90773f (-5625422683399227585) > min_version : SMBXSRV_VERSION_0 (0) > max_version : SMBXSRV_VERSION_0 (0) > current_version : SMBXSRV_VERSION_0 (0) >[2020/05/27 16:56:12.103727, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/util_procid.c:53(pid_to_procid) > pid_to_procid: messaging_dgm_get_unique failed: Datei oder Verzeichnis nicht gefunden >[2020/05/27 16:56:12.104081, 10, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/05/27 16:56:12.104537, 10, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Erfolg >[2020/05/27 16:56:12.104592, 10, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 7608390790625950932 >[2020/05/27 16:56:12.104631, 2, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:87(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/05/27 16:56:12.104682, 5, pid=136417, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/05/27 16:56:12.104717, 5, pid=136417, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/05/27 16:56:12.104783, 5, pid=136417, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/05/27 16:56:12.104832, 5, pid=136417, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:12.105450, 10, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/05/27 16:56:12.105742, 10, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Erfolg >[2020/05/27 16:56:12.105784, 10, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 18143378620196285180 >[2020/05/27 16:56:12.105811, 2, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:87(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/05/27 16:56:12.105838, 5, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) >[2020/05/27 16:56:12.105845, 5, pid=136418, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Registering messaging pointer for type 794 - private_data=0x55ddb471a540 > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/05/27 16:56:12.105868, 5, pid=136418, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) >[2020/05/27 16:56:12.105869, 5, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Found pdb backend tdbsam > Registering messaging pointer for type 795 - private_data=0x55ddb471a540 >[2020/05/27 16:56:12.105888, 5, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 796 - private_data=0x55ddb471a540 >[2020/05/27 16:56:12.105912, 5, pid=136418, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/05/27 16:56:12.105940, 5, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 13 - private_data=0x55ddb4710880 >[2020/05/27 16:56:12.105963, 5, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 788 - private_data=0x55ddb4710880 >[2020/05/27 16:56:12.106113, 10, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1444(messaging_dgm_send) > messaging_dgm_send: Sending message to 136415 >[2020/05/27 16:56:12.106125, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:619(cleanupd_init) > cleanupd_init: Started cleanupd pid=136418 >[2020/05/27 16:56:12.106301, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 789 - private_data=0x55ddb4758490 >[2020/05/27 16:56:12.107921, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:769(regdb_init) > regdb_init: registry db openend. refcount reset (1) >[2020/05/27 16:56:12.108013, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:68(reghook_cache_init) > reghook_cache_init: new tree with default ops 0x7f2f6627e100 for key [] >[2020/05/27 16:56:12.109061, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2020/05/27 16:56:12.109121, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Samba Printer Port] len[2] >[2020/05/27 16:56:12.109160, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2020/05/27 16:56:12.109194, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DefaultSpoolDirectory] len[70] >[2020/05/27 16:56:12.109217, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.109245, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2020/05/27 16:56:12.109264, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.109283, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.109316, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2020/05/27 16:56:12.109408, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.109435, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f66799680 for key [\HKLM\SYSTEM\CurrentControlSet\Control\Print\Printers] >[2020/05/27 16:56:12.109453, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109475, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Control\Print\Printers] to tree >[2020/05/27 16:56:12.109492, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.109509, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f6627e100 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2020/05/27 16:56:12.109534, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109563, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] to tree >[2020/05/27 16:56:12.109591, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.109608, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f6627e100 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2020/05/27 16:56:12.109625, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109644, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] to tree >[2020/05/27 16:56:12.109668, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.109685, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f6627e100 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\PackageInstallation] >[2020/05/27 16:56:12.109702, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109721, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\PackageInstallation] to tree >[2020/05/27 16:56:12.109737, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.109754, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f667996e0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] >[2020/05/27 16:56:12.109770, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109788, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] to tree >[2020/05/27 16:56:12.109805, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.109821, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f6627e020 for key [\HKLM\SOFTWARE\Samba\smbconf] >[2020/05/27 16:56:12.109872, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109892, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Samba\smbconf] to tree >[2020/05/27 16:56:12.109909, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.109925, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f66799740 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] >[2020/05/27 16:56:12.109942, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.109960, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] to tree >[2020/05/27 16:56:12.109984, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.110003, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f667997a0 for key [\HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] >[2020/05/27 16:56:12.110019, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.110038, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] to tree >[2020/05/27 16:56:12.110054, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.110077, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f66799800 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters] >[2020/05/27 16:56:12.110094, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.110113, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters] to tree >[2020/05/27 16:56:12.110129, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.110581, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f66799860 for key [\HKPT] >[2020/05/27 16:56:12.110635, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.110667, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKPT] to tree >[2020/05/27 16:56:12.110691, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.110724, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f667998c0 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] >[2020/05/27 16:56:12.110751, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.110779, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] to tree >[2020/05/27 16:56:12.110804, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.110831, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:93(reghook_cache_add) > reghook_cache_add: Adding ops 0x7f2f66799920 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] >[2020/05/27 16:56:12.110857, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2020/05/27 16:56:12.110885, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:281(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] to tree >[2020/05/27 16:56:12.110911, 8, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2020/05/27 16:56:12.110935, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (1->0) >[2020/05/27 16:56:12.111704, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1102(auth3_session_info_create) > Could not convert SID S-1-5-18 to gid, ignoring it >[2020/05/27 16:56:12.111770, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (1): > SID[ 0]: S-1-5-18 > Privileges (0xFFFFFFFFFFFFFFFF): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >[2020/05/27 16:56:12.111914, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 1 supplementary groups > Group[ 0]: 0 >[2020/05/27 16:56:12.111950, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/05/27 16:56:12.111968, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/05/27 16:56:12.112476, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/05/27 16:56:12.112514, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user SERVER\nobody >[2020/05/27 16:56:12.112531, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is server\nobody >[2020/05/27 16:56:12.113702, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:127(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as given is SERVER\nobody >[2020/05/27 16:56:12.114256, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:140(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is SERVER\NOBODY >[2020/05/27 16:56:12.114695, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:152(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in server\nobody >[2020/05/27 16:56:12.114728, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [SERVER\nobody]! >[2020/05/27 16:56:12.114751, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/05/27 16:56:12.114771, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/05/27 16:56:12.114794, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/05/27 16:56:12.114835, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:321(create_local_nt_token_from_info3) > Create local NT token for nobody >[2020/05/27 16:56:12.114861, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/05/27 16:56:12.114882, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/05/27 16:56:12.114903, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/05/27 16:56:12.114948, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2020/05/27 16:56:12.115198, 5, pid=136415, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:85(gencache_init) > Opening cache file at /var/cache/samba/gencache.tdb >[2020/05/27 16:56:12.116826, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.117223, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.117253, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.117275, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.117295, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.117551, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.117593, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 65534 -> S-1-22-2-65534 fallback >[2020/05/27 16:56:12.117630, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.117652, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.117674, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.117694, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.117713, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.117768, 3, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:688(finalize_local_nt_token) > Failed to fetch domain sid for WORKGROUP >[2020/05/27 16:56:12.117798, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.117831, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.117853, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.117873, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.117892, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.117911, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.117953, 10, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-544 >[2020/05/27 16:56:12.117987, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:162(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2020/05/27 16:56:12.118015, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118046, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.118068, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118097, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.118118, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.118136, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.118177, 10, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-545 >[2020/05/27 16:56:12.118207, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:132(create_builtin_users) > create_builtin_users: Failed to create Users >[2020/05/27 16:56:12.118234, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118264, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.118285, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118310, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.118350, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.118377, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.118455, 10, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/05/27 16:56:12.118514, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:205(create_builtin_guests) > create_builtin_guests: Failed to create Guests >[2020/05/27 16:56:12.118554, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118592, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.118631, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118659, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.118688, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.118707, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.118809, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.118911, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2719442082-4279343518-2111927761-501] >[2020/05/27 16:56:12.118941, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2719442082-4279343518-2111927761-514] >[2020/05/27 16:56:12.118966, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65534] >[2020/05/27 16:56:12.119001, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:178(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2020/05/27 16:56:12.119032, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2020/05/27 16:56:12.119057, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-546] >[2020/05/27 16:56:12.119091, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:57(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2719442082-4279343518-2111927761-501]: value=[65534:U] >[2020/05/27 16:56:12.119115, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:75(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2719442082-4279343518-2111927761-501]: id=[65534], endptr=[:U] >[2020/05/27 16:56:12.119158, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1299(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2020/05/27 16:56:12.119181, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.119202, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.119222, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.119244, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.119271, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.119308, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1759(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 514. >[2020/05/27 16:56:12.119353, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:12.119384, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.119412, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:12.119440, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.119463, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.119571, 4, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:558(tdbsam_open) > tdbsam_open: successfully opened /var/lib/samba/private/passdb.tdb >[2020/05/27 16:56:12.119600, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:658(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 514 by key RID_00000202. >[2020/05/27 16:56:12.119649, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.119675, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1836(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2020/05/27 16:56:12.119727, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1543(pdb_default_sid_to_id) > SID S-1-5-21-2719442082-4279343518-2111927761-514 belongs to our domain, but there is no corresponding object in the database. >[2020/05/27 16:56:12.119768, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.119804, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2719442082-4279343518-2111927761-514 >[2020/05/27 16:56:12.119828, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.119848, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.119867, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.119887, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.119906, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.119940, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1759(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 514. >[2020/05/27 16:56:12.119963, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:12.119983, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120003, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:12.120022, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.120041, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.120080, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:658(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 514 by key RID_00000202. >[2020/05/27 16:56:12.120116, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120139, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1836(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2020/05/27 16:56:12.120158, 5, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1543(pdb_default_sid_to_id) > SID S-1-5-21-2719442082-4279343518-2111927761-514 belongs to our domain, but there is no corresponding object in the database. >[2020/05/27 16:56:12.120187, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120208, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2719442082-4279343518-2111927761-514 >[2020/05/27 16:56:12.120230, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120259, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120279, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120301, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.120332, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.120394, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120428, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/05/27 16:56:12.120460, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120481, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120500, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120550, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.120571, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.120611, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120634, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/05/27 16:56:12.120656, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120678, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120698, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120717, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.120736, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.120775, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120800, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/05/27 16:56:12.120841, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120870, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.120897, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.120924, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.120965, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.121008, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.121031, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/05/27 16:56:12.121053, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.121073, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.121093, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.121112, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.121131, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.121173, 10, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/05/27 16:56:12.121203, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.121224, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2020/05/27 16:56:12.121246, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.121266, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.121285, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.121311, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.121348, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.121406, 10, pid=136415, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/05/27 16:56:12.121453, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.121477, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2020/05/27 16:56:12.121498, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-5-21-2719442082-4279343518-2111927761-514 to gid, ignoring it >[2020/05/27 16:56:12.121521, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2020/05/27 16:56:12.121541, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2020/05/27 16:56:12.121561, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2020/05/27 16:56:12.121591, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:12.121663, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:12.121703, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/05/27 16:56:12.121743, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/05/27 16:56:12.121769, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/05/27 16:56:12.121839, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1299(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2020/05/27 16:56:12.121865, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.121886, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.121906, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.121927, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.121946, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.122013, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122045, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-7 >[2020/05/27 16:56:12.122079, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122100, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122119, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122139, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.122158, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.122198, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122220, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-7 >[2020/05/27 16:56:12.122241, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122270, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122290, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122318, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.122356, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.122409, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122443, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/05/27 16:56:12.122475, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122504, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122524, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122543, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.122562, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.122610, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122652, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/05/27 16:56:12.122684, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122705, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122725, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122744, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.122763, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.122803, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122826, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/05/27 16:56:12.122847, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122868, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122887, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.122915, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.122934, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.122973, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.122995, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/05/27 16:56:12.123068, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1102(auth3_session_info_create) > Could not convert SID S-1-5-7 to gid, ignoring it >[2020/05/27 16:56:12.123111, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1102(auth3_session_info_create) > Could not convert SID S-1-1-0 to gid, ignoring it >[2020/05/27 16:56:12.123141, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:1102(auth3_session_info_create) > Could not convert SID S-1-5-2 to gid, ignoring it >[2020/05/27 16:56:12.123198, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2020/05/27 16:56:12.123328, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (5): > SID[ 0]: S-1-5-7 > SID[ 1]: S-1-1-0 > SID[ 2]: S-1-5-2 > SID[ 3]: S-1-22-1-65534 > SID[ 4]: S-1-22-2-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:12.123433, 10, pid=136415, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:12.130785, 3, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/rpc_server/svcctl/srv_svcctl_reg.c:565(svcctl_init_winreg) > Initialise the svcctl registry keys if needed. >[2020/05/27 16:56:12.130912, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.130959, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.130987, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.131014, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.131040, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.131175, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.131210, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:886(regdb_open) > regdb_open: registry db opened. refcount reset (1) >[2020/05/27 16:56:12.142146, 5, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:248(make_internal_rpc_pipe_p) > make_internal_rpc_pipe_p: Create pipe requested winreg >[2020/05/27 16:56:12.142249, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe winreg >[2020/05/27 16:56:12.142303, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe winreg >[2020/05/27 16:56:12.142647, 4, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:288(make_internal_rpc_pipe_p) > Created internal pipe winreg >[2020/05/27 16:56:12.146582, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > in: struct winreg_OpenHKLM > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/05/27 16:56:12.146743, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2020/05/27 16:56:12.146774, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (1->2) >[2020/05/27 16:56:12.146813, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2020/05/27 16:56:12.146859, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2020/05/27 16:56:12.146904, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.146939, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM] >[2020/05/27 16:56:12.147011, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.147075, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > out: struct winreg_OpenHKLM > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > result : WERR_OK >[2020/05/27 16:56:12.148327, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > in: struct winreg_OpenKey > parent_handle : * > parent_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > keyname: struct winreg_String > name_len : 0x0044 (68) > name_size : 0x0044 (68) > name : * > name : 'SYSTEM\CurrentControlSet\Services' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/05/27 16:56:12.148656, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.148711, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.148736, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (2->3) >[2020/05/27 16:56:12.148776, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.148803, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.148827, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.148848, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.148887, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.148912, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.148948, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.148971, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.148996, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.149017, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.149051, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.149075, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.149099, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.149131, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.149173, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.149209, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.149279, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.149306, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.149417, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.149479, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > out: struct winreg_OpenKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > result : WERR_OK >[2020/05/27 16:56:12.149596, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > in: struct winreg_QueryInfoKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL >[2020/05/27 16:56:12.149699, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.149751, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.149775, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.149806, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:2131(regdb_get_secdesc) > regdb_get_secdesc: Getting secdesc of key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.149837, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > out: struct winreg_QueryInfoKey > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL > num_subkeys : * > num_subkeys : 0x00000007 (7) > max_subkeylen : * > max_subkeylen : 0x0000001c (28) > max_classlen : * > max_classlen : 0x00000000 (0) > num_values : * > num_values : 0x00000000 (0) > max_valnamelen : * > max_valnamelen : 0x00000002 (2) > max_valbufsize : * > max_valbufsize : 0x00000000 (0) > secdescsize : * > secdescsize : 0x00000078 (120) > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.150058, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000000 (0) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.150222, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.150301, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.150365, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x001a (26) > size : 0x001e (30) > name : * > name : 'LanmanServer' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.150617, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000001 (1) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.150794, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.150844, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.150869, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0012 (18) > size : 0x001e (30) > name : * > name : 'Eventlog' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.151023, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000002 (2) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.151185, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.151234, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.151257, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x000c (12) > size : 0x001e (30) > name : * > name : 'Tcpip' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.151485, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000003 (3) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.151692, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.151768, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.151795, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0012 (18) > size : 0x001e (30) > name : * > name : 'Netlogon' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.151977, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000004 (4) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.152152, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.152200, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.152224, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0010 (16) > size : 0x001e (30) > name : * > name : 'Spooler' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.152405, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000005 (5) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.152568, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.152635, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.152692, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x001e (30) > size : 0x001e (30) > name : * > name : 'RemoteRegistry' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.152863, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 > enum_index : 0x00000006 (6) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2020/05/27 16:56:12.153025, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.153074, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:423(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.153098, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x000a (10) > size : 0x001e (30) > name : * > name : 'WINS' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.153263, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0054 (84) > name_size : 0x0054 (84) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Spooler' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/05/27 16:56:12.153584, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.153636, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\Spooler' >[2020/05/27 16:56:12.153669, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.153694, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.153720, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.153808, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.153848, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.153872, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.153895, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.153917, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.153956, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.153980, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.154014, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.154039, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.154060, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.154084, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.154105, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.154140, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.154165, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.154187, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.154210, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.154233, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.154256, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.154280, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.154307, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.154379, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.154424, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Spooler] >[2020/05/27 16:56:12.154461, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.154500, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.154540, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.154580, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.154604, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.154654, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.154684, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.154743, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.154932, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.155139, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.155192, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Start] >[2020/05/27 16:56:12.155218, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.155242, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Spooler' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.155266, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.155302, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/05/27 16:56:12.155345, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/05/27 16:56:12.155386, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.155454, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/05/27 16:56:12.155488, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[28] >[2020/05/27 16:56:12.155514, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[54] >[2020/05/27 16:56:12.155539, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[106] >[2020/05/27 16:56:12.155564, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.155644, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.155797, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.155867, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Type] >[2020/05/27 16:56:12.155908, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.155949, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.156057, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.156226, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.156277, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ErrorControl] >[2020/05/27 16:56:12.156309, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.156352, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.156480, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/05/27 16:56:12.156798, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.156869, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ObjectName] >[2020/05/27 16:56:12.156895, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.156923, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.157022, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(28) > [0] : 0x50 (80) > [1] : 0x00 (0) > [2] : 0x72 (114) > [3] : 0x00 (0) > [4] : 0x69 (105) > [5] : 0x00 (0) > [6] : 0x6e (110) > [7] : 0x00 (0) > [8] : 0x74 (116) > [9] : 0x00 (0) > [10] : 0x20 (32) > [11] : 0x00 (0) > [12] : 0x53 (83) > [13] : 0x00 (0) > [14] : 0x70 (112) > [15] : 0x00 (0) > [16] : 0x6f (111) > [17] : 0x00 (0) > [18] : 0x6f (111) > [19] : 0x00 (0) > [20] : 0x6c (108) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x72 (114) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > size : 0x0000001c (28) >[2020/05/27 16:56:12.157547, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.157601, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:DisplayName] >[2020/05/27 16:56:12.157626, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.157670, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.157755, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(54) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x2f (47) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x61 (97) > [21] : 0x00 (0) > [22] : 0x6d (109) > [23] : 0x00 (0) > [24] : 0x62 (98) > [25] : 0x00 (0) > [26] : 0x61 (97) > [27] : 0x00 (0) > [28] : 0x2f (47) > [29] : 0x00 (0) > [30] : 0x73 (115) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x63 (99) > [35] : 0x00 (0) > [36] : 0x63 (99) > [37] : 0x00 (0) > [38] : 0x74 (116) > [39] : 0x00 (0) > [40] : 0x6c (108) > [41] : 0x00 (0) > [42] : 0x2f (47) > [43] : 0x00 (0) > [44] : 0x73 (115) > [45] : 0x00 (0) > [46] : 0x6d (109) > [47] : 0x00 (0) > [48] : 0x62 (98) > [49] : 0x00 (0) > [50] : 0x64 (100) > [51] : 0x00 (0) > [52] : 0x00 (0) > [53] : 0x00 (0) > size : 0x00000036 (54) >[2020/05/27 16:56:12.158367, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.158448, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ImagePath] >[2020/05/27 16:56:12.158475, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.158504, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.158545, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(106) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x66 (102) > [35] : 0x00 (0) > [36] : 0x6f (111) > [37] : 0x00 (0) > [38] : 0x72 (114) > [39] : 0x00 (0) > [40] : 0x20 (32) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x70 (112) > [45] : 0x00 (0) > [46] : 0x6f (111) > [47] : 0x00 (0) > [48] : 0x6f (111) > [49] : 0x00 (0) > [50] : 0x6c (108) > [51] : 0x00 (0) > [52] : 0x69 (105) > [53] : 0x00 (0) > [54] : 0x6e (110) > [55] : 0x00 (0) > [56] : 0x67 (103) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x66 (102) > [61] : 0x00 (0) > [62] : 0x69 (105) > [63] : 0x00 (0) > [64] : 0x6c (108) > [65] : 0x00 (0) > [66] : 0x65 (101) > [67] : 0x00 (0) > [68] : 0x73 (115) > [69] : 0x00 (0) > [70] : 0x20 (32) > [71] : 0x00 (0) > [72] : 0x74 (116) > [73] : 0x00 (0) > [74] : 0x6f (111) > [75] : 0x00 (0) > [76] : 0x20 (32) > [77] : 0x00 (0) > [78] : 0x70 (112) > [79] : 0x00 (0) > [80] : 0x72 (114) > [81] : 0x00 (0) > [82] : 0x69 (105) > [83] : 0x00 (0) > [84] : 0x6e (110) > [85] : 0x00 (0) > [86] : 0x74 (116) > [87] : 0x00 (0) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x64 (100) > [91] : 0x00 (0) > [92] : 0x65 (101) > [93] : 0x00 (0) > [94] : 0x76 (118) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x63 (99) > [99] : 0x00 (0) > [100] : 0x65 (101) > [101] : 0x00 (0) > [102] : 0x73 (115) > [103] : 0x00 (0) > [104] : 0x00 (0) > [105] : 0x00 (0) > size : 0x0000006a (106) >[2020/05/27 16:56:12.159044, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.159071, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Description] >[2020/05/27 16:56:12.159084, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.159097, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.159132, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000003-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.159165, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.159197, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 03 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.159241, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.159257, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.159270, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.159341, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0066 (102) > name_size : 0x0066 (102) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Spooler\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/05/27 16:56:12.159521, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.159550, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\Spooler\Security' >[2020/05/27 16:56:12.159565, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.159579, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.159592, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.159606, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.159622, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.159635, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.159649, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.159661, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.159687, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.159700, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.159713, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.159727, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.159750, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.159764, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.159776, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.159796, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.159810, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.159823, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.159836, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.159849, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.159861, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.159875, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.159887, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.159911, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.159925, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.159938, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Spooler] >[2020/05/27 16:56:12.159951, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.159964, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.159976, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.159990, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.160003, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2020/05/27 16:56:12.160020, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.160034, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/05/27 16:56:12.160051, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.160065, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/05/27 16:56:12.160078, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/05/27 16:56:12.160091, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.160103, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/05/27 16:56:12.160120, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.160136, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 04 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.160209, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000004-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.160299, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000004-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/05/27 16:56:12.160932, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 04 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.160960, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security:Security] >[2020/05/27 16:56:12.160974, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.160986, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.160999, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2020/05/27 16:56:12.161017, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/05/27 16:56:12.161031, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.161070, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000004-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.161108, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 04 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.161134, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 04 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.161159, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.161171, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.161183, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.161234, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0056 (86) > name_size : 0x0056 (86) > name : * > name : 'SYSTEM\CurrentControlSet\Services\NETLOGON' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/05/27 16:56:12.161419, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.161468, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\NETLOGON' >[2020/05/27 16:56:12.161501, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.161522, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.161542, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.161563, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.161585, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.161600, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.161613, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.161625, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.161648, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.161661, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.161674, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.161688, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.161701, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.161714, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.161737, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.161766, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.161779, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.161792, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.161804, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.161816, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.161828, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.161846, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.161858, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.161880, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.161893, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [NETLOGON] >[2020/05/27 16:56:12.161905, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.161918, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.161938, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.161952, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.161963, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.161988, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.162003, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.162030, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.162094, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.162184, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.162210, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Start] >[2020/05/27 16:56:12.162224, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.162236, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.162248, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.162264, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/05/27 16:56:12.162278, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/05/27 16:56:12.162300, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.162314, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/05/27 16:56:12.162334, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[20] >[2020/05/27 16:56:12.162357, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[54] >[2020/05/27 16:56:12.162381, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[164] >[2020/05/27 16:56:12.162403, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.162443, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.162535, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.162563, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Type] >[2020/05/27 16:56:12.162577, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.162591, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.162625, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.162710, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.162745, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ErrorControl] >[2020/05/27 16:56:12.162758, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.162771, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.162805, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/05/27 16:56:12.162963, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.162989, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ObjectName] >[2020/05/27 16:56:12.163002, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.163015, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.163048, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(20) > [0] : 0x4e (78) > [1] : 0x00 (0) > [2] : 0x65 (101) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x20 (32) > [7] : 0x00 (0) > [8] : 0x4c (76) > [9] : 0x00 (0) > [10] : 0x6f (111) > [11] : 0x00 (0) > [12] : 0x67 (103) > [13] : 0x00 (0) > [14] : 0x6f (111) > [15] : 0x00 (0) > [16] : 0x6e (110) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > size : 0x00000014 (20) >[2020/05/27 16:56:12.163191, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.163218, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:DisplayName] >[2020/05/27 16:56:12.163231, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.163243, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.163275, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(54) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x2f (47) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x61 (97) > [21] : 0x00 (0) > [22] : 0x6d (109) > [23] : 0x00 (0) > [24] : 0x62 (98) > [25] : 0x00 (0) > [26] : 0x61 (97) > [27] : 0x00 (0) > [28] : 0x2f (47) > [29] : 0x00 (0) > [30] : 0x73 (115) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x63 (99) > [35] : 0x00 (0) > [36] : 0x63 (99) > [37] : 0x00 (0) > [38] : 0x74 (116) > [39] : 0x00 (0) > [40] : 0x6c (108) > [41] : 0x00 (0) > [42] : 0x2f (47) > [43] : 0x00 (0) > [44] : 0x73 (115) > [45] : 0x00 (0) > [46] : 0x6d (109) > [47] : 0x00 (0) > [48] : 0x62 (98) > [49] : 0x00 (0) > [50] : 0x64 (100) > [51] : 0x00 (0) > [52] : 0x00 (0) > [53] : 0x00 (0) > size : 0x00000036 (54) >[2020/05/27 16:56:12.163608, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.163648, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ImagePath] >[2020/05/27 16:56:12.163663, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.163677, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.163719, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(164) > [0] : 0x46 (70) > [1] : 0x00 (0) > [2] : 0x69 (105) > [3] : 0x00 (0) > [4] : 0x6c (108) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x20 (32) > [9] : 0x00 (0) > [10] : 0x73 (115) > [11] : 0x00 (0) > [12] : 0x65 (101) > [13] : 0x00 (0) > [14] : 0x72 (114) > [15] : 0x00 (0) > [16] : 0x76 (118) > [17] : 0x00 (0) > [18] : 0x69 (105) > [19] : 0x00 (0) > [20] : 0x63 (99) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x20 (32) > [25] : 0x00 (0) > [26] : 0x70 (112) > [27] : 0x00 (0) > [28] : 0x72 (114) > [29] : 0x00 (0) > [30] : 0x6f (111) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x69 (105) > [35] : 0x00 (0) > [36] : 0x64 (100) > [37] : 0x00 (0) > [38] : 0x69 (105) > [39] : 0x00 (0) > [40] : 0x6e (110) > [41] : 0x00 (0) > [42] : 0x67 (103) > [43] : 0x00 (0) > [44] : 0x20 (32) > [45] : 0x00 (0) > [46] : 0x61 (97) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x63 (99) > [51] : 0x00 (0) > [52] : 0x65 (101) > [53] : 0x00 (0) > [54] : 0x73 (115) > [55] : 0x00 (0) > [56] : 0x73 (115) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x74 (116) > [61] : 0x00 (0) > [62] : 0x6f (111) > [63] : 0x00 (0) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x70 (112) > [67] : 0x00 (0) > [68] : 0x6f (111) > [69] : 0x00 (0) > [70] : 0x6c (108) > [71] : 0x00 (0) > [72] : 0x69 (105) > [73] : 0x00 (0) > [74] : 0x63 (99) > [75] : 0x00 (0) > [76] : 0x79 (121) > [77] : 0x00 (0) > [78] : 0x20 (32) > [79] : 0x00 (0) > [80] : 0x61 (97) > [81] : 0x00 (0) > [82] : 0x6e (110) > [83] : 0x00 (0) > [84] : 0x64 (100) > [85] : 0x00 (0) > [86] : 0x20 (32) > [87] : 0x00 (0) > [88] : 0x70 (112) > [89] : 0x00 (0) > [90] : 0x72 (114) > [91] : 0x00 (0) > [92] : 0x6f (111) > [93] : 0x00 (0) > [94] : 0x66 (102) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x6c (108) > [99] : 0x00 (0) > [100] : 0x65 (101) > [101] : 0x00 (0) > [102] : 0x20 (32) > [103] : 0x00 (0) > [104] : 0x64 (100) > [105] : 0x00 (0) > [106] : 0x61 (97) > [107] : 0x00 (0) > [108] : 0x74 (116) > [109] : 0x00 (0) > [110] : 0x61 (97) > [111] : 0x00 (0) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x28 (40) > [115] : 0x00 (0) > [116] : 0x6e (110) > [117] : 0x00 (0) > [118] : 0x6f (111) > [119] : 0x00 (0) > [120] : 0x74 (116) > [121] : 0x00 (0) > [122] : 0x72 (114) > [123] : 0x00 (0) > [124] : 0x65 (101) > [125] : 0x00 (0) > [126] : 0x6d (109) > [127] : 0x00 (0) > [128] : 0x6f (111) > [129] : 0x00 (0) > [130] : 0x74 (116) > [131] : 0x00 (0) > [132] : 0x65 (101) > [133] : 0x00 (0) > [134] : 0x6c (108) > [135] : 0x00 (0) > [136] : 0x79 (121) > [137] : 0x00 (0) > [138] : 0x20 (32) > [139] : 0x00 (0) > [140] : 0x6d (109) > [141] : 0x00 (0) > [142] : 0x61 (97) > [143] : 0x00 (0) > [144] : 0x6e (110) > [145] : 0x00 (0) > [146] : 0x61 (97) > [147] : 0x00 (0) > [148] : 0x67 (103) > [149] : 0x00 (0) > [150] : 0x65 (101) > [151] : 0x00 (0) > [152] : 0x61 (97) > [153] : 0x00 (0) > [154] : 0x62 (98) > [155] : 0x00 (0) > [156] : 0x6c (108) > [157] : 0x00 (0) > [158] : 0x65 (101) > [159] : 0x00 (0) > [160] : 0x29 (41) > [161] : 0x00 (0) > [162] : 0x00 (0) > [163] : 0x00 (0) > size : 0x000000a4 (164) >[2020/05/27 16:56:12.164508, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.164538, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Description] >[2020/05/27 16:56:12.164553, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.164568, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.164606, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000005-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.164641, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.164668, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 05 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.164695, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.164708, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.164721, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.164781, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0068 (104) > name_size : 0x0068 (104) > name : * > name : 'SYSTEM\CurrentControlSet\Services\NETLOGON\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/05/27 16:56:12.164918, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.164946, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\NETLOGON\Security' >[2020/05/27 16:56:12.164960, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.164973, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.164986, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.164999, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.165014, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.165026, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.165040, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.165051, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.165094, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.165108, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.165122, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.165135, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.165148, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.165161, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.165173, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.165202, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.165216, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.165229, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.165242, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.165255, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.165267, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.165281, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.165293, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.165325, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.165350, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.165372, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [NETLOGON] >[2020/05/27 16:56:12.165394, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.165414, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.165427, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.165448, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.165460, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2020/05/27 16:56:12.165482, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.165496, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/05/27 16:56:12.165508, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.165522, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/05/27 16:56:12.165534, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/05/27 16:56:12.165548, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.165560, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/05/27 16:56:12.165577, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.165593, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 06 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.165620, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000006-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.165688, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000006-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/05/27 16:56:12.166237, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 06 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.166263, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security:Security] >[2020/05/27 16:56:12.166276, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.166296, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.166310, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2020/05/27 16:56:12.166347, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/05/27 16:56:12.166379, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.166437, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000006-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.166474, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 06 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.166501, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 06 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.166529, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.166541, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.166554, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.166607, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0062 (98) > name_size : 0x0062 (98) > name : * > name : 'SYSTEM\CurrentControlSet\Services\RemoteRegistry' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/05/27 16:56:12.166749, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.166777, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\RemoteRegistry' >[2020/05/27 16:56:12.166791, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.166805, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.166818, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.166831, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.166845, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.166857, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.166870, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.166882, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.166902, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.166934, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.166948, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.166962, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.166975, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.166988, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.167000, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.167019, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.167034, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.167052, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.167064, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.167078, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.167106, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.167123, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.167135, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.167160, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.167175, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [RemoteRegistry] >[2020/05/27 16:56:12.167188, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.167202, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.167214, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.167228, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.167240, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.167257, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.167273, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.167301, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.167417, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.167510, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.167538, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Start] >[2020/05/27 16:56:12.167552, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.167565, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.167578, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.167596, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/05/27 16:56:12.167610, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/05/27 16:56:12.167624, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.167637, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/05/27 16:56:12.167651, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[48] >[2020/05/27 16:56:12.167664, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[54] >[2020/05/27 16:56:12.167678, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[126] >[2020/05/27 16:56:12.167692, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.167727, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.167819, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.167854, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Type] >[2020/05/27 16:56:12.167869, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.167882, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.167916, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.167999, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.168026, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ErrorControl] >[2020/05/27 16:56:12.168040, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.168054, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.168093, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/05/27 16:56:12.168258, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.168285, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ObjectName] >[2020/05/27 16:56:12.168300, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.168322, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.168384, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(48) > [0] : 0x52 (82) > [1] : 0x00 (0) > [2] : 0x65 (101) > [3] : 0x00 (0) > [4] : 0x6d (109) > [5] : 0x00 (0) > [6] : 0x6f (111) > [7] : 0x00 (0) > [8] : 0x74 (116) > [9] : 0x00 (0) > [10] : 0x65 (101) > [11] : 0x00 (0) > [12] : 0x20 (32) > [13] : 0x00 (0) > [14] : 0x52 (82) > [15] : 0x00 (0) > [16] : 0x65 (101) > [17] : 0x00 (0) > [18] : 0x67 (103) > [19] : 0x00 (0) > [20] : 0x69 (105) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x74 (116) > [25] : 0x00 (0) > [26] : 0x72 (114) > [27] : 0x00 (0) > [28] : 0x79 (121) > [29] : 0x00 (0) > [30] : 0x20 (32) > [31] : 0x00 (0) > [32] : 0x53 (83) > [33] : 0x00 (0) > [34] : 0x65 (101) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x76 (118) > [39] : 0x00 (0) > [40] : 0x69 (105) > [41] : 0x00 (0) > [42] : 0x63 (99) > [43] : 0x00 (0) > [44] : 0x65 (101) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > size : 0x00000030 (48) >[2020/05/27 16:56:12.168688, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.168718, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:DisplayName] >[2020/05/27 16:56:12.168732, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.168746, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.168790, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(54) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x2f (47) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x61 (97) > [21] : 0x00 (0) > [22] : 0x6d (109) > [23] : 0x00 (0) > [24] : 0x62 (98) > [25] : 0x00 (0) > [26] : 0x61 (97) > [27] : 0x00 (0) > [28] : 0x2f (47) > [29] : 0x00 (0) > [30] : 0x73 (115) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x63 (99) > [35] : 0x00 (0) > [36] : 0x63 (99) > [37] : 0x00 (0) > [38] : 0x74 (116) > [39] : 0x00 (0) > [40] : 0x6c (108) > [41] : 0x00 (0) > [42] : 0x2f (47) > [43] : 0x00 (0) > [44] : 0x73 (115) > [45] : 0x00 (0) > [46] : 0x6d (109) > [47] : 0x00 (0) > [48] : 0x62 (98) > [49] : 0x00 (0) > [50] : 0x64 (100) > [51] : 0x00 (0) > [52] : 0x00 (0) > [53] : 0x00 (0) > size : 0x00000036 (54) >[2020/05/27 16:56:12.169081, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.169109, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ImagePath] >[2020/05/27 16:56:12.169122, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.169136, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.169170, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(126) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x70 (112) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x6f (111) > [39] : 0x00 (0) > [40] : 0x76 (118) > [41] : 0x00 (0) > [42] : 0x69 (105) > [43] : 0x00 (0) > [44] : 0x64 (100) > [45] : 0x00 (0) > [46] : 0x69 (105) > [47] : 0x00 (0) > [48] : 0x6e (110) > [49] : 0x00 (0) > [50] : 0x67 (103) > [51] : 0x00 (0) > [52] : 0x20 (32) > [53] : 0x00 (0) > [54] : 0x72 (114) > [55] : 0x00 (0) > [56] : 0x65 (101) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x6f (111) > [61] : 0x00 (0) > [62] : 0x74 (116) > [63] : 0x00 (0) > [64] : 0x65 (101) > [65] : 0x00 (0) > [66] : 0x20 (32) > [67] : 0x00 (0) > [68] : 0x61 (97) > [69] : 0x00 (0) > [70] : 0x63 (99) > [71] : 0x00 (0) > [72] : 0x63 (99) > [73] : 0x00 (0) > [74] : 0x65 (101) > [75] : 0x00 (0) > [76] : 0x73 (115) > [77] : 0x00 (0) > [78] : 0x73 (115) > [79] : 0x00 (0) > [80] : 0x20 (32) > [81] : 0x00 (0) > [82] : 0x74 (116) > [83] : 0x00 (0) > [84] : 0x6f (111) > [85] : 0x00 (0) > [86] : 0x20 (32) > [87] : 0x00 (0) > [88] : 0x74 (116) > [89] : 0x00 (0) > [90] : 0x68 (104) > [91] : 0x00 (0) > [92] : 0x65 (101) > [93] : 0x00 (0) > [94] : 0x20 (32) > [95] : 0x00 (0) > [96] : 0x53 (83) > [97] : 0x00 (0) > [98] : 0x61 (97) > [99] : 0x00 (0) > [100] : 0x6d (109) > [101] : 0x00 (0) > [102] : 0x62 (98) > [103] : 0x00 (0) > [104] : 0x61 (97) > [105] : 0x00 (0) > [106] : 0x20 (32) > [107] : 0x00 (0) > [108] : 0x72 (114) > [109] : 0x00 (0) > [110] : 0x65 (101) > [111] : 0x00 (0) > [112] : 0x67 (103) > [113] : 0x00 (0) > [114] : 0x69 (105) > [115] : 0x00 (0) > [116] : 0x73 (115) > [117] : 0x00 (0) > [118] : 0x74 (116) > [119] : 0x00 (0) > [120] : 0x72 (114) > [121] : 0x00 (0) > [122] : 0x79 (121) > [123] : 0x00 (0) > [124] : 0x00 (0) > [125] : 0x00 (0) > size : 0x0000007e (126) >[2020/05/27 16:56:12.169779, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.169807, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Description] >[2020/05/27 16:56:12.169820, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.169834, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.169871, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000007-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.169905, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.169930, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 07 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.169955, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.169968, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.169980, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.170049, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0074 (116) > name_size : 0x0074 (116) > name : * > name : 'SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/05/27 16:56:12.170186, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.170214, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' >[2020/05/27 16:56:12.170228, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.170242, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.170255, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.170268, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.170282, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.170295, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.170308, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.170334, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.170372, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.170386, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.170399, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.170412, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.170423, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.170436, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.170472, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.170492, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.170506, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.170518, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.170530, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.170543, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.170555, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.170568, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.170579, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.170601, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.170614, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.170626, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [RemoteRegistry] >[2020/05/27 16:56:12.170647, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.170660, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.170680, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.170693, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.170704, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2020/05/27 16:56:12.170722, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.170744, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/05/27 16:56:12.170757, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.170771, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/05/27 16:56:12.170783, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/05/27 16:56:12.170797, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.170809, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/05/27 16:56:12.170826, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.170842, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 08 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.170870, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000008-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.170941, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000008-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/05/27 16:56:12.171521, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 08 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.171549, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security:Security] >[2020/05/27 16:56:12.171562, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.171574, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.171592, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2020/05/27 16:56:12.171610, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/05/27 16:56:12.171624, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.171658, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000008-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.171690, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 08 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.171737, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 08 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.171765, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.171778, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.171799, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.171851, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x004e (78) > name_size : 0x004e (78) > name : * > name : 'SYSTEM\CurrentControlSet\Services\WINS' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2020/05/27 16:56:12.171984, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.172010, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\WINS' >[2020/05/27 16:56:12.172023, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.172036, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.172048, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.172060, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.172073, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.172085, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.172097, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.172108, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.172127, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.172148, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.172162, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.172175, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.172188, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.172210, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.172222, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.172248, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.172263, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.172276, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.172289, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.172302, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.172318, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.172340, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.172360, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.172395, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.172411, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [WINS] >[2020/05/27 16:56:12.172432, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.172445, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.172457, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.172470, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.172481, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.172498, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.172513, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.172539, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.172605, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.172685, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.172711, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Start] >[2020/05/27 16:56:12.172724, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.172736, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\WINS' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.172748, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.172774, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2020/05/27 16:56:12.172788, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2020/05/27 16:56:12.172810, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.172823, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2020/05/27 16:56:12.172835, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[74] >[2020/05/27 16:56:12.172848, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[54] >[2020/05/27 16:56:12.172861, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[178] >[2020/05/27 16:56:12.172874, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.172914, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.172994, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.173020, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Type] >[2020/05/27 16:56:12.173032, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.173045, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.173075, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2020/05/27 16:56:12.173154, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.173180, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ErrorControl] >[2020/05/27 16:56:12.173198, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.173220, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.173255, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2020/05/27 16:56:12.173460, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.173489, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ObjectName] >[2020/05/27 16:56:12.173504, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.173519, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.173563, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(74) > [0] : 0x57 (87) > [1] : 0x00 (0) > [2] : 0x69 (105) > [3] : 0x00 (0) > [4] : 0x6e (110) > [5] : 0x00 (0) > [6] : 0x64 (100) > [7] : 0x00 (0) > [8] : 0x6f (111) > [9] : 0x00 (0) > [10] : 0x77 (119) > [11] : 0x00 (0) > [12] : 0x73 (115) > [13] : 0x00 (0) > [14] : 0x20 (32) > [15] : 0x00 (0) > [16] : 0x49 (73) > [17] : 0x00 (0) > [18] : 0x6e (110) > [19] : 0x00 (0) > [20] : 0x74 (116) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x72 (114) > [25] : 0x00 (0) > [26] : 0x6e (110) > [27] : 0x00 (0) > [28] : 0x65 (101) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x4e (78) > [35] : 0x00 (0) > [36] : 0x61 (97) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x65 (101) > [41] : 0x00 (0) > [42] : 0x20 (32) > [43] : 0x00 (0) > [44] : 0x53 (83) > [45] : 0x00 (0) > [46] : 0x65 (101) > [47] : 0x00 (0) > [48] : 0x72 (114) > [49] : 0x00 (0) > [50] : 0x76 (118) > [51] : 0x00 (0) > [52] : 0x69 (105) > [53] : 0x00 (0) > [54] : 0x63 (99) > [55] : 0x00 (0) > [56] : 0x65 (101) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x28 (40) > [61] : 0x00 (0) > [62] : 0x57 (87) > [63] : 0x00 (0) > [64] : 0x49 (73) > [65] : 0x00 (0) > [66] : 0x4e (78) > [67] : 0x00 (0) > [68] : 0x53 (83) > [69] : 0x00 (0) > [70] : 0x29 (41) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > size : 0x0000004a (74) >[2020/05/27 16:56:12.173960, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.173988, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:DisplayName] >[2020/05/27 16:56:12.174001, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.174014, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.174048, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(54) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x2f (47) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x61 (97) > [21] : 0x00 (0) > [22] : 0x6d (109) > [23] : 0x00 (0) > [24] : 0x62 (98) > [25] : 0x00 (0) > [26] : 0x61 (97) > [27] : 0x00 (0) > [28] : 0x2f (47) > [29] : 0x00 (0) > [30] : 0x73 (115) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x63 (99) > [35] : 0x00 (0) > [36] : 0x63 (99) > [37] : 0x00 (0) > [38] : 0x74 (116) > [39] : 0x00 (0) > [40] : 0x6c (108) > [41] : 0x00 (0) > [42] : 0x2f (47) > [43] : 0x00 (0) > [44] : 0x6e (110) > [45] : 0x00 (0) > [46] : 0x6d (109) > [47] : 0x00 (0) > [48] : 0x62 (98) > [49] : 0x00 (0) > [50] : 0x64 (100) > [51] : 0x00 (0) > [52] : 0x00 (0) > [53] : 0x00 (0) > size : 0x00000036 (54) >[2020/05/27 16:56:12.174362, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.174409, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ImagePath] >[2020/05/27 16:56:12.174429, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.174444, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.174497, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(178) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x70 (112) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x6f (111) > [39] : 0x00 (0) > [40] : 0x76 (118) > [41] : 0x00 (0) > [42] : 0x69 (105) > [43] : 0x00 (0) > [44] : 0x64 (100) > [45] : 0x00 (0) > [46] : 0x69 (105) > [47] : 0x00 (0) > [48] : 0x6e (110) > [49] : 0x00 (0) > [50] : 0x67 (103) > [51] : 0x00 (0) > [52] : 0x20 (32) > [53] : 0x00 (0) > [54] : 0x61 (97) > [55] : 0x00 (0) > [56] : 0x20 (32) > [57] : 0x00 (0) > [58] : 0x4e (78) > [59] : 0x00 (0) > [60] : 0x65 (101) > [61] : 0x00 (0) > [62] : 0x74 (116) > [63] : 0x00 (0) > [64] : 0x42 (66) > [65] : 0x00 (0) > [66] : 0x49 (73) > [67] : 0x00 (0) > [68] : 0x4f (79) > [69] : 0x00 (0) > [70] : 0x53 (83) > [71] : 0x00 (0) > [72] : 0x20 (32) > [73] : 0x00 (0) > [74] : 0x70 (112) > [75] : 0x00 (0) > [76] : 0x6f (111) > [77] : 0x00 (0) > [78] : 0x69 (105) > [79] : 0x00 (0) > [80] : 0x6e (110) > [81] : 0x00 (0) > [82] : 0x74 (116) > [83] : 0x00 (0) > [84] : 0x2d (45) > [85] : 0x00 (0) > [86] : 0x74 (116) > [87] : 0x00 (0) > [88] : 0x6f (111) > [89] : 0x00 (0) > [90] : 0x2d (45) > [91] : 0x00 (0) > [92] : 0x70 (112) > [93] : 0x00 (0) > [94] : 0x6f (111) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x6e (110) > [99] : 0x00 (0) > [100] : 0x74 (116) > [101] : 0x00 (0) > [102] : 0x20 (32) > [103] : 0x00 (0) > [104] : 0x6e (110) > [105] : 0x00 (0) > [106] : 0x61 (97) > [107] : 0x00 (0) > [108] : 0x6d (109) > [109] : 0x00 (0) > [110] : 0x65 (101) > [111] : 0x00 (0) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x73 (115) > [115] : 0x00 (0) > [116] : 0x65 (101) > [117] : 0x00 (0) > [118] : 0x72 (114) > [119] : 0x00 (0) > [120] : 0x76 (118) > [121] : 0x00 (0) > [122] : 0x65 (101) > [123] : 0x00 (0) > [124] : 0x72 (114) > [125] : 0x00 (0) > [126] : 0x28 (40) > [127] : 0x00 (0) > [128] : 0x6e (110) > [129] : 0x00 (0) > [130] : 0x6f (111) > [131] : 0x00 (0) > [132] : 0x74 (116) > [133] : 0x00 (0) > [134] : 0x20 (32) > [135] : 0x00 (0) > [136] : 0x72 (114) > [137] : 0x00 (0) > [138] : 0x65 (101) > [139] : 0x00 (0) > [140] : 0x6d (109) > [141] : 0x00 (0) > [142] : 0x6f (111) > [143] : 0x00 (0) > [144] : 0x74 (116) > [145] : 0x00 (0) > [146] : 0x65 (101) > [147] : 0x00 (0) > [148] : 0x6c (108) > [149] : 0x00 (0) > [150] : 0x79 (121) > [151] : 0x00 (0) > [152] : 0x20 (32) > [153] : 0x00 (0) > [154] : 0x6d (109) > [155] : 0x00 (0) > [156] : 0x61 (97) > [157] : 0x00 (0) > [158] : 0x6e (110) > [159] : 0x00 (0) > [160] : 0x61 (97) > [161] : 0x00 (0) > [162] : 0x67 (103) > [163] : 0x00 (0) > [164] : 0x65 (101) > [165] : 0x00 (0) > [166] : 0x61 (97) > [167] : 0x00 (0) > [168] : 0x62 (98) > [169] : 0x00 (0) > [170] : 0x6c (108) > [171] : 0x00 (0) > [172] : 0x65 (101) > [173] : 0x00 (0) > [174] : 0x29 (41) > [175] : 0x00 (0) > [176] : 0x00 (0) > [177] : 0x00 (0) > size : 0x000000b2 (178) >[2020/05/27 16:56:12.175455, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.175504, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Description] >[2020/05/27 16:56:12.175521, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.175536, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.175577, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000009-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.175624, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.175652, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 09 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.175692, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.175706, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.175718, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.175790, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000001-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0060 (96) > name_size : 0x0060 (96) > name : * > name : 'SYSTEM\CurrentControlSet\Services\WINS\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2020/05/27 16:56:12.175944, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 01 00 00 00 01 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.175971, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:706(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\WINS\Security' >[2020/05/27 16:56:12.175984, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.175997, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.176009, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.176028, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.176041, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.176054, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.176066, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.176077, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.176098, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.176111, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.176123, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.176136, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.176147, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.176160, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.176171, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.176189, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.176203, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.176215, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.176226, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.176239, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.176251, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.176264, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.176284, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.176308, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.176329, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2020/05/27 16:56:12.176351, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [WINS] >[2020/05/27 16:56:12.176373, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.176397, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.176417, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.176432, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.176445, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2020/05/27 16:56:12.176465, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.176479, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2020/05/27 16:56:12.176492, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.176505, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/05/27 16:56:12.176518, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/05/27 16:56:12.176535, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.176554, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/05/27 16:56:12.176582, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.176603, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 01 00 00 00 0A 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.176631, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000a-0000-0000-ce5e-8c7fdf140200 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2020/05/27 16:56:12.176701, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000a-0000-0000-ce5e-8c7fdf140200 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2020/05/27 16:56:12.177319, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0A 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.177374, 8, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/winreg/srv_winreg_nt.c:736(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security:Security] >[2020/05/27 16:56:12.177413, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/tdb_wrap/tdb_wrap.c:64(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2020/05/27 16:56:12.177428, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.177442, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2020/05/27 16:56:12.177460, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2020/05/27 16:56:12.177476, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2020/05/27 16:56:12.177515, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000a-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.177550, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0A 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.177577, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0A 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.177604, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.177617, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.177637, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.177707, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 00000002-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.177743, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.177776, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 02 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.177803, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.177817, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (3->2) >[2020/05/27 16:56:12.177830, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.177886, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (2->1) >[2020/05/27 16:56:12.177908, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (1->0) >[2020/05/27 16:56:12.177951, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:420(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection winreg >[2020/05/27 16:56:12.178001, 3, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/rpc_server/eventlog/srv_eventlog_reg.c:59(eventlog_init_winreg) > Initialise the eventlog registry keys if needed. >[2020/05/27 16:56:12.178028, 5, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:248(make_internal_rpc_pipe_p) > make_internal_rpc_pipe_p: Create pipe requested winreg >[2020/05/27 16:56:12.178043, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe winreg >[2020/05/27 16:56:12.178055, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe winreg >[2020/05/27 16:56:12.178089, 4, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:288(make_internal_rpc_pipe_p) > Created internal pipe winreg >[2020/05/27 16:56:12.178111, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > in: struct winreg_OpenHKLM > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/05/27 16:56:12.178166, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2020/05/27 16:56:12.178188, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.178202, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.178226, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:12.178238, 5, pid=136415, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:12.178250, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:12.178327, 4, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:12.178352, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:886(regdb_open) > regdb_open: registry db opened. refcount reset (1) >[2020/05/27 16:56:12.178377, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2020/05/27 16:56:12.178411, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2020/05/27 16:56:12.178436, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.178448, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM] >[2020/05/27 16:56:12.178477, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 01 00 00 00 0B 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.178504, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > out: struct winreg_OpenHKLM > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000b-0000-0000-ce5e-8c7fdf140200 > result : WERR_OK >[2020/05/27 16:56:12.178558, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > in: struct winreg_OpenKey > parent_handle : * > parent_handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000b-0000-0000-ce5e-8c7fdf140200 > keyname: struct winreg_String > name_len : 0x0056 (86) > name_size : 0x0056 (86) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Eventlog' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2020/05/27 16:56:12.178666, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0B 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.178694, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2020/05/27 16:56:12.178706, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (1->2) >[2020/05/27 16:56:12.178726, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2020/05/27 16:56:12.178745, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2020/05/27 16:56:12.178765, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.178782, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM] >[2020/05/27 16:56:12.178805, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2020/05/27 16:56:12.178819, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (2->3) >[2020/05/27 16:56:12.178851, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.178864, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.178878, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.178890, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet] >[2020/05/27 16:56:12.178914, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2020/05/27 16:56:12.178936, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (3->4) >[2020/05/27 16:56:12.178949, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.178960, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.178973, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.178984, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2020/05/27 16:56:12.179016, 7, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_api.c:143(regkey_open_onelevel) > regkey_open_onelevel: name = [Eventlog] >[2020/05/27 16:56:12.179037, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:858(regdb_open) > regdb_open: incrementing refcount (4->5) >[2020/05/27 16:56:12.179066, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.179079, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.179092, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2020/05/27 16:56:12.179103, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_cachehook.c:129(reghook_cache_find) > reghook_cache_find: found ops 0x7f2f6627e100 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.179125, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (5->4) >[2020/05/27 16:56:12.179139, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (4->3) >[2020/05/27 16:56:12.179151, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (3->2) >[2020/05/27 16:56:12.179167, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:306(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 01 00 00 00 0C 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.179192, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > out: struct winreg_OpenKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000c-0000-0000-ce5e-8c7fdf140200 > result : WERR_OK >[2020/05/27 16:56:12.179244, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > in: struct winreg_QueryInfoKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000c-0000-0000-ce5e-8c7fdf140200 > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL >[2020/05/27 16:56:12.179307, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0C 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.179360, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Eventlog' (ops 0x7f2f6627e100) >[2020/05/27 16:56:12.179389, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1944(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.179420, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2020/05/27 16:56:12.179450, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:1888(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2020/05/27 16:56:12.179465, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:2131(regdb_get_secdesc) > regdb_get_secdesc: Getting secdesc of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2020/05/27 16:56:12.179486, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > out: struct winreg_QueryInfoKey > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL > num_subkeys : * > num_subkeys : 0x00000000 (0) > max_subkeylen : * > max_subkeylen : 0x00000000 (0) > max_classlen : * > max_classlen : 0x00000000 (0) > num_values : * > num_values : 0x00000002 (2) > max_valnamelen : * > max_valnamelen : 0x0000001a (26) > max_valbufsize : * > max_valbufsize : 0x00000014 (20) > secdescsize : * > secdescsize : 0x00000078 (120) > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2020/05/27 16:56:12.179596, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000001 (1) > uuid : 0000000c-0000-0000-ce5e-8c7fdf140200 >[2020/05/27 16:56:12.179630, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0C 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.179656, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:343(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 01 00 00 00 0C 00 00 00 00 00 00 00 CE 5E 8C 7F ........ .....^.. > [0010] DF 14 02 00 .... >[2020/05/27 16:56:12.179681, 6, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:392(close_policy_hnd) > Closed policy >[2020/05/27 16:56:12.179692, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (2->1) >[2020/05/27 16:56:12.179704, 1, pid=136415, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2020/05/27 16:56:12.179745, 10, pid=136415, effective(0, 0), real(0, 0), class=registry] ../../source3/registry/reg_backend_db.c:906(regdb_close) > regdb_close: decrementing refcount (1->0) >[2020/05/27 16:56:12.179776, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:420(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection winreg >[2020/05/27 16:56:12.179801, 5, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_service_setup.c:624(dcesrv_ep_setup) > dcesrv_ep_setup: Initializing DCE/RPC modules >[2020/05/27 16:56:12.179821, 10, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/mdssvc/srv_mdssvc_nt.c:105(rpc_mdssvc_module_init) > rpc_mdssvc_module_init: Registering mdsvc RPC service >[2020/05/27 16:56:12.179842, 3, pid=136415, effective(0, 0), real(0, 0), class=rpc_srv] ../../source3/rpc_server/rpc_modules.c:64(register_rpc_module) > register_rpc_module: Successfully added RPC module 'mdssvc' >[2020/05/27 16:56:12.179956, 0, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/become_daemon.c:135(daemon_ready) > daemon_ready: daemon 'smbd' finished starting up and ready to serve connections >[2020/05/27 16:56:12.180114, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 445 >[2020/05/27 16:56:12.180144, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.180271, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.180465, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 139 >[2020/05/27 16:56:12.180497, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.180624, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.180796, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 445 >[2020/05/27 16:56:12.180825, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.180968, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.181117, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:410(open_socket_in) > bind succeeded on port 139 >[2020/05/27 16:56:12.181147, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.181264, 5, pid=136415, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 16384 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:12.181390, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 13 - private_data=(nil) >[2020/05/27 16:56:12.181414, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 33 - private_data=0x55ddb4718ce0 >[2020/05/27 16:56:12.181433, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 783 - private_data=(nil) >[2020/05/27 16:56:12.181452, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2020/05/27 16:56:12.181470, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:739(messaging_register) > Overriding messaging pointer for type 1 - private_data=(nil) >[2020/05/27 16:56:12.181488, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 770 - private_data=(nil) >[2020/05/27 16:56:12.181507, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 801 - private_data=(nil) >[2020/05/27 16:56:12.181525, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 790 - private_data=(nil) >[2020/05/27 16:56:12.181543, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 791 - private_data=(nil) >[2020/05/27 16:56:12.181562, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2020/05/27 16:56:12.181580, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 16 - private_data=(nil) >[2020/05/27 16:56:12.181599, 5, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 799 - private_data=(nil) >[2020/05/27 16:56:12.191214, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/avahi_register.c:261(avahi_client_callback) > avahi_client_callback: AVAHI_CLIENT_CONNECTING >[2020/05/27 16:56:12.191289, 2, pid=136415, effective(0, 0), real(0, 0)] ../../source3/smbd/server.c:1357(smbd_parent_loop) > waiting for connections >[2020/05/27 16:56:12.191356, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:426(messaging_recv_cb) > messaging_recv_cb: Received message 0x31f len 0 (num_fds:0) from 136417 >[2020/05/27 16:56:12.191446, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1444(messaging_dgm_send) > messaging_dgm_send: Sending message to 136418 >[2020/05/27 16:56:12.191559, 10, pid=136415, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm.c:1444(messaging_dgm_send) > messaging_dgm_send: Sending message to 136417 >[2020/05/27 16:56:12.191612, 10, pid=136418, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:426(messaging_recv_cb) > messaging_recv_cb: Received message 0x31f len 0 (num_fds:0) from 136415 >[2020/05/27 16:56:12.191643, 10, pid=136417, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:426(messaging_recv_cb) > messaging_recv_cb: Received message 0x31f len 0 (num_fds:0) from 136415 >[2020/05/27 16:56:18.160369, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2020/05/27 16:56:18.160839, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Erfolg >[2020/05/27 16:56:18.160905, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 3319154347581013953 >[2020/05/27 16:56:18.160943, 2, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:87(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2020/05/27 16:56:18.160994, 5, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:155(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2020/05/27 16:56:18.161020, 5, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:176(make_pdb_method_name) > Found pdb backend tdbsam >[2020/05/27 16:56:18.161070, 5, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:187(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2020/05/27 16:56:18.161112, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:535(smbXsrv_client_create) >[2020/05/27 16:56:18.161132, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:542(smbXsrv_client_create) > smbXsrv_client_create: client_guid[00000000-0000-0000-0000-000000000000] stored >[2020/05/27 16:56:18.161161, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : NULL > remote_address : NULL > remote_name : NULL > initial_connect_time : Mi Mai 27 16:56:18 2020 CEST > client_guid : 00000000-0000-0000-0000-000000000000 > stored : 0x00 (0) > sconn : NULL > session_table : NULL > tcon_table : NULL > open_table : NULL > connections : NULL > server_multi_channel_enabled: 0x00 (0) >[2020/05/27 16:56:18.161450, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 87040 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:18.161566, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1055(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 1 > SO_SNDBUF = 87040 > SO_RCVBUF = 131072 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2020/05/27 16:56:18.161893, 3, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/access.c:369(allow_access) > Allowed connection from 192.168.1.3 (192.168.1.3) >[2020/05/27 16:56:18.161926, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:3875(smbd_add_connection) > Connection allowed from ipv4:192.168.1.3:50254 to ipv4:192.168.1.2:445 >[2020/05/27 16:56:18.162012, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.162830, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:18.162894, 3, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/smbd/oplock.c:1413(init_oplocks) > init_oplocks: initializing messages. >[2020/05/27 16:56:18.162916, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 774 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.162937, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 778 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.162970, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 770 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163005, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 801 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163052, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 787 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163082, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 779 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163100, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2020/05/27 16:56:18.163117, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:739(messaging_register) > Overriding messaging pointer for type 15 - private_data=(nil) >[2020/05/27 16:56:18.163134, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 16 - private_data=(nil) >[2020/05/27 16:56:18.163151, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 16 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163168, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 33 - private_data=0x55ddb4718ce0 >[2020/05/27 16:56:18.163184, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 33 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163201, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 790 - private_data=(nil) >[2020/05/27 16:56:18.163218, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 790 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.163234, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 791 - private_data=(nil) >[2020/05/27 16:56:18.163251, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:771(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2020/05/27 16:56:18.163267, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2020/05/27 16:56:18.163294, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x55ddb4772920 >[2020/05/27 16:56:18.163316, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x55ddb47729f0 >[2020/05/27 16:56:18.163339, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x55ddb4775f40 >[2020/05/27 16:56:18.163696, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:248(read_smb_length_return_keepalive) > got smb length of 69 >[2020/05/27 16:56:18.163731, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1955(process_smb) > got message type 0x0 of len 0x45 >[2020/05/27 16:56:18.163749, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1957(process_smb) > Transaction 0 of length 73 (0 toread) >[2020/05/27 16:56:18.163797, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:185(show_msg) >[2020/05/27 16:56:18.163810, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:188(show_msg) > size=69 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51283 > smb_tid=65535 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=0 > smb_bcc=34 >[2020/05/27 16:56:18.163877, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/util.c:664(dump_data) > [0000] 02 4E 54 20 4C 4D 20 30 2E 31 32 00 02 53 4D 42 .NT LM 0 .12..SMB > [0010] 20 32 2E 30 30 32 00 02 53 4D 42 20 32 2E 3F 3F 2.002.. SMB 2.?? > [0020] 3F 00 ?. >[2020/05/27 16:56:18.163955, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:1549(switch_message) > switch message SMBnegprot (pid 136421) conn 0x0 >[2020/05/27 16:56:18.163992, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.164029, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.164056, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.164115, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.164865, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/negprot.c:636(reply_negprot) > Requested protocol [NT LM 0.12] >[2020/05/27 16:56:18.165231, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/negprot.c:636(reply_negprot) > Requested protocol [SMB 2.002] >[2020/05/27 16:56:18.165256, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/negprot.c:636(reply_negprot) > Requested protocol [SMB 2.???] >[2020/05/27 16:56:18.165275, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:1221(set_remote_arch) > set_remote_arch: Client arch is 'OSX' >[2020/05/27 16:56:18.165303, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.165571, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:18.165637, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.165873, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:18.165931, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3635(smbd_smb2_process_negprot) > smbd_smb2_first_negprot: packet length 102 >[2020/05/27 16:56:18.166012, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 0 (position 0) from bitmap >[2020/05/27 16:56:18.166046, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 0 >[2020/05/27 16:56:18.166076, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.166101, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.166125, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.166167, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.166210, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.166574, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:18.166617, 3, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_negprot.c:293(smbd_smb2_request_process_negprot) > Selected protocol SMB2_FF >[2020/05/27 16:56:18.166648, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.166682, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend anonymous >[2020/05/27 16:56:18.166706, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'anonymous' >[2020/05/27 16:56:18.166726, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend sam >[2020/05/27 16:56:18.166743, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'sam' >[2020/05/27 16:56:18.166758, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2020/05/27 16:56:18.166775, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2020/05/27 16:56:18.166791, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend sam_netlogon3 >[2020/05/27 16:56:18.166809, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'sam_netlogon3' >[2020/05/27 16:56:18.166833, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:51(smb_register_auth) > Attempting to register auth backend winbind >[2020/05/27 16:56:18.166850, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:63(smb_register_auth) > Successfully added auth method 'winbind' >[2020/05/27 16:56:18.166866, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.166884, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.166904, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.166932, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.169338, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2020/05/27 16:56:18.169376, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2020/05/27 16:56:18.169390, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2020/05/27 16:56:18.169404, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'spnego' registered >[2020/05/27 16:56:18.169417, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'schannel' registered >[2020/05/27 16:56:18.169430, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'naclrpc_as_system' registered >[2020/05/27 16:56:18.169444, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2020/05/27 16:56:18.169461, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'ntlmssp' registered >[2020/05/27 16:56:18.169474, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'ntlmssp_resume_ccache' registered >[2020/05/27 16:56:18.169488, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'http_basic' registered >[2020/05/27 16:56:18.169501, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'http_ntlm' registered >[2020/05/27 16:56:18.169514, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'http_negotiate' registered >[2020/05/27 16:56:18.169530, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'krb5' registered >[2020/05/27 16:56:18.169544, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:976(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2020/05/27 16:56:18.169598, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC mechanism spnego >[2020/05/27 16:56:18.169649, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2020/05/27 16:56:18.169695, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55ddb477c360]: subreq: 0x55ddb476ffc0 >[2020/05/27 16:56:18.169715, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:512(gensec_update_done) > gensec_update_done: spnego[0x55ddb477c360]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55ddb476ffc0/../../auth/gensec/spnego.c:1628]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55ddb4770170)] timer[(nil)] finish[../../auth/gensec/spnego.c:2113] >[2020/05/27 16:56:18.169758, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [0] idx[1] status[NT_STATUS_OK] body[64] dyn[yes:74] at ../../source3/smbd/smb2_negprot.c:619 >[2020/05/27 16:56:18.172966, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/1/1 >[2020/05/27 16:56:18.173065, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/negprot.c:776(reply_negprot) > Selected protocol SMB 2.??? >[2020/05/27 16:56:18.173117, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/negprot.c:778(reply_negprot) > reply_negprot: negprot index=2 >[2020/05/27 16:56:18.173817, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.173870, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 1 (position 1) from bitmap >[2020/05/27 16:56:18.173896, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 1 >[2020/05/27 16:56:18.173927, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.173949, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.173970, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.174010, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.174042, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.174084, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.174113, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.174141, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.174167, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.174231, 10, pid=136421, effective(0, 0), real(0, 0), class=tdb] ../../source3/lib/gencache.c:222(gencache_set_data_blob) > gencache_set_data_blob: Adding cache entry with key=[RA/23052cfe-a01c-11ea-8a78-fc577fd17813] and timeout=[Mi Jun 3 16:56:18 2020 CEST] (604800 seconds ahead) >[2020/05/27 16:56:18.174369, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.174417, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.174838, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:18.174921, 3, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_negprot.c:293(smbd_smb2_request_process_negprot) > Selected protocol SMB3_11 >[2020/05/27 16:56:18.174967, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.175002, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.175041, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.175110, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.175133, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.175220, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC mechanism spnego >[2020/05/27 16:56:18.175288, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2020/05/27 16:56:18.175341, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55ddb4785880]: subreq: 0x55ddb4770030 >[2020/05/27 16:56:18.175379, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:512(gensec_update_done) > gensec_update_done: spnego[0x55ddb4785880]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55ddb4770030/../../auth/gensec/spnego.c:1628]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55ddb47701e0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2113] >[2020/05/27 16:56:18.175464, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [1] idx[1] status[NT_STATUS_OK] body[64] dyn[yes:140] at ../../source3/smbd/smb2_negprot.c:661 >[2020/05/27 16:56:18.175499, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/2/1 >[2020/05/27 16:56:18.178016, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.178087, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 2 (position 2) from bitmap >[2020/05/27 16:56:18.178113, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 2 >[2020/05/27 16:56:18.178134, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.178153, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.178171, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.178219, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.178308, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.178357, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.178438, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 44D99DAA >[2020/05/27 16:56:18.178513, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4779c50 >[2020/05/27 16:56:18.178584, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.178744, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/05/27 16:56:18.178770, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '44D99DAA' stored >[2020/05/27 16:56:18.178795, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/05/27 16:56:18.182056, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.182111, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 44D99DAA >[2020/05/27 16:56:18.182142, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1324(smbXsrv_session_create) >[2020/05/27 16:56:18.182162, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1330(smbXsrv_session_create) > smbXsrv_session_create: global_id (0x44d99daa) stored >[2020/05/27 16:56:18.182186, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x44d99daa (1155112362) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Mi Mai 27 16:56:18 2020 CEST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2020/05/27 16:56:18.182796, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.182824, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.182862, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.182888, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.182925, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.183059, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC mechanism spnego >[2020/05/27 16:56:18.183098, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.183126, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.183157, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 44D99DAA >[2020/05/27 16:56:18.183187, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476d950 >[2020/05/27 16:56:18.183233, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.183277, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/05/27 16:56:18.183296, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '44D99DAA' stored >[2020/05/27 16:56:18.183323, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/05/27 16:56:18.183713, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.183743, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 44D99DAA >[2020/05/27 16:56:18.183770, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/05/27 16:56:18.183788, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x44d99daa) stored >[2020/05/27 16:56:18.183856, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x44d99daa (1155112362) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Mi Mai 27 16:56:18 2020 CEST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Mi Mai 27 16:56:18 2020 CEST > idle_time : Mi Mai 27 16:56:18 2020 CEST >[2020/05/27 16:56:18.184578, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.184608, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.184635, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.184661, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.184685, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.184782, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:737(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2020/05/27 16:56:18.184823, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe2088297 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_LM_KEY > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2020/05/27 16:56:18.184935, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0xe2088297 (3792208535) > 1: NTLMSSP_NEGOTIATE_UNICODE > 1: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 1: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : NULL > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : NULL > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (10) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0) > ProductBuild : 0x4563 (17763) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2020/05/27 16:56:18.185484, 6, pid=136421, effective(0, 0), real(0, 0)] ../../librpc/ndr/ndr_string.c:178(ndr_pull_string) > short string '', sent with NULL termination despite NOTERM flag in IDL >[2020/05/27 16:56:18.185527, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x000c (12) > TargetNameMaxLen : 0x000c (12) > TargetName : * > TargetName : 'SERVER' > NegotiateFlags : 0xe28a8215 (3800728085) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 3e526e68177fb667 > Reserved : 0000000000000000 > TargetInfoLen : 0x0046 (70) > TargetInfoMaxLen : 0x0046 (70) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000006 (6) > pair: ARRAY(6) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'server' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Mi Mai 27 16:56:18 2020 CEST > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) > ProductBuild : 0x0000 (0) > Reserved : 000000 > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) >[2020/05/27 16:56:18.186262, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: ntlmssp[0x55ddb476ffa0]: subreq: 0x55ddb4719aa0 >[2020/05/27 16:56:18.186302, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55ddb4778310]: subreq: 0x55ddb4773fd0 >[2020/05/27 16:56:18.186350, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.186406, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:512(gensec_update_done) > gensec_update_done: ntlmssp[0x55ddb476ffa0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55ddb4719aa0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x55ddb4719c50)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] >[2020/05/27 16:56:18.186472, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:512(gensec_update_done) > gensec_update_done: spnego[0x55ddb4778310]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x55ddb4773fd0/../../auth/gensec/spnego.c:1628]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55ddb4774180)] timer[(nil)] finish[../../auth/gensec/spnego.c:2113] >[2020/05/27 16:56:18.186514, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.186542, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.186567, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.186592, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.186617, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.186667, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.186699, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [2] idx[1] status[NT_STATUS_MORE_PROCESSING_REQUIRED] body[8] dyn[yes:169] at ../../source3/smbd/smb2_sesssetup.c:183 >[2020/05/27 16:56:18.186731, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 33, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/3/1 >[2020/05/27 16:56:18.187943, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.188019, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 3 (position 3) from bitmap >[2020/05/27 16:56:18.188048, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 3 >[2020/05/27 16:56:18.188078, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.188102, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.188122, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 44D99DAA >[2020/05/27 16:56:18.188141, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476d950 >[2020/05/27 16:56:18.188170, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.188188, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/05/27 16:56:18.188198, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '44D99DAA' stored >[2020/05/27 16:56:18.188213, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/05/27 16:56:18.188493, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.188512, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 44D99DAA >[2020/05/27 16:56:18.188528, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/05/27 16:56:18.188539, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x44d99daa) stored >[2020/05/27 16:56:18.188552, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x44d99daa (1155112362) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Mi Mai 27 16:56:18 2020 CEST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Mi Mai 27 16:56:18 2020 CEST > idle_time : Mi Mai 27 16:56:18 2020 CEST >[2020/05/27 16:56:18.188907, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.188924, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.188947, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.188989, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.189013, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.189027, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.189044, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 44D99DAA >[2020/05/27 16:56:18.189060, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476d950 >[2020/05/27 16:56:18.189083, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.189100, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/05/27 16:56:18.189110, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '44D99DAA' stored >[2020/05/27 16:56:18.189125, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000004 (4) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) >[2020/05/27 16:56:18.189338, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.189354, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 44D99DAA >[2020/05/27 16:56:18.189369, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/05/27 16:56:18.189379, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x44d99daa) stored >[2020/05/27 16:56:18.189393, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x44d99daa (1155112362) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Mi Mai 27 16:56:18 2020 CEST > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Mi Mai 27 16:56:18 2020 CEST > idle_time : Mi Mai 27 16:56:18 2020 CEST >[2020/05/27 16:56:18.189778, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.189794, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.189808, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.189828, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.189842, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.189894, 6, pid=136421, effective(0, 0), real(0, 0)] ../../librpc/ndr/ndr_string.c:178(ndr_pull_string) > short string '', sent with NULL termination despite NOTERM flag in IDL >[2020/05/27 16:56:18.189920, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24) > v1: struct LM_RESPONSE > Response : 000000000000000000000000000000000000000000000000 > NtChallengeResponseLen : 0x00e0 (224) > NtChallengeResponseMaxLen: 0x00e0 (224) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 224) > v2: struct NTLMv2_RESPONSE > Response : 6ed9b952344908c1f163fddacef40aed > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Mi Mai 27 16:56:18 2020 CEST > ChallengeFromClient : dc43959c2ed59a08 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'server' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Mi Mai 27 16:56:18 2020 CEST > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000001 (1) > TokenIL : 0x00002000 (8192) > MachineId : 8cb116238367a96c46dffd6b467371e18148cacb02fafcf8db98b36baa5a1132 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0016 (22) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/server' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x000e (14) > DomainNameMaxLen : 0x000e (14) > DomainName : * > DomainName : 'SERVERW' > UserNameLen : 0x000c (12) > UserNameMaxLen : 0x000c (12) > UserName : * > UserName : 'DocMAX' > WorkstationLen : 0x000e (14) > WorkstationMaxLen : 0x000e (14) > Workstation : * > Workstation : 'SERVERW' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 > [0000] 65 C2 B7 A2 90 76 5B AE 27 DA 9C 50 12 C4 A0 1D e....v[. '..P.... > NegotiateFlags : 0xe2888215 (3800597013) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_10 (10) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_0 (0) > ProductBuild : 0x4563 (17763) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2020/05/27 16:56:18.190744, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:509(ntlmssp_server_preauth) > Got user=[DocMAX] domain=[SERVERW] workstation=[SERVERW] len1=24 len2=224 >[2020/05/27 16:56:18.190766, 6, pid=136421, effective(0, 0), real(0, 0)] ../../librpc/ndr/ndr_string.c:178(ndr_pull_string) > short string '', sent with NULL termination despite NOTERM flag in IDL >[2020/05/27 16:56:18.190785, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:544(ntlmssp_server_preauth) >[2020/05/27 16:56:18.190796, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &v2_resp: struct NTLMv2_RESPONSE > Response : 6ed9b952344908c1f163fddacef40aed > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Mi Mai 27 16:56:18 2020 CEST > ChallengeFromClient : dc43959c2ed59a08 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'SERVER' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0002 (2) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : '' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x000c (12) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'server' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Mi Mai 27 16:56:18 2020 CEST > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000001 (1) > TokenIL : 0x00002000 (8192) > MachineId : 8cb116238367a96c46dffd6b467371e18148cacb02fafcf8db98b36baa5a1132 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0016 (22) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/server' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >[2020/05/27 16:56:18.191207, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3932(lp_load_ex) > lp_load_ex: refreshing parameters >[2020/05/27 16:56:18.191225, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1368(free_param_opts) > Freeing parametrics: >[2020/05/27 16:56:18.191295, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:550(init_globals) > Initialising global parameters >[2020/05/27 16:56:18.191374, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2844(lp_do_section) > Processing section "[global]" > doing parameter workgroup = WORKGROUP > doing parameter local master = no > doing parameter store dos attributes = yes > doing parameter map archive = no > doing parameter map hidden = no > doing parameter map system = no > doing parameter map readonly = no > doing parameter map to guest = Bad User > doing parameter allow insecure wide links = yes > doing parameter load printers = no > doing parameter printing = bsd > doing parameter printcap name = /dev/null > doing parameter disable spoolss = yes > doing parameter acl allow execute always = yes > doing parameter host msdfs = yes > doing parameter log level = 10 >[2020/05/27 16:56:18.191527, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.191726, 2, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2861(lp_do_section) > Processing section "[dfs]" > doing parameter path = /mnt/dfs > doing parameter msdfs root = yes > doing parameter read only = no > doing parameter guest ok = yes > doing parameter force user = root > doing parameter follow symlinks = yes >[2020/05/27 16:56:18.191814, 2, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2861(lp_do_section) > Processing section "[root]" > doing parameter path = / > doing parameter guest ok = yes > doing parameter writeable = yes > doing parameter force user = root > doing parameter browsable = yes >[2020/05/27 16:56:18.191883, 2, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2861(lp_do_section) > Processing section "[root-docmax]" > doing parameter path = / > doing parameter guest ok = yes > doing parameter writeable = yes > doing parameter force user = docmax > doing parameter browsable = yes >[2020/05/27 16:56:18.191965, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3974(lp_load_ex) > pm_process() returned Yes >[2020/05/27 16:56:18.191994, 7, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4309(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2020/05/27 16:56:18.192012, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1645(lp_add_ipc) > adding IPC service >[2020/05/27 16:56:18.192046, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:123(make_user_info_map) > Mapping user [SERVERW]\[DocMAX] from workstation [SERVERW] >[2020/05/27 16:56:18.192064, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:64(make_user_info) > attempting to make a user_info for DocMAX (DocMAX) >[2020/05/27 16:56:18.192079, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:72(make_user_info) > making strings for DocMAX's user_info struct >[2020/05/27 16:56:18.192095, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:117(make_user_info) > making blobs for DocMAX's user_info struct >[2020/05/27 16:56:18.192109, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:163(make_user_info) > made a user_info for DocMAX (DocMAX) >[2020/05/27 16:56:18.192124, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:200(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [SERVERW]\[DocMAX]@[SERVERW] with the new password interface >[2020/05/27 16:56:18.192140, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:203(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [SERVERW]\[DocMAX]@[SERVERW] >[2020/05/27 16:56:18.192154, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:213(auth_check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2020/05/27 16:56:18.192168, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:216(auth_check_ntlm_password) > challenge is: >[2020/05/27 16:56:18.192181, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/util.c:664(dump_data) > [0000] 3E 52 6E 68 17 7F B6 67 >Rnh...g >[2020/05/27 16:56:18.192208, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_builtin.c:41(check_anonymous_security) > Check auth for: [DocMAX] >[2020/05/27 16:56:18.192223, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:249(auth_check_ntlm_password) > auth_check_ntlm_password: anonymous had nothing to say >[2020/05/27 16:56:18.192237, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_sam.c:45(auth_sam_ignoredomain_auth) > auth_sam_ignoredomain_auth: Check auth for: [SERVERW]\[DocMAX] >[2020/05/27 16:56:18.192260, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:18.192276, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.192290, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:18.192305, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.192318, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.192359, 5, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_docmax >[2020/05/27 16:56:18.192383, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.192400, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/check_samsec.c:398(check_sam_security) > check_sam_security: Couldn't find user 'DocMAX' in passdb. >[2020/05/27 16:56:18.192414, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:258(auth_check_ntlm_password) > auth_check_ntlm_password: sam_ignoredomain authentication for user [DocMAX] FAILED with error NT_STATUS_NO_SUCH_USER, authoritative=1 >[2020/05/27 16:56:18.192431, 2, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:344(auth_check_ntlm_password) > check_ntlm_password: Authentication for user [DocMAX] -> [DocMAX] FAILED with error NT_STATUS_NO_SUCH_USER, authoritative=1 >[2020/05/27 16:56:18.192472, 2, pid=136421, effective(0, 0), real(0, 0), class=auth_audit] ../../auth/auth_log.c:635(log_authentication_event_human_readable) > Auth: [SMB2,(null)] user [SERVERW]\[DocMAX] at [Mi, 27 Mai 2020 16:56:18.192458 CEST] with [NTLMv2] status [NT_STATUS_NO_SUCH_USER] workstation [SERVERW] remote host [ipv4:192.168.1.3:50254] mapped to [SERVERW]\[DocMAX]. local host [ipv4:192.168.1.2:445] > {"timestamp": "2020-05-27T16:56:18.192535+0200", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "0", "logonType": 3, "status": "NT_STATUS_NO_SUCH_USER", "localAddress": "ipv4:192.168.1.2:445", "remoteAddress": "ipv4:192.168.1.3:50254", "serviceDescription": "SMB2", "authDescription": null, "clientDomain": "SERVERW", "clientAccount": "DocMAX", "workstation": "SERVERW", "becameAccount": null, "becameDomain": null, "becameSid": null, "mappedAccount": "DocMAX", "mappedDomain": "SERVERW", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 9719}} >[2020/05/27 16:56:18.192572, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/auth_ntlmssp.c:206(auth3_check_password_send) > auth3_check_password_send: Checking NTLMSSP password for SERVERW\DocMAX failed: NT_STATUS_NO_SUCH_USER, authoritative=1 >[2020/05/27 16:56:18.192595, 3, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:2229(do_map_to_guest_server_info) > No such user DocMAX [SERVERW] - using guest account >[2020/05/27 16:56:18.192619, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: ntlmssp[0x55ddb476ffa0]: subreq: 0x55ddb4719aa0 >[2020/05/27 16:56:18.192636, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:455(gensec_update_send) > gensec_update_send: spnego[0x55ddb4778310]: subreq: 0x55ddb4788cb0 >[2020/05/27 16:56:18.192668, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.192743, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:981(ntlmssp_server_postauth) > ntlmssp_server_auth: Failed to create unmodified session key. >[2020/05/27 16:56:18.192763, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:997(ntlmssp_server_postauth) > server session key is invalid (len == 0), cannot do KEY_EXCH! >[2020/05/27 16:56:18.192785, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:512(gensec_update_done) > gensec_update_done: ntlmssp[0x55ddb476ffa0]: NT_STATUS_OK tevent_req[0x55ddb4719aa0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x55ddb4719c50)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:244] >[2020/05/27 16:56:18.192822, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:512(gensec_update_done) > gensec_update_done: spnego[0x55ddb4778310]: NT_STATUS_OK tevent_req[0x55ddb4788cb0/../../auth/gensec/spnego.c:1628]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x55ddb4788e60)] timer[(nil)] finish[../../auth/gensec/spnego.c:2113] >[2020/05/27 16:56:18.192851, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.192875, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.192890, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.192904, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.192918, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.192966, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.193015, 4, pid=136421, effective(0, 0), real(0, 0), class=auth_audit] ../../auth/auth_log.c:740(log_successful_authz_event_human_readable) > Successful AuthZ: [SMB2,NTLMSSP] user [SERVER]\[nobody] [S-1-5-21-2719442082-4279343518-2111927761-501] at [Mi, 27 Mai 2020 16:56:18.193006 CEST] Remote host [ipv4:192.168.1.3:50254] local host [ipv4:192.168.1.2:445] > {"timestamp": "2020-05-27T16:56:18.193047+0200", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:192.168.1.2:445", "remoteAddress": "ipv4:192.168.1.3:50254", "serviceDescription": "SMB2", "authType": "NTLMSSP", "domain": "SERVER", "account": "nobody", "sid": "S-1-5-21-2719442082-4279343518-2111927761-501", "sessionId": "c9cb1273-72cf-4a89-9111-c4f4c7f24ec4", "logonServer": null, "transportProtection": "SMB", "accountFlags": "0x00000000"}} >[2020/05/27 16:56:18.193527, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:808(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2020/05/27 16:56:18.193839, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2360(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Wed May 27 16:53:05 2020 > >[2020/05/27 16:56:18.193894, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.193921, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.193949, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 44D99DAA >[2020/05/27 16:56:18.193977, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476d950 >[2020/05/27 16:56:18.194022, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.194058, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:948(smbXsrv_session_global_store) >[2020/05/27 16:56:18.194070, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:949(smbXsrv_session_global_store) > smbXsrv_session_global_store: key '44D99DAA' stored >[2020/05/27 16:56:18.194085, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000005 (5) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : Mi Mai 27 16:56:18 2020 CEST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x00000007 (7) > sids: ARRAY(7) > sids : S-1-5-21-2719442082-4279343518-2111927761-501 > sids : S-1-5-21-2719442082-4279343518-2111927761-514 > sids : S-1-22-2-65534 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-32-546 > sids : S-1-22-1-65534 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x000000000000fffe (65534) > gid : 0x000000000000fffe (65534) > ngroups : 0x00000001 (1) > groups: ARRAY(1) > groups : 0x000000000000fffe (65534) > info : * > info: struct auth_user_info > account_name : * > account_name : 'nobody' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'SERVER' > dns_domain_name : NULL > full_name : NULL > logon_script : NULL > profile_path : NULL > home_directory : NULL > home_drive : NULL > logon_server : NULL > last_logon : NTTIME(0) > last_logoff : NTTIME(0) > acct_expiry : NTTIME(0) > last_password_change : NTTIME(0) > allow_password_change : NTTIME(0) > force_password_change : NTTIME(0) > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000000 (0) > authenticated : 0x00 (0) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'nobody' > sanitized_username : * > sanitized_username : 'DocMAX' > torture : NULL > credentials : NULL > unique_session_token : c9cb1273-72cf-4a89-9111-c4f4c7f24ec4 > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : * > encryption_key : * > decryption_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > encryption_cipher : 0x0002 (2) >[2020/05/27 16:56:18.194765, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2020/05/27 16:56:18.194782, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 44D99DAA >[2020/05/27 16:56:18.194797, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1418(smbXsrv_session_update) >[2020/05/27 16:56:18.194808, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1424(smbXsrv_session_update) > smbXsrv_session_update: global_id (0x44d99daa) stored >[2020/05/27 16:56:18.194826, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x44d99daa (1155112362) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x44d99daa (1155112362) > session_wire_id : 0x0000000044d99daa (1155112362) > creation_time : Mi Mai 27 16:56:18 2020 CEST > expiration_time : Do Sep 14 04:48:05 30828 CEST > auth_time : Mi Mai 27 16:56:18 2020 CEST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x00000007 (7) > sids: ARRAY(7) > sids : S-1-5-21-2719442082-4279343518-2111927761-501 > sids : S-1-5-21-2719442082-4279343518-2111927761-514 > sids : S-1-22-2-65534 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-32-546 > sids : S-1-22-1-65534 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x000000000000fffe (65534) > gid : 0x000000000000fffe (65534) > ngroups : 0x00000001 (1) > groups: ARRAY(1) > groups : 0x000000000000fffe (65534) > info : * > info: struct auth_user_info > account_name : * > account_name : 'nobody' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'SERVER' > dns_domain_name : NULL > full_name : NULL > logon_script : NULL > profile_path : NULL > home_directory : NULL > home_drive : NULL > logon_server : NULL > last_logon : NTTIME(0) > last_logoff : NTTIME(0) > acct_expiry : NTTIME(0) > last_password_change : NTTIME(0) > allow_password_change : NTTIME(0) > force_password_change : NTTIME(0) > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000000 (0) > authenticated : 0x00 (0) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'nobody' > sanitized_username : * > sanitized_username : 'DocMAX' > torture : NULL > credentials : NULL > unique_session_token : c9cb1273-72cf-4a89-9111-c4f4c7f24ec4 > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > signing_key : * > encryption_key : * > decryption_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > local_address : 'ipv4:192.168.1.2:445' > remote_address : 'ipv4:192.168.1.3:50254' > remote_name : '192.168.1.3' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > encryption_cipher : 0x0002 (2) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:18 2020 CEST > nonce_high_random : 0x45bbaf93cab06038 (5024802858557530168) > nonce_high_max : 0x00000000ffffffff (4294967295) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2020/05/27 16:56:18.195670, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [3] idx[1] status[NT_STATUS_OK] body[8] dyn[yes:9] at ../../source3/smbd/smb2_sesssetup.c:183 >[2020/05/27 16:56:18.195694, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 33, charge 1, granted 33, current possible/max 8192/8192, total granted/max/low/range 33/8192/4/33 >[2020/05/27 16:56:18.196944, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.197001, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 4 (position 4) from bitmap >[2020/05/27 16:56:18.197038, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 4 >[2020/05/27 16:56:18.197060, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.197076, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.197090, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.197143, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.197170, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_tcon.c:221(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\server\IPC$] share[IPC$] >[2020/05/27 16:56:18.197231, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.197259, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.197276, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key D2C97189 >[2020/05/27 16:56:18.197308, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476c8d0 >[2020/05/27 16:56:18.198145, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/05/27 16:56:18.198170, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'D2C97189' stored >[2020/05/27 16:56:18.198187, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xd2c97189 (3536417161) > tcon_wire_id : 0xd2c97189 (3536417161) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:18 2020 CEST > share_name : NULL > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x00000000 (0) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/05/27 16:56:18.198368, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key D2C97189 >[2020/05/27 16:56:18.198402, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.198427, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:832(smbXsrv_tcon_create) >[2020/05/27 16:56:18.198437, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:838(smbXsrv_tcon_create) > smbXsrv_tcon_create: global_id (0xd2c97189) stored >[2020/05/27 16:56:18.198450, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xd2c97189 (3536417161) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xd2c97189 (3536417161) > tcon_wire_id : 0xd2c97189 (3536417161) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:18 2020 CEST > share_name : NULL > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x00000000 (0) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_INTERNAL_ERROR > idle_time : Mi Mai 27 16:56:18 2020 CEST > compat : NULL >[2020/05/27 16:56:18.198623, 3, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/access.c:369(allow_access) > Allowed connection from 192.168.1.3 (192.168.1.3) >[2020/05/27 16:56:18.198675, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service IPC$, connectpath = /tmp >[2020/05/27 16:56:18.198703, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:630(make_connection_snum) > make_connection_snum: Connect path is '/tmp' for service [IPC$] >[2020/05/27 16:56:18.198718, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share IPC$ is ok for unix user nobody >[2020/05/27 16:56:18.198732, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:269(is_share_read_only_for_token) > is_share_read_only_for_user: share IPC$ is read-only for unix user nobody >[2020/05/27 16:56:18.198764, 10, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:363(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2020/05/27 16:56:18.198791, 3, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:115(vfs_init_default) > Initialising default vfs hooks >[2020/05/27 16:56:18.198811, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2020/05/27 16:56:18.198825, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2020/05/27 16:56:18.198838, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for vfs_not_implemented >[2020/05/27 16:56:18.198851, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend 'vfs_not_implemented' >[2020/05/27 16:56:18.198868, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2020/05/27 16:56:18.198881, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2020/05/27 16:56:18.198894, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for dfs_samba4 >[2020/05/27 16:56:18.198906, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend 'dfs_samba4' >[2020/05/27 16:56:18.198933, 10, pid=136421, effective(0, 0), real(0, 0), class=dfs_samba4] ../../source3/modules/vfs_dfs_samba4.c:159(vfs_dfs_samba4_init) > vfs_dfs_samba4: Debug class number of 'fileid': 38 >[2020/05/27 16:56:18.198959, 3, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:141(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2020/05/27 16:56:18.198979, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2020/05/27 16:56:18.199012, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service IPC$, connectpath = /tmp >[2020/05/27 16:56:18.199030, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share IPC$ is ok for unix user nobody >[2020/05/27 16:56:18.199044, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:269(is_share_read_only_for_token) > is_share_read_only_for_user: share IPC$ is read-only for unix user nobody >[2020/05/27 16:56:18.199064, 10, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:363(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2020/05/27 16:56:18.199091, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.199106, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.199152, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.199227, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/] >[2020/05/27 16:56:18.199248, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.199261, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.199273, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.199298, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.199317, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service IPC$, connectpath = /tmp >[2020/05/27 16:56:18.199338, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/modules/vfs_default.c:175(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share IPC$, directory /tmp >[2020/05/27 16:56:18.199356, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:877(make_connection_snum) > serverw (ipv4:192.168.1.3:50254) connect to service IPC$ initially as user nobody (uid=65534, gid=65534) (pid 136421) >[2020/05/27 16:56:18.199388, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.199409, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.199429, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key D2C97189 >[2020/05/27 16:56:18.199444, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4786fd0 >[2020/05/27 16:56:18.199463, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/05/27 16:56:18.199472, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'D2C97189' stored >[2020/05/27 16:56:18.199487, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xd2c97189 (3536417161) > tcon_wire_id : 0xd2c97189 (3536417161) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:18 2020 CEST > share_name : 'IPC$' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/05/27 16:56:18.199613, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key D2C97189 >[2020/05/27 16:56:18.199626, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.199640, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:876(smbXsrv_tcon_update) >[2020/05/27 16:56:18.199649, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:882(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0xd2c97189) stored >[2020/05/27 16:56:18.199662, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xd2c97189 (3536417161) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xd2c97189 (3536417161) > tcon_wire_id : 0xd2c97189 (3536417161) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:18 2020 CEST > share_name : 'IPC$' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:18 2020 CEST > compat : * >[2020/05/27 16:56:18.199841, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [4] idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:177 >[2020/05/27 16:56:18.199858, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/5/33 >[2020/05/27 16:56:18.200845, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.200923, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 5 (position 5) from bitmap >[2020/05/27 16:56:18.200947, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 5 >[2020/05/27 16:56:18.200972, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.200992, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.201062, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.201114, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=vfs] ../../source3/smbd/vfs.c:887(vfs_ChDir) > vfs_ChDir to /tmp >[2020/05/27 16:56:18.201165, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=vfs] ../../source3/smbd/vfs.c:949(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /tmp >[2020/05/27 16:56:18.201187, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.201205, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.201219, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.201234, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key D2C97189 >[2020/05/27 16:56:18.201250, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4786fd0 >[2020/05/27 16:56:18.201270, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/05/27 16:56:18.201280, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'D2C97189' stored >[2020/05/27 16:56:18.201294, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xd2c97189 (3536417161) > tcon_wire_id : 0xd2c97189 (3536417161) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:18 2020 CEST > share_name : 'IPC$' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/05/27 16:56:18.201433, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key D2C97189 >[2020/05/27 16:56:18.201455, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.201477, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_tcon.c:876(smbXsrv_tcon_update) >[2020/05/27 16:56:18.201492, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_tcon.c:882(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0xd2c97189) stored >[2020/05/27 16:56:18.201505, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xd2c97189 (3536417161) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xd2c97189 (3536417161) > tcon_wire_id : 0xd2c97189 (3536417161) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:18 2020 CEST > share_name : 'IPC$' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:18 2020 CEST > compat : * >[2020/05/27 16:56:18.201698, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [wkssvc] >[2020/05/27 16:56:18.201743, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.201759, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.201773, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F08D6320 >[2020/05/27 16:56:18.201801, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476fc30 >[2020/05/27 16:56:18.201815, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.201932, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'F08D6320' stored >[2020/05/27 16:56:18.201962, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf08d6320 (4035797792) > open_persistent_id : 0x00000000f08d6320 (4035797792) > open_volatile_id : 0x00000000bcede6c7 (3169707719) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:18 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.202102, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F08D6320 >[2020/05/27 16:56:18.202116, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.202130, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xf08d6320) stored >[2020/05/27 16:56:18.202143, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xbcede6c7 (3169707719) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf08d6320 (4035797792) > open_persistent_id : 0x00000000f08d6320 (4035797792) > open_volatile_id : 0x00000000bcede6c7 (3169707719) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:18 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:18 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.202343, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 3169707719 (1 used) >[2020/05/27 16:56:18.202362, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /tmp/wkssvc hash 0x2b4dd005 >[2020/05/27 16:56:18.202395, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:115(make_internal_rpc_pipe_socketpair) > Create of internal pipe wkssvc requested >[2020/05/27 16:56:18.202481, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: wkssvc - fnum 3169707719 >[2020/05/27 16:56:18.202503, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [5] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:0] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.202522, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/6/33 >[2020/05/27 16:56:18.203332, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.203361, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 6 (position 6) from bitmap >[2020/05/27 16:56:18.203385, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 6 >[2020/05/27 16:56:18.203402, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.203429, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.203448, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 6, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.203463, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: wkssvc - fnum 3169707719 >[2020/05/27 16:56:18.203478, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 160 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 160 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.203550, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [6] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.203567, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/7/33 >[2020/05/27 16:56:18.203647, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.203739, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x00a0 (160) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x03 (3) > ctx_list: ARRAY(3) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 6bffd098-a112-3610-9833-46c3f87e345a > if_version : 0x00000001 (1) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0001 (1) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 6bffd098-a112-3610-9833-46c3f87e345a > if_version : 0x00000001 (1) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 71710533-beba-4937-8319-b5dbef9ccc36 > if_version : 0x00000001 (1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0002 (2) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 6bffd098-a112-3610-9833-46c3f87e345a > if_version : 0x00000001 (1) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 6cb71c2c-9812-4540-0300-000000000000 > if_version : 0x00000001 (1) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.204155, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 11 >[2020/05/27 16:56:18.204187, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:748(api_pipe_bind_req) > api_pipe_bind_req: wkssvc -> wkssvc rpc service >[2020/05/27 16:56:18.204202, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:783(api_pipe_bind_req) > api_pipe_bind_req: make response. 783 >[2020/05/27 16:56:18.204215, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:353(check_bind_req) > check_bind_req for wkssvc context_id=0 >[2020/05/27 16:56:18.204234, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:397(check_bind_req) > check_bind_req: wkssvc -> wkssvc rpc service >[2020/05/27 16:56:18.204248, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe wkssvc >[2020/05/27 16:56:18.204262, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe wkssvc >[2020/05/27 16:56:18.204282, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.204298, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(1155112362) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.204312, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.204334, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.204347, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.204379, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.204399, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.204413, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.204427, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.204439, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.204459, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.204491, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=auth_audit] ../../auth/auth_log.c:740(log_successful_authz_event_human_readable) > Successful AuthZ: [wkssvc,ncacn_np] user [SERVER]\[nobody] [S-1-5-21-2719442082-4279343518-2111927761-501] at [Mi, 27 Mai 2020 16:56:18.204481 CEST] Remote host [ipv4:192.168.1.3:50254] local host [ipv4:192.168.1.2:445] > {"timestamp": "2020-05-27T16:56:18.204522+0200", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:192.168.1.2:445", "remoteAddress": "ipv4:192.168.1.3:50254", "serviceDescription": "wkssvc", "authType": "ncacn_np", "domain": "SERVER", "account": "nobody", "sid": "S-1-5-21-2719442082-4279343518-2111927761-501", "sessionId": "c9cb1273-72cf-4a89-9111-c4f4c7f24ec4", "logonServer": null, "transportProtection": "SMB", "accountFlags": "0x00000000"}} >[2020/05/27 16:56:18.204558, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0044 (68) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x000053f0 (21488) > secondary_address_size : 0x000d (13) > secondary_address : '\PIPE\wkssvc' > _pad1 : DATA_BLOB length=0 > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.204743, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:992(dcerpc_ncacn_packet_process) > Current_pdu_len = 68, current_pdu_sent = 0 Returning 68 bytes >[2020/05/27 16:56:18.204767, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 0 bytes >[2020/05/27 16:56:18.204787, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 68 >[2020/05/27 16:56:18.204832, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.204848, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 7 (position 7) from bitmap >[2020/05/27 16:56:18.204862, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 7 >[2020/05/27 16:56:18.204878, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.204907, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.204966, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 7, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.204993, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: wkssvc - fnum 3169707719 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.205093, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 68 bytes. There is no more data outstanding >[2020/05/27 16:56:18.205111, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [7] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:68] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.205126, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/8/33 >[2020/05/27 16:56:18.205817, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.205871, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 8 (position 8) from bitmap >[2020/05/27 16:56:18.205894, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 8 >[2020/05/27 16:56:18.205963, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.206001, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.206029, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 8, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.206050, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: wkssvc - fnum 3169707719 >[2020/05/27 16:56:18.206066, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 64 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 64 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.206131, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [8] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.206147, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/9/33 >[2020/05/27 16:56:18.206205, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.206229, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0040 (64) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000028 (40) > context_id : 0x0000 (0) > opnum : 0x0000 (0) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=40 > [0000] 00 00 02 00 09 00 00 00 00 00 00 00 09 00 00 00 ........ ........ > [0010] 5C 00 5C 00 73 00 65 00 72 00 76 00 65 00 72 00 \.\.s.e. r.v.e.r. > [0020] 00 00 00 00 64 00 00 00 ....d... >[2020/05/27 16:56:18.206440, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 0 >[2020/05/27 16:56:18.206466, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1653(dcesrv_auth_request) > Checking request auth. >[2020/05/27 16:56:18.206495, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.206513, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.206526, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.206572, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.206609, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:521(smbd_become_authenticated_pipe_user) > Impersonated user: uid=(65534,65534), gid=(0,65534) >[2020/05/27 16:56:18.206625, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1495(api_pipe_request) > Requested wkssvc rpc service >[2020/05/27 16:56:18.206638, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1526(api_rpcTNP) > api_rpcTNP: wkssvc op 0x0 - api_rpcTNP: rpc command: WKSSVC_NETWKSTAGETINFO >[2020/05/27 16:56:18.206654, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1567(api_rpcTNP) > api_rpc_cmds[0].fn == 0x7f2f665bb630 >[2020/05/27 16:56:18.207889, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > wkssvc_NetWkstaGetInfo: struct wkssvc_NetWkstaGetInfo > in: struct wkssvc_NetWkstaGetInfo > server_name : * > server_name : '\\server' > level : 0x00000064 (100) >[2020/05/27 16:56:18.208022, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > wkssvc_NetWkstaGetInfo: struct wkssvc_NetWkstaGetInfo > out: struct wkssvc_NetWkstaGetInfo > info : * > info : union wkssvc_NetWkstaInfo(case 100) > info100 : * > info100: struct wkssvc_NetWkstaInfo100 > platform_id : PLATFORM_ID_NT (500) > server_name : * > server_name : 'SERVER' > domain_name : * > domain_name : 'WORKGROUP' > version_major : 0x00000006 (6) > version_minor : 0x00000001 (1) > result : WERR_OK >[2020/05/27 16:56:18.209434, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1594(api_rpcTNP) > api_rpcTNP: called wkssvc successfully >[2020/05/27 16:56:18.209495, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.209533, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0074 (116) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x0000005c (92) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=92 > [0000] 64 00 00 00 04 00 02 00 F4 01 00 00 08 00 02 00 d....... ........ > [0010] 0C 00 02 00 06 00 00 00 01 00 00 00 07 00 00 00 ........ ........ > [0020] 00 00 00 00 07 00 00 00 53 00 45 00 52 00 56 00 ........ S.E.R.V. > [0030] 45 00 52 00 00 00 00 00 0A 00 00 00 00 00 00 00 E.R..... ........ > [0040] 0A 00 00 00 57 00 4F 00 52 00 4B 00 47 00 52 00 ....W.O. R.K.G.R. > [0050] 4F 00 55 00 50 00 00 00 00 00 00 00 O.U.P... .... >[2020/05/27 16:56:18.209866, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1039(dcerpc_ncacn_packet_process) > PDU number: 0, PDU Length: 116 >[2020/05/27 16:56:18.209903, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 92 bytes >[2020/05/27 16:56:18.209926, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 116 >[2020/05/27 16:56:18.210041, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.210070, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 9 (position 9) from bitmap >[2020/05/27 16:56:18.210111, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 9 >[2020/05/27 16:56:18.210139, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.210176, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.210206, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 9, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.210230, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: wkssvc - fnum 3169707719 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.210369, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 116 bytes. There is no more data outstanding >[2020/05/27 16:56:18.210415, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [9] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:116] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.210449, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/10/33 >[2020/05/27 16:56:18.211303, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.211343, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 10 (position 10) from bitmap >[2020/05/27 16:56:18.211379, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 10 >[2020/05/27 16:56:18.211405, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.211445, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.211493, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: wkssvc - fnum 3169707719 >[2020/05/27 16:56:18.211536, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.211556, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.211606, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F08D6320 >[2020/05/27 16:56:18.211635, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4770fd0 >[2020/05/27 16:56:18.211672, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F08D6320 >[2020/05/27 16:56:18.211694, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.211767, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:420(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection wkssvc >[2020/05/27 16:56:18.211816, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 3169707719 (0 used) >[2020/05/27 16:56:18.211844, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [10] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/05/27 16:56:18.211869, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/11/33 >[2020/05/27 16:56:18.212854, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.212922, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 11 (position 11) from bitmap >[2020/05/27 16:56:18.212958, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 11 >[2020/05/27 16:56:18.213003, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.213065, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.213125, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [srvsvc] >[2020/05/27 16:56:18.213167, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.213182, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.213197, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F2F46F87 >[2020/05/27 16:56:18.213214, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb47506b0 >[2020/05/27 16:56:18.213228, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.213268, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'F2F46F87' stored >[2020/05/27 16:56:18.213284, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf2f46f87 (4076105607) > open_persistent_id : 0x00000000f2f46f87 (4076105607) > open_volatile_id : 0x00000000d718398f (3608689039) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:18 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.213541, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F2F46F87 >[2020/05/27 16:56:18.213567, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.213592, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xf2f46f87) stored >[2020/05/27 16:56:18.213617, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xd718398f (3608689039) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf2f46f87 (4076105607) > open_persistent_id : 0x00000000f2f46f87 (4076105607) > open_volatile_id : 0x00000000d718398f (3608689039) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:18 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:18 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.214127, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 3608689039 (1 used) >[2020/05/27 16:56:18.214158, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /tmp/srvsvc hash 0x8e98a76a >[2020/05/27 16:56:18.214194, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:115(make_internal_rpc_pipe_socketpair) > Create of internal pipe srvsvc requested >[2020/05/27 16:56:18.214307, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: srvsvc - fnum 3608689039 >[2020/05/27 16:56:18.214345, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [11] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:0] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.214373, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/12/33 >[2020/05/27 16:56:18.215083, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.215112, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 12 (position 12) from bitmap >[2020/05/27 16:56:18.215127, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 12 >[2020/05/27 16:56:18.215144, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.215165, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.215193, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 12, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.215209, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: srvsvc - fnum 3608689039 >[2020/05/27 16:56:18.215224, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 160 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 160 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.215292, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [12] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.215309, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/13/33 >[2020/05/27 16:56:18.215370, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.215396, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x00a0 (160) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x03 (3) > ctx_list: ARRAY(3) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0001 (1) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 71710533-beba-4937-8319-b5dbef9ccc36 > if_version : 0x00000001 (1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0002 (2) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 6cb71c2c-9812-4540-0300-000000000000 > if_version : 0x00000001 (1) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.215709, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 11 >[2020/05/27 16:56:18.215740, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:748(api_pipe_bind_req) > api_pipe_bind_req: srvsvc -> srvsvc rpc service >[2020/05/27 16:56:18.215755, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:783(api_pipe_bind_req) > api_pipe_bind_req: make response. 783 >[2020/05/27 16:56:18.215768, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:353(check_bind_req) > check_bind_req for srvsvc context_id=0 >[2020/05/27 16:56:18.215782, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:397(check_bind_req) > check_bind_req: srvsvc -> srvsvc rpc service >[2020/05/27 16:56:18.215795, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe srvsvc >[2020/05/27 16:56:18.215809, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe srvsvc >[2020/05/27 16:56:18.215828, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.215845, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(1155112362) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.215862, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.215883, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.215918, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.215996, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.216021, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.216053, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.216072, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.216086, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.216107, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.216134, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=auth_audit] ../../auth/auth_log.c:740(log_successful_authz_event_human_readable) > Successful AuthZ: [srvsvc,ncacn_np] user [SERVER]\[nobody] [S-1-5-21-2719442082-4279343518-2111927761-501] at [Mi, 27 Mai 2020 16:56:18.216124 CEST] Remote host [ipv4:192.168.1.3:50254] local host [ipv4:192.168.1.2:445] > {"timestamp": "2020-05-27T16:56:18.216165+0200", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:192.168.1.2:445", "remoteAddress": "ipv4:192.168.1.3:50254", "serviceDescription": "srvsvc", "authType": "ncacn_np", "domain": "SERVER", "account": "nobody", "sid": "S-1-5-21-2719442082-4279343518-2111927761-501", "sessionId": "c9cb1273-72cf-4a89-9111-c4f4c7f24ec4", "logonServer": null, "transportProtection": "SMB", "accountFlags": "0x00000000"}} >[2020/05/27 16:56:18.216199, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0044 (68) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x000053f0 (21488) > secondary_address_size : 0x000d (13) > secondary_address : '\PIPE\srvsvc' > _pad1 : DATA_BLOB length=0 > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.216358, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:992(dcerpc_ncacn_packet_process) > Current_pdu_len = 68, current_pdu_sent = 0 Returning 68 bytes >[2020/05/27 16:56:18.216379, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 0 bytes >[2020/05/27 16:56:18.216393, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 68 >[2020/05/27 16:56:18.216434, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.216450, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 13 (position 13) from bitmap >[2020/05/27 16:56:18.216465, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 13 >[2020/05/27 16:56:18.216481, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.216502, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.216520, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 13, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.216534, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: srvsvc - fnum 3608689039 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.216617, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 68 bytes. There is no more data outstanding >[2020/05/27 16:56:18.216634, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [13] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:68] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.216649, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/14/33 >[2020/05/27 16:56:18.217504, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.217561, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 14 (position 14) from bitmap >[2020/05/27 16:56:18.217578, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 14 >[2020/05/27 16:56:18.217608, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.217630, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.217647, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 14, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.217662, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: srvsvc - fnum 3608689039 >[2020/05/27 16:56:18.217676, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 64 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 64 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.217739, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [14] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.217756, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/15/33 >[2020/05/27 16:56:18.217822, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.217848, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0040 (64) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000028 (40) > context_id : 0x0000 (0) > opnum : 0x0015 (21) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=40 > [0000] 00 00 02 00 09 00 00 00 00 00 00 00 09 00 00 00 ........ ........ > [0010] 5C 00 5C 00 73 00 65 00 72 00 76 00 65 00 72 00 \.\.s.e. r.v.e.r. > [0020] 00 00 00 00 65 00 00 00 ....e... >[2020/05/27 16:56:18.218126, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 0 >[2020/05/27 16:56:18.218147, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1653(dcesrv_auth_request) > Checking request auth. >[2020/05/27 16:56:18.218171, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.218187, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.218200, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.218263, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.218301, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:521(smbd_become_authenticated_pipe_user) > Impersonated user: uid=(65534,65534), gid=(0,65534) >[2020/05/27 16:56:18.218317, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1495(api_pipe_request) > Requested srvsvc rpc service >[2020/05/27 16:56:18.218330, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1526(api_rpcTNP) > api_rpcTNP: srvsvc op 0x15 - api_rpcTNP: rpc command: SRVSVC_NETSRVGETINFO >[2020/05/27 16:56:18.218346, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1567(api_rpcTNP) > api_rpc_cmds[21].fn == 0x7f2f664aeb20 >[2020/05/27 16:56:18.218631, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > srvsvc_NetSrvGetInfo: struct srvsvc_NetSrvGetInfo > in: struct srvsvc_NetSrvGetInfo > server_unc : * > server_unc : '\\server' > level : 0x00000065 (101) >[2020/05/27 16:56:18.218675, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:1343(_srvsvc_NetSrvGetInfo) > _srvsvc_NetSrvGetInfo: 1343 >[2020/05/27 16:56:18.218693, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:1421(_srvsvc_NetSrvGetInfo) > _srvsvc_NetSrvGetInfo: 1421 >[2020/05/27 16:56:18.218706, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > srvsvc_NetSrvGetInfo: struct srvsvc_NetSrvGetInfo > out: struct srvsvc_NetSrvGetInfo > info : * > info : union srvsvc_NetSrvInfo(case 101) > info101 : * > info101: struct srvsvc_NetSrvInfo101 > platform_id : PLATFORM_ID_NT (500) > server_name : * > server_name : 'SERVER' > version_major : 0x00000006 (6) > version_minor : 0x00000001 (1) > server_type : 0x00809a03 (8428035) > 1: SV_TYPE_WORKSTATION > 1: SV_TYPE_SERVER > 0: SV_TYPE_SQLSERVER > 0: SV_TYPE_DOMAIN_CTRL > 0: SV_TYPE_DOMAIN_BAKCTRL > 0: SV_TYPE_TIME_SOURCE > 0: SV_TYPE_AFP > 0: SV_TYPE_NOVELL > 0: SV_TYPE_DOMAIN_MEMBER > 1: SV_TYPE_PRINTQ_SERVER > 0: SV_TYPE_DIALIN_SERVER > 1: SV_TYPE_SERVER_UNIX > 1: SV_TYPE_NT > 0: SV_TYPE_WFW > 0: SV_TYPE_SERVER_MFPN > 1: SV_TYPE_SERVER_NT > 0: SV_TYPE_POTENTIAL_BROWSER > 0: SV_TYPE_BACKUP_BROWSER > 0: SV_TYPE_MASTER_BROWSER > 0: SV_TYPE_DOMAIN_MASTER > 0: SV_TYPE_SERVER_OSF > 0: SV_TYPE_SERVER_VMS > 0: SV_TYPE_WIN95_PLUS > 1: SV_TYPE_DFS_SERVER > 0: SV_TYPE_ALTERNATE_XPORT > 0: SV_TYPE_LOCAL_LIST_ONLY > 0: SV_TYPE_DOMAIN_ENUM > comment : * > comment : 'Samba 4.12.3' > result : WERR_OK >[2020/05/27 16:56:18.218906, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1594(api_rpcTNP) > api_rpcTNP: called srvsvc successfully >[2020/05/27 16:56:18.218945, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.218971, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0080 (128) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x00000068 (104) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=104 > [0000] 65 00 00 00 04 00 02 00 F4 01 00 00 08 00 02 00 e....... ........ > [0010] 06 00 00 00 01 00 00 00 03 9A 80 00 0C 00 02 00 ........ ........ > [0020] 07 00 00 00 00 00 00 00 07 00 00 00 53 00 45 00 ........ ....S.E. > [0030] 52 00 56 00 45 00 52 00 00 00 00 00 0D 00 00 00 R.V.E.R. ........ > [0040] 00 00 00 00 0D 00 00 00 53 00 61 00 6D 00 62 00 ........ S.a.m.b. > [0050] 61 00 20 00 34 00 2E 00 31 00 32 00 2E 00 33 00 a. .4... 1.2...3. > [0060] 00 00 00 00 00 00 00 00 ........ >[2020/05/27 16:56:18.219190, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1039(dcerpc_ncacn_packet_process) > PDU number: 0, PDU Length: 128 >[2020/05/27 16:56:18.219204, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 104 bytes >[2020/05/27 16:56:18.219217, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 128 >[2020/05/27 16:56:18.219266, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.219293, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 15 (position 15) from bitmap >[2020/05/27 16:56:18.219309, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 15 >[2020/05/27 16:56:18.219325, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.219347, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.219365, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 15, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.219380, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: srvsvc - fnum 3608689039 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.219449, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 128 bytes. There is no more data outstanding >[2020/05/27 16:56:18.219466, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [15] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:128] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.219481, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/16/33 >[2020/05/27 16:56:18.220230, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.220290, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 16 (position 16) from bitmap >[2020/05/27 16:56:18.220320, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 16 >[2020/05/27 16:56:18.220341, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.220368, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.220393, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: srvsvc - fnum 3608689039 >[2020/05/27 16:56:18.220415, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.220460, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.220482, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F2F46F87 >[2020/05/27 16:56:18.220503, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4770fd0 >[2020/05/27 16:56:18.220533, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F2F46F87 >[2020/05/27 16:56:18.220558, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.220600, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:420(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection srvsvc >[2020/05/27 16:56:18.220636, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 3608689039 (0 used) >[2020/05/27 16:56:18.220658, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [16] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/05/27 16:56:18.220677, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/17/33 >[2020/05/27 16:56:18.222605, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.222682, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 17 (position 17) from bitmap >[2020/05/27 16:56:18.222706, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 17 >[2020/05/27 16:56:18.222728, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.222774, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.222802, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [srvsvc] >[2020/05/27 16:56:18.222831, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.222849, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.222869, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 090DD22B >[2020/05/27 16:56:18.222890, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb47506b0 >[2020/05/27 16:56:18.222908, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.222950, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '090DD22B' stored >[2020/05/27 16:56:18.222982, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0x090dd22b (151900715) > open_persistent_id : 0x00000000090dd22b (151900715) > open_volatile_id : 0x00000000149a3a2f (345651759) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:18 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.223197, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 090DD22B >[2020/05/27 16:56:18.223216, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.223233, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x090dd22b) stored >[2020/05/27 16:56:18.223258, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x149a3a2f (345651759) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0x090dd22b (151900715) > open_persistent_id : 0x00000000090dd22b (151900715) > open_volatile_id : 0x00000000149a3a2f (345651759) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:18 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:18 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.223534, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 345651759 (1 used) >[2020/05/27 16:56:18.223556, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /tmp/srvsvc hash 0x8e98a76a >[2020/05/27 16:56:18.223582, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:115(make_internal_rpc_pipe_socketpair) > Create of internal pipe srvsvc requested >[2020/05/27 16:56:18.223665, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: srvsvc - fnum 345651759 >[2020/05/27 16:56:18.223692, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [17] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:0] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.223723, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/18/33 >[2020/05/27 16:56:18.224530, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.224571, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 18 (position 18) from bitmap >[2020/05/27 16:56:18.224591, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 18 >[2020/05/27 16:56:18.224612, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.224641, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.224666, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 18, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.224686, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: srvsvc - fnum 345651759 >[2020/05/27 16:56:18.224706, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 160 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 160 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.224793, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [18] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.224819, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/19/33 >[2020/05/27 16:56:18.224929, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.224960, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x00a0 (160) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x03 (3) > ctx_list: ARRAY(3) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0001 (1) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 71710533-beba-4937-8319-b5dbef9ccc36 > if_version : 0x00000001 (1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0002 (2) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 6cb71c2c-9812-4540-0300-000000000000 > if_version : 0x00000001 (1) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.225419, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 11 >[2020/05/27 16:56:18.225449, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:748(api_pipe_bind_req) > api_pipe_bind_req: srvsvc -> srvsvc rpc service >[2020/05/27 16:56:18.225467, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:783(api_pipe_bind_req) > api_pipe_bind_req: make response. 783 >[2020/05/27 16:56:18.225484, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:353(check_bind_req) > check_bind_req for srvsvc context_id=0 >[2020/05/27 16:56:18.225502, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:397(check_bind_req) > check_bind_req: srvsvc -> srvsvc rpc service >[2020/05/27 16:56:18.225519, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe srvsvc >[2020/05/27 16:56:18.225537, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe srvsvc >[2020/05/27 16:56:18.225569, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.225592, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(1155112362) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.225610, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.225627, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.225643, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.225684, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.225709, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.225728, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.225745, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.225762, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.225787, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.225820, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=auth_audit] ../../auth/auth_log.c:740(log_successful_authz_event_human_readable) > Successful AuthZ: [srvsvc,ncacn_np] user [SERVER]\[nobody] [S-1-5-21-2719442082-4279343518-2111927761-501] at [Mi, 27 Mai 2020 16:56:18.225808 CEST] Remote host [ipv4:192.168.1.3:50254] local host [ipv4:192.168.1.2:445] > {"timestamp": "2020-05-27T16:56:18.225857+0200", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:192.168.1.2:445", "remoteAddress": "ipv4:192.168.1.3:50254", "serviceDescription": "srvsvc", "authType": "ncacn_np", "domain": "SERVER", "account": "nobody", "sid": "S-1-5-21-2719442082-4279343518-2111927761-501", "sessionId": "c9cb1273-72cf-4a89-9111-c4f4c7f24ec4", "logonServer": null, "transportProtection": "SMB", "accountFlags": "0x00000000"}} >[2020/05/27 16:56:18.225901, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0044 (68) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x000053f0 (21488) > secondary_address_size : 0x000d (13) > secondary_address : '\PIPE\srvsvc' > _pad1 : DATA_BLOB length=0 > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.226193, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:992(dcerpc_ncacn_packet_process) > Current_pdu_len = 68, current_pdu_sent = 0 Returning 68 bytes >[2020/05/27 16:56:18.226215, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 0 bytes >[2020/05/27 16:56:18.226232, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 68 >[2020/05/27 16:56:18.226285, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.226306, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 19 (position 19) from bitmap >[2020/05/27 16:56:18.226324, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 19 >[2020/05/27 16:56:18.226344, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.226372, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.226395, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 19, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.226413, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: srvsvc - fnum 345651759 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.226509, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 68 bytes. There is no more data outstanding >[2020/05/27 16:56:18.226539, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [19] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:68] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.226559, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/20/33 >[2020/05/27 16:56:18.227263, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.227299, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 20 (position 20) from bitmap >[2020/05/27 16:56:18.227319, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 20 >[2020/05/27 16:56:18.227339, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.227366, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.227389, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 20, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.227407, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: srvsvc - fnum 345651759 >[2020/05/27 16:56:18.227426, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 88 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 88 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.227508, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [20] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.227529, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/21/33 >[2020/05/27 16:56:18.227602, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.227640, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0058 (88) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000040 (64) > context_id : 0x0000 (0) > opnum : 0x000f (15) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=64 > [0000] 00 00 02 00 09 00 00 00 00 00 00 00 09 00 00 00 ........ ........ > [0010] 5C 00 5C 00 73 00 65 00 72 00 76 00 65 00 72 00 \.\.s.e. r.v.e.r. > [0020] 00 00 00 00 01 00 00 00 01 00 00 00 04 00 02 00 ........ ........ > [0030] 00 00 00 00 00 00 00 00 FF FF FF FF 00 00 00 00 ........ ........ >[2020/05/27 16:56:18.228039, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 0 >[2020/05/27 16:56:18.228073, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1653(dcesrv_auth_request) > Checking request auth. >[2020/05/27 16:56:18.228116, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.228141, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.228159, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.228219, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.228278, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:521(smbd_become_authenticated_pipe_user) > Impersonated user: uid=(65534,65534), gid=(0,65534) >[2020/05/27 16:56:18.228312, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1495(api_pipe_request) > Requested srvsvc rpc service >[2020/05/27 16:56:18.228333, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1526(api_rpcTNP) > api_rpcTNP: srvsvc op 0xf - api_rpcTNP: rpc command: SRVSVC_NETSHAREENUMALL >[2020/05/27 16:56:18.228354, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1567(api_rpcTNP) > api_rpc_cmds[15].fn == 0x7f2f664afa00 >[2020/05/27 16:56:18.229441, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll > in: struct srvsvc_NetShareEnumAll > server_unc : * > server_unc : '\\server' > info_ctr : * > info_ctr: struct srvsvc_NetShareInfoCtr > level : 0x00000001 (1) > ctr : union srvsvc_NetShareCtr(case 1) > ctr1 : * > ctr1: struct srvsvc_NetShareCtr1 > count : 0x00000000 (0) > array : NULL > max_buffer : 0xffffffff (4294967295) > resume_handle : NULL >[2020/05/27 16:56:18.229578, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:1597(_srvsvc_NetShareEnumAll) > _srvsvc_NetShareEnumAll: 1597 >[2020/05/27 16:56:18.229598, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:587(init_srv_share_info_ctr) > init_srv_share_info_ctr >[2020/05/27 16:56:18.229616, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:18.229636, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(1155112362) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.229654, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2020/05/27 16:56:18.229671, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.229688, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.231217, 1, pid=136421, effective(0, 0), real(0, 0)] ../../source3/printing/printer_list.c:234(printer_list_get_last_refresh) > Failed to fetch record! >[2020/05/27 16:56:18.231249, 1, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/server_reload.c:66(delete_and_reload_printers) > pcap cache not loaded >[2020/05/27 16:56:18.231265, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/service.c:55(load_registry_shares) > load_registry_shares() >[2020/05/27 16:56:18.231291, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.231310, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:605(init_srv_share_info_ctr) > counting service dfs >[2020/05/27 16:56:18.231329, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:605(init_srv_share_info_ctr) > counting service root >[2020/05/27 16:56:18.231344, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:605(init_srv_share_info_ctr) > counting service root-docmax >[2020/05/27 16:56:18.231358, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:605(init_srv_share_info_ctr) > counting service IPC$ >[2020/05/27 16:56:18.231381, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:1611(_srvsvc_NetShareEnumAll) > _srvsvc_NetShareEnumAll: 1611 >[2020/05/27 16:56:18.231397, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll > out: struct srvsvc_NetShareEnumAll > info_ctr : * > info_ctr: struct srvsvc_NetShareInfoCtr > level : 0x00000001 (1) > ctr : union srvsvc_NetShareCtr(case 1) > ctr1 : * > ctr1: struct srvsvc_NetShareCtr1 > count : 0x00000004 (4) > array : * > array: ARRAY(4) > array: struct srvsvc_NetShareInfo1 > name : * > name : 'dfs' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'root' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'root-docmax' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > array: struct srvsvc_NetShareInfo1 > name : * > name : 'IPC$' > type : STYPE_IPC_HIDDEN (0x80000003) > comment : * > comment : 'IPC Service (Samba 4.12.3)' > totalentries : * > totalentries : 0x00000004 (4) > resume_handle : NULL > result : WERR_OK >[2020/05/27 16:56:18.231656, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1594(api_rpcTNP) > api_rpcTNP: called srvsvc successfully >[2020/05/27 16:56:18.231689, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.231728, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0148 (328) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x00000130 (304) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=304 > [0000] 01 00 00 00 01 00 00 00 08 00 02 00 04 00 00 00 ........ ........ > [0010] 0C 00 02 00 04 00 00 00 10 00 02 00 00 00 00 00 ........ ........ > [0020] 14 00 02 00 18 00 02 00 00 00 00 00 1C 00 02 00 ........ ........ > [0030] 20 00 02 00 00 00 00 00 24 00 02 00 28 00 02 00 ....... $...(... > [0040] 03 00 00 80 2C 00 02 00 04 00 00 00 00 00 00 00 ....,... ........ > [0050] 04 00 00 00 64 00 66 00 73 00 00 00 01 00 00 00 ....d.f. s....... > [0060] 00 00 00 00 01 00 00 00 00 00 00 00 05 00 00 00 ........ ........ > [0070] 00 00 00 00 05 00 00 00 72 00 6F 00 6F 00 74 00 ........ r.o.o.t. > [0080] 00 00 00 00 01 00 00 00 00 00 00 00 01 00 00 00 ........ ........ > [0090] 00 00 00 00 0C 00 00 00 00 00 00 00 0C 00 00 00 ........ ........ > [00A0] 72 00 6F 00 6F 00 74 00 2D 00 64 00 6F 00 63 00 r.o.o.t. -.d.o.c. > [00B0] 6D 00 61 00 78 00 00 00 01 00 00 00 00 00 00 00 m.a.x... ........ > [00C0] 01 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 ........ ........ > [00D0] 05 00 00 00 49 00 50 00 43 00 24 00 00 00 00 00 ....I.P. C.$..... > [00E0] 1B 00 00 00 00 00 00 00 1B 00 00 00 49 00 50 00 ........ ....I.P. > [00F0] 43 00 20 00 53 00 65 00 72 00 76 00 69 00 63 00 C. .S.e. r.v.i.c. > [0100] 65 00 20 00 28 00 53 00 61 00 6D 00 62 00 61 00 e. .(.S. a.m.b.a. > [0110] 20 00 34 00 2E 00 31 00 32 00 2E 00 33 00 29 00 .4...1. 2...3.). > [0120] 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 ........ ........ >[2020/05/27 16:56:18.232202, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1039(dcerpc_ncacn_packet_process) > PDU number: 0, PDU Length: 328 >[2020/05/27 16:56:18.232220, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 304 bytes >[2020/05/27 16:56:18.232235, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 328 >[2020/05/27 16:56:18.232304, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.232324, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 21 (position 21) from bitmap >[2020/05/27 16:56:18.232340, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 21 >[2020/05/27 16:56:18.232359, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.232385, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.232406, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 21, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.232422, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: srvsvc - fnum 345651759 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.232509, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 328 bytes. There is no more data outstanding >[2020/05/27 16:56:18.232528, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [21] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:328] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.232545, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/22/33 >[2020/05/27 16:56:18.233419, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.233466, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 22 (position 22) from bitmap >[2020/05/27 16:56:18.233483, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 22 >[2020/05/27 16:56:18.233501, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.233525, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.233546, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: srvsvc - fnum 345651759 >[2020/05/27 16:56:18.233565, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.233580, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.233598, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 090DD22B >[2020/05/27 16:56:18.233616, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4770fd0 >[2020/05/27 16:56:18.233642, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 090DD22B >[2020/05/27 16:56:18.233657, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.233699, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:420(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection srvsvc >[2020/05/27 16:56:18.233748, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 345651759 (0 used) >[2020/05/27 16:56:18.233803, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [22] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/05/27 16:56:18.233840, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/23/33 >[2020/05/27 16:56:18.739566, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.739640, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 23 (position 23) from bitmap >[2020/05/27 16:56:18.739667, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_IOCTL] mid = 23 >[2020/05/27 16:56:18.739698, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.739735, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.739759, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 23, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.739784, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_ioctl.c:394(smbd_smb2_ioctl_send) > smbd_smb2_ioctl: ctl_code[0x00060194] <no handle>, fnum [fsp is NULL] >[2020/05/27 16:56:18.739814, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=vfs] ../../source3/modules/vfs_default.c:198(vfswrap_get_dfs_referrals) >[2020/05/27 16:56:18.739831, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > dfs_GetDFSReferral: struct dfs_GetDFSReferral > in: struct dfs_GetDFSReferral > req: struct dfs_GetDFSReferral_in > max_referral_level : 0x0004 (4) > servername : '\server\dfs' >[2020/05/27 16:56:18.743818, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=msdfs] ../../source3/smbd/msdfs.c:131(parse_dfs_path) > parse_dfs_path: temp = |server\dfs| after trimming \'s >[2020/05/27 16:56:18.743919, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=msdfs] ../../source3/smbd/msdfs.c:157(parse_dfs_path) > parse_dfs_path: hostname: server >[2020/05/27 16:56:18.743962, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=msdfs] ../../source3/smbd/msdfs.c:199(parse_dfs_path) > parse_dfs_path: servicename: dfs >[2020/05/27 16:56:18.744030, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=vfs] ../../source3/modules/vfs_default.c:364(vfswrap_get_dfs_referrals) >[2020/05/27 16:56:18.744064, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > dfs_GetDFSReferral: struct dfs_GetDFSReferral > out: struct dfs_GetDFSReferral > resp : * > resp: struct dfs_referral_resp > path_consumed : 0x0016 (22) > nb_referrals : 0x0001 (1) > header_flags : 0x00000003 (3) > 1: DFS_HEADER_FLAG_REFERAL_SVR > 1: DFS_HEADER_FLAG_STORAGE_SVR > 0: DFS_HEADER_FLAG_TARGET_BCK > referral_entries: ARRAY(1) > referral_entries: struct dfs_referral_type > version : 0x0003 (3) > referral : union dfs_referral_version(case 3) > v3: struct dfs_referral_v3 > size : 0x0022 (34) > server_type : DFS_SERVER_ROOT (1) > entry_flags : UNKNOWN_ENUM_VALUE (0) > ttl : 0x00000258 (600) > referrals : union dfs_referral(case 0) > r1: struct dfs_normal_referral > DFS_path : * > DFS_path : '\server\dfs' > DFS_alt_path : * > DFS_alt_path : '\server\dfs' > netw_address : * > netw_address : '\server\dfs' > service_site_guid : union dfs_padding(case 16) > value: ARRAY(16) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) >[2020/05/27 16:56:18.744675, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_ioctl.c:291(smbd_smb2_request_ioctl_done) > smbd_smb2_request_ioctl_done: smbd_smb2_ioctl_recv returned 114 status NT_STATUS_OK >[2020/05/27 16:56:18.744712, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [23] idx[1] status[NT_STATUS_OK] body[48] dyn[yes:114] at ../../source3/smbd/smb2_ioctl.c:361 >[2020/05/27 16:56:18.744760, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/24/33 >[2020/05/27 16:56:18.745992, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.746098, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 24 (position 24) from bitmap >[2020/05/27 16:56:18.746154, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 24 >[2020/05/27 16:56:18.746197, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.746229, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.746263, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.746324, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.746370, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_tcon.c:221(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\server\dfs] share[dfs] >[2020/05/27 16:56:18.746421, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.746453, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.746485, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key E11CB12B >[2020/05/27 16:56:18.746519, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476c8d0 >[2020/05/27 16:56:18.746568, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/05/27 16:56:18.746590, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'E11CB12B' stored >[2020/05/27 16:56:18.746619, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xe11cb12b (3776753963) > tcon_wire_id : 0xe11cb12b (3776753963) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:19 2020 CEST > share_name : NULL > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x00000000 (0) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/05/27 16:56:18.746988, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key E11CB12B >[2020/05/27 16:56:18.747047, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.747137, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:832(smbXsrv_tcon_create) >[2020/05/27 16:56:18.747167, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:838(smbXsrv_tcon_create) > smbXsrv_tcon_create: global_id (0xe11cb12b) stored >[2020/05/27 16:56:18.747188, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xe11cb12b (3776753963) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xe11cb12b (3776753963) > tcon_wire_id : 0xe11cb12b (3776753963) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:19 2020 CEST > share_name : NULL > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x00000000 (0) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_INTERNAL_ERROR > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL >[2020/05/27 16:56:18.747475, 3, pid=136421, effective(0, 0), real(0, 0)] ../../lib/util/access.c:369(allow_access) > Allowed connection from 192.168.1.3 (192.168.1.3) >[2020/05/27 16:56:18.747531, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user root >[2020/05/27 16:56:18.747577, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is root >[2020/05/27 16:56:18.747638, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [root]! >[2020/05/27 16:56:18.747681, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: SERVER\root => domain=[SERVER], name=[root] >[2020/05/27 16:56:18.747705, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/05/27 16:56:18.747742, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.747762, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.747799, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.747829, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.747855, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.747948, 5, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/05/27 16:56:18.748008, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.748065, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.748093, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.748118, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.748135, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.748158, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.748229, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.748266, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix User\root => domain=[Unix User], name=[root] >[2020/05/27 16:56:18.748294, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/05/27 16:56:18.748412, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user root >[2020/05/27 16:56:18.748449, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is root >[2020/05/27 16:56:18.748477, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [root]! >[2020/05/27 16:56:18.748567, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.748598, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.748625, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.748652, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.748678, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.748747, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.748794, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/05/27 16:56:18.748836, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/server_info.c:448(SamInfo3_handle_sids) > Unix User found. Rid marked as special and sid (S-1-22-1-0) saved as extra sid >[2020/05/27 16:56:18.748878, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: SERVER\root => domain=[SERVER], name=[root] >[2020/05/27 16:56:18.748909, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/05/27 16:56:18.748959, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.748985, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.749009, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.749056, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.749080, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.749124, 5, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:600(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2020/05/27 16:56:18.749164, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.749205, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.749241, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.749268, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.749295, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.749321, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.749386, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.749420, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:112(lookup_name) > lookup_name: Unix User\root => domain=[Unix User], name=[root] >[2020/05/27 16:56:18.749448, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:114(lookup_name) > lookup_name: flags = 0x073 >[2020/05/27 16:56:18.749492, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user root >[2020/05/27 16:56:18.749519, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is root >[2020/05/27 16:56:18.749547, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [root]! >[2020/05/27 16:56:18.749584, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1379(sid_to_uid) > sid S-1-22-1-0 -> uid 0 >[2020/05/27 16:56:18.749699, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [root] >[2020/05/27 16:56:18.749878, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.749916, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.749942, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.749961, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.749998, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.750066, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.750098, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2020/05/27 16:56:18.750134, 1, pid=136421, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2516(lp_idmap_range) > idmap range not specified for domain '*' >[2020/05/27 16:56:18.750162, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:441(create_local_nt_token) > Create local NT token for S-1-22-1-0 >[2020/05/27 16:56:18.750192, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user nobody >[2020/05/27 16:56:18.750219, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2020/05/27 16:56:18.750260, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:158(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2020/05/27 16:56:18.750331, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2020/05/27 16:56:18.750533, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.750599, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.750633, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.750660, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.750691, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.750759, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.750791, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1226(xid_to_sid) > xid_to_sid: GID 65534 -> S-1-22-2-65534 fallback >[2020/05/27 16:56:18.750828, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.750856, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.750883, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.750920, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.750961, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.751048, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:688(finalize_local_nt_token) > Failed to fetch domain sid for WORKGROUP >[2020/05/27 16:56:18.751089, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.751134, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.751163, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.751190, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.751216, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.751242, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.751316, 10, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-544 >[2020/05/27 16:56:18.751360, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:162(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2020/05/27 16:56:18.751418, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.751484, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.751533, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.751560, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.751587, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.751613, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.751670, 10, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-545 >[2020/05/27 16:56:18.751735, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:132(create_builtin_users) > create_builtin_users: Failed to create Users >[2020/05/27 16:56:18.751780, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.751826, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.751843, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.751859, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.751883, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.751908, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.751975, 10, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/05/27 16:56:18.752019, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/pdb_util.c:205(create_builtin_guests) > create_builtin_guests: Failed to create Guests >[2020/05/27 16:56:18.752056, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.752089, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.752118, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.752145, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.752171, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.752197, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.752314, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.752362, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-1-0] >[2020/05/27 16:56:18.752397, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-0] >[2020/05/27 16:56:18.752431, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65534] >[2020/05/27 16:56:18.752467, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:178(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2020/05/27 16:56:18.752513, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2020/05/27 16:56:18.752638, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1299(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2020/05/27 16:56:18.752687, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.752717, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.752744, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.752771, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.752797, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.752859, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.752922, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/05/27 16:56:18.752950, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.752976, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.752993, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753009, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.753033, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.753082, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.753114, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2020/05/27 16:56:18.753144, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753171, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.753198, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753224, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.753250, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.753302, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.753332, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/05/27 16:56:18.753361, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753388, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.753415, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753441, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.753466, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.753522, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.753553, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2020/05/27 16:56:18.753582, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753637, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.753684, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.753725, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.753767, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.753883, 10, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/05/27 16:56:18.753948, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.754006, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2020/05/27 16:56:18.754051, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.754094, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.754119, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.754145, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.754192, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.754265, 10, pid=136421, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1572(pdb_default_sid_to_id) > Could not find map for sid S-1-5-32-546 >[2020/05/27 16:56:18.754306, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.754336, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1125(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2020/05/27 16:56:18.754365, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2020/05/27 16:56:18.754393, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2020/05/27 16:56:18.754421, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:623(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2020/05/27 16:56:18.754467, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.754554, 10, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.754616, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:447(set_conn_force_user_group) > Forced user root >[2020/05/27 16:56:18.754650, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service dfs, connectpath = /mnt/dfs >[2020/05/27 16:56:18.754702, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:630(make_connection_snum) > make_connection_snum: Connect path is '/mnt/dfs' for service [dfs] >[2020/05/27 16:56:18.754721, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share dfs is ok for unix user nobody >[2020/05/27 16:56:18.754757, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:269(is_share_read_only_for_token) > is_share_read_only_for_user: share dfs is read-write for unix user nobody >[2020/05/27 16:56:18.754818, 10, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:363(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2020/05/27 16:56:18.754865, 3, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:115(vfs_init_default) > Initialising default vfs hooks >[2020/05/27 16:56:18.754905, 3, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:141(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2020/05/27 16:56:18.754950, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2020/05/27 16:56:18.755091, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/notify_msg.c:79(notify_init) > notify_init: notifyd=136417 >[2020/05/27 16:56:18.755131, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 784 - private_data=0x55ddb4773530 >[2020/05/27 16:56:18.755163, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 793 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.755185, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:723(messaging_register) > Registering messaging pointer for type 799 - private_data=0x55ddb4764150 >[2020/05/27 16:56:18.756008, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service dfs, connectpath = /mnt/dfs >[2020/05/27 16:56:18.756053, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:221(user_ok_token) > user_ok_token: share dfs is ok for unix user nobody >[2020/05/27 16:56:18.756069, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:269(is_share_read_only_for_token) > is_share_read_only_for_user: share dfs is read-write for unix user nobody >[2020/05/27 16:56:18.756092, 10, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:363(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2020/05/27 16:56:18.756126, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.756140, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.756181, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.756221, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/tmp] >[2020/05/27 16:56:18.756256, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.756279, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.756299, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.756324, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:497(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2020/05/27 16:56:18.756345, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:69(set_conn_connectpath) > set_conn_connectpath: service dfs, connectpath = /mnt/dfs >[2020/05/27 16:56:18.756370, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/modules/vfs_default.c:175(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share dfs, directory /mnt/dfs >[2020/05/27 16:56:18.756384, 2, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:877(make_connection_snum) > serverw (ipv4:192.168.1.3:50254) connect to service dfs initially as user root (uid=0, gid=0) (pid 136421) >[2020/05/27 16:56:18.756405, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.756419, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.756434, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key E11CB12B >[2020/05/27 16:56:18.756449, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4787250 >[2020/05/27 16:56:18.756468, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/05/27 16:56:18.756478, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'E11CB12B' stored >[2020/05/27 16:56:18.756492, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xe11cb12b (3776753963) > tcon_wire_id : 0xe11cb12b (3776753963) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:19 2020 CEST > share_name : 'dfs' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/05/27 16:56:18.756623, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key E11CB12B >[2020/05/27 16:56:18.756637, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.756651, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:876(smbXsrv_tcon_update) >[2020/05/27 16:56:18.756660, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:882(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0xe11cb12b) stored >[2020/05/27 16:56:18.756673, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xe11cb12b (3776753963) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xe11cb12b (3776753963) > tcon_wire_id : 0xe11cb12b (3776753963) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:19 2020 CEST > share_name : 'dfs' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : * >[2020/05/27 16:56:18.756831, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [24] idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:177 >[2020/05/27 16:56:18.756848, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/25/33 >[2020/05/27 16:56:18.757896, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.757951, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 25 (position 25) from bitmap >[2020/05/27 16:56:18.757989, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 25 >[2020/05/27 16:56:18.758021, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.758041, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.758098, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.758141, 4, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:887(vfs_ChDir) > vfs_ChDir to /mnt/dfs >[2020/05/27 16:56:18.758176, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:949(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /mnt/dfs >[2020/05/27 16:56:18.758201, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.758223, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.758237, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.758252, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key E11CB12B >[2020/05/27 16:56:18.758268, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4787250 >[2020/05/27 16:56:18.758288, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:710(smbXsrv_tcon_global_store) >[2020/05/27 16:56:18.758298, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'E11CB12B' stored >[2020/05/27 16:56:18.758312, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xe11cb12b (3776753963) > tcon_wire_id : 0xe11cb12b (3776753963) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:19 2020 CEST > share_name : 'dfs' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2020/05/27 16:56:18.758458, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key E11CB12B >[2020/05/27 16:56:18.758473, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2020/05/27 16:56:18.758486, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:876(smbXsrv_tcon_update) >[2020/05/27 16:56:18.758495, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:882(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0xe11cb12b) stored >[2020/05/27 16:56:18.758508, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xe11cb12b (3776753963) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xe11cb12b (3776753963) > tcon_wire_id : 0xe11cb12b (3776753963) > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > creation_time : Mi Mai 27 16:56:19 2020 CEST > share_name : 'dfs' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x44d99daa (1155112362) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : * >[2020/05/27 16:56:18.758673, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [server\dfs] >[2020/05/27 16:56:18.758689, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:811(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/05/27 16:56:18.758703, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:131(parse_dfs_path) > parse_dfs_path: temp = |server\dfs| after trimming \'s >[2020/05/27 16:56:18.758717, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:157(parse_dfs_path) > parse_dfs_path: hostname: server >[2020/05/27 16:56:18.758737, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:199(parse_dfs_path) > parse_dfs_path: servicename: dfs >[2020/05/27 16:56:18.758750, 5, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:853(dfs_redirect) > dfs_redirect: self-referral. >[2020/05/27 16:56:18.758764, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "" >[2020/05/27 16:56:18.758778, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:514(unix_convert) > conversion finished "" -> . >[2020/05/27 16:56:18.758792, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.758808, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.758822, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.758836, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5910(create_file_default) > create_file_default: create_file: access_mask = 0x100080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = . >[2020/05/27 16:56:18.758853, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5359(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x100080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2020/05/27 16:56:18.758883, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.758908, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.758932, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key EF4A3534 >[2020/05/27 16:56:18.758957, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb476fc30 >[2020/05/27 16:56:18.758977, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.759001, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'EF4A3534' stored >[2020/05/27 16:56:18.759016, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xef4a3534 (4014617908) > open_persistent_id : 0x00000000ef4a3534 (4014617908) > open_volatile_id : 0x0000000019e91b21 (434707233) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.759149, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key EF4A3534 >[2020/05/27 16:56:18.759162, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.759176, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xef4a3534) stored >[2020/05/27 16:56:18.759189, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x19e91b21 (434707233) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xef4a3534 (4014617908) > open_persistent_id : 0x00000000ef4a3534 (4014617908) > open_volatile_id : 0x0000000019e91b21 (434707233) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.759398, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 434707233 (1 used) >[2020/05/27 16:56:18.759413, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/. hash 0xfd9ce696 >[2020/05/27 16:56:18.759429, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(.) returning 0644 >[2020/05/27 16:56:18.759443, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3358(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x100080 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0644 oplock_request=0 private_flags = 0x0 >[2020/05/27 16:56:18.759465, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.759488, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3544(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x100080 >[2020/05/27 16:56:18.759502, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3644(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0644, access_mask = 0x100080, open_access_mask = 0x100080 >[2020/05/27 16:56:18.759517, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:119(smbd_check_access_rights) > smbd_check_access_rights: root override on .. Granting 0x100080 >[2020/05/27 16:56:18.759531, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.759544, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.759559, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key EF4A3534 >[2020/05/27 16:56:18.759572, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.759593, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key EF4A3534 >[2020/05/27 16:56:18.759606, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.759621, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 434707233 (0 used) >[2020/05/27 16:56:18.759635, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:4246(open_directory) > open_directory: opening directory ., access_mask = 0x100080, share_access = 0x7 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x10 >[2020/05/27 16:56:18.759649, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:119(smbd_check_access_rights) > smbd_check_access_rights: root override on .. Granting 0x100080 >[2020/05/27 16:56:18.759664, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.759678, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.759692, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 10032926 >[2020/05/27 16:56:18.759711, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb478b930 >[2020/05/27 16:56:18.759725, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.759745, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '10032926' stored >[2020/05/27 16:56:18.759760, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0x10032926 (268642598) > open_persistent_id : 0x0000000010032926 (268642598) > open_volatile_id : 0x00000000c5a9c009 (3316236297) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.759898, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 10032926 >[2020/05/27 16:56:18.759924, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.759947, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x10032926) stored >[2020/05/27 16:56:18.759971, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xc5a9c009 (3316236297) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0x10032926 (268642598) > open_persistent_id : 0x0000000010032926 (268642598) > open_volatile_id : 0x00000000c5a9c009 (3316236297) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.760219, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 3316236297 (1 used) >[2020/05/27 16:56:18.760235, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/. hash 0xfd9ce696 >[2020/05/27 16:56:18.760255, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.760273, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.760286, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.760306, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 14. >[2020/05/27 16:56:18.760322, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.760336, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.760352, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 0308000000000000F10F >[2020/05/27 16:56:18.760389, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4787360 >[2020/05/27 16:56:18.760415, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xfd9ce696 >[2020/05/27 16:56:18.760455, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.760469, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:/var/cache/samba/share_entries.tdb 4:<none> >[2020/05/27 16:56:18.760504, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1426(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/05/27 16:56:18.760518, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > op_mid : 0x0000000000000019 (25) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Mi Mai 27 16:56:18 2020 CEST.759663 > share_file_id : 0x0000000000000005 (5) > uid : 0x00000000 (0) > flags : 0x0000 (0) > name_hash : 0xfd9ce696 (4254918294) > stale : 0x00 (0) >[2020/05/27 16:56:18.760631, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1554(set_share_mode_fn) > set_share_mode_fn: num_share_modes=0 >[2020/05/27 16:56:18.760645, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1569(set_share_mode_fn) > set_share_mode_fn: idx=0, found=0 >[2020/05/27 16:56:18.760658, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1595(set_share_mode_fn) > set_share_mode_fn: dbufs[0]=(0x7ffc6578ed20, 132) >[2020/05/27 16:56:18.760766, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.760787, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/05/27 16:56:18.760801, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0xe664363a57d31ecd (-1845290323105603891) > flags : 0x01c0 (448) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 0: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/mnt/dfs' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x01 (1) > modified : 0x01 (1) > have_share_modes : 0x01 (1) > id: struct file_id > devid : 0x0000000000000803 (2051) > inode : 0x00000000000e0ff1 (921585) > extid : 0x0000000000000000 (0) >[2020/05/27 16:56:18.760976, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.761068, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.761088, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 0308000000000000F10F >[2020/05/27 16:56:18.761101, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:182(share_mode_memcache_store) > share_mode_memcache_store: stored entry for file . seq e664363a57d31ece key 2051:921585:0 >[2020/05/27 16:56:18.761118, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5732(create_file_unixpath) > create_file_unixpath: info=1 >[2020/05/27 16:56:18.761131, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:6022(create_file_default) > create_file: info=1 >[2020/05/27 16:56:18.761144, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1319(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2020/05/27 16:56:18.761157, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/05/27 16:56:18.761175, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.761191, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.761209, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3316236297 >[2020/05/27 16:56:18.761227, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [25] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.761244, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8160/8192, total granted/max/low/range 33/8192/26/33 >[2020/05/27 16:56:18.762135, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.762170, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 26 (position 26) from bitmap >[2020/05/27 16:56:18.762186, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 26 >[2020/05/27 16:56:18.762208, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.762222, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.762264, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.762325, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.762346, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: . - fnum 3316236297 >[2020/05/27 16:56:18.762363, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.762377, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.762393, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 0308000000000000F10F >[2020/05/27 16:56:18.762410, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb478bbc0 >[2020/05/27 16:56:18.762427, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:359(share_mode_memcache_fetch) > share_mode_memcache_fetch: fetched entry for file . seq e664363a57d31ece key 2051:921585:0 >[2020/05/27 16:56:18.762451, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xfd9ce696 >[2020/05/27 16:56:18.762477, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.762500, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:/var/cache/samba/share_entries.tdb 4:<none> >[2020/05/27 16:56:18.762520, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1939(share_mode_entry_do_fn) > share_mode_entry_do_fn: state->num_share_modes=1 >[2020/05/27 16:56:18.762533, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1482(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0 >[2020/05/27 16:56:18.762546, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1492(share_mode_entry_find) > share_mode_entry_find: blob.data=0x55ddb4781ab0, blob.length=132 >[2020/05/27 16:56:18.762565, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.762579, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/05/27 16:56:18.762592, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0xe664363a57d31ece (-1845290323105603890) > flags : 0x01c0 (448) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 0: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/mnt/dfs' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x01 (1) > have_share_modes : 0x00 (0) > id: struct file_id > devid : 0x0000000000000803 (2051) > inode : 0x00000000000e0ff1 (921585) > extid : 0x0000000000000000 (0) >[2020/05/27 16:56:18.762717, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.762737, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.762752, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 0308000000000000F10F >[2020/05/27 16:56:18.762772, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.762785, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.762799, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 10032926 >[2020/05/27 16:56:18.762813, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.762832, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 10032926 >[2020/05/27 16:56:18.762850, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.762871, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 3316236297 (0 used) >[2020/05/27 16:56:18.762897, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/05/27 16:56:18.762941, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.762970, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.762990, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [26] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/05/27 16:56:18.763014, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 13, charge 1, granted 13, current possible/max 8160/8192, total granted/max/low/range 45/8192/27/45 >[2020/05/27 16:56:18.764162, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.764231, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 27 (position 27) from bitmap >[2020/05/27 16:56:18.764281, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 27 >[2020/05/27 16:56:18.764322, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.764352, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.764444, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.764507, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=vfs] ../../source3/smbd/vfs.c:887(vfs_ChDir) > vfs_ChDir to /tmp >[2020/05/27 16:56:18.764558, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=vfs] ../../source3/smbd/vfs.c:949(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /tmp >[2020/05/27 16:56:18.764593, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.764632, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [srvsvc] >[2020/05/27 16:56:18.764707, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.764756, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.764801, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 64BC9A81 >[2020/05/27 16:56:18.764834, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb47506b0 >[2020/05/27 16:56:18.764882, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.764948, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '64BC9A81' stored >[2020/05/27 16:56:18.765005, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0x64bc9a81 (1690081921) > open_persistent_id : 0x0000000064bc9a81 (1690081921) > open_volatile_id : 0x00000000064f7801 (105871361) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.765324, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 64BC9A81 >[2020/05/27 16:56:18.765352, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.765377, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x64bc9a81) stored >[2020/05/27 16:56:18.765402, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x064f7801 (105871361) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0x64bc9a81 (1690081921) > open_persistent_id : 0x0000000064bc9a81 (1690081921) > open_volatile_id : 0x00000000064f7801 (105871361) > open_owner : S-1-5-21-2719442082-4279343518-2111927761-501 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.765764, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 105871361 (1 used) >[2020/05/27 16:56:18.765800, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /tmp/srvsvc hash 0x8e98a76a >[2020/05/27 16:56:18.765855, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_ncacn_np.c:115(make_internal_rpc_pipe_socketpair) > Create of internal pipe srvsvc requested >[2020/05/27 16:56:18.766003, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: srvsvc - fnum 105871361 >[2020/05/27 16:56:18.766031, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [27] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:0] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.766051, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 11, charge 1, granted 11, current possible/max 8148/8192, total granted/max/low/range 55/8192/28/55 >[2020/05/27 16:56:18.766633, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.766667, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 28 (position 28) from bitmap >[2020/05/27 16:56:18.766684, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 28 >[2020/05/27 16:56:18.766702, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.766728, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.766748, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 28, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.766764, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: srvsvc - fnum 105871361 >[2020/05/27 16:56:18.766780, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 160 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 160 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.766909, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [28] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.766957, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 10, charge 1, granted 10, current possible/max 8138/8192, total granted/max/low/range 64/8192/29/64 >[2020/05/27 16:56:18.767033, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.767053, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND (11) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x00a0 (160) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 11) > bind: struct dcerpc_bind > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x00000000 (0) > num_contexts : 0x03 (3) > ctx_list: ARRAY(3) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0000 (0) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0001 (1) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 71710533-beba-4937-8319-b5dbef9ccc36 > if_version : 0x00000001 (1) > ctx_list: struct dcerpc_ctx_list > context_id : 0x0002 (2) > num_transfer_syntaxes : 0x01 (1) > abstract_syntax: struct ndr_syntax_id > uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188 > if_version : 0x00000003 (3) > transfer_syntaxes: ARRAY(1) > transfer_syntaxes: struct ndr_syntax_id > uuid : 6cb71c2c-9812-4540-0300-000000000000 > if_version : 0x00000001 (1) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.767391, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 11 >[2020/05/27 16:56:18.767418, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:748(api_pipe_bind_req) > api_pipe_bind_req: srvsvc -> srvsvc rpc service >[2020/05/27 16:56:18.767433, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:783(api_pipe_bind_req) > api_pipe_bind_req: make response. 783 >[2020/05/27 16:56:18.767447, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:353(check_bind_req) > check_bind_req for srvsvc context_id=0 >[2020/05/27 16:56:18.767462, 3, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:397(check_bind_req) > check_bind_req: srvsvc -> srvsvc rpc service >[2020/05/27 16:56:18.767477, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:220(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe srvsvc >[2020/05/27 16:56:18.767492, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:238(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe srvsvc >[2020/05/27 16:56:18.767512, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.767531, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:565(push_conn_ctx) > push_conn_ctx(1155112362) : conn_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.767545, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.767560, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:52(security_token_debug) > Security token: (NULL) >[2020/05/27 16:56:18.767574, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2020/05/27 16:56:18.767607, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:549(make_auth3_context_for_ntlm) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2020/05/27 16:56:18.767627, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2020/05/27 16:56:18.767643, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2020/05/27 16:56:18.767657, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:424(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2020/05/27 16:56:18.767671, 5, pid=136421, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:449(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2020/05/27 16:56:18.767691, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.767734, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=auth_audit] ../../auth/auth_log.c:740(log_successful_authz_event_human_readable) > Successful AuthZ: [srvsvc,ncacn_np] user [SERVER]\[nobody] [S-1-5-21-2719442082-4279343518-2111927761-501] at [Mi, 27 Mai 2020 16:56:18.767724 CEST] Remote host [ipv4:192.168.1.3:50254] local host [ipv4:192.168.1.2:445] > {"timestamp": "2020-05-27T16:56:18.767767+0200", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:192.168.1.2:445", "remoteAddress": "ipv4:192.168.1.3:50254", "serviceDescription": "srvsvc", "authType": "ncacn_np", "domain": "SERVER", "account": "nobody", "sid": "S-1-5-21-2719442082-4279343518-2111927761-501", "sessionId": "c9cb1273-72cf-4a89-9111-c4f4c7f24ec4", "logonServer": null, "transportProtection": "SMB", "accountFlags": "0x00000000"}} >[2020/05/27 16:56:18.767818, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_BIND_ACK (12) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0044 (68) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 12) > bind_ack: struct dcerpc_bind_ack > max_xmit_frag : 0x10b8 (4280) > max_recv_frag : 0x10b8 (4280) > assoc_group_id : 0x000053f0 (21488) > secondary_address_size : 0x000d (13) > secondary_address : '\PIPE\srvsvc' > _pad1 : DATA_BLOB length=0 > num_results : 0x01 (1) > ctx_list: ARRAY(1) > ctx_list: struct dcerpc_ack_ctx > result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0) > reason : union dcerpc_bind_ack_reason(case 0) > value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0) > syntax: struct ndr_syntax_id > uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860 > if_version : 0x00000002 (2) > auth_info : DATA_BLOB length=0 >[2020/05/27 16:56:18.768044, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:992(dcerpc_ncacn_packet_process) > Current_pdu_len = 68, current_pdu_sent = 0 Returning 68 bytes >[2020/05/27 16:56:18.768061, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 0 bytes >[2020/05/27 16:56:18.768076, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 68 >[2020/05/27 16:56:18.768120, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.768137, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 29 (position 29) from bitmap >[2020/05/27 16:56:18.768156, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 29 >[2020/05/27 16:56:18.768191, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.768219, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.768239, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 29, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.768254, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: srvsvc - fnum 105871361 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.768340, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 68 bytes. There is no more data outstanding >[2020/05/27 16:56:18.768359, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [29] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:68] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.768391, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 9, charge 1, granted 9, current possible/max 8129/8192, total granted/max/low/range 72/8192/30/72 >[2020/05/27 16:56:18.769163, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.769221, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 30 (position 30) from bitmap >[2020/05/27 16:56:18.769257, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_WRITE] mid = 30 >[2020/05/27 16:56:18.769285, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.769319, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.769348, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 30, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.769374, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_write.c:293(smbd_smb2_write_send) > smbd_smb2_write: srvsvc - fnum 105871361 >[2020/05/27 16:56:18.769398, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:173(np_write_send) > np_write_send: len: 80 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 80 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.769520, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [30] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:0] at ../../source3/smbd/smb2_write.c:167 >[2020/05/27 16:56:18.769548, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 8, charge 1, granted 8, current possible/max 8121/8192, total granted/max/low/range 79/8192/31/79 >[2020/05/27 16:56:18.769634, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:973(dcerpc_ncacn_packet_process) > PDU is in Little Endian format! >[2020/05/27 16:56:18.769662, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > pkt: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_REQUEST (0) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0050 (80) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 0) > request: struct dcerpc_request > alloc_hint : 0x00000038 (56) > context_id : 0x0000 (0) > opnum : 0x0010 (16) > object : union dcerpc_object(case 0) > empty: struct dcerpc_empty > stub_and_verifier : DATA_BLOB length=56 > [0000] 00 00 02 00 07 00 00 00 00 00 00 00 07 00 00 00 ........ ........ > [0010] 73 00 65 00 72 00 76 00 65 00 72 00 00 00 00 00 s.e.r.v. e.r..... > [0020] 04 00 00 00 00 00 00 00 04 00 00 00 64 00 66 00 ........ ....d.f. > [0030] 73 00 00 00 01 00 00 00 s....... >[2020/05/27 16:56:18.769958, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1784(process_complete_pdu) > Processing packet type 0 >[2020/05/27 16:56:18.769985, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1653(dcesrv_auth_request) > Checking request auth. >[2020/05/27 16:56:18.770024, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:215(push_sec_ctx) > push_sec_ctx(65534, 65534) : sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.770053, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (65534, 65534) - sec_ctx_stack_ndx = 1 >[2020/05/27 16:56:18.770076, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (7): > SID[ 0]: S-1-5-21-2719442082-4279343518-2111927761-501 > SID[ 1]: S-1-5-21-2719442082-4279343518-2111927761-514 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > SID[ 6]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.770167, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65534 and contains 1 supplementary groups > Group[ 0]: 65534 >[2020/05/27 16:56:18.770220, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:521(smbd_become_authenticated_pipe_user) > Impersonated user: uid=(65534,65534), gid=(0,65534) >[2020/05/27 16:56:18.770248, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1495(api_pipe_request) > Requested srvsvc rpc service >[2020/05/27 16:56:18.770271, 4, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1526(api_rpcTNP) > api_rpcTNP: srvsvc op 0x10 - api_rpcTNP: rpc command: SRVSVC_NETSHAREGETINFO >[2020/05/27 16:56:18.770300, 6, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1567(api_rpcTNP) > api_rpc_cmds[16].fn == 0x7f2f664af760 >[2020/05/27 16:56:18.770330, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > srvsvc_NetShareGetInfo: struct srvsvc_NetShareGetInfo > in: struct srvsvc_NetShareGetInfo > server_unc : * > server_unc : 'server' > share_name : 'dfs' > level : 0x00000001 (1) >[2020/05/27 16:56:18.770372, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:1656(_srvsvc_NetShareGetInfo) > _srvsvc_NetShareGetInfo: 1656 >[2020/05/27 16:56:18.770398, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srvsvc/srv_srvsvc_nt.c:1728(_srvsvc_NetShareGetInfo) > _srvsvc_NetShareGetInfo: 1728 >[2020/05/27 16:56:18.770412, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:482(ndr_print_function_debug) > srvsvc_NetShareGetInfo: struct srvsvc_NetShareGetInfo > out: struct srvsvc_NetShareGetInfo > info : * > info : union srvsvc_NetShareInfo(case 1) > info1 : * > info1: struct srvsvc_NetShareInfo1 > name : * > name : 'dfs' > type : STYPE_DISKTREE (0x0) > comment : * > comment : '' > result : WERR_OK >[2020/05/27 16:56:18.770525, 5, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe.c:1594(api_rpcTNP) > api_rpcTNP: called srvsvc successfully >[2020/05/27 16:56:18.770557, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:437(pop_sec_ctx) > pop_sec_ctx (65534, 65534) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.770580, 1, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &r: struct ncacn_packet > rpc_vers : 0x05 (5) > rpc_vers_minor : 0x00 (0) > ptype : DCERPC_PKT_RESPONSE (2) > pfc_flags : 0x03 (3) > 1: DCERPC_PFC_FLAG_FIRST > 1: DCERPC_PFC_FLAG_LAST > 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING > 0: DCERPC_PFC_FLAG_CONC_MPX > 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE > 0: DCERPC_PFC_FLAG_MAYBE > 0: DCERPC_PFC_FLAG_OBJECT_UUID > drep: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > frag_length : 0x0054 (84) > auth_length : 0x0000 (0) > call_id : 0x00000002 (2) > u : union dcerpc_payload(case 2) > response: struct dcerpc_response > alloc_hint : 0x0000003c (60) > context_id : 0x0000 (0) > cancel_count : 0x00 (0) > reserved : 0x00 (0) > stub_and_verifier : DATA_BLOB length=60 > [0000] 01 00 00 00 04 00 02 00 08 00 02 00 00 00 00 00 ........ ........ > [0010] 0C 00 02 00 04 00 00 00 00 00 00 00 04 00 00 00 ........ ........ > [0020] 64 00 66 00 73 00 00 00 01 00 00 00 00 00 00 00 d.f.s... ........ > [0030] 01 00 00 00 00 00 00 00 00 00 00 00 ........ .... >[2020/05/27 16:56:18.770772, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1039(dcerpc_ncacn_packet_process) > PDU number: 0, PDU Length: 84 >[2020/05/27 16:56:18.770787, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1070(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending 1 fragments in a total of 60 bytes >[2020/05/27 16:56:18.770818, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_server.c:1074(dcerpc_ncacn_packet_process) > dcerpc_ncacn_packet_process: Sending PDU number: 0, PDU Length: 84 >[2020/05/27 16:56:18.771757, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.771820, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 31 (position 31) from bitmap >[2020/05/27 16:56:18.771845, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_READ] mid = 31 >[2020/05/27 16:56:18.771869, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.771949, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.771986, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 31, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.772102, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_read.c:469(smbd_smb2_read_send) > smbd_smb2_read: srvsvc - fnum 105871361 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 48 > req->in.vector[4].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2020/05/27 16:56:18.772248, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/srv_pipe_hnd.c:417(np_read_recv) > Received 84 bytes. There is no more data outstanding >[2020/05/27 16:56:18.772280, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [31] idx[1] status[NT_STATUS_OK] body[16] dyn[yes:84] at ../../source3/smbd/smb2_read.c:167 >[2020/05/27 16:56:18.772322, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 7, charge 1, granted 7, current possible/max 8114/8192, total granted/max/low/range 85/8192/32/85 >[2020/05/27 16:56:18.773323, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.773396, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 32 (position 32) from bitmap >[2020/05/27 16:56:18.773425, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 32 >[2020/05/27 16:56:18.773455, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:326(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2020/05/27 16:56:18.773520, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(65534,65534), gid=(0,65534), cwd=[/tmp] >[2020/05/27 16:56:18.773576, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: srvsvc - fnum 105871361 >[2020/05/27 16:56:18.773616, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.773652, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.773680, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 64BC9A81 >[2020/05/27 16:56:18.773710, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4770fd0 >[2020/05/27 16:56:18.773749, 10, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 64BC9A81 >[2020/05/27 16:56:18.773805, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.773884, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=rpc_srv] ../../source3/rpc_server/rpc_handles.c:420(close_policy_by_pipe) > close_policy_by_pipe: Deleted handle list for RPC connection srvsvc >[2020/05/27 16:56:18.773957, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 105871361 (0 used) >[2020/05/27 16:56:18.774008, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [32] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/05/27 16:56:18.774054, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 6, charge 1, granted 6, current possible/max 8108/8192, total granted/max/low/range 90/8192/33/90 >[2020/05/27 16:56:18.822154, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.822232, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 33 (position 33) from bitmap >[2020/05/27 16:56:18.822256, 10, pid=136421, effective(65534, 65534), real(65534, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 33 >[2020/05/27 16:56:18.822295, 4, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.822319, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.822377, 5, pid=136421, effective(65534, 65534), real(65534, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.822429, 4, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:887(vfs_ChDir) > vfs_ChDir to /mnt/dfs >[2020/05/27 16:56:18.822472, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:949(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /mnt/dfs >[2020/05/27 16:56:18.822497, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.822526, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [server\dfs] >[2020/05/27 16:56:18.822553, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1263(smbd_smb2_create_before_exec) > Got lease request size 52 >[2020/05/27 16:56:18.822571, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > state->lease_ptr: struct smb2_lease > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffd50b0565caa0 (-47231664797024) > data : 0x000000000009435a (607066) > lease_state : 0x00000007 (7) > 1: SMB2_LEASE_READ > 1: SMB2_LEASE_HANDLE > 1: SMB2_LEASE_WRITE > lease_flags : 0x00000000 (0) > lease_duration : 0x0000000000000000 (0) > parent_lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > lease_version : 0x0002 (2) > lease_epoch : 0x0000 (0) >[2020/05/27 16:56:18.822681, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:811(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/05/27 16:56:18.822700, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:131(parse_dfs_path) > parse_dfs_path: temp = |server\dfs| after trimming \'s >[2020/05/27 16:56:18.822718, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:157(parse_dfs_path) > parse_dfs_path: hostname: server >[2020/05/27 16:56:18.822739, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:199(parse_dfs_path) > parse_dfs_path: servicename: dfs >[2020/05/27 16:56:18.822766, 5, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:853(dfs_redirect) > dfs_redirect: self-referral. >[2020/05/27 16:56:18.822785, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "" >[2020/05/27 16:56:18.822805, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:514(unix_convert) > conversion finished "" -> . >[2020/05/27 16:56:18.822824, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.822850, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.822868, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.822891, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5910(create_file_default) > create_file_default: create_file: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = . >[2020/05/27 16:56:18.822914, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5359(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2020/05/27 16:56:18.822936, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/05/27 16:56:18.822955, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffd50b0565caa0 (-47231664797024) > data : 0x000000000009435a (607066) >[2020/05/27 16:56:18.823945, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.823997, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.824023, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key DD7361EE >[2020/05/27 16:56:18.824039, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb478b930 >[2020/05/27 16:56:18.824055, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.824106, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'DD7361EE' stored >[2020/05/27 16:56:18.824133, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xdd7361ee (3715326446) > open_persistent_id : 0x00000000dd7361ee (3715326446) > open_volatile_id : 0x000000006725423e (1730495038) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.824298, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key DD7361EE >[2020/05/27 16:56:18.824322, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.824345, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xdd7361ee) stored >[2020/05/27 16:56:18.824359, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x6725423e (1730495038) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xdd7361ee (3715326446) > open_persistent_id : 0x00000000dd7361ee (3715326446) > open_volatile_id : 0x000000006725423e (1730495038) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.824553, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 1730495038 (1 used) >[2020/05/27 16:56:18.824570, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/. hash 0xfd9ce696 >[2020/05/27 16:56:18.824587, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(.) returning 0644 >[2020/05/27 16:56:18.824601, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3358(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x100081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0644 oplock_request=256 private_flags = 0x0 >[2020/05/27 16:56:18.824624, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.824643, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3544(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x100081 >[2020/05/27 16:56:18.824657, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3644(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0644, access_mask = 0x100081, open_access_mask = 0x100081 >[2020/05/27 16:56:18.824672, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:119(smbd_check_access_rights) > smbd_check_access_rights: root override on .. Granting 0x100081 >[2020/05/27 16:56:18.824696, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.824717, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.824731, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.824752, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 04000 mode = 0644, fd = 14. >[2020/05/27 16:56:18.824778, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.824792, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.824807, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key DD7361EE >[2020/05/27 16:56:18.824822, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.824844, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key DD7361EE >[2020/05/27 16:56:18.824857, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.824881, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 1730495038 (0 used) >[2020/05/27 16:56:18.824904, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:4246(open_directory) > open_directory: opening directory ., access_mask = 0x100081, share_access = 0x7 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x10 >[2020/05/27 16:56:18.824928, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:119(smbd_check_access_rights) > smbd_check_access_rights: root override on .. Granting 0x100081 >[2020/05/27 16:56:18.824951, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.824965, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.824980, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key ACC17334 >[2020/05/27 16:56:18.824994, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb47506b0 >[2020/05/27 16:56:18.825008, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.825029, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'ACC17334' stored >[2020/05/27 16:56:18.825061, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xacc17334 (2898359092) > open_persistent_id : 0x00000000acc17334 (2898359092) > open_volatile_id : 0x00000000bf27e5cc (3207062988) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.825210, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key ACC17334 >[2020/05/27 16:56:18.825233, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.825255, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xacc17334) stored >[2020/05/27 16:56:18.825283, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xbf27e5cc (3207062988) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xacc17334 (2898359092) > open_persistent_id : 0x00000000acc17334 (2898359092) > open_volatile_id : 0x00000000bf27e5cc (3207062988) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.825492, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 3207062988 (1 used) >[2020/05/27 16:56:18.825508, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/. hash 0xfd9ce696 >[2020/05/27 16:56:18.825529, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.825548, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.825561, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.825579, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 14. >[2020/05/27 16:56:18.825595, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.825615, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.825631, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 0308000000000000F10F >[2020/05/27 16:56:18.825646, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4787360 >[2020/05/27 16:56:18.825662, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xfd9ce696 >[2020/05/27 16:56:18.825677, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.825690, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:/var/cache/samba/share_entries.tdb 4:<none> >[2020/05/27 16:56:18.825706, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1426(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/05/27 16:56:18.825719, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > op_mid : 0x0000000000000021 (33) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Mi Mai 27 16:56:18 2020 CEST.824948 > share_file_id : 0x0000000000000008 (8) > uid : 0x00000000 (0) > flags : 0x0000 (0) > name_hash : 0xfd9ce696 (4254918294) > stale : 0x00 (0) >[2020/05/27 16:56:18.825822, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1554(set_share_mode_fn) > set_share_mode_fn: num_share_modes=0 >[2020/05/27 16:56:18.825836, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1569(set_share_mode_fn) > set_share_mode_fn: idx=0, found=0 >[2020/05/27 16:56:18.825849, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1595(set_share_mode_fn) > set_share_mode_fn: dbufs[0]=(0x7ffc6578ed20, 132) >[2020/05/27 16:56:18.825863, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.825880, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/05/27 16:56:18.825903, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0x74db39d5cade4112 (8420387518693654802) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/mnt/dfs' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x01 (1) > modified : 0x01 (1) > have_share_modes : 0x01 (1) > id: struct file_id > devid : 0x0000000000000803 (2051) > inode : 0x00000000000e0ff1 (921585) > extid : 0x0000000000000000 (0) >[2020/05/27 16:56:18.826070, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.826092, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.826108, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 0308000000000000F10F >[2020/05/27 16:56:18.826121, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:182(share_mode_memcache_store) > share_mode_memcache_store: stored entry for file . seq 74db39d5cade4113 key 2051:921585:0 >[2020/05/27 16:56:18.826138, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5732(create_file_unixpath) > create_file_unixpath: info=1 >[2020/05/27 16:56:18.826151, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:6022(create_file_default) > create_file: info=1 >[2020/05/27 16:56:18.826164, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1319(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2020/05/27 16:56:18.826177, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/05/27 16:56:18.826195, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.826212, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.826228, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.826241, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.826255, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key ACC17334 >[2020/05/27 16:56:18.826273, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.826302, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'ACC17334' stored >[2020/05/27 16:56:18.826325, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xacc17334 (2898359092) > open_persistent_id : 0x00000000acc17334 (2898359092) > open_volatile_id : 0x00000000bf27e5cc (3207062988) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 23052d05-a01c-11ea-8a78-fc577fd17813 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.826476, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key ACC17334 >[2020/05/27 16:56:18.826492, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.826508, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:1033(smbXsrv_open_update) > smbXsrv_open_update: global_id (0xacc17334) stored >[2020/05/27 16:56:18.826521, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xbf27e5cc (3207062988) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xacc17334 (2898359092) > open_persistent_id : 0x00000000acc17334 (2898359092) > open_volatile_id : 0x00000000bf27e5cc (3207062988) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 23052d05-a01c-11ea-8a78-fc577fd17813 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : * > flags : 0x02 (2) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 1: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.826727, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1383(smbd_smb2_create_after_exec) > smb2_create_send: smbXsrv_open_update returned NT_STATUS_OK >[2020/05/27 16:56:18.826744, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3207062988 >[2020/05/27 16:56:18.826766, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [33] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.826782, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 5, charge 1, granted 5, current possible/max 8103/8192, total granted/max/low/range 94/8192/34/94 >[2020/05/27 16:56:18.826870, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.826900, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 34 (position 34) from bitmap >[2020/05/27 16:56:18.826923, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 34 >[2020/05/27 16:56:18.826953, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.826976, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.827045, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.827143, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.827182, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [server\dfs\desktop.ini] >[2020/05/27 16:56:18.827205, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1263(smbd_smb2_create_before_exec) > Got lease request size 52 >[2020/05/27 16:56:18.827229, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > state->lease_ptr: struct smb2_lease > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffd50b0539daa0 (-47231667676512) > data : 0x000000000009435b (607067) > lease_state : 0x00000007 (7) > 1: SMB2_LEASE_READ > 1: SMB2_LEASE_HANDLE > 1: SMB2_LEASE_WRITE > lease_flags : 0x00000000 (0) > lease_duration : 0x0000000000000000 (0) > parent_lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > lease_version : 0x0002 (2) > lease_epoch : 0x0000 (0) >[2020/05/27 16:56:18.827306, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:811(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/05/27 16:56:18.827321, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:131(parse_dfs_path) > parse_dfs_path: temp = |server\dfs\desktop.ini| after trimming \'s >[2020/05/27 16:56:18.827335, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:157(parse_dfs_path) > parse_dfs_path: hostname: server >[2020/05/27 16:56:18.827350, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:199(parse_dfs_path) > parse_dfs_path: servicename: dfs >[2020/05/27 16:56:18.827365, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:233(parse_dfs_path) > parse_dfs_path: rest of the path: desktop.ini >[2020/05/27 16:56:18.827387, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:671(dfs_path_lookup) > dfs_path_lookup: Conn path = /mnt/dfs reqpath = desktop.ini >[2020/05/27 16:56:18.827410, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "desktop.ini" >[2020/05/27 16:56:18.827436, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [DESKTOP.INI] >[2020/05/27 16:56:18.827459, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:681(unix_convert) > unix_convert begin: name = desktop.ini, dirpath = ., start = desktop.ini >[2020/05/27 16:56:18.828161, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:413(is_mangled) > is_mangled desktop.ini ? >[2020/05/27 16:56:18.828212, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:352(is_mangled_component) > is_mangled_component desktop.ini (len 11) ? >[2020/05/27 16:56:18.828240, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:413(is_mangled) > is_mangled desktop.ini ? >[2020/05/27 16:56:18.828261, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:352(is_mangled_component) > is_mangled_component desktop.ini (len 11) ? >[2020/05/27 16:56:18.828305, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.828341, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.828366, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.828471, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:413(is_mangled) > is_mangled desktop.ini ? >[2020/05/27 16:56:18.828494, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:352(is_mangled_component) > is_mangled_component desktop.ini (len 11) ? >[2020/05/27 16:56:18.828532, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:1123(unix_convert) > New file desktop.ini >[2020/05/27 16:56:18.828560, 0, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/modules/vfs_default.c:466(vfswrap_read_dfs_pathat) > vfswrap_read_dfs_pathat: Error reading msdfs link desktop.ini: Datei oder Verzeichnis nicht gefunden >[2020/05/27 16:56:18.828665, 3, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:911(dfs_redirect) > dfs_redirect: Not redirecting server\dfs\desktop.ini. >[2020/05/27 16:56:18.828685, 3, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:920(dfs_redirect) > dfs_redirect: Path server\dfs\desktop.ini converted to non-dfs path desktop.ini >[2020/05/27 16:56:18.828703, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "desktop.ini" >[2020/05/27 16:56:18.828723, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [DESKTOP.INI] >[2020/05/27 16:56:18.828741, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:681(unix_convert) > unix_convert begin: name = desktop.ini, dirpath = ., start = desktop.ini >[2020/05/27 16:56:18.828761, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:413(is_mangled) > is_mangled desktop.ini ? >[2020/05/27 16:56:18.828777, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:352(is_mangled_component) > is_mangled_component desktop.ini (len 11) ? >[2020/05/27 16:56:18.828795, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:413(is_mangled) > is_mangled desktop.ini ? >[2020/05/27 16:56:18.828811, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:352(is_mangled_component) > is_mangled_component desktop.ini (len 11) ? >[2020/05/27 16:56:18.828835, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.828856, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.828873, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.828908, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:413(is_mangled) > is_mangled desktop.ini ? >[2020/05/27 16:56:18.828926, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/mangle_hash2.c:352(is_mangled_component) > is_mangled_component desktop.ini (len 11) ? >[2020/05/27 16:56:18.828942, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:1123(unix_convert) > New file desktop.ini >[2020/05/27 16:56:18.828958, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [desktop.ini] [/mnt/dfs] >[2020/05/27 16:56:18.828982, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [desktop.ini] -> [/mnt/dfs/desktop.ini] >[2020/05/27 16:56:18.828999, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: desktop.ini reduced to /mnt/dfs/desktop.ini >[2020/05/27 16:56:18.829018, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5910(create_file_default) > create_file_default: create_file: access_mask = 0x120089 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x44 oplock_request = 0x100 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = desktop.ini >[2020/05/27 16:56:18.829049, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5359(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x120089 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x44 oplock_request = 0x100 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = desktop.ini >[2020/05/27 16:56:18.829069, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/05/27 16:56:18.829087, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffd50b0539daa0 (-47231667676512) > data : 0x000000000009435b (607067) >[2020/05/27 16:56:18.829154, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.829173, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.829193, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key B594DDB0 >[2020/05/27 16:56:18.829211, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4781200 >[2020/05/27 16:56:18.829229, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.829259, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'B594DDB0' stored >[2020/05/27 16:56:18.829278, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xb594ddb0 (3046432176) > open_persistent_id : 0x00000000b594ddb0 (3046432176) > open_volatile_id : 0x000000006d1a70c3 (1830449347) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.829473, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key B594DDB0 >[2020/05/27 16:56:18.829500, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.829519, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xb594ddb0) stored >[2020/05/27 16:56:18.829538, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x6d1a70c3 (1830449347) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xb594ddb0 (3046432176) > open_persistent_id : 0x00000000b594ddb0 (3046432176) > open_volatile_id : 0x000000006d1a70c3 (1830449347) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.829824, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 1830449347 (2 used) >[2020/05/27 16:56:18.829846, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/desktop.ini hash 0x5df094cc >[2020/05/27 16:56:18.829868, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(desktop.ini) returning 0644 >[2020/05/27 16:56:18.829889, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3358(open_file_ntcreate) > open_file_ntcreate: fname=desktop.ini, dos_attrs=0x0 access_mask=0x120089 share_access=0x7 create_disposition = 0x1 create_options=0x44 unix mode=0644 oplock_request=256 private_flags = 0x0 >[2020/05/27 16:56:18.829932, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3440(open_file_ntcreate) > open_file_ntcreate: FILE_OPEN requested for file desktop.ini and file doesn't exist. >[2020/05/27 16:56:18.829953, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.829971, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.829993, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key B594DDB0 >[2020/05/27 16:56:18.830012, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.830042, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key B594DDB0 >[2020/05/27 16:56:18.830061, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.830082, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 1830449347 (1 used) >[2020/05/27 16:56:18.830101, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5744(create_file_unixpath) > create_file_unixpath: NT_STATUS_OBJECT_NAME_NOT_FOUND >[2020/05/27 16:56:18.830120, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:6031(create_file_default) > create_file: NT_STATUS_OBJECT_NAME_NOT_FOUND >[2020/05/27 16:56:18.830143, 3, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3264(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_OBJECT_NAME_NOT_FOUND] || at ../../source3/smbd/smb2_create.c:334 >[2020/05/27 16:56:18.830165, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [34] idx[1] status[NT_STATUS_OBJECT_NAME_NOT_FOUND] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:3314 >[2020/05/27 16:56:18.830187, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 5, charge 1, granted 5, current possible/max 8099/8192, total granted/max/low/range 98/8192/35/98 >[2020/05/27 16:56:18.830481, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.830522, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 35 (position 35) from bitmap >[2020/05/27 16:56:18.830543, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 35 >[2020/05/27 16:56:18.830570, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.830589, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.830656, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.830723, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.830757, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: . - fnum 3207062988 >[2020/05/27 16:56:18.830779, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.830798, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.830822, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 0308000000000000F10F >[2020/05/27 16:56:18.830843, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb478d160 >[2020/05/27 16:56:18.830865, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:359(share_mode_memcache_fetch) > share_mode_memcache_fetch: fetched entry for file . seq 74db39d5cade4113 key 2051:921585:0 >[2020/05/27 16:56:18.830890, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xfd9ce696 >[2020/05/27 16:56:18.830926, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.830944, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:/var/cache/samba/share_entries.tdb 4:<none> >[2020/05/27 16:56:18.830966, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1939(share_mode_entry_do_fn) > share_mode_entry_do_fn: state->num_share_modes=1 >[2020/05/27 16:56:18.830985, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1482(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0 >[2020/05/27 16:56:18.831003, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1492(share_mode_entry_find) > share_mode_entry_find: blob.data=0x55ddb478b470, blob.length=132 >[2020/05/27 16:56:18.831027, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.831047, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/05/27 16:56:18.831065, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0x74db39d5cade4113 (8420387518693654803) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/mnt/dfs' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x01 (1) > have_share_modes : 0x00 (0) > id: struct file_id > devid : 0x0000000000000803 (2051) > inode : 0x00000000000e0ff1 (921585) > extid : 0x0000000000000000 (0) >[2020/05/27 16:56:18.831244, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.831271, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.831293, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 0308000000000000F10F >[2020/05/27 16:56:18.831318, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.831337, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.831368, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key ACC17334 >[2020/05/27 16:56:18.831388, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.831413, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key ACC17334 >[2020/05/27 16:56:18.831433, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.831454, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 3207062988 (0 used) >[2020/05/27 16:56:18.831476, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/05/27 16:56:18.831502, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.831525, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.831548, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [35] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:147 >[2020/05/27 16:56:18.831569, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 4, charge 1, granted 4, current possible/max 8095/8192, total granted/max/low/range 101/8192/36/101 >[2020/05/27 16:56:18.833186, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2020/05/27 16:56:18.833250, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 36 (position 36) from bitmap >[2020/05/27 16:56:18.833288, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 36 >[2020/05/27 16:56:18.833314, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.833330, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.833372, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.833419, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.833442, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [server\dfs] >[2020/05/27 16:56:18.833463, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1263(smbd_smb2_create_before_exec) > Got lease request size 52 >[2020/05/27 16:56:18.833476, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > state->lease_ptr: struct smb2_lease > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffd50b056b8aa0 (-47231664420192) > data : 0x000000000009435c (607068) > lease_state : 0x00000007 (7) > 1: SMB2_LEASE_READ > 1: SMB2_LEASE_HANDLE > 1: SMB2_LEASE_WRITE > lease_flags : 0x00000000 (0) > lease_duration : 0x0000000000000000 (0) > parent_lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > lease_version : 0x0002 (2) > lease_epoch : 0x0000 (0) >[2020/05/27 16:56:18.833555, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:811(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/05/27 16:56:18.833570, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:131(parse_dfs_path) > parse_dfs_path: temp = |server\dfs| after trimming \'s >[2020/05/27 16:56:18.833583, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:157(parse_dfs_path) > parse_dfs_path: hostname: server >[2020/05/27 16:56:18.833598, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:199(parse_dfs_path) > parse_dfs_path: servicename: dfs >[2020/05/27 16:56:18.833612, 5, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:853(dfs_redirect) > dfs_redirect: self-referral. >[2020/05/27 16:56:18.833627, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "" >[2020/05/27 16:56:18.833642, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:514(unix_convert) > conversion finished "" -> . >[2020/05/27 16:56:18.833656, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.833686, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.833700, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.833714, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5910(create_file_default) > create_file_default: create_file: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = . >[2020/05/27 16:56:18.833732, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5359(create_file_unixpath) > create_file_unixpath: create_file_unixpath: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x100 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2020/05/27 16:56:18.833748, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/leases_db.c:81(leases_db_key) > leases_db_key: >[2020/05/27 16:56:18.833788, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &db_key: struct leases_db_key > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0xffffd50b056b8aa0 (-47231664420192) > data : 0x000000000009435c (607068) >[2020/05/27 16:56:18.833853, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.833868, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.833890, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key FE952666 >[2020/05/27 16:56:18.833910, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb478df00 >[2020/05/27 16:56:18.833925, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.833951, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'FE952666' stored >[2020/05/27 16:56:18.833966, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xfe952666 (4271187558) > open_persistent_id : 0x00000000fe952666 (4271187558) > open_volatile_id : 0x00000000490af6b8 (1225455288) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.834118, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key FE952666 >[2020/05/27 16:56:18.834142, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.834162, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xfe952666) stored >[2020/05/27 16:56:18.834176, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x490af6b8 (1225455288) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xfe952666 (4271187558) > open_persistent_id : 0x00000000fe952666 (4271187558) > open_volatile_id : 0x00000000490af6b8 (1225455288) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.834364, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 1225455288 (1 used) >[2020/05/27 16:56:18.834386, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/. hash 0xfd9ce696 >[2020/05/27 16:56:18.834403, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:207(unix_mode) > unix_mode: unix_mode(.) returning 0644 >[2020/05/27 16:56:18.834417, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3358(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x100081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0644 oplock_request=256 private_flags = 0x0 >[2020/05/27 16:56:18.834439, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.834456, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3544(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x100081 >[2020/05/27 16:56:18.834470, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:3644(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0644, access_mask = 0x100081, open_access_mask = 0x100081 >[2020/05/27 16:56:18.834485, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:119(smbd_check_access_rights) > smbd_check_access_rights: root override on .. Granting 0x100081 >[2020/05/27 16:56:18.834504, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.834523, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.834536, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.834556, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 04000 mode = 0644, fd = 14. >[2020/05/27 16:56:18.834581, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.834595, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.834609, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key FE952666 >[2020/05/27 16:56:18.834623, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.834644, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key FE952666 >[2020/05/27 16:56:18.834657, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.834673, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:552(file_free) > freed files structure 1225455288 (0 used) >[2020/05/27 16:56:18.834686, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:4246(open_directory) > open_directory: opening directory ., access_mask = 0x100081, share_access = 0x7 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x10 >[2020/05/27 16:56:18.834700, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:119(smbd_check_access_rights) > smbd_check_access_rights: root override on .. Granting 0x100081 >[2020/05/27 16:56:18.834721, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.834735, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.834749, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F715FFA2 >[2020/05/27 16:56:18.834762, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb4781200 >[2020/05/27 16:56:18.834776, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:625(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2020/05/27 16:56:18.834795, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'F715FFA2' stored >[2020/05/27 16:56:18.834809, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf715ffa2 (4145414050) > open_persistent_id : 0x00000000f715ffa2 (4145414050) > open_volatile_id : 0x00000000e4d748d0 (3839314128) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.834945, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F715FFA2 >[2020/05/27 16:56:18.834959, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.834973, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:909(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xf715ffa2) stored >[2020/05/27 16:56:18.834985, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xe4d748d0 (3839314128) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf715ffa2 (4145414050) > open_persistent_id : 0x00000000f715ffa2 (4145414050) > open_volatile_id : 0x00000000e4d748d0 (3839314128) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.835277, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:149(file_new) > allocated file structure fnum 3839314128 (1 used) >[2020/05/27 16:56:18.835298, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:754(file_name_hash) > file_name_hash: /mnt/dfs/. hash 0xfd9ce696 >[2020/05/27 16:56:18.835331, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.835363, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.835386, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.835416, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:827(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 14. >[2020/05/27 16:56:18.835442, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.835465, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.835493, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 0308000000000000F10F >[2020/05/27 16:56:18.835519, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb478ce40 >[2020/05/27 16:56:18.835553, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:950(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xfd9ce696 >[2020/05/27 16:56:18.835577, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.835600, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:/var/cache/samba/share_entries.tdb 4:<none> >[2020/05/27 16:56:18.835624, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1426(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2020/05/27 16:56:18.835648, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > op_mid : 0x0000000000000024 (36) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Mi Mai 27 16:56:18 2020 CEST.834720 > share_file_id : 0x000000000000000b (11) > uid : 0x00000000 (0) > flags : 0x0000 (0) > name_hash : 0xfd9ce696 (4254918294) > stale : 0x00 (0) >[2020/05/27 16:56:18.835813, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1554(set_share_mode_fn) > set_share_mode_fn: num_share_modes=0 >[2020/05/27 16:56:18.835836, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1569(set_share_mode_fn) > set_share_mode_fn: idx=0, found=0 >[2020/05/27 16:56:18.835857, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1595(set_share_mode_fn) > set_share_mode_fn: dbufs[0]=(0x7ffc6578ed20, 132) >[2020/05/27 16:56:18.835882, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 3 for /var/cache/samba/share_entries.tdb >[2020/05/27 16:56:18.835906, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:438(share_mode_data_store) > share_mode_data_store: >[2020/05/27 16:56:18.835929, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > d: struct share_mode_data > sequence_number : 0x03292b2b21e4e825 (227760720411158565) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/mnt/dfs' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x01 (1) > modified : 0x01 (1) > have_share_modes : 0x01 (1) > id: struct file_id > devid : 0x0000000000000803 (2051) > inode : 0x00000000000e0ff1 (921585) > extid : 0x0000000000000000 (0) >[2020/05/27 16:56:18.836121, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:409(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2020/05/27 16:56:18.836146, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2020/05/27 16:56:18.836161, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 0308000000000000F10F >[2020/05/27 16:56:18.836174, 10, pid=136421, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:182(share_mode_memcache_store) > share_mode_memcache_store: stored entry for file . seq 3292b2b21e4e826 key 2051:921585:0 >[2020/05/27 16:56:18.836195, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5732(create_file_unixpath) > create_file_unixpath: info=1 >[2020/05/27 16:56:18.836217, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:6022(create_file_default) > create_file: info=1 >[2020/05/27 16:56:18.836237, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1319(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2020/05/27 16:56:18.836257, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/05/27 16:56:18.836285, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.836311, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.836338, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:142(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.836360, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:129(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2020/05/27 16:56:18.836379, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F715FFA2 >[2020/05/27 16:56:18.836394, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55ddb471a6e0 >[2020/05/27 16:56:18.836414, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:743(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'F715FFA2' stored >[2020/05/27 16:56:18.836429, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf715ffa2 (4145414050) > open_persistent_id : 0x00000000f715ffa2 (4145414050) > open_volatile_id : 0x00000000e4d748d0 (3839314128) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 23052d07-a01c-11ea-8a78-fc577fd17813 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) >[2020/05/27 16:56:18.836565, 10, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F715FFA2 >[2020/05/27 16:56:18.836579, 5, pid=136421, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:171(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2020/05/27 16:56:18.836596, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_open.c:1033(smbXsrv_open_update) > smbXsrv_open_update: global_id (0xf715ffa2) stored >[2020/05/27 16:56:18.836609, 1, pid=136421, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:433(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xe4d748d0 (3839314128) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000214e5 (136421) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x2e10014b22427fc1 (3319154347581013953) > open_global_id : 0xf715ffa2 (4145414050) > open_persistent_id : 0x00000000f715ffa2 (4145414050) > open_volatile_id : 0x00000000e4d748d0 (3839314128) > open_owner : S-1-22-1-0 > open_time : Mi Mai 27 16:56:19 2020 CEST > create_guid : 23052d07-a01c-11ea-8a78-fc577fd17813 > client_guid : 23052cfe-a01c-11ea-8a78-fc577fd17813 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > status : NT_STATUS_OK > idle_time : Mi Mai 27 16:56:19 2020 CEST > compat : * > flags : 0x02 (2) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 1: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2020/05/27 16:56:18.836799, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1383(smbd_smb2_create_after_exec) > smb2_create_send: smbXsrv_open_update returned NT_STATUS_OK >[2020/05/27 16:56:18.836816, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:1548(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3839314128 >[2020/05/27 16:56:18.836840, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [36] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../../source3/smbd/smb2_create.c:405 >[2020/05/27 16:56:18.836863, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 4, charge 1, granted 4, current possible/max 8092/8192, total granted/max/low/range 104/8192/37/104 >[2020/05/27 16:56:18.837657, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 9 vectors >[2020/05/27 16:56:18.837702, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 37 (position 37) from bitmap >[2020/05/27 16:56:18.837719, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 38 (position 38) from bitmap >[2020/05/27 16:56:18.837734, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_QUERY_DIRECTORY] mid = 37 >[2020/05/27 16:56:18.837757, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.837773, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.837814, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.837862, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.837900, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:97(smbd_smb2_request_process_query_directory) > smbd_smb2_request_find_done: in_output_buffer_length = 65536 >[2020/05/27 16:56:18.837926, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:288(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: . - fnum 3839314128 >[2020/05/27 16:56:18.837952, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 37, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.837987, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:220(dptr_create) > dptr_create: dir=. >[2020/05/27 16:56:18.838009, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:321(dptr_create) > dptr_create: creating new dirptr [0] for path [.], expect_close = 0 >[2020/05/27 16:56:18.838033, 8, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:490(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 65528 >[2020/05/27 16:56:18.838056, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55ddb478b930 now at offset 0 >[2020/05/27 16:56:18.838076, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: . >[2020/05/27 16:56:18.838095, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file .: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.838113, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.838126, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:908(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found . fname=. (.) >[2020/05/27 16:56:18.838365, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:1897(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65528 >[2020/05/27 16:56:18.838421, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:2305(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2020/05/27 16:56:18.838456, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:373(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 0 >[2020/05/27 16:56:18.838482, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:699(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 0 >[2020/05/27 16:56:18.838514, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55ddb478b930 now at offset 2147483648 >[2020/05/27 16:56:18.838561, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: .. >[2020/05/27 16:56:18.838593, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file ..: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.838618, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.838640, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:908(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found .. fname=.. (..) >[2020/05/27 16:56:18.838662, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:1897(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65416 >[2020/05/27 16:56:18.838682, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:2305(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2020/05/27 16:56:18.838708, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:373(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 0 >[2020/05/27 16:56:18.838737, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:699(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 0 >[2020/05/27 16:56:18.838796, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55ddb478b930 now at offset 8297125130876086097 >[2020/05/27 16:56:18.838823, 8, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:779(dos_mode) > dos_mode: stores >[2020/05/27 16:56:18.838864, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:447(get_ea_dos_attribute) > get_ea_dos_attribute: Cannot get attribute from EA on file stores: Error = Keine Daten verfügbar >[2020/05/27 16:56:18.838889, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dosmode.c:71(dos_mode_debug_print) > dos_mode_debug_print: dos_mode returning (0x10): "d" >[2020/05/27 16:56:18.838912, 3, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:908(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found stores fname=stores (stores) >[2020/05/27 16:56:18.838937, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:1897(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65304 >[2020/05/27 16:56:18.838961, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:2305(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2020/05/27 16:56:18.838987, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:373(get_ea_names_from_file) > get_ea_names_from_file: ea_namelist size = 0 >[2020/05/27 16:56:18.839011, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/trans2.c:699(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 0 >[2020/05/27 16:56:18.839044, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55ddb478b930 now at offset -1 >[2020/05/27 16:56:18.839087, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:187(smbd_smb2_request_find_done) > smbd_smb2_request_find_done: out_output_buffer.length = 340 >[2020/05/27 16:56:18.839114, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [37] idx[1] status[NT_STATUS_OK] body[8] dyn[yes:340] at ../../source3/smbd/smb2_query_directory.c:192 >[2020/05/27 16:56:18.839158, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3118(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 9 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 32 > req->in.vector[4].iov_len = 8 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 32 > req->in.vector[8].iov_len = 2 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 344 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 >[2020/05/27 16:56:18.839276, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_QUERY_DIRECTORY] mid = 38 >[2020/05/27 16:56:18.839312, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.839339, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.839404, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.839468, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.839511, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:97(smbd_smb2_request_process_query_directory) > smbd_smb2_request_find_done: in_output_buffer_length = 1024 >[2020/05/27 16:56:18.839539, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:288(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: . - fnum 3839314128 >[2020/05/27 16:56:18.839565, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2026(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 38, CreditCharge: 1, NeededCharge: 1 >[2020/05/27 16:56:18.839614, 8, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:490(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 1016 >[2020/05/27 16:56:18.839645, 6, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:819(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55ddb478b930 now at offset -1 >[2020/05/27 16:56:18.839667, 3, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3264(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[5] status[STATUS_NO_MORE_FILES] || at ../../source3/smbd/smb2_query_directory.c:159 >[2020/05/27 16:56:18.839688, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3150(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [38] idx[5] status[STATUS_NO_MORE_FILES] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:3314 >[2020/05/27 16:56:18.839710, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 8090/8192, total granted/max/low/range 103/8192/39/103 >[2020/05/27 16:56:18.839735, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:947(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 7, charge 1, granted 7, current possible/max 8089/8192, total granted/max/low/range 110/8192/39/110 >[2020/05/27 16:56:18.840479, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 9 vectors >[2020/05/27 16:56:18.840538, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 39 (position 39) from bitmap >[2020/05/27 16:56:18.840562, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:690(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 40 (position 40) from bitmap >[2020/05/27 16:56:18.840588, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2349(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 39 >[2020/05/27 16:56:18.840619, 4, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:319(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2020/05/27 16:56:18.840638, 5, pid=136421, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:56(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2020/05/27 16:56:18.840706, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 2 supplementary groups > Group[ 0]: 0 > Group[ 1]: 65534 >[2020/05/27 16:56:18.840797, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:293(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(0,0), gid=(0,0), cwd=[/mnt/dfs] >[2020/05/27 16:56:18.840826, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:706(smbd_smb2_create_send) > smbd_smb2_create_send: name [server\dfs] >[2020/05/27 16:56:18.840842, 10, pid=136421, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_create.c:811(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2020/05/27 16:56:18.840857, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:131(parse_dfs_path) > parse_dfs_path: temp = |server\dfs| after trimming \'s >[2020/05/27 16:56:18.840871, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:157(parse_dfs_path) > parse_dfs_path: hostname: server >[2020/05/27 16:56:18.840893, 10, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:199(parse_dfs_path) > parse_dfs_path: servicename: dfs >[2020/05/27 16:56:18.840915, 5, pid=136421, effective(0, 0), real(0, 0), class=msdfs] ../../source3/smbd/msdfs.c:853(dfs_redirect) > dfs_redirect: self-referral. >[2020/05/27 16:56:18.840938, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:481(unix_convert) > unix_convert called on file "" >[2020/05/27 16:56:18.840962, 5, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/filename.c:514(unix_convert) > conversion finished "" -> . >[2020/05/27 16:56:18.840980, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1282(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/mnt/dfs] >[2020/05/27 16:56:18.841006, 10, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1345(check_reduced_name) > check_reduced_name realpath [.] -> [/mnt/dfs] >[2020/05/27 16:56:18.841021, 5, pid=136421, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1457(check_reduced_name) > check_reduced_name: . reduced to /mnt/dfs >[2020/05/27 16:56:18.841035, 10, pid=136421, effective(0, 0), real(0, 0)] ../../source3/smbd/open.c:5910(create_file_default) > create_file_default: create_file: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = (nil), sd = (nil), fname = . >[2020/05/27 1