The Samba-Bugzilla – Attachment 1651 Details for
Bug 3377
Err Loading Module charset ISO8859-1.so
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log.smbd
log.smbd (text/plain), 108.95 KB, created by
ketabchy
on 2006-01-06 08:40:42 UTC
(
hide
)
Description:
log.smbd
Filename:
MIME Type:
Creator:
ketabchy
Created:
2006-01-06 08:40:42 UTC
Size:
108.95 KB
patch
obsolete
>[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] param/loadparm.c:lp_file_list_changed(2950) > lp_file_list_changed() > file /etc/smb.conf -> /etc/smb.conf last mod_time: Fri Jan 6 16:37:15 2006 > >[2006/01/06 16:37:22, 2, effective(0, 0), real(0, 0)] lib/interface.c:add_interface(81) > added interface ip=10.42.1.60 bcast=10.42.1.255 nmask=255.255.255.0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util.c:init_names(260) > Netbios name list:- > my_netbios_names[0]="SVBWP01" >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:push_sec_ctx(256) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/uid.c:push_conn_ctx(388) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > NT user token: (NULL) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_context_list(950) > Trying to load: smbpasswd >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:smb_register_passdb(94) > Attempting to register passdb backend smbpasswd >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:smb_register_passdb(107) > Successfully added passdb backend 'smbpasswd' >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:smb_register_passdb(94) > Attempting to register passdb backend tdbsam >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:smb_register_passdb(107) > Successfully added passdb backend 'tdbsam' >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:smb_register_passdb(94) > Attempting to register passdb backend guest >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:smb_register_passdb(107) > Successfully added passdb backend 'guest' >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_methods_name(822) > Attempting to find an passdb backend to match smbpasswd (smbpasswd) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_methods_name(843) > Found pdb backend smbpasswd >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_methods_name(846) > pdb backend smbpasswd has a valid init >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_methods_name(822) > Attempting to find an passdb backend to match guest (guest) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_methods_name(843) > Found pdb backend guest >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_interface.c:make_pdb_methods_name(846) > pdb backend guest has a valid init >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:smbpasswd_getsampwsid(1371) > smbpasswd_getsampwrid: search by sid: S-1-5-21-1866776586-125768501-3220377249-501 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:smbpasswd_getsampwnam(1322) > getsampwnam (smbpasswd): search by name: nobody >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:startsmbfilepwent(184) > startsmbfilepwent_internal: opening file /usr/local/samba/private/smbpasswd >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:getsmbfilepwent(539) > getsmbfilepwent: end of file reached. >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:endsmbfilepwent(301) > endsmbfilepwent_internal: closed password file. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_get_set.c:pdb_set_username(617) > pdb_set_username: setting username nobody, was >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_get_set.c:pdb_set_fullname(698) > pdb_set_full_name: setting full name nobody, was >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_get_set.c:pdb_set_domain(644) > pdb_set_domain: setting domain SVBWP01, was >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_get_set.c:pdb_set_user_sid(544) > pdb_set_user_sid: setting user sid S-1-5-21-1866776586-125768501-3220377249-501 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_compat.c:pdb_set_user_sid_from_rid(73) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1866776586-125768501-3220377249-501 from rid 501 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_get_set.c:pdb_set_group_sid(580) > pdb_set_group_sid: setting group sid S-1-5-21-1866776586-125768501-3220377249-514 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_compat.c:pdb_set_group_sid_from_rid(100) > pdb_set_group_sid_from_rid: > setting group sid S-1-5-21-1866776586-125768501-3220377249-514 from rid 514 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:pop_sec_ctx(386) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:push_sec_ctx(256) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/uid.c:push_conn_ctx(388) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > NT user token: (NULL) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/system_smbd.c:sys_getgrouplist(167) > sys_getgrouplist: user [nobody] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/system_smbd.c:sys_getgrouplist(176) > sys_getgrouplist(): disabled winbindd for group lookup [user == nobody] >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:push_sec_ctx(256) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/uid.c:push_conn_ctx(388) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > NT user token: (NULL) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:37:22, 8, effective(0, 4294967294), real(0, 4294967294)] lib/system_smbd.c:remove_duplicate_gids(49) > remove_duplicate_gids: Enter 2 gids >[2006/01/06 16:37:22, 8, effective(0, 4294967294), real(0, 4294967294)] lib/system_smbd.c:remove_duplicate_gids(67) > remove_duplicate_gids: Exit 1 gids >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:pop_sec_ctx(386) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:push_sec_ctx(256) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/uid.c:push_conn_ctx(388) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > NT user token: (NULL) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:pop_sec_ctx(386) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/passdb.c:local_gid_to_sid(1245) > local_gid_to_sid: Fall back to algorithmic mapping: 4294967294 -> S-1-5-21-1866776586-125768501-3220377249-997 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/lookup_sid.c:gid_to_sid(406) > gid_to_sid: local 4294967294 -> S-1-5-21-1866776586-125768501-3220377249-997 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:pop_sec_ctx(386) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/privileges.c:grant_privilege(565) > grant_privilege: S-1-1-0 > original privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 > new privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/privileges.c:grant_privilege(565) > grant_privilege: S-1-5-32-544 > original privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 > new privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/privileges.c:grant_privilege(565) > grant_privilege: S-1-5-32-548 > original privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 > new privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/privileges.c:grant_privilege(565) > grant_privilege: S-1-5-32-549 > original privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 > new privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/privileges.c:grant_privilege(565) > grant_privilege: S-1-5-32-550 > original privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 > new privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/privileges.c:grant_privilege(565) > grant_privilege: S-1-5-32-551 > original privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 > new privilege mask: > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(438) > NT user token of user S-1-5-21-1866776586-125768501-3220377249-501 > contains 6 SIDs > SID[ 0]: S-1-5-21-1866776586-125768501-3220377249-501 > SID[ 1]: S-1-5-21-1866776586-125768501-3220377249-514 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-32-546 > SID[ 5]: S-1-5-21-1866776586-125768501-3220377249-997 > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:make_server_info_sam(898) > make_server_info_sam: made server info for user nobody -> nobody >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/server.c:main(838) > loaded services >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/server.c:main(853) > Becoming a daemon. >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/util.c:fcntl_lock(1820) > fcntl_lock 9 12 0 1 2 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/util.c:fcntl_lock(1855) > fcntl_lock: Lock call successful >[2006/01/06 16:37:22, 2, effective(0, 0), real(0, 0)] lib/tallocmsg.c:register_msg_pool_usage(61) > Registered MSG_REQ_POOL_USAGE >[2006/01/06 16:37:22, 2, effective(0, 0), real(0, 0)] lib/dmallocmsg.c:register_dmalloc_msgs(71) > Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/gencache.c:gencache_init(59) > Opening cache file at /usr/local/samba/var/locks/gencache.tdb >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] libsmb/namecache.c:namecache_enable(58) > namecache_enable: enabling netbios namecache, timeout 660 seconds >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SOFTWARE] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE] with subkey [Microsoft] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft] with subkey [Windows NT] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT] with subkey [CurrentVersion] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] with subkey [Print] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print] with subkey [Printers] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SOFTWARE] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE] with subkey [Microsoft] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft] with subkey [Windows NT] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT] with subkey [CurrentVersion] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] with subkey [Ports] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Control\Print] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Control] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control] with subkey [Print] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control\Print] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services] with subkey [LanmanServer] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer] with subkey [Shares] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services] with subkey [Eventlog] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SOFTWARE] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE] with subkey [Microsoft] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft] with subkey [Windows NT] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT] with subkey [CurrentVersion] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] with subkey [Perflib] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\009] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SOFTWARE] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE] with subkey [Microsoft] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft] with subkey [Windows NT] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT] with subkey [CurrentVersion] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] with subkey [Perflib] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] with subkey [009] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\009] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Control] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control] with subkey [Print] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control\Print] with subkey [Monitors] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Control] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control] with subkey [ProductOptions] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Control] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control] with subkey [Terminal Server] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server] with subkey [DefaultUserConfiguration] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Services\TcpIp\Parameters] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services] with subkey [TcpIp] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\TcpIp] with subkey [Parameters] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\TcpIp\Parameters] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM] with subkey [SYSTEM] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM] with subkey [CurrentControlSet] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet] with subkey [Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services] with subkey [Netlogon] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\Netlogon] with subkey [Parameters] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKU] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKU] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKCR] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKCR] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKPD] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKPD] with subkey [NULL] >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(104) > init_registry_data: Adding [HKPT] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:init_registry_data(130) > init_registry_data: Storing key [HKPT] with subkey [NULL] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_fetch_values(562) > regdb_fetch_values: Looking for value of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_unpack_values(514) > specific: [Samba Printer Port], len: 2 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_fetch_values(562) > regdb_fetch_values: Looking for value of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_unpack_values(514) > specific: [DefaultSpoolDirectory], len: 70 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_fetch_values(562) > regdb_fetch_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_unpack_values(514) > specific: [DisplayName], len: 20 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_unpack_values(514) > specific: [ErrorControl], len: 4 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_fetch_values(562) > regdb_fetch_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_unpack_values(514) > specific: [DisplayName], len: 20 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_unpack_values(514) > specific: [ErrorControl], len: 4 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_add(61) > reghook_cache_add: Adding key [/HKLM/SYSTEM/CurrentControlSet/Control/Print] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(201) > pathtree_add: Enter >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(268) > pathtree_add: Successfully added node [HKLM/SYSTEM/CurrentControlSet/Control/Print] to tree >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(270) > pathtree_add: Exit >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_add(61) > reghook_cache_add: Adding key [/HKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/Print/Printers] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(201) > pathtree_add: Enter >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(268) > pathtree_add: Successfully added node [HKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/Print/Printers] to tree >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(270) > pathtree_add: Exit >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_add(61) > reghook_cache_add: Adding key [/HKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/Ports] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(201) > pathtree_add: Enter >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(268) > pathtree_add: Successfully added node [HKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/Ports] to tree >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(270) > pathtree_add: Exit >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_add(61) > reghook_cache_add: Adding key [/HKLM/SYSTEM/CurrentControlSet/Services/LanmanServer/Shares] >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(201) > pathtree_add: Enter >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(268) > pathtree_add: Successfully added node [HKLM/SYSTEM/CurrentControlSet/Services/LanmanServer/Shares] to tree >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_add(270) > pathtree_add: Exit >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:push_sec_ctx(256) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/uid.c:push_conn_ctx(388) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > NT user token: (NULL) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:smbpasswd_getsampwnam(1322) > getsampwnam (smbpasswd): search by name: root >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:startsmbfilepwent(184) > startsmbfilepwent_internal: opening file /usr/local/samba/private/smbpasswd >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:getsmbfilepwent(539) > getsmbfilepwent: end of file reached. >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] passdb/pdb_smbpasswd.c:endsmbfilepwent(301) > endsmbfilepwent_internal: closed password file. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:pop_sec_ctx(386) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 4, effective(0, 0), real(0, 0)] passdb/passdb.c:local_uid_to_sid(1146) > local_uid_to_sid: User root [uid == 0] has no samba account >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] passdb/passdb.c:algorithmic_uid_to_sid(1107) > algorithmic_uid_to_sid: falling back to RID algorithm >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/passdb.c:algorithmic_uid_to_sid(1111) > algorithmic_uid_to_sid: uid (0) -> SID S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/passdb.c:local_uid_to_sid(1154) > local_uid_to_sid: uid (0) -> SID S-1-5-21-1866776586-125768501-3220377249-1000 (root). >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/lookup_sid.c:uid_to_sid(364) > uid_to_sid: local 0 -> S-1-5-21-1866776586-125768501-3220377249-1000 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:push_sec_ctx(256) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/uid.c:push_conn_ctx(388) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > NT user token: (NULL) >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:pop_sec_ctx(386) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/passdb.c:local_gid_to_sid(1245) > local_gid_to_sid: Fall back to algorithmic mapping: 0 -> S-1-5-21-1866776586-125768501-3220377249-1001 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] passdb/lookup_sid.c:gid_to_sid(406) > gid_to_sid: local 0 -> S-1-5-21-1866776586-125768501-3220377249-1001 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(438) > NT user token of user S-1-5-21-1866776586-125768501-3220377249-1000 > contains 6 SIDs > SID[ 0]: S-1-5-21-1866776586-125768501-3220377249-1000 > SID[ 1]: S-1-5-21-1866776586-125768501-3220377249-1001 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > SID[ 5]: S-1-5-32-544 > SE_PRIV 0x0 0x0 0x0 0x0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (1) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/Spooler] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/Spooler] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/Spooler/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/Spooler/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000000 sec_io_desc sec_desc >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0000 revision : 0001 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0002 type : 8004 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0004 off_owner_sid: 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0008 off_grp_sid : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 000c off_sacl : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0010 off_dacl : 00000014 >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000014 sec_io_acl dacl >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0014 revision: 0002 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0018 num_aces : 00000004 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00001c sec_io_ace ace_list[00]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001c type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001d flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000020 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0020 mask: 0002018d >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000024 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0024 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0025 num_auths : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0026 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0027 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0028 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0029 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002a id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002b id_auth[5] : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 002c sub_auths : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 001e size : 0014 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000030 sec_io_ace ace_list[01]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0030 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0031 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000034 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0034 mask: 000201fd >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000038 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0038 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0039 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0040 sub_auths : 00000020 00000223 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0032 size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000048 sec_io_ace ace_list[02]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0048 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0049 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00004c sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 004c mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000050 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0050 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0051 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0052 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0053 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0054 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0055 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0056 id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0057 id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0058 sub_auths : 00000020 00000225 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 004a size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000060 sec_io_ace ace_list[03]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0060 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0061 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000064 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0064 mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000068 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0068 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0069 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0070 sub_auths : 00000020 00000220 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0062 size : 0018 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0016 size : 0064 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/NETLOGON] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/NETLOGON] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/NETLOGON/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/NETLOGON/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000000 sec_io_desc sec_desc >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0000 revision : 0001 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0002 type : 8004 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0004 off_owner_sid: 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0008 off_grp_sid : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 000c off_sacl : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0010 off_dacl : 00000014 >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000014 sec_io_acl dacl >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0014 revision: 0002 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0018 num_aces : 00000004 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00001c sec_io_ace ace_list[00]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001c type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001d flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000020 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0020 mask: 0002018d >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000024 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0024 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0025 num_auths : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0026 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0027 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0028 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0029 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002a id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002b id_auth[5] : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 002c sub_auths : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 001e size : 0014 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000030 sec_io_ace ace_list[01]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0030 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0031 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000034 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0034 mask: 000201fd >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000038 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0038 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0039 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0040 sub_auths : 00000020 00000223 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0032 size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000048 sec_io_ace ace_list[02]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0048 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0049 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00004c sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 004c mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000050 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0050 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0051 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0052 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0053 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0054 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0055 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0056 id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0057 id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0058 sub_auths : 00000020 00000225 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 004a size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000060 sec_io_ace ace_list[03]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0060 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0061 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000064 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0064 mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000068 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0068 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0069 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0070 sub_auths : 00000020 00000220 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0062 size : 0018 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0016 size : 0064 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/RemoteRegistry] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/RemoteRegistry] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/RemoteRegistry/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/RemoteRegistry/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000000 sec_io_desc sec_desc >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0000 revision : 0001 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0002 type : 8004 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0004 off_owner_sid: 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0008 off_grp_sid : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 000c off_sacl : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0010 off_dacl : 00000014 >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000014 sec_io_acl dacl >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0014 revision: 0002 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0018 num_aces : 00000004 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00001c sec_io_ace ace_list[00]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001c type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001d flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000020 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0020 mask: 0002018d >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000024 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0024 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0025 num_auths : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0026 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0027 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0028 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0029 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002a id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002b id_auth[5] : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 002c sub_auths : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 001e size : 0014 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000030 sec_io_ace ace_list[01]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0030 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0031 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000034 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0034 mask: 000201fd >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000038 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0038 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0039 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0040 sub_auths : 00000020 00000223 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0032 size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000048 sec_io_ace ace_list[02]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0048 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0049 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00004c sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 004c mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000050 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0050 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0051 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0052 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0053 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0054 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0055 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0056 id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0057 id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0058 sub_auths : 00000020 00000225 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 004a size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000060 sec_io_ace ace_list[03]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0060 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0061 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000064 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0064 mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000068 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0068 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0069 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0070 sub_auths : 00000020 00000220 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0062 size : 0018 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0016 size : 0064 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/WINS] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/WINS] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_open(248) > regdb_open: incrementing refcount (2) >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] registry/reg_frontend.c:regkey_open_internal(359) > regkey_open_internal: name = [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_cachehook.c:reghook_cache_find(95) > reghook_cache_find: Searching for keyname [/HKLM/SYSTEM/CurrentControlSet/Services/WINS/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(341) > pathtree_find: Enter [/HKLM/SYSTEM/CurrentControlSet/Services/WINS/Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/adt_tree.c:pathtree_find(413) > pathtree_find: Exit >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] registry/reg_frontend.c:registry_access_check(59) > registry_access_check: using root's token >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(233) > se_access_check: requested access 0x000f003f, for NT token with 6 entries and first sid S-1-5-21-1866776586-125768501-3220377249-1000. >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(250) >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(251) > se_access_check: user sid is S-1-5-21-1866776586-125768501-3220377249-1000 > se_access_check: also S-1-5-21-1866776586-125768501-3220377249-1001 > se_access_check: also S-1-1-0 > se_access_check: also S-1-5-2 > se_access_check: also S-1-5-11 > se_access_check: also S-1-5-32-544 > se_access_check: ACE 0: type 0, flags = 0x00, SID = S-1-1-0 mask = 20019, current desired = f003f > se_access_check: ACE 1: type 0, flags = 0x00, SID = S-1-5-32-544 mask = f003f, current desired = d0026 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_seaccess.c:se_access_check(308) > se_access_check: access (f003f) granted. >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000000 sec_io_desc sec_desc >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0000 revision : 0001 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0002 type : 8004 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0004 off_owner_sid: 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0008 off_grp_sid : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 000c off_sacl : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0010 off_dacl : 00000014 >[2006/01/06 16:37:22, 6, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000014 sec_io_acl dacl >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0014 revision: 0002 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0018 num_aces : 00000004 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00001c sec_io_ace ace_list[00]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001c type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 001d flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000020 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0020 mask: 0002018d >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000024 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0024 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0025 num_auths : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0026 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0027 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0028 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0029 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002a id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 002b id_auth[5] : 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 002c sub_auths : 00000000 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 001e size : 0014 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000030 sec_io_ace ace_list[01]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0030 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0031 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000034 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0034 mask: 000201fd >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000038 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0038 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0039 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 003f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0040 sub_auths : 00000020 00000223 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0032 size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000048 sec_io_ace ace_list[02]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0048 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0049 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 00004c sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 004c mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000050 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0050 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0051 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0052 id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0053 id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0054 id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0055 id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0056 id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0057 id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0058 sub_auths : 00000020 00000225 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 004a size : 0018 >[2006/01/06 16:37:22, 7, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000060 sec_io_ace ace_list[03]: >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0060 type : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0061 flags: 00 >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000064 sec_io_access info >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32(703) > 0064 mask: 000f01ff >[2006/01/06 16:37:22, 8, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_debug(84) > 000068 smb_io_dom_sid trustee >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0068 sid_rev_num: 01 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 0069 num_auths : 02 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006a id_auth[0] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006b id_auth[1] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006c id_auth[2] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006d id_auth[3] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006e id_auth[4] : 00 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint8(614) > 006f id_auth[5] : 05 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint32s(930) > 0070 sub_auths : 00000020 00000220 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0062 size : 0018 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] rpc_parse/parse_prs.c:prs_uint16(674) > 0016 size : 0064 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_store_values(592) > regdb_store_values: Looking for value of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (2) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (1) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] registry/reg_db.c:regdb_close(279) > regdb_close: decrementing refcount (0) >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] printing/nt_printing.c:update_c_setprinter(689) > update_c_setprinter: c_setprinter = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] smbd/connection.c:claim_connection(170) > claiming 0 >[2006/01/06 16:37:22, 3, effective(0, 0), real(0, 0)] printing/printing.c:start_background_queue(1379) > start_background_queue: Starting background LPQ thread >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] printing/printing.c:start_background_queue(1389) > start_background_queue: background LPQ thread started >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] smbd/connection.c:claim_connection(170) > claiming smbd lpq backend 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] printing/printing.c:start_background_queue(1400) > start_background_queue: background LPQ thread waiting for messages >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_sock.c:open_socket_in(832) > bind succeeded on port 445 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_KEEPALIVE = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEADDR = 4 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_BROADCAST = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_NODELAY = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPCNT = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPIDLE = 7200 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPINTVL = 75 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_LOWDELAY = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_THROUGHPUT = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEPORT = 512 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDLOWAT = 4096 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVLOWAT = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDTIMEO = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVTIMEO = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_KEEPALIVE = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEADDR = 4 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_BROADCAST = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_NODELAY = 4 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPCNT = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPIDLE = 7200 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPINTVL = 75 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_LOWDELAY = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_THROUGHPUT = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEPORT = 512 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDLOWAT = 4096 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVLOWAT = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDTIMEO = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVTIMEO = 0 >[2006/01/06 16:37:22, 10, effective(0, 0), real(0, 0)] lib/util_sock.c:open_socket_in(832) > bind succeeded on port 139 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_KEEPALIVE = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEADDR = 4 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_BROADCAST = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_NODELAY = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPCNT = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPIDLE = 7200 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPINTVL = 75 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_LOWDELAY = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_THROUGHPUT = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEPORT = 512 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDLOWAT = 4096 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVLOWAT = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDTIMEO = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVTIMEO = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_KEEPALIVE = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEADDR = 4 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_BROADCAST = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_NODELAY = 4 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPCNT = 8 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPIDLE = 7200 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPINTVL = 75 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_LOWDELAY = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_THROUGHPUT = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEPORT = 512 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVBUF = 16384 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDLOWAT = 4096 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVLOWAT = 1 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDTIMEO = 0 >[2006/01/06 16:37:22, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVTIMEO = 0 >[2006/01/06 16:37:22, 2, effective(0, 0), real(0, 0)] smbd/server.c:open_sockets_smbd(336) > waiting for a connection >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_KEEPALIVE = 8 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEADDR = 4 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_BROADCAST = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_NODELAY = 4 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPCNT = 8 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPIDLE = 7200 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPINTVL = 75 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_LOWDELAY = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_THROUGHPUT = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEPORT = 512 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDBUF = 131400 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVBUF = 65700 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDLOWAT = 16128 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVLOWAT = 1 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDTIMEO = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVTIMEO = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_KEEPALIVE = 8 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEADDR = 4 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_BROADCAST = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_NODELAY = 4 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPCNT = 8 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPIDLE = 7200 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option TCP_KEEPINTVL = 75 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_LOWDELAY = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option IPTOS_THROUGHPUT = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_REUSEPORT = 512 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDBUF = 131400 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVBUF = 65700 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDLOWAT = 16128 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVLOWAT = 1 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_SNDTIMEO = 0 >[2006/01/06 16:38:09, 5, effective(0, 0), real(0, 0)] lib/util_sock.c:print_socket_options(203) > socket option SO_RCVTIMEO = 0 >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2006/01/06 16:38:21, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/sec_ctx.c:set_sec_ctx(288) > NT user token: (NULL) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2006/01/06 16:38:21, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 >[2006/01/06 16:38:21, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_nt_user_token(433) > Primary group is 0 and contains 0 supplementary groups > NT user token: (NULL) >[2006/01/06 16:38:21, 5, effective(0, 0), real(0, 0)] auth/auth_util.c:debug_unix_user_token(454) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2006/01/06 16:38:21, 5, effective(0, 0), real(0, 0)] smbd/uid.c:change_to_root_user(319) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2006/01/06 16:38:21, 5, effective(0, 0), real(0, 0)] smbd/uid.c:change_to_root_user(319) >[2006/01/06 16:38:21, 2, effective(0, 0), real(0, 0)] smbd/server.c:exit_server(614) > change_to_root_user: now uid=(0,0) gid=(0,0) > Closing connections >[2006/01/06 16:38:21, 2, effective(0, 0), real(0, 0)] smbd/server.c:exit_server(614) > Closing connections >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/connection.c:yield_connection(69) > Yielding connection to >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/connection.c:yield_connection(69) > Yielding connection to >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/connection.c:yield_connection(76) > yield_connection: tdb_delete for name failed with error Record does not exist. >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/server.c:exit_server(655) > Server exit (Caught TERM signal) >[2006/01/06 16:38:21, 3, effective(0, 0), real(0, 0)] smbd/server.c:exit_server(655) > Server exit (Caught TERM signal)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 3377
:
1650
| 1651