The Samba-Bugzilla – Attachment 17288 Details for
Bug 15065
Folder & file access permissions given to owner are derived from group setting
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log.smbd, level 10, for mounting share (at 10:25:02) and attempting open of 700 file (at 10:25:15)
Samba_4.16.1_mount_pub_and_attempt_to_open_700_file.txt (text/plain), 336.73 KB, created by
Bill Burgess
on 2022-05-13 17:48:06 UTC
(
hide
)
Description:
log.smbd, level 10, for mounting share (at 10:25:02) and attempting open of 700 file (at 10:25:15)
Filename:
MIME Type:
Creator:
Bill Burgess
Created:
2022-05-13 17:48:06 UTC
Size:
336.73 KB
patch
obsolete
>[2022/05/13 10:25:02.254419, 10, pid=11667, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 13 vectors >[2022/05/13 10:25:02.254553, 10, pid=11667, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 134 (position 134) from bitmap >[2022/05/13 10:25:02.254602, 10, pid=11667, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 135 (position 135) from bitmap >[2022/05/13 10:25:02.254636, 10, pid=11667, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 136 (position 136) from bitmap >[2022/05/13 10:25:02.254674, 10, pid=11667, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 134 >[2022/05/13 10:25:02.254736, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.254849, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:51(security_token_debug) > Security token SIDs (15): > SID[ 0]: S-1-5-21-2151563211-526390183-529952513-3000 > SID[ 1]: S-1-5-21-2151563211-526390183-529952513-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-2001 > SID[ 5]: S-1-22-2-2002 > SID[ 6]: S-1-22-2-2003 > SID[ 7]: S-1-22-2-2004 > SID[ 8]: S-1-22-2-2005 > SID[ 9]: S-1-22-2-2006 > SID[ 10]: S-1-22-2-1002 > SID[ 11]: S-1-1-0 > SID[ 12]: S-1-5-2 > SID[ 13]: S-1-5-11 > SID[ 14]: S-1-22-1-1000 > Privileges (0x 0): > Rights (0x 0): >[2022/05/13 10:25:02.255286, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 9 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 2001 > Group[ 3]: 2002 > Group[ 4]: 2003 > Group[ 5]: 2004 > Group[ 6]: 2005 > Group[ 7]: 2006 > Group[ 8]: 1002 >[2022/05/13 10:25:02.255613, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.255748, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.255843, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.255942, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [] >[2022/05/13 10:25:02.256016, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.256063, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [] >[2022/05/13 10:25:02.256169, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1028(unix_convert) > unix_convert: conversion finished [] -> [.] >[2022/05/13 10:25:02.256237, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [] -> [.] >[2022/05/13 10:25:02.256278, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.256337, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.256401, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.256456, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.256515, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.256583, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.256655, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.256732, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.256794, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.256917, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 15 >[2022/05/13 10:25:02.256983, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.257050, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x100081 file_attributes = 0x10, share_access = 0x7, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2022/05/13 10:25:02.257123, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x100081 file_attributes = 0x10 share_access = 0x7 create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2022/05/13 10:25:02.257236, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.257304, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.257381, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 337F0913 >[2022/05/13 10:25:02.257507, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e5cf50 >[2022/05/13 10:25:02.257562, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.257704, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '337F0913' stored >[2022/05/13 10:25:02.257762, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x337f0913 (863963411) > open_persistent_id : 0x00000000337f0913 (863963411) > open_volatile_id : 0x00000000ce256ba2 (3458558882) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.259013, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 337F0913 >[2022/05/13 10:25:02.259093, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.259176, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x337f0913) stored >[2022/05/13 10:25:02.259236, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xce256ba2 (3458558882) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x337f0913 (863963411) > open_persistent_id : 0x00000000337f0913 (863963411) > open_volatile_id : 0x00000000ce256ba2 (3458558882) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.260842, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [.] mid [134] >[2022/05/13 10:25:02.260934, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.260995, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.261065, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.261131, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.261243, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.261305, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.261397, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.261459, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.261524, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:4416(open_directory) > open_directory: opening directory ., access_mask = 0x100081, share_access = 0x7 create_options = 0x1, create_disposition = 0x1, file_attributes = 0x10 >[2022/05/13 10:25:02.261673, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file . >[2022/05/13 10:25:02.261933, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.262013, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.262076, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.262158, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.262227, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.262452, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.262519, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.262576, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.262636, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.262692, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.262840, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:602(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2022/05/13 10:25:02.262977, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.263044, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1436(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2022/05/13 10:25:02.263171, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.263241, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2022/05/13 10:25:02.263403, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.263474, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.263538, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.263601, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.263655, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.263841, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.263904, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2022/05/13 10:25:02.263971, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.264035, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.264109, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.264203, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.264273, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.264423, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.264486, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.264540, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.264654, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [.] requesting [0x100081] returning [0x100001] (NT_STATUS_OK) >[2022/05/13 10:25:02.264778, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.264870, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.264939, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:02.265000, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.265061, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.265161, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.265271, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.265332, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.265976, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:02.266049, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.266119, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1670(share_conflict) > share_conflict: existing access_mask = 0x1, existing share access = 0x7, access_mask = 0x100081, share_access = 0x7 >[2022/05/13 10:25:02.266211, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1701(share_conflict) > share_conflict: conflict=false >[2022/05/13 10:25:02.266308, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1946(open_mode_check) > open_mode_check: No conflict due to share_mode_flags access >[2022/05/13 10:25:02.266388, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1808(set_share_mode) > set_share_mode: num_share_modes=2 >[2022/05/13 10:25:02.266458, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=1, middle=0, middle_ptr=0x55d437deb3be >[2022/05/13 10:25:02.266533, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:371(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2022/05/13 10:25:02.266597, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000086 (134) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.256574 > share_file_id : 0x0000000000000046 (70) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:02.267293, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1852(set_share_mode) > set_share_mode: idx=0, found=0 >[2022/05/13 10:25:02.267369, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1880(set_share_mode) > set_share_mode: dbufs[0]=(0x7ffee3057ab0, 132) >[2022/05/13 10:25:02.267445, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1880(set_share_mode) > set_share_mode: dbufs[1]=(0x55d437deb3be, 264) >[2022/05/13 10:25:02.267520, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.267589, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.267655, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:02.267717, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.267780, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.267844, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.267949, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6095(create_file_unixpath) > create_file_unixpath: info=1 >[2022/05/13 10:25:02.268039, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (4 used) >[2022/05/13 10:25:02.268105, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6290(create_file_default) > create_file: info=1 >[2022/05/13 10:25:02.268195, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:1387(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2022/05/13 10:25:02.268258, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:742(fdos_mode) > fdos_mode: . >[2022/05/13 10:25:02.268338, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2022/05/13 10:25:02.268410, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:68(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x10): "d" >[2022/05/13 10:25:02.268480, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:1622(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3458558882 >[2022/05/13 10:25:02.268565, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [134] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:0] at ../../source3/smbd/smb2_create.c:409 >[2022/05/13 10:25:02.268671, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3808(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 8 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 32 > req->in.vector[8].iov_len = 16 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 24 > req->in.vector[12].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 0 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2022/05/13 10:25:02.269196, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_QUERY_DIRECTORY] mid = 135 >[2022/05/13 10:25:02.269269, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.269336, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.269431, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.269519, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.269595, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:98(smbd_smb2_request_process_query_directory) > smbd_smb2_request_find_done: in_output_buffer_length = 65536 >[2022/05/13 10:25:02.269694, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:290(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: . - fnum 3458558882 >[2022/05/13 10:25:02.269768, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2646(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 135, CreditCharge: 1, NeededCharge: 1 >[2022/05/13 10:25:02.269832, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dir.c:221(dptr_create) > dptr_create: dir=. >[2022/05/13 10:25:02.269943, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dir.c:322(dptr_create) > dptr_create: creating new dirptr [0] for path [.], expect_close = 0 >[2022/05/13 10:25:02.270039, 8, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:466(smbd_smb2_query_directory_send) > smbd_smb2_query_directory_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 65528 >[2022/05/13 10:25:02.270170, 6, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dir.c:801(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x55d437e5cf50 now at offset -1 >[2022/05/13 10:25:02.270248, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [foo.txt] >[2022/05/13 10:25:02.270313, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.270377, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/foo.txt hash 0x19ebfe34 >[2022/05/13 10:25:02.270463, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name foo.txt, flags = 00 mode = 00, fd = 15 >[2022/05/13 10:25:02.270525, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [foo.txt]: OK >[2022/05/13 10:25:02.270592, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:742(fdos_mode) > fdos_mode: foo.txt >[2022/05/13 10:25:02.270696, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file foo.txt: Error = No data available >[2022/05/13 10:25:02.270759, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:68(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x80): "" >[2022/05/13 10:25:02.270863, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:1146(g_lock_dump) > g_lock_dump: dbwrap_parse_record returned NT_STATUS_NOT_FOUND >[2022/05/13 10:25:02.270924, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1383(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: g_lock_dump failed: NT_STATUS_NOT_FOUND >[2022/05/13 10:25:02.270991, 3, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dir.c:1040(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[foo.txt] found foo.txt fname=foo.txt (foo.txt) >[2022/05/13 10:25:02.271060, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:1843(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65528 >[2022/05/13 10:25:02.271118, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:2247(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2022/05/13 10:25:02.271242, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:335(get_ea_names_from_fsp) > get_ea_names_from_fsp: ea_namelist size = 17 >[2022/05/13 10:25:02.271356, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:262(get_ea_value_fsp) > get_ea_value: EA security.selinux is of length 35 >[2022/05/13 10:25:02.271435, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/util/util.c:569(dump_data) > [0000] 75 6E 63 6F 6E 66 69 6E 65 64 5F 75 3A 6F 62 6A unconfin ed_u:obj > [0010] 65 63 74 5F 72 3A 64 65 66 61 75 6C 74 5F 74 3A ect_r:de fault_t: > [0020] 73 30 00 s0. >[2022/05/13 10:25:02.271665, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:506(get_ea_list_from_fsp) > get_ea_list_from_file: total_len = 56, security.selinux, val len = 35 >[2022/05/13 10:25:02.271730, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:519(get_ea_list_from_fsp) > get_ea_list_from_file: total_len = 60 >[2022/05/13 10:25:02.271788, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:648(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 60 >[2022/05/13 10:25:02.271870, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (4 used) >[2022/05/13 10:25:02.271948, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_query_directory.c:188(smbd_smb2_request_find_done) > smbd_smb2_request_find_done: out_output_buffer.length = 118 >[2022/05/13 10:25:02.272018, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [135] idx[5] status[NT_STATUS_OK] body[8] dyn[yes:118] at ../../source3/smbd/smb2_query_directory.c:193 >[2022/05/13 10:25:02.272106, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3808(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[9] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 8 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 32 > req->in.vector[8].iov_len = 16 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 24 > req->in.vector[12].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 0 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 120 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2022/05/13 10:25:02.272640, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 136 >[2022/05/13 10:25:02.272717, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.272807, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.272887, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: . - fnum 3458558882 >[2022/05/13 10:25:02.272971, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.273051, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.273166, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:02.273244, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.273310, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.273393, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.273481, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.273545, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.274231, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:02.274300, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.274380, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2184(share_mode_entry_do) > share_mode_entry_do: num_share_modes=3 >[2022/05/13 10:25:02.274440, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=2, middle=1, middle_ptr=0x55d437e67f42 >[2022/05/13 10:25:02.274513, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0, middle_ptr=0x55d437e67ebe >[2022/05/13 10:25:02.274582, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2200(share_mode_entry_do) > share_mode_entry_do: entry[0]: >[2022/05/13 10:25:02.274649, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000086 (134) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.256574 > share_file_id : 0x0000000000000046 (70) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:02.275292, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2206(share_mode_entry_do) > share_mode_entry_do: entry[0]: modified=0, e.stale=1 >[2022/05/13 10:25:02.275364, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2240(share_mode_entry_do) > share_mode_entry_do: share_mode_entry: >[2022/05/13 10:25:02.275424, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000086 (134) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.256574 > share_file_id : 0x0000000000000046 (70) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x01 (1) >[2022/05/13 10:25:02.276031, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.276106, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.276200, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:02.276271, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.276342, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.276408, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.276511, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dir.c:349(dptr_CloseDir) > dptr_CloseDir: closing dptr key 0 >[2022/05/13 10:25:02.276602, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.276666, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.276740, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 337F0913 >[2022/05/13 10:25:02.276804, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:02.276894, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 337F0913 >[2022/05/13 10:25:02.276958, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.277032, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 3458558882 (3 used) >[2022/05/13 10:25:02.277106, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [136] idx[9] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:146 >[2022/05/13 10:25:02.277204, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 3, current possible/max 3/8192, total granted/max/low/range 8192/8192/137/8192 >[2022/05/13 10:25:02.277277, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 0, current possible/max 0/8192, total granted/max/low/range 8192/8192/137/8192 >[2022/05/13 10:25:02.277346, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 0, current possible/max 0/8192, total granted/max/low/range 8192/8192/137/8192 >[2022/05/13 10:25:02.280910, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 13 vectors >[2022/05/13 10:25:02.280999, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 137 (position 137) from bitmap >[2022/05/13 10:25:02.281064, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 138 (position 138) from bitmap >[2022/05/13 10:25:02.281122, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 139 (position 139) from bitmap >[2022/05/13 10:25:02.281224, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 137 >[2022/05/13 10:25:02.281336, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.281435, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.281538, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [] >[2022/05/13 10:25:02.281617, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.281681, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [] >[2022/05/13 10:25:02.281757, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1028(unix_convert) > unix_convert: conversion finished [] -> [.] >[2022/05/13 10:25:02.281818, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [] -> [.] >[2022/05/13 10:25:02.281882, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.281958, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.282016, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.282083, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.282168, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.282241, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.282304, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.282374, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.282436, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.282533, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 15 >[2022/05/13 10:25:02.282600, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.282666, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x100080 file_attributes = 0x10, share_access = 0x7, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2022/05/13 10:25:02.282738, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x100080 file_attributes = 0x10 share_access = 0x7 create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2022/05/13 10:25:02.282849, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.282918, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.282988, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 14552434 >[2022/05/13 10:25:02.283053, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e55ab0 >[2022/05/13 10:25:02.283115, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.283245, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '14552434' stored >[2022/05/13 10:25:02.283323, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x14552434 (341124148) > open_persistent_id : 0x0000000014552434 (341124148) > open_volatile_id : 0x00000000c25d61ef (3260899823) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.284522, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 14552434 >[2022/05/13 10:25:02.284602, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.284662, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x14552434) stored >[2022/05/13 10:25:02.284756, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xc25d61ef (3260899823) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x14552434 (341124148) > open_persistent_id : 0x0000000014552434 (341124148) > open_volatile_id : 0x00000000c25d61ef (3260899823) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.286355, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [.] mid [137] >[2022/05/13 10:25:02.286451, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.286513, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.286577, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.286648, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.286754, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.286819, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.286904, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.286971, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.287029, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:4416(open_directory) > open_directory: opening directory ., access_mask = 0x100080, share_access = 0x7 create_options = 0x1, create_disposition = 0x1, file_attributes = 0x10 >[2022/05/13 10:25:02.287108, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file . >[2022/05/13 10:25:02.287375, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.287465, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.287527, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.287585, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.287647, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.287867, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.287933, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.287991, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.288049, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.288110, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.288270, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:602(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2022/05/13 10:25:02.288369, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.288442, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1436(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2022/05/13 10:25:02.288543, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.288616, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2022/05/13 10:25:02.288756, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.288858, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.288927, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.288991, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.289054, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.289282, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.289354, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2022/05/13 10:25:02.289419, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.289480, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.289553, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.289625, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.289694, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.289840, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.289908, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.289972, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.290049, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [.] requesting [0x100080] returning [0x100000] (NT_STATUS_OK) >[2022/05/13 10:25:02.290132, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.290235, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.290295, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:02.290391, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.290454, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.290531, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.290625, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.290683, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.291348, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:02.291416, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.291497, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1808(set_share_mode) > set_share_mode: num_share_modes=2 >[2022/05/13 10:25:02.291558, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=1, middle=0, middle_ptr=0x55d437deb3be >[2022/05/13 10:25:02.291637, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:371(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2022/05/13 10:25:02.291697, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000089 (137) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.282231 > share_file_id : 0x0000000000000049 (73) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:02.292368, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1852(set_share_mode) > set_share_mode: idx=0, found=0 >[2022/05/13 10:25:02.292432, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1880(set_share_mode) > set_share_mode: dbufs[0]=(0x7ffee3057ab0, 132) >[2022/05/13 10:25:02.292490, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1880(set_share_mode) > set_share_mode: dbufs[1]=(0x55d437deb3be, 264) >[2022/05/13 10:25:02.292560, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.292631, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.292697, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:02.292764, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.292830, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.292889, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.292951, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6095(create_file_unixpath) > create_file_unixpath: info=1 >[2022/05/13 10:25:02.293029, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (4 used) >[2022/05/13 10:25:02.293101, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6290(create_file_default) > create_file: info=1 >[2022/05/13 10:25:02.293227, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:1387(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2022/05/13 10:25:02.293295, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:742(fdos_mode) > fdos_mode: . >[2022/05/13 10:25:02.293405, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2022/05/13 10:25:02.293472, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:68(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x10): "d" >[2022/05/13 10:25:02.293543, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file . >[2022/05/13 10:25:02.293769, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.293872, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.293940, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.294005, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.294063, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.294303, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.294376, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.294433, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.294492, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.294547, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.294687, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:602(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2022/05/13 10:25:02.294788, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.294853, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1436(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2022/05/13 10:25:02.294962, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.295022, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2022/05/13 10:25:02.295207, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.295281, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.295338, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.295396, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.295456, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.295636, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.295697, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2022/05/13 10:25:02.295763, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.295855, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.295938, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.296009, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.296085, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.296251, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.296322, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.296386, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.296467, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/access_check.c:214(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1f01ff, remaining = 0x1f01ff >[2022/05/13 10:25:02.296544, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:1622(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3260899823 >[2022/05/13 10:25:02.296630, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [137] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:32] at ../../source3/smbd/smb2_create.c:409 >[2022/05/13 10:25:02.296722, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3808(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 32 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 40 > req->in.vector[8].iov_len = 0 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 24 > req->in.vector[12].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 32 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2022/05/13 10:25:02.297255, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_GETINFO] mid = 138 >[2022/05/13 10:25:02.297362, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.297432, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.297533, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.297608, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.297679, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2646(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 138, CreditCharge: 1, NeededCharge: 1 >[2022/05/13 10:25:02.297743, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_getinfo.c:276(smbd_smb2_getinfo_send) > smbd_smb2_getinfo_send: . - fnum 3260899823 >[2022/05/13 10:25:02.297823, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.297912, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.297977, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.298658, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.298731, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:5171(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: . (fnum 3260899823) level=65298 max_data=1124 >[2022/05/13 10:25:02.298794, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:742(fdos_mode) > fdos_mode: . >[2022/05/13 10:25:02.298895, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2022/05/13 10:25:02.298973, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:68(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x10): "d" >[2022/05/13 10:25:02.299087, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:335(get_ea_names_from_fsp) > get_ea_names_from_fsp: ea_namelist size = 17 >[2022/05/13 10:25:02.299261, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:262(get_ea_value_fsp) > get_ea_value: EA security.selinux is of length 35 >[2022/05/13 10:25:02.299332, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/util/util.c:569(dump_data) > [0000] 75 6E 63 6F 6E 66 69 6E 65 64 5F 75 3A 6F 62 6A unconfin ed_u:obj > [0010] 65 63 74 5F 72 3A 64 65 66 61 75 6C 74 5F 74 3A ect_r:de fault_t: > [0020] 73 30 00 s0. >[2022/05/13 10:25:02.299566, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:506(get_ea_list_from_fsp) > get_ea_list_from_file: total_len = 56, security.selinux, val len = 35 >[2022/05/13 10:25:02.299631, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:519(get_ea_list_from_fsp) > get_ea_list_from_file: total_len = 60 >[2022/05/13 10:25:02.299687, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:648(fill_ea_chained_buffer) > fill_ea_chained_buffer: data_size = 60 >[2022/05/13 10:25:02.299744, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:5622(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB2_FILE_ALL_INFORMATION >[2022/05/13 10:25:02.299822, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [138] idx[5] status[NT_STATUS_OK] body[8] dyn[yes:102] at ../../source3/smbd/smb2_getinfo.c:206 >[2022/05/13 10:25:02.299909, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3808(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[9] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 32 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 40 > req->in.vector[8].iov_len = 0 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 24 > req->in.vector[12].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 32 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 104 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2022/05/13 10:25:02.300413, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 139 >[2022/05/13 10:25:02.300486, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.300581, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.300663, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: . - fnum 3260899823 >[2022/05/13 10:25:02.300749, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.300822, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.300919, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:02.300982, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.301041, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.301115, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.301299, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.301359, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.301997, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:02.302072, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.302169, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2184(share_mode_entry_do) > share_mode_entry_do: num_share_modes=3 >[2022/05/13 10:25:02.302242, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=2, middle=1, middle_ptr=0x55d437e67f42 >[2022/05/13 10:25:02.302318, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0, middle_ptr=0x55d437e67ebe >[2022/05/13 10:25:02.302384, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2200(share_mode_entry_do) > share_mode_entry_do: entry[0]: >[2022/05/13 10:25:02.302445, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000089 (137) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.282231 > share_file_id : 0x0000000000000049 (73) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:02.303080, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2206(share_mode_entry_do) > share_mode_entry_do: entry[0]: modified=0, e.stale=1 >[2022/05/13 10:25:02.303168, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2240(share_mode_entry_do) > share_mode_entry_do: share_mode_entry: >[2022/05/13 10:25:02.303240, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000089 (137) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.282231 > share_file_id : 0x0000000000000049 (73) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x01 (1) >[2022/05/13 10:25:02.303833, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.303911, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.303982, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:02.304049, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.304113, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.304208, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.304318, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.304389, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.304459, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 14552434 >[2022/05/13 10:25:02.304523, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e55e20 >[2022/05/13 10:25:02.304615, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 14552434 >[2022/05/13 10:25:02.304680, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.304754, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 3260899823 (3 used) >[2022/05/13 10:25:02.304832, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [139] idx[9] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:146 >[2022/05/13 10:25:02.304902, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 3, current possible/max 3/8192, total granted/max/low/range 8192/8192/140/8192 >[2022/05/13 10:25:02.304969, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 0, current possible/max 0/8192, total granted/max/low/range 8192/8192/140/8192 >[2022/05/13 10:25:02.305030, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 0, current possible/max 0/8192, total granted/max/low/range 8192/8192/140/8192 >[2022/05/13 10:25:02.317052, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 13 vectors >[2022/05/13 10:25:02.317214, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 140 (position 140) from bitmap >[2022/05/13 10:25:02.317289, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 141 (position 141) from bitmap >[2022/05/13 10:25:02.317347, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 142 (position 142) from bitmap >[2022/05/13 10:25:02.317418, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 140 >[2022/05/13 10:25:02.317496, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.317648, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.317749, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [] >[2022/05/13 10:25:02.317826, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.317892, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [] >[2022/05/13 10:25:02.317965, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1028(unix_convert) > unix_convert: conversion finished [] -> [.] >[2022/05/13 10:25:02.318027, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [] -> [.] >[2022/05/13 10:25:02.318099, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.318212, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.318282, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.318343, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.318403, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.318478, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.318546, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.318613, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.318673, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.318764, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 15 >[2022/05/13 10:25:02.318835, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.318895, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x100080 file_attributes = 0x10, share_access = 0x7, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2022/05/13 10:25:02.318964, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x100080 file_attributes = 0x10 share_access = 0x7 create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = . >[2022/05/13 10:25:02.319051, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.319158, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.319239, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4E0BDE58 >[2022/05/13 10:25:02.319306, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e55ab0 >[2022/05/13 10:25:02.319374, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.319499, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '4E0BDE58' stored >[2022/05/13 10:25:02.319571, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x4e0bde58 (1309400664) > open_persistent_id : 0x000000004e0bde58 (1309400664) > open_volatile_id : 0x00000000d69ce00c (3600605196) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.320778, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4E0BDE58 >[2022/05/13 10:25:02.320859, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.320921, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x4e0bde58) stored >[2022/05/13 10:25:02.320980, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xd69ce00c (3600605196) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x4e0bde58 (1309400664) > open_persistent_id : 0x000000004e0bde58 (1309400664) > open_volatile_id : 0x00000000d69ce00c (3600605196) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.322595, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [.] mid [140] >[2022/05/13 10:25:02.322683, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.322743, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.322813, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.322880, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.322952, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.323042, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.323157, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.323229, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.323295, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:4416(open_directory) > open_directory: opening directory ., access_mask = 0x100080, share_access = 0x7 create_options = 0x1, create_disposition = 0x1, file_attributes = 0x10 >[2022/05/13 10:25:02.323380, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file . >[2022/05/13 10:25:02.323643, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.323723, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.323787, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.323851, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.323914, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.324172, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.324248, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.324306, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.324366, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.324422, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.324571, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:602(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2022/05/13 10:25:02.324673, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.324741, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1436(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2022/05/13 10:25:02.324851, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.324915, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2022/05/13 10:25:02.325055, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.325118, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.325231, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.325300, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.325362, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.325553, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.325615, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2022/05/13 10:25:02.325687, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.325752, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.325825, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.325897, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.325967, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.326124, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.326209, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.326272, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.326359, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [.] requesting [0x100080] returning [0x100000] (NT_STATUS_OK) >[2022/05/13 10:25:02.326442, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.326514, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.326576, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:02.326641, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.326726, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.326809, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.326904, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.326962, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.327655, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:02.327725, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.327803, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1808(set_share_mode) > set_share_mode: num_share_modes=2 >[2022/05/13 10:25:02.327866, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=1, middle=0, middle_ptr=0x55d437deb3be >[2022/05/13 10:25:02.327942, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:371(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2022/05/13 10:25:02.328003, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x000000000000008c (140) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.318467 > share_file_id : 0x000000000000004b (75) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:02.328686, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1852(set_share_mode) > set_share_mode: idx=0, found=0 >[2022/05/13 10:25:02.328752, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1880(set_share_mode) > set_share_mode: dbufs[0]=(0x7ffee3057ab0, 132) >[2022/05/13 10:25:02.328816, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1880(set_share_mode) > set_share_mode: dbufs[1]=(0x55d437deb3be, 264) >[2022/05/13 10:25:02.328896, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.328964, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.329030, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:02.329100, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.329208, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.329274, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.329343, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6095(create_file_unixpath) > create_file_unixpath: info=1 >[2022/05/13 10:25:02.329423, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (4 used) >[2022/05/13 10:25:02.329483, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6290(create_file_default) > create_file: info=1 >[2022/05/13 10:25:02.329546, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:1387(smbd_smb2_create_after_exec) > smbd_smb2_create_send: response construction phase >[2022/05/13 10:25:02.329609, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:742(fdos_mode) > fdos_mode: . >[2022/05/13 10:25:02.329718, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file .: Error = No data available >[2022/05/13 10:25:02.329784, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:68(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x10): "d" >[2022/05/13 10:25:02.329853, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file . >[2022/05/13 10:25:02.330060, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.330162, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.330254, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.330321, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.330383, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.330594, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.330660, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.330716, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2022/05/13 10:25:02.330776, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.330836, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.330977, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_tdb.c:602(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2022/05/13 10:25:02.331076, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.331196, 5, pid=11667, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:1436(pdb_default_uid_to_sid) > pdb_default_uid_to_sid: Did not find user root (0) >[2022/05/13 10:25:02.331303, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.331365, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: UID 0 -> S-1-22-1-0 fallback >[2022/05/13 10:25:02.331510, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.331573, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.331630, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.331696, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.331752, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.331928, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.331987, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 0 -> S-1-22-2-0 fallback >[2022/05/13 10:25:02.332058, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.332125, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.332253, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.332332, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.332404, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-22-1-0 uid 0 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.332561, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.332618, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.332676, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2022/05/13 10:25:02.332759, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/access_check.c:214(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1f01ff, remaining = 0x1f01ff >[2022/05/13 10:25:02.332833, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:1622(smbd_smb2_create_finish) > smbd_smb2_create_finish: . - fnum 3600605196 >[2022/05/13 10:25:02.332926, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [140] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:32] at ../../source3/smbd/smb2_create.c:409 >[2022/05/13 10:25:02.333017, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3808(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 32 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 40 > req->in.vector[8].iov_len = 0 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 24 > req->in.vector[12].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 32 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2022/05/13 10:25:02.333525, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_GETINFO] mid = 141 >[2022/05/13 10:25:02.333603, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.333663, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.333885, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.333979, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.334055, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2646(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 141, CreditCharge: 1, NeededCharge: 1 >[2022/05/13 10:25:02.334118, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_getinfo.c:276(smbd_smb2_getinfo_send) > smbd_smb2_getinfo_send: . - fnum 3600605196 >[2022/05/13 10:25:02.334227, 3, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:3514(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 1003 >[2022/05/13 10:25:02.334549, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=quota] ../../source3/lib/sysquotas.c:513(sys_get_quota) > sys_get_quota() uid(1000, 1000), fs(ext4) >[2022/05/13 10:25:02.334615, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=quota] ../../source3/lib/sysquotas_linux.c:80(sys_get_vfs_quota) > sys_get_vfs_quota: path[/] bdev[/dev/sda4] SMB_USER_FS_QUOTA_TYPE (uid[1000]) >[2022/05/13 10:25:02.334695, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=quota] ../../source3/lib/sysquotas.c:537(sys_get_quota) > sys_get_vfs_quota() called for mntpath[/] bdev[/dev/sda4] qtype[1] id[-1]. >[2022/05/13 10:25:02.334928, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=quota] ../../source3/lib/sysquotas.c:513(sys_get_quota) > sys_get_quota() uid(1000, 1000), fs(ext4) >[2022/05/13 10:25:02.335002, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=quota] ../../source3/lib/sysquotas_linux.c:93(sys_get_vfs_quota) > sys_get_vfs_quota: path[/] bdev[/dev/sda4] SMB_GROUP_FS_QUOTA_TYPE (gid[1000]) >[2022/05/13 10:25:02.335079, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=quota] ../../source3/lib/sysquotas.c:537(sys_get_quota) > sys_get_vfs_quota() called for mntpath[/] bdev[/dev/sda4] qtype[3] id[-1]. >[2022/05/13 10:25:02.335174, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/trans2.c:3727(smbd_do_qfsinfo) > smbd_do_qfsinfo : SMB_QUERY_FS_SIZE_INFO bsize=1024, cSectorUnit=2, cBytesSector=512, cUnitTotal=32716560, cUnitAvail=25271448 >[2022/05/13 10:25:02.335266, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [141] idx[5] status[NT_STATUS_OK] body[8] dyn[yes:24] at ../../source3/smbd/smb2_getinfo.c:206 >[2022/05/13 10:25:02.335352, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3808(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[9] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 32 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 40 > req->in.vector[8].iov_len = 0 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 24 > req->in.vector[12].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 32 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 24 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2022/05/13 10:25:02.335876, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 142 >[2022/05/13 10:25:02.335953, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.336052, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.336123, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_close.c:229(smbd_smb2_close) > smbd_smb2_close: . - fnum 3600605196 >[2022/05/13 10:25:02.336237, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.336315, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.336376, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:02.336434, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.336493, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.336570, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:02.336663, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:02.336721, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:02.337392, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:02.337464, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:02.337583, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2184(share_mode_entry_do) > share_mode_entry_do: num_share_modes=3 >[2022/05/13 10:25:02.337646, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=2, middle=1, middle_ptr=0x55d437e67f42 >[2022/05/13 10:25:02.337718, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0, middle_ptr=0x55d437e67ebe >[2022/05/13 10:25:02.337791, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2200(share_mode_entry_do) > share_mode_entry_do: entry[0]: >[2022/05/13 10:25:02.337858, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x000000000000008c (140) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.318467 > share_file_id : 0x000000000000004b (75) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:02.338532, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2206(share_mode_entry_do) > share_mode_entry_do: entry[0]: modified=0, e.stale=1 >[2022/05/13 10:25:02.338600, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:2240(share_mode_entry_do) > share_mode_entry_do: share_mode_entry: >[2022/05/13 10:25:02.338659, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x000000000000008c (140) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:25:02 AM 2022 PDT.318467 > share_file_id : 0x000000000000004b (75) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x01 (1) >[2022/05/13 10:25:02.339303, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.339380, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.339446, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:02.339512, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:02.339580, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:02.339640, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:02.339722, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.339785, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.339855, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4E0BDE58 >[2022/05/13 10:25:02.339918, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e55e20 >[2022/05/13 10:25:02.340009, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4E0BDE58 >[2022/05/13 10:25:02.340067, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.340157, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 3600605196 (3 used) >[2022/05/13 10:25:02.340246, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [142] idx[9] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:146 >[2022/05/13 10:25:02.340318, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 3, current possible/max 3/8192, total granted/max/low/range 8192/8192/143/8192 >[2022/05/13 10:25:02.340391, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 0, current possible/max 0/8192, total granted/max/low/range 8192/8192/143/8192 >[2022/05/13 10:25:02.340455, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 0, current possible/max 0/8192, total granted/max/low/range 8192/8192/143/8192 >[2022/05/13 10:25:02.362117, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2022/05/13 10:25:02.362314, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 143 (position 143) from bitmap >[2022/05/13 10:25:02.362378, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 143 >[2022/05/13 10:25:02.362439, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.362542, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.362638, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [foo.txt] >[2022/05/13 10:25:02.362703, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.362766, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [foo.txt] >[2022/05/13 10:25:02.362834, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/statcache.c:324(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [0000000000000000@FOO.TXT] -> [foo.txt] >[2022/05/13 10:25:02.362902, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [foo.txt] -> [foo.txt] >[2022/05/13 10:25:02.362959, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.363030, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.363089, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.363160, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [foo.txt] >[2022/05/13 10:25:02.363229, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.363297, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/foo.txt hash 0x19ebfe34 >[2022/05/13 10:25:02.363366, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.363441, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.363498, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.363587, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name foo.txt, flags = 00 mode = 00, fd = 15 >[2022/05/13 10:25:02.363639, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [foo.txt]: OK >[2022/05/13 10:25:02.363744, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x20081 file_attributes = 0x80, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.363815, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x20081 file_attributes = 0x80 share_access = 0x7 create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.363893, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.363951, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.364020, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key ADD03958 >[2022/05/13 10:25:02.364078, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e5cf50 >[2022/05/13 10:25:02.364157, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.364271, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'ADD03958' stored >[2022/05/13 10:25:02.364329, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0xadd03958 (2916104536) > open_persistent_id : 0x00000000add03958 (2916104536) > open_volatile_id : 0x0000000087afc329 (2276442921) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.365418, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key ADD03958 >[2022/05/13 10:25:02.365492, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.365554, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xadd03958) stored >[2022/05/13 10:25:02.365612, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x87afc329 (2276442921) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0xadd03958 (2916104536) > open_persistent_id : 0x00000000add03958 (2916104536) > open_volatile_id : 0x0000000087afc329 (2276442921) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.367002, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [foo.txt] mid [143] >[2022/05/13 10:25:02.367106, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.367189, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.367250, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.367309, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.367375, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.367428, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.367512, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.367575, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.367635, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:177(unix_mode) > unix_mode: unix_mode(foo.txt) returning 0744 >[2022/05/13 10:25:02.367691, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3513(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, dos_attrs=0x80 access_mask=0x20081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2022/05/13 10:25:02.367798, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file foo.txt: Error = No data available >[2022/05/13 10:25:02.367861, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3696(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, after mapping access_mask=0x20081 >[2022/05/13 10:25:02.367914, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3796(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0744, access_mask = 0x20081, open_access_mask = 0x20081 >[2022/05/13 10:25:02.367971, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file foo.txt >[2022/05/13 10:25:02.368162, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1201(xid_to_sid) > xid_to_sid: UID 1000 -> S-1-5-21-2151563211-526390183-529952513-1000 from cache >[2022/05/13 10:25:02.368354, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.368428, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.368484, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.368534, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.368581, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.368760, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.368835, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 1000 -> S-1-22-2-1000 fallback >[2022/05/13 10:25:02.368899, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.368958, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.369025, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.369094, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.369200, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.369332, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2022/05/13 10:25:02.369388, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.369433, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.369500, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [foo.txt] requesting [0x20081] returning [0x20001] (NT_STATUS_ACCESS_DENIED) >[2022/05/13 10:25:02.369558, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: acl for foo.txt is: >[2022/05/13 10:25:02.369614, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > sd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2151563211-526390183-529952513-1000 > group_sid : * > group_sid : S-1-22-2-1000 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2151563211-526390183-529952513-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2022/05/13 10:25:02.371371, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1386(open_file) > open_file: smbd_check_access_rights_fsp on file foo.txt returned NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.371444, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6109(create_file_unixpath) > create_file_unixpath: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.371518, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.371575, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.371673, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key ADD03958 >[2022/05/13 10:25:02.371741, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:02.371828, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key ADD03958 >[2022/05/13 10:25:02.371883, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.371952, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 2276442921 (4 used) >[2022/05/13 10:25:02.372022, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (3 used) >[2022/05/13 10:25:02.372083, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6299(create_file_default) > create_file: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.372171, 3, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3954(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_ACCESS_DENIED] || at ../../source3/smbd/smb2_create.c:338 >[2022/05/13 10:25:02.372247, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [143] idx[1] status[NT_STATUS_ACCESS_DENIED] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4004 >[2022/05/13 10:25:02.372311, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/144/8192 >[2022/05/13 10:25:02.379732, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2022/05/13 10:25:02.379851, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 144 (position 144) from bitmap >[2022/05/13 10:25:02.379915, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 144 >[2022/05/13 10:25:02.379977, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.380038, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.380165, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.380233, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.380327, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [foo.txt] >[2022/05/13 10:25:02.380391, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.380501, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [foo.txt] >[2022/05/13 10:25:02.380581, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/statcache.c:324(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [0000000000000000@FOO.TXT] -> [foo.txt] >[2022/05/13 10:25:02.380657, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [foo.txt] -> [foo.txt] >[2022/05/13 10:25:02.380715, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.380792, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.380844, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.380898, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [foo.txt] >[2022/05/13 10:25:02.380958, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.381022, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/foo.txt hash 0x19ebfe34 >[2022/05/13 10:25:02.381084, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.381179, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.381242, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.381330, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name foo.txt, flags = 00 mode = 00, fd = 15 >[2022/05/13 10:25:02.381381, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [foo.txt]: OK >[2022/05/13 10:25:02.381434, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x20081 file_attributes = 0x80, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.381495, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x20081 file_attributes = 0x80 share_access = 0x7 create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.381565, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.381622, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.381688, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 1437C734 >[2022/05/13 10:25:02.381785, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e566a0 >[2022/05/13 10:25:02.381845, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.381951, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '1437C734' stored >[2022/05/13 10:25:02.382004, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x1437c734 (339199796) > open_persistent_id : 0x000000001437c734 (339199796) > open_volatile_id : 0x0000000097709c64 (2540739684) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.383064, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 1437C734 >[2022/05/13 10:25:02.383152, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.383220, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x1437c734) stored >[2022/05/13 10:25:02.383275, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x97709c64 (2540739684) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x1437c734 (339199796) > open_persistent_id : 0x000000001437c734 (339199796) > open_volatile_id : 0x0000000097709c64 (2540739684) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.384704, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [foo.txt] mid [144] >[2022/05/13 10:25:02.384784, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.384837, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.384902, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.384963, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.385024, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.385076, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.385173, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.385246, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.385332, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:177(unix_mode) > unix_mode: unix_mode(foo.txt) returning 0744 >[2022/05/13 10:25:02.385389, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3513(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, dos_attrs=0x80 access_mask=0x20081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2022/05/13 10:25:02.385499, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file foo.txt: Error = No data available >[2022/05/13 10:25:02.385565, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3696(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, after mapping access_mask=0x20081 >[2022/05/13 10:25:02.385622, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3796(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0744, access_mask = 0x20081, open_access_mask = 0x20081 >[2022/05/13 10:25:02.385686, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file foo.txt >[2022/05/13 10:25:02.385825, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1201(xid_to_sid) > xid_to_sid: UID 1000 -> S-1-5-21-2151563211-526390183-529952513-1000 from cache >[2022/05/13 10:25:02.385982, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.386061, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.386119, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.386211, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.386269, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.386452, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.386522, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 1000 -> S-1-22-2-1000 fallback >[2022/05/13 10:25:02.386591, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.386644, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.386712, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.386774, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.386843, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.387013, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2022/05/13 10:25:02.387075, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.387130, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.387230, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [foo.txt] requesting [0x20081] returning [0x20001] (NT_STATUS_ACCESS_DENIED) >[2022/05/13 10:25:02.387295, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: acl for foo.txt is: >[2022/05/13 10:25:02.387349, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > sd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2151563211-526390183-529952513-1000 > group_sid : * > group_sid : S-1-22-2-1000 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2151563211-526390183-529952513-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2022/05/13 10:25:02.389073, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1386(open_file) > open_file: smbd_check_access_rights_fsp on file foo.txt returned NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.389153, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6109(create_file_unixpath) > create_file_unixpath: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.389237, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.389291, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.389357, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 1437C734 >[2022/05/13 10:25:02.389415, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:02.389500, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 1437C734 >[2022/05/13 10:25:02.389552, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.389620, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 2540739684 (4 used) >[2022/05/13 10:25:02.389688, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (3 used) >[2022/05/13 10:25:02.389744, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6299(create_file_default) > create_file: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.389847, 3, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3954(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_ACCESS_DENIED] || at ../../source3/smbd/smb2_create.c:338 >[2022/05/13 10:25:02.389911, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [144] idx[1] status[NT_STATUS_ACCESS_DENIED] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4004 >[2022/05/13 10:25:02.389974, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/145/8192 >[2022/05/13 10:25:02.393703, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2022/05/13 10:25:02.393781, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 145 (position 145) from bitmap >[2022/05/13 10:25:02.393840, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 145 >[2022/05/13 10:25:02.393900, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.393961, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.394052, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.394123, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.394241, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [foo.txt] >[2022/05/13 10:25:02.394308, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.394370, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [foo.txt] >[2022/05/13 10:25:02.394436, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/statcache.c:324(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [0000000000000000@FOO.TXT] -> [foo.txt] >[2022/05/13 10:25:02.394507, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [foo.txt] -> [foo.txt] >[2022/05/13 10:25:02.394561, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.394629, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.394686, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.394741, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [foo.txt] >[2022/05/13 10:25:02.394831, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.394895, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/foo.txt hash 0x19ebfe34 >[2022/05/13 10:25:02.394956, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.395030, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.395086, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.395217, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name foo.txt, flags = 00 mode = 00, fd = 15 >[2022/05/13 10:25:02.395288, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [foo.txt]: OK >[2022/05/13 10:25:02.395345, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x20081 file_attributes = 0x80, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.395408, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x20081 file_attributes = 0x80 share_access = 0x7 create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.395477, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.395537, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.395601, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 1D4E322F >[2022/05/13 10:25:02.395660, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e5cf50 >[2022/05/13 10:25:02.395716, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.395807, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '1D4E322F' stored >[2022/05/13 10:25:02.395868, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x1d4e322f (491663919) > open_persistent_id : 0x000000001d4e322f (491663919) > open_volatile_id : 0x000000002da82bfd (765996029) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.396958, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 1D4E322F >[2022/05/13 10:25:02.397026, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.397084, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x1d4e322f) stored >[2022/05/13 10:25:02.397151, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x2da82bfd (765996029) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0x1d4e322f (491663919) > open_persistent_id : 0x000000001d4e322f (491663919) > open_volatile_id : 0x000000002da82bfd (765996029) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.398622, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [foo.txt] mid [145] >[2022/05/13 10:25:02.398703, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.398762, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.398826, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.398887, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.398951, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.399003, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.399082, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.399133, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.399217, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:177(unix_mode) > unix_mode: unix_mode(foo.txt) returning 0744 >[2022/05/13 10:25:02.399272, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3513(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, dos_attrs=0x80 access_mask=0x20081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2022/05/13 10:25:02.399371, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file foo.txt: Error = No data available >[2022/05/13 10:25:02.399434, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3696(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, after mapping access_mask=0x20081 >[2022/05/13 10:25:02.399490, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3796(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0744, access_mask = 0x20081, open_access_mask = 0x20081 >[2022/05/13 10:25:02.399553, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file foo.txt >[2022/05/13 10:25:02.399715, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1201(xid_to_sid) > xid_to_sid: UID 1000 -> S-1-5-21-2151563211-526390183-529952513-1000 from cache >[2022/05/13 10:25:02.399853, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.399925, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.399981, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.400038, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.400086, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.400297, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.400356, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 1000 -> S-1-22-2-1000 fallback >[2022/05/13 10:25:02.400413, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.400468, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.400536, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.400601, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.400668, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.400803, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2022/05/13 10:25:02.400865, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.400917, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.400985, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [foo.txt] requesting [0x20081] returning [0x20001] (NT_STATUS_ACCESS_DENIED) >[2022/05/13 10:25:02.401042, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: acl for foo.txt is: >[2022/05/13 10:25:02.401120, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > sd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2151563211-526390183-529952513-1000 > group_sid : * > group_sid : S-1-22-2-1000 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2151563211-526390183-529952513-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2022/05/13 10:25:02.402877, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1386(open_file) > open_file: smbd_check_access_rights_fsp on file foo.txt returned NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.402945, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6109(create_file_unixpath) > create_file_unixpath: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.403015, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.403077, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.403167, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 1D4E322F >[2022/05/13 10:25:02.403231, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:02.403312, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 1D4E322F >[2022/05/13 10:25:02.403360, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.403422, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 765996029 (4 used) >[2022/05/13 10:25:02.403492, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (3 used) >[2022/05/13 10:25:02.403551, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6299(create_file_default) > create_file: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.403620, 3, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3954(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_ACCESS_DENIED] || at ../../source3/smbd/smb2_create.c:338 >[2022/05/13 10:25:02.403680, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [145] idx[1] status[NT_STATUS_ACCESS_DENIED] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4004 >[2022/05/13 10:25:02.403738, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/146/8192 >[2022/05/13 10:25:02.405675, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2022/05/13 10:25:02.405767, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 146 (position 146) from bitmap >[2022/05/13 10:25:02.405870, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 146 >[2022/05/13 10:25:02.405939, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.405997, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.406091, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.406181, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.406281, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [foo.txt] >[2022/05/13 10:25:02.406350, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.406409, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [foo.txt] >[2022/05/13 10:25:02.406474, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/statcache.c:324(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [0000000000000000@FOO.TXT] -> [foo.txt] >[2022/05/13 10:25:02.406542, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [foo.txt] -> [foo.txt] >[2022/05/13 10:25:02.406598, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.406670, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.406729, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.406783, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [foo.txt] >[2022/05/13 10:25:02.406843, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.406903, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/foo.txt hash 0x19ebfe34 >[2022/05/13 10:25:02.406964, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.407030, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.407088, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.407193, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name foo.txt, flags = 00 mode = 00, fd = 15 >[2022/05/13 10:25:02.407258, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [foo.txt]: OK >[2022/05/13 10:25:02.407339, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x20081 file_attributes = 0x80, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.407411, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x20081 file_attributes = 0x80 share_access = 0x7 create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.407487, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.407546, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.407609, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key CF9C8FF4 >[2022/05/13 10:25:02.407704, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e566a0 >[2022/05/13 10:25:02.407764, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.407866, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'CF9C8FF4' stored >[2022/05/13 10:25:02.407923, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0xcf9c8ff4 (3483144180) > open_persistent_id : 0x00000000cf9c8ff4 (3483144180) > open_volatile_id : 0x00000000597af455 (1501230165) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.409042, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key CF9C8FF4 >[2022/05/13 10:25:02.409110, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.409190, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xcf9c8ff4) stored >[2022/05/13 10:25:02.409248, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x597af455 (1501230165) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0xcf9c8ff4 (3483144180) > open_persistent_id : 0x00000000cf9c8ff4 (3483144180) > open_volatile_id : 0x00000000597af455 (1501230165) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.410647, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [foo.txt] mid [146] >[2022/05/13 10:25:02.410733, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.410812, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.410878, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.410936, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.411003, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.411056, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.411156, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.411222, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.411282, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:177(unix_mode) > unix_mode: unix_mode(foo.txt) returning 0744 >[2022/05/13 10:25:02.411341, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3513(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, dos_attrs=0x80 access_mask=0x20081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2022/05/13 10:25:02.411454, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file foo.txt: Error = No data available >[2022/05/13 10:25:02.411512, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3696(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, after mapping access_mask=0x20081 >[2022/05/13 10:25:02.411566, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3796(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0744, access_mask = 0x20081, open_access_mask = 0x20081 >[2022/05/13 10:25:02.411624, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file foo.txt >[2022/05/13 10:25:02.411768, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1201(xid_to_sid) > xid_to_sid: UID 1000 -> S-1-5-21-2151563211-526390183-529952513-1000 from cache >[2022/05/13 10:25:02.411935, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.412015, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.412070, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.412122, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.412203, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.412389, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.412448, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 1000 -> S-1-22-2-1000 fallback >[2022/05/13 10:25:02.412540, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.412599, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.412663, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.412726, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.412793, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.412929, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2022/05/13 10:25:02.412984, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.413033, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.413108, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [foo.txt] requesting [0x20081] returning [0x20001] (NT_STATUS_ACCESS_DENIED) >[2022/05/13 10:25:02.413202, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: acl for foo.txt is: >[2022/05/13 10:25:02.413264, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > sd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2151563211-526390183-529952513-1000 > group_sid : * > group_sid : S-1-22-2-1000 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2151563211-526390183-529952513-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2022/05/13 10:25:02.415016, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1386(open_file) > open_file: smbd_check_access_rights_fsp on file foo.txt returned NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.415083, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6109(create_file_unixpath) > create_file_unixpath: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.415185, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.415248, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.415336, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key CF9C8FF4 >[2022/05/13 10:25:02.415399, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:02.415482, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key CF9C8FF4 >[2022/05/13 10:25:02.415534, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.415603, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 1501230165 (4 used) >[2022/05/13 10:25:02.415670, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (3 used) >[2022/05/13 10:25:02.415727, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6299(create_file_default) > create_file: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.415795, 3, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3954(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_ACCESS_DENIED] || at ../../source3/smbd/smb2_create.c:338 >[2022/05/13 10:25:02.415848, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [146] idx[1] status[NT_STATUS_ACCESS_DENIED] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4004 >[2022/05/13 10:25:02.415910, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/147/8192 >[2022/05/13 10:25:02.417993, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:4994(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2022/05/13 10:25:02.418071, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:712(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 147 (position 147) from bitmap >[2022/05/13 10:25:02.418131, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:2979(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 147 >[2022/05/13 10:25:02.418222, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2022/05/13 10:25:02.418278, 4, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:02.418371, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:02.418446, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:294(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(1000,1000), gid=(0,1000), cwd=[/pub] >[2022/05/13 10:25:02.418532, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:733(smbd_smb2_create_send) > smbd_smb2_create_send: name [foo.txt] >[2022/05/13 10:25:02.418598, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_create.c:842(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2022/05/13 10:25:02.418688, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:988(unix_convert) > unix_convert: Called on file [foo.txt] >[2022/05/13 10:25:02.418761, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/statcache.c:324(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [0000000000000000@FOO.TXT] -> [foo.txt] >[2022/05/13 10:25:02.418825, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/filename.c:1362(unix_convert) > unix_convert: Conversion finished [foo.txt] -> [foo.txt] >[2022/05/13 10:25:02.418883, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.418958, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.419013, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.419068, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [foo.txt] >[2022/05/13 10:25:02.419124, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (4 used) >[2022/05/13 10:25:02.419209, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/foo.txt hash 0x19ebfe34 >[2022/05/13 10:25:02.419275, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [foo.txt] [/pub] >[2022/05/13 10:25:02.419345, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [foo.txt] -> [/pub/foo.txt] >[2022/05/13 10:25:02.419398, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: foo.txt reduced to /pub/foo.txt >[2022/05/13 10:25:02.419482, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name foo.txt, flags = 00 mode = 00, fd = 15 >[2022/05/13 10:25:02.419546, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [foo.txt]: OK >[2022/05/13 10:25:02.419606, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6157(create_file_default) > create_file_default: create_file: access_mask = 0x20081 file_attributes = 0x80, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.419676, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:5596(create_file_unixpath) > create_file_unixpath: access_mask = 0x20081 file_attributes = 0x80 share_access = 0x7 create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = foo.txt >[2022/05/13 10:25:02.419748, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.419808, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.419872, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key E443DF0C >[2022/05/13 10:25:02.419932, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e5cf50 >[2022/05/13 10:25:02.420027, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:633(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record: empty value >[2022/05/13 10:25:02.420129, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:751(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'E443DF0C' stored >[2022/05/13 10:25:02.420224, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0xe443df0c (3829653260) > open_persistent_id : 0x00000000e443df0c (3829653260) > open_volatile_id : 0x000000003531697b (892430715) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2022/05/13 10:25:02.421301, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key E443DF0C >[2022/05/13 10:25:02.421381, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.421449, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_open.c:917(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xe443df0c) stored >[2022/05/13 10:25:02.421499, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x3531697b (892430715) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > open_global_id : 0xe443df0c (3829653260) > open_persistent_id : 0x00000000e443df0c (3829653260) > open_volatile_id : 0x000000003531697b (892430715) > open_owner : S-1-5-21-2151563211-526390183-529952513-3000 > open_time : Fri May 13 10:25:02 AM 2022 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Fri May 13 10:25:02 AM 2022 PDT > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2022/05/13 10:25:02.422844, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:133(fsp_bind_smb) > fsp_bind_smb: fsp [foo.txt] mid [147] >[2022/05/13 10:25:02.422912, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:449(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2022/05/13 10:25:02.422969, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:75(fsp_new) > fsp_new: allocated files structure (5 used) >[2022/05/13 10:25:02.423021, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1486(file_name_hash) > file_name_hash: /pub/. hash 0x6cf21a2c >[2022/05/13 10:25:02.423075, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1151(check_reduced_name) > check_reduced_name: check_reduced_name [.] [/pub] >[2022/05/13 10:25:02.423132, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1216(check_reduced_name) > check_reduced_name realpath [.] -> [/pub] >[2022/05/13 10:25:02.423201, 5, pid=11667, effective(1000, 1000), real(1000, 0), class=vfs] ../../source3/smbd/vfs.c:1334(check_reduced_name) > check_reduced_name: . reduced to /pub >[2022/05/13 10:25:02.423276, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:931(fd_openat) > fd_openat: name ., flags = 0200000 mode = 00, fd = 29 >[2022/05/13 10:25:02.423331, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:566(openat_pathref_fsp) > openat_pathref_fsp: fsp [.]: OK >[2022/05/13 10:25:02.423411, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:177(unix_mode) > unix_mode: unix_mode(foo.txt) returning 0744 >[2022/05/13 10:25:02.423447, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3513(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, dos_attrs=0x80 access_mask=0x20081 share_access=0x7 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2022/05/13 10:25:02.423511, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/dosmode.c:396(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file foo.txt: Error = No data available >[2022/05/13 10:25:02.423573, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3696(open_file_ntcreate) > open_file_ntcreate: fname=foo.txt, after mapping access_mask=0x20081 >[2022/05/13 10:25:02.423626, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:3796(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x800 mode=0744, access_mask = 0x20081, open_access_mask = 0x20081 >[2022/05/13 10:25:02.423682, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:3354(posix_fget_nt_acl) > posix_fget_nt_acl: called for file foo.txt >[2022/05/13 10:25:02.423798, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1201(xid_to_sid) > xid_to_sid: UID 1000 -> S-1-5-21-2151563211-526390183-529952513-1000 from cache >[2022/05/13 10:25:02.423910, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:206(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.423986, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/uid.c:566(push_conn_ctx) > push_conn_ctx(2098996033) : conn_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.424035, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2022/05/13 10:25:02.424077, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:02.424119, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:02.424309, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:443(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:02.424357, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/passdb/lookup_sid.c:1256(xid_to_sid) > xid_to_sid: GID 1000 -> S-1-22-2-1000 fallback >[2022/05/13 10:25:02.424405, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2022/05/13 10:25:02.424452, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.424508, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.424561, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2022/05/13 10:25:02.424618, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2151563211-526390183-529952513-1000 uid 1000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-1000 gid 1000 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >[2022/05/13 10:25:02.424761, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1e01ff >[2022/05/13 10:25:02.424814, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.424864, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=acls] ../../source3/smbd/posix_acls.c:1029(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >[2022/05/13 10:25:02.424927, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:183(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [foo.txt] requesting [0x20081] returning [0x20001] (NT_STATUS_ACCESS_DENIED) >[2022/05/13 10:25:02.424983, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:191(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: acl for foo.txt is: >[2022/05/13 10:25:02.425034, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > sd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-2151563211-526390183-529952513-1000 > group_sid : * > group_sid : S-1-22-2-1000 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001e01ff (1966591) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-2151563211-526390183-529952513-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-1000 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2022/05/13 10:25:02.426477, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:1386(open_file) > open_file: smbd_check_access_rights_fsp on file foo.txt returned NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.426543, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6109(create_file_unixpath) > create_file_unixpath: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.426604, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.426659, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:02.426718, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key E443DF0C >[2022/05/13 10:25:02.426771, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:02.426842, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key E443DF0C >[2022/05/13 10:25:02.426896, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:02.426956, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 892430715 (4 used) >[2022/05/13 10:25:02.427016, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 0 (3 used) >[2022/05/13 10:25:02.427068, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/open.c:6299(create_file_default) > create_file: NT_STATUS_ACCESS_DENIED >[2022/05/13 10:25:02.427172, 3, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3954(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_ACCESS_DENIED] || at ../../source3/smbd/smb2_create.c:338 >[2022/05/13 10:25:02.427232, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2] ../../source3/smbd/smb2_server.c:3840(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [147] idx[1] status[NT_STATUS_ACCESS_DENIED] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4004 >[2022/05/13 10:25:02.427289, 10, pid=11667, effective(1000, 1000), real(1000, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:969(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 256, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/148/8192 >[2022/05/13 10:25:15.686684, 4, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.686753, 5, pid=11654, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.686780, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.686833, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.686860, 4, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.686877, 5, pid=11654, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.686894, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.686926, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.686947, 4, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.686965, 5, pid=11654, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.686981, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.687013, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.687040, 4, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.687057, 5, pid=11654, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.687073, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.687106, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.687126, 4, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.687166, 5, pid=11654, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.687196, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.687228, 5, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.687281, 10, pid=11654, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2022/05/13 10:25:15.687632, 3, pid=11654, effective(0, 0), real(0, 0)] ../../source3/smbd/server_exit.c:229(exit_server_common) > Server exit (termination signal) >[2022/05/13 10:25:15.688324, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_client_global.tdb >[2022/05/13 10:25:15.688372, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_client_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.688398, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key C8A012F1300157EE9A5B >[2022/05/13 10:25:15.688435, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e1db50 >[2022/05/13 10:25:15.688457, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.688497, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_client.c:718(smbXsrv_client_global_remove) > smbXsrv_client_global_remove: key 'C8A012F1300157EE9A5B063E5F8D04A7' delete >[2022/05/13 10:25:15.688521, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_client_global.tdb >[2022/05/13 10:25:15.688540, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key C8A012F1300157EE9A5B >[2022/05/13 10:25:15.688567, 10, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/smbXsrv_client.c:1090(smbXsrv_client_remove) > smbXsrv_client_remove: client_guid[f112a0c8-0130-ee57-9a5b-063e5f8d04a7] stored >[2022/05/13 10:25:15.688586, 1, pid=11667, effective(1000, 1000), real(1000, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > local_address : 'ipv4:10.0.0.254:445' > remote_address : 'ipv4:10.0.0.82:59413' > remote_name : '10.0.0.82' > initial_connect_time : Fri May 13 10:22:01 AM 2022 PDT > client_guid : f112a0c8-0130-ee57-9a5b-063e5f8d04a7 > stored : 0x00 (0) > sconn : * > session_table : * > tcon_table : NULL > open_table : * > connections : * > server_multi_channel_enabled: 0x01 (1) > next_channel_id : 0x0000000000000002 (2) > connection_pass_subreq : NULL > pending_breaks : NULL >[2022/05/13 10:25:15.688853, 4, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.688872, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.688890, 5, pid=11667, effective(1000, 1000), real(1000, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.688942, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.689022, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.689045, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.689062, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.689095, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.689117, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.689133, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.689163, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.689194, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.689244, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.689276, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.689295, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:15.689314, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:15.689331, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.689355, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:15.689400, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:15.689419, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:15.689601, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:15.689622, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:15.689644, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2184(share_mode_entry_do) > share_mode_entry_do: num_share_modes=2 >[2022/05/13 10:25:15.689662, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=1, middle=0, middle_ptr=0x55d437e67b5e >[2022/05/13 10:25:15.689684, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2200(share_mode_entry_do) > share_mode_entry_do: entry[0]: >[2022/05/13 10:25:15.689702, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000055 (85) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:22:08 AM 2022 PDT.736574 > share_file_id : 0x0000000000000038 (56) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:15.689878, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2206(share_mode_entry_do) > share_mode_entry_do: entry[0]: modified=0, e.stale=1 >[2022/05/13 10:25:15.689896, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2240(share_mode_entry_do) > share_mode_entry_do: share_mode_entry: >[2022/05/13 10:25:15.689912, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000055 (85) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:22:08 AM 2022 PDT.736574 > share_file_id : 0x0000000000000038 (56) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x01 (1) >[2022/05/13 10:25:15.690068, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.690086, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.690104, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:644(share_mode_data_store) > share_mode_data_store: not modified >[2022/05/13 10:25:15.690121, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.690151, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.690173, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:15.690191, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/dir.c:349(dptr_CloseDir) > dptr_CloseDir: closing dptr key 0 >[2022/05/13 10:25:15.690219, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:15.690236, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.690256, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 6076AE4B >[2022/05/13 10:25:15.690273, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:15.690301, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 6076AE4B >[2022/05/13 10:25:15.690325, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:15.690348, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 1376345833 (2 used) >[2022/05/13 10:25:15.690367, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:15.690383, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.690402, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 6CD9A251 >[2022/05/13 10:25:15.690418, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:15.690440, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 6CD9A251 >[2022/05/13 10:25:15.690456, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:15.690496, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 961473012 (1 used) >[2022/05/13 10:25:15.690518, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.690536, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.690552, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/g_lock.c:807(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_OK >[2022/05/13 10:25:15.690569, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:15.690584, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/locking.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.690605, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:295(share_mode_memcache_fetch) > share_mode_memcache_fetch: failed to find entry for key 2052:1048577:0 >[2022/05/13 10:25:15.690633, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:621(parse_share_modes) > parse_share_modes: >[2022/05/13 10:25:15.690650, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x00 (0) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:15.690831, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:943(get_share_mode_lock) > get_share_mode_lock: Returning 2052:1048577:0 (data_refcount=1 key_refcount=1) >[2022/05/13 10:25:15.690850, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/locking.c:963(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x6cf21a2c >[2022/05/13 10:25:15.690870, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2184(share_mode_entry_do) > share_mode_entry_do: num_share_modes=1 >[2022/05/13 10:25:15.690886, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:1751(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0, middle_ptr=0x55d437e67b5e >[2022/05/13 10:25:15.690906, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2200(share_mode_entry_do) > share_mode_entry_do: entry[0]: >[2022/05/13 10:25:15.690922, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000050 (80) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:22:08 AM 2022 PDT.723359 > share_file_id : 0x0000000000000032 (50) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x00 (0) >[2022/05/13 10:25:15.691091, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2206(share_mode_entry_do) > share_mode_entry_do: entry[0]: modified=0, e.stale=1 >[2022/05/13 10:25:15.691107, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:2240(share_mode_entry_do) > share_mode_entry_do: share_mode_entry: >[2022/05/13 10:25:15.691122, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000002d93 (11667) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xecc38df273609b6d (-1386108187842667667) > op_mid : 0x0000000000000050 (80) > op_type : 0x0000 (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Fri May 13 10:22:08 AM 2022 PDT.723359 > share_file_id : 0x0000000000000032 (50) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x6cf21a2c (1827805740) > stale : 0x01 (1) >[2022/05/13 10:25:15.691299, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.691318, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.691334, 10, pid=11667, effective(0, 0), real(0, 0), class=locking] ../../source3/locking/share_mode_lock.c:649(share_mode_data_store) > share_mode_data_store: >[2022/05/13 10:25:15.691350, 1, pid=11667, effective(0, 0), real(0, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:435(ndr_print_debug) > d: struct share_mode_data > unique_content_epoch : 0xf19290b39178f3db (-1039609463054994469) > flags : 0x01c8 (456) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 0: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 1: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/pub' > base_name : * > base_name : '.' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > fresh : 0x00 (0) > modified : 0x01 (1) > id: struct file_id > devid : 0x0000000000000804 (2052) > inode : 0x0000000000100001 (1048577) > extid : 0x0000000000000000 (0) >[2022/05/13 10:25:15.691521, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.691540, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.691559, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.691575, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:426(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned NT_STATUS_OK >[2022/05/13 10:25:15.691591, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/locking.tdb >[2022/05/13 10:25:15.691668, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:15.691693, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.691716, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 2778008B >[2022/05/13 10:25:15.691731, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e607c0 >[2022/05/13 10:25:15.691753, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 2778008B >[2022/05/13 10:25:15.691766, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_open_global.tdb >[2022/05/13 10:25:15.691785, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/files.c:1279(file_free) > file_free: freed files structure 1192232467 (0 used) >[2022/05/13 10:25:15.691802, 4, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /pub >[2022/05/13 10:25:15.691830, 5, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /pub >[2022/05/13 10:25:15.691847, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.691861, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.691874, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.691907, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.691923, 2, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:1125(close_cnum) > alderaan (ipv4:10.0.0.82:59413) closed connection to service pub >[2022/05/13 10:25:15.691942, 4, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to / >[2022/05/13 10:25:15.691963, 5, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got / >[2022/05/13 10:25:15.691982, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.691995, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.692006, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.692030, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.692055, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_tcon_global.tdb >[2022/05/13 10:25:15.692068, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.692084, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key C0E735E2 >[2022/05/13 10:25:15.692109, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e614d0 >[2022/05/13 10:25:15.692152, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key C0E735E2 >[2022/05/13 10:25:15.692175, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_tcon_global.tdb >[2022/05/13 10:25:15.692191, 4, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to /tmp >[2022/05/13 10:25:15.692214, 5, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /tmp >[2022/05/13 10:25:15.692228, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.692241, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.692253, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.692279, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.692294, 3, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/service.c:1125(close_cnum) > alderaan (ipv4:10.0.0.82:59413) closed connection to service IPC$ >[2022/05/13 10:25:15.692309, 4, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:938(vfs_ChDir) > vfs_ChDir to / >[2022/05/13 10:25:15.692329, 5, pid=11667, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1000(vfs_ChDir) > vfs_ChDir: vfs_ChDir got / >[2022/05/13 10:25:15.692344, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.692357, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.692375, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.692397, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.692416, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_tcon_global.tdb >[2022/05/13 10:25:15.692427, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.692441, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key E3DC864F >[2022/05/13 10:25:15.692454, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e614d0 >[2022/05/13 10:25:15.692473, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key E3DC864F >[2022/05/13 10:25:15.692482, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_tcon_global.tdb >[2022/05/13 10:25:15.692493, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:143(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/lib/samba/lock/smbXsrv_session_global.tdb >[2022/05/13 10:25:15.692501, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:128(debug_lock_order) > lock order: 1:/var/lib/samba/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2022/05/13 10:25:15.692515, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 7D1C2341 >[2022/05/13 10:25:15.692545, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x55d437e6b060 >[2022/05/13 10:25:15.692555, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:452(dbwrap_watched_subrec_wakeup_fn) > dbwrap_watched_subrec_wakeup_fn: No watchers >[2022/05/13 10:25:15.692571, 5, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:175(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/lib/samba/lock/smbXsrv_session_global.tdb >[2022/05/13 10:25:15.692580, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 7D1C2341 >[2022/05/13 10:25:15.692589, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.692597, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.692605, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.692621, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.692630, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/process.c:3769(smbXsrv_connection_destructor) > smbXsrv_connection_destructor: xconn[ptr=0x55d437e4f8e0,id=1,addr=ipv4:10.0.0.82:59413] >[2022/05/13 10:25:15.692643, 4, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:317(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2022/05/13 10:25:15.692651, 5, pid=11667, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:47(security_token_debug) > Security token: (NULL) >[2022/05/13 10:25:15.692661, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:873(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2022/05/13 10:25:15.692676, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:494(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2022/05/13 10:25:15.692686, 5, pid=11667, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:764(messaging_deregister) > Deregistering messaging pointer for type 784 - private_data=0x55d437e6a530 >[2022/05/13 10:25:15.692706, 10, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1222(smbXsrv_session_destructor) > smbXsrv_session_destructor: destructing session(2098996033) >[2022/05/13 10:25:15.692732, 10, pid=11667, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2022/05/13 10:25:15.692907, 3, pid=11667, effective(0, 0), real(0, 0)] ../../source3/smbd/server_exit.c:229(exit_server_common) > Server exit (termination signal)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 15065
: 17288 |
17289