The Samba-Bugzilla – Attachment 18239 Details for
Bug 15564
Removal of symlink to directory fails with NT_STATUS_OBJECT_NAME_NOT_FOUND
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
level 10 logfile
log.smbd (text/plain), 288.29 KB, created by
Björn Baumbach
on 2024-01-30 20:02:08 UTC
(
hide
)
Description:
level 10 logfile
Filename:
MIME Type:
Creator:
Björn Baumbach
Created:
2024-01-30 20:02:08 UTC
Size:
288.29 KB
patch
obsolete
>[2024/01/30 20:15:13.945181, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2024/01/30 20:15:13.945332, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:80(messaging_dgm_ref) > messaging_dgm_ref: messaging_dgm_init returned Success >[2024/01/30 20:15:13.945348, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:109(messaging_dgm_ref) > messaging_dgm_ref: unique = 12098218104817189090 >[2024/01/30 20:15:13.945356, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/tallocmsg.c:84(register_msg_pool_usage) > register_msg_pool_usage: Registered MSG_REQ_POOL_USAGE >[2024/01/30 20:15:13.945374, 5, pid=19063, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:157(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2024/01/30 20:15:13.945384, 5, pid=19063, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:178(make_pdb_method_name) > Found pdb backend tdbsam >[2024/01/30 20:15:13.945399, 5, pid=19063, effective(0, 0), real(0, 0), class=passdb] ../../source3/passdb/pdb_interface.c:190(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2024/01/30 20:15:13.945432, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:1007(smbXsrv_client_create) > smbXsrv_client_create: client_guid[00000000-0000-0000-0000-000000000000] created >[2024/01/30 20:15:13.945441, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_client.c:1008(smbXsrv_client_create) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > local_address : NULL > remote_address : NULL > remote_name : NULL > initial_connect_time : Tue Jan 30 08:15:14 PM 2024 CET > client_guid : 00000000-0000-0000-0000-000000000000 > stored : 0x00 (0) > sconn : NULL > session_table : NULL > tcon_table : NULL > open_table : NULL > connections : NULL > server_multi_channel_enabled: 0x01 (1) > next_channel_id : 0x0000000000000001 (1) > connection_pass_subreq : NULL > connection_drop_subreq : NULL > pending_breaks : NULL >[2024/01/30 20:15:13.945576, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1017(print_socket_options) > socket options: SO_KEEPALIVE=1, SO_REUSEADDR=1, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=1, SO_SNDBUF=2626560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0 >[2024/01/30 20:15:13.945599, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/util_net.c:1017(print_socket_options) > socket options: SO_KEEPALIVE=1, SO_REUSEADDR=1, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=1, SO_SNDBUF=2626560, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0 >[2024/01/30 20:15:13.945627, 3, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/access.c:374(allow_access) > Allowed connection from 172.18.200.42 (172.18.200.42) >[2024/01/30 20:15:13.945632, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_process.c:1358(smbd_add_connection) > Connection allowed from ipv4:172.18.200.42:36492 to ipv4:172.18.200.42:445 >[2024/01/30 20:15:13.945657, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:931(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2024/01/30 20:15:13.945717, 6, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2400(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: 2024-01-30 20:04:50.989265457 >[2024/01/30 20:15:13.945730, 3, pid=19063, effective(0, 0), real(0, 0), class=locking] ../../source3/smbd/smb2_oplock.c:1408(init_oplocks) > init_oplocks: initializing messages. >[2024/01/30 20:15:13.945734, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 774 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945739, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 778 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945743, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 770 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945746, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 801 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945753, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 787 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945757, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 779 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945761, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2024/01/30 20:15:13.945765, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:733(messaging_register) > Overriding messaging pointer for type 15 - private_data=(nil) >[2024/01/30 20:15:13.945769, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:765(messaging_deregister) > Deregistering messaging pointer for type 16 - private_data=(nil) >[2024/01/30 20:15:13.945773, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 16 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945777, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:765(messaging_deregister) > Deregistering messaging pointer for type 33 - private_data=0x5610adda9e90 >[2024/01/30 20:15:13.945783, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 33 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945787, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:765(messaging_deregister) > Deregistering messaging pointer for type 790 - private_data=(nil) >[2024/01/30 20:15:13.945790, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 790 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.945794, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:765(messaging_deregister) > Deregistering messaging pointer for type 791 - private_data=(nil) >[2024/01/30 20:15:13.945798, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:765(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2024/01/30 20:15:13.945801, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2024/01/30 20:15:13.945807, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x5610addaf250 >[2024/01/30 20:15:13.945812, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x5610addafb70 >[2024/01/30 20:15:13.945816, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util_event.c:100(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x5610add94b00 >[2024/01/30 20:15:13.945836, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util_sock.c:180(read_smb_length_return_keepalive) > got smb length of 234 >[2024/01/30 20:15:13.945846, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:4610(smbd_smb2_process_negprot) > smbd_smb2_first_negprot: packet length 234 >[2024/01/30 20:15:13.945856, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 0 (position 0) from bitmap >[2024/01/30 20:15:13.945862, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 0 >[2024/01/30 20:15:13.945870, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.945875, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.945885, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.945901, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.945922, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.945931, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.945935, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.945939, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.945945, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.945968, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.945973, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:1083(set_remote_arch) > set_remote_arch: Client arch is 'Vista' >[2024/01/30 20:15:13.945977, 3, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_negprot.c:345(smbd_smb2_request_process_negprot) > Selected protocol SMB3_11 >[2024/01/30 20:15:13.945983, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:931(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2024/01/30 20:15:13.946037, 6, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2400(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: 2024-01-30 20:04:50.989265457 >[2024/01/30 20:15:13.946046, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:576(make_auth3_context_for_ntlm) > make_auth3_context_for_ntlm: Making default auth method list for server role = 'domain member' >[2024/01/30 20:15:13.946056, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend anonymous >[2024/01/30 20:15:13.946064, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'anonymous' >[2024/01/30 20:15:13.946069, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend sam >[2024/01/30 20:15:13.946073, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'sam' >[2024/01/30 20:15:13.946076, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2024/01/30 20:15:13.946080, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2024/01/30 20:15:13.946083, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend sam_netlogon3 >[2024/01/30 20:15:13.946087, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'sam_netlogon3' >[2024/01/30 20:15:13.946091, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend winbind >[2024/01/30 20:15:13.946114, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'winbind' >[2024/01/30 20:15:13.946117, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend unix >[2024/01/30 20:15:13.946121, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'unix' >[2024/01/30 20:15:13.946130, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:52(smb_register_auth) > Attempting to register auth backend samba4 >[2024/01/30 20:15:13.946135, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:64(smb_register_auth) > Successfully added auth method 'samba4' >[2024/01/30 20:15:13.946138, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2024/01/30 20:15:13.946143, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2024/01/30 20:15:13.946146, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2024/01/30 20:15:13.946150, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method sam has a valid init >[2024/01/30 20:15:13.946154, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match winbind >[2024/01/30 20:15:13.946157, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method winbind has a valid init >[2024/01/30 20:15:13.946161, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2024/01/30 20:15:13.946165, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2024/01/30 20:15:13.947501, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2024/01/30 20:15:13.947516, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2024/01/30 20:15:13.947521, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2024/01/30 20:15:13.947526, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'spnego' registered >[2024/01/30 20:15:13.947530, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'schannel' registered >[2024/01/30 20:15:13.947534, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'ncalrpc_as_system' registered >[2024/01/30 20:15:13.947538, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'sasl-EXTERNAL' registered >[2024/01/30 20:15:13.947541, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'ntlmssp' registered >[2024/01/30 20:15:13.947545, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'ntlmssp_resume_ccache' registered >[2024/01/30 20:15:13.947549, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'http_basic' registered >[2024/01/30 20:15:13.947553, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'http_ntlm' registered >[2024/01/30 20:15:13.947561, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'http_negotiate' registered >[2024/01/30 20:15:13.947565, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'krb5' registered >[2024/01/30 20:15:13.947569, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:1084(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2024/01/30 20:15:13.947621, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:846(gensec_start_mech) > Starting GENSEC mechanism spnego >[2024/01/30 20:15:13.947637, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:846(gensec_start_mech) > Starting GENSEC submechanism gse_krb5 >[2024/01/30 20:15:13.947998, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:458(gensec_update_send) > gensec_update_send: spnego[0x5610addcb210]: subreq: 0x5610addccb30 >[2024/01/30 20:15:13.948012, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:551(gensec_update_done) > gensec_update_done: spnego[0x5610addcb210]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5610addccb30/../../auth/gensec/spnego.c:1632]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5610addccd10)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2024/01/30 20:15:13.948052, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_client_global.tdb >[2024/01/30 20:15:13.948061, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_client_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.948069, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 19A641C2F2160442A228 >[2024/01/30 20:15:13.948082, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addc19e0 >[2024/01/30 20:15:13.948098, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.948156, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:478(smbXsrv_client_global_store) > smbXsrv_client_global_store: key '19A641C2F2160442A22899FDB68B8419' stored >[2024/01/30 20:15:13.948162, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_client.c:479(smbXsrv_client_global_store) > &global_blob: struct smbXsrv_client_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_client_globalU(case 0) > info0 : * > info0: struct smbXsrv_client_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > initial_connect_time : Tue Jan 30 08:15:14 PM 2024 CET > client_guid : c241a619-16f2-4204-a228-99fdb68b8419 > stored : 0x01 (1) >[2024/01/30 20:15:13.948210, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_client_global.tdb >[2024/01/30 20:15:13.948218, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 19A641C2F2160442A228 >[2024/01/30 20:15:13.948222, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.948229, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:614(smb2srv_client_mc_negprot_next) > smb2srv_client_mc_negprot_next: client_guid[c241a619-16f2-4204-a228-99fdb68b8419] stored >[2024/01/30 20:15:13.948233, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_client.c:615(smb2srv_client_mc_negprot_next) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > initial_connect_time : Tue Jan 30 08:15:14 PM 2024 CET > client_guid : c241a619-16f2-4204-a228-99fdb68b8419 > stored : 0x01 (1) > sconn : * > session_table : * > tcon_table : NULL > open_table : * > connections : * > server_multi_channel_enabled: 0x01 (1) > next_channel_id : 0x0000000000000002 (2) > connection_pass_subreq : * > connection_drop_subreq : * > pending_breaks : NULL >[2024/01/30 20:15:13.948310, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [0] idx[1] status[NT_STATUS_OK] body[64] dyn[yes:172] at ../../source3/smbd/smb2_negprot.c:919 >[2024/01/30 20:15:13.948319, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 31, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/1/1 >[2024/01/30 20:15:13.971688, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.971708, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 1 (position 1) from bitmap >[2024/01/30 20:15:13.971715, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 1 >[2024/01/30 20:15:13.971729, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.971734, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.971738, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.971749, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.971765, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.971770, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.971776, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.971797, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addcd180 >[2024/01/30 20:15:13.971818, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.971886, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:975(smbXsrv_session_global_store) > smbXsrv_session_global_store: smbXsrv_session_global_store: key '4112976E' stored >[2024/01/30 20:15:13.971891, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:976(smbXsrv_session_global_store) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) >[2024/01/30 20:15:13.972012, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.972018, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.972022, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.972028, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1404(smbXsrv_session_create) > smbXsrv_session_create: smbXsrv_session_create: global_id (0x4112976e) stored >[2024/01/30 20:15:13.972032, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:1405(smbXsrv_session_create) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x4112976e (1091737454) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2024/01/30 20:15:13.972177, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:576(make_auth3_context_for_ntlm) > make_auth3_context_for_ntlm: Making default auth method list for server role = 'domain member' >[2024/01/30 20:15:13.972184, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match anonymous >[2024/01/30 20:15:13.972190, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method anonymous has a valid init >[2024/01/30 20:15:13.972194, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2024/01/30 20:15:13.972197, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method sam has a valid init >[2024/01/30 20:15:13.972201, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match winbind >[2024/01/30 20:15:13.972205, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method winbind has a valid init >[2024/01/30 20:15:13.972209, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:437(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam_ignoredomain >[2024/01/30 20:15:13.972212, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:462(load_auth_module) > load_auth_module: auth method sam_ignoredomain has a valid init >[2024/01/30 20:15:13.972258, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:846(gensec_start_mech) > Starting GENSEC mechanism spnego >[2024/01/30 20:15:13.972270, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.972277, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.972283, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.972288, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610add946d0 >[2024/01/30 20:15:13.972300, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.972307, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:975(smbXsrv_session_global_store) > smbXsrv_session_global_store: smbXsrv_session_global_store: key '4112976E' stored >[2024/01/30 20:15:13.972311, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:976(smbXsrv_session_global_store) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) >[2024/01/30 20:15:13.972419, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.972424, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.972428, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.972434, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1508(smbXsrv_session_update) > smbXsrv_session_update: smbXsrv_session_update: global_id (0x4112976e) stored >[2024/01/30 20:15:13.972438, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:1509(smbXsrv_session_update) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x4112976e (1091737454) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > channel_id : 0x0000000000000001 (1) >[2024/01/30 20:15:13.972603, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.972608, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.972612, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.972616, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.972620, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.972644, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec_start.c:846(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2024/01/30 20:15:13.972655, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >[2024/01/30 20:15:13.972829, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../auth/ntlmssp/ntlmssp_server.c:152(gensec_ntlmssp_server_negotiate) > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : * > DomainName : '' > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : * > Workstation : '' > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2024/01/30 20:15:13.972954, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../auth/ntlmssp/ntlmssp_server.c:278(gensec_ntlmssp_server_negotiate) > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0008 (8) > TargetNameMaxLen : 0x0008 (8) > TargetName : * > TargetName : 'TEMP' > NegotiateFlags : 0x62898215 (1653178901) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 1: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > ServerChallenge : cfb08d24333ab59b > Reserved : 0000000000000000 > TargetInfoLen : 0x005a (90) > TargetInfoMaxLen : 0x005a (90) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000006 (6) > pair: ARRAY(6) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'TEMP' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'DM9' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0012 (18) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'temp.test' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x001a (26) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'dm9.temp.test' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Tue Jan 30 08:15:14 PM 2024 CET > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) > ProductBuild : 0x0000 (0) > Reserved : 000000 > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) >[2024/01/30 20:15:13.973110, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:458(gensec_update_send) > gensec_update_send: ntlmssp[0x5610addce5a0]: subreq: 0x5610add973e0 >[2024/01/30 20:15:13.973115, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:458(gensec_update_send) > gensec_update_send: spnego[0x5610addcc2d0]: subreq: 0x5610addd1220 >[2024/01/30 20:15:13.973132, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.973148, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:551(gensec_update_done) > gensec_update_done: ntlmssp[0x5610addce5a0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5610add973e0/../../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5610add975c0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215] >[2024/01/30 20:15:13.973162, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:551(gensec_update_done) > gensec_update_done: spnego[0x5610addcc2d0]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x5610addd1220/../../auth/gensec/spnego.c:1632]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5610addd1400)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2024/01/30 20:15:13.973168, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.973174, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.973178, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.973182, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.973186, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.973194, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.973199, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [1] idx[1] status[NT_STATUS_MORE_PROCESSING_REQUIRED] body[8] dyn[yes:185] at ../../source3/smbd/smb2_sesssetup.c:184 >[2024/01/30 20:15:13.973205, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 8192, charge 1, granted 1, current possible/max 8192/8192, total granted/max/low/range 1/8192/2/1 >[2024/01/30 20:15:13.973386, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.973393, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 2 (position 2) from bitmap >[2024/01/30 20:15:13.973398, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 2 >[2024/01/30 20:15:13.973403, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.973408, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.973413, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.973419, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610add946d0 >[2024/01/30 20:15:13.973428, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.973435, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:975(smbXsrv_session_global_store) > smbXsrv_session_global_store: smbXsrv_session_global_store: key '4112976E' stored >[2024/01/30 20:15:13.973440, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:976(smbXsrv_session_global_store) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) >[2024/01/30 20:15:13.973550, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.973555, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.973560, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.973566, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1508(smbXsrv_session_update) > smbXsrv_session_update: smbXsrv_session_update: global_id (0x4112976e) stored >[2024/01/30 20:15:13.973570, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:1509(smbXsrv_session_update) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x4112976e (1091737454) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > channel_id : 0x0000000000000001 (1) >[2024/01/30 20:15:13.973738, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.973742, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.973746, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.973753, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.973758, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.973762, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.973767, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.973772, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610add946d0 >[2024/01/30 20:15:13.973780, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.973786, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:975(smbXsrv_session_global_store) > smbXsrv_session_global_store: smbXsrv_session_global_store: key '4112976E' stored >[2024/01/30 20:15:13.973791, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:976(smbXsrv_session_global_store) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000004 (4) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) >[2024/01/30 20:15:13.973893, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.973898, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.973902, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.973907, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1508(smbXsrv_session_update) > smbXsrv_session_update: smbXsrv_session_update: global_id (0x4112976e) stored >[2024/01/30 20:15:13.973911, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:1509(smbXsrv_session_update) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x4112976e (1091737454) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : NTTIME(0) > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0000 (0) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0000 (0) > signing_key : NULL > encryption_key : NULL > decryption_key : NULL > application_key : NULL > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : NULL > auth_session_info_seqnum : 0x00000000 (0) > connection : * > signing_algo : 0x0000 (0) > encryption_cipher : 0x0000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > nonce_high_random : 0x0000000000000000 (0) > nonce_high_max : 0x0000000000000000 (0) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : * > pending_auth: struct smbXsrv_session_auth0 > prev : * > next : NULL > session : * > connection : * > gensec : * > preauth : * > in_flags : 0x00 (0) > in_security_mode : 0x01 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > channel_id : 0x0000000000000001 (1) >[2024/01/30 20:15:13.974075, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.974079, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.974083, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.974087, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.974090, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.974118, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../auth/ntlmssp/ntlmssp_server.c:503(ntlmssp_server_preauth) > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24) > v1: struct LM_RESPONSE > Response : 000000000000000000000000000000000000000000000000 > NtChallengeResponseLen : 0x00fe (254) > NtChallengeResponseMaxLen: 0x00fe (254) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 254) > v2: struct NTLMv2_RESPONSE > Response : bcc243345f4aad49ee5101291a92c69e > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Tue Jan 30 08:15:14 PM 2024 CET > ChallengeFromClient : 4321e73019557a52 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'TEMP' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'DM9' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0012 (18) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'temp.test' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x001a (26) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'dm9.temp.test' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Tue Jan 30 08:15:14 PM 2024 CET > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000000 (0) > TokenIL : 0x00000000 (0) > MachineId : cde111d626ef546ff4f53131c9489a300fcb245b717c1c0d843a0502f3610bb7 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0024 (36) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/dm9.temp.test' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x0008 (8) > DomainNameMaxLen : 0x0008 (8) > DomainName : * > DomainName : 'TEMP' > UserNameLen : 0x0004 (4) > UserNameMaxLen : 0x0004 (4) > UserName : * > UserName : 'bb' > WorkstationLen : 0x0006 (6) > WorkstationMaxLen : 0x0006 (6) > Workstation : * > Workstation : 'DM9' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 > [0000] 4E 2C B3 CF 56 55 F6 68 AE 89 0A 4C 38 57 F1 D0 N,..VU.h ...L8W.. > NegotiateFlags : 0x62088215 (1644724757) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 0: NTLMSSP_NEGOTIATE_56 > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1) > ProductBuild : 0x0000 (0) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2024/01/30 20:15:13.974418, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:513(ntlmssp_server_preauth) > Got user=[bb] domain=[TEMP] workstation=[DM9] len1=24 len2=254 >[2024/01/30 20:15:13.974431, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../auth/ntlmssp/ntlmssp_server.c:553(ntlmssp_server_preauth) > &v2_resp: struct NTLMv2_RESPONSE > Response : bcc243345f4aad49ee5101291a92c69e > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Tue Jan 30 08:15:14 PM 2024 CET > ChallengeFromClient : 4321e73019557a52 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x0000000a (10) > pair: ARRAY(10) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'TEMP' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0006 (6) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'DM9' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0012 (18) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'temp.test' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x001a (26) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'dm9.temp.test' > pair: struct AV_PAIR > AvId : MsvAvTimestamp (0x7) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x7) > AvTimestamp : Tue Jan 30 08:15:14 PM 2024 CET > pair: struct AV_PAIR > AvId : MsvAvFlags (0x6) > AvLen : 0x0004 (4) > Value : union ntlmssp_AvValue(case 0x6) > AvFlags : 0x00000002 (2) > 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT > 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE > 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE > pair: struct AV_PAIR > AvId : MsvAvSingleHost (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvSingleHost: struct ntlmssp_SingleHostData > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > token_info: struct LSAP_TOKEN_INFO_INTEGRITY > Flags : 0x00000000 (0) > TokenIL : 0x00000000 (0) > MachineId : cde111d626ef546ff4f53131c9489a300fcb245b717c1c0d843a0502f3610bb7 > remaining : DATA_BLOB length=0 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0024 (36) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/dm9.temp.test' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) >[2024/01/30 20:15:13.974591, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_util.c:126(make_user_info_map) > Mapping user [TEMP]\[bb] from workstation [DM9] >[2024/01/30 20:15:13.974598, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:64(make_user_info) > attempting to make a user_info for bb (bb) >[2024/01/30 20:15:13.974602, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:72(make_user_info) > making strings for bb's user_info struct >[2024/01/30 20:15:13.974607, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:117(make_user_info) > making blobs for bb's user_info struct >[2024/01/30 20:15:13.974611, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/user_info.c:163(make_user_info) > made a user_info for bb (bb) >[2024/01/30 20:15:13.974615, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:206(auth_check_ntlm_password) > auth_check_ntlm_password: check_ntlm_password: Checking password for unmapped user [TEMP]\[bb]@[DM9] with the new password interface >[2024/01/30 20:15:13.974620, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:211(auth_check_ntlm_password) > auth_check_ntlm_password: check_ntlm_password: mapped user is: [TEMP]\[bb]@[DM9] >[2024/01/30 20:15:13.974624, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:221(auth_check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2024/01/30 20:15:13.974627, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:223(auth_check_ntlm_password) > challenge is: >[2024/01/30 20:15:13.974631, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/util.c:578(dump_data) > [0000] CF B0 8D 24 33 3A B5 9B ...$3:.. >[2024/01/30 20:15:13.974639, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_builtin.c:42(check_anonymous_security) > Check auth for: [bb] >[2024/01/30 20:15:13.974643, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:256(auth_check_ntlm_password) > auth_check_ntlm_password: anonymous had nothing to say >[2024/01/30 20:15:13.974647, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_sam.c:117(auth_samstrict_auth) > auth_samstrict_auth: Check auth for: [TEMP]\[bb] >[2024/01/30 20:15:13.974654, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:997(is_myname) > is_myname: is_myname("TEMP") returns 0 >[2024/01/30 20:15:13.974658, 6, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_sam.c:139(auth_samstrict_auth) > check_samstrict_security: TEMP is not one of my local names (ROLE_DOMAIN_MEMBER) >[2024/01/30 20:15:13.974662, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:256(auth_check_ntlm_password) > auth_check_ntlm_password: sam had nothing to say >[2024/01/30 20:15:13.974666, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth_winbind.c:51(check_winbind_security) > Check auth for: [bb] >[2024/01/30 20:15:13.974670, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2024/01/30 20:15:13.974674, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.974678, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2024/01/30 20:15:13.974681, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.974685, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.979910, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.979930, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:182(Get_Pwnam_alloc) > Finding user TEMP\bb >[2024/01/30 20:15:13.979935, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:121(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is temp\bb >[2024/01/30 20:15:13.984963, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:160(Get_Pwnam_internals) > Get_Pwnam_internals did find user [TEMP\bb]! >[2024/01/30 20:15:13.984974, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/util.c:997(is_myname) > is_myname: is_myname("TEMP") returns 0 >[2024/01/30 20:15:13.984985, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:275(auth_check_ntlm_password) > auth_check_ntlm_password: winbind authentication for user [bb] succeeded >[2024/01/30 20:15:13.984992, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2024/01/30 20:15:13.984998, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.985002, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2024/01/30 20:15:13.985006, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.985009, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.985019, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.985023, 5, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:302(auth_check_ntlm_password) > check_ntlm_password: PAM Account for user [TEMP\bb] succeeded >[2024/01/30 20:15:13.985034, 3, pid=19063, effective(0, 0), real(0, 0), class=auth_audit] ../../auth/auth_log.c:876(log_authentication_event_human_readable) > Auth: [SMB2,(null)] user [TEMP]\[bb] at [Tue, 30 Jan 2024 20:15:13.985028 CET] with [NTLMv2] status [NT_STATUS_OK] workstation [DM9] remote host [ipv4:172.18.200.42:36492] became [TEMP]\[bb] [S-1-5-21-2571242865-2718945573-3960193438-1125]. local host [ipv4:172.18.200.42:445] > {"timestamp": "2024-01-30T20:15:13.985087+0100", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 3}, "eventId": 4624, "logonId": "0", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "ipv4:172.18.200.42:445", "remoteAddress": "ipv4:172.18.200.42:36492", "serviceDescription": "SMB2", "authDescription": null, "clientDomain": "TEMP", "clientAccount": "bb", "workstation": "DM9", "becameAccount": "bb", "becameDomain": "TEMP", "becameSid": "S-1-5-21-2571242865-2718945573-3960193438-1125", "mappedAccount": "bb", "mappedDomain": "TEMP", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "clientPolicyAccessCheck": null, "serverPolicyAccessCheck": null, "duration": 12907}} >[2024/01/30 20:15:13.985117, 2, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/auth.c:338(auth_check_ntlm_password) > check_ntlm_password: authentication for user [bb] -> [bb] -> [TEMP\bb] succeeded >[2024/01/30 20:15:13.985132, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:3999(lp_load_ex) > lp_load_ex: refreshing parameters >[2024/01/30 20:15:13.985142, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1408(free_param_opts) > Freeing parametrics: >[2024/01/30 20:15:13.985181, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:559(init_globals) > Initialising global parameters >[2024/01/30 20:15:13.985226, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2901(lp_do_section) > Processing section "[global]" > doing parameter realm = TEMP.TEST > doing parameter workgroup = TEMP > doing parameter security = ADS > doing parameter idmap config * : backend = tdb > doing parameter idmap config * : range = 10000 - 19999 > doing parameter idmap config TEMP : backend = rid > doing parameter idmap config TEMP : range = 20000 - 29999 > doing parameter log level = 10 >[2024/01/30 20:15:13.985284, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:931(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 > doing parameter max log size = 0 > doing parameter template shell = /bin/bash >[2024/01/30 20:15:13.985347, 2, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2918(lp_do_section) > Processing section "[share]" > doing parameter path = /share > doing parameter writeable = true >[2024/01/30 20:15:13.985367, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4041(lp_load_ex) > pm_process() returned Yes >[2024/01/30 20:15:13.985373, 7, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4376(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2024/01/30 20:15:13.985379, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:1685(lp_add_ipc) > adding IPC service >[2024/01/30 20:15:13.985390, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/auth_ntlmssp.c:264(auth3_check_password_send) > auth3_check_password_send: Got NT session key of length 16 >[2024/01/30 20:15:13.985398, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/auth_ntlmssp.c:273(auth3_check_password_send) > auth3_check_password_send: Got LM session key of length 8 >[2024/01/30 20:15:13.985404, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:458(gensec_update_send) > gensec_update_send: ntlmssp[0x5610addce5a0]: subreq: 0x5610add973e0 >[2024/01/30 20:15:13.985408, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:458(gensec_update_send) > gensec_update_send: spnego[0x5610addcc2d0]: subreq: 0x5610adddcc30 >[2024/01/30 20:15:13.985416, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.985428, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_server.c:972(ntlmssp_server_postauth) > ntlmssp_server_auth: Using unmodified nt session key. >[2024/01/30 20:15:13.985468, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:623(ntlmssp_sign_reset) > NTLMSSP Sign/Seal - Initialising with flags: >[2024/01/30 20:15:13.985472, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >[2024/01/30 20:15:13.985494, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP send seal arc4 state: > >[2024/01/30 20:15:13.985503, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP recv seal arc4 state: > >[2024/01/30 20:15:13.985511, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:551(gensec_update_done) > gensec_update_done: ntlmssp[0x5610addce5a0]: NT_STATUS_OK tevent_req[0x5610add973e0/../../auth/ntlmssp/ntlmssp.c:181]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x5610add975c0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:244] >[2024/01/30 20:15:13.985520, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:320(ntlmssp_check_packet) > ntlmssp_check_packet: NTLMSSP signature OK ! >[2024/01/30 20:15:13.985528, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:623(ntlmssp_sign_reset) > NTLMSSP Sign/Seal - Initialising with flags: >[2024/01/30 20:15:13.985531, 3, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_util.c:72(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >[2024/01/30 20:15:13.985549, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP send seal arc4 state: > >[2024/01/30 20:15:13.985558, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/ntlmssp/ntlmssp_sign.c:52(dump_arc4_state) > dump_arc4_state: NTLMSSP recv seal arc4 state: > >[2024/01/30 20:15:13.985564, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../auth/gensec/gensec.c:551(gensec_update_done) > gensec_update_done: spnego[0x5610addcc2d0]: NT_STATUS_OK tevent_req[0x5610adddcc30/../../auth/gensec/spnego.c:1632]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x5610adddce10)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116] >[2024/01/30 20:15:13.985572, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.985576, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.985580, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.985584, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.985587, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.985597, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.985605, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:322(create_local_nt_token_from_info3) > Create local NT token for bb >[2024/01/30 20:15:13.985626, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2571242865-2718945573-3960193438-1125]: value=[21125:B] >[2024/01/30 20:15:13.985630, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2571242865-2718945573-3960193438-1125]: id=[21125], endptr=[:B] >[2024/01/30 20:15:13.985635, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1532(sid_to_uid) > sid S-1-5-21-2571242865-2718945573-3960193438-1125 -> uid 21125 >[2024/01/30 20:15:13.986577, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [TEMP\bb] >[2024/01/30 20:15:13.986614, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/passdb/lookup_sid.c:1204(xid_to_sid) > xid_to_sid: GID 20513 -> S-1-5-21-2571242865-2718945573-3960193438-513 from cache >[2024/01/30 20:15:13.986624, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.986629, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.986633, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.986637, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.986640, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.986655, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.986673, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:207(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.986677, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:567(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.986681, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2024/01/30 20:15:13.986685, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.986688, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.986717, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:444(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.986727, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:100(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2571242865-2718945573-3960193438-1125] >[2024/01/30 20:15:13.986733, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:100(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2571242865-2718945573-3960193438-513] >[2024/01/30 20:15:13.986739, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:178(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2024/01/30 20:15:13.986745, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:100(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2024/01/30 20:15:13.986750, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:100(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-11] >[2024/01/30 20:15:13.986755, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/privileges.c:100(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-545] >[2024/01/30 20:15:13.986762, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2571242865-2718945573-3960193438-1125]: value=[21125:B] >[2024/01/30 20:15:13.986766, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2571242865-2718945573-3960193438-1125]: id=[21125], endptr=[:B] >[2024/01/30 20:15:13.986775, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2571242865-2718945573-3960193438-513]: value=[20513:B] >[2024/01/30 20:15:13.986779, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-21-2571242865-2718945573-3960193438-513]: id=[20513], endptr=[:B] >[2024/01/30 20:15:13.986788, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-1-0]: value=[10003:G] >[2024/01/30 20:15:13.986791, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-1-0]: id=[10003], endptr=[:G] >[2024/01/30 20:15:13.986797, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-2]: value=[10004:G] >[2024/01/30 20:15:13.986801, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-2]: id=[10004], endptr=[:G] >[2024/01/30 20:15:13.986807, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[10006:G] >[2024/01/30 20:15:13.986810, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[10006], endptr=[:G] >[2024/01/30 20:15:13.986816, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:58(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-32-545]: value=[10001:G] >[2024/01/30 20:15:13.986820, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/idmap_cache.c:77(idmap_cache_find_sid2unixid) > Parsing value for key [IDMAP/SID2XID/S-1-5-32-545]: id=[10001], endptr=[:G] >[2024/01/30 20:15:13.986828, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../libcli/security/security_token.c:54(security_token_debug) > Security token SIDs (13): > SID[ 0]: S-1-5-21-2571242865-2718945573-3960193438-1125 > SID[ 1]: S-1-5-21-2571242865-2718945573-3960193438-513 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > SID[ 5]: S-1-5-32-545 > SID[ 6]: S-1-22-1-21125 > SID[ 7]: S-1-22-2-20513 > SID[ 8]: S-1-22-2-21125 > SID[ 9]: S-1-22-2-10003 > SID[ 10]: S-1-22-2-10004 > SID[ 11]: S-1-22-2-10006 > SID[ 12]: S-1-22-2-10001 > Privileges (0x 0): > Rights (0x 0): >[2024/01/30 20:15:13.986856, 10, pid=19063, effective(0, 0), real(0, 0), class=auth] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 21125 > Primary group is 20513 and contains 6 supplementary groups > Group[ 0]: 21125 > Group[ 1]: 20513 > Group[ 2]: 10003 > Group[ 3]: 10004 > Group[ 4]: 10006 > Group[ 5]: 10001 >[2024/01/30 20:15:13.986878, 4, pid=19063, effective(0, 0), real(0, 0), class=auth_audit] ../../auth/auth_log.c:980(log_successful_authz_event_human_readable) > Successful AuthZ: [SMB2,NTLMSSP] user [TEMP]\[bb] [S-1-5-21-2571242865-2718945573-3960193438-1125] at [Tue, 30 Jan 2024 20:15:13.986874 CET] Remote host [ipv4:172.18.200.42:36492] local host [ipv4:172.18.200.42:445] > {"timestamp": "2024-01-30T20:15:13.986893+0100", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 2}, "localAddress": "ipv4:172.18.200.42:445", "remoteAddress": "ipv4:172.18.200.42:36492", "serviceDescription": "SMB2", "authType": "NTLMSSP", "domain": "TEMP", "account": "bb", "sid": "S-1-5-21-2571242865-2718945573-3960193438-1125", "sessionId": "ce3efb40-ef24-41ac-8d29-f56370f22951", "logonServer": "DC6", "transportProtection": "SMB", "accountFlags": "0x00000010", "clientPolicyAccessCheck": null, "serverPolicyAccessCheck": null}} >[2024/01/30 20:15:13.986944, 7, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4376(lp_servicenumber) > lp_servicenumber: couldn't find TEMP\bb >[2024/01/30 20:15:13.986949, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:182(Get_Pwnam_alloc) > Finding user TEMP\bb >[2024/01/30 20:15:13.986952, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:121(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is temp\bb >[2024/01/30 20:15:13.986957, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/username.c:160(Get_Pwnam_internals) > Get_Pwnam_internals did find user [TEMP\bb]! >[2024/01/30 20:15:13.986961, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/password.c:85(register_homes_share) > Adding homes service for user 'TEMP\bb' using home directory: '/home/TEMP/bb' >[2024/01/30 20:15:13.986969, 7, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:4376(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2024/01/30 20:15:13.986976, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/debug.c:931(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >[2024/01/30 20:15:13.987032, 6, pid=19063, effective(0, 0), real(0, 0)] ../../source3/param/loadparm.c:2400(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: 2024-01-30 20:04:50.989265457 >[2024/01/30 20:15:13.987051, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.987056, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.987061, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.987066, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610add946d0 >[2024/01/30 20:15:13.987088, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.987099, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:975(smbXsrv_session_global_store) > smbXsrv_session_global_store: smbXsrv_session_global_store: key '4112976E' stored >[2024/01/30 20:15:13.987103, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:976(smbXsrv_session_global_store) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000005 (5) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : Tue Jan 30 08:15:14 PM 2024 CET > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000d (13) > sids: ARRAY(13) > sids : S-1-5-21-2571242865-2718945573-3960193438-1125 > sids : S-1-5-21-2571242865-2718945573-3960193438-513 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-5-32-545 > sids : S-1-22-1-21125 > sids : S-1-22-2-20513 > sids : S-1-22-2-21125 > sids : S-1-22-2-10003 > sids : S-1-22-2-10004 > sids : S-1-22-2-10006 > sids : S-1-22-2-10001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x0000000000005285 (21125) > gid : 0x0000000000005021 (20513) > ngroups : 0x00000006 (6) > groups: ARRAY(6) > groups : 0x0000000000005285 (21125) > groups : 0x0000000000005021 (20513) > groups : 0x0000000000002713 (10003) > groups : 0x0000000000002714 (10004) > groups : 0x0000000000002716 (10006) > groups : 0x0000000000002711 (10001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'bb' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'TEMP' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '' > home_directory : * > home_directory : '' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'DC6' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 04:48:05 AM 30828 CEST > acct_expiry : Thu Sep 14 04:48:05 AM 30828 CEST > last_password_change : Tue Jan 30 08:02:28 PM 2024 CET > allow_password_change : Wed Jan 31 08:02:28 PM 2024 CET > force_password_change : Tue Mar 12 08:02:28 PM 2024 CET > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > user_flags : 0x00000000 (0) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'TEMP\bb' > sanitized_username : * > sanitized_username : 'bb' > torture : NULL > credentials : NULL > unique_session_token : ce3efb40-ef24-41ac-8d29-f56370f22951 > ticket_type : TICKET_TYPE_UNKNOWN (0) > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0002 (2) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0002 (2) > signing_key : * > encryption_key : * > decryption_key : * > application_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > signing_algo : 0x0002 (2) > encryption_cipher : 0x0002 (2) >[2024/01/30 20:15:13.987499, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.987504, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.987509, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.987515, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1508(smbXsrv_session_update) > smbXsrv_session_update: smbXsrv_session_update: global_id (0x4112976e) stored >[2024/01/30 20:15:13.987519, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:1509(smbXsrv_session_update) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x4112976e (1091737454) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : Tue Jan 30 08:15:14 PM 2024 CET > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000d (13) > sids: ARRAY(13) > sids : S-1-5-21-2571242865-2718945573-3960193438-1125 > sids : S-1-5-21-2571242865-2718945573-3960193438-513 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-5-32-545 > sids : S-1-22-1-21125 > sids : S-1-22-2-20513 > sids : S-1-22-2-21125 > sids : S-1-22-2-10003 > sids : S-1-22-2-10004 > sids : S-1-22-2-10006 > sids : S-1-22-2-10001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x0000000000005285 (21125) > gid : 0x0000000000005021 (20513) > ngroups : 0x00000006 (6) > groups: ARRAY(6) > groups : 0x0000000000005285 (21125) > groups : 0x0000000000005021 (20513) > groups : 0x0000000000002713 (10003) > groups : 0x0000000000002714 (10004) > groups : 0x0000000000002716 (10006) > groups : 0x0000000000002711 (10001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'bb' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'TEMP' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '' > home_directory : * > home_directory : '' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'DC6' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 04:48:05 AM 30828 CEST > acct_expiry : Thu Sep 14 04:48:05 AM 30828 CEST > last_password_change : Tue Jan 30 08:02:28 PM 2024 CET > allow_password_change : Wed Jan 31 08:02:28 PM 2024 CET > force_password_change : Tue Mar 12 08:02:28 PM 2024 CET > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > user_flags : 0x00000000 (0) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'TEMP\bb' > sanitized_username : * > sanitized_username : 'bb' > torture : NULL > credentials : NULL > unique_session_token : ce3efb40-ef24-41ac-8d29-f56370f22951 > ticket_type : TICKET_TYPE_UNKNOWN (0) > connection_dialect : 0x0311 (785) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0002 (2) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0002 (2) > signing_key : * > encryption_key : * > decryption_key : * > application_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > signing_algo : 0x0002 (2) > encryption_cipher : 0x0002 (2) > status : NT_STATUS_OK > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > nonce_high_random : 0x1c5f2706f693746b (2044395666709640299) > nonce_high_max : 0x00000000ffffffff (4294967295) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2024/01/30 20:15:13.987973, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [2] idx[1] status[NT_STATUS_OK] body[8] dyn[yes:29] at ../../source3/smbd/smb2_sesssetup.c:184 >[2024/01/30 20:15:13.987979, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 8192, charge 1, granted 8192, current possible/max 8192/8192, total granted/max/low/range 8192/8192/3/8192 >[2024/01/30 20:15:13.987990, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/smb/smb2_signing.c:658(smb2_signing_sign_pdu) > signed SMB2 message (sign_algo_id=2) >[2024/01/30 20:15:13.988158, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.988164, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 3 (position 3) from bitmap >[2024/01/30 20:15:13.988169, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 3 >[2024/01/30 20:15:13.988177, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.988181, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.988190, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.988196, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addd9d20 >[2024/01/30 20:15:13.988210, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.988217, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:975(smbXsrv_session_global_store) > smbXsrv_session_global_store: smbXsrv_session_global_store: key '4112976E' stored >[2024/01/30 20:15:13.988221, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:976(smbXsrv_session_global_store) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000006 (6) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : Tue Jan 30 08:15:14 PM 2024 CET > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000d (13) > sids: ARRAY(13) > sids : S-1-5-21-2571242865-2718945573-3960193438-1125 > sids : S-1-5-21-2571242865-2718945573-3960193438-513 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-5-32-545 > sids : S-1-22-1-21125 > sids : S-1-22-2-20513 > sids : S-1-22-2-21125 > sids : S-1-22-2-10003 > sids : S-1-22-2-10004 > sids : S-1-22-2-10006 > sids : S-1-22-2-10001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x0000000000005285 (21125) > gid : 0x0000000000005021 (20513) > ngroups : 0x00000006 (6) > groups: ARRAY(6) > groups : 0x0000000000005285 (21125) > groups : 0x0000000000005021 (20513) > groups : 0x0000000000002713 (10003) > groups : 0x0000000000002714 (10004) > groups : 0x0000000000002716 (10006) > groups : 0x0000000000002711 (10001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'bb' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'TEMP' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '' > home_directory : * > home_directory : '' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'DC6' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 04:48:05 AM 30828 CEST > acct_expiry : Thu Sep 14 04:48:05 AM 30828 CEST > last_password_change : Tue Jan 30 08:02:28 PM 2024 CET > allow_password_change : Wed Jan 31 08:02:28 PM 2024 CET > force_password_change : Tue Mar 12 08:02:28 PM 2024 CET > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > user_flags : 0x00000000 (0) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'TEMP\bb' > sanitized_username : * > sanitized_username : 'bb' > torture : NULL > credentials : NULL > unique_session_token : ce3efb40-ef24-41ac-8d29-f56370f22951 > ticket_type : TICKET_TYPE_UNKNOWN (0) > connection_dialect : 0x0311 (785) > signing_flags : 0x06 (6) > 0: SMBXSRV_SIGNING_REQUIRED > 1: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0002 (2) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0002 (2) > signing_key : * > encryption_key : * > decryption_key : * > application_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > signing_algo : 0x0002 (2) > encryption_cipher : 0x0002 (2) >[2024/01/30 20:15:13.988583, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.988590, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.988594, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.988600, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1508(smbXsrv_session_update) > smbXsrv_session_update: smbXsrv_session_update: global_id (0x4112976e) stored >[2024/01/30 20:15:13.988604, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_session.c:1509(smbXsrv_session_update) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > client : * > local_id : 0x4112976e (1091737454) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0x4112976e (1091737454) > session_wire_id : 0x000000004112976e (1091737454) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > expiration_time : Thu Sep 14 04:48:05 AM 30828 CEST > auth_time : Tue Jan 30 08:15:14 PM 2024 CET > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000d (13) > sids: ARRAY(13) > sids : S-1-5-21-2571242865-2718945573-3960193438-1125 > sids : S-1-5-21-2571242865-2718945573-3960193438-513 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-5-32-545 > sids : S-1-22-1-21125 > sids : S-1-22-2-20513 > sids : S-1-22-2-21125 > sids : S-1-22-2-10003 > sids : S-1-22-2-10004 > sids : S-1-22-2-10006 > sids : S-1-22-2-10001 > privilege_mask : 0x0000000000000000 (0) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 0: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 0: SEC_PRIV_BACKUP_BIT > 0: SEC_PRIV_RESTORE_BIT > 0: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 0: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x0000000000005285 (21125) > gid : 0x0000000000005021 (20513) > ngroups : 0x00000006 (6) > groups: ARRAY(6) > groups : 0x0000000000005285 (21125) > groups : 0x0000000000005021 (20513) > groups : 0x0000000000002713 (10003) > groups : 0x0000000000002714 (10004) > groups : 0x0000000000002716 (10006) > groups : 0x0000000000002711 (10001) > info : * > info: struct auth_user_info > account_name : * > account_name : 'bb' > user_principal_name : NULL > user_principal_constructed: 0x00 (0) > domain_name : * > domain_name : 'TEMP' > dns_domain_name : NULL > full_name : * > full_name : '' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '' > home_directory : * > home_directory : '' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'DC6' > last_logon : NTTIME(0) > last_logoff : Thu Sep 14 04:48:05 AM 30828 CEST > acct_expiry : Thu Sep 14 04:48:05 AM 30828 CEST > last_password_change : Tue Jan 30 08:02:28 PM 2024 CET > allow_password_change : Wed Jan 31 08:02:28 PM 2024 CET > force_password_change : Tue Mar 12 08:02:28 PM 2024 CET > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > user_flags : 0x00000000 (0) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'TEMP\bb' > sanitized_username : * > sanitized_username : 'bb' > torture : NULL > credentials : NULL > unique_session_token : ce3efb40-ef24-41ac-8d29-f56370f22951 > ticket_type : TICKET_TYPE_UNKNOWN (0) > connection_dialect : 0x0311 (785) > signing_flags : 0x06 (6) > 0: SMBXSRV_SIGNING_REQUIRED > 1: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > signing_algo : 0x0002 (2) > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > encryption_cipher : 0x0002 (2) > signing_key : * > encryption_key : * > decryption_key : * > application_key : * > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > channel_id : 0x0000000000000001 (1) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > signing_key : * > auth_session_info_seqnum : 0x00000001 (1) > connection : * > signing_algo : 0x0002 (2) > encryption_cipher : 0x0002 (2) > status : NT_STATUS_OK > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > nonce_high_random : 0x1c5f2706f693746b (2044395666709640299) > nonce_high_max : 0x00000000ffffffff (4294967295) > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > tcon_table : * > homes_snum : 0xffffffff (4294967295) > pending_auth : NULL >[2024/01/30 20:15:13.989040, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.989044, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.989048, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.989057, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.989065, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_tcon.c:234(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\dm9.temp.test\IPC$] share[IPC$] >[2024/01/30 20:15:13.989078, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.989082, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.989088, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key AD38C32E >[2024/01/30 20:15:13.989104, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addcd180 >[2024/01/30 20:15:13.989180, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: smbXsrv_tcon_global_store: key 'AD38C32E' stored >[2024/01/30 20:15:13.989186, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:712(smbXsrv_tcon_global_store) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xad38c32e (2906178350) > tcon_wire_id : 0xad38c32e (2906178350) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'IPC$' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2024/01/30 20:15:13.989250, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key AD38C32E >[2024/01/30 20:15:13.989256, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.989265, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:849(smbXsrv_tcon_create) > smbXsrv_tcon_create: smbXsrv_tcon_create: global_id (0xad38c32e) stored >[2024/01/30 20:15:13.989270, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:850(smbXsrv_tcon_create) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xad38c32e (2906178350) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xad38c32e (2906178350) > tcon_wire_id : 0xad38c32e (2906178350) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'IPC$' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_INTERNAL_ERROR > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > compat : NULL >[2024/01/30 20:15:13.989393, 3, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/access.c:374(allow_access) > Allowed connection from 172.18.200.42 (172.18.200.42) >[2024/01/30 20:15:13.989403, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:239(user_ok_token) > user_ok_token: share IPC$ is ok for unix user TEMP\bb >[2024/01/30 20:15:13.989428, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:72(set_conn_connectpath) > set_conn_connectpath: service IPC$, connectpath = /tmp >[2024/01/30 20:15:13.989434, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:585(make_connection_snum) > make_connection_snum: Connect path is '/tmp' for service [IPC$] >[2024/01/30 20:15:13.989438, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:239(user_ok_token) > user_ok_token: share IPC$ is ok for unix user TEMP\bb >[2024/01/30 20:15:13.989442, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:288(is_share_read_only_for_token) > is_share_read_only_for_user: share IPC$ is read-only for unix user TEMP\bb >[2024/01/30 20:15:13.989457, 10, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:403(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2024/01/30 20:15:13.989462, 3, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:115(vfs_init_default) > Initialising default vfs hooks >[2024/01/30 20:15:13.989467, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2024/01/30 20:15:13.989471, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2024/01/30 20:15:13.989476, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for vfs_not_implemented >[2024/01/30 20:15:13.989480, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend 'vfs_not_implemented' >[2024/01/30 20:15:13.989483, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2024/01/30 20:15:13.989487, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2024/01/30 20:15:13.989491, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for dfs_samba4 >[2024/01/30 20:15:13.989494, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:105(smb_register_vfs) > Successfully added vfs backend 'dfs_samba4' >[2024/01/30 20:15:13.989502, 10, pid=19063, effective(0, 0), real(0, 0), class=dfs_samba4] ../../source3/modules/vfs_dfs_samba4.c:158(vfs_dfs_samba4_init) > vfs_dfs_samba4: Debug class number of 'fileid': 38 >[2024/01/30 20:15:13.989508, 3, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:141(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2024/01/30 20:15:13.989512, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2024/01/30 20:15:13.989537, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:72(set_conn_connectpath) > set_conn_connectpath: service IPC$, connectpath = /tmp >[2024/01/30 20:15:13.989543, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:239(user_ok_token) > user_ok_token: share IPC$ is ok for unix user TEMP\bb >[2024/01/30 20:15:13.989550, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:288(is_share_read_only_for_token) > is_share_read_only_for_user: share IPC$ is read-only for unix user TEMP\bb >[2024/01/30 20:15:13.989556, 10, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:403(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2024/01/30 20:15:13.989572, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (21125, 20513) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.989577, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:54(security_token_debug) > Security token SIDs (13): > SID[ 0]: S-1-5-21-2571242865-2718945573-3960193438-1125 > SID[ 1]: S-1-5-21-2571242865-2718945573-3960193438-513 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > SID[ 5]: S-1-5-32-545 > SID[ 6]: S-1-22-1-21125 > SID[ 7]: S-1-22-2-20513 > SID[ 8]: S-1-22-2-21125 > SID[ 9]: S-1-22-2-10003 > SID[ 10]: S-1-22-2-10004 > SID[ 11]: S-1-22-2-10006 > SID[ 12]: S-1-22-2-10001 > Privileges (0x 0): > Rights (0x 0): >[2024/01/30 20:15:13.989605, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 21125 > Primary group is 20513 and contains 6 supplementary groups > Group[ 0]: 21125 > Group[ 1]: 20513 > Group[ 2]: 10003 > Group[ 3]: 10004 > Group[ 4]: 10006 > Group[ 5]: 10001 >[2024/01/30 20:15:13.989645, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/] >[2024/01/30 20:15:13.989652, 4, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.989656, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.989659, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.989668, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.989673, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:72(set_conn_connectpath) > set_conn_connectpath: service IPC$, connectpath = /tmp >[2024/01/30 20:15:13.989678, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:814(make_connection_snum) > dm9 (ipv4:172.18.200.42:36492) signed connect to service IPC$ initially as user TEMP\bb (uid=21125, gid=20513) (pid 19063) >[2024/01/30 20:15:13.989687, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [3] idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:186 >[2024/01/30 20:15:13.989693, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/4/8192 >[2024/01/30 20:15:13.989700, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/smb/smb2_signing.c:658(smb2_signing_sign_pdu) > signed SMB2 message (sign_algo_id=2) >[2024/01/30 20:15:13.989773, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.989782, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 4 (position 4) from bitmap >[2024/01/30 20:15:13.989787, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_IOCTL] mid = 4 >[2024/01/30 20:15:13.989792, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (21125, 20513) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.989796, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:54(security_token_debug) > Security token SIDs (13): > SID[ 0]: S-1-5-21-2571242865-2718945573-3960193438-1125 > SID[ 1]: S-1-5-21-2571242865-2718945573-3960193438-513 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > SID[ 5]: S-1-5-32-545 > SID[ 6]: S-1-22-1-21125 > SID[ 7]: S-1-22-2-20513 > SID[ 8]: S-1-22-2-21125 > SID[ 9]: S-1-22-2-10003 > SID[ 10]: S-1-22-2-10004 > SID[ 11]: S-1-22-2-10006 > SID[ 12]: S-1-22-2-10001 > Privileges (0x 0): > Rights (0x 0): >[2024/01/30 20:15:13.989824, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 21125 > Primary group is 20513 and contains 6 supplementary groups > Group[ 0]: 21125 > Group[ 1]: 20513 > Group[ 2]: 10003 > Group[ 3]: 10004 > Group[ 4]: 10006 > Group[ 5]: 10001 >[2024/01/30 20:15:13.989843, 4, pid=19063, effective(21125, 20513), real(21125, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to /tmp >[2024/01/30 20:15:13.989852, 5, pid=19063, effective(21125, 20513), real(21125, 0), class=vfs] ../../source3/smbd/vfs.c:1008(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /tmp >[2024/01/30 20:15:13.989858, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/tmp] >[2024/01/30 20:15:13.989863, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.989868, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.989873, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key AD38C32E >[2024/01/30 20:15:13.989878, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610adddd060 >[2024/01/30 20:15:13.989889, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: smbXsrv_tcon_global_store: key 'AD38C32E' stored >[2024/01/30 20:15:13.989894, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:712(smbXsrv_tcon_global_store) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xad38c32e (2906178350) > tcon_wire_id : 0xad38c32e (2906178350) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'IPC$' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2024/01/30 20:15:13.989955, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key AD38C32E >[2024/01/30 20:15:13.989959, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.989966, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_tcon.c:893(smbXsrv_tcon_update) > smbXsrv_tcon_update: smbXsrv_tcon_update: global_id (0xad38c32e) stored >[2024/01/30 20:15:13.989970, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:894(smbXsrv_tcon_update) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xad38c32e (2906178350) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xad38c32e (2906178350) > tcon_wire_id : 0xad38c32e (2906178350) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'IPC$' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > compat : * >[2024/01/30 20:15:13.990044, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2725(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 4, CreditCharge: 1, NeededCharge: 1 >[2024/01/30 20:15:13.990051, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_ioctl.c:446(smbd_smb2_ioctl_send) > smbd_smb2_ioctl: ctl_code[0x00060194] <no handle>, fnum [fsp is NULL] >[2024/01/30 20:15:13.990060, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../librpc/ndr/ndr.c:493(ndr_print_function_debug) > dfs_GetDFSReferral: struct dfs_GetDFSReferral > in: struct dfs_GetDFSReferral > req: struct dfs_GetDFSReferral_in > max_referral_level : 0x0003 (3) > servername : '\dm9.temp.test\share' >[2024/01/30 20:15:13.990081, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=msdfs] ../../source3/smbd/msdfs.c:78(parse_dfs_path_strict) > parse_dfs_path_strict: path = |\dm9.temp.test\share| >[2024/01/30 20:15:13.990085, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=msdfs] ../../source3/smbd/msdfs.c:114(parse_dfs_path_strict) > parse_dfs_path_strict: hostname: dm9.temp.test >[2024/01/30 20:15:13.990090, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/util.c:997(is_myname) > is_myname: is_myname("dm9.temp.test") returns 0 >[2024/01/30 20:15:13.990095, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=msdfs] ../../source3/smbd/msdfs.c:140(parse_dfs_path_strict) > parse_dfs_path_strict: servicename: share >[2024/01/30 20:15:13.990099, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=msdfs] ../../source3/smbd/msdfs.c:150(parse_dfs_path_strict) > parse_dfs_path_strict: rest of the path: >[2024/01/30 20:15:13.990108, 3, pid=19063, effective(21125, 20513), real(21125, 0), class=msdfs] ../../source3/smbd/msdfs.c:986(get_referred_path) > get_referred_path: |share| in dfs path \dm9.temp.test\share is not a dfs root. >[2024/01/30 20:15:13.990114, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_ioctl.c:317(smbd_smb2_request_ioctl_done) > smbd_smb2_request_ioctl_done: smbd_smb2_ioctl_recv returned 0 status NT_STATUS_NOT_FOUND >[2024/01/30 20:15:13.990120, 3, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_NOT_FOUND] || at ../../source3/smbd/smb2_ioctl.c:353 >[2024/01/30 20:15:13.990125, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [4] idx[1] status[NT_STATUS_NOT_FOUND] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4082 >[2024/01/30 20:15:13.990130, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/5/8192 >[2024/01/30 20:15:13.990178, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.990184, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 5 (position 5) from bitmap >[2024/01/30 20:15:13.990189, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TDIS] mid = 5 >[2024/01/30 20:15:13.990194, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2024/01/30 20:15:13.990200, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/tmp] >[2024/01/30 20:15:13.990207, 4, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990211, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.990215, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.990224, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.990239, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990243, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.990247, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.990253, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.990257, 4, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to /tmp >[2024/01/30 20:15:13.990263, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1008(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /tmp >[2024/01/30 20:15:13.990268, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990271, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.990274, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.990281, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.990285, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:911(close_cnum) > dm9 (ipv4:172.18.200.42:36492) closed connection to service IPC$ >[2024/01/30 20:15:13.990290, 4, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to / >[2024/01/30 20:15:13.990296, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1008(vfs_ChDir) > vfs_ChDir: vfs_ChDir got / >[2024/01/30 20:15:13.990300, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990304, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.990307, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.990313, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.990320, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.990328, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.990333, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key AD38C32E >[2024/01/30 20:15:13.990338, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addd3d00 >[2024/01/30 20:15:13.990342, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key AD38C32E >[2024/01/30 20:15:13.990346, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.990352, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [5] idx[1] status[NT_STATUS_OK] body[4] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:568 >[2024/01/30 20:15:13.990357, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/6/8192 >[2024/01/30 20:15:13.990401, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.990406, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 6 (position 6) from bitmap >[2024/01/30 20:15:13.990411, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 6 >[2024/01/30 20:15:13.990417, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990421, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.990425, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.990433, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.990438, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_tcon.c:234(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\dm9.temp.test\share] share[share] >[2024/01/30 20:15:13.990448, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.990452, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.990457, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F545185F >[2024/01/30 20:15:13.990467, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610add93430 >[2024/01/30 20:15:13.990479, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: smbXsrv_tcon_global_store: key 'F545185F' stored >[2024/01/30 20:15:13.990486, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:712(smbXsrv_tcon_global_store) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xf545185f (4114946143) > tcon_wire_id : 0xf545185f (4114946143) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'share' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2024/01/30 20:15:13.990542, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F545185F >[2024/01/30 20:15:13.990546, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.990553, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_tcon.c:849(smbXsrv_tcon_create) > smbXsrv_tcon_create: smbXsrv_tcon_create: global_id (0xf545185f) stored >[2024/01/30 20:15:13.990556, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:850(smbXsrv_tcon_create) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xf545185f (4114946143) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xf545185f (4114946143) > tcon_wire_id : 0xf545185f (4114946143) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'share' > encryption_flags : 0x00 (0) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 0: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x00 (0) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 0: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_INTERNAL_ERROR > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > compat : NULL >[2024/01/30 20:15:13.990635, 3, pid=19063, effective(0, 0), real(0, 0)] ../../lib/util/access.c:374(allow_access) > Allowed connection from 172.18.200.42 (172.18.200.42) >[2024/01/30 20:15:13.990640, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:239(user_ok_token) > user_ok_token: share share is ok for unix user TEMP\bb >[2024/01/30 20:15:13.990658, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:72(set_conn_connectpath) > set_conn_connectpath: service share, connectpath = /share >[2024/01/30 20:15:13.990664, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:585(make_connection_snum) > make_connection_snum: Connect path is '/share' for service [share] >[2024/01/30 20:15:13.990668, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:239(user_ok_token) > user_ok_token: share share is ok for unix user TEMP\bb >[2024/01/30 20:15:13.990672, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:288(is_share_read_only_for_token) > is_share_read_only_for_user: share share is read-write for unix user TEMP\bb >[2024/01/30 20:15:13.990680, 10, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:403(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2024/01/30 20:15:13.990685, 3, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:115(vfs_init_default) > Initialising default vfs hooks >[2024/01/30 20:15:13.990689, 3, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:141(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2024/01/30 20:15:13.990693, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:66(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2024/01/30 20:15:13.990709, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/notify_msg.c:80(notify_init) > notify_init: notifyd=18947 >[2024/01/30 20:15:13.990714, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 784 - private_data=0x5610addaaf30 >[2024/01/30 20:15:13.990719, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 793 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.990723, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:718(messaging_register) > Registering messaging pointer for type 799 - private_data=0x5610addc2100 >[2024/01/30 20:15:13.990730, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:72(set_conn_connectpath) > set_conn_connectpath: service share, connectpath = /share >[2024/01/30 20:15:13.990735, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:239(user_ok_token) > user_ok_token: share share is ok for unix user TEMP\bb >[2024/01/30 20:15:13.990738, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/share_access.c:288(is_share_read_only_for_token) > is_share_read_only_for_user: share share is read-write for unix user TEMP\bb >[2024/01/30 20:15:13.990744, 10, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/access_check.c:403(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x1f01ff >[2024/01/30 20:15:13.990761, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (21125, 20513) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990766, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:54(security_token_debug) > Security token SIDs (13): > SID[ 0]: S-1-5-21-2571242865-2718945573-3960193438-1125 > SID[ 1]: S-1-5-21-2571242865-2718945573-3960193438-513 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > SID[ 5]: S-1-5-32-545 > SID[ 6]: S-1-22-1-21125 > SID[ 7]: S-1-22-2-20513 > SID[ 8]: S-1-22-2-21125 > SID[ 9]: S-1-22-2-10003 > SID[ 10]: S-1-22-2-10004 > SID[ 11]: S-1-22-2-10006 > SID[ 12]: S-1-22-2-10001 > Privileges (0x 0): > Rights (0x 0): >[2024/01/30 20:15:13.990793, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 21125 > Primary group is 20513 and contains 6 supplementary groups > Group[ 0]: 21125 > Group[ 1]: 20513 > Group[ 2]: 10003 > Group[ 3]: 10004 > Group[ 4]: 10006 > Group[ 5]: 10001 >[2024/01/30 20:15:13.990811, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/] >[2024/01/30 20:15:13.990817, 4, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990820, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.990824, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.990831, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.990837, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:72(set_conn_connectpath) > set_conn_connectpath: service share, connectpath = /share >[2024/01/30 20:15:13.990846, 10, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/modules/vfs_default.c:208(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share share, directory /share >[2024/01/30 20:15:13.990851, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:814(make_connection_snum) > dm9 (ipv4:172.18.200.42:36492) signed connect to service share initially as user TEMP\bb (uid=21125, gid=20513) (pid 19063) >[2024/01/30 20:15:13.990858, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [6] idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:186 >[2024/01/30 20:15:13.990863, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/7/8192 >[2024/01/30 20:15:13.990869, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/smb/smb2_signing.c:658(smb2_signing_sign_pdu) > signed SMB2 message (sign_algo_id=2) >[2024/01/30 20:15:13.990934, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.990940, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 7 (position 7) from bitmap >[2024/01/30 20:15:13.990947, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 7 >[2024/01/30 20:15:13.990953, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (21125, 20513) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.990957, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:54(security_token_debug) > Security token SIDs (13): > SID[ 0]: S-1-5-21-2571242865-2718945573-3960193438-1125 > SID[ 1]: S-1-5-21-2571242865-2718945573-3960193438-513 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > SID[ 5]: S-1-5-32-545 > SID[ 6]: S-1-22-1-21125 > SID[ 7]: S-1-22-2-20513 > SID[ 8]: S-1-22-2-21125 > SID[ 9]: S-1-22-2-10003 > SID[ 10]: S-1-22-2-10004 > SID[ 11]: S-1-22-2-10006 > SID[ 12]: S-1-22-2-10001 > Privileges (0x 0): > Rights (0x 0): >[2024/01/30 20:15:13.990989, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 21125 > Primary group is 20513 and contains 6 supplementary groups > Group[ 0]: 21125 > Group[ 1]: 20513 > Group[ 2]: 10003 > Group[ 3]: 10004 > Group[ 4]: 10006 > Group[ 5]: 10001 >[2024/01/30 20:15:13.991012, 4, pid=19063, effective(21125, 20513), real(21125, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to /share >[2024/01/30 20:15:13.991021, 5, pid=19063, effective(21125, 20513), real(21125, 0), class=vfs] ../../source3/smbd/vfs.c:1008(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /share >[2024/01/30 20:15:13.991027, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/share] >[2024/01/30 20:15:13.991032, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.991036, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.991042, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F545185F >[2024/01/30 20:15:13.991047, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addd3d00 >[2024/01/30 20:15:13.991056, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_tcon.c:711(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: smbXsrv_tcon_global_store: key 'F545185F' stored >[2024/01/30 20:15:13.991061, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:712(smbXsrv_tcon_global_store) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xf545185f (4114946143) > tcon_wire_id : 0xf545185f (4114946143) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'share' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET >[2024/01/30 20:15:13.991122, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F545185F >[2024/01/30 20:15:13.991126, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.991133, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_tcon.c:893(smbXsrv_tcon_update) > smbXsrv_tcon_update: smbXsrv_tcon_update: global_id (0xf545185f) stored >[2024/01/30 20:15:13.991136, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_tcon.c:894(smbXsrv_tcon_update) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xf545185f (4114946143) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xf545185f (4114946143) > tcon_wire_id : 0xf545185f (4114946143) > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > creation_time : Tue Jan 30 08:15:14 PM 2024 CET > share_name : 'share' > encryption_flags : 0x08 (8) > 0: SMBXSRV_ENCRYPTION_REQUIRED > 0: SMBXSRV_ENCRYPTION_DESIRED > 0: SMBXSRV_PROCESSED_ENCRYPTED_PACKET > 1: SMBXSRV_PROCESSED_UNENCRYPTED_PACKET > session_global_id : 0x4112976e (1091737454) > signing_flags : 0x04 (4) > 0: SMBXSRV_SIGNING_REQUIRED > 0: SMBXSRV_PROCESSED_SIGNED_PACKET > 1: SMBXSRV_PROCESSED_UNSIGNED_PACKET > status : NT_STATUS_OK > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > compat : * >[2024/01/30 20:15:13.991212, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_create.c:287(smbd_smb2_request_process_create) > smbd_smb2_request_process_create: > Got 0 create blobs >[2024/01/30 20:15:13.991219, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_create.c:806(smbd_smb2_create_send) > smbd_smb2_create_send: name [link_to_destdir] >[2024/01/30 20:15:13.991226, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_create.c:941(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2024/01/30 20:15:13.991236, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:562(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [.] >[2024/01/30 20:15:13.991241, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:462(openat_pathref_fullname) > openat_pathref_fullname: smb_fname [.] >[2024/01/30 20:15:13.991245, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:78(fsp_new) > fsp_new: allocated files structure (1 used) >[2024/01/30 20:15:13.991250, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:2197(file_name_hash) > file_name_hash: /share/. hash 0x9fbe49ca >[2024/01/30 20:15:13.991261, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:979(fd_openat) > fd_openat: name ., flags = 04000 mode = 00, fd = 9 >[2024/01/30 20:15:13.991266, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:531(openat_pathref_fullname) > openat_pathref_fullname: fsp [.]: OK >[2024/01/30 20:15:13.991271, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:562(openat_pathref_fsp) > openat_pathref_fsp: smb_fname [link_to_destdir] >[2024/01/30 20:15:13.991275, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:462(openat_pathref_fullname) > openat_pathref_fullname: smb_fname [link_to_destdir] >[2024/01/30 20:15:13.991279, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:78(fsp_new) > fsp_new: allocated files structure (2 used) >[2024/01/30 20:15:13.991283, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:2197(file_name_hash) > file_name_hash: /share/link_to_destdir hash 0x141ea851 >[2024/01/30 20:15:13.991291, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:618(symlink_target_below_conn) > symlink_target_below_conn: redirecting to /share/./destdir >[2024/01/30 20:15:13.991301, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:979(fd_openat) > fd_openat: name link_to_destdir, flags = 04000 mode = 00, fd = 30 >[2024/01/30 20:15:13.991305, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:531(openat_pathref_fullname) > openat_pathref_fullname: fsp [link_to_destdir]: OK >[2024/01/30 20:15:13.991310, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:6531(create_file_default) > create_file_default: create_file: access_mask = 0x10000 file_attributes = 0x10, share_access = 0x7, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = link_to_destdir >[2024/01/30 20:15:13.991317, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:5951(create_file_unixpath) > create_file_unixpath: access_mask = 0x10000 file_attributes = 0x10 share_access = 0x7 create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = (nil), sd = (nil), fname = link_to_destdir >[2024/01/30 20:15:13.991326, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2024/01/30 20:15:13.991330, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.991394, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_open.c:349(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'B0CF42E3' stored >[2024/01/30 20:15:13.991401, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_open.c:350(smbXsrv_open_global_store) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > open_global_id : 0xb0cf42e3 (2966373091) > open_persistent_id : 0x00000000b0cf42e3 (2966373091) > open_volatile_id : 0x000000007d99e324 (2107237156) > open_owner : S-1-5-21-2571242865-2718945573-3960193438-1125 > open_time : Tue Jan 30 08:15:14 PM 2024 CET > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : c241a619-16f2-4204-a228-99fdb68b8419 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ >[2024/01/30 20:15:13.991501, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2024/01/30 20:15:13.991506, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_open.c:466(smbXsrv_open_global_allocate) > smbXsrv_open_global_allocate: Found slot 2966373091 >[2024/01/30 20:15:13.991510, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smbXsrv_open.c:615(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xb0cf42e3) stored >[2024/01/30 20:15:13.991514, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_open.c:616(smbXsrv_open_create) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > local_id : 0x7d99e324 (2107237156) > global : * > global: struct smbXsrv_open_global0 > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > open_global_id : 0xb0cf42e3 (2966373091) > open_persistent_id : 0x00000000b0cf42e3 (2966373091) > open_volatile_id : 0x000000007d99e324 (2107237156) > open_owner : S-1-5-21-2571242865-2718945573-3960193438-1125 > open_time : Tue Jan 30 08:15:14 PM 2024 CET > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : c241a619-16f2-4204-a228-99fdb68b8419 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > channel_sequence : 0x0000 (0) > channel_generation : 0x0000000000000000 (0) > lock_sequence_array: ARRAY(64) > [0000] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0010] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0020] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > [0030] FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ........ ........ > status : NT_STATUS_OK > idle_time : Tue Jan 30 08:15:14 PM 2024 CET > compat : NULL > flags : 0x00 (0) > 0: SMBXSRV_OPEN_NEED_REPLAY_CACHE > 0: SMBXSRV_OPEN_HAVE_REPLAY_CACHE > create_action : 0x00000000 (0) > request_count : 0x0000000000000000 (0) > pre_request_count : 0x0000000000000000 (0) >[2024/01/30 20:15:13.991638, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:136(fsp_bind_smb) > fsp_bind_smb: fsp [link_to_destdir] mid [7] >[2024/01/30 20:15:13.991644, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:4740(open_directory) > open_directory: opening directory link_to_destdir, access_mask = 0x10000, share_access = 0x7 create_options = 0x1, create_disposition = 0x1, file_attributes = 0x10 >[2024/01/30 20:15:13.991652, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:3367(posix_fget_nt_acl) > posix_fget_nt_acl: called for file link_to_destdir >[2024/01/30 20:15:13.991685, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/passdb/lookup_sid.c:1204(xid_to_sid) > xid_to_sid: UID 21125 -> S-1-5-21-2571242865-2718945573-3960193438-1125 from cache >[2024/01/30 20:15:13.991692, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/passdb/lookup_sid.c:1204(xid_to_sid) > xid_to_sid: GID 20513 -> S-1-5-21-2571242865-2718945573-3960193438-513 from cache >[2024/01/30 20:15:13.991697, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:2692(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2024/01/30 20:15:13.991702, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2024/01/30 20:15:13.991708, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-5-21-2571242865-2718945573-3960193438-513 gid 20513 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x >[2024/01/30 20:15:13.991713, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:2705(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-2571242865-2718945573-3960193438-1125 uid 21125 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2024/01/30 20:15:13.991719, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:766(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2571242865-2718945573-3960193438-1125 uid 21125 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-5-21-2571242865-2718945573-3960193438-513 gid 20513 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2024/01/30 20:15:13.991734, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:1030(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2024/01/30 20:15:13.991738, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:1030(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2024/01/30 20:15:13.991742, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=acls] ../../source3/smbd/posix_acls.c:1030(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2024/01/30 20:15:13.991749, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:185(smbd_check_access_rights_sd) > smbd_check_access_rights_sd: File [link_to_destdir] requesting [0x10000] returning [0x10000] (NT_STATUS_OK) >[2024/01/30 20:15:13.991768, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2024/01/30 20:15:13.991773, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.991779, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:993(get_share_mode_lock_internal) > get_share_mode_lock_internal: Returning 2049:915715:0 (data_cached=1 key_refcount=1) >[2024/01/30 20:15:13.991785, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:2236(validate_oplock_types) > validate_oplock_types: smbd:validate_oplock_types not set to yes >[2024/01/30 20:15:13.991790, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/locking.c:1007(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x141ea851 >[2024/01/30 20:15:13.991795, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:1761(share_conflict) > share_conflict: existing access_mask = 0x0, existing share access = 0x7, access_mask = 0x10000, share_access = 0x7 >[2024/01/30 20:15:13.991799, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:1766(share_conflict) > share_conflict: No conflict due to existing access_mask = 0x0 >[2024/01/30 20:15:13.991803, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:2030(open_mode_check) > open_mode_check: No conflict due to share_mode_flags access >[2024/01/30 20:15:13.991808, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:1999(set_share_mode) > set_share_mode: num_share_modes=0 >[2024/01/30 20:15:13.991812, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:349(share_mode_entry_put) > share_mode_entry_put: share_mode_entry: >[2024/01/30 20:15:13.991816, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/locking/share_mode_lock.c:350(share_mode_entry_put) > discard_const_p(void, e): struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > op_mid : 0x0000000000000007 (7) > op_type : SHARE_MODE_ENTRY_OP_TYPE_NONE (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00010000 (65536) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Jan 30 08:15:13 PM 2024 CET.991282 > share_file_id : 0x0000000000000003 (3) > uid : 0x00005285 (21125) > flags : 0x0000 (0) > name_hash : 0x141ea851 (337553489) > stale : 0x00 (0) >[2024/01/30 20:15:13.991870, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:2043(set_share_mode) > set_share_mode: idx=0, found=0 >[2024/01/30 20:15:13.991875, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:2074(set_share_mode) > set_share_mode: dbufs[0]=(0x7fff69f45180, 132) >[2024/01/30 20:15:13.991879, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:626(share_mode_data_ltdb_store) > share_mode_data_ltdb_store: >[2024/01/30 20:15:13.991883, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/locking/share_mode_lock.c:627(share_mode_data_ltdb_store) > d: struct share_mode_data > unique_content_epoch : 0x680d8beeb58dfb3a (7497802812006202170) > flags : 0x01e0 (480) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 1: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 0: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share' > base_name : * > base_name : 'link_to_destdir' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > not_stored : 0x01 (1) > modified : 0x01 (1) > id: struct file_id > devid : 0x0000000000000801 (2049) > inode : 0x00000000000df903 (915715) > extid : 0x0000000000000000 (0) >[2024/01/30 20:15:13.991942, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:676(share_mode_data_store) > share_mode_data_store: not modified >[2024/01/30 20:15:13.991946, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:210(share_mode_memcache_store) > share_mode_memcache_store: stored entry for file link_to_destdir epoch 680d8beeb58dfb3a key 2049:915715:0 >[2024/01/30 20:15:13.991952, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2024/01/30 20:15:13.991956, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.992001, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:487(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned >[2024/01/30 20:15:13.992006, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.992012, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/g_lock.c:1277(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_WAS_UNLOCKED >[2024/01/30 20:15:13.992018, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:6452(create_file_unixpath) > create_file_unixpath: info=1 >[2024/01/30 20:15:13.992022, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:6648(create_file_default) > create_file: info=1 >[2024/01/30 20:15:13.992026, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_create.c:1492(smbd_smb2_create_after_exec) > smbd_smb2_create_after_exec: response construction phase >[2024/01/30 20:15:13.992030, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/dosmode.c:692(fdos_mode) > fdos_mode: link_to_destdir >[2024/01/30 20:15:13.992041, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/dosmode.c:393(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file link_to_destdir: Error = No data available >[2024/01/30 20:15:13.992049, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/dosmode.c:69(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x10): "d" >[2024/01/30 20:15:13.992054, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_create.c:1761(smbd_smb2_create_finish) > smbd_smb2_create_finish: link_to_destdir - fnum 2107237156 >[2024/01/30 20:15:13.992061, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [7] idx[1] status[NT_STATUS_OK] body[88] dyn[yes:0] at ../../source3/smbd/smb2_create.c:431 >[2024/01/30 20:15:13.992066, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/8/8192 >[2024/01/30 20:15:13.992092, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:1987(file_free) > file_free: freed files structure 0 (1 used) >[2024/01/30 20:15:13.992110, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.992115, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 8 (position 8) from bitmap >[2024/01/30 20:15:13.992119, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SETINFO] mid = 8 >[2024/01/30 20:15:13.992125, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2024/01/30 20:15:13.992132, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/share] >[2024/01/30 20:15:13.992138, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:2725(smbd_smb2_request_verify_creditcharge) > smbd_smb2_request_verify_creditcharge: mid 8, CreditCharge: 1, NeededCharge: 1 >[2024/01/30 20:15:13.992143, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_setinfo.c:393(smbd_smb2_setinfo_send) > smbd_smb2_setinfo_send: link_to_destdir - fnum 2107237156 >[2024/01/30 20:15:13.992153, 3, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smb2_trans2.c:5050(smbd_do_setfilepathinfo) > smbd_do_setfilepathinfo: link_to_destdir (fnum 2107237156) info_level=1013 totdata=1 >[2024/01/30 20:15:13.992158, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/dosmode.c:692(fdos_mode) > fdos_mode: link_to_destdir >[2024/01/30 20:15:13.992165, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/dosmode.c:393(fget_ea_dos_attribute) > fget_ea_dos_attribute: Cannot get attribute from EA on file link_to_destdir: Error = No data available >[2024/01/30 20:15:13.992172, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/dosmode.c:69(dos_mode_debug_print) > dos_mode_debug_print: fdos_mode returning (0x10): "d" >[2024/01/30 20:15:13.992176, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/smb2_trans2.c:4212(smb_set_file_disposition_info) > smb_set_file_disposition_info: file link_to_destdir, dosmode = 16, delete_on_close = 1 >[2024/01/30 20:15:13.992181, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:78(fsp_new) > fsp_new: allocated files structure (2 used) >[2024/01/30 20:15:13.992185, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:115(fsp_bind_smb) > fsp_bind_smb: INTERNAL_OPEN_ONLY, skipping smbXsrv_open >[2024/01/30 20:15:13.992189, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:179(file_new) > file_new: new file fnum [invalid value] >[2024/01/30 20:15:13.992194, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:2197(file_name_hash) > file_name_hash: /share/link_to_destdir hash 0x141ea851 >[2024/01/30 20:15:13.992206, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:618(symlink_target_below_conn) > symlink_target_below_conn: redirecting to /share//share/destdir >[2024/01/30 20:15:13.992212, 4, pid=19063, effective(21125, 20513), real(21125, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to share >[2024/01/30 20:15:13.992217, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:508(chdir_below_conn) > chdir_below_conn: chdir to share failed: No such file or directory >[2024/01/30 20:15:13.992223, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/open.c:971(fd_openat) > fd_openat: name link_to_destdir, flags = 0200000 mode = 00, fd = -1. NT_STATUS_OBJECT_NAME_NOT_FOUND >[2024/01/30 20:15:13.992228, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:264(open_internal_dirfsp) > open_internal_dirfsp: Could not open fd for link_to_destdir (NT_STATUS_OBJECT_NAME_NOT_FOUND) >[2024/01/30 20:15:13.992233, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:1987(file_free) > file_free: freed files structure 0 (1 used) >[2024/01/30 20:15:13.992238, 3, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:4033(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_OBJECT_NAME_NOT_FOUND] || at ../../source3/smbd/smb2_setinfo.c:137 >[2024/01/30 20:15:13.992243, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [8] idx[1] status[NT_STATUS_OBJECT_NAME_NOT_FOUND] body[8] dyn[yes:1] at ../../source3/smbd/smb2_server.c:4082 >[2024/01/30 20:15:13.992248, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/9/8192 >[2024/01/30 20:15:13.992287, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.992298, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 9 (position 9) from bitmap >[2024/01/30 20:15:13.992302, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 9 >[2024/01/30 20:15:13.992307, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2024/01/30 20:15:13.992313, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/share] >[2024/01/30 20:15:13.992318, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_close.c:285(smbd_smb2_close_send) > smbd_smb2_close_send: link_to_destdir - fnum 2107237156 >[2024/01/30 20:15:13.992323, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_close.c:212(smbd_smb2_close) > smbd_smb2_close: link_to_destdir - fnum 2107237156 >[2024/01/30 20:15:13.992330, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/locking.tdb >[2024/01/30 20:15:13.992335, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/locking.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.992341, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:325(share_mode_memcache_fetch) > share_mode_memcache_fetch: fetched entry for file link_to_destdir epoch 680d8beeb58dfb3a key 2049:915715:0 >[2024/01/30 20:15:13.992346, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:993(get_share_mode_lock_internal) > get_share_mode_lock_internal: Returning 2049:915715:0 (data_cached=1 key_refcount=1) >[2024/01/30 20:15:13.992351, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/locking.c:1007(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x141ea851 >[2024/01/30 20:15:13.992356, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:2388(share_mode_entry_do) > share_mode_entry_do: num_share_modes=1 >[2024/01/30 20:15:13.992360, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:1945(share_mode_entry_find) > share_mode_entry_find: left=0, right=0, middle=0, middle_ptr=0x5610adde481c >[2024/01/30 20:15:13.992367, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:2404(share_mode_entry_do) > share_mode_entry_do: entry[0]: >[2024/01/30 20:15:13.992371, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/locking/share_mode_lock.c:2405(share_mode_entry_do) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > op_mid : 0x0000000000000007 (7) > op_type : SHARE_MODE_ENTRY_OP_TYPE_NONE (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00010000 (65536) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Jan 30 08:15:13 PM 2024 CET.991282 > share_file_id : 0x0000000000000003 (3) > uid : 0x00005285 (21125) > flags : 0x0000 (0) > name_hash : 0x141ea851 (337553489) > stale : 0x00 (0) >[2024/01/30 20:15:13.992432, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:2413(share_mode_entry_do) > share_mode_entry_do: entry[0]: modified=0, e.stale=1 >[2024/01/30 20:15:13.992438, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:2444(share_mode_entry_do) > share_mode_entry_do: share_mode_entry: >[2024/01/30 20:15:13.992444, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/locking/share_mode_lock.c:2445(share_mode_entry_do) > &e: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > op_mid : 0x0000000000000007 (7) > op_type : SHARE_MODE_ENTRY_OP_TYPE_NONE (0) > client_guid : 00000000-0000-0000-0000-000000000000 > lease_key: struct smb2_lease_key > data: ARRAY(2) > data : 0x0000000000000000 (0) > data : 0x0000000000000000 (0) > access_mask : 0x00010000 (65536) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Jan 30 08:15:13 PM 2024 CET.991282 > share_file_id : 0x0000000000000003 (3) > uid : 0x00005285 (21125) > flags : 0x0000 (0) > name_hash : 0x141ea851 (337553489) > stale : 0x01 (1) >[2024/01/30 20:15:13.992492, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:626(share_mode_data_ltdb_store) > share_mode_data_ltdb_store: >[2024/01/30 20:15:13.992496, 1, pid=19063, effective(21125, 20513), real(21125, 0), class=rpc_parse] ../../source3/locking/share_mode_lock.c:627(share_mode_data_ltdb_store) > d: struct share_mode_data > unique_content_epoch : 0x680d8beeb58dfb3c (7497802812006202172) > flags : 0x01e0 (480) > 1: SHARE_MODE_SHARE_DELETE > 1: SHARE_MODE_SHARE_WRITE > 1: SHARE_MODE_SHARE_READ > 1: SHARE_MODE_ACCESS_DELETE > 0: SHARE_MODE_ACCESS_WRITE > 0: SHARE_MODE_ACCESS_READ > 0: SHARE_MODE_LEASE_HANDLE > 0: SHARE_MODE_LEASE_WRITE > 0: SHARE_MODE_LEASE_READ > servicepath : * > servicepath : '/share' > base_name : * > base_name : 'link_to_destdir' > stream_name : NULL > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : NTTIME(0) > changed_write_time : NTTIME(0) > not_stored : 0x00 (0) > modified : 0x01 (1) > id: struct file_id > devid : 0x0000000000000801 (2049) > inode : 0x00000000000df903 (915715) > extid : 0x0000000000000000 (0) >[2024/01/30 20:15:13.992549, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=locking] ../../source3/locking/share_mode_lock.c:676(share_mode_data_store) > share_mode_data_store: not modified >[2024/01/30 20:15:13.992554, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/locking.tdb >[2024/01/30 20:15:13.992558, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.992563, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:487(dbwrap_watched_do_locked) > dbwrap_watched_do_locked: dbwrap_watched_do_locked_fn returned >[2024/01/30 20:15:13.992567, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.992571, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/lib/g_lock.c:1277(g_lock_lock) > g_lock_lock: status=NT_STATUS_OK, state.status=NT_STATUS_WAS_UNLOCKED >[2024/01/30 20:15:13.992578, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2024/01/30 20:15:13.992582, 10, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_open_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.992588, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_open_global.tdb >[2024/01/30 20:15:13.992593, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/files.c:1987(file_free) > file_free: freed files structure 2107237156 (0 used) >[2024/01/30 20:15:13.992600, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [9] idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../../source3/smbd/smb2_close.c:146 >[2024/01/30 20:15:13.992605, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/10/8192 >[2024/01/30 20:15:13.992703, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:5089(smbd_smb2_io_handler) > smbd_smb2_request idx[1] of 5 vectors >[2024/01/30 20:15:13.992711, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:791(smb2_validate_sequence_number) > smb2_validate_sequence_number: smb2_validate_sequence_number: clearing id 10 (position 10) from bitmap >[2024/01/30 20:15:13.992715, 10, pid=19063, effective(21125, 20513), real(21125, 0), class=smb2] ../../source3/smbd/smb2_server.c:3057(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TDIS] mid = 10 >[2024/01/30 20:15:13.992720, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:327(change_to_user_impersonate) > change_to_user_impersonate: Skipping user change - already user >[2024/01/30 20:15:13.992728, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/uid.c:299(print_impersonation_info) > print_impersonation_info: Impersonated user: uid=(21125,21125), gid=(0,20513), cwd=[/share] >[2024/01/30 20:15:13.992733, 4, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.992740, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.992744, 5, pid=19063, effective(21125, 20513), real(21125, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.992755, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.992766, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.992770, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.992774, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.992780, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.992784, 4, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to /share >[2024/01/30 20:15:13.992791, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1008(vfs_ChDir) > vfs_ChDir: vfs_ChDir got /share >[2024/01/30 20:15:13.992795, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.992799, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.992802, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.992810, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.992814, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_service.c:911(close_cnum) > dm9 (ipv4:172.18.200.42:36492) closed connection to service share >[2024/01/30 20:15:13.992820, 4, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:946(vfs_ChDir) > vfs_ChDir to / >[2024/01/30 20:15:13.992825, 5, pid=19063, effective(0, 0), real(0, 0), class=vfs] ../../source3/smbd/vfs.c:1008(vfs_ChDir) > vfs_ChDir: vfs_ChDir got / >[2024/01/30 20:15:13.992830, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.992834, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.992837, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.992844, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.992851, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.992855, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_tcon_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.992860, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key F545185F >[2024/01/30 20:15:13.992867, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addd3d00 >[2024/01/30 20:15:13.992872, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key F545185F >[2024/01/30 20:15:13.992876, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_tcon_global.tdb >[2024/01/30 20:15:13.992882, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:3924(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: mid [10] idx[1] status[NT_STATUS_OK] body[4] dyn[no:0] at ../../source3/smbd/smb2_tcon.c:568 >[2024/01/30 20:15:13.992887, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2_credits] ../../source3/smbd/smb2_server.c:1056(smb2_set_operation_credit) > smb2_set_operation_credit: smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 1/8192, total granted/max/low/range 8192/8192/11/8192 >[2024/01/30 20:15:13.992943, 10, pid=19063, effective(0, 0), real(0, 0), class=smb2] ../../source3/smbd/smb2_server.c:1758(smbd_server_connection_terminate_ex) > smbd_server_connection_terminate_ex: conn[ptr=0x5610addc8660,id=1,addr=ipv4:172.18.200.42:36492] num_ok[0] reason[NT_STATUS_END_OF_FILE] at ../../source3/smbd/smb2_server.c:5141 >[2024/01/30 20:15:13.992956, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_client_global.tdb >[2024/01/30 20:15:13.992960, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_client_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.992966, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 19A641C2F2160442A228 >[2024/01/30 20:15:13.992970, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addd5730 >[2024/01/30 20:15:13.992975, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.992982, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:915(smbXsrv_client_global_remove) > smbXsrv_client_global_remove: key '19A641C2F2160442A22899FDB68B8419' delete >[2024/01/30 20:15:13.992987, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_client_global.tdb >[2024/01/30 20:15:13.992992, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 19A641C2F2160442A228 >[2024/01/30 20:15:13.992996, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.993002, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_client.c:1453(smbXsrv_client_remove) > smbXsrv_client_remove: client_guid[c241a619-16f2-4204-a228-99fdb68b8419] stored >[2024/01/30 20:15:13.993007, 1, pid=19063, effective(0, 0), real(0, 0), class=rpc_parse] ../../source3/smbd/smbXsrv_client.c:1454(smbXsrv_client_remove) > &client_blob: struct smbXsrv_clientB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_clientU(case 0) > info0 : * > info0: struct smbXsrv_client > table : * > raw_ev_ctx : * > msg_ctx : * > global : * > global: struct smbXsrv_client_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000004a77 (19063) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xa7e5814468d400e2 (-6348525968892362526) > local_address : 'ipv4:172.18.200.42:445' > remote_address : 'ipv4:172.18.200.42:36492' > remote_name : '172.18.200.42' > initial_connect_time : Tue Jan 30 08:15:14 PM 2024 CET > client_guid : c241a619-16f2-4204-a228-99fdb68b8419 > stored : 0x00 (0) > sconn : * > session_table : * > tcon_table : NULL > open_table : * > connections : * > server_multi_channel_enabled: 0x01 (1) > next_channel_id : 0x0000000000000002 (2) > connection_pass_subreq : NULL > connection_drop_subreq : NULL > pending_breaks : NULL >[2024/01/30 20:15:13.993082, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.993086, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.993089, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.993096, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.993101, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.993104, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.993108, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.993114, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.993118, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.993132, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.993136, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.993142, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.993149, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:174(dbwrap_lock_order_lock) > dbwrap_lock_order_lock: check lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.993155, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:157(debug_lock_order) > lock order: 1:/var/cache/samba/smbXsrv_session_global.tdb 2:<none> 3:<none> 4:<none> >[2024/01/30 20:15:13.993160, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Locking key 4112976E >[2024/01/30 20:15:13.993166, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:153(db_tdb_fetch_locked_internal) > db_tdb_fetch_locked_internal: Allocated locked data 0x5610addd7e70 >[2024/01/30 20:15:13.993170, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:507(dbwrap_watched_record_prepare_wakeup) > dbwrap_watched_record_prepare_wakeup: No watchers >[2024/01/30 20:15:13.993175, 5, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap.c:206(dbwrap_lock_order_unlock) > dbwrap_lock_order_unlock: release lock order 1 for /var/cache/samba/smbXsrv_session_global.tdb >[2024/01/30 20:15:13.993179, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/dbwrap/dbwrap_tdb.c:60(db_tdb_log_key) > db_tdb_log_key: Unlocking key 4112976E >[2024/01/30 20:15:13.993183, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/dbwrap/dbwrap_watch.c:550(dbwrap_watched_trigger_wakeup) > dbwrap_watched_trigger_wakeup: No one to wakeup >[2024/01/30 20:15:13.993187, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.993191, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.993194, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.993200, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.993204, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smb2_process.c:1193(smbXsrv_connection_destructor) > smbXsrv_connection_destructor: xconn[ptr=0x5610addc8660,id=1,addr=ipv4:172.18.200.42:36492] >[2024/01/30 20:15:13.993211, 4, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/sec_ctx.c:318(set_sec_ctx_internal) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2024/01/30 20:15:13.993215, 5, pid=19063, effective(0, 0), real(0, 0)] ../../libcli/security/security_token.c:49(security_token_debug) > Security token: (NULL) >[2024/01/30 20:15:13.993218, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/auth/token_util.c:874(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2024/01/30 20:15:13.993224, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/uid.c:495(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2024/01/30 20:15:13.993228, 5, pid=19063, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:765(messaging_deregister) > Deregistering messaging pointer for type 784 - private_data=0x5610addaaf30 >[2024/01/30 20:15:13.993243, 10, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/smbXsrv_session.c:1271(smbXsrv_session_destructor) > smbXsrv_session_destructor: destructing session(1091737454) >[2024/01/30 20:15:13.993256, 10, pid=19063, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm_ref.c:163(msg_dgm_ref_destructor) > msg_dgm_ref_destructor: refs=(nil) >[2024/01/30 20:15:13.993340, 3, pid=19063, effective(0, 0), real(0, 0)] ../../source3/smbd/server_exit.c:230(exit_server_common) > Server exit (NT_STATUS_END_OF_FILE) >[2024/01/30 20:15:13.995155, 10, pid=18942, effective(0, 0), real(0, 0)] ../../lib/messaging/messages_dgm.c:1463(messaging_dgm_send) > messaging_dgm_send: Sending message to 18948 >[2024/01/30 20:15:13.995197, 10, pid=18948, effective(0, 0), real(0, 0)] ../../source3/lib/messages.c:423(messaging_recv_cb) > messaging_recv_cb: Received message 0x314 len 0 (num_fds:0) from 18942 >[2024/01/30 20:15:13.995299, 10, pid=18948, effective(0, 0), real(0, 0)] ../../source3/smbd/smbd_cleanupd.c:173(smbd_cleanupd_process_exited) > smbd_cleanupd_process_exited: cleaned up pid 19063
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 15564
: 18239