The Samba-Bugzilla – Attachment 18252 Details for
Bug 15583
set_nt_acl sometimes fails with NT_STATUS_INVALID_PARAMETER - openat() EACCES
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log - ok
sysvolreset.log (text/x-log), 2.91 MB, created by
Björn Baumbach
on 2024-02-15 22:40:39 UTC
(
hide
)
Description:
log - ok
Filename:
MIME Type:
Creator:
Björn Baumbach
Created:
2024-02-15 22:40:39 UTC
Size:
2.91 MB
patch
obsolete
>INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >Processing section "[sysvol]" >Processing section "[netlogon]" >pm_process() returned Yes >Security token SIDs (1): > SID[ 0]: S-1-5-18 > Privileges (0xFFFFFFFFFFFFFFFF): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >Initial schema load needed, as we have no existing schema, seq_num: 2 >schema_fsmo_init: we are master[yes] updates allowed[no] >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >lp_load_ex: refreshing parameters >Processing section "[global]" >doing parameter dns forwarder = 172.21.1.43 >doing parameter netbios name = SMB-BOOKWORM >doing parameter realm = TEMP.TEST >doing parameter server role = active directory domain controller >doing parameter workgroup = TEMP >doing parameter log level = 10 >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >doing parameter max log size = 0 >Processing section "[sysvol]" >add_a_service: Creating snum = 0 for sysvol >hash_a_service: creating servicehash >hash_a_service: hashing index 0 for service name sysvol >doing parameter path = /var/lib/samba/sysvol >doing parameter read only = No >Processing section "[netlogon]" >add_a_service: Creating snum = 1 for netlogon >hash_a_service: hashing index 1 for service name netlogon >doing parameter path = /var/lib/samba/sysvol/temp.test/scripts >doing parameter read only = No >pm_process() returned Yes >lp_servicenumber: couldn't find homes >Attempting to register passdb backend smbpasswd >Successfully added passdb backend 'smbpasswd' >Attempting to register passdb backend tdbsam >Successfully added passdb backend 'tdbsam' >Attempting to register passdb backend samba_dsdb >Successfully added passdb backend 'samba_dsdb' >Attempting to register passdb backend samba4 >Successfully added passdb backend 'samba4' >Attempting to register passdb backend ldapsam >Successfully added passdb backend 'ldapsam' >Attempting to register passdb backend NDS_ldapsam >Successfully added passdb backend 'NDS_ldapsam' >Attempting to find a passdb backend to match samba_dsdb:tdb:///var/lib/samba/private/sam.ldb (samba_dsdb) >Found pdb backend samba_dsdb >Initial schema load needed, as we have no existing schema, seq_num: 2 >schema_fsmo_init: we are master[yes] updates allowed[no] >ldb_wrap open of idmap.ldb >pdb backend samba_dsdb:tdb:///var/lib/samba/private/sam.ldb has a valid init >lp_load_ex: refreshing parameters >Freeing parametrics: >Processing section "[global]" >doing parameter dns forwarder = 172.21.1.43 >doing parameter netbios name = SMB-BOOKWORM >doing parameter realm = TEMP.TEST >doing parameter server role = active directory domain controller >doing parameter workgroup = TEMP >doing parameter log level = 10 >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 >doing parameter max log size = 0 >Processing section "[sysvol]" >doing parameter path = /var/lib/samba/sysvol >doing parameter read only = No >Processing section "[netlogon]" >doing parameter path = /var/lib/samba/sysvol/temp.test/scripts >doing parameter read only = No >pm_process() returned Yes >lp_servicenumber: couldn't find homes >set_conn_connectpath: service (null), connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01bf >Initialising default vfs hooks >vfs_find_backend_entry called for /[Default VFS]/ >Successfully added vfs backend '/[Default VFS]/' >vfs_find_backend_entry called for vfs_not_implemented >Successfully added vfs backend 'vfs_not_implemented' >vfs_find_backend_entry called for posixacl >Successfully added vfs backend 'posixacl' >vfs_find_backend_entry called for dfs_samba4 >Successfully added vfs backend 'dfs_samba4' >vfs_dfs_samba4: Debug class number of 'fileid': 38 >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >vfs module [acl_xattr] not loaded - trying to load... >load_module_absolute_path: Loading module '/usr/lib/x86_64-linux-gnu/samba/vfs/acl_xattr.so' >load_module_absolute_path: Module '/usr/lib/x86_64-linux-gnu/samba/vfs/acl_xattr.so' loaded >vfs_find_backend_entry called for acl_xattr >Successfully added vfs backend 'acl_xattr' >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service Unknown Service (snum == -1) >dfs_samba4: connect to service[Unknown Service (snum == -1)] >set_conn_connectpath: service (null), connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share (null), directory / >vfs_ChDir to /root >vfs_ChDir: vfs_ChDir got /root >openat_pathref_fsp: smb_fname [/var/lib/samba/sysvol/tmp_awhz56c] >openat_pathref_fullname: smb_fname [/var/lib/samba/sysvol/tmp_awhz56c] >fsp_new: allocated files structure (1 used) >file_name_hash: /var/lib/samba/sysvol/tmp_awhz56c hash 0x4f0ee8b0 >vfs_ChDir to /var/lib/samba/sysvol >vfs_ChDir: vfs_ChDir got /var/lib/samba/sysvol >vfs_ChDir to /root >vfs_ChDir: vfs_ChDir got /root >fd_openat: name /var/lib/samba/sysvol/tmp_awhz56c, flags = 04000 mode = 00, fd = 18 >openat_pathref_fullname: fsp [/var/lib/samba/sysvol/tmp_awhz56c]: OK >file_free: freed files structure 0 (0 used) >dfs_samba4_disconnect() connect to service[(null)]. >set_conn_connectpath: service (null), connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01bf >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service Unknown Service (snum == -1) >dfs_samba4: connect to service[Unknown Service (snum == -1)] >set_conn_connectpath: service (null), connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share (null), directory / >delete_lock_ref_count for file /var/lib/samba/sysvol/tmp_awhz56c >dfs_samba4_disconnect() connect to service[(null)]. >lp_load_ex: refreshing parameters >Freeing parametrics: >Processing section "[global]" >doing parameter dns forwarder = 172.21.1.43 >doing parameter netbios name = SMB-BOOKWORM >doing parameter realm = TEMP.TEST >doing parameter server role = active directory domain controller >doing parameter workgroup = TEMP >doing parameter log level = 10 >INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > scavenger: 10 > dns: 10 > ldb: 10 > tevent: 10 > auth_audit: 10 > auth_json_audit: 10 > kerberos: 10 > drs_repl: 10 > smb2: 10 > smb2_credits: 10 > dsdb_audit: 10 > dsdb_json_audit: 10 > dsdb_password_audit: 10 > dsdb_password_json_audit: 10 > dsdb_transaction_audit: 10 > dsdb_transaction_json_audit: 10 > dsdb_group_audit: 10 > dsdb_group_json_audit: 10 > dfs_samba4: 10 >doing parameter max log size = 0 >Processing section "[sysvol]" >doing parameter path = /var/lib/samba/sysvol >doing parameter read only = No >Processing section "[netlogon]" >doing parameter path = /var/lib/samba/sysvol/temp.test/scripts >doing parameter read only = No >pm_process() returned Yes >lp_servicenumber: couldn't find homes >Attempting to find a passdb backend to match samba_dsdb:tdb:///var/lib/samba/private/sam.ldb (samba_dsdb) >Found pdb backend samba_dsdb >ldb_wrap open of idmap.ldb >pdb backend samba_dsdb:tdb:///var/lib/samba/private/sam.ldb has a valid init >Attempting to find a passdb backend to match samba_dsdb:tdb:///var/lib/samba/private/sam.ldb (samba_dsdb) >Found pdb backend samba_dsdb >ldb_wrap open of idmap.ldb >pdb backend samba_dsdb:tdb:///var/lib/samba/private/sam.ldb has a valid init >gendb_search_v: DC=temp,DC=test NULL -> 1 >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: BASE flags=0x00002210 <SID=S-1-5-21-824728425-2751449521-1543008152-500> (objectClass=*) -> 1 >gendb_search_v: NULL (&(objectSid=\01\04\00\00\00\00\00\05\15\00\00\00i[\281\B1\C9\FF\A3\98o\F8[)(objectClass=domain)) -> 1 >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-513> NULL -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(!(groupType:1.2.840.113556.1.4.803:=1))(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 0 >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-512> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-572> -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-518> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-519> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-520> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 0 >dsdb_search_dn: flags=0x00000010 <SID=S-1-1-0> -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-2> -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-11> -> Duplicate base-DN matches found for '<SID=S-1-5-11>' (No such object) >dsdb_search: SUB flags=0x00000010 DC=temp,DC=test (&(objectClass=foreignSecurityPrincipal)(objectSID=S-1-5-11)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=eb51cff2-3ba1-477c-8505-5118569e523c> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=1)) -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-32-544> -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-32-545> -> 1 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-32-554> -> 1 >Security token SIDs (13): > SID[ 0]: S-1-5-21-824728425-2751449521-1543008152-500 > SID[ 1]: S-1-5-21-824728425-2751449521-1543008152-513 > SID[ 2]: S-1-5-21-824728425-2751449521-1543008152-512 > SID[ 3]: S-1-5-21-824728425-2751449521-1543008152-572 > SID[ 4]: S-1-5-21-824728425-2751449521-1543008152-518 > SID[ 5]: S-1-5-21-824728425-2751449521-1543008152-519 > SID[ 6]: S-1-5-21-824728425-2751449521-1543008152-520 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-5-32-544 > SID[ 11]: S-1-5-32-545 > SID[ 12]: S-1-5-32-554 > Privileges (0xFFFFFFFFFFFFFFFF): > Privilege[ 0]: SeMachineAccountPrivilege > Privilege[ 1]: SeTakeOwnershipPrivilege > Privilege[ 2]: SeBackupPrivilege > Privilege[ 3]: SeRestorePrivilege > Privilege[ 4]: SeRemoteShutdownPrivilege > Privilege[ 5]: SePrintOperatorPrivilege > Privilege[ 6]: SeAddUsersPrivilege > Privilege[ 7]: SeDiskOperatorPrivilege > Privilege[ 8]: SeSecurityPrivilege > Privilege[ 9]: SeSystemtimePrivilege > Privilege[ 10]: SeShutdownPrivilege > Privilege[ 11]: SeDebugPrivilege > Privilege[ 12]: SeSystemEnvironmentPrivilege > Privilege[ 13]: SeSystemProfilePrivilege > Privilege[ 14]: SeProfileSingleProcessPrivilege > Privilege[ 15]: SeIncreaseBasePriorityPrivilege > Privilege[ 16]: SeLoadDriverPrivilege > Privilege[ 17]: SeCreatePagefilePrivilege > Privilege[ 18]: SeIncreaseQuotaPrivilege > Privilege[ 19]: SeChangeNotifyPrivilege > Privilege[ 20]: SeUndockPrivilege > Privilege[ 21]: SeManageVolumePrivilege > Privilege[ 22]: SeImpersonatePrivilege > Privilege[ 23]: SeCreateGlobalPrivilege > Privilege[ 24]: SeEnableDelegationPrivilege > Rights (0x 0): >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol >unpack_nt_owners: validating owner_sids. >Opening cache file at /var/cache/samba/gencache.tdb >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol >delete_lock_ref_count for file /var/lib/samba/sysvol >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - before merge >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - before deny >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - return >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0150 (336) > num_aces : 0x0000000c (12) > aces: ARRAY(12) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - before merge >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - before deny >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - return >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0150 (336) > num_aces : 0x0000000c (12) > aces: ARRAY(12) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/USER >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9} >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9} >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/scripts > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/scripts >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/scripts >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/scripts is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/scripts >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/scripts >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/scripts based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/scripts >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/scripts >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp2.test/Policies > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp2.test/Policies >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp2.test/Policies >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp2.test/Policies is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp2.test/Policies >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp2.test/Policies based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp2.test/Policies >delete_lock_ref_count for file /var/lib/samba/sysvol/temp2.test/Policies >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - before merge >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - before deny >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: dir ace - return >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0150 (336) > num_aces : 0x0000000c (12) > aces: ARRAY(12) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >delete_lock_ref_count for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/GPT.INI >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: dir ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=72d89743-4c31-47b2-ae2a-88d64eeb1457> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-513> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=9a5c7573-cc87-4944-b9c8-8be5345efdf1> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000200 CN=Administrator,CN=Users,DC=temp,DC=test NULL -> 1 >Finding user Administrator >Trying _Get_Pwnam(), username as lowercase is administrator >Trying _Get_Pwnam(), username as given is Administrator >Trying _Get_Pwnam(), username as uppercase is ADMINISTRATOR >Checking combinations of 0 uppercase letters in administrator >Get_Pwnam_internals didn't find user [Administrator]! >Get_Pwnam_alloc failed for Administrator >could not create token for S-1-5-21-824728425-2751449521-1543008152-500 >print_canon_ace_list: file ace - return >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - return >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >set_canon_ace_list: setting ACL: >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 3. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 8. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 9. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 11. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >posix_fget_nt_acl: called for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Access ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: UID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: UID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: UID 3000003 -> S-1-5-18 from cache >xid_to_sid: UID 3000004 -> S-1-5-11 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >xid_to_sid: GID 3000002 -> S-1-5-32-549 from cache >xid_to_sid: GID 3000003 -> S-1-5-18 from cache >xid_to_sid: GID 3000004 -> S-1-5-11 from cache >canonicalise_acl: Default ace entries before arrange : >canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >canon_ace index 1. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 2. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >print_canon_ace_list: canonicalise_acl: ace entries after arrange >canon_ace index 0. Type = allow SID = S-1-3-0 uid 3000000 SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-3-1 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms --- >canon_ace index 2. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 4. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 5. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 gid 3000001 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 8. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 9. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-512 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 10. Type = allow SID = S-1-5-21-824728425-2751449521-1543008152-500 uid 3000000 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 11. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms --- >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >map_canon_ace_perms: Mapped (UNIX) 0 to (NT) 0 >merge_default_aces: Merging ACE 22 onto ACE 0. >merge_default_aces: Merging ACE 14 onto ACE 1. >merge_default_aces: Merging ACE 14 onto ACE 2. >merge_default_aces: Merging ACE 14 onto ACE 3. >merge_default_aces: Merging ACE 14 onto ACE 4. >merge_default_aces: Merging ACE 17 onto ACE 5. >merge_default_aces: Merging ACE 14 onto ACE 6. >merge_default_aces: Merging ACE 14 onto ACE 7. >merge_default_aces: Merging ACE 14 onto ACE 8. >merge_default_aces: Merging zero access ACE 11 onto ACE 14. >fset_nt_acl_common: storing xattr sd for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE based on system ACL > discard_const_p(struct security_descriptor, psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fset_nt_acl_common: storing hash in xattr sd based on system ACL and: > discard_const_p(struct security_descriptor, pdesc_next): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-21-824728425-2751449521-1543008152-512 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0178 (376) > num_aces : 0x0000000e (14) > aces: ARRAY(14) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-512 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-824728425-2751449521-1543008152-500 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-0 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x0b (11) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 1: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x0b: SEC_ACE_FLAG_VALID_INHERIT (11) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x00000000 (0) > object : union security_ace_object_ctr(case 0) > trustee : S-1-3-1 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >store_acl_blob_fsp: storing blob length 320 on file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >delete_lock_ref_count for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/MACHINE >dfs_samba4_disconnect() connect to service[sysvol]. >set_conn_connectpath: service sysvol, connectpath = / >se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >Initialising default vfs hooks >Initialising custom vfs hooks from [/[Default VFS]/] >vfs_find_backend_entry called for /[Default VFS]/ >Successfully loaded vfs module [/[Default VFS]/] with the new modules system >Initialising custom vfs hooks from [acl_xattr] >vfs_find_backend_entry called for acl_xattr >Successfully loaded vfs module [acl_xattr] with the new modules system >Initialising custom vfs hooks from [dfs_samba4] >vfs_find_backend_entry called for dfs_samba4 >Successfully loaded vfs module [dfs_samba4] with the new modules system >connect_acl_xattr: setting 'inherit acls = true' 'dos filemode = true' and 'force unknown acl user = true' for service sysvol >dfs_samba4: connect to service[sysvol] >set_conn_connectpath: service sysvol, connectpath = / >vfswrap_fs_capabilities: vfswrap_fs_capabilities: timestamp resolution of sec available on share sysvol, directory / >fset_nt_acl_common: incoming sd for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER > discard_const_p(struct security_descriptor, orig_psd): struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0000 (0) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0000 (0) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >fget_nt_acl_common: name=/var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >validate_nt_acl_blob: blob hash matches for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >fget_nt_acl_common: returning acl for /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER is: > psd: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9014 (36884) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 1: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-824728425-2751449521-1543008152-500 > group_sid : * > group_sid : S-1-5-32-544 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_ADS (4) > size : 0x0060 (96) > num_aces : 0x00000004 (4) > aces: ARRAY(4) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-544 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-32-549 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-18 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x03 (3) > 1: SEC_ACE_FLAG_OBJECT_INHERIT > 1: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x03: SEC_ACE_FLAG_VALID_INHERIT (3) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-11 > coda : union security_ace_coda(case 0) > ignored : DATA_BLOB length=0 >set_nt_acl: called for file /var/lib/samba/sysvol/temp.test/Policies/{6AC1786C-016F-11D2-945F-00C04FB984F9}/USER >unpack_nt_owners: validating owner_sids. >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: value=[3000000:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-21-824728425-2751449521-1543008152-500]: id=[3000000], endptr=[:B] >sid S-1-5-21-824728425-2751449521-1543008152-500 -> uid 3000000 >unpack_nt_owners: owner sid mapped to uid 3000000 >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >sid S-1-5-32-544 -> gid 3000001 >unpack_nt_owners: group sid mapped to gid 3000001 >unpack_nt_owners: owner_sids validated. >xid_to_sid: UID 3000000 -> S-1-5-21-824728425-2751449521-1543008152-500 from cache >xid_to_sid: GID 3000001 -> S-1-5-21-824728425-2751449521-1543008152-512 from cache >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: value=[3000001:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-544]: id=[3000001], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: value=[3000002:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-32-549]: id=[3000002], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: value=[3000003:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-18]: id=[3000003], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: value=[3000004:B] >Parsing value for key [IDMAP/SID2XID/S-1-5-11]: id=[3000004], endptr=[:B] >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >add_current_ace_to_acl: adding dir ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >add_current_ace_to_acl: adding file ACL: >canon_ace index 0. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >check_owning_objs: ACL is missing an owner entry. >print_canon_ace_list: file ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before merge >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >print_canon_ace_list: dir ace - before deny >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x3 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x3 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x3 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x3 perms r-x >print_canon_ace_list: file ace - before valid >canon_ace index 0. Type = allow SID = S-1-5-32-544 uid 3000001 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 1. Type = allow SID = S-1-5-32-544 gid 3000001 SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >canon_ace index 2. Type = allow SID = S-1-5-32-549 uid 3000002 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 3. Type = allow SID = S-1-5-32-549 gid 3000002 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >canon_ace index 4. Type = allow SID = S-1-5-18 uid 3000003 SMB_ACL_USER ace_flags = 0x0 perms rwx >canon_ace index 5. Type = allow SID = S-1-5-18 gid 3000003 SMB_ACL_GROUP ace_flags = 0x0 perms rwx >canon_ace index 6. Type = allow SID = S-1-5-11 uid 3000004 SMB_ACL_USER ace_flags = 0x0 perms r-x >canon_ace index 7. Type = allow SID = S-1-5-11 gid 3000004 SMB_ACL_GROUP ace_flags = 0x0 perms r-x >lookup_sid called for SID 'S-1-5-21-824728425-2751449521-1543008152-500' >Accepting SID S-1-5-21-824728425-2751449521-1543008152 in level 1 >lookup_rids called for domain sid 'S-1-5-21-824728425-2751449521-1543008152' >dsdb_search: BASE flags=0x00000200 <SID=S-1-5-21-824728425-2751449521-1543008152-500> samAccountName=* -> 1 >Sid S-1-5-21-824728425-2751449521-1543008152-500 -> TEMP\Administrator(1) >gendb_search_v: DC=temp,DC=test NULL -> 1 >dsdb_search: SUB flags=0x00000200 DC=temp,DC=test (&(objectsid=S-1-5-21-824728425-2751449521-1543008152-500)(objectclass=user)) -> 1 >pdb_set_username: setting username Administrator, was >pdb_set_user_sid: setting user sid S-1-5-21-824728425-2751449521-1543008152-500 >pdb_set_group_sid: setting group sid S-1-5-21-824728425-2751449521-1543008152-513 >dsdb_search_dn: flags=0x00000010 <SID=S-1-5-21-824728425-2751449521-1543008152-500> -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=81cf1af0-835d-4e9e-935b-3edfc000b9dc> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=8908dbe6-2b56-4007-8464-60f126e0ba19> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=29f9a737-1683-42ac-b87e-98432b806bdd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=c078a96d-5969-4088-a410-c711bf6befbd> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648)) -> 1 >dsdb_search: BASE flags=0x00000010 <GUID=66f8f84d-84f9-4582-968e-edc4d2993407> (&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=2147483648))