The Samba-Bugzilla – Attachment 6702 Details for
Bug 8311
Winzip occasionally can not read files out of an open winzip dialog (SMB2 support too incomplete)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
Log attached for a failed delete attempt
unsuccessfuldelete.txt (text/plain), 30.67 KB, created by
Eric Solheim
on 2011-07-19 15:45:21 UTC
(
hide
)
Description:
Log attached for a failed delete attempt
Filename:
MIME Type:
Creator:
Eric Solheim
Created:
2011-07-19 15:45:21 UTC
Size:
30.67 KB
patch
obsolete
>[2011/07/19 11:38:38.246049, 10] winbindd/winbindd_dual.c:68(child_read_request) > Need to read 48 extra bytes >[2011/07/19 11:38:38.246125, 4] winbindd/winbindd_dual.c:1548(fork_domain_child) > child daemon request 59 >[2011/07/19 11:38:38.246179, 10] winbindd/winbindd_dual.c:436(child_process_request) > child_process_request: request fn NDRCMD >[2011/07/19 11:38:38.246227, 10] winbindd/winbindd_dual_ndr.c:315(winbindd_dual_ndrcmd) > winbindd_dual_ndrcmd: Running command WBINT_LOOKUPNAME (CLARIDGE) >[2011/07/19 11:38:38.246293, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'UNIX GROUP' > name : * > name : 'USERS' > flags : 0x00000000 (0) >[2011/07/19 11:38:38.246479, 10] winbindd/winbindd_cache.c:1833(name_to_sid) > name_to_sid: [Cached] - doing backend query for name for domain CLARIDGE >[2011/07/19 11:38:38.246527, 3] winbindd/winbindd_samr.c:622(sam_name_to_sid) > sam_name_to_sid >[2011/07/19 11:38:38.246594, 5] rpc_server/rpc_ncacn_np.c:883(rpc_pipe_open_interface) > Connecting to lsarpc pipe. >[2011/07/19 11:38:38.246647, 4] rpc_server/rpc_ncacn_np.c:132(make_internal_rpc_pipe_p) > Create pipe requested \lsarpc >[2011/07/19 11:38:38.246702, 10] rpc_server/rpc_handles.c:116(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe \lsarpc >[2011/07/19 11:38:38.246750, 10] rpc_server/rpc_handles.c:133(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe \lsarpc >[2011/07/19 11:38:38.246809, 4] rpc_server/rpc_ncacn_np.c:176(make_internal_rpc_pipe_p) > Created internal pipe \lsarpc (pipes_open=0) >[2011/07/19 11:38:38.246880, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >[2011/07/19 11:38:38.247627, 10] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0xb0000000 to 0x000f0fff >[2011/07/19 11:38:38.247686, 4] rpc_server/srv_access_check.c:81(access_check_object) > _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f0fff) > but overritten by euid == sec_initial_uid() >[2011/07/19 11:38:38.247753, 4] rpc_server/srv_access_check.c:99(access_check_object) > _lsa_OpenPolicy2: access GRANTED (requested: 0x000f0fff, granted: 0x000f0fff) >[2011/07/19 11:38:38.247807, 4] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 0B 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.247908, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250b-0000-0000-254e-fea488770000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.248115, 3] winbindd/winbindd_rpc.c:303(rpc_name_to_sid) > name_to_sid: UNIX GROUP\USERS for domain UNIX GROUP >[2011/07/19 11:38:38.248189, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_LookupNames: struct lsa_LookupNames > in: struct lsa_LookupNames > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250b-0000-0000-254e-fea488770000 > num_names : 0x00000001 (1) > names: ARRAY(1) > names: struct lsa_String > length : 0x0020 (32) > size : 0x0020 (32) > string : * > string : 'UNIX GROUP\USERS' > sids : * > sids: struct lsa_TransSidArray > count : 0x00000000 (0) > sids : NULL > level : LSA_LOOKUP_NAMES_ALL (1) > count : * > count : 0x00000000 (0) >[2011/07/19 11:38:38.248669, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0B 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.248773, 5] rpc_server/lsa/srv_lsa_nt.c:205(lookup_lsa_rids) > lookup_lsa_rids: looking up name UNIX GROUP\USERS >[2011/07/19 11:38:38.248821, 10] passdb/lookup_sid.c:76(lookup_name) > lookup_name: UNIX GROUP\USERS => domain=[UNIX GROUP], name=[USERS] >[2011/07/19 11:38:38.248869, 10] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2011/07/19 11:38:38.249185, 5] rpc_server/lsa/srv_lsa_nt.c:224(lookup_lsa_rids) > init_lsa_rids: UNIX GROUP\USERS not found >[2011/07/19 11:38:38.249239, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_LookupNames: struct lsa_LookupNames > out: struct lsa_LookupNames > domains : * > domains : * > domains: struct lsa_RefDomainList > count : 0x00000000 (0) > domains : NULL > max_size : 0x00000000 (0) > sids : * > sids: struct lsa_TransSidArray > count : 0x00000001 (1) > sids : * > sids: ARRAY(1) > sids: struct lsa_TranslatedSid > sid_type : SID_NAME_UNKNOWN (8) > rid : 0x00000000 (0) > sid_index : 0xffffffff (4294967295) > count : * > count : 0x00000000 (0) > result : NT_STATUS_NONE_MAPPED >[2011/07/19 11:38:38.249754, 2] winbindd/winbindd_rpc.c:320(rpc_name_to_sid) > name_to_sid: failed to lookup name: NT_STATUS_NONE_MAPPED >[2011/07/19 11:38:38.249816, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250b-0000-0000-254e-fea488770000 >[2011/07/19 11:38:38.249980, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0B 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.250083, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0B 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.250186, 3] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2011/07/19 11:38:38.250234, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.250440, 10] rpc_server/rpc_handles.c:307(close_policy_by_pipe) > close_policy_by_pipe: deleted handle list for pipe \lsarpc >[2011/07/19 11:38:38.250518, 10] winbindd/winbindd_cache.c:452(fetch_cache_seqnum) > fetch_cache_seqnum: timeout [CLARIDGE][1311089615 @ 1311089615] >[2011/07/19 11:38:38.250567, 3] winbindd/winbindd_samr.c:1063(sam_sequence_number) > samr: sequence number >[2011/07/19 11:38:38.250630, 5] rpc_server/rpc_ncacn_np.c:883(rpc_pipe_open_interface) > Connecting to samr pipe. >[2011/07/19 11:38:38.250682, 4] rpc_server/rpc_ncacn_np.c:132(make_internal_rpc_pipe_p) > Create pipe requested \samr >[2011/07/19 11:38:38.250736, 10] rpc_server/rpc_handles.c:116(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe \samr >[2011/07/19 11:38:38.250784, 10] rpc_server/rpc_handles.c:133(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe \samr >[2011/07/19 11:38:38.250843, 4] rpc_server/rpc_ncacn_np.c:176(make_internal_rpc_pipe_p) > Created internal pipe \samr (pipes_open=0) >[2011/07/19 11:38:38.250905, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_Connect2: struct samr_Connect2 > in: struct samr_Connect2 > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: SAMR_ACCESS_CONNECT_TO_SERVER > 0: SAMR_ACCESS_SHUTDOWN_SERVER > 0: SAMR_ACCESS_INITIALIZE_SERVER > 0: SAMR_ACCESS_CREATE_DOMAIN > 0: SAMR_ACCESS_ENUM_DOMAINS > 0: SAMR_ACCESS_LOOKUP_DOMAIN >[2011/07/19 11:38:38.251166, 5] rpc_server/samr/srv_samr_nt.c:3932(_samr_Connect2) > _samr_Connect2: 3932 >[2011/07/19 11:38:38.251217, 10] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0xb0000000 to 0x000f003f >[2011/07/19 11:38:38.251274, 4] rpc_server/srv_access_check.c:81(access_check_object) > _samr_Connect2: ACCESS should be DENIED (requested: 0x000f003f) > but overritten by euid == sec_initial_uid() >[2011/07/19 11:38:38.251340, 4] rpc_server/srv_access_check.c:99(access_check_object) > _samr_Connect2: access GRANTED (requested: 0x000f003f, granted: 0x000f003f) >[2011/07/19 11:38:38.251390, 4] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 0C 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.251493, 5] rpc_server/samr/srv_samr_nt.c:3961(_samr_Connect2) > _samr_Connect2: 3961 >[2011/07/19 11:38:38.251540, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_Connect2: struct samr_Connect2 > out: struct samr_Connect2 > connect_handle : * > connect_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250c-0000-0000-254e-fea488770000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.251753, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_OpenDomain: struct samr_OpenDomain > in: struct samr_OpenDomain > connect_handle : * > connect_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250c-0000-0000-254e-fea488770000 > access_mask : 0x02000000 (33554432) > 0: SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1 > 0: SAMR_DOMAIN_ACCESS_SET_INFO_1 > 0: SAMR_DOMAIN_ACCESS_LOOKUP_INFO_2 > 0: SAMR_DOMAIN_ACCESS_SET_INFO_2 > 0: SAMR_DOMAIN_ACCESS_CREATE_USER > 0: SAMR_DOMAIN_ACCESS_CREATE_GROUP > 0: SAMR_DOMAIN_ACCESS_CREATE_ALIAS > 0: SAMR_DOMAIN_ACCESS_LOOKUP_ALIAS > 0: SAMR_DOMAIN_ACCESS_ENUM_ACCOUNTS > 0: SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT > 0: SAMR_DOMAIN_ACCESS_SET_INFO_3 > sid : * > sid : S-1-5-21-599140374-1546635192-3714713865 >[2011/07/19 11:38:38.252232, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.252342, 10] rpc_server/rpc_handles.c:410(_policy_handle_find) > found handle of type struct samr_connect_info >[2011/07/19 11:38:38.252392, 10] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0xb0000000 to 0x000f07ff >[2011/07/19 11:38:38.252442, 4] rpc_server/srv_access_check.c:81(access_check_object) > _samr_OpenDomain: ACCESS should be DENIED (requested: 0x000f07ff) > but overritten by euid == sec_initial_uid() >[2011/07/19 11:38:38.252508, 4] rpc_server/srv_access_check.c:99(access_check_object) > _samr_OpenDomain: access GRANTED (requested: 0x000f07ff, granted: 0x000f07ff) >[2011/07/19 11:38:38.252559, 4] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 00 00 00 00 0D 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.252659, 5] rpc_server/samr/srv_samr_nt.c:500(_samr_OpenDomain) > _samr_OpenDomain: 500 >[2011/07/19 11:38:38.252705, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_OpenDomain: struct samr_OpenDomain > out: struct samr_OpenDomain > domain_handle : * > domain_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250d-0000-0000-254e-fea488770000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.252926, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_QueryDomainInfo: struct samr_QueryDomainInfo > in: struct samr_QueryDomainInfo > domain_handle : * > domain_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250d-0000-0000-254e-fea488770000 > level : DomainModifiedInformation (8) >[2011/07/19 11:38:38.253115, 5] rpc_server/samr/srv_samr_nt.c:3563(_samr_QueryDomainInfo) > _samr_QueryDomainInfo: 3563 >[2011/07/19 11:38:38.253165, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0D 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.253274, 10] rpc_server/rpc_handles.c:410(_policy_handle_find) > found handle of type struct samr_domain_info >[2011/07/19 11:38:38.253324, 5] rpc_server/samr/srv_samr_nt.c:3653(_samr_QueryDomainInfo) > _samr_QueryDomainInfo: 3653 >[2011/07/19 11:38:38.253370, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_QueryDomainInfo: struct samr_QueryDomainInfo > out: struct samr_QueryDomainInfo > info : * > info : * > info : union samr_DomainInfo(case 8) > info8: struct samr_DomInfo8 > sequence_num : 0x000000004e25a4fe (1311089918) > domain_create_time : NTTIME(0) > result : NT_STATUS_OK >[2011/07/19 11:38:38.253617, 10] winbindd/winbindd_rpc.c:949(rpc_sequence_number) > domain_sequence_number: for domain CLARIDGE is 1311089918 >[2011/07/19 11:38:38.253677, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_Close: struct samr_Close > in: struct samr_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250d-0000-0000-254e-fea488770000 >[2011/07/19 11:38:38.253843, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0D 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.253946, 3] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2011/07/19 11:38:38.253993, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > samr_Close: struct samr_Close > out: struct samr_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.254193, 10] rpc_server/rpc_handles.c:307(close_policy_by_pipe) > close_policy_by_pipe: deleted handle list for pipe \samr >[2011/07/19 11:38:38.254282, 10] winbindd/winbindd_cache.c:495(wcache_store_seqnum) > wcache_store_seqnum: success [CLARIDGE][1311089918 @ 1311089918] >[2011/07/19 11:38:38.254331, 10] winbindd/winbindd_cache.c:582(refresh_sequence_number) > refresh_sequence_number: CLARIDGE seq number is now 1311089918 >[2011/07/19 11:38:38.254395, 10] winbindd/winbindd_cache.c:951(wcache_save_name_to_sid) > wcache_save_name_to_sid: UNIX GROUP\USERS -> S-0-0 (NT_STATUS_NONE_MAPPED) >[2011/07/19 11:38:38.254459, 10] winbindd/winbindd_cache.c:973(wcache_save_sid_to_name) > wcache_save_sid_to_name: S-0-0 -> users (NT_STATUS_NONE_MAPPED) >[2011/07/19 11:38:38.254521, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_USE_NONE (0) > sid : * > sid : S-0-0 > result : NT_STATUS_NONE_MAPPED >[2011/07/19 11:38:38.254710, 4] winbindd/winbindd_dual.c:1556(fork_domain_child) > Finished processing child request 59 >[2011/07/19 11:38:38.254757, 10] winbindd/winbindd_dual.c:1572(fork_domain_child) > Writing 3512 bytes to parent >[2011/07/19 11:38:38.257705, 10] winbindd/winbindd_dual.c:68(child_read_request) > Need to read 48 extra bytes >[2011/07/19 11:38:38.257774, 4] winbindd/winbindd_dual.c:1548(fork_domain_child) > child daemon request 59 >[2011/07/19 11:38:38.257824, 10] winbindd/winbindd_dual.c:436(child_process_request) > child_process_request: request fn NDRCMD >[2011/07/19 11:38:38.257872, 10] winbindd/winbindd_dual_ndr.c:315(winbindd_dual_ndrcmd) > winbindd_dual_ndrcmd: Running command WBINT_LOOKUPNAME (CLARIDGE) >[2011/07/19 11:38:38.257930, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'UNIX GROUP' > name : * > name : 'USERS' > flags : 0x00000000 (0) >[2011/07/19 11:38:38.258113, 10] winbindd/winbindd_cache.c:1833(name_to_sid) > name_to_sid: [Cached] - doing backend query for name for domain CLARIDGE >[2011/07/19 11:38:38.258166, 3] winbindd/winbindd_samr.c:622(sam_name_to_sid) > sam_name_to_sid >[2011/07/19 11:38:38.258232, 5] rpc_server/rpc_ncacn_np.c:883(rpc_pipe_open_interface) > Connecting to lsarpc pipe. >[2011/07/19 11:38:38.258292, 4] rpc_server/rpc_ncacn_np.c:132(make_internal_rpc_pipe_p) > Create pipe requested \lsarpc >[2011/07/19 11:38:38.258346, 10] rpc_server/rpc_handles.c:116(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe \lsarpc >[2011/07/19 11:38:38.258394, 10] rpc_server/rpc_handles.c:133(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe \lsarpc >[2011/07/19 11:38:38.258453, 4] rpc_server/rpc_ncacn_np.c:176(make_internal_rpc_pipe_p) > Created internal pipe \lsarpc (pipes_open=0) >[2011/07/19 11:38:38.258523, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >[2011/07/19 11:38:38.259265, 10] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0xb0000000 to 0x000f0fff >[2011/07/19 11:38:38.259323, 4] rpc_server/srv_access_check.c:81(access_check_object) > _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f0fff) > but overritten by euid == sec_initial_uid() >[2011/07/19 11:38:38.259390, 4] rpc_server/srv_access_check.c:99(access_check_object) > _lsa_OpenPolicy2: access GRANTED (requested: 0x000f0fff, granted: 0x000f0fff) >[2011/07/19 11:38:38.259443, 4] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 0E 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.259544, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250e-0000-0000-254e-fea488770000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.259748, 3] winbindd/winbindd_rpc.c:303(rpc_name_to_sid) > name_to_sid: UNIX GROUP\USERS for domain UNIX GROUP >[2011/07/19 11:38:38.259820, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_LookupNames: struct lsa_LookupNames > in: struct lsa_LookupNames > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250e-0000-0000-254e-fea488770000 > num_names : 0x00000001 (1) > names: ARRAY(1) > names: struct lsa_String > length : 0x0020 (32) > size : 0x0020 (32) > string : * > string : 'UNIX GROUP\USERS' > sids : * > sids: struct lsa_TransSidArray > count : 0x00000000 (0) > sids : NULL > level : LSA_LOOKUP_NAMES_ALL (1) > count : * > count : 0x00000000 (0) >[2011/07/19 11:38:38.260299, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0E 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.260401, 5] rpc_server/lsa/srv_lsa_nt.c:205(lookup_lsa_rids) > lookup_lsa_rids: looking up name UNIX GROUP\USERS >[2011/07/19 11:38:38.260450, 10] passdb/lookup_sid.c:76(lookup_name) > lookup_name: UNIX GROUP\USERS => domain=[UNIX GROUP], name=[USERS] >[2011/07/19 11:38:38.260498, 10] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2011/07/19 11:38:38.260765, 5] rpc_server/lsa/srv_lsa_nt.c:224(lookup_lsa_rids) > init_lsa_rids: UNIX GROUP\USERS not found >[2011/07/19 11:38:38.260819, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_LookupNames: struct lsa_LookupNames > out: struct lsa_LookupNames > domains : * > domains : * > domains: struct lsa_RefDomainList > count : 0x00000000 (0) > domains : NULL > max_size : 0x00000000 (0) > sids : * > sids: struct lsa_TransSidArray > count : 0x00000001 (1) > sids : * > sids: ARRAY(1) > sids: struct lsa_TranslatedSid > sid_type : SID_NAME_UNKNOWN (8) > rid : 0x00000000 (0) > sid_index : 0xffffffff (4294967295) > count : * > count : 0x00000000 (0) > result : NT_STATUS_NONE_MAPPED >[2011/07/19 11:38:38.261337, 2] winbindd/winbindd_rpc.c:320(rpc_name_to_sid) > name_to_sid: failed to lookup name: NT_STATUS_NONE_MAPPED >[2011/07/19 11:38:38.261399, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000250e-0000-0000-254e-fea488770000 >[2011/07/19 11:38:38.261564, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0E 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.261664, 4] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0E 25 00 00 00 00 00 00 25 4E FE A4 .....%.. ....%N�� > [0010] 88 77 00 00 .w.. >[2011/07/19 11:38:38.261762, 3] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2011/07/19 11:38:38.261810, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >[2011/07/19 11:38:38.262007, 10] rpc_server/rpc_handles.c:307(close_policy_by_pipe) > close_policy_by_pipe: deleted handle list for pipe \lsarpc >[2011/07/19 11:38:38.262069, 10] winbindd/winbindd_cache.c:537(refresh_sequence_number) > refresh_sequence_number: CLARIDGE time ok >[2011/07/19 11:38:38.262116, 10] winbindd/winbindd_cache.c:582(refresh_sequence_number) > refresh_sequence_number: CLARIDGE seq number is now 1311089918 >[2011/07/19 11:38:38.262188, 10] winbindd/winbindd_cache.c:951(wcache_save_name_to_sid) > wcache_save_name_to_sid: UNIX GROUP\USERS -> S-0-0 (NT_STATUS_NONE_MAPPED) >[2011/07/19 11:38:38.262257, 10] winbindd/winbindd_cache.c:973(wcache_save_sid_to_name) > wcache_save_sid_to_name: S-0-0 -> users (NT_STATUS_NONE_MAPPED) >[2011/07/19 11:38:38.262306, 1] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > out: struct wbint_LookupName > type : * > type : SID_NAME_USE_NONE (0) > sid : * > sid : S-0-0 > result : NT_STATUS_NONE_MAPPED >[2011/07/19 11:38:38.262498, 4] winbindd/winbindd_dual.c:1556(fork_domain_child) > Finished processing child request 59 >[2011/07/19 11:38:38.262544, 10] winbindd/winbindd_dual.c:1572(fork_domain_child) > Writing 3512 bytes to parent
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 8311
:
6701
| 6702 |
6725
|
6730
|
7602
|
7625