The Samba-Bugzilla – Attachment 7937 Details for
Bug 9196
defer_open is triggered multiple times on the same request
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
debug level 10 log of a crash
freeze.log (text/x-log), 819.68 KB, created by
Christian Ambach
on 2012-09-25 23:01:07 UTC
(
hide
)
Description:
debug level 10 log of a crash
Filename:
MIME Type:
Creator:
Christian Ambach
Created:
2012-09-25 23:01:07 UTC
Size:
819.68 KB
patch
obsolete
> get_privileges: No privileges assigned to SID [S-1-5-2] >[2012/09/25 15:56:51.246541, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-11] >[2012/09/25 15:56:51.246897, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1307(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2012/09/25 15:56:51.246999, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.247071, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.247147, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.247221, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.247306, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.247475, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 1000. >[2012/09/25 15:56:51.247576, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.247695, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.247775, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.247865, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.247937, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.248067, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.248149, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.248223, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.248309, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.248425, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.248562, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:56:51.248692, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.248789, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.248903, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.248979, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.249052, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.249139, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.249267, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:56:51.249408, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.249524, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:56:51.249620, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:56:51.249730, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:56:51.249822, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:56:51.249911, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:56:51.250005, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:56:51.250084, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:56:51.250164, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:56:51.250242, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:56:51.250357, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:56:51.250463, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:56:51.250548, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.250650, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.250754, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.250844, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.250918, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.251047, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:56:51.251137, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.251219, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:56:51.251318, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:56:51.251495, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:557(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:56:51.251612, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.251761, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:56:51.251916, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:56:51.252031, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:56:51.252126, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.252206, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.252285, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.252407, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.252495, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.252570, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.252731, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 1000. >[2012/09/25 15:56:51.252833, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.252914, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.252988, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.253061, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.253132, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.253249, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.253363, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.253459, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.253534, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.253619, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.254020, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:56:51.254074, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.254105, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.254131, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.254205, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.254321, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.254396, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.254539, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:56:51.254658, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.254760, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:56:51.254902, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:56:51.254988, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:56:51.255064, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:56:51.255144, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:56:51.255233, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:56:51.255335, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:56:51.255448, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:56:51.255537, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:56:51.255650, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:56:51.255754, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:56:51.255854, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.255933, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.256007, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:56:51.256093, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.256179, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.256323, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:56:51.256450, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.256537, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:56:51.256646, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:56:51.256795, 10, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:557(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:56:51.256947, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257016, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:56:51.257035, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:56:51.257055, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:56:51.257076, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257096, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257114, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257133, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257151, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.257169, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.257198, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 513. >[2012/09/25 15:56:51.257218, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.257237, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257256, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.257274, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.257305, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.257344, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:645(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 513 by key RID_00000201. >[2012/09/25 15:56:51.257379, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257400, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1770(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2012/09/25 15:56:51.257418, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1470(pdb_default_sid_to_id) > SID S-1-5-21-2119459776-1226821564-2322385355-513 is or domain, but is unmapped >[2012/09/25 15:56:51.257441, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257463, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1121(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:56:51.257483, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257502, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257520, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257539, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.257568, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.257599, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 513. >[2012/09/25 15:56:51.257620, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.257639, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257657, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:56:51.257675, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.257693, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.257726, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:645(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 513 by key RID_00000201. >[2012/09/25 15:56:51.257754, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257775, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1770(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2012/09/25 15:56:51.257793, 5, pid=18008, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1470(pdb_default_sid_to_id) > SID S-1-5-21-2119459776-1226821564-2322385355-513 is or domain, but is unmapped >[2012/09/25 15:56:51.257820, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257839, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1121(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:56:51.257863, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257882, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257900, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.257919, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.257936, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.257966, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.257987, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258005, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258023, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258041, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258059, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258093, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258114, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2012/09/25 15:56:51.258134, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258152, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258170, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258189, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258206, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258235, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258256, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258277, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258308, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258327, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258345, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258383, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258404, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2012/09/25 15:56:51.258423, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258442, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258460, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258478, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258496, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258525, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258552, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258579, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258598, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258616, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258634, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258668, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258689, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2012/09/25 15:56:51.258709, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258727, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258745, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258763, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258781, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258815, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258836, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258854, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258873, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.258894, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.258912, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.258946, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.258967, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2012/09/25 15:56:51.258987, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259006, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259024, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259042, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.259060, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.259089, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259110, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259128, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259146, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259165, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.259182, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.259216, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259237, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-11 >[2012/09/25 15:56:51.259256, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259279, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259308, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259327, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.259345, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.259376, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259396, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259415, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259437, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.259456, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.259473, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.259508, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.259529, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-11 >[2012/09/25 15:56:51.259558, 10, pid=18008, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-5-21-2119459776-1226821564-2322385355-513 to gid, ignoring it >[2012/09/25 15:56:51.259590, 10, pid=18008, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2012/09/25 15:56:51.259610, 10, pid=18008, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2012/09/25 15:56:51.259630, 10, pid=18008, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-5-11 to gid, ignoring it >[2012/09/25 15:56:51.259656, 10, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:56:51.259821, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:56:51.259925, 7, pid=18008, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find ambi >[2012/09/25 15:56:51.259950, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:56:51.259969, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:56:51.259989, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:56:51.260009, 3, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/password.c:144(register_homes_share) > Adding homes service for user 'ambi' using home directory: '/home/ambi' >[2012/09/25 15:56:51.260067, 8, pid=18008, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1621(add_a_service) > add_a_service: Creating snum = 7 for ambi >[2012/09/25 15:56:51.260089, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1671(hash_a_service) > hash_a_service: hashing index 7 for service name ambi >[2012/09/25 15:56:51.260116, 3, pid=18008, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1727(lp_add_home) > adding home's share [ambi] for user 'ambi' at '/home/%U' >[2012/09/25 15:56:51.260160, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:56:51.260181, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/sessionid.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.260203, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 49442F31383030382F33 >[2012/09/25 15:56:51.260227, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89c570 >[2012/09/25 15:56:51.260282, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 49442F31383030382F33 >[2012/09/25 15:56:51.260348, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:56:51.260368, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.260408, 6, pid=18008, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2659(lp_file_list_changed) > lp_file_list_changed() > file /data/samba/prefix/master/etc/smb.conf -> /data/samba/prefix/master/etc/smb.conf last mod_time: Mon Sep 24 15:42:01 2012 > >[2012/09/25 15:56:51.260460, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:56:51.260481, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.260502, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key E3851D76 >[2012/09/25 15:56:51.260524, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89c790 >[2012/09/25 15:56:51.260611, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:853(smbXsrv_session_global_store) >[2012/09/25 15:56:51.260628, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:855(smbXsrv_session_global_store) > smbXsrv_session_global_store: key 'E3851D76' stored >[2012/09/25 15:56:51.260649, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0xe3851d76 (3817151862) > session_wire_id : 0x00000000e3851d76 (3817151862) > creation_time : Tue Sep 25 03:56:51 PM 2012 PDT > expiration_time : Wed Dec 31 04:00:00 PM 1969 PST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000b (11) > sids: ARRAY(11) > sids : S-1-5-21-2119459776-1226821564-2322385355-1000 > sids : S-1-5-21-2119459776-1226821564-2322385355-513 > sids : S-1-22-2-1000 > sids : S-1-22-2-10 > sids : S-1-22-2-18 > sids : S-1-22-2-988 > sids : S-1-22-2-986 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1000 > privilege_mask : 0x0000000000002e80 (11904) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 1: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 1: SEC_PRIV_BACKUP_BIT > 1: SEC_PRIV_RESTORE_BIT > 1: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 1: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e8 (1000) > gid : 0x00000000000003e8 (1000) > ngroups : 0x00000005 (5) > groups: ARRAY(5) > groups : 0x00000000000003e8 (1000) > groups : 0x000000000000000a (10) > groups : 0x0000000000000012 (18) > groups : 0x00000000000003dc (988) > groups : 0x00000000000003da (986) > info : * > info: struct auth_user_info > account_name : * > account_name : 'ambi' > domain_name : * > domain_name : 'AMBI' > full_name : * > full_name : 'Christian Ambach' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\ambi\ambi\profile' > home_directory : * > home_directory : '\\ambi\ambi' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'AMBI' > last_logon : NTTIME(0) > last_logoff : Wed Sep 13 07:48:05 PM 30828 PDT > acct_expiry : Wed Sep 13 07:48:05 PM 30828 PDT > last_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > allow_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > force_password_change : Wed Sep 13 07:48:05 PM 30828 PDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'ambi' > sanitized_username : * > sanitized_username : 'ambi' > torture : NULL > credentials : NULL > connection_dialect : 0x0210 (528) > signing_required : 0x00 (0) > encryption_required : 0x00 (0) > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > local_address : 'ipv4:10.10.23.29:445' > remote_address : 'ipv4:10.10.15.55:1290' > remote_name : '10.10.15.55' > auth_session_info_seqnum : 0x00000001 (1) >[2012/09/25 15:56:51.261881, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key E3851D76 >[2012/09/25 15:56:51.261907, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:56:51.261927, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.261946, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:1269(smbXsrv_session_update) >[2012/09/25 15:56:51.261958, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:1277(smbXsrv_session_update) > smbXsrv_session_update: global_id (0xe3851d76) stored >[2012/09/25 15:56:51.261976, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > connection : * > local_id : 0xe3851d76 (3817151862) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0xe3851d76 (3817151862) > session_wire_id : 0x00000000e3851d76 (3817151862) > creation_time : Tue Sep 25 03:56:51 PM 2012 PDT > expiration_time : Wed Dec 31 04:00:00 PM 1969 PST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000b (11) > sids: ARRAY(11) > sids : S-1-5-21-2119459776-1226821564-2322385355-1000 > sids : S-1-5-21-2119459776-1226821564-2322385355-513 > sids : S-1-22-2-1000 > sids : S-1-22-2-10 > sids : S-1-22-2-18 > sids : S-1-22-2-988 > sids : S-1-22-2-986 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1000 > privilege_mask : 0x0000000000002e80 (11904) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 1: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 1: SEC_PRIV_BACKUP_BIT > 1: SEC_PRIV_RESTORE_BIT > 1: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 1: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e8 (1000) > gid : 0x00000000000003e8 (1000) > ngroups : 0x00000005 (5) > groups: ARRAY(5) > groups : 0x00000000000003e8 (1000) > groups : 0x000000000000000a (10) > groups : 0x0000000000000012 (18) > groups : 0x00000000000003dc (988) > groups : 0x00000000000003da (986) > info : * > info: struct auth_user_info > account_name : * > account_name : 'ambi' > domain_name : * > domain_name : 'AMBI' > full_name : * > full_name : 'Christian Ambach' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\ambi\ambi\profile' > home_directory : * > home_directory : '\\ambi\ambi' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'AMBI' > last_logon : NTTIME(0) > last_logoff : Wed Sep 13 07:48:05 PM 30828 PDT > acct_expiry : Wed Sep 13 07:48:05 PM 30828 PDT > last_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > allow_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > force_password_change : Wed Sep 13 07:48:05 PM 30828 PDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'ambi' > sanitized_username : * > sanitized_username : 'ambi' > torture : NULL > credentials : NULL > connection_dialect : 0x0210 (528) > signing_required : 0x00 (0) > encryption_required : 0x00 (0) > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > local_address : 'ipv4:10.10.23.29:445' > remote_address : 'ipv4:10.10.15.55:1290' > remote_name : '10.10.15.55' > auth_session_info_seqnum : 0x00000001 (1) > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:56:51 PM 2012 PDT > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > gensec : * > compat : * > tcon_table : * >[2012/09/25 15:56:51.263266, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[8] dyn[yes:0] at ../source3/smbd/smb2_sesssetup.c:167 >[2012/09/25 15:56:51.263302, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 10, charge 1, granted 10, current possible/max 512/512, total granted/max/low/range 10/8192/3/10 >[2012/09/25 15:56:51.263348, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/smb/smb2_signing.c:92(smb2_signing_sign_pdu) > signed SMB2 message >[2012/09/25 15:56:51.268864, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:56:51.269007, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 3 (position 3) from bitmap >[2012/09/25 15:56:51.269093, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 3 >[2012/09/25 15:56:51.269191, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.269272, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.269346, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.269461, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:56:51.269589, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_tcon.c:198(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\10.10.23.29\Share1] share[Share1] >[2012/09/25 15:56:51.269756, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:56:51.269874, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.269962, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key F62398C5 >[2012/09/25 15:56:51.270053, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89a180 >[2012/09/25 15:56:51.270237, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:672(smbXsrv_tcon_global_store) >[2012/09/25 15:56:51.270385, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:674(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'F62398C5' stored >[2012/09/25 15:56:51.270467, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xf62398c5 (4129528005) > tcon_wire_id : 0xf62398c5 (4129528005) > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > creation_time : Tue Sep 25 03:56:51 PM 2012 PDT > share_name : NULL > encryption_required : 0x00 (0) >[2012/09/25 15:56:51.270916, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key F62398C5 >[2012/09/25 15:56:51.271002, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:56:51.271078, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.271156, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:796(smbXsrv_tcon_create) >[2012/09/25 15:56:51.271201, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:804(smbXsrv_tcon_create) > smbXsrv_tcon_create: global_id (0xf62398c5) stored >[2012/09/25 15:56:51.271273, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xf62398c5 (4129528005) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xf62398c5 (4129528005) > tcon_wire_id : 0xf62398c5 (4129528005) > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > creation_time : Tue Sep 25 03:56:51 PM 2012 PDT > share_name : NULL > encryption_required : 0x00 (0) > status : NT_STATUS_INTERNAL_ERROR > idle_time : Tue Sep 25 03:56:51 PM 2012 PDT > compat : NULL >[2012/09/25 15:56:51.272235, 3, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 10.10.15.55 (10.10.15.55) >[2012/09/25 15:56:51.272389, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/share_access.c:242(user_ok_token) > user_ok_token: share share1 is ok for unix user ambi >[2012/09/25 15:56:51.272660, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:163(set_conn_connectpath) > set_conn_connectpath: service share1, connectpath = /data/samba/shares/share1 >[2012/09/25 15:56:51.272770, 3, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:640(make_connection_snum) > Connect path is '/data/samba/shares/share1' for service [share1] >[2012/09/25 15:56:51.272996, 10, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:337(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >[2012/09/25 15:56:51.273116, 3, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:113(vfs_init_default) > Initialising default vfs hooks >[2012/09/25 15:56:51.273222, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2012/09/25 15:56:51.273308, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2012/09/25 15:56:51.273394, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2012/09/25 15:56:51.273498, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2012/09/25 15:56:51.273602, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for dfs_samba4 >[2012/09/25 15:56:51.273680, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'dfs_samba4' >[2012/09/25 15:56:51.273772, 10, pid=18008, effective(0, 0), real(0, 0), class=(null)] ../source3/modules/vfs_dfs_samba4.c:155(vfs_dfs_samba4_init) > vfs_dfs_samba4: Debug class number of 'fileid': 20 >[2012/09/25 15:56:51.273865, 3, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:139(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2012/09/25 15:56:51.273950, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2012/09/25 15:56:51.274062, 3, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:139(vfs_init_custom) > Initialising custom vfs hooks from [time_audit] >[2012/09/25 15:56:51.274139, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for time_audit >[2012/09/25 15:56:51.274210, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [time_audit] not loaded - trying to load... >[2012/09/25 15:56:51.274306, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/util/modules.c:174(do_smb_load_module) > Loading module 'time_audit' >[2012/09/25 15:56:51.274405, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/util/modules.c:188(do_smb_load_module) > Loading module 'time_audit': Trying to load from /data/samba/git/samba/bin/modules/vfs/time_audit.so >[2012/09/25 15:56:51.277524, 2, pid=18008, effective(0, 0), real(0, 0)] ../lib/util/modules.c:199(do_smb_load_module) > Module 'time_audit' loaded >[2012/09/25 15:56:51.277575, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for time_audit >[2012/09/25 15:56:51.277596, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'time_audit' >[2012/09/25 15:56:51.277619, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for time_audit > Successfully loaded vfs module [time_audit] with the new modules system >[2012/09/25 15:56:51.277645, 3, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:139(vfs_init_custom) > Initialising custom vfs hooks from [xattr_tdb] >[2012/09/25 15:56:51.277665, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for xattr_tdb >[2012/09/25 15:56:51.277683, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [xattr_tdb] not loaded - trying to load... >[2012/09/25 15:56:51.277701, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/util/modules.c:174(do_smb_load_module) > Loading module 'xattr_tdb' >[2012/09/25 15:56:51.277721, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/util/modules.c:188(do_smb_load_module) > Loading module 'xattr_tdb': Trying to load from /data/samba/git/samba/bin/modules/vfs/xattr_tdb.so >[2012/09/25 15:56:51.278888, 2, pid=18008, effective(0, 0), real(0, 0)] ../lib/util/modules.c:199(do_smb_load_module) > Module 'xattr_tdb' loaded >[2012/09/25 15:56:51.278932, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for xattr_tdb >[2012/09/25 15:56:51.278957, 5, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'xattr_tdb' >[2012/09/25 15:56:51.278976, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for xattr_tdb > Successfully loaded vfs module [xattr_tdb] with the new modules system >[2012/09/25 15:56:51.279011, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/connection.c:160(claim_connection) > claiming [share1] >[2012/09/25 15:56:51.279036, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:56:51.279056, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/connections.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.279078, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 58460000000000000000 >[2012/09/25 15:56:51.279102, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x890d10 >[2012/09/25 15:56:51.279143, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 58460000000000000000 >[2012/09/25 15:56:51.279183, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:56:51.279203, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.279245, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.279267, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.279286, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:56:51.279305, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.279323, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.279380, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.279452, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 784 - private_data=0x899820 >[2012/09/25 15:56:51.279497, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:163(set_conn_connectpath) > set_conn_connectpath: service share1, connectpath = /data/samba/shares/share1 >[2012/09/25 15:56:51.279526, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/share_access.c:242(user_ok_token) > user_ok_token: share share1 is ok for unix user ambi >[2012/09/25 15:56:51.279551, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/share_access.c:289(is_share_read_only_for_token) > is_share_read_only_for_user: share share1 is read-write for unix user ambi >[2012/09/25 15:56:51.279612, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.279637, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:56:51.279795, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:56:51.279867, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:274(change_to_user_internal) > Impersonated user: uid=(1000,1000), gid=(0,1000) >[2012/09/25 15:56:51.279892, 4, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.279912, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.279930, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.279959, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:56:51.279986, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:163(set_conn_connectpath) > set_conn_connectpath: service share1, connectpath = /data/samba/shares/share1 >[2012/09/25 15:56:51.280040, 10, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/modules/vfs_default.c:167(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share share1, directory /data/samba/shares/share1 >[2012/09/25 15:56:51.280065, 1, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:895(make_connection_snum) > smb-smb2-cli-02 (ipv4:10.10.15.55:1290) connect to service share1 initially as user ambi (uid=1000, gid=1000) (pid 18008) >[2012/09/25 15:56:51.280102, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:56:51.280122, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.280143, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key F62398C5 >[2012/09/25 15:56:51.280164, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x894760 >[2012/09/25 15:56:51.280190, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:672(smbXsrv_tcon_global_store) >[2012/09/25 15:56:51.280204, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:674(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key 'F62398C5' stored >[2012/09/25 15:56:51.280223, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0xf62398c5 (4129528005) > tcon_wire_id : 0xf62398c5 (4129528005) > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > creation_time : Tue Sep 25 03:56:51 PM 2012 PDT > share_name : 'share1' > encryption_required : 0x00 (0) >[2012/09/25 15:56:51.280380, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key F62398C5 >[2012/09/25 15:56:51.280401, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:56:51.280420, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.280439, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:849(smbXsrv_tcon_update) >[2012/09/25 15:56:51.280451, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:857(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0xf62398c5) stored >[2012/09/25 15:56:51.280469, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0xf62398c5 (4129528005) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0xf62398c5 (4129528005) > tcon_wire_id : 0xf62398c5 (4129528005) > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > creation_time : Tue Sep 25 03:56:51 PM 2012 PDT > share_name : 'share1' > encryption_required : 0x00 (0) > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:56:51 PM 2012 PDT > compat : * >[2012/09/25 15:56:51.280707, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../source3/smbd/smb2_tcon.c:162 >[2012/09/25 15:56:51.280731, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 10, charge 1, granted 10, current possible/max 503/512, total granted/max/low/range 19/8192/4/19 >[2012/09/25 15:56:51.289357, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:56:51.289445, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 4 (position 4) from bitmap >[2012/09/25 15:56:51.289492, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 4 >[2012/09/25 15:56:51.289565, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.289616, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:56:51.289978, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:56:51.290125, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:274(change_to_user_internal) > Impersonated user: uid=(1000,1000), gid=(0,1000) >[2012/09/25 15:56:51.290180, 4, pid=18008, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:816(vfs_ChDir) > vfs_ChDir to /data/samba/shares/share1 >[2012/09/25 15:56:51.290276, 4, pid=18008, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:827(vfs_ChDir) > vfs_ChDir got /data/samba/shares/share1 >[2012/09/25 15:56:51.290362, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:450(smbd_smb2_create_send) > smbd_smb2_create: name[test.txt] >[2012/09/25 15:56:51.290440, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:56:51.290489, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.290537, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 192696F1 >[2012/09/25 15:56:51.290607, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89f0c0 >[2012/09/25 15:56:51.304895, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:602(smbXsrv_open_global_verify_record) > smbXsrv_open_global_verify_record >[2012/09/25 15:56:51.305036, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:603(smbXsrv_open_global_verify_record) >[2012/09/25 15:56:51.305088, 1, pid=18008, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > open_global_id : 0x192696f1 (421959409) > open_persistent_id : 0x00000000192696f1 (421959409) > open_volatile_id : 0x0000000011fd5523 (301815075) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:56:50 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 4d8b401b-4bbb-4524-8501-b6f6f601399e > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x000ea600 (960000) > durable : 0x01 (1) > backend_cookie : DATA_BLOB length=165 > [0000] 56 46 53 5F 44 45 46 41 55 4C 54 5F 44 55 52 41 VFS_DEFA ULT_DURA > [0010] 42 4C 45 5F 43 4F 4F 4B 49 45 5F 4D 41 47 49 43 BLE_COOK IE_MAGIC > [0020] 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 > [0030] 00 00 00 00 00 00 00 00 04 FD 00 00 00 00 00 00 ........ ........ > [0040] 42 83 68 00 00 00 00 00 00 00 00 00 00 00 00 00 B.h..... ........ > [0050] 00 00 02 00 04 00 02 00 00 00 00 00 00 00 00 00 ........ ........ > [0060] 00 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00 ........ ........ > [0070] 1A 00 00 00 2F 64 61 74 61 2F 73 61 6D 62 61 2F ..../dat a/samba/ > [0080] 73 68 61 72 65 73 2F 73 68 61 72 65 31 00 00 00 shares/s hare1... > [0090] 09 00 00 00 00 00 00 00 09 00 00 00 74 65 73 74 ........ ....test > [00A0] 2E 74 78 74 00 .txt. >[2012/09/25 15:56:51.307088, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:56:51.307151, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '192696F1' stored >[2012/09/25 15:56:51.307233, 1, pid=18008, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000003 (3) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > open_global_id : 0x192696f1 (421959409) > open_persistent_id : 0x00000000192696f1 (421959409) > open_volatile_id : 0x0000000050ec51e4 (1357664740) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:56:50 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 4d8b401b-4bbb-4524-8501-b6f6f601399e > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x000ea600 (960000) > durable : 0x01 (1) > backend_cookie : DATA_BLOB length=165 > [0000] 56 46 53 5F 44 45 46 41 55 4C 54 5F 44 55 52 41 VFS_DEFA ULT_DURA > [0010] 42 4C 45 5F 43 4F 4F 4B 49 45 5F 4D 41 47 49 43 BLE_COOK IE_MAGIC > [0020] 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 > [0030] 00 00 00 00 00 00 00 00 04 FD 00 00 00 00 00 00 ........ ........ > [0040] 42 83 68 00 00 00 00 00 00 00 00 00 00 00 00 00 B.h..... ........ > [0050] 00 00 02 00 04 00 02 00 00 00 00 00 00 00 00 00 ........ ........ > [0060] 00 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00 ........ ........ > [0070] 1A 00 00 00 2F 64 61 74 61 2F 73 61 6D 62 61 2F ..../dat a/samba/ > [0080] 73 68 61 72 65 73 2F 73 68 61 72 65 31 00 00 00 shares/s hare1... > [0090] 09 00 00 00 00 00 00 00 09 00 00 00 74 65 73 74 ........ ....test > [00A0] 2E 74 78 74 00 .txt. >[2012/09/25 15:56:51.308929, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 192696F1 >[2012/09/25 15:56:51.309016, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:56:51.309092, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.309171, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:1264(smb2srv_open_recreate) >[2012/09/25 15:56:51.309217, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:1272(smb2srv_open_recreate) > smbXsrv_open_recreate: global_id (0x192696f1) stored >[2012/09/25 15:56:51.309290, 1, pid=18008, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x50ec51e4 (1357664740) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x0000000000004658 (18008) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x31f49d06652ba18d (3599674652968591757) > open_global_id : 0x192696f1 (421959409) > open_persistent_id : 0x00000000192696f1 (421959409) > open_volatile_id : 0x0000000050ec51e4 (1357664740) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:56:50 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 4d8b401b-4bbb-4524-8501-b6f6f601399e > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x000ea600 (960000) > durable : 0x01 (1) > backend_cookie : DATA_BLOB length=165 > [0000] 56 46 53 5F 44 45 46 41 55 4C 54 5F 44 55 52 41 VFS_DEFA ULT_DURA > [0010] 42 4C 45 5F 43 4F 4F 4B 49 45 5F 4D 41 47 49 43 BLE_COOK IE_MAGIC > [0020] 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 > [0030] 00 00 00 00 00 00 00 00 04 FD 00 00 00 00 00 00 ........ ........ > [0040] 42 83 68 00 00 00 00 00 00 00 00 00 00 00 00 00 B.h..... ........ > [0050] 00 00 02 00 04 00 02 00 00 00 00 00 00 00 00 00 ........ ........ > [0060] 00 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00 ........ ........ > [0070] 1A 00 00 00 2F 64 61 74 61 2F 73 61 6D 62 61 2F ..../dat a/samba/ > [0080] 73 68 61 72 65 73 2F 73 68 61 72 65 31 00 00 00 shares/s hare1... > [0090] 09 00 00 00 00 00 00 00 09 00 00 00 74 65 73 74 ........ ....test > [00A0] 2E 74 78 74 00 .txt. > status : NT_STATUS_FILE_CLOSED > idle_time : Tue Sep 25 03:56:51 PM 2012 PDT > compat : NULL >[2012/09/25 15:56:51.311278, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:704(smbd_smb2_create_send) > smb2_create_send: DHNC: did recreate the smb2srv_open struct for a durable handle. >[2012/09/25 15:56:51.311357, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:807(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2012/09/25 15:56:51.311575, 3, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:829(smbd_smb2_create_send) > smbd_smb2_create_send: durable_reconnect failed: NT_STATUS_OBJECT_NAME_NOT_FOUND => NT_STATUS_OBJECT_NAME_NOT_FOUND >[2012/09/25 15:56:51.311744, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2622(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_OBJECT_NAME_NOT_FOUND] || at ../source3/smbd/smb2_create.c:302 >[2012/09/25 15:56:51.311876, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OBJECT_NAME_NOT_FOUND] body[8] dyn[yes:1] at ../source3/smbd/smb2_server.c:2652 >[2012/09/25 15:56:51.311959, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 10, charge 1, granted 10, current possible/max 494/512, total granted/max/low/range 28/8192/5/28 >[2012/09/25 15:56:51.316847, 2, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3118(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: client read error NT_STATUS_CONNECTION_DISCONNECTED >[2012/09/25 15:56:51.317006, 10, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:996(smbd_server_connection_terminate_ex) > smbd_server_connection_terminate_ex: reason[NT_STATUS_CONNECTION_DISCONNECTED] at ../source3/smbd/smb2_server.c:3119 >[2012/09/25 15:56:51.317113, 4, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.317195, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.317269, 5, pid=18008, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.317413, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:56:51.317524, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:56:51.317606, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.317691, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key E3851D76 >[2012/09/25 15:56:51.317785, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x88e180 >[2012/09/25 15:56:51.317938, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key E3851D76 >[2012/09/25 15:56:51.318026, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:56:51.318119, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.318215, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:56:51.318293, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.318372, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key F62398C5 >[2012/09/25 15:56:51.318455, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x894760 >[2012/09/25 15:56:51.318548, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key F62398C5 >[2012/09/25 15:56:51.318628, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:56:51.318702, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.318793, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.318889, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.318960, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.319069, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:56:51.319146, 1, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:1169(close_cnum) > smb-smb2-cli-02 (ipv4:10.10.15.55:1290) closed connection to service share1 >[2012/09/25 15:56:51.319265, 3, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/connection.c:38(yield_connection) > Yielding connection to share1 >[2012/09/25 15:56:51.319345, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:56:51.319420, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/connections.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.319503, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 58460000000000000000 >[2012/09/25 15:56:51.319589, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a0220 >[2012/09/25 15:56:51.319689, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 58460000000000000000 >[2012/09/25 15:56:51.319769, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:56:51.319859, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.319939, 4, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:816(vfs_ChDir) > vfs_ChDir to / >[2012/09/25 15:56:51.320058, 4, pid=18008, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:827(vfs_ChDir) > vfs_ChDir got / >[2012/09/25 15:56:51.320163, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.320242, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.320313, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.320422, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:56:51.320566, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:56:51.320845, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/sessionid.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.320934, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 49442F31383030382F33 >[2012/09/25 15:56:51.321028, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89f590 >[2012/09/25 15:56:51.321144, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 49442F31383030382F33 >[2012/09/25 15:56:51.321231, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:56:51.321307, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.321400, 4, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:56:51.321478, 5, pid=18008, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:56:51.321550, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:56:51.321659, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:56:51.321763, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:56:51.321869, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:56:51.321951, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 192696F1 >[2012/09/25 15:56:51.322032, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x890c40 >[2012/09/25 15:56:51.322136, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:56:51.322188, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '192696F1' stored >[2012/09/25 15:56:51.322263, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000004 (4) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0xffffffffffffffff (-1) > task_id : 0xffffffff (4294967295) > vnn : 0xffffffff (4294967295) > unique_id : 0xffffffffffffffff (-1) > open_global_id : 0x192696f1 (421959409) > open_persistent_id : 0x00000000192696f1 (421959409) > open_volatile_id : 0x0000000050ec51e4 (1357664740) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:56:50 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 4d8b401b-4bbb-4524-8501-b6f6f601399e > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x000ea600 (960000) > durable : 0x01 (1) > backend_cookie : DATA_BLOB length=165 > [0000] 56 46 53 5F 44 45 46 41 55 4C 54 5F 44 55 52 41 VFS_DEFA ULT_DURA > [0010] 42 4C 45 5F 43 4F 4F 4B 49 45 5F 4D 41 47 49 43 BLE_COOK IE_MAGIC > [0020] 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 > [0030] 00 00 00 00 00 00 00 00 04 FD 00 00 00 00 00 00 ........ ........ > [0040] 42 83 68 00 00 00 00 00 00 00 00 00 00 00 00 00 B.h..... ........ > [0050] 00 00 02 00 04 00 02 00 00 00 00 00 00 00 00 00 ........ ........ > [0060] 00 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00 ........ ........ > [0070] 1A 00 00 00 2F 64 61 74 61 2F 73 61 6D 62 61 2F ..../dat a/samba/ > [0080] 73 68 61 72 65 73 2F 73 68 61 72 65 31 00 00 00 shares/s hare1... > [0090] 09 00 00 00 00 00 00 00 09 00 00 00 74 65 73 74 ........ ....test > [00A0] 2E 74 78 74 00 .txt. >[2012/09/25 15:56:51.323963, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 192696F1 >[2012/09/25 15:56:51.324048, 5, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:56:51.324124, 10, pid=18008, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:56:51.324202, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_open.c:1011(smbXsrv_open_close) >[2012/09/25 15:56:51.324247, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_open.c:1020(smbXsrv_open_close) > smbXsrv_open_close(0x192696f1): stored disconnect >[2012/09/25 15:56:51.324319, 1, pid=18008, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : NULL > db_rec : NULL > local_id : 0x50ec51e4 (1357664740) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0xffffffffffffffff (-1) > task_id : 0xffffffff (4294967295) > vnn : 0xffffffff (4294967295) > unique_id : 0xffffffffffffffff (-1) > open_global_id : 0x192696f1 (421959409) > open_persistent_id : 0x00000000192696f1 (421959409) > open_volatile_id : 0x0000000050ec51e4 (1357664740) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:56:50 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 4d8b401b-4bbb-4524-8501-b6f6f601399e > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x000ea600 (960000) > durable : 0x01 (1) > backend_cookie : DATA_BLOB length=165 > [0000] 56 46 53 5F 44 45 46 41 55 4C 54 5F 44 55 52 41 VFS_DEFA ULT_DURA > [0010] 42 4C 45 5F 43 4F 4F 4B 49 45 5F 4D 41 47 49 43 BLE_COOK IE_MAGIC > [0020] 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 > [0030] 00 00 00 00 00 00 00 00 04 FD 00 00 00 00 00 00 ........ ........ > [0040] 42 83 68 00 00 00 00 00 00 00 00 00 00 00 00 00 B.h..... ........ > [0050] 00 00 02 00 04 00 02 00 00 00 00 00 00 00 00 00 ........ ........ > [0060] 00 00 00 00 00 00 00 00 1A 00 00 00 00 00 00 00 ........ ........ > [0070] 1A 00 00 00 2F 64 61 74 61 2F 73 61 6D 62 61 2F ..../dat a/samba/ > [0080] 73 68 61 72 65 73 2F 73 68 61 72 65 31 00 00 00 shares/s hare1... > [0090] 09 00 00 00 00 00 00 00 09 00 00 00 74 65 73 74 ........ ....test > [00A0] 2E 74 78 74 00 .txt. > status : NT_STATUS_FILE_CLOSED > idle_time : Tue Sep 25 03:56:51 PM 2012 PDT > compat : NULL >[2012/09/25 15:56:51.326344, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 1536 - private_data=0x88d6c0 >[2012/09/25 15:56:51.326438, 10, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/notify_internal.c:181(notify_context_destructor) > notify_context_destructor called >[2012/09/25 15:56:51.326513, 5, pid=18008, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 784 - private_data=0x899820 >[2012/09/25 15:56:51.326789, 3, pid=18008, effective(0, 0), real(0, 0)] ../source3/smbd/server_exit.c:218(exit_server_common) > Server exit (NT_STATUS_CONNECTION_DISCONNECTED) >[2012/09/25 15:56:51.361500, 5, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:56:51.361731, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:/data/samba/prefix/master/var/lock/serverid.tdb 3:<none> >[2012/09/25 15:56:51.361838, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 5846000000000000FFFF >[2012/09/25 15:56:51.361871, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x885670 >[2012/09/25 15:56:51.361934, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 5846000000000000FFFF >[2012/09/25 15:56:51.362016, 5, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:56:51.362092, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.316392, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:00.316536, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:57:00.316618, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:00.316704, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 3C72AFC9 >[2012/09/25 15:57:00.316822, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a1c80 >[2012/09/25 15:57:00.316937, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 3C72AFC9 >[2012/09/25 15:57:00.317058, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:57:00.317154, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.317258, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:00.317383, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:00.317474, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:00.317559, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89b610 >[2012/09/25 15:57:00.317702, 10, pid=17993, effective(0, 0), real(0, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:00.317790, 1, pid=17993, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004649 (17993) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x71babb290c712667 (8195068256930834023) > op_mid : 0x000000000000000b (11) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:48 PM 2012 PDT.388780 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000a684952e (2793706798) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:00.320873, 10, pid=17993, effective(0, 0), real(0, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:00.320972, 10, pid=17993, effective(0, 0), real(0, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:00.321046, 1, pid=17993, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:00.323336, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:00.323434, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:00.323513, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.323623, 4, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/dir.c:259(dptr_close_internal) > closing dptr key 0 >[2012/09/25 15:57:00.323757, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:00.323879, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:00.324065, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 785CA124 >[2012/09/25 15:57:00.324203, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a25d0 >[2012/09/25 15:57:00.324312, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 785CA124 >[2012/09/25 15:57:00.324396, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:00.324487, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.324584, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/files.c:526(file_free) > freed files structure 3349566591 (0 used) >[2012/09/25 15:57:00.324672, 4, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:00.324748, 5, pid=17993, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:00.324851, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:00.324970, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:00.325050, 1, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:1169(close_cnum) > smb-smb2-cli-02 (ipv4:10.10.15.55:1287) closed connection to service share1 >[2012/09/25 15:57:00.325178, 3, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/connection.c:38(yield_connection) > Yielding connection to share1 >[2012/09/25 15:57:00.325262, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:57:00.325338, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/connections.tdb 2:<none> 3:<none> >[2012/09/25 15:57:00.325422, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 49460000000000000000 >[2012/09/25 15:57:00.325510, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89b750 >[2012/09/25 15:57:00.325620, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 49460000000000000000 >[2012/09/25 15:57:00.325922, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:57:00.326002, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.326083, 4, pid=17993, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:816(vfs_ChDir) > vfs_ChDir to / >[2012/09/25 15:57:00.326211, 4, pid=17993, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:827(vfs_ChDir) > vfs_ChDir got / >[2012/09/25 15:57:00.326305, 4, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:00.326384, 5, pid=17993, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:00.326475, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:00.326588, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:00.326739, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[4] dyn[no:0] at ../source3/smbd/smb2_tcon.c:447 >[2012/09/25 15:57:00.326878, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/20/31 >[2012/09/25 15:57:00.327121, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:00.327220, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 20 (position 20) from bitmap >[2012/09/25 15:57:00.327299, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_LOGOFF] mid = 20 >[2012/09/25 15:57:00.327390, 4, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:00.327467, 5, pid=17993, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:00.327540, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:00.327652, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:00.327742, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:57:00.327837, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:00.327921, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 1F721168 >[2012/09/25 15:57:00.328011, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x88f5c0 >[2012/09/25 15:57:00.328127, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 1F721168 >[2012/09/25 15:57:00.328215, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:57:00.328291, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.328403, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:57:00.328485, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/sessionid.tdb 2:<none> 3:<none> >[2012/09/25 15:57:00.328569, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 49442F31373939332F35 >[2012/09/25 15:57:00.328656, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a1a60 >[2012/09/25 15:57:00.328790, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 49442F31373939332F35 >[2012/09/25 15:57:00.328894, 5, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:57:00.328971, 10, pid=17993, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:00.329065, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[4] dyn[no:0] at ../source3/smbd/smb2_sesssetup.c:793 >[2012/09/25 15:57:00.329151, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/21/31 >[2012/09/25 15:57:00.329764, 2, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3118(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: client read error NT_STATUS_CONNECTION_RESET >[2012/09/25 15:57:00.329908, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:996(smbd_server_connection_terminate_ex) > smbd_server_connection_terminate_ex: reason[NT_STATUS_CONNECTION_RESET] at ../source3/smbd/smb2_server.c:3119 >[2012/09/25 15:57:00.330033, 4, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:00.330115, 5, pid=17993, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:00.330188, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:00.330303, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:00.330399, 4, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:00.330476, 5, pid=17993, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:00.330547, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:00.330655, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:00.330760, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 1536 - private_data=0x893240 >[2012/09/25 15:57:00.330866, 10, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/notify_internal.c:181(notify_context_destructor) > notify_context_destructor called >[2012/09/25 15:57:00.330940, 5, pid=17993, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 784 - private_data=0x88fae0 >[2012/09/25 15:57:00.331193, 3, pid=17993, effective(0, 0), real(0, 0)] ../source3/smbd/server_exit.c:218(exit_server_common) > Server exit (NT_STATUS_CONNECTION_RESET) >[2012/09/25 15:57:00.377405, 5, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:57:00.377612, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:/data/samba/prefix/master/var/lock/serverid.tdb 3:<none> >[2012/09/25 15:57:00.377765, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 4946000000000000FFFF >[2012/09/25 15:57:00.377917, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x886720 >[2012/09/25 15:57:00.378028, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 4946000000000000FFFF >[2012/09/25 15:57:00.378112, 5, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:57:00.378187, 10, pid=17877, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.017900, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:57:11.018316, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:/data/samba/prefix/master/var/lock/serverid.tdb 3:<none> >[2012/09/25 15:57:11.018457, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key AA46000000000000FFFF >[2012/09/25 15:57:11.018591, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x86f9d0 >[2012/09/25 15:57:11.018726, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key AA46000000000000FFFF >[2012/09/25 15:57:11.018825, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:57:11.018906, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.019099, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/util_net.c:848(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2012/09/25 15:57:11.019701, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/util_net.c:848(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >[2012/09/25 15:57:11.020609, 6, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2659(lp_file_list_changed) > lp_file_list_changed() > file /data/samba/prefix/master/etc/smb.conf -> /data/samba/prefix/master/etc/smb.conf last mod_time: Mon Sep 24 15:42:01 2012 > >[2012/09/25 15:57:11.021004, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 10.10.15.55 (10.10.15.55) >[2012/09/25 15:57:11.021100, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/process.c:3469(smbd_process) > Connection allowed from ipv4:10.10.15.55:1291 to ipv4:10.10.23.29:445 >[2012/09/25 15:57:11.021513, 3, pid=18090, effective(0, 0), real(0, 0), class=locking] ../source3/smbd/oplock.c:985(init_oplocks) > init_oplocks: initializing messages. >[2012/09/25 15:57:11.021605, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 774 - private_data=0x885890 >[2012/09/25 15:57:11.021705, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 776 - private_data=0x885890 >[2012/09/25 15:57:11.021782, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 775 - private_data=0x885890 >[2012/09/25 15:57:11.021876, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 778 - private_data=0x885890 >[2012/09/25 15:57:11.021952, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 777 - private_data=0x885890 >[2012/09/25 15:57:11.022027, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 770 - private_data=0x885890 >[2012/09/25 15:57:11.022102, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 787 - private_data=0x885890 >[2012/09/25 15:57:11.022177, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 779 - private_data=0x885890 >[2012/09/25 15:57:11.022268, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 15 - private_data=(nil) >[2012/09/25 15:57:11.022345, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:308(messaging_register) > Overriding messaging pointer for type 15 - private_data=(nil) >[2012/09/25 15:57:11.022425, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 16 - private_data=(nil) >[2012/09/25 15:57:11.022503, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 16 - private_data=0x885890 >[2012/09/25 15:57:11.022578, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 33 - private_data=0x86f5c0 >[2012/09/25 15:57:11.022651, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 33 - private_data=0x885890 >[2012/09/25 15:57:11.022725, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:340(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2012/09/25 15:57:11.022799, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 1 - private_data=(nil) >[2012/09/25 15:57:11.022923, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/events.c:536(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x86f790 >[2012/09/25 15:57:11.023017, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/events.c:536(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x876db0 >[2012/09/25 15:57:11.023104, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/events.c:536(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x880ea0 >[2012/09/25 15:57:11.023368, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util_sock.c:337(read_smb_length_return_keepalive) > got smb length of 155 >[2012/09/25 15:57:11.023514, 6, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/process.c:1787(process_smb) > got message type 0x0 of len 0x9b >[2012/09/25 15:57:11.023602, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/process.c:1789(process_smb) > Transaction 0 of length 159 (0 toread) >[2012/09/25 15:57:11.023696, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util.c:168(show_msg) >[2012/09/25 15:57:11.023749, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util.c:178(show_msg) > size=155 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51283 > smb_tid=65535 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=0 > smb_bcc=120 >[2012/09/25 15:57:11.024196, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/util.c:457(dump_data) > [0000] 02 50 43 20 4E 45 54 57 4F 52 4B 20 50 52 4F 47 .PC NETW ORK PROG > [0010] 52 41 4D 20 31 2E 30 00 02 4C 41 4E 4D 41 4E 31 RAM 1.0. .LANMAN1 > [0020] 2E 30 00 02 57 69 6E 64 6F 77 73 20 66 6F 72 20 .0..Wind ows for > [0030] 57 6F 72 6B 67 72 6F 75 70 73 20 33 2E 31 61 00 Workgrou ps 3.1a. > [0040] 02 4C 4D 31 2E 32 58 30 30 32 00 02 4C 41 4E 4D .LM1.2X0 02..LANM > [0050] 41 4E 32 2E 31 00 02 4E 54 20 4C 4D 20 30 2E 31 AN2.1..N T LM 0.1 > [0060] 32 00 02 53 4D 42 20 32 2E 30 30 32 00 02 53 4D 2..SMB 2 .002..SM > [0070] 42 20 32 2E 3F 3F 3F 00 B 2.???. >[2012/09/25 15:57:11.024793, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/process.c:1392(switch_message) > switch message SMBnegprot (pid 18090) conn 0x0 >[2012/09/25 15:57:11.024951, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.025052, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.025147, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.025289, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.026731, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2012/09/25 15:57:11.026986, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [LANMAN1.0] >[2012/09/25 15:57:11.027076, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2012/09/25 15:57:11.027117, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [LM1.2X002] >[2012/09/25 15:57:11.027137, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [LANMAN2.1] >[2012/09/25 15:57:11.027157, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [NT LM 0.12] >[2012/09/25 15:57:11.027177, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [SMB 2.002] >[2012/09/25 15:57:11.027197, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:563(reply_negprot) > Requested protocol [SMB 2.???] >[2012/09/25 15:57:11.027224, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1302(set_remote_arch) > set_remote_arch: Client arch is 'Win2K' >[2012/09/25 15:57:11.027254, 6, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2659(lp_file_list_changed) > lp_file_list_changed() > file /data/samba/prefix/master/etc/smb.conf -> /data/samba/prefix/master/etc/smb.conf last mod_time: Mon Sep 24 15:42:01 2012 > >[2012/09/25 15:57:11.027295, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:57:11.027315, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:/data/samba/prefix/master/var/lock/serverid.tdb 3:<none> >[2012/09/25 15:57:11.027337, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key AA46000000000000FFFF >[2012/09/25 15:57:11.027360, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x889850 >[2012/09/25 15:57:11.027394, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key AA46000000000000FFFF >[2012/09/25 15:57:11.027416, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 2 for /data/samba/prefix/master/var/lock/serverid.tdb >[2012/09/25 15:57:11.027435, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.027469, 6, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2659(lp_file_list_changed) > lp_file_list_changed() > file /data/samba/prefix/master/etc/smb.conf -> /data/samba/prefix/master/etc/smb.conf last mod_time: Mon Sep 24 15:42:01 2012 > >[2012/09/25 15:57:11.027514, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3066(smbd_smb2_first_negprot) > smbd_smb2_first_negprot: packet length 106 >[2012/09/25 15:57:11.027558, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 0 (position 0) from bitmap >[2012/09/25 15:57:11.027586, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 0 >[2012/09/25 15:57:11.027609, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.027628, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.027646, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.027675, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.027730, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1302(set_remote_arch) > set_remote_arch: Client arch is 'Vista' >[2012/09/25 15:57:11.027773, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:464(make_auth_context_subsystem) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2012/09/25 15:57:11.027813, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam >[2012/09/25 15:57:11.027837, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam' >[2012/09/25 15:57:11.027856, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2012/09/25 15:57:11.027878, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2012/09/25 15:57:11.027901, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend unix >[2012/09/25 15:57:11.027920, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'unix' >[2012/09/25 15:57:11.027940, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend winbind >[2012/09/25 15:57:11.027959, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'winbind' >[2012/09/25 15:57:11.027978, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend wbc >[2012/09/25 15:57:11.028001, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'wbc' >[2012/09/25 15:57:11.028023, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend trustdomain >[2012/09/25 15:57:11.028042, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'trustdomain' >[2012/09/25 15:57:11.028060, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend ntdomain >[2012/09/25 15:57:11.028078, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'ntdomain' >[2012/09/25 15:57:11.028098, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend guest >[2012/09/25 15:57:11.028117, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'guest' >[2012/09/25 15:57:11.028135, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend name_to_ntstatus >[2012/09/25 15:57:11.028153, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'name_to_ntstatus' >[2012/09/25 15:57:11.028173, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:48(smb_register_auth) > Attempting to register auth backend samba4 >[2012/09/25 15:57:11.028192, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:60(smb_register_auth) > Successfully added auth method 'samba4' >[2012/09/25 15:57:11.028210, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:351(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2012/09/25 15:57:11.028232, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:376(load_auth_module) > load_auth_module: auth method guest has a valid init >[2012/09/25 15:57:11.028254, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:351(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2012/09/25 15:57:11.028273, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:376(load_auth_module) > load_auth_module: auth method sam has a valid init >[2012/09/25 15:57:11.711103, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'gssapi_spnego' registered >[2012/09/25 15:57:11.711378, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'gssapi_krb5' registered >[2012/09/25 15:57:11.711468, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'gssapi_krb5_sasl' registered >[2012/09/25 15:57:11.728457, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'sasl-DIGEST-MD5' registered >[2012/09/25 15:57:11.728535, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'schannel' registered >[2012/09/25 15:57:11.728560, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'spnego' registered >[2012/09/25 15:57:11.728582, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'ntlmssp' registered >[2012/09/25 15:57:11.728603, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'krb5' registered >[2012/09/25 15:57:11.728629, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:868(gensec_register) > GENSEC backend 'fake_gssapi_krb5' registered >[2012/09/25 15:57:11.728763, 5, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:647(gensec_start_mech) > Starting GENSEC mechanism spnego >[2012/09/25 15:57:11.728829, 5, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:647(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2012/09/25 15:57:11.728964, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[64] dyn[yes:74] at ../source3/smbd/smb2_negprot.c:381 >[2012/09/25 15:57:11.729000, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 0, charge 1, granted 1, current possible/max 512/512, total granted/max/low/range 1/8192/1/1 >[2012/09/25 15:57:11.729098, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:669(reply_negprot) > Selected protocol SMB 2.??? >[2012/09/25 15:57:11.729122, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/negprot.c:676(reply_negprot) > negprot index=7 >[2012/09/25 15:57:11.729734, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.729924, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 1 (position 1) from bitmap >[2012/09/25 15:57:11.730042, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NEGPROT] mid = 1 >[2012/09/25 15:57:11.730163, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.730245, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.730339, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.730492, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.730603, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1302(set_remote_arch) > set_remote_arch: Client arch is 'Vista' >[2012/09/25 15:57:11.730722, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:464(make_auth_context_subsystem) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2012/09/25 15:57:11.730833, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:351(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2012/09/25 15:57:11.730920, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:376(load_auth_module) > load_auth_module: auth method guest has a valid init >[2012/09/25 15:57:11.731017, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:351(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2012/09/25 15:57:11.731128, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:376(load_auth_module) > load_auth_module: auth method sam has a valid init >[2012/09/25 15:57:11.731272, 5, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:647(gensec_start_mech) > Starting GENSEC mechanism spnego >[2012/09/25 15:57:11.731420, 5, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:647(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2012/09/25 15:57:11.731734, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 1536 - private_data=0x893240 >[2012/09/25 15:57:11.731934, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[64] dyn[yes:74] at ../source3/smbd/smb2_negprot.c:381 >[2012/09/25 15:57:11.732067, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 0, charge 1, granted 1, current possible/max 512/512, total granted/max/low/range 1/8192/2/1 >[2012/09/25 15:57:11.733056, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.733169, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 2 (position 2) from bitmap >[2012/09/25 15:57:11.733191, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 2 >[2012/09/25 15:57:11.733211, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.733230, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.733249, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.733277, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.733315, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:57:11.733337, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.733359, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key D09E6DFF >[2012/09/25 15:57:11.733386, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x896080 >[2012/09/25 15:57:11.733547, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:853(smbXsrv_session_global_store) >[2012/09/25 15:57:11.733565, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:855(smbXsrv_session_global_store) > smbXsrv_session_global_store: key 'D09E6DFF' stored >[2012/09/25 15:57:11.733588, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0xd09e6dff (3500043775) > session_wire_id : 0x00000000d09e6dff (3500043775) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > expiration_time : Wed Dec 31 04:00:00 PM 1969 PST > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0300 (768) > signing_required : 0x00 (0) > encryption_required : 0x00 (0) > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > local_address : 'ipv4:10.10.23.29:445' > remote_address : 'ipv4:10.10.15.55:1291' > remote_name : '10.10.15.55' > auth_session_info_seqnum : 0x00000000 (0) >[2012/09/25 15:57:11.733908, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key D09E6DFF >[2012/09/25 15:57:11.733930, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:57:11.733949, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.733969, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:1215(smbXsrv_session_create) >[2012/09/25 15:57:11.733981, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:1223(smbXsrv_session_create) > smbXsrv_session_create: global_id (0xd09e6dff) stored >[2012/09/25 15:57:11.734000, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > connection : * > local_id : 0xd09e6dff (3500043775) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0xd09e6dff (3500043775) > session_wire_id : 0x00000000d09e6dff (3500043775) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > expiration_time : Wed Dec 31 04:00:00 PM 1969 PST > auth_session_info_seqnum : 0x00000000 (0) > auth_session_info : NULL > connection_dialect : 0x0300 (768) > signing_required : 0x00 (0) > encryption_required : 0x00 (0) > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > local_address : 'ipv4:10.10.23.29:445' > remote_address : 'ipv4:10.10.15.55:1291' > remote_name : '10.10.15.55' > auth_session_info_seqnum : 0x00000000 (0) > status : NT_STATUS_MORE_PROCESSING_REQUIRED > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > nonce_high : 0x0000000000000000 (0) > nonce_low : 0x0000000000000000 (0) > gensec : NULL > compat : NULL > tcon_table : * >[2012/09/25 15:57:11.734369, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:464(make_auth_context_subsystem) > Making default auth method list for server role = 'standalone server', encrypt passwords = yes >[2012/09/25 15:57:11.734392, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:351(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2012/09/25 15:57:11.734411, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:376(load_auth_module) > load_auth_module: auth method guest has a valid init >[2012/09/25 15:57:11.734430, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:351(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2012/09/25 15:57:11.734448, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:376(load_auth_module) > load_auth_module: auth method sam has a valid init >[2012/09/25 15:57:11.734490, 5, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:647(gensec_start_mech) > Starting GENSEC mechanism spnego >[2012/09/25 15:57:11.734517, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.734543, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.734565, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.734583, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.734601, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.734640, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 24 > req->in.vector[4].iov_len = 74 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2012/09/25 15:57:11.734811, 5, pid=18090, effective(0, 0), real(0, 0)] ../auth/gensec/gensec_start.c:647(gensec_start_mech) > Starting GENSEC submechanism ntlmssp >[2012/09/25 15:57:11.734855, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/ntlmssp/ntlmssp_util.c:34(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe2088297 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_NEGOTIATE_OEM > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_LM_KEY > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2012/09/25 15:57:11.734988, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > negotiate: struct NEGOTIATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmNegotiate (1) > NegotiateFlags : 0xe2088297 (3792208535) > 1: NTLMSSP_NEGOTIATE_UNICODE > 1: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 1: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 0: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > DomainNameLen : 0x0000 (0) > DomainNameMaxLen : 0x0000 (0) > DomainName : NULL > WorkstationLen : 0x0000 (0) > WorkstationMaxLen : 0x0000 (0) > Workstation : NULL > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_2 (2) > ProductBuild : 0x23f0 (9200) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2012/09/25 15:57:11.735417, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > challenge: struct CHALLENGE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmChallenge (0x2) > TargetNameLen : 0x0008 (8) > TargetNameMaxLen : 0x0008 (8) > TargetName : * > TargetName : 'AMBI' > NegotiateFlags : 0xe28a8215 (3800728085) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 1: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > ServerChallenge : 47cab35889856ebe > Reserved : 0000000000000000 > TargetInfoLen : 0x006e (110) > TargetNameInfoMaxLen : 0x006e (110) > TargetInfo : * > TargetInfo: struct AV_PAIR_LIST > count : 0x00000005 (5) > pair: ARRAY(5) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'AMBI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'AMBI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0020 (32) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'mainz.de.ibm.com' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x002a (42) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'zeut.mainz.de.ibm.com' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1) > ProductBuild : 0x0000 (0) > Reserved : 000000 > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF) >[2012/09/25 15:57:11.736037, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.736061, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.736080, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.736098, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.736116, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.736153, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.736176, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_MORE_PROCESSING_REQUIRED] body[8] dyn[yes:205] at ../source3/smbd/smb2_sesssetup.c:167 >[2012/09/25 15:57:11.736199, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 31, charge 1, granted 1, current possible/max 512/512, total granted/max/low/range 1/8192/3/1 >[2012/09/25 15:57:11.736940, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.737077, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 3 (position 3) from bitmap >[2012/09/25 15:57:11.737166, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_SESSSETUP] mid = 3 >[2012/09/25 15:57:11.737283, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.737369, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.737445, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.737561, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.737654, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.737756, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.737878, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.737956, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.738029, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.738151, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 24 > req->in.vector[4].iov_len = 478 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2012/09/25 15:57:11.738721, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > authenticate: struct AUTHENTICATE_MESSAGE > Signature : 'NTLMSSP' > MessageType : NtLmAuthenticate (3) > LmChallengeResponseLen : 0x0018 (24) > LmChallengeResponseMaxLen: 0x0018 (24) > LmChallengeResponse : * > LmChallengeResponse : union ntlmssp_LM_RESPONSE(case 24) > v1: struct LM_RESPONSE > Response : 000000000000000000000000000000000000000000000000 > NtChallengeResponseLen : 0x010a (266) > NtChallengeResponseMaxLen: 0x010a (266) > NtChallengeResponse : * > NtChallengeResponse : union ntlmssp_NTLM_RESPONSE(case 266) > v2: struct NTLMv2_RESPONSE > Response : 3eda1facc497b7ced68ca450efa21179 > Challenge: struct NTLMv2_CLIENT_CHALLENGE > RespType : 0x01 (1) > HiRespType : 0x01 (1) > Reserved1 : 0x0000 (0) > Reserved2 : 0x00000000 (0) > TimeStamp : Tue Sep 25 03:57:12 PM 2012 PDT > ChallengeFromClient : b0e075c6a4590672 > Reserved3 : 0x00000000 (0) > AvPairs: struct AV_PAIR_LIST > count : 0x00000008 (8) > pair: ARRAY(8) > pair: struct AV_PAIR > AvId : MsvAvNbDomainName (0x2) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x2) > AvNbDomainName : 'AMBI' > pair: struct AV_PAIR > AvId : MsvAvNbComputerName (0x1) > AvLen : 0x0008 (8) > Value : union ntlmssp_AvValue(case 0x1) > AvNbComputerName : 'AMBI' > pair: struct AV_PAIR > AvId : MsvAvDnsDomainName (0x4) > AvLen : 0x0020 (32) > Value : union ntlmssp_AvValue(case 0x4) > AvDnsDomainName : 'mainz.de.ibm.com' > pair: struct AV_PAIR > AvId : MsvAvDnsComputerName (0x3) > AvLen : 0x002a (42) > Value : union ntlmssp_AvValue(case 0x3) > AvDnsComputerName : 'zeut.mainz.de.ibm.com' > pair: struct AV_PAIR > AvId : MsAvRestrictions (0x8) > AvLen : 0x0030 (48) > Value : union ntlmssp_AvValue(case 0x8) > AvRestrictions: struct Restriction_Encoding > Size : 0x00000030 (48) > Z4 : 0x00000000 (0) > IntegrityLevel : 0x00000000 (0) > SubjectIntegrityLevel : 0x00003000 (12288) > MachineId : 46010e605bf52bba6f186fca5560a5c90c004554327177a4fdf1ba40139c54f6 > pair: struct AV_PAIR > AvId : MsvChannelBindings (0xA) > AvLen : 0x0010 (16) > Value : union ntlmssp_AvValue(case 0xA) > ChannelBindings : 00000000000000000000000000000000 > pair: struct AV_PAIR > AvId : MsvAvTargetName (0x9) > AvLen : 0x0020 (32) > Value : union ntlmssp_AvValue(case 0x9) > AvTargetName : 'cifs/10.10.23.29' > pair: struct AV_PAIR > AvId : MsvAvEOL (0x0) > AvLen : 0x0000 (0) > Value : union ntlmssp_AvValue(case 0x0) > DomainNameLen : 0x001e (30) > DomainNameMaxLen : 0x001e (30) > DomainName : * > DomainName : 'SMB-SMB2-CLI-02' > UserNameLen : 0x0008 (8) > UserNameMaxLen : 0x0008 (8) > UserName : * > UserName : 'ambi' > WorkstationLen : 0x001e (30) > WorkstationMaxLen : 0x001e (30) > Workstation : * > Workstation : 'SMB-SMB2-CLI-02' > EncryptedRandomSessionKeyLen: 0x0010 (16) > EncryptedRandomSessionKeyMaxLen: 0x0010 (16) > EncryptedRandomSessionKey: * > EncryptedRandomSessionKey: DATA_BLOB length=16 > [0000] E1 DE CD F1 C1 A1 95 E9 70 D3 8B 47 C3 FB 7A 9F ........ p..G..z. > NegotiateFlags : 0xe2888215 (3800597013) > 1: NTLMSSP_NEGOTIATE_UNICODE > 0: NTLMSSP_NEGOTIATE_OEM > 1: NTLMSSP_REQUEST_TARGET > 1: NTLMSSP_NEGOTIATE_SIGN > 0: NTLMSSP_NEGOTIATE_SEAL > 0: NTLMSSP_NEGOTIATE_DATAGRAM > 0: NTLMSSP_NEGOTIATE_LM_KEY > 0: NTLMSSP_NEGOTIATE_NETWARE > 1: NTLMSSP_NEGOTIATE_NTLM > 0: NTLMSSP_NEGOTIATE_NT_ONLY > 0: NTLMSSP_ANONYMOUS > 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED > 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED > 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL > 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN > 0: NTLMSSP_TARGET_TYPE_DOMAIN > 0: NTLMSSP_TARGET_TYPE_SERVER > 0: NTLMSSP_TARGET_TYPE_SHARE > 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > 0: NTLMSSP_NEGOTIATE_IDENTIFY > 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY > 1: NTLMSSP_NEGOTIATE_TARGET_INFO > 1: NTLMSSP_NEGOTIATE_VERSION > 1: NTLMSSP_NEGOTIATE_128 > 1: NTLMSSP_NEGOTIATE_KEY_EXCH > 1: NTLMSSP_NEGOTIATE_56 > Version: struct ntlmssp_VERSION > ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6) > ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_2 (2) > ProductBuild : 0x23f0 (9200) > Reserved: ARRAY(3) > [0] : 0x00 (0) > [1] : 0x00 (0) > [2] : 0x00 (0) > NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15) >[2012/09/25 15:57:11.743025, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/ntlmssp/ntlmssp_server.c:358(ntlmssp_server_preauth) > Got user=[ambi] domain=[SMB-SMB2-CLI-02] workstation=[SMB-SMB2-CLI-02] len1=24 len2=266 >[2012/09/25 15:57:11.743167, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:4779(lp_load_ex) > lp_load_ex: refreshing parameters >[2012/09/25 15:57:11.743270, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1489(free_param_opts) > Freeing parametrics: >[2012/09/25 15:57:11.743417, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:753(init_globals) > Initialising global parameters >[2012/09/25 15:57:11.743632, 3, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/params.c:550(pm_process) > params.c:pm_process() - Processing configuration file "/data/samba/prefix/master/etc/smb.conf" >[2012/09/25 15:57:11.743761, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3506(do_section) > Processing section "[global]" > doing parameter netbios name = ambi > doing parameter workgroup = WORKGROUP > doing parameter security = user > doing parameter password server = w2003 > doing parameter log level = 10 >[2012/09/25 15:57:11.744082, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/debug.c:331(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > doing parameter vfs objects = xattr_tdb time_audit > doing parameter aio read size = 1 > doing parameter aio write size = 1 > doing parameter kernel oplocks = no > doing parameter kernel share modes = no > doing parameter posix locking = no >[2012/09/25 15:57:11.745027, 2, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3523(do_section) > Processing section "[autotest]" > doing parameter path = /tmp/autotest > doing parameter read only = no >[2012/09/25 15:57:11.745209, 2, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3523(do_section) > Processing section "[homes]" > doing parameter available = no > doing parameter path = /home/%U > doing parameter guest ok = no > doing parameter read only = no >[2012/09/25 15:57:11.745493, 1, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2385(service_ok) > NOTE: Service homes is flagged unavailable. >[2012/09/25 15:57:11.745572, 2, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3523(do_section) > Processing section "[testshare]" > doing parameter read only = no > doing parameter path = /data/samba/shares/test >[2012/09/25 15:57:11.745756, 2, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3523(do_section) > Processing section "[share1]" > doing parameter read only = no > doing parameter path = /data/samba/shares/share1 >[2012/09/25 15:57:11.745948, 2, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3523(do_section) > Processing section "[share2]" > doing parameter read only = no > doing parameter path = /data/samba/shares/share2 >[2012/09/25 15:57:11.746023, 2, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:3523(do_section) > Processing section "[dumps]" > doing parameter read only = no > doing parameter path = /data/samba/shares/dumps >[2012/09/25 15:57:11.746097, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:4818(lp_load_ex) > pm_process() returned Yes >[2012/09/25 15:57:11.746209, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1775(lp_add_ipc) > adding IPC service >[2012/09/25 15:57:11.746349, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:115(make_user_info_map) > Mapping user [SMB-SMB2-CLI-02]\[ambi] from workstation [SMB-SMB2-CLI-02] >[2012/09/25 15:57:11.746504, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:136(make_user_info_map) > Mapped domain from [SMB-SMB2-CLI-02] to [AMBI] for user [ambi] from workstation [SMB-SMB2-CLI-02] >[2012/09/25 15:57:11.746605, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/user_info.c:61(make_user_info) > attempting to make a user_info for ambi (ambi) >[2012/09/25 15:57:11.746688, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/user_info.c:72(make_user_info) > making strings for ambi's user_info struct >[2012/09/25 15:57:11.746776, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/user_info.c:92(make_user_info) > making blobs for ambi's user_info struct >[2012/09/25 15:57:11.746874, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/user_info.c:128(make_user_info) > made a user_info for ambi (ambi) >[2012/09/25 15:57:11.746954, 3, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:177(auth_check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [SMB-SMB2-CLI-02]\[ambi]@[SMB-SMB2-CLI-02] with the new password interface >[2012/09/25 15:57:11.747034, 3, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:180(auth_check_ntlm_password) > check_ntlm_password: mapped user is: [AMBI]\[ambi]@[SMB-SMB2-CLI-02] >[2012/09/25 15:57:11.747110, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:189(auth_check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2012/09/25 15:57:11.747183, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:191(auth_check_ntlm_password) > challenge is: >[2012/09/25 15:57:11.747258, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/util.c:457(dump_data) > [0000] 47 CA B3 58 89 85 6E BE G..X..n. >[2012/09/25 15:57:11.747373, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_builtin.c:44(check_guest_security) > Check auth for: [ambi] >[2012/09/25 15:57:11.747448, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:217(auth_check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2012/09/25 15:57:11.747527, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [ambi] >[2012/09/25 15:57:11.747622, 8, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/util.c:1216(is_myname) > is_myname("AMBI") returns 1 >[2012/09/25 15:57:11.747730, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.747928, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.748011, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.748030, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.748048, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.748140, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.748167, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.748188, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.748208, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.748231, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.748262, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.748286, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.748310, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.748332, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.748355, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.748378, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.748403, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.748423, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.748441, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.748460, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.748478, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.748523, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.748555, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.748590, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.748615, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.748661, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.748681, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.748700, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.748718, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.748736, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.748767, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:57:11.748790, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.748821, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:57:11.748841, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:57:11.748895, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:57:11.748956, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 1000 >[2012/09/25 15:57:11.748979, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.748999, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.749017, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.749035, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.749053, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.749107, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.749132, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 1000 -> sid S-1-22-2-1000 >[2012/09/25 15:57:11.749167, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1587(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for ambi >[2012/09/25 15:57:11.749196, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.749219, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.749239, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.749257, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.749275, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.749307, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.749329, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.749362, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.749383, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.749402, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.749421, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.749441, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.749463, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.749482, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.749501, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.749521, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.749544, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.749564, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.749584, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.749603, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.749621, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.749640, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.749665, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.749699, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.749724, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.749746, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.749766, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.749797, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:557(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:57:11.749837, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.749872, 4, pid=18090, effective(0, 0), real(0, 0)] ../libcli/auth/ntlm_check.c:359(ntlm_password_check) > ntlm_password_check: Checking NTLMv2 password with domain [SMB-SMB2-CLI-02] >[2012/09/25 15:57:11.749925, 4, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/check_samsec.c:183(sam_account_ok) > sam_account_ok: Checking SMB password for user ambi >[2012/09/25 15:57:11.749957, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/check_samsec.c:165(logon_hours_ok) > logon_hours_ok: user ambi allowed to logon at this time (Tue Sep 25 22:57:11 2012 > ) >[2012/09/25 15:57:11.750006, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750039, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.750063, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750081, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.750099, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.750133, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:57:11.750156, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.750179, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750199, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.750218, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750236, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.750254, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.750283, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:57:11.750303, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:57:11.750324, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:57:11.750365, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.750386, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750404, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.750423, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.750440, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.750472, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: minimum password age, val: 0 >[2012/09/25 15:57:11.750494, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750514, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.750533, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750551, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.750569, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.750587, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.750618, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:57:11.750640, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750668, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:57:11.750687, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:57:11.750707, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:57:11.750742, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/system_smbd.c:176(sys_getgrouplist) > sys_getgrouplist: user [ambi] >[2012/09/25 15:57:11.750851, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 1000 >[2012/09/25 15:57:11.750875, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.750895, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.750913, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.750932, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.750950, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.750987, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751008, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 1000 -> sid S-1-22-2-1000 >[2012/09/25 15:57:11.751036, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 10 >[2012/09/25 15:57:11.751056, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751075, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751094, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751112, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.751130, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.751164, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751185, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 10 -> sid S-1-22-2-10 >[2012/09/25 15:57:11.751212, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 18 >[2012/09/25 15:57:11.751231, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751251, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751269, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751287, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.751305, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.751339, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751367, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 18 -> sid S-1-22-2-18 >[2012/09/25 15:57:11.751393, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 988 >[2012/09/25 15:57:11.751411, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751429, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751447, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751464, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.751481, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.751516, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751536, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 988 -> sid S-1-22-2-988 >[2012/09/25 15:57:11.751561, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 986 >[2012/09/25 15:57:11.751580, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751597, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751623, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.751641, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.751667, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.751709, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751728, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 986 -> sid S-1-22-2-986 >[2012/09/25 15:57:11.751752, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/server_info_sam.c:113(make_server_info_sam) > make_server_info_sam: made server info for user ambi -> ambi >[2012/09/25 15:57:11.751774, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.751796, 3, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:226(auth_check_ntlm_password) > check_ntlm_password: sam authentication for user [ambi] succeeded >[2012/09/25 15:57:11.751847, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751867, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.751893, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.751912, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.751930, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.751963, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.751984, 5, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:265(auth_check_ntlm_password) > check_ntlm_password: PAM Account for user [ambi] succeeded >[2012/09/25 15:57:11.752002, 2, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth.c:278(auth_check_ntlm_password) > check_ntlm_password: authentication for user [ambi] -> [ambi] -> [ambi] succeeded >[2012/09/25 15:57:11.752022, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/auth_ntlmssp.c:168(auth3_check_password) > Got NT session key of length 16 >[2012/09/25 15:57:11.752041, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/auth_ntlmssp.c:175(auth3_check_password) > Got LM session key of length 8 >[2012/09/25 15:57:11.752062, 10, pid=18090, effective(0, 0), real(0, 0)] ../auth/ntlmssp/ntlmssp_server.c:538(ntlmssp_server_postauth) > ntlmssp_server_auth: Using unmodified nt session key. >[2012/09/25 15:57:11.752097, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/ntlmssp/ntlmssp_sign.c:547(ntlmssp_sign_init) > NTLMSSP Sign/Seal - Initialising with flags: >[2012/09/25 15:57:11.752117, 3, pid=18090, effective(0, 0), real(0, 0)] ../auth/ntlmssp/ntlmssp_util.c:34(debug_ntlmssp_flags) > Got NTLMSSP neg_flags=0xe2088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_NTLM2 > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH > NTLMSSP_NEGOTIATE_56 >[2012/09/25 15:57:11.752217, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752239, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752257, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752276, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.752294, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.752324, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752360, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:224(create_local_nt_token_from_info3) > Create local NT token for ambi >[2012/09/25 15:57:11.752398, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1462(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2012/09/25 15:57:11.752421, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752440, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752458, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752476, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.752494, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.752528, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752549, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752568, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752586, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752604, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.752622, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.752660, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752687, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2012/09/25 15:57:11.752707, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752726, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752744, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752763, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.752780, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.752824, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:439(finalize_local_nt_token) > Failed to fetch domain sid for WORKGROUP >[2012/09/25 15:57:11.752846, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752875, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1462(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2012/09/25 15:57:11.752896, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752921, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.752948, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.752967, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.752985, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.753015, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753036, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753054, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753073, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753091, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.753108, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.753142, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753163, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2012/09/25 15:57:11.753183, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753202, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753224, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753242, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.753260, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.753292, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:470(finalize_local_nt_token) > Failed to fetch domain sid for WORKGROUP >[2012/09/25 15:57:11.753313, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753333, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753359, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753378, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753396, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.753414, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.753484, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753513, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:176(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-5-21-2119459776-1226821564-2322385355-1000 > Privilege set: 0x2e80 >[2012/09/25 15:57:11.753544, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-2119459776-1226821564-2322385355-513] >[2012/09/25 15:57:11.753568, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-1000] >[2012/09/25 15:57:11.753591, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-10] >[2012/09/25 15:57:11.753614, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-18] >[2012/09/25 15:57:11.753637, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-988] >[2012/09/25 15:57:11.753669, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-986] >[2012/09/25 15:57:11.753694, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:176(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2012/09/25 15:57:11.753723, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2012/09/25 15:57:11.753746, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/privileges.c:98(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-11] >[2012/09/25 15:57:11.753797, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1307(sids_to_unixids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2012/09/25 15:57:11.753831, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753855, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.753873, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753892, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.753910, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.753939, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 1000. >[2012/09/25 15:57:11.753962, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.753981, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.753999, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754018, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.754036, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.754066, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.754087, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754105, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.754124, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.754141, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.754173, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:57:11.754195, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754216, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.754235, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754254, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.754272, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.754290, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.754320, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.754342, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754370, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.754390, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.754409, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.754428, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.754448, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.754470, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.754489, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.754509, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.754528, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.754549, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.754569, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.754589, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.754610, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754629, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.754647, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.754665, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.754696, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.754718, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.754739, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.754759, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.754788, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:557(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:57:11.754827, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.754851, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:57:11.754870, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:57:11.754889, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:57:11.754911, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.754931, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.754950, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.754968, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.754986, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.755004, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.755033, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 1000. >[2012/09/25 15:57:11.755054, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755073, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.755092, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755110, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.755128, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.755156, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.755176, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755195, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.755213, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.755231, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.755263, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2012/09/25 15:57:11.755285, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755306, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.755325, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755348, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.755374, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.755391, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.755420, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.755441, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755463, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.755482, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.755499, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.755517, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.755536, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.755556, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.755574, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.755593, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.755620, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.755641, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.755668, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.755696, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.755714, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755732, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.755749, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.755766, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.755797, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.755833, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.755854, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.755874, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.755901, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:557(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:57:11.755924, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.755944, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:57:11.755962, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:57:11.755980, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:57:11.756001, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756019, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756037, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756054, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756072, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.756089, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.756116, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 513. >[2012/09/25 15:57:11.756136, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.756154, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756171, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.756189, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.756206, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.756238, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:645(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 513 by key RID_00000201. >[2012/09/25 15:57:11.756265, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756284, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1770(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2012/09/25 15:57:11.756305, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1470(pdb_default_sid_to_id) > SID S-1-5-21-2119459776-1226821564-2322385355-513 is or domain, but is unmapped >[2012/09/25 15:57:11.756327, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756347, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1121(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:57:11.756366, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756384, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756402, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756419, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.756436, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.756463, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1694(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 513. >[2012/09/25 15:57:11.756482, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.756500, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756517, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.756534, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.756551, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.756581, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_tdb.c:645(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 513 by key RID_00000201. >[2012/09/25 15:57:11.756607, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756627, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1770(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2012/09/25 15:57:11.756644, 5, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_interface.c:1470(pdb_default_sid_to_id) > SID S-1-5-21-2119459776-1226821564-2322385355-513 is or domain, but is unmapped >[2012/09/25 15:57:11.756666, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756684, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1121(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-21-2119459776-1226821564-2322385355-513 >[2012/09/25 15:57:11.756703, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756721, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756738, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756758, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.756776, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.756816, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756840, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756858, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756875, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756893, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.756910, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.756942, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.756962, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2012/09/25 15:57:11.756981, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.756999, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757016, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757033, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757050, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757079, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757099, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757116, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757134, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757151, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757168, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757199, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757218, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-1-0 >[2012/09/25 15:57:11.757237, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757258, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757276, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757293, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757310, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757339, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757358, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757376, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757394, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757411, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757428, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757459, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757479, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2012/09/25 15:57:11.757497, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757515, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757533, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757550, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757567, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757594, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757622, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757641, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757667, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757694, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757711, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757743, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757767, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-2 >[2012/09/25 15:57:11.757785, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757808, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757832, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757850, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757867, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.757895, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757915, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757932, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.757950, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.757967, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.757984, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.758017, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.758046, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-11 >[2012/09/25 15:57:11.758066, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.758085, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.758103, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.758121, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.758139, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.758169, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.758190, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.758209, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.758227, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.758245, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.758270, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.758306, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.758326, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:1116(legacy_sid_to_unixid) > LEGACY: mapping failed for sid S-1-5-11 >[2012/09/25 15:57:11.758345, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-5-21-2119459776-1226821564-2322385355-513 to gid, ignoring it >[2012/09/25 15:57:11.758367, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2012/09/25 15:57:11.758386, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2012/09/25 15:57:11.758404, 10, pid=18090, effective(0, 0), real(0, 0), class=auth] ../source3/auth/auth_util.c:616(create_local_token) > Could not convert SID S-1-5-11 to gid, ignoring it >[2012/09/25 15:57:11.758427, 10, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:57:11.758574, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:57:11.758684, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find ambi >[2012/09/25 15:57:11.758707, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:181(Get_Pwnam_alloc) > Finding user ambi >[2012/09/25 15:57:11.758725, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:120(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is ambi >[2012/09/25 15:57:11.758744, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/username.c:159(Get_Pwnam_internals) > Get_Pwnam_internals did find user [ambi]! >[2012/09/25 15:57:11.758764, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/password.c:144(register_homes_share) > Adding homes service for user 'ambi' using home directory: '/home/ambi' >[2012/09/25 15:57:11.758823, 8, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1621(add_a_service) > add_a_service: Creating snum = 7 for ambi >[2012/09/25 15:57:11.758845, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1671(hash_a_service) > hash_a_service: hashing index 7 for service name ambi >[2012/09/25 15:57:11.758870, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:1727(lp_add_home) > adding home's share [ambi] for user 'ambi' at '/home/%U' >[2012/09/25 15:57:11.758907, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:57:11.758928, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/sessionid.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.758951, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 49442F31383039302F33 >[2012/09/25 15:57:11.758974, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8909d0 >[2012/09/25 15:57:11.759020, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 49442F31383039302F33 >[2012/09/25 15:57:11.759070, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/sessionid.tdb >[2012/09/25 15:57:11.759088, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.759121, 6, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2659(lp_file_list_changed) > lp_file_list_changed() > file /data/samba/prefix/master/etc/smb.conf -> /data/samba/prefix/master/etc/smb.conf last mod_time: Mon Sep 24 15:42:01 2012 > >[2012/09/25 15:57:11.759167, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:57:11.759186, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.759206, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key D09E6DFF >[2012/09/25 15:57:11.759226, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x890bf0 >[2012/09/25 15:57:11.759287, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:853(smbXsrv_session_global_store) >[2012/09/25 15:57:11.759302, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:855(smbXsrv_session_global_store) > smbXsrv_session_global_store: key 'D09E6DFF' stored >[2012/09/25 15:57:11.759321, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_session_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_session_globalU(case 0) > info0 : * > info0: struct smbXsrv_session_global0 > db_rec : * > session_global_id : 0xd09e6dff (3500043775) > session_wire_id : 0x00000000d09e6dff (3500043775) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > expiration_time : Wed Dec 31 04:00:00 PM 1969 PST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000b (11) > sids: ARRAY(11) > sids : S-1-5-21-2119459776-1226821564-2322385355-1000 > sids : S-1-5-21-2119459776-1226821564-2322385355-513 > sids : S-1-22-2-1000 > sids : S-1-22-2-10 > sids : S-1-22-2-18 > sids : S-1-22-2-988 > sids : S-1-22-2-986 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1000 > privilege_mask : 0x0000000000002e80 (11904) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 1: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 1: SEC_PRIV_BACKUP_BIT > 1: SEC_PRIV_RESTORE_BIT > 1: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 1: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e8 (1000) > gid : 0x00000000000003e8 (1000) > ngroups : 0x00000005 (5) > groups: ARRAY(5) > groups : 0x00000000000003e8 (1000) > groups : 0x000000000000000a (10) > groups : 0x0000000000000012 (18) > groups : 0x00000000000003dc (988) > groups : 0x00000000000003da (986) > info : * > info: struct auth_user_info > account_name : * > account_name : 'ambi' > domain_name : * > domain_name : 'AMBI' > full_name : * > full_name : 'Christian Ambach' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\ambi\ambi\profile' > home_directory : * > home_directory : '\\ambi\ambi' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'AMBI' > last_logon : NTTIME(0) > last_logoff : Wed Sep 13 07:48:05 PM 30828 PDT > acct_expiry : Wed Sep 13 07:48:05 PM 30828 PDT > last_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > allow_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > force_password_change : Wed Sep 13 07:48:05 PM 30828 PDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'ambi' > sanitized_username : * > sanitized_username : 'ambi' > torture : NULL > credentials : NULL > connection_dialect : 0x0300 (768) > signing_required : 0x00 (0) > encryption_required : 0x00 (0) > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > local_address : 'ipv4:10.10.23.29:445' > remote_address : 'ipv4:10.10.15.55:1291' > remote_name : '10.10.15.55' > auth_session_info_seqnum : 0x00000001 (1) >[2012/09/25 15:57:11.760467, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key D09E6DFF >[2012/09/25 15:57:11.760488, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_session_global.tdb >[2012/09/25 15:57:11.760505, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.760527, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:1269(smbXsrv_session_update) >[2012/09/25 15:57:11.760538, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_session.c:1277(smbXsrv_session_update) > smbXsrv_session_update: global_id (0xd09e6dff) stored >[2012/09/25 15:57:11.760555, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &session_blob: struct smbXsrv_sessionB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_sessionU(case 0) > info0 : * > info0: struct smbXsrv_session > table : * > db_rec : NULL > connection : * > local_id : 0xd09e6dff (3500043775) > global : * > global: struct smbXsrv_session_global0 > db_rec : NULL > session_global_id : 0xd09e6dff (3500043775) > session_wire_id : 0x00000000d09e6dff (3500043775) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > expiration_time : Wed Dec 31 04:00:00 PM 1969 PST > auth_session_info_seqnum : 0x00000001 (1) > auth_session_info : * > auth_session_info: struct auth_session_info > security_token : * > security_token: struct security_token > num_sids : 0x0000000b (11) > sids: ARRAY(11) > sids : S-1-5-21-2119459776-1226821564-2322385355-1000 > sids : S-1-5-21-2119459776-1226821564-2322385355-513 > sids : S-1-22-2-1000 > sids : S-1-22-2-10 > sids : S-1-22-2-18 > sids : S-1-22-2-988 > sids : S-1-22-2-986 > sids : S-1-1-0 > sids : S-1-5-2 > sids : S-1-5-11 > sids : S-1-22-1-1000 > privilege_mask : 0x0000000000002e80 (11904) > 0: SEC_PRIV_MACHINE_ACCOUNT_BIT > 0: SEC_PRIV_PRINT_OPERATOR_BIT > 0: SEC_PRIV_ADD_USERS_BIT > 1: SEC_PRIV_DISK_OPERATOR_BIT > 0: SEC_PRIV_REMOTE_SHUTDOWN_BIT > 1: SEC_PRIV_BACKUP_BIT > 1: SEC_PRIV_RESTORE_BIT > 1: SEC_PRIV_TAKE_OWNERSHIP_BIT > 0: SEC_PRIV_INCREASE_QUOTA_BIT > 1: SEC_PRIV_SECURITY_BIT > 0: SEC_PRIV_LOAD_DRIVER_BIT > 0: SEC_PRIV_SYSTEM_PROFILE_BIT > 0: SEC_PRIV_SYSTEMTIME_BIT > 0: SEC_PRIV_PROFILE_SINGLE_PROCESS_BIT > 0: SEC_PRIV_INCREASE_BASE_PRIORITY_BIT > 0: SEC_PRIV_CREATE_PAGEFILE_BIT > 0: SEC_PRIV_SHUTDOWN_BIT > 0: SEC_PRIV_DEBUG_BIT > 0: SEC_PRIV_SYSTEM_ENVIRONMENT_BIT > 0: SEC_PRIV_CHANGE_NOTIFY_BIT > 0: SEC_PRIV_UNDOCK_BIT > 0: SEC_PRIV_ENABLE_DELEGATION_BIT > 0: SEC_PRIV_MANAGE_VOLUME_BIT > 0: SEC_PRIV_IMPERSONATE_BIT > 0: SEC_PRIV_CREATE_GLOBAL_BIT > rights_mask : 0x00000000 (0) > 0: LSA_POLICY_MODE_INTERACTIVE > 0: LSA_POLICY_MODE_NETWORK > 0: LSA_POLICY_MODE_BATCH > 0: LSA_POLICY_MODE_SERVICE > 0: LSA_POLICY_MODE_PROXY > 0: LSA_POLICY_MODE_DENY_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_NETWORK > 0: LSA_POLICY_MODE_DENY_BATCH > 0: LSA_POLICY_MODE_DENY_SERVICE > 0: LSA_POLICY_MODE_REMOTE_INTERACTIVE > 0: LSA_POLICY_MODE_DENY_REMOTE_INTERACTIVE > 0x00: LSA_POLICY_MODE_ALL (0) > 0x00: LSA_POLICY_MODE_ALL_NT4 (0) > unix_token : * > unix_token: struct security_unix_token > uid : 0x00000000000003e8 (1000) > gid : 0x00000000000003e8 (1000) > ngroups : 0x00000005 (5) > groups: ARRAY(5) > groups : 0x00000000000003e8 (1000) > groups : 0x000000000000000a (10) > groups : 0x0000000000000012 (18) > groups : 0x00000000000003dc (988) > groups : 0x00000000000003da (986) > info : * > info: struct auth_user_info > account_name : * > account_name : 'ambi' > domain_name : * > domain_name : 'AMBI' > full_name : * > full_name : 'Christian Ambach' > logon_script : * > logon_script : '' > profile_path : * > profile_path : '\\ambi\ambi\profile' > home_directory : * > home_directory : '\\ambi\ambi' > home_drive : * > home_drive : '' > logon_server : * > logon_server : 'AMBI' > last_logon : NTTIME(0) > last_logoff : Wed Sep 13 07:48:05 PM 30828 PDT > acct_expiry : Wed Sep 13 07:48:05 PM 30828 PDT > last_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > allow_password_change : Mon Sep 24 01:02:27 PM 2012 PDT > force_password_change : Wed Sep 13 07:48:05 PM 30828 PDT > logon_count : 0x0000 (0) > bad_password_count : 0x0000 (0) > acct_flags : 0x00000010 (16) > authenticated : 0x01 (1) > unix_info : * > unix_info: struct auth_user_info_unix > unix_name : * > unix_name : 'ambi' > sanitized_username : * > sanitized_username : 'ambi' > torture : NULL > credentials : NULL > connection_dialect : 0x0300 (768) > signing_required : 0x00 (0) > encryption_required : 0x00 (0) > num_channels : 0x00000001 (1) > channels: ARRAY(1) > channels: struct smbXsrv_channel_global0 > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > local_address : 'ipv4:10.10.23.29:445' > remote_address : 'ipv4:10.10.15.55:1291' > remote_name : '10.10.15.55' > auth_session_info_seqnum : 0x00000001 (1) > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > nonce_high : 0xed6a84d70235601a (-1339111880199413734) > nonce_low : 0x0000000000000001 (1) > gensec : * > compat : * > tcon_table : * >[2012/09/25 15:57:11.761793, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[8] dyn[yes:9] at ../source3/smbd/smb2_sesssetup.c:167 >[2012/09/25 15:57:11.761826, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 31, charge 1, granted 31, current possible/max 512/512, total granted/max/low/range 31/8192/4/31 >[2012/09/25 15:57:11.761861, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/smb/smb2_signing.c:92(smb2_signing_sign_pdu) > signed SMB2 message >[2012/09/25 15:57:11.762472, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.762641, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 4 (position 4) from bitmap >[2012/09/25 15:57:11.762727, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_TCON] mid = 4 >[2012/09/25 15:57:11.762866, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.762955, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.763029, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.763142, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.763260, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_tcon.c:198(smbd_smb2_tree_connect) > smbd_smb2_tree_connect: path[\\10.10.23.29\Share1] share[Share1] >[2012/09/25 15:57:11.763407, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:57:11.763492, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.763577, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 611A2802 >[2012/09/25 15:57:11.763682, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x884b50 >[2012/09/25 15:57:11.763920, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:672(smbXsrv_tcon_global_store) >[2012/09/25 15:57:11.764063, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:674(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key '611A2802' stored >[2012/09/25 15:57:11.764147, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0x611a2802 (1629104130) > tcon_wire_id : 0x611a2802 (1629104130) > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > share_name : NULL > encryption_required : 0x00 (0) >[2012/09/25 15:57:11.764777, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 611A2802 >[2012/09/25 15:57:11.764877, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:57:11.764953, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.765021, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:796(smbXsrv_tcon_create) >[2012/09/25 15:57:11.765068, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:804(smbXsrv_tcon_create) > smbXsrv_tcon_create: global_id (0x611a2802) stored >[2012/09/25 15:57:11.765140, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0x611a2802 (1629104130) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0x611a2802 (1629104130) > tcon_wire_id : 0x611a2802 (1629104130) > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > share_name : NULL > encryption_required : 0x00 (0) > status : NT_STATUS_INTERNAL_ERROR > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:11.766154, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/access.c:338(allow_access) > Allowed connection from 10.10.15.55 (10.10.15.55) >[2012/09/25 15:57:11.766306, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/share_access.c:242(user_ok_token) > user_ok_token: share share1 is ok for unix user ambi >[2012/09/25 15:57:11.766556, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:163(set_conn_connectpath) > set_conn_connectpath: service share1, connectpath = /data/samba/shares/share1 >[2012/09/25 15:57:11.766666, 3, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:640(make_connection_snum) > Connect path is '/data/samba/shares/share1' for service [share1] >[2012/09/25 15:57:11.766938, 10, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:337(se_file_access_check) > se_file_access_check: MAX desired = 0x2000000 mapped to 0x11f01ff >[2012/09/25 15:57:11.767000, 3, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:113(vfs_init_default) > Initialising default vfs hooks >[2012/09/25 15:57:11.767029, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2012/09/25 15:57:11.767051, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2012/09/25 15:57:11.767073, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2012/09/25 15:57:11.767092, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2012/09/25 15:57:11.767115, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for dfs_samba4 >[2012/09/25 15:57:11.767134, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'dfs_samba4' >[2012/09/25 15:57:11.767161, 10, pid=18090, effective(0, 0), real(0, 0), class=(null)] ../source3/modules/vfs_dfs_samba4.c:155(vfs_dfs_samba4_init) > vfs_dfs_samba4: Debug class number of 'fileid': 20 >[2012/09/25 15:57:11.767180, 3, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:139(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2012/09/25 15:57:11.767201, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2012/09/25 15:57:11.767230, 3, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:139(vfs_init_custom) > Initialising custom vfs hooks from [time_audit] >[2012/09/25 15:57:11.767249, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for time_audit >[2012/09/25 15:57:11.767267, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [time_audit] not loaded - trying to load... >[2012/09/25 15:57:11.767291, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/modules.c:174(do_smb_load_module) > Loading module 'time_audit' >[2012/09/25 15:57:11.767317, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/modules.c:188(do_smb_load_module) > Loading module 'time_audit': Trying to load from /data/samba/git/samba/bin/modules/vfs/time_audit.so >[2012/09/25 15:57:11.768513, 2, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/modules.c:199(do_smb_load_module) > Module 'time_audit' loaded >[2012/09/25 15:57:11.768561, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for time_audit >[2012/09/25 15:57:11.768582, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'time_audit' >[2012/09/25 15:57:11.768600, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for time_audit > Successfully loaded vfs module [time_audit] with the new modules system >[2012/09/25 15:57:11.768626, 3, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:139(vfs_init_custom) > Initialising custom vfs hooks from [xattr_tdb] >[2012/09/25 15:57:11.768644, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for xattr_tdb >[2012/09/25 15:57:11.768662, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:179(vfs_init_custom) > vfs module [xattr_tdb] not loaded - trying to load... >[2012/09/25 15:57:11.768681, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/modules.c:174(do_smb_load_module) > Loading module 'xattr_tdb' >[2012/09/25 15:57:11.768701, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/modules.c:188(do_smb_load_module) > Loading module 'xattr_tdb': Trying to load from /data/samba/git/samba/bin/modules/vfs/xattr_tdb.so >[2012/09/25 15:57:11.769872, 2, pid=18090, effective(0, 0), real(0, 0)] ../lib/util/modules.c:199(do_smb_load_module) > Module 'xattr_tdb' loaded >[2012/09/25 15:57:11.769917, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for xattr_tdb >[2012/09/25 15:57:11.769938, 5, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:103(smb_register_vfs) > Successfully added vfs backend 'xattr_tdb' >[2012/09/25 15:57:11.769957, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/smbd/vfs.c:64(vfs_find_backend_entry) > vfs_find_backend_entry called for xattr_tdb > Successfully loaded vfs module [xattr_tdb] with the new modules system >[2012/09/25 15:57:11.769996, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/connection.c:160(claim_connection) > claiming [share1] >[2012/09/25 15:57:11.770022, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:57:11.770042, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/connections.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.770064, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key AA460000000000000000 >[2012/09/25 15:57:11.770087, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89bfa0 >[2012/09/25 15:57:11.770126, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key AA460000000000000000 >[2012/09/25 15:57:11.770167, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/connections.tdb >[2012/09/25 15:57:11.770186, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.770227, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.770249, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.770268, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.770286, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.770304, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.770360, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.770430, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages.c:293(messaging_register) > Registering messaging pointer for type 784 - private_data=0x88fae0 >[2012/09/25 15:57:11.770472, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:163(set_conn_connectpath) > set_conn_connectpath: service share1, connectpath = /data/samba/shares/share1 >[2012/09/25 15:57:11.770501, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/share_access.c:242(user_ok_token) > user_ok_token: share share1 is ok for unix user ambi >[2012/09/25 15:57:11.770525, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/share_access.c:289(is_share_read_only_for_token) > is_share_read_only_for_user: share share1 is read-write for unix user ambi >[2012/09/25 15:57:11.770588, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.770614, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:57:11.770771, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:57:11.770842, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:274(change_to_user_internal) > Impersonated user: uid=(1000,1000), gid=(0,1000) >[2012/09/25 15:57:11.770867, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.770887, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.770905, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.770935, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:11.770962, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:163(set_conn_connectpath) > set_conn_connectpath: service share1, connectpath = /data/samba/shares/share1 >[2012/09/25 15:57:11.771015, 10, pid=18090, effective(0, 0), real(0, 0), class=vfs] ../source3/modules/vfs_default.c:167(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share share1, directory /data/samba/shares/share1 >[2012/09/25 15:57:11.771040, 1, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/service.c:895(make_connection_snum) > smb-smb2-cli-02 (ipv4:10.10.15.55:1291) connect to service share1 initially as user ambi (uid=1000, gid=1000) (pid 18090) >[2012/09/25 15:57:11.771077, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:57:11.771097, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.771118, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 611A2802 >[2012/09/25 15:57:11.771139, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x88c7b0 >[2012/09/25 15:57:11.771166, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:672(smbXsrv_tcon_global_store) >[2012/09/25 15:57:11.771179, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:674(smbXsrv_tcon_global_store) > smbXsrv_tcon_global_store: key '611A2802' stored >[2012/09/25 15:57:11.771198, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_tcon_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000002 (2) > info : union smbXsrv_tcon_globalU(case 0) > info0 : * > info0: struct smbXsrv_tcon_global0 > db_rec : * > tcon_global_id : 0x611a2802 (1629104130) > tcon_wire_id : 0x611a2802 (1629104130) > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > share_name : 'share1' > encryption_required : 0x00 (0) >[2012/09/25 15:57:11.771355, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 611A2802 >[2012/09/25 15:57:11.771375, 5, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_tcon_global.tdb >[2012/09/25 15:57:11.771394, 10, pid=18090, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.771414, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:849(smbXsrv_tcon_update) >[2012/09/25 15:57:11.771432, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smbXsrv_tcon.c:857(smbXsrv_tcon_update) > smbXsrv_tcon_update: global_id (0x611a2802) stored >[2012/09/25 15:57:11.771449, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &tcon_blob: struct smbXsrv_tconB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_tconU(case 0) > info0 : * > info0: struct smbXsrv_tcon > table : * > db_rec : NULL > local_id : 0x611a2802 (1629104130) > global : * > global: struct smbXsrv_tcon_global0 > db_rec : NULL > tcon_global_id : 0x611a2802 (1629104130) > tcon_wire_id : 0x611a2802 (1629104130) > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > creation_time : Tue Sep 25 03:57:12 PM 2012 PDT > share_name : 'share1' > encryption_required : 0x00 (0) > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : * >[2012/09/25 15:57:11.771693, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[16] dyn[no:0] at ../source3/smbd/smb2_tcon.c:162 >[2012/09/25 15:57:11.771724, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/5/31 >[2012/09/25 15:57:11.772257, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.772364, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 5 (position 5) from bitmap >[2012/09/25 15:57:11.772385, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_IOCTL] mid = 5 >[2012/09/25 15:57:11.772422, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.772445, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:57:11.772604, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:57:11.772669, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:274(change_to_user_internal) > Impersonated user: uid=(1000,1000), gid=(0,1000) >[2012/09/25 15:57:11.772693, 4, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:816(vfs_ChDir) > vfs_ChDir to /data/samba/shares/share1 >[2012/09/25 15:57:11.772739, 4, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:827(vfs_ChDir) > vfs_ChDir got /data/samba/shares/share1 >[2012/09/25 15:57:11.772769, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1774(smbd_smb2_request_verify_creditcharge) > mid 5, CreditCharge: 1, NeededCharge: 1 >[2012/09/25 15:57:11.772791, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_ioctl.c:373(smbd_smb2_ioctl_send) > smbd_smb2_ioctl: ctl_code[0x00140204] <no handle>, fnum [fsp is NULL] >[2012/09/25 15:57:11.772841, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_ioctl.c:255(smbd_smb2_request_ioctl_done) > smbd_smb2_request_ioctl_done: smbd_smb2_ioctl_recv returned 24 status NT_STATUS_OK >[2012/09/25 15:57:11.772865, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[48] dyn[yes:24] at ../source3/smbd/smb2_ioctl.c:323 >[2012/09/25 15:57:11.772885, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/6/31 >[2012/09/25 15:57:11.772908, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/smb/smb2_signing.c:92(smb2_signing_sign_pdu) > signed SMB2 message >[2012/09/25 15:57:11.773485, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.773534, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 6 (position 6) from bitmap >[2012/09/25 15:57:11.773554, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 6 >[2012/09/25 15:57:11.773577, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.773614, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:450(smbd_smb2_create_send) > smbd_smb2_create: name[] >[2012/09/25 15:57:11.773656, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:807(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2012/09/25 15:57:11.773696, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:258(unix_convert) > unix_convert called on file "" >[2012/09/25 15:57:11.773719, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:292(unix_convert) > conversion finished "" -> . >[2012/09/25 15:57:11.773748, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1118(check_reduced_name) > check_reduced_name [.] [/data/samba/shares/share1] >[2012/09/25 15:57:11.773770, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1178(check_reduced_name) > check_reduced_name realpath [.] -> [/data/samba/shares/share1] >[2012/09/25 15:57:11.773793, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1248(check_reduced_name) > check_reduced_name: . reduced to /data/samba/shares/share1 >[2012/09/25 15:57:11.773826, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4026(create_file_default) > create_file: access_mask = 0x80 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x200000 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = . >[2012/09/25 15:57:11.773856, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3553(create_file_unixpath) > create_file_unixpath: access_mask = 0x80 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x200000 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = . >[2012/09/25 15:57:11.773886, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.773907, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.773928, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key DC928284 >[2012/09/25 15:57:11.773951, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a1390 >[2012/09/25 15:57:11.774005, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:57:11.774042, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'DC928284' stored >[2012/09/25 15:57:11.774062, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xdc928284 (3700589188) > open_persistent_id : 0x00000000dc928284 (3700589188) > open_volatile_id : 0x00000000ba12ed99 (3121802649) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 >[2012/09/25 15:57:11.774295, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key DC928284 >[2012/09/25 15:57:11.774316, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.774335, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.774354, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:862(smbXsrv_open_create) >[2012/09/25 15:57:11.774366, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:870(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xdc928284) stored >[2012/09/25 15:57:11.774384, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xba12ed99 (3121802649) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xdc928284 (3700589188) > open_persistent_id : 0x00000000dc928284 (3700589188) > open_volatile_id : 0x00000000ba12ed99 (3121802649) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:11.774676, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:126(file_new) > allocated file structure fnum 3121802649 (1 used) >[2012/09/25 15:57:11.774703, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:700(file_name_hash) > file_name_hash: /data/samba/shares/share1/. hash 0xf570b8bc >[2012/09/25 15:57:11.774739, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:160(unix_mode) > unix_mode(.) returning 0744 >[2012/09/25 15:57:11.774764, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:1958(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x80 share_access=0x7 create_disposition = 0x1 create_options=0x200000 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2012/09/25 15:57:11.774793, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: . >[2012/09/25 15:57:11.774822, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.774847, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.774874, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2117(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x80 >[2012/09/25 15:57:11.774901, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.774921, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.774943, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.774973, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x898c40 >[2012/09/25 15:57:11.775059, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.775083, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.775618, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:11.775654, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 2 for /data/samba/prefix/master/var/lock/brlock.tdb >[2012/09/25 15:57:11.775677, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:/data/samba/prefix/master/var/lock/brlock.tdb 3:<none> >[2012/09/25 15:57:11.775698, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.775721, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x899860 >[2012/09/25 15:57:11.775741, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/brlock.c:1955(brl_get_locks_internal) > brl_get_locks_internal: 0 current locks on file_id fd04:68a21e:0 >[2012/09/25 15:57:11.775768, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.775788, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 2 for /data/samba/prefix/master/var/lock/brlock.tdb >[2012/09/25 15:57:11.775812, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.775837, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:1391(grant_fsp_oplock_type) > grant_fsp_oplock_type: oplock type 0x0 on file . >[2012/09/25 15:57:11.775858, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2408(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x0 mode=0744, access_mask = 0x80, open_access_mask = 0x80 >[2012/09/25 15:57:11.775886, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.775989, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.776014, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.776034, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.776057, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.776076, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.776094, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.776159, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.776180, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.776199, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.776217, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.776235, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.776273, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.776295, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.776314, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.776332, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.776353, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.776376, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.776396, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.776416, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.776435, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.776456, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.776477, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.776497, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.776516, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.776534, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.776552, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.776573, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.776607, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.776630, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.776651, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.776671, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.776702, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.776727, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.776746, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.776778, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.776798, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.776831, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.776850, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.776868, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.776886, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.776923, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.776944, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.776981, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.777002, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.777022, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.777041, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.777059, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.777077, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.777127, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.777148, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.777166, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.777185, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.777202, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.777237, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.777258, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.777277, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.777296, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.777315, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.777337, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.777357, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.777376, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.777395, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.777416, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.777435, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.777455, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.777481, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.777498, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.777516, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.777532, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.777562, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.777586, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.777606, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.777625, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.777662, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.777694, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.777721, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.777748, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.777767, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.777786, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.777809, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.777826, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.777843, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.777877, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.777896, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.777918, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.777937, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.777961, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.778004, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.778034, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.778076, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.778116, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.778235, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.778255, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.778274, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.778291, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.778309, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.778325, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.778366, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.778385, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.778403, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.778428, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.778446, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.778481, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.778502, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.778521, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.778539, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.778559, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.778581, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.778600, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.778623, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.778643, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.778664, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.778690, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.778708, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.778726, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.778743, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.778760, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.778777, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.778810, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.778832, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.778852, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.778871, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.778899, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.778921, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.778939, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.778967, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.778985, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.779004, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.779022, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.779039, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.779055, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.779092, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.779112, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.779131, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.779149, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.779168, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.779198, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.779227, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.779262, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.779296, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.779408, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779428, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779445, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779463, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779480, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779498, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779515, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779535, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779553, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779570, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.779594, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.779614, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.779631, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.779693, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:148(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x80 returning 0x0 (NT_STATUS_OK) >[2012/09/25 15:57:11.779719, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.779739, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.779756, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.779779, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.779797, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.779822, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key DC928284 >[2012/09/25 15:57:11.779842, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a3c80 >[2012/09/25 15:57:11.779869, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key DC928284 >[2012/09/25 15:57:11.779889, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.779907, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.779931, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:526(file_free) > freed files structure 3121802649 (0 used) >[2012/09/25 15:57:11.779950, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2936(open_directory) > open_directory: opening directory ., access_mask = 0x80, share_access = 0x7 create_options = 0x200000, create_disposition = 0x1, file_attributes = 0x10 >[2012/09/25 15:57:11.779973, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.780010, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.780033, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780053, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.780070, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780087, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.780104, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.780146, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.780165, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780183, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.780200, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.780216, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.780249, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.780269, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.780287, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.780304, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.780323, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.780343, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.780361, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.780380, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.780398, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.780417, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.780436, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.780454, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.780472, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.780493, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.780510, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.780526, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.780556, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.780576, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.780595, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.780623, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.780659, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780681, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.780700, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.780726, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.780744, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780763, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.780781, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780798, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.780823, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.780857, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.780876, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.780903, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.780922, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780941, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.780958, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.780978, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.780995, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.781037, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.781056, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.781074, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.781091, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.781107, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.781149, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.781170, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.781188, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.781207, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.781226, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.781256, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.781282, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.781301, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.781320, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.781341, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.781367, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.781385, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.781405, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.781422, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.781439, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.781456, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.781490, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.781511, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.781530, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.781549, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.781577, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.781599, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.781617, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.781649, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.781681, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.781708, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.781725, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.781743, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.781759, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.781793, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.781817, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.781838, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.781855, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.781875, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.781905, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.781934, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.781981, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.782018, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.782141, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.782161, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.782183, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.782201, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.782220, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.782237, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.782280, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.782301, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.782319, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.782337, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.782355, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.782390, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.782411, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.782429, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.782448, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.782468, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.782489, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.782512, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.782532, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.782551, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.782572, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.782591, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.782610, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.782629, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.782648, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.782666, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.782683, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.782715, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.782737, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.782757, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.782777, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.782811, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.782835, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.782855, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.782884, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.782904, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.782925, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.782944, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.782962, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.782983, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.783019, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.783039, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.783060, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.783078, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.783099, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.783131, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.783161, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.783198, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.783234, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.783350, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783370, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783389, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783407, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783425, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783444, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783465, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783484, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783502, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783521, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.783540, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.783558, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.783577, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.783602, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:148(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x80 returning 0x0 (NT_STATUS_OK) >[2012/09/25 15:57:11.783628, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.783656, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.783678, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key BFE1834F >[2012/09/25 15:57:11.783700, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8909d0 >[2012/09/25 15:57:11.783741, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:57:11.783755, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'BFE1834F' stored >[2012/09/25 15:57:11.783775, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xbfe1834f (3219227471) > open_persistent_id : 0x00000000bfe1834f (3219227471) > open_volatile_id : 0x00000000f2dd101d (4074573853) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 >[2012/09/25 15:57:11.783999, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key BFE1834F >[2012/09/25 15:57:11.784020, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.784039, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.784058, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:862(smbXsrv_open_create) >[2012/09/25 15:57:11.784070, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:870(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xbfe1834f) stored >[2012/09/25 15:57:11.784088, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xf2dd101d (4074573853) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xbfe1834f (3219227471) > open_persistent_id : 0x00000000bfe1834f (3219227471) > open_volatile_id : 0x00000000f2dd101d (4074573853) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:11.784367, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:126(file_new) > allocated file structure fnum 4074573853 (1 used) >[2012/09/25 15:57:11.784390, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:700(file_name_hash) > file_name_hash: /data/samba/shares/share1/. hash 0xf570b8bc >[2012/09/25 15:57:11.784415, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:335(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 35. >[2012/09/25 15:57:11.784448, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.784469, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.784490, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.784513, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a4340 >[2012/09/25 15:57:11.784542, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.784563, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.785076, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:11.785101, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:11.785120, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000006 (6) > op_type : 0x0000 (0) > access_mask : 0x00000080 (128) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.783623 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x000000006c9c2794 (1822173076) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:11.785805, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.785828, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.785846, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.785865, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3838(create_file_unixpath) > create_file_unixpath: info=1 >[2012/09/25 15:57:11.785882, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4114(create_file_default) > create_file: info=1 >[2012/09/25 15:57:11.785899, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:908(smbd_smb2_create_send) > smbd_smb2_create_send: response construction phase >[2012/09/25 15:57:11.785919, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.785954, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.785974, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.785994, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.786011, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786028, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.786045, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.786093, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.786113, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786131, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.786148, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.786165, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.786198, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.786218, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.786236, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.786253, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.786272, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.786293, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.786311, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.786329, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.786348, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.786368, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.786386, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.786404, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.786422, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.786439, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.786456, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.786473, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.786502, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.786523, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.786545, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.786565, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.786593, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786616, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.786634, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.786669, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.786689, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786748, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.786765, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786783, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.786808, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.786844, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.786864, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.786891, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.786909, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786928, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.786945, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.786962, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.786979, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.787022, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.787040, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.787058, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.787078, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.787094, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.787127, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.787147, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.787165, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.787182, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.787200, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.787221, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.787239, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.787257, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.787275, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.787295, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.787313, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.787331, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.787349, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.787366, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.787383, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.787400, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.787429, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.787450, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.787469, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.787488, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.787519, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.787541, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.787560, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.787588, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.787607, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.787625, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.787656, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.787678, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.787707, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.787742, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.787761, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.787781, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.787798, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.787824, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.787855, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.787884, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.787921, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.787966, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.788095, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.788115, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.788134, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.788151, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.788168, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.788185, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.788226, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.788245, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.788271, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.788289, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.788307, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.788342, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.788363, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.788382, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.788400, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.788427, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.788447, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.788466, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.788484, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.788502, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.788521, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.788542, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.788561, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.788579, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.788596, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.788612, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.788629, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.788658, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.788679, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.788698, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.788716, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.788745, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.788768, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.788786, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.788827, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.788847, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.788866, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.788883, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.788900, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.788917, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.788950, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.788970, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.788989, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.789009, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.789030, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.789063, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.789092, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.789128, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.789162, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.789269, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789287, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789305, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789322, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789340, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789357, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789374, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789392, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789409, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789426, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.789447, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.789465, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.789482, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.789510, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/access_check.c:188(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1f01ff, remaining = 0x1f01ff >[2012/09/25 15:57:11.789542, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: . >[2012/09/25 15:57:11.789563, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.789581, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.789614, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.789635, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000006 (6) > op_type : 0x0000 (0) > access_mask : 0x00000080 (128) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.783623 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x000000006c9c2794 (1822173076) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.790280, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:1072(smbd_smb2_create_send) > smbd_smb2_create_send: . - fnum 4074573853 >[2012/09/25 15:57:11.790330, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../source3/smbd/smb2_create.c:369 >[2012/09/25 15:57:11.790353, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/7/31 >[2012/09/25 15:57:11.797620, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 13 vectors >[2012/09/25 15:57:11.797711, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 7 (position 7) from bitmap >[2012/09/25 15:57:11.797755, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 8 (position 8) from bitmap >[2012/09/25 15:57:11.797793, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 9 (position 9) from bitmap >[2012/09/25 15:57:11.797844, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 7 >[2012/09/25 15:57:11.797906, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.797962, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:450(smbd_smb2_create_send) > smbd_smb2_create: name[] >[2012/09/25 15:57:11.798005, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:807(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2012/09/25 15:57:11.798044, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:258(unix_convert) > unix_convert called on file "" >[2012/09/25 15:57:11.798087, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:292(unix_convert) > conversion finished "" -> . >[2012/09/25 15:57:11.798126, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1118(check_reduced_name) > check_reduced_name [.] [/data/samba/shares/share1] >[2012/09/25 15:57:11.798169, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1178(check_reduced_name) > check_reduced_name realpath [.] -> [/data/samba/shares/share1] >[2012/09/25 15:57:11.798209, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1248(check_reduced_name) > check_reduced_name: . reduced to /data/samba/shares/share1 >[2012/09/25 15:57:11.798248, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4026(create_file_default) > create_file: access_mask = 0x100080 file_attributes = 0x0, share_access = 0x0, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = . >[2012/09/25 15:57:11.798293, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3553(create_file_unixpath) > create_file_unixpath: access_mask = 0x100080 file_attributes = 0x0, share_access = 0x0, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = . >[2012/09/25 15:57:11.798335, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2936(open_directory) > open_directory: opening directory ., access_mask = 0x100080, share_access = 0x0 create_options = 0x1, create_disposition = 0x1, file_attributes = 0x10 >[2012/09/25 15:57:11.798379, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.798466, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.798511, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.798552, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.798590, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.798628, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.798664, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.798770, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.798823, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.798869, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.798907, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.798942, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.799016, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.799059, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.799096, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.799133, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.799174, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.799219, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.799259, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.799298, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.799337, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.799379, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.799418, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.799458, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.799496, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.799532, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.799569, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.799605, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.799684, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.799733, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.799774, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.799825, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.799895, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.799946, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.799985, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.800042, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.800083, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.800124, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.800162, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.800198, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.800234, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.800307, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.800348, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.800406, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.800446, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.800486, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.800523, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.800560, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.800596, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.800689, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.800730, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.800767, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.800821, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.800860, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.800938, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.800981, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.801018, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.801055, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.801094, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.801136, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.801175, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.801214, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.801252, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.801293, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.801332, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.801371, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.801409, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.801446, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.801482, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.801517, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.801580, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.801624, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.801684, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.801741, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.801812, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.801863, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.801913, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.801974, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.802015, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.802055, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.802092, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.802128, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.802164, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.802237, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.802281, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.802323, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.802359, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.802403, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.802470, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.802532, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.802611, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.802686, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.802942, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.802991, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.803032, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.803069, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.803106, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.803141, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.803228, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.803269, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.803306, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.803342, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.803378, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.803448, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.803491, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.803528, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.803565, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.803604, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.803653, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.803704, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.803744, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.803783, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.803836, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.803876, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.803916, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.803960, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.803997, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.804034, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.804070, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.804133, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.804176, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.804217, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.804257, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.804317, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.804365, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.804404, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.804461, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.804502, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.804542, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.804580, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.804616, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.804652, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.804725, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.804767, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.804836, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.804877, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.804920, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.804990, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.805052, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.805129, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.805202, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.805436, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805477, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805515, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805553, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805590, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805628, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805686, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805727, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805764, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805809, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.805851, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.805889, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.805933, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.805986, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:148(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x100080 returning 0x100000 (NT_STATUS_OK) >[2012/09/25 15:57:11.806038, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.806078, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.806120, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key F99526D0 >[2012/09/25 15:57:11.806163, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8909d0 >[2012/09/25 15:57:11.806235, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:57:11.806263, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'F99526D0' stored >[2012/09/25 15:57:11.806302, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xf99526d0 (4187301584) > open_persistent_id : 0x00000000f99526d0 (4187301584) > open_volatile_id : 0x00000000170d681a (386754586) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 >[2012/09/25 15:57:11.806749, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key F99526D0 >[2012/09/25 15:57:11.806790, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.806850, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.806890, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:862(smbXsrv_open_create) >[2012/09/25 15:57:11.806912, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:870(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xf99526d0) stored >[2012/09/25 15:57:11.806957, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x170d681a (386754586) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xf99526d0 (4187301584) > open_persistent_id : 0x00000000f99526d0 (4187301584) > open_volatile_id : 0x00000000170d681a (386754586) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:11.807240, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:126(file_new) > allocated file structure fnum 386754586 (2 used) >[2012/09/25 15:57:11.807283, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:700(file_name_hash) > file_name_hash: /data/samba/shares/share1/. hash 0xf570b8bc >[2012/09/25 15:57:11.807327, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:335(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 36. >[2012/09/25 15:57:11.807375, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.807414, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.807456, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.807499, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a50b0 >[2012/09/25 15:57:11.807563, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.807603, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000006 (6) > op_type : 0x0000 (0) > access_mask : 0x00000080 (128) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.783623 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x000000006c9c2794 (1822173076) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.808580, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:11.808624, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:11.808660, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000006 (6) > op_type : 0x0000 (0) > access_mask : 0x00000080 (128) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.783623 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x000000006c9c2794 (1822173076) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:11.810216, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.810262, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.810300, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.810321, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3838(create_file_unixpath) > create_file_unixpath: info=1 >[2012/09/25 15:57:11.810340, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4114(create_file_default) > create_file: info=1 >[2012/09/25 15:57:11.810362, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:908(smbd_smb2_create_send) > smbd_smb2_create_send: response construction phase >[2012/09/25 15:57:11.810383, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.810428, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.810450, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.810471, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.810490, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.810509, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.810527, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.810634, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.810676, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.810713, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.810749, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.810784, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.810858, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.810880, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.810899, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.810918, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.810962, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.811007, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.811046, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.811085, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.811124, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.811166, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.811212, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.811252, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.811290, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.811327, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.811369, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.811387, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.811420, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.811442, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.811463, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.811484, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.811513, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.811537, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.811556, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.811585, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.811605, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.811625, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.811675, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.811717, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.811753, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.811829, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.811874, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.811933, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.811979, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.812020, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.812056, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.812093, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.812129, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.812212, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.812232, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.812251, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.812269, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.812296, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.812366, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.812409, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.812446, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.812482, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.812523, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.812567, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.812605, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.812643, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.812663, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.812683, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.812703, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.812724, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.812747, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.812766, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.812784, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.812806, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.812840, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.812862, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.812882, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.812902, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.812933, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.812957, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.812976, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.813030, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.813070, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.813110, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.813147, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.813183, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.813218, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.813288, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.813389, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.813434, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.813474, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.813497, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.813535, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.813566, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.813645, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.813741, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.814006, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.814027, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.814047, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.814065, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.814083, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.814112, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.814200, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.814240, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.814278, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.814314, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.814349, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.814421, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.814463, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.814500, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.814540, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.814561, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.814583, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.814602, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.814621, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.814641, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.814662, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.814681, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.814701, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.814720, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.814739, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.814756, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.814784, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.814861, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.814906, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.814947, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.814987, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.815047, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.815093, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.815132, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.815191, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.815237, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.815273, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.815291, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.815309, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.815327, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.815363, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.815384, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.815405, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.815424, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.815445, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.815477, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.815508, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.815546, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.815582, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.815711, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815754, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815792, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815847, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815886, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815923, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815961, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.815998, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.816034, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.816071, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.816110, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.816148, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.816183, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.816211, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/access_check.c:188(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1f01ff, remaining = 0x1f01ff >[2012/09/25 15:57:11.816236, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: . >[2012/09/25 15:57:11.816259, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.816280, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.816338, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.816380, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000006 (6) > op_type : 0x0000 (0) > access_mask : 0x00000080 (128) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.783623 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x000000006c9c2794 (1822173076) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.817507, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:1072(smbd_smb2_create_send) > smbd_smb2_create_send: . - fnum 386754586 >[2012/09/25 15:57:11.817564, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../source3/smbd/smb2_create.c:369 >[2012/09/25 15:57:11.817599, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2465(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 56 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 40 > req->in.vector[8].iov_len = 8 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 40 > req->in.vector[12].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 88 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2012/09/25 15:57:11.817797, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_GETINFO] mid = 8 >[2012/09/25 15:57:11.817833, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.817863, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1774(smbd_smb2_request_verify_creditcharge) > mid 8, CreditCharge: 1, NeededCharge: 1 >[2012/09/25 15:57:11.817886, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_getinfo.c:268(smbd_smb2_getinfo_send) > smbd_smb2_getinfo_send: . - fnum 386754586 >[2012/09/25 15:57:11.817926, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:3055(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 1001 >[2012/09/25 15:57:11.817978, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:3198(smbd_do_qfsinfo) > smbd_do_qfsinfo : SMB_QUERY_FS_VOLUME_INFO namelen = 6, vol=share1 serv=share1 >[2012/09/25 15:57:11.818007, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[5] status[NT_STATUS_OK] body[8] dyn[yes:30] at ../source3/smbd/smb2_getinfo.c:197 >[2012/09/25 15:57:11.818030, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2465(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[9] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 56 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 40 > req->in.vector[8].iov_len = 8 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 40 > req->in.vector[12].iov_len = 1 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 88 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 32 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2012/09/25 15:57:11.818218, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_GETINFO] mid = 9 >[2012/09/25 15:57:11.818240, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.818260, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1774(smbd_smb2_request_verify_creditcharge) > mid 9, CreditCharge: 1, NeededCharge: 1 >[2012/09/25 15:57:11.818279, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_getinfo.c:268(smbd_smb2_getinfo_send) > smbd_smb2_getinfo_send: . - fnum 386754586 >[2012/09/25 15:57:11.818302, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:3055(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 1005 >[2012/09/25 15:57:11.818333, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[9] status[NT_STATUS_OK] body[8] dyn[yes:20] at ../source3/smbd/smb2_getinfo.c:197 >[2012/09/25 15:57:11.818356, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 484/512, total granted/max/low/range 29/8192/10/29 >[2012/09/25 15:57:11.818376, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 483/512, total granted/max/low/range 30/8192/10/30 >[2012/09/25 15:57:11.818395, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/10/31 >[2012/09/25 15:57:11.818873, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.818911, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 10 (position 10) from bitmap >[2012/09/25 15:57:11.818933, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 10 >[2012/09/25 15:57:11.818962, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.819006, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_close.c:185(smbd_smb2_close) > smbd_smb2_close: . - fnum 4074573853 >[2012/09/25 15:57:11.819040, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.819066, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.819089, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.819115, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x898a10 >[2012/09/25 15:57:11.819150, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.819171, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000006 (6) > op_type : 0x0000 (0) > access_mask : 0x00000080 (128) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.783623 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x000000006c9c2794 (1822173076) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.820190, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:11.820217, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:11.820237, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:11.820909, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.820934, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.820953, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.821002, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.821026, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.821047, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key BFE1834F >[2012/09/25 15:57:11.821070, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89bc90 >[2012/09/25 15:57:11.821096, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key BFE1834F >[2012/09/25 15:57:11.821116, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.821136, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.821161, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:526(file_free) > freed files structure 4074573853 (1 used) >[2012/09/25 15:57:11.821185, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: . >[2012/09/25 15:57:11.821209, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.821232, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.821297, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../source3/smbd/smb2_close.c:139 >[2012/09/25 15:57:11.821323, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/11/31 >[2012/09/25 15:57:11.821915, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 13 vectors >[2012/09/25 15:57:11.821944, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 11 (position 11) from bitmap >[2012/09/25 15:57:11.821969, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 12 (position 12) from bitmap >[2012/09/25 15:57:11.821999, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 13 (position 13) from bitmap >[2012/09/25 15:57:11.822026, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 11 >[2012/09/25 15:57:11.822056, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.822084, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:450(smbd_smb2_create_send) > smbd_smb2_create: name[] >[2012/09/25 15:57:11.822106, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:807(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2012/09/25 15:57:11.822127, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:258(unix_convert) > unix_convert called on file "" >[2012/09/25 15:57:11.822148, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:292(unix_convert) > conversion finished "" -> . >[2012/09/25 15:57:11.822169, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1118(check_reduced_name) > check_reduced_name [.] [/data/samba/shares/share1] >[2012/09/25 15:57:11.822192, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1178(check_reduced_name) > check_reduced_name realpath [.] -> [/data/samba/shares/share1] >[2012/09/25 15:57:11.822213, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1248(check_reduced_name) > check_reduced_name: . reduced to /data/samba/shares/share1 >[2012/09/25 15:57:11.822239, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4026(create_file_default) > create_file: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = . >[2012/09/25 15:57:11.822271, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3553(create_file_unixpath) > create_file_unixpath: access_mask = 0x100081 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = . >[2012/09/25 15:57:11.822294, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2936(open_directory) > open_directory: opening directory ., access_mask = 0x100081, share_access = 0x7 create_options = 0x1, create_disposition = 0x1, file_attributes = 0x10 >[2012/09/25 15:57:11.822319, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.822378, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.822402, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.822425, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.822444, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.822463, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.822482, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.822540, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.822565, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.822585, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.822603, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.822621, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.822665, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.822687, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.822706, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.822725, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.822747, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.822773, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.822793, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.822819, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.822839, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.822861, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.822881, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.822902, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.822921, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.822939, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.822958, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.822988, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.823027, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.823050, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.823072, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.823098, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.823130, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.823154, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.823174, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.823204, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.823224, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.823258, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.823279, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.823297, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.823316, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.823355, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.823376, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.823407, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.823427, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.823448, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.823466, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.823485, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.823502, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.823550, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.823571, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.823590, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.823608, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.823629, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.823672, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.823695, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.823714, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.823732, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.823752, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.823774, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.823794, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.823819, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.823839, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.823859, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.823879, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.823899, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.823918, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.823937, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.823955, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.823983, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.824025, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.824048, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.824069, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.824089, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.824120, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.824147, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.824168, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.824198, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.824218, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.824248, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.824271, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.824289, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.824307, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.824344, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.824365, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.824387, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.824406, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.824428, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.824463, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.824494, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.824535, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.824573, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.824700, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.824722, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.824743, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.824761, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.824780, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.824797, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.824849, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.824869, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.824888, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.824906, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.824924, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.824961, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.824994, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.825015, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.825033, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.825053, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.825076, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.825095, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.825115, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.825134, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.825155, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.825174, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.825197, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.825217, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.825243, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.825267, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.825285, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.825317, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.825340, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.825360, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.825381, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.825414, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.825439, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.825458, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.825489, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.825509, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.825529, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.825548, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.825566, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.825584, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.825627, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.825650, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.825673, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.825691, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.825716, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.825750, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.825781, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.825825, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.825863, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.825994, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826017, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826036, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826055, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826074, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826093, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826112, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826131, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826150, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826169, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.826189, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.826208, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.826235, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.826273, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:148(smbd_check_access_rights) > smbd_check_access_rights: file . requesting 0x100081 returning 0x100001 (NT_STATUS_OK) >[2012/09/25 15:57:11.826303, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.826324, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.826345, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key E93EBB51 >[2012/09/25 15:57:11.826368, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a2420 >[2012/09/25 15:57:11.826410, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:57:11.826425, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'E93EBB51' stored >[2012/09/25 15:57:11.826445, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xe93ebb51 (3913202513) > open_persistent_id : 0x00000000e93ebb51 (3913202513) > open_volatile_id : 0x00000000f329f45d (4079613021) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 >[2012/09/25 15:57:11.826669, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key E93EBB51 >[2012/09/25 15:57:11.826690, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.826709, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.826729, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:862(smbXsrv_open_create) >[2012/09/25 15:57:11.826744, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:870(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xe93ebb51) stored >[2012/09/25 15:57:11.826762, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0xf329f45d (4079613021) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xe93ebb51 (3913202513) > open_persistent_id : 0x00000000e93ebb51 (3913202513) > open_volatile_id : 0x00000000f329f45d (4079613021) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:11.827074, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:126(file_new) > allocated file structure fnum 4079613021 (2 used) >[2012/09/25 15:57:11.827100, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:700(file_name_hash) > file_name_hash: /data/samba/shares/share1/. hash 0xf570b8bc >[2012/09/25 15:57:11.827124, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:335(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 35. >[2012/09/25 15:57:11.827149, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.827168, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.827190, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.827212, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a5040 >[2012/09/25 15:57:11.827257, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.827279, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.827965, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:11.828000, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:922(share_conflict) > share_conflict: entry->access_mask = 0x100081, entry->share_access = 0x7, entry->private_options = 0x0 >[2012/09/25 15:57:11.828026, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:933(share_conflict) > share_conflict: access_mask = 0x100081, share_access = 0x7 >[2012/09/25 15:57:11.828046, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:982(share_conflict) > share_conflict: [1] am (0x100081) & right (0x6) = 0x0 >[2012/09/25 15:57:11.828064, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:982(share_conflict) > share_conflict: [1] sa (0x7) & share (0x2) = 0x2 >[2012/09/25 15:57:11.828082, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:984(share_conflict) > share_conflict: [2] am (0x100081) & right (0x6) = 0x0 >[2012/09/25 15:57:11.828100, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:984(share_conflict) > share_conflict: [2] sa (0x7) & share (0x2) = 0x2 >[2012/09/25 15:57:11.828119, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:987(share_conflict) > share_conflict: [3] am (0x100081) & right (0x21) = 0x1 >[2012/09/25 15:57:11.828137, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:987(share_conflict) > share_conflict: [3] sa (0x7) & share (0x1) = 0x1 >[2012/09/25 15:57:11.828155, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:989(share_conflict) > share_conflict: [4] am (0x100081) & right (0x21) = 0x1 >[2012/09/25 15:57:11.828173, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:989(share_conflict) > share_conflict: [4] sa (0x7) & share (0x1) = 0x1 >[2012/09/25 15:57:11.828191, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:992(share_conflict) > share_conflict: [5] am (0x100081) & right (0x10000) = 0x0 >[2012/09/25 15:57:11.828210, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:992(share_conflict) > share_conflict: [5] sa (0x7) & share (0x4) = 0x4 >[2012/09/25 15:57:11.828231, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:994(share_conflict) > share_conflict: [6] am (0x100081) & right (0x10000) = 0x0 >[2012/09/25 15:57:11.828258, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:994(share_conflict) > share_conflict: [6] sa (0x7) & share (0x4) = 0x4 >[2012/09/25 15:57:11.828277, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:996(share_conflict) > share_conflict: No conflict. >[2012/09/25 15:57:11.828295, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:922(share_conflict) > share_conflict: entry->access_mask = 0x100081, entry->share_access = 0x7, entry->private_options = 0x0 >[2012/09/25 15:57:11.828314, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:933(share_conflict) > share_conflict: access_mask = 0x100081, share_access = 0x7 >[2012/09/25 15:57:11.828336, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:982(share_conflict) > share_conflict: [1] am (0x100081) & right (0x6) = 0x0 >[2012/09/25 15:57:11.828354, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:982(share_conflict) > share_conflict: [1] sa (0x7) & share (0x2) = 0x2 >[2012/09/25 15:57:11.828372, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:984(share_conflict) > share_conflict: [2] am (0x100081) & right (0x6) = 0x0 >[2012/09/25 15:57:11.828391, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:984(share_conflict) > share_conflict: [2] sa (0x7) & share (0x2) = 0x2 >[2012/09/25 15:57:11.828409, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:987(share_conflict) > share_conflict: [3] am (0x100081) & right (0x21) = 0x1 >[2012/09/25 15:57:11.828427, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:987(share_conflict) > share_conflict: [3] sa (0x7) & share (0x1) = 0x1 >[2012/09/25 15:57:11.828446, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:989(share_conflict) > share_conflict: [4] am (0x100081) & right (0x21) = 0x1 >[2012/09/25 15:57:11.828464, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:989(share_conflict) > share_conflict: [4] sa (0x7) & share (0x1) = 0x1 >[2012/09/25 15:57:11.828482, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:992(share_conflict) > share_conflict: [5] am (0x100081) & right (0x10000) = 0x0 >[2012/09/25 15:57:11.828501, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:992(share_conflict) > share_conflict: [5] sa (0x7) & share (0x4) = 0x4 >[2012/09/25 15:57:11.828519, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:994(share_conflict) > share_conflict: [6] am (0x100081) & right (0x10000) = 0x0 >[2012/09/25 15:57:11.828537, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:994(share_conflict) > share_conflict: [6] sa (0x7) & share (0x4) = 0x4 >[2012/09/25 15:57:11.828555, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:996(share_conflict) > share_conflict: No conflict. >[2012/09/25 15:57:11.828573, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:922(share_conflict) > share_conflict: entry->access_mask = 0x100080, entry->share_access = 0x0, entry->private_options = 0x0 >[2012/09/25 15:57:11.828592, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:933(share_conflict) > share_conflict: access_mask = 0x100081, share_access = 0x7 >[2012/09/25 15:57:11.828610, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:942(share_conflict) > share_conflict: No conflict due to entry->access_mask = 0x100080 >[2012/09/25 15:57:11.828630, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:11.828649, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000b (11) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.826296 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000083186b32 (2199415602) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:11.829505, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:11.829529, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.829549, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.829569, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3838(create_file_unixpath) > create_file_unixpath: info=1 >[2012/09/25 15:57:11.829588, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4114(create_file_default) > create_file: info=1 >[2012/09/25 15:57:11.829607, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:908(smbd_smb2_create_send) > smbd_smb2_create_send: response construction phase >[2012/09/25 15:57:11.829628, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3606(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2012/09/25 15:57:11.829680, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.829703, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.829725, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.829744, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.829763, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.829781, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.829843, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.829865, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.829883, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.829905, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.829924, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.829964, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.829997, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.830017, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.830035, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.830057, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.830080, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.830101, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.830120, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.830140, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.830161, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.830181, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.830202, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.830221, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.830251, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.830272, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.830290, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.830323, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.830346, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.830367, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.830389, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.830423, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.830448, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.830468, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.830500, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.830529, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.830552, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.830571, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.830589, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.830607, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.830646, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.830667, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.830697, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.830717, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.830737, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.830756, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.830774, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.830792, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.830859, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.830880, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.830899, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.830917, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.830935, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.830975, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.831001, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.831020, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.831039, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.831059, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.831082, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.831101, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.831121, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.831140, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.831161, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.831181, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.831201, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.831220, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.831238, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.831257, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.831274, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.831306, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.831328, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.831349, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.831370, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.831400, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.831424, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.831443, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.831477, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.831497, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.831517, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.831536, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.831554, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.831572, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.831608, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.831629, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.831652, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2012/09/25 15:57:11.831675, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.831697, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.831732, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.831763, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.831810, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.831857, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.831989, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1190(uid_to_sid) > uid_to_sid: winbind failed to find a sid for uid 1000 >[2012/09/25 15:57:11.832010, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.832034, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.832053, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.832071, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.832089, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.832134, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.832154, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.832173, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.832191, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.832208, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.832245, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username ambi, was >[2012/09/25 15:57:11.832267, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain AMBI, was >[2012/09/25 15:57:11.832285, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2012/09/25 15:57:11.832304, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Christian Ambach, was >[2012/09/25 15:57:11.832324, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.832347, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir \\ambi\ambi, was >[2012/09/25 15:57:11.832367, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2012/09/25 15:57:11.832386, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2012/09/25 15:57:11.832406, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/substitute.c:435(automount_server) > Home server: ambi >[2012/09/25 15:57:11.832427, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\ambi\ambi\profile, was >[2012/09/25 15:57:11.832446, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:775(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2012/09/25 15:57:11.832466, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.832486, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.832507, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 3 >[2012/09/25 15:57:11.832526, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.832544, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.832576, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:354(account_policy_get) > account_policy_get: name: password history, val: 0 >[2012/09/25 15:57:11.832598, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2012/09/25 15:57:11.832618, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.832639, 10, pid=18090, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-2119459776-1226821564-2322385355-1000 from rid 1000 >[2012/09/25 15:57:11.832669, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.832693, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.832712, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1045(legacy_uid_to_sid) > LEGACY: uid 1000 -> sid S-1-5-21-2119459776-1226821564-2322385355-1000 >[2012/09/25 15:57:11.832742, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1239(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2012/09/25 15:57:11.832762, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:216(push_sec_ctx) > push_sec_ctx(1000, 1000) : sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.832783, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:406(push_conn_ctx) > push_conn_ctx(3500043775) : conn_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.832809, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2012/09/25 15:57:11.832830, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:11.832848, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:11.832884, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:424(pop_sec_ctx) > pop_sec_ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:11.832905, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/passdb/lookup_sid.c:1075(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2012/09/25 15:57:11.832926, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2740(canonicalise_acl) > canonicalise_acl: Default ace entries before arrange : >[2012/09/25 15:57:11.832945, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.832967, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.832999, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.833034, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.833072, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:2753(canonicalise_acl) > canon_ace index 4. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.833111, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:847(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-3-0 uid 1000 (ambi) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-0 gid 0 (root) SMB_ACL_GROUP ace_flags = 0x0 perms rwx > canon_ace index 2. Type = allow SID = S-1-3-1 gid 0 (root) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms rwx > canon_ace index 3. Type = allow SID = S-1-5-21-2119459776-1226821564-2322385355-1000 uid 1000 (ambi) SMB_ACL_USER ace_flags = 0x0 perms rwx > canon_ace index 4. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms rwx >[2012/09/25 15:57:11.833228, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833248, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833267, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833286, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833304, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833323, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833342, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833360, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833379, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833397, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:1130(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2012/09/25 15:57:11.833422, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 8 onto ACE 0. >[2012/09/25 15:57:11.833441, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 6 onto ACE 1. >[2012/09/25 15:57:11.833460, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=acls] ../source3/smbd/posix_acls.c:3239(merge_default_aces) > merge_default_aces: Merging ACE 7 onto ACE 4. >[2012/09/25 15:57:11.833493, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/access_check.c:188(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x1f01ff, remaining = 0x1f01ff >[2012/09/25 15:57:11.833520, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: . >[2012/09/25 15:57:11.833543, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.833564, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.833606, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.833627, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000b (11) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.826296 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000083186b32 (2199415602) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.835813, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:1072(smbd_smb2_create_send) > smbd_smb2_create_send: . - fnum 4079613021 >[2012/09/25 15:57:11.835939, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[88] dyn[yes:88] at ../source3/smbd/smb2_create.c:369 >[2012/09/25 15:57:11.836005, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2465(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[5] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 56 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 32 > req->in.vector[8].iov_len = 8 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 32 > req->in.vector[12].iov_len = 2 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 88 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 0 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2012/09/25 15:57:11.836392, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_FIND] mid = 12 >[2012/09/25 15:57:11.836430, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.836466, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:93(smbd_smb2_request_process_find) > smbd_smb2_request_find_done: in_output_buffer_length = 65536 >[2012/09/25 15:57:11.836495, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:237(smbd_smb2_find_send) > smbd_smb2_find_send: . - fnum 4079613021 >[2012/09/25 15:57:11.836523, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1774(smbd_smb2_request_verify_creditcharge) > mid 12, CreditCharge: 1, NeededCharge: 1 >[2012/09/25 15:57:11.836560, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:492(dptr_create) > dptr_create dir=. >[2012/09/25 15:57:11.836605, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:665(dptr_create) > creating new dirptr 0 for path ., expect_close = 0 >[2012/09/25 15:57:11.836636, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:372(smbd_smb2_find_send) > smbd_smb2_find_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 65528 >[2012/09/25 15:57:11.836697, 6, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1066(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x884b50 now at offset 0 >[2012/09/25 15:57:11.836754, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: ./. >[2012/09/25 15:57:11.836784, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.836822, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.836872, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.836902, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000b (11) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.826296 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000083186b32 (2199415602) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.837961, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1138(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found ./. fname=. (.) >[2012/09/25 15:57:11.837995, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:1637(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65528 >[2012/09/25 15:57:11.838018, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:2013(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2012/09/25 15:57:11.838064, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/lib/xattr_tdb.c:321(xattr_tdb_listattr) > xattr_tdb_fetch_attrs failed: NT_STATUS_INTERNAL_DB_CORRUPTION >[2012/09/25 15:57:11.838101, 6, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1066(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x884b50 now at offset 2147483648 >[2012/09/25 15:57:11.838129, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: ./.. >[2012/09/25 15:57:11.838150, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:11.838169, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:11.838192, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:408(fetch_share_mode_unlocked) > Could not fetch share entry >[2012/09/25 15:57:11.838212, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1138(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found ./.. fname=.. (..) >[2012/09/25 15:57:11.838233, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:1637(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65416 >[2012/09/25 15:57:11.838251, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:2013(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2012/09/25 15:57:11.838276, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/lib/xattr_tdb.c:321(xattr_tdb_listattr) > xattr_tdb_fetch_attrs failed: NT_STATUS_INTERNAL_DB_CORRUPTION >[2012/09/25 15:57:11.838318, 6, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1066(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x884b50 now at offset 3913212332295099509 >[2012/09/25 15:57:11.838346, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: ./test.txt >[2012/09/25 15:57:11.838366, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning a >[2012/09/25 15:57:11.838385, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning a >[2012/09/25 15:57:11.838423, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.838445, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : 'test.txt' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000001 (1) > share_modes: ARRAY(1) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > op_mid : 0x0000000000000004 (4) > op_type : 0x0002 (2) > access_mask : 0x00120089 (1179785) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:50 PM 2012 PDT.484785 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000055520ced (1431440621) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x719d963b (1906153019) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:56:50 PM 2012 PDT.488813374 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.838884, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1138(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found ./test.txt fname=test.txt (test.txt) >[2012/09/25 15:57:11.838920, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:1637(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65304 >[2012/09/25 15:57:11.838947, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:2013(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2012/09/25 15:57:11.838986, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/lib/xattr_tdb.c:321(xattr_tdb_listattr) > xattr_tdb_fetch_attrs failed: NT_STATUS_INTERNAL_DB_CORRUPTION >[2012/09/25 15:57:11.839022, 6, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1066(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x884b50 now at offset 9223372036854775807 >[2012/09/25 15:57:11.839065, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: ./b2f9e69f-7a5e-435a-921a-472419c3ab5ereadsource.txt >[2012/09/25 15:57:11.839100, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning a >[2012/09/25 15:57:11.839132, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning a >[2012/09/25 15:57:11.839163, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:408(fetch_share_mode_unlocked) > Could not fetch share entry >[2012/09/25 15:57:11.839182, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1138(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found ./b2f9e69f-7a5e-435a-921a-472419c3ab5ereadsource.txt fname=b2f9e69f-7a5e-435a-921a-472419c3ab5ereadsource.txt (b2f9e69f-7a5e-435a-921a-472419c3ab5ereadsource.txt) >[2012/09/25 15:57:11.839206, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:1637(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 65184 >[2012/09/25 15:57:11.839224, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/trans2.c:2013(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_ID_BOTH_DIRECTORY_INFO >[2012/09/25 15:57:11.839254, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/lib/xattr_tdb.c:321(xattr_tdb_listattr) > xattr_tdb_fetch_attrs failed: NT_STATUS_INTERNAL_DB_CORRUPTION >[2012/09/25 15:57:11.839290, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/mangle_hash2.c:795(hash2_name_to_8_3) > hash2_name_to_8_3: b2f9e69f-7a5e-435a-921a-472419c3ab5ereadsource.txt -> 57D58D35 -> BODCN5~H.TXT (cache=1) >[2012/09/25 15:57:11.839317, 6, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1066(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x884b50 now at offset -1 >[2012/09/25 15:57:11.839345, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:183(smbd_smb2_request_find_done) > smbd_smb2_request_find_done: out_output_buffer.length = 548 >[2012/09/25 15:57:11.839365, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[5] status[NT_STATUS_OK] body[8] dyn[yes:548] at ../source3/smbd/smb2_find.c:187 >[2012/09/25 15:57:11.839389, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2465(smbd_smb2_request_dispatch_immediate) > smbd_smb2_request_dispatch_immediate: idx[9] of 13 vectors > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 56 > req->in.vector[5].iov_len = 0 > req->in.vector[6].iov_len = 64 > req->in.vector[7].iov_len = 32 > req->in.vector[8].iov_len = 8 > req->in.vector[9].iov_len = 0 > req->in.vector[10].iov_len = 64 > req->in.vector[11].iov_len = 32 > req->in.vector[12].iov_len = 2 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 88 > req->out.vector[4].iov_len = 88 > req->out.vector[5].iov_len = 0 > req->out.vector[6].iov_len = 64 > req->out.vector[7].iov_len = 8 > req->out.vector[8].iov_len = 552 > req->out.vector[9].iov_len = 0 > req->out.vector[10].iov_len = 64 > req->out.vector[11].iov_len = 8 > req->out.vector[12].iov_len = 0 >[2012/09/25 15:57:11.839576, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_FIND] mid = 13 >[2012/09/25 15:57:11.839603, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.839624, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:93(smbd_smb2_request_process_find) > smbd_smb2_request_find_done: in_output_buffer_length = 128 >[2012/09/25 15:57:11.839644, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:237(smbd_smb2_find_send) > smbd_smb2_find_send: . - fnum 4079613021 >[2012/09/25 15:57:11.839666, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1774(smbd_smb2_request_verify_creditcharge) > mid 13, CreditCharge: 1, NeededCharge: 1 >[2012/09/25 15:57:11.839691, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_find.c:372(smbd_smb2_find_send) > smbd_smb2_find_send: dirpath=<.> dontdescend=<>, in_output_buffer_length = 120 >[2012/09/25 15:57:11.839719, 6, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dir.c:1066(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x884b50 now at offset -1 >[2012/09/25 15:57:11.839744, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2622(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: idx[9] status[STATUS_NO_MORE_FILES] || at ../source3/smbd/smb2_find.c:154 >[2012/09/25 15:57:11.839766, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[9] status[STATUS_NO_MORE_FILES] body[8] dyn[yes:1] at ../source3/smbd/smb2_server.c:2652 >[2012/09/25 15:57:11.839786, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 484/512, total granted/max/low/range 29/8192/14/29 >[2012/09/25 15:57:11.839815, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 483/512, total granted/max/low/range 30/8192/14/30 >[2012/09/25 15:57:11.839836, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/14/31 >[2012/09/25 15:57:11.840498, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:11.840542, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 14 (position 14) from bitmap >[2012/09/25 15:57:11.840566, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 14 >[2012/09/25 15:57:11.840591, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:11.840618, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:450(smbd_smb2_create_send) > smbd_smb2_create: name[test.txt] >[2012/09/25 15:57:11.840643, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:807(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2012/09/25 15:57:11.840665, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:258(unix_convert) > unix_convert called on file "test.txt" >[2012/09/25 15:57:11.840693, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [TEST.TXT] >[2012/09/25 15:57:11.840715, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:421(unix_convert) > unix_convert begin: name = test.txt, dirpath = , start = test.txt >[2012/09/25 15:57:11.840742, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/statcache.c:143(stat_cache_add) > stat_cache_add: Added entry (8a72c0:size 8) TEST.TXT -> test.txt >[2012/09/25 15:57:11.840762, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:444(unix_convert) > conversion of base_name finished test.txt -> test.txt >[2012/09/25 15:57:11.840783, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1118(check_reduced_name) > check_reduced_name [test.txt] [/data/samba/shares/share1] >[2012/09/25 15:57:11.840815, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1178(check_reduced_name) > check_reduced_name realpath [test.txt] -> [/data/samba/shares/share1/test.txt] >[2012/09/25 15:57:11.840841, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1248(check_reduced_name) > check_reduced_name: test.txt reduced to /data/samba/shares/share1/test.txt >[2012/09/25 15:57:11.840863, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4026(create_file_default) > create_file: access_mask = 0x10080 file_attributes = 0x0, share_access = 0x4, create_disposition = 0x1 create_options = 0x1040 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = test.txt >[2012/09/25 15:57:11.840886, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3553(create_file_unixpath) > create_file_unixpath: access_mask = 0x10080 file_attributes = 0x0, share_access = 0x4, create_disposition = 0x1 create_options = 0x1040 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = test.txt >[2012/09/25 15:57:11.840914, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.840934, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.840955, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key A36AB64D >[2012/09/25 15:57:11.840979, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x88ced0 >[2012/09/25 15:57:11.841020, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:57:11.841035, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key 'A36AB64D' stored >[2012/09/25 15:57:11.841055, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xa36ab64d (2741679693) > open_persistent_id : 0x00000000a36ab64d (2741679693) > open_volatile_id : 0x0000000098410a5d (2554399325) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 >[2012/09/25 15:57:11.841276, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key A36AB64D >[2012/09/25 15:57:11.841297, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.841320, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.841340, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:862(smbXsrv_open_create) >[2012/09/25 15:57:11.841351, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:870(smbXsrv_open_create) > smbXsrv_open_create: global_id (0xa36ab64d) stored >[2012/09/25 15:57:11.841370, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x98410a5d (2554399325) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0xa36ab64d (2741679693) > open_persistent_id : 0x00000000a36ab64d (2741679693) > open_volatile_id : 0x0000000098410a5d (2554399325) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:12 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:12 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:11.841686, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:126(file_new) > allocated file structure fnum 2554399325 (3 used) >[2012/09/25 15:57:11.841709, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:700(file_name_hash) > file_name_hash: /data/samba/shares/share1/test.txt hash 0x719d963b >[2012/09/25 15:57:11.841730, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:160(unix_mode) > unix_mode(test.txt) returning 0744 >[2012/09/25 15:57:11.841750, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:1958(open_file_ntcreate) > open_file_ntcreate: fname=test.txt, dos_attrs=0x0 access_mask=0x10080 share_access=0x4 create_disposition = 0x1 create_options=0x1040 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2012/09/25 15:57:11.841771, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: test.txt >[2012/09/25 15:57:11.841798, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning a >[2012/09/25 15:57:11.841826, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning a >[2012/09/25 15:57:11.841847, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2117(open_file_ntcreate) > open_file_ntcreate: fname=test.txt, after mapping access_mask=0x10080 >[2012/09/25 15:57:11.841871, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.841890, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.841912, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000004283 >[2012/09/25 15:57:11.841934, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x898c40 >[2012/09/25 15:57:11.841965, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:11.841985, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : 'test.txt' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000001 (1) > share_modes: ARRAY(1) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > op_mid : 0x0000000000000004 (4) > op_type : 0x0002 (2) > access_mask : 0x00120089 (1179785) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:50 PM 2012 PDT.484785 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000055520ced (1431440621) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x719d963b (1906153019) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:56:50 PM 2012 PDT.488813374 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:11.842345, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:655(share_mode_stale_pid) > PID 18006 (index 0 out of 1) still exists >[2012/09/25 15:57:11.842373, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:655(share_mode_stale_pid) > PID 18006 (index 0 out of 1) still exists >[2012/09/25 15:57:11.842397, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:1175(send_break_message) > Sending break request to PID 18006 >[2012/09/25 15:57:11.842461, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) > messaging_tdb_store: >[2012/09/25 15:57:11.842486, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > array: struct messaging_array > num_messages : 0x00000001 (1) > messages: ARRAY(1) > messages: struct messaging_rec > msg_version : 0x00000002 (2) > msg_type : MSG_SMB_BREAK_REQUEST (774) > dest: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > src: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > buf : DATA_BLOB length=76 > [0000] 56 46 00 00 0E 00 00 00 00 00 00 00 02 00 89 00 VF...... ........ > [0010] 12 00 00 00 00 00 00 00 00 00 B2 36 62 50 B1 65 ........ ...6bP.e > [0020] 07 00 04 FD 00 00 00 00 00 00 42 83 68 00 00 00 ........ ..B.h... > [0030] 00 00 00 00 00 00 00 00 00 00 ED 0C 52 55 E8 03 ........ ....RU.. > [0040] 00 00 00 00 3B 96 9D 71 FF FF FF FF ....;..q .... >[2012/09/25 15:57:11.842822, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:1479(defer_open) > defer_open_sharing_error: time [1348613831.840907] adding deferred open entry for mid 14 >[2012/09/25 15:57:11.842850, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:1458(push_deferred_open_message_smb2) > push_deferred_open_message_smb2: timeout at 2012/09/25 15:58:11.840907 >[2012/09/25 15:57:11.842880, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:11.842899, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : 'test.txt' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > op_mid : 0x000000000000000e (14) > op_type : 0x0002 (2) > access_mask : 0x00120089 (1179785) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:50 PM 2012 PDT.484785 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000055520ced (1431440621) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x719d963b (1906153019) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000e (14) > op_type : 0x0020 (32) > access_mask : 0x00000000 (0) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.840907 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000000000000 (0) > uid : 0xffffffff (4294967295) > flags : 0x0000 (0) > name_hash : 0x00000000 (0) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:56:50 PM 2012 PDT.488813374 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:11.843403, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000004283 >[2012/09/25 15:57:11.843425, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:11.843444, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.843466, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.843485, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:11.843506, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key A36AB64D >[2012/09/25 15:57:11.843527, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x89bdf0 >[2012/09/25 15:57:11.843551, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key A36AB64D >[2012/09/25 15:57:11.843571, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:11.843590, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:11.843613, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:526(file_free) > freed files structure 2554399325 (2 used) >[2012/09/25 15:57:11.843638, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3850(create_file_unixpath) > create_file_unixpath: NT_STATUS_SHARING_VIOLATION >[2012/09/25 15:57:11.843666, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4123(create_file_default) > create_file: NT_STATUS_SHARING_VIOLATION >[2012/09/25 15:57:11.843689, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:1212(open_was_deferred_smb2) > open_was_deferred_smb2: mid = 14 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 56 > req->in.vector[4].iov_len = 120 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2012/09/25 15:57:13.845756, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "smbd_smb2_request_pending_timer" 0x8a7430 >[2012/09/25 15:57:13.846035, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1415(smbd_smb2_request_pending_timer) > smbd_smb2_request_pending_queue: opcode[SMB2_OP_CREATE] mid 14 going async >[2012/09/25 15:57:13.846191, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/15/31 >[2012/09/25 15:57:13.846335, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1510(smbd_smb2_request_pending_timer) > state->vector[0/5].iov_len = 4 > state->vector[1/5].iov_len = 0 > state->vector[2/5].iov_len = 64 > state->vector[3/5].iov_len = 8 > state->vector[4/5].iov_len = 1 >[2012/09/25 15:57:22.342262, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "tevent_req_timedout" 0x87ad40 >[2012/09/25 15:57:22.367286, 2, pid=17877, effective(0, 0), real(0, 0)] ../source3/smbd/server.c:435(remove_child_pid) > Could not find child 18150 -- ignoring >[2012/09/25 15:57:22.428904, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.672586, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:22.672746, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.672862, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/printer_list.tdb 2:<none> 3:<none> >[2012/09/25 15:57:22.672964, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 5052494E5445524C4953 >[2012/09/25 15:57:22.673045, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x884a00 >[2012/09/25 15:57:22.673139, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 5052494E5445524C4953 >[2012/09/25 15:57:22.673241, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.673321, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:22.673420, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.673525, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/printer_list.tdb 2:<none> 3:<none> >[2012/09/25 15:57:22.673609, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 5052494E5445524C4953 >[2012/09/25 15:57:22.673723, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x885610 >[2012/09/25 15:57:22.673827, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 5052494E5445524C4953 >[2012/09/25 15:57:22.673917, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.673993, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:22.674089, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.674171, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/printer_list.tdb 2:<none> 3:<none> >[2012/09/25 15:57:22.674253, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 5052494E5445524C4953 >[2012/09/25 15:57:22.674339, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x884a70 >[2012/09/25 15:57:22.674428, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 5052494E5445524C4953 >[2012/09/25 15:57:22.674508, 5, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/printer_list.tdb >[2012/09/25 15:57:22.674568, 10, pid=17878, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:22.676103, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) > messaging_tdb_store: >[2012/09/25 15:57:22.676190, 1, pid=17878, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > array: struct messaging_array > num_messages : 0x00000001 (1) > messages: ARRAY(1) > messages: struct messaging_rec > msg_version : 0x00000002 (2) > msg_type : MSG_PRINTER_PCAP (519) > dest: struct server_id > pid : 0x00000000000045d5 (17877) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > src: struct server_id > pid : 0x00000000000045d6 (17878) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > buf : DATA_BLOB length=0 >[2012/09/25 15:57:22.676750, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) > messaging_tdb_store: >[2012/09/25 15:57:22.676839, 1, pid=17878, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > array: struct messaging_array > num_messages : 0x00000001 (1) >[2012/09/25 15:57:22.676843, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) > messages: ARRAY(1) > messages: struct messaging_rec > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] > msg_version : 0x00000002 (2) > msg_type : MSG_PRINTER_PCAP (519) > dest: struct server_id >[2012/09/25 15:57:22.677028, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > message_dispatch: received_messages = 1 > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > src: struct server_id > pid : 0x00000000000045d6 (17878) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > buf : DATA_BLOB length=0 >[2012/09/25 15:57:22.677409, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) >[2012/09/25 15:57:22.677442, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:242(messaging_tdb_fetch) > messaging_tdb_store: > messaging_tdb_fetch: >[2012/09/25 15:57:22.677517, 1, pid=17878, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) >[2012/09/25 15:57:22.677534, 1, pid=17877, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > array: struct messaging_array > result: struct messaging_array > num_messages : 0x00000001 (1) > num_messages : 0x00000001 (1) > messages: ARRAY(1) > messages: ARRAY(1) > messages: struct messaging_rec > messages: struct messaging_rec > msg_version : 0x00000002 (2) > msg_version : 0x00000002 (2) > msg_type : MSG_PRINTER_PCAP (519) > msg_type : MSG_PRINTER_PCAP (519) > dest: struct server_id > dest: struct server_id > pid : 0x00000000000045d5 (17877) > pid : 0x00000000000045d6 (17878) > task_id : 0x00000000 (0) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > vnn : 0xffffffff (4294967295) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > src: struct server_id > unique_id : 0x7c546ae340506f53 (8958903083015892819) > pid : 0x00000000000045d6 (17878) > src: struct server_id > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > pid : 0x00000000000045d6 (17878) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > task_id : 0x00000000 (0) > buf : DATA_BLOB length=0 > vnn : 0xffffffff (4294967295) > unique_id : 0x7c546ae340506f53 (8958903083015892819) >[2012/09/25 15:57:22.678372, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/smbd/server.c:122(smb_pcap_updated) > Got message saying pcap was updated. Reloading. > buf : DATA_BLOB length=0 >[2012/09/25 15:57:22.678482, 4, pid=17877, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:22.678568, 5, pid=17877, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:22.678607, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) >[2012/09/25 15:57:22.678646, 5, pid=17877, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > messaging_tdb_store: > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:22.678733, 1, pid=17878, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > array: struct messaging_array >[2012/09/25 15:57:22.678787, 5, pid=17877, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > num_messages : 0x00000001 (1) > change_to_root_user: now uid=(0,0) gid=(0,0) > messages: ARRAY(1) > messages: struct messaging_rec > msg_version : 0x00000002 (2) >[2012/09/25 15:57:22.679058, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > msg_type : MSG_PRINTER_PCAP (519) > lp_servicenumber: couldn't find printers > dest: struct server_id >[2012/09/25 15:57:22.679157, 5, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) > pid : 0x0000000000004656 (18006) > process_registry_service: service name printers > task_id : 0x00000000 (0) >[2012/09/25 15:57:22.679257, 7, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > vnn : 0xffffffff (4294967295) > regkey_open_onelevel: name = [printers] > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) >[2012/09/25 15:57:22.679357, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > regdb_open: incrementing refcount (2->3) > src: struct server_id >[2012/09/25 15:57:22.679446, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > pid : 0x00000000000045d6 (17878) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] > task_id : 0x00000000 (0) >[2012/09/25 15:57:22.679526, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.679613, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2012/09/25 15:57:22.679687, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.679796, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found > vnn : 0xffffffff (4294967295) >[2012/09/25 15:57:22.679946, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > regdb_close: decrementing refcount (3->2) > buf : DATA_BLOB length=0 >[2012/09/25 15:57:22.680015, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) >[2012/09/25 15:57:22.680105, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > change_to_root_user: now uid=(0,0) gid=(0,0) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.680198, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) > messaging_tdb_store: >[2012/09/25 15:57:22.680282, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.680335, 1, pid=17878, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) >[2012/09/25 15:57:22.680351, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > array: struct messaging_array > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.680430, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > num_messages : 0x00000001 (1) >[2012/09/25 15:57:22.680477, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) > lp_servicenumber: couldn't find printers > messages: ARRAY(1) > process_registry_service: service name printers > messages: struct messaging_rec >[2012/09/25 15:57:22.680561, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/smbd/server_reload.c:71(delete_and_reload_printers) > msg_version : 0x00000002 (2) > reloading printer services from pcap cache >[2012/09/25 15:57:22.680630, 7, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > msg_type : MSG_PRINTER_PCAP (519) > regkey_open_onelevel: name = [printers] > dest: struct server_id > pid : 0x00000000000046aa (18090) >[2012/09/25 15:57:22.680782, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > task_id : 0x00000000 (0) > regdb_open: incrementing refcount (2->3) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) >[2012/09/25 15:57:22.680931, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.680960, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > lp_servicenumber: couldn't find printers > src: struct server_id > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.681045, 5, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) > pid : 0x00000000000045d6 (17878) > process_registry_service: service name printers > task_id : 0x00000000 (0) >[2012/09/25 15:57:22.681090, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) >[2012/09/25 15:57:22.681129, 7, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > vnn : 0xffffffff (4294967295) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] > regkey_open_onelevel: name = [printers] > unique_id : 0x7c546ae340506f53 (8958903083015892819) >[2012/09/25 15:57:22.681222, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) >[2012/09/25 15:57:22.681228, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) > regdb_open: incrementing refcount (2->3) > buf : DATA_BLOB length=0 > pathtree_find: Exit >[2012/09/25 15:57:22.681315, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.681355, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) >[2012/09/25 15:57:22.681408, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.681427, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) >[2012/09/25 15:57:22.681493, 10, pid=17877, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] > pathtree_find: Exit >[2012/09/25 15:57:22.681478, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) >[2012/09/25 15:57:22.681569, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) >[2012/09/25 15:57:22.681558, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) >[2012/09/25 15:57:22.681553, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] > message_dispatch: received_messages = 1 > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.681668, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) >[2012/09/25 15:57:22.681707, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) >[2012/09/25 15:57:22.681701, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.681720, 10, pid=17878, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:242(messaging_tdb_fetch) > regdb_close: decrementing refcount (3->2) > message_dispatch: received_messages = 1 > messaging_tdb_fetch: >[2012/09/25 15:57:22.681826, 10, pid=17877, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > regdb_close: decrementing refcount (3->2) >[2012/09/25 15:57:22.681887, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.681886, 1, pid=17878, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) >[2012/09/25 15:57:22.681972, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.682014, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > result: struct messaging_array >[2012/09/25 15:57:22.682018, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/messages_local.c:242(messaging_tdb_fetch) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.682074, 7, pid=17877, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > num_messages : 0x00000001 (1) > lp_servicenumber: couldn't find printers > messaging_tdb_fetch: >[2012/09/25 15:57:22.682130, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > messages: ARRAY(1) > lp_servicenumber: couldn't find printers > messages: struct messaging_rec >[2012/09/25 15:57:22.682173, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) >[2012/09/25 15:57:22.682207, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/server_reload.c:71(delete_and_reload_printers) > msg_version : 0x00000002 (2) > result: struct messaging_array > reloading printer services from pcap cache > msg_type : MSG_PRINTER_PCAP (519) > num_messages : 0x00000001 (1) > dest: struct server_id > messages: ARRAY(1) > messages: struct messaging_rec > msg_version : 0x00000002 (2) >[2012/09/25 15:57:22.682393, 5, pid=18006, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > pid : 0x00000000000045d6 (17878) > msg_type : MSG_PRINTER_PCAP (519) >[2012/09/25 15:57:22.682448, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > dest: struct server_id > change_to_root_user: now uid=(0,0) gid=(0,0) > task_id : 0x00000000 (0) > lp_servicenumber: couldn't find printers > pid : 0x00000000000046aa (18090) > vnn : 0xffffffff (4294967295) >[2012/09/25 15:57:22.682571, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) > task_id : 0x00000000 (0) > process_registry_service: service name printers > vnn : 0xffffffff (4294967295) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) >[2012/09/25 15:57:22.682658, 7, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > src: struct server_id > src: struct server_id > regkey_open_onelevel: name = [printers] > pid : 0x00000000000045d6 (17878) > pid : 0x00000000000045d6 (17878) >[2012/09/25 15:57:22.682715, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.682741, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > task_id : 0x00000000 (0) > regdb_open: incrementing refcount (2->3) > unique_id : 0x7c546ae340506f53 (8958903083015892819) > vnn : 0xffffffff (4294967295) > buf : DATA_BLOB length=0 >[2012/09/25 15:57:22.682901, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > lp_servicenumber: couldn't find printers > unique_id : 0x7c546ae340506f53 (8958903083015892819) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] > buf : DATA_BLOB length=0 >[2012/09/25 15:57:22.682982, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) >[2012/09/25 15:57:22.682968, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/server.c:122(smb_pcap_updated) >[2012/09/25 15:57:22.682978, 5, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] > Got message saying pcap was updated. Reloading. > process_registry_service: service name printers >[2012/09/25 15:57:22.683068, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) >[2012/09/25 15:57:22.683077, 4, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > pathtree_find: Exit >[2012/09/25 15:57:22.683085, 6, pid=17878, effective(0, 0), real(0, 0)] ../source3/printing/queue_process.c:172(bq_sig_chld_handler) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:22.683148, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) > Bq child process 18152 terminated with 0 >[2012/09/25 15:57:22.683144, 7, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) >[2012/09/25 15:57:22.683177, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../libcli/security/security_token.c:53(security_token_debug) > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] > Security token: (NULL) > regkey_open_onelevel: name = [printers] >[2012/09/25 15:57:22.683257, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) >[2012/09/25 15:57:22.683257, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > UNIX token of user 0 > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.683291, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > Primary group is 0 and contains 0 supplementary groups > regdb_open: incrementing refcount (2->3) >[2012/09/25 15:57:22.683346, 10, pid=17942, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > regdb_close: decrementing refcount (3->2) >[2012/09/25 15:57:22.683387, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) >[2012/09/25 15:57:22.683400, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > change_to_root_user: now uid=(0,0) gid=(0,0) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.683439, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.683480, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.683529, 7, pid=17942, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.683562, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) >[2012/09/25 15:57:22.683558, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > pathtree_find: Exit > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.683613, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] >[2012/09/25 15:57:22.683654, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) >[2012/09/25 15:57:22.683642, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) > process_registry_service: service name printers >[2012/09/25 15:57:22.683690, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] > message_dispatch: received_messages = 1 >[2012/09/25 15:57:22.683750, 7, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > regkey_open_onelevel: name = [printers] >[2012/09/25 15:57:22.683793, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.683859, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > regdb_open: incrementing refcount (2->3) >[2012/09/25 15:57:22.683933, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > regdb_close: decrementing refcount (3->2) >[2012/09/25 15:57:22.683970, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.684041, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.684051, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) > lp_servicenumber: couldn't find printers > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.684133, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) >[2012/09/25 15:57:22.684134, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > pathtree_find: Exit > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.684208, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) >[2012/09/25 15:57:22.684231, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.684308, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/smbd/server_reload.c:71(delete_and_reload_printers) >[2012/09/25 15:57:22.684324, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > reloading printer services from pcap cache > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.684410, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > regdb_close: decrementing refcount (3->2) >[2012/09/25 15:57:22.684507, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.684511, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.684597, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.684611, 5, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) > lp_servicenumber: couldn't find printers > process_registry_service: service name printers >[2012/09/25 15:57:22.684685, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.684693, 7, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > lp_servicenumber: couldn't find printers > regkey_open_onelevel: name = [printers] >[2012/09/25 15:57:22.684760, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/server_reload.c:71(delete_and_reload_printers) >[2012/09/25 15:57:22.684772, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > reloading printer services from pcap cache > regdb_open: incrementing refcount (2->3) >[2012/09/25 15:57:22.684880, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.684956, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.684977, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.685036, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) > lp_servicenumber: couldn't find printers > pathtree_find: Exit >[2012/09/25 15:57:22.685091, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:2449(process_registry_service) >[2012/09/25 15:57:22.685111, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) > process_registry_service: service name printers > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.685172, 7, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_api.c:142(regkey_open_onelevel) > regkey_open_onelevel: name = [printers] >[2012/09/25 15:57:22.685208, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.685249, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:846(regdb_open) > regdb_open: incrementing refcount (2->3) >[2012/09/25 15:57:22.685290, 10, pid=18006, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > regdb_close: decrementing refcount (3->2) >[2012/09/25 15:57:22.685333, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:125(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.685383, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.685407, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:367(pathtree_find) > lp_servicenumber: couldn't find printers > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.685473, 7, pid=18006, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) >[2012/09/25 15:57:22.685486, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/adt_tree.c:440(pathtree_find) > lp_servicenumber: couldn't find printers > pathtree_find: Exit >[2012/09/25 15:57:22.685559, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_cachehook.c:130(reghook_cache_find) >[2012/09/25 15:57:22.685558, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] > reghook_cache_find: found ops 0x7f63f0f217e0 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2012/09/25 15:57:22.685643, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > message_dispatch: received_messages = 1 >[2012/09/25 15:57:22.685715, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:1725(regdb_fetch_keys_internal) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2012/09/25 15:57:22.685820, 10, pid=18090, effective(0, 0), real(0, 0), class=registry] ../source3/registry/reg_backend_db.c:883(regdb_close) > regdb_close: decrementing refcount (3->2) >[2012/09/25 15:57:22.685921, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.686010, 7, pid=18090, effective(0, 0), real(0, 0)] ../source3/param/loadparm.c:5102(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2012/09/25 15:57:22.686095, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] >[2012/09/25 15:57:22.686171, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > message_dispatch: received_messages = 1 >[2012/09/25 15:57:33.139313, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "smbd_idle_event_handler" 0x876db0 >[2012/09/25 15:57:33.139404, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/events.c:479(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(deadtime) (nil) called >[2012/09/25 15:57:33.139465, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/events.c:490(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(deadtime) (nil) rescheduled >[2012/09/25 15:57:33.139511, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "smbd_idle_event_handler" 0x880ea0 >[2012/09/25 15:57:33.139549, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/events.c:479(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(housekeeping) (nil) called >[2012/09/25 15:57:33.139583, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/process.c:2621(housekeeping_fn) > housekeeping >[2012/09/25 15:57:33.139619, 4, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:33.139656, 5, pid=17942, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:33.139690, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:33.139746, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:33.139797, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/lib/events.c:490(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(housekeeping) (nil) rescheduled >[2012/09/25 15:57:41.845653, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "oplock_timeout_handler" 0x88eee0 >[2012/09/25 15:57:41.845873, 0, pid=18006, effective(0, 0), real(0, 0), class=locking] ../source3/smbd/oplock.c:333(oplock_timeout_handler) > Oplock break failed for file test.txt -- replying anyway >[2012/09/25 15:57:41.846124, 5, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:41.846221, 10, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:41.846336, 10, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000004283 >[2012/09/25 15:57:41.846584, 10, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8903e0 >[2012/09/25 15:57:41.846726, 10, pid=18006, effective(0, 0), real(0, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:41.846837, 1, pid=18006, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : 'test.txt' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > op_mid : 0x000000000000000e (14) > op_type : 0x0002 (2) > access_mask : 0x00120089 (1179785) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:50 PM 2012 PDT.484785 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000055520ced (1431440621) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x719d963b (1906153019) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000e (14) > op_type : 0x0020 (32) > access_mask : 0x00000000 (0) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.840907 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000000000000 (0) > uid : 0xffffffff (4294967295) > flags : 0x0000 (0) > name_hash : 0x00000000 (0) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:56:50 PM 2012 PDT.488813374 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:41.849537, 10, pid=18006, effective(0, 0), real(0, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:41.849622, 1, pid=18006, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : 'test.txt' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > op_mid : 0x000000000000000e (14) > op_type : 0x0010 (16) > access_mask : 0x00120089 (1179785) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:50 PM 2012 PDT.484785 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000055520ced (1431440621) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x719d963b (1906153019) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000e (14) > op_type : 0x0020 (32) > access_mask : 0x00000000 (0) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.840907 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000000000000 (0) > uid : 0xffffffff (4294967295) > flags : 0x0000 (0) > name_hash : 0x00000000 (0) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:56:50 PM 2012 PDT.488813374 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:41.852022, 10, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000004283 >[2012/09/25 15:57:41.852143, 5, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:41.852224, 10, pid=18006, effective(0, 0), real(0, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:41.852455, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:282(messaging_tdb_store) > messaging_tdb_store: >[2012/09/25 15:57:41.852549, 1, pid=18006, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > array: struct messaging_array > num_messages : 0x00000001 (1) > messages: ARRAY(1) > messages: struct messaging_rec > msg_version : 0x00000002 (2) > msg_type : MSG_SMB_BREAK_RESPONSE (775) > dest: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > src: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > buf : DATA_BLOB length=76 > [0000] AA 46 00 00 0E 00 00 00 00 00 00 00 02 00 89 00 .F...... ........ > [0010] 12 00 00 00 00 00 00 00 00 00 B2 36 62 50 B1 65 ........ ...6bP.e > [0020] 07 00 04 FD 00 00 00 00 00 00 42 83 68 00 00 00 ........ ..B.h... > [0030] 00 00 00 00 00 00 00 00 00 00 ED 0C 52 55 E8 03 ........ ....RU.. > [0040] 00 00 00 00 3B 96 9D 71 FF FF FF FF ....;..q .... >[2012/09/25 15:57:41.853855, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] >[2012/09/25 15:57:41.854012, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > message_dispatch: received_messages = 1 >[2012/09/25 15:57:41.854135, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:242(messaging_tdb_fetch) > messaging_tdb_fetch: >[2012/09/25 15:57:41.854218, 1, pid=18090, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > result: struct messaging_array > num_messages : 0x00000001 (1) > messages: ARRAY(1) > messages: struct messaging_rec > msg_version : 0x00000002 (2) > msg_type : MSG_SMB_BREAK_RESPONSE (775) > dest: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > src: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > buf : DATA_BLOB length=76 > [0000] AA 46 00 00 0E 00 00 00 00 00 00 00 02 00 89 00 .F...... ........ > [0010] 12 00 00 00 00 00 00 00 00 00 B2 36 62 50 B1 65 ........ ...6bP.e > [0020] 07 00 04 FD 00 00 00 00 00 00 42 83 68 00 00 00 ........ ..B.h... > [0030] 00 00 00 00 00 00 00 00 00 00 ED 0C 52 55 E8 03 ........ ....RU.. > [0040] 00 00 00 00 3B 96 9D 71 FF FF FF FF ....;..q .... >[2012/09/25 15:57:41.855247, 10, pid=18090, effective(0, 0), real(0, 0), class=locking] ../source3/smbd/oplock.c:712(process_oplock_break_response) > Got oplock break response from pid 18006: fd04:688342:0/1431440621 mid 14 >[2012/09/25 15:57:41.855361, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_create.c:1330(schedule_deferred_open_message_smb2) > schedule_deferred_open_message_smb2: re-processing mid 14 >[2012/09/25 15:57:41.855449, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:75(messaging_tdb_signal_handler) > messaging_tdb_signal_handler: sig[10] count[1] msgs[1] >[2012/09/25 15:57:41.855524, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/lib/messages_local.c:496(message_dispatch) > message_dispatch: received_messages = 1 >[2012/09/25 15:57:41.855634, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_create.c:1272(smbd_smb2_create_request_dispatch_immediate) > smbd_smb2_create_request_dispatch_immediate: re-dispatching mid 14 >[2012/09/25 15:57:41.855741, 10, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CREATE] mid = 14 >[2012/09/25 15:57:41.855880, 4, pid=18090, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:41.855989, 5, pid=18090, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:57:41.856676, 5, pid=18090, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:57:41.856971, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:274(change_to_user_internal) > Impersonated user: uid=(1000,1000), gid=(0,1000) >[2012/09/25 15:57:41.857084, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:458(smbd_smb2_create_send) > smbd_smb2_create_send: reentrant for file test.txt >[2012/09/25 15:57:41.857180, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_create.c:807(smbd_smb2_create_send) > smbd_smb2_create_send: open execution phase >[2012/09/25 15:57:41.857261, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/filename.c:258(unix_convert) > unix_convert called on file "test.txt" >[2012/09/25 15:57:41.857351, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [TEST.TXT] -> [test.txt] >[2012/09/25 15:57:41.857449, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1118(check_reduced_name) > check_reduced_name [test.txt] [/data/samba/shares/share1] >[2012/09/25 15:57:41.857545, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1178(check_reduced_name) > check_reduced_name realpath [test.txt] -> [/data/samba/shares/share1/test.txt] >[2012/09/25 15:57:41.857626, 3, pid=18090, effective(1000, 1000), real(1000, 0), class=vfs] ../source3/smbd/vfs.c:1248(check_reduced_name) > check_reduced_name: test.txt reduced to /data/samba/shares/share1/test.txt >[2012/09/25 15:57:41.857705, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:4026(create_file_default) > create_file: access_mask = 0x10080 file_attributes = 0x0, share_access = 0x4, create_disposition = 0x1 create_options = 0x1040 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = test.txt >[2012/09/25 15:57:41.857795, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:3553(create_file_unixpath) > create_file_unixpath: access_mask = 0x10080 file_attributes = 0x0, share_access = 0x4, create_disposition = 0x1 create_options = 0x1040 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = test.txt >[2012/09/25 15:57:41.857981, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:41.858090, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:41.858237, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 00A29DA4 >[2012/09/25 15:57:41.858359, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8a0f00 >[2012/09/25 15:57:41.858548, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:695(smbXsrv_open_global_store) >[2012/09/25 15:57:41.858606, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:697(smbXsrv_open_global_store) > smbXsrv_open_global_store: key '00A29DA4' stored >[2012/09/25 15:57:41.858686, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &global_blob: struct smbXsrv_open_globalB > version : SMBXSRV_VERSION_0 (0) > seqnum : 0x00000001 (1) > info : union smbXsrv_open_globalU(case 0) > info0 : * > info0: struct smbXsrv_open_global0 > db_rec : * > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0x00a29da4 (10657188) > open_persistent_id : 0x0000000000a29da4 (10657188) > open_volatile_id : 0x00000000493bba09 (1228651017) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:42 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 >[2012/09/25 15:57:41.859593, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 00A29DA4 >[2012/09/25 15:57:41.859678, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:41.859755, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:41.859857, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:862(smbXsrv_open_create) >[2012/09/25 15:57:41.859905, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smbXsrv_open.c:870(smbXsrv_open_create) > smbXsrv_open_create: global_id (0x00a29da4) stored >[2012/09/25 15:57:41.859978, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > &open_blob: struct smbXsrv_openB > version : SMBXSRV_VERSION_0 (0) > reserved : 0x00000000 (0) > info : union smbXsrv_openU(case 0) > info0 : * > info0: struct smbXsrv_open > table : * > db_rec : NULL > local_id : 0x493bba09 (1228651017) > global : * > global: struct smbXsrv_open_global0 > db_rec : NULL > server_id: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > open_global_id : 0x00a29da4 (10657188) > open_persistent_id : 0x0000000000a29da4 (10657188) > open_volatile_id : 0x00000000493bba09 (1228651017) > open_owner : S-1-5-21-2119459776-1226821564-2322385355-1000 > open_time : Tue Sep 25 03:57:42 PM 2012 PDT > create_guid : 00000000-0000-0000-0000-000000000000 > client_guid : 320710e6-0671-11e2-9400-00155d0f0604 > app_instance_id : 00000000-0000-0000-0000-000000000000 > disconnect_time : NTTIME(0) > durable_timeout_msec : 0x00000000 (0) > durable : 0x00 (0) > backend_cookie : DATA_BLOB length=0 > status : NT_STATUS_OK > idle_time : Tue Sep 25 03:57:42 PM 2012 PDT > compat : NULL >[2012/09/25 15:57:41.861176, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:126(file_new) > allocated file structure fnum 1228651017 (3 used) >[2012/09/25 15:57:41.861269, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:700(file_name_hash) > file_name_hash: /data/samba/shares/share1/test.txt hash 0x719d963b >[2012/09/25 15:57:41.861356, 3, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:160(unix_mode) > unix_mode(test.txt) returning 0744 >[2012/09/25 15:57:41.861434, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:1958(open_file_ntcreate) > open_file_ntcreate: fname=test.txt, dos_attrs=0x0 access_mask=0x10080 share_access=0x4 create_disposition = 0x1 create_options=0x1040 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2012/09/25 15:57:41.861519, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: test.txt >[2012/09/25 15:57:41.861599, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning a >[2012/09/25 15:57:41.861679, 8, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning a >[2012/09/25 15:57:41.861757, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/smbd/open.c:2117(open_file_ntcreate) > open_file_ntcreate: fname=test.txt, after mapping access_mask=0x10080 >[2012/09/25 15:57:41.861876, 5, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:41.861956, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:41.862042, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000004283 >[2012/09/25 15:57:41.862129, 10, pid=18090, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x898d00 >[2012/09/25 15:57:41.862263, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:41.862384, 1, pid=18090, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : 'test.txt' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000002 (2) > share_modes: ARRAY(2) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004656 (18006) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0xe9f07beaea5980e5 (-1589634419577487131) > op_mid : 0x000000000000000e (14) > op_type : 0x0010 (16) > access_mask : 0x00120089 (1179785) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:50 PM 2012 PDT.484785 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000055520ced (1431440621) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0x719d963b (1906153019) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000e (14) > op_type : 0x0020 (32) > access_mask : 0x00000000 (0) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.840907 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x0000000000688342 (6849346) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000000000000 (0) > uid : 0xffffffff (4294967295) > flags : 0x0000 (0) > name_hash : 0x00000000 (0) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:56:50 PM 2012 PDT.488813374 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:41.864568, 10, pid=18090, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0x719d963b >[2012/09/25 15:57:41.864693, 0, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/util.c:810(smb_panic_s3) > PANIC (pid 18090): Got a deferred entry without a request: PANIC: share_mode_entry[1]: pid = 18090, share_access = 0x0, private_options = 0x0, access_mask = 0x0, mid = 0xe, type= 0x20, gen_id = 0, uid = 4294967295, flags = 0, file_id fd04:688342:0, name_hash = 0x0 > >[2012/09/25 15:57:41.866883, 0, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/util.c:921(log_stack_trace) > BACKTRACE: 26 stack frames: > #0 /data/samba/git/samba/bin/shared/libsmbconf.so.0(log_stack_trace+0x24) [0x7f63f0c932f4] > #1 /data/samba/git/samba/bin/shared/libsmbconf.so.0(smb_panic_s3+0x28) [0x7f63f0c93448] > #2 /data/samba/git/samba/bin/shared/libsamba-util.so.0(smb_panic+0x24) [0x7f63f2d7e8e4] > #3 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(+0x190b2d) [0x7f63f23cbb2d] > #4 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(+0x194379) [0x7f63f23cf379] > #5 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(+0x197ca5) [0x7f63f23d2ca5] > #6 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(create_file_default+0x28e) [0x7f63f23d3efe] > #7 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(+0x2cd1e3) [0x7f63f25081e3] > #8 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(smb_vfs_call_create_file+0xba) [0x7f63f23ddaaa] > #9 /data/samba/git/samba/bin/modules/vfs/time_audit.so(+0x78af) [0x7f63dd6e58af] > #10 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(smb_vfs_call_create_file+0xba) [0x7f63f23ddaaa] > #11 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(smbd_smb2_request_process_create+0x205a) [0x7f63f242542a] > #12 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(smbd_smb2_request_dispatch+0x1018) [0x7f63f241b888] > #13 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(+0x1e8125) [0x7f63f2423125] > #14 /data/samba/git/samba/bin/shared/private/libtevent.so.0(tevent_common_loop_immediate+0x122) [0x7f63f0f47822] > #15 /data/samba/git/samba/bin/shared/libsmbconf.so.0(run_events_poll+0x6b) [0x7f63f0cb542b] > #16 /data/samba/git/samba/bin/shared/libsmbconf.so.0(+0x61a09) [0x7f63f0cb5a09] > #17 /data/samba/git/samba/bin/shared/private/libtevent.so.0(_tevent_loop_once+0xc0) [0x7f63f0f46bd0] > #18 /data/samba/git/samba/bin/shared/private/libsmbd_base.so(smbd_process+0xe9d) [0x7f63f23fe64d] > #19 bin/smbd() [0x40c774] > #20 /data/samba/git/samba/bin/shared/libsmbconf.so.0(run_events_poll+0x468) [0x7f63f0cb5828] > #21 /data/samba/git/samba/bin/shared/libsmbconf.so.0(+0x61ab8) [0x7f63f0cb5ab8] > #22 /data/samba/git/samba/bin/shared/private/libtevent.so.0(_tevent_loop_once+0xc0) [0x7f63f0f46bd0] > #23 bin/smbd(main+0x1b09) [0x4073d9] > #24 /lib64/libc.so.6(__libc_start_main+0xf5) [0x31b2221735] > #25 bin/smbd() [0x407cad] >[2012/09/25 15:57:41.950598, 0, pid=18090, effective(1000, 1000), real(1000, 0)] ../source3/lib/util.c:822(smb_panic_s3) > smb_panic(): calling panic action [/bin/sleep 999999999] >[2012/09/25 15:57:47.213512, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:47.213717, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CANCEL] mid = 0 >[2012/09/25 15:57:47.213861, 4, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:47.213954, 5, pid=17942, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:47.214080, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:47.214214, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:47.214318, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1620(smbd_smb2_request_process_cancel) > smbd_smb2_request_process_cancel: attempting to cancel opcode[SMB2_OP_NOTIFY] mid 24 >[2012/09/25 15:57:47.214492, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2622(smbd_smb2_request_error_ex) > smbd_smb2_request_error_ex: idx[1] status[NT_STATUS_CANCELLED] || at ../source3/smbd/smb2_notify.c:120 >[2012/09/25 15:57:47.214592, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_CANCELLED] body[8] dyn[yes:1] at ../source3/smbd/smb2_server.c:2652 >[2012/09/25 15:57:47.214700, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 0, current possible/max 481/512, total granted/max/low/range 31/8192/25/31 >[2012/09/25 15:57:47.215840, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:47.215951, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 25 (position 25) from bitmap >[2012/09/25 15:57:47.216081, 10, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_CLOSE] mid = 25 >[2012/09/25 15:57:47.216196, 4, pid=17942, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (1000, 1000) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:47.216289, 5, pid=17942, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (11): > SID[ 0]: S-1-5-21-2119459776-1226821564-2322385355-1000 > SID[ 1]: S-1-5-21-2119459776-1226821564-2322385355-513 > SID[ 2]: S-1-22-2-1000 > SID[ 3]: S-1-22-2-10 > SID[ 4]: S-1-22-2-18 > SID[ 5]: S-1-22-2-988 > SID[ 6]: S-1-22-2-986 > SID[ 7]: S-1-1-0 > SID[ 8]: S-1-5-2 > SID[ 9]: S-1-5-11 > SID[ 10]: S-1-22-1-1000 > Privileges (0x 2E80): > Privilege[ 0]: SeTakeOwnershipPrivilege > Privilege[ 1]: SeBackupPrivilege > Privilege[ 2]: SeRestorePrivilege > Privilege[ 3]: SeDiskOperatorPrivilege > Privilege[ 4]: SeSecurityPrivilege > Rights (0x 0): >[2012/09/25 15:57:47.216977, 5, pid=17942, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 1000 > Primary group is 1000 and contains 5 supplementary groups > Group[ 0]: 1000 > Group[ 1]: 10 > Group[ 2]: 18 > Group[ 3]: 988 > Group[ 4]: 986 >[2012/09/25 15:57:47.217288, 5, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:274(change_to_user_internal) > Impersonated user: uid=(1000,1000), gid=(0,1000) >[2012/09/25 15:57:47.217426, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_close.c:185(smbd_smb2_close) > smbd_smb2_close: . - fnum 2614067975 >[2012/09/25 15:57:47.217528, 5, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:47.217610, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/locking.tdb 2:<none> 3:<none> >[2012/09/25 15:57:47.217712, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 04FD0000000000001EA2 >[2012/09/25 15:57:47.217860, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x88e0f0 >[2012/09/25 15:57:47.218017, 10, pid=17942, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:144(parse_share_modes) > parse_share_modes: >[2012/09/25 15:57:47.218129, 1, pid=17942, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000004 (4) > share_modes: ARRAY(4) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x000000000000000a (10) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.929649 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000654a7bac (1699380140) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000b (11) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.826296 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000083186b32 (2199415602) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x00 (0) > record : NULL >[2012/09/25 15:57:47.221910, 10, pid=17942, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/locking.c:1064(find_delete_on_close_token) > find_delete_on_close_token: name_hash = 0xf570b8bc >[2012/09/25 15:57:47.222088, 10, pid=17942, effective(1000, 1000), real(1000, 0), class=locking] ../source3/locking/share_mode_lock.c:164(unparse_share_modes) > unparse_share_modes: >[2012/09/25 15:57:47.222172, 1, pid=17942, effective(1000, 1000), real(1000, 0)] ../librpc/ndr/ndr.c:245(ndr_print_debug) > d: struct share_mode_data > servicepath : * > servicepath : '/data/samba/shares/share1' > base_name : * > base_name : '.' > stream_name : NULL > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > num_share_modes : 0x00000003 (3) > share_modes: ARRAY(3) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x000000000000000b (11) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.826296 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000083186b32 (2199415602) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x0000000000004616 (17942) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x5d052af7f840d94d (6702810864921139533) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100081 (1048705) > share_access : 0x00000007 (7) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:56:33 PM 2012 PDT.914016 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x00000000f6d029f5 (4140837365) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > share_modes: struct share_mode_entry > pid: struct server_id > pid : 0x00000000000046aa (18090) > task_id : 0x00000000 (0) > vnn : 0xffffffff (4294967295) > unique_id : 0x88961a3be9cbb2fa (-8604661193416920326) > op_mid : 0x0000000000000007 (7) > op_type : 0x0000 (0) > access_mask : 0x00100080 (1048704) > share_access : 0x00000000 (0) > private_options : 0x00000000 (0) > time : Tue Sep 25 03:57:11 PM 2012 PDT.806028 > id: struct file_id > devid : 0x000000000000fd04 (64772) > inode : 0x000000000068a21e (6857246) > extid : 0x0000000000000000 (0) > share_file_id : 0x0000000011a54673 (296044147) > uid : 0x000003e8 (1000) > flags : 0x0000 (0) > name_hash : 0xf570b8bc (4117805244) > num_delete_tokens : 0x00000000 (0) > delete_tokens: ARRAY(0) > old_write_time : Tue Sep 25 03:54:41 PM 2012 PDT.686411719 > changed_write_time : Wed Dec 31 04:00:00 PM 1969 PST.0 > fresh : 0x00 (0) > modified : 0x01 (1) > record : * >[2012/09/25 15:57:47.225006, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 04FD0000000000001EA2 >[2012/09/25 15:57:47.225110, 5, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/locking.tdb >[2012/09/25 15:57:47.225189, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:47.225300, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/notify_internal.c:400(notify_remove) > notify_remove: private_data=0x8a29a0 >[2012/09/25 15:57:47.225380, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/notify_internal.c:411(notify_remove) > 0x8a29a0 not found >[2012/09/25 15:57:47.225455, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/notify_inotify.c:322(watch_destructor) > Deleting inotify watch 1 >[2012/09/25 15:57:47.225587, 5, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:187(dbwrap_check_lock_order) > check lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:47.225681, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:/data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb 2:<none> 3:<none> >[2012/09/25 15:57:47.225764, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Locking key 711DCD60 >[2012/09/25 15:57:47.225884, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:142(db_tdb_fetch_locked_internal) > Allocated locked data 0x0x8adf80 >[2012/09/25 15:57:47.226006, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap_tdb.c:58(db_tdb_log_key) > Unlocking key 711DCD60 >[2012/09/25 15:57:47.226090, 5, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:146(dbwrap_lock_order_state_destructor) > release lock order 1 for /data/samba/prefix/master/var/lock/smbXsrv_open_global.tdb >[2012/09/25 15:57:47.226167, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../lib/dbwrap/dbwrap.c:133(debug_lock_order) > lock order: 1:<none> 2:<none> 3:<none> >[2012/09/25 15:57:47.226275, 5, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/files.c:526(file_free) > freed files structure 2614067975 (1 used) >[2012/09/25 15:57:47.226373, 8, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:628(dos_mode) > dos_mode: . >[2012/09/25 15:57:47.226459, 8, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:206(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2012/09/25 15:57:47.226539, 8, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/dosmode.c:679(dos_mode) > dos_mode returning d >[2012/09/25 15:57:47.226670, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:2524(smbd_smb2_request_done_ex) > smbd_smb2_request_done_ex: idx[1] status[NT_STATUS_OK] body[60] dyn[no:0] at ../source3/smbd/smb2_close.c:139 >[2012/09/25 15:57:47.226766, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/26/31 >[2012/09/25 15:57:47.227019, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/notify_inotify.c:128(inotify_dispatch) > inotify_dispatch called with mask=8000, name=[] >[2012/09/25 15:57:47.228761, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:3124(smbd_smb2_request_incoming) > smbd_smb2_request_incoming: idx[1] of 5 vectors >[2012/09/25 15:57:47.228895, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:620(smb2_validate_sequence_number) > smb2_validate_sequence_number: clearing id 26 (position 26) from bitmap >[2012/09/25 15:57:47.228978, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1872(smbd_smb2_request_dispatch) > smbd_smb2_request_dispatch: opcode[SMB2_OP_NOTIFY] mid = 26 >[2012/09/25 15:57:47.229077, 4, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/uid.c:296(change_to_user) > Skipping user change - already user >[2012/09/25 15:57:47.229165, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1774(smbd_smb2_request_verify_creditcharge) > mid 26, CreditCharge: 1, NeededCharge: 1 >[2012/09/25 15:57:47.229247, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_notify.c:188(smbd_smb2_notify_send) > smbd_smb2_notify_send: . - fnum 198124041 >[2012/09/25 15:57:47.229342, 3, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_notify.c:208(smbd_smb2_notify_send) > smbd_smb2_notify_send: notify change called on ., filter = FILE_NAME|DIR_NAME|ATTRIBUTES|LAST_WRITE, recursive = 0 >[2012/09/25 15:57:47.229453, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/notify_inotify.c:382(inotify_watch) > inotify_add_watch for /data/samba/shares/share1 mask 210003c6 returned wd 2 >[2012/09/25 15:57:47.229553, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/notify.c:297(change_notify_add_request) > change_notify_add_request: Adding request for .: max_param = 32 > smbd_smb2_request_pending_queue: req->current_idx = 1 > req->in.vector[0].iov_len = 0 > req->in.vector[1].iov_len = 0 > req->in.vector[2].iov_len = 64 > req->in.vector[3].iov_len = 32 > req->in.vector[4].iov_len = 0 > req->out.vector[0].iov_len = 4 > req->out.vector[1].iov_len = 0 > req->out.vector[2].iov_len = 64 > req->out.vector[3].iov_len = 8 > req->out.vector[4].iov_len = 0 >[2012/09/25 15:57:47.231140, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "smbd_smb2_request_pending_timer" 0x8a1100 >[2012/09/25 15:57:47.231304, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1415(smbd_smb2_request_pending_timer) > smbd_smb2_request_pending_queue: opcode[SMB2_OP_NOTIFY] mid 26 going async >[2012/09/25 15:57:47.231390, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:868(smb2_set_operation_credit) > smb2_set_operation_credit: requested 1, charge 1, granted 1, current possible/max 482/512, total granted/max/low/range 31/8192/27/31 >[2012/09/25 15:57:47.231473, 10, pid=17942, effective(1000, 1000), real(1000, 0)] ../source3/smbd/smb2_server.c:1510(smbd_smb2_request_pending_timer) > state->vector[0/5].iov_len = 4 > state->vector[1/5].iov_len = 0 > state->vector[2/5].iov_len = 64 > state->vector[3/5].iov_len = 8 > state->vector[4/5].iov_len = 1 >[2012/09/25 15:57:49.711078, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "smbd_idle_event_handler" 0x876db0 >[2012/09/25 15:57:49.711287, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:479(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(deadtime) (nil) called >[2012/09/25 15:57:49.711461, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:490(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(deadtime) (nil) rescheduled >[2012/09/25 15:57:49.711572, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:216(run_events_poll) > Running timed event "smbd_idle_event_handler" 0x880ea0 >[2012/09/25 15:57:49.711684, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:479(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(housekeeping) (nil) called >[2012/09/25 15:57:49.711791, 5, pid=18006, effective(0, 0), real(0, 0)] ../source3/smbd/process.c:2621(housekeeping_fn) > housekeeping >[2012/09/25 15:57:49.711919, 4, pid=18006, effective(0, 0), real(0, 0)] ../source3/smbd/sec_ctx.c:316(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2012/09/25 15:57:49.711997, 5, pid=18006, effective(0, 0), real(0, 0)] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2012/09/25 15:57:49.712071, 5, pid=18006, effective(0, 0), real(0, 0)] ../source3/auth/token_util.c:528(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2012/09/25 15:57:49.712191, 5, pid=18006, effective(0, 0), real(0, 0)] ../source3/smbd/uid.c:346(smbd_change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2012/09/25 15:57:49.712316, 10, pid=18006, effective(0, 0), real(0, 0)] ../source3/lib/events.c:490(smbd_idle_event_handler) > smbd_idle_event_handler: idle_evt(housekeeping) (nil) rescheduled
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 9196
:
7925
| 7937 |
7938
|
7939
|
7946
|
7947
|
7958
|
7959
|
7990
|
7994
|
8348
|
8349
|
8350