The Samba-Bugzilla – Attachment 8540 Details for
Bug 9637
Renaming directories as guest user in security share mode doesn't work.
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log.smbd
log.smbd (text/plain), 981.87 KB, created by
Andreas Schneider
on 2013-02-11 12:35:43 UTC
(
hide
)
Description:
log.smbd
Filename:
MIME Type:
Creator:
Andreas Schneider
Created:
2013-02-11 12:35:43 UTC
Size:
981.87 KB
patch
obsolete
>[2013/02/11 13:34:47, 0] smbd/server.c:1026(main) > smbd version 3.6.13-GIT-d6c7fd0-test started. > Copyright Andrew Tridgell and the Samba Team 1992-2011 >[2013/02/11 13:34:47, 5] ../lib/util/debug.c:330(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > doing parameter debug pid = yes > doing parameter store dos attributes = yes > doing parameter dos filemode = yes >[2013/02/11 13:34:47, 4] param/loadparm.c:9608(lp_load_ex) > pm_process() returned Yes >[2013/02/11 13:34:47, 7] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2013/02/11 13:34:47, 10] param/loadparm_server_role.c:101(set_server_role) > set_server_role: role = ROLE_STANDALONE >[2013/02/11 13:34:47, 1] param/loadparm.c:9670(lp_load_ex) > WARNING: The security=share option is deprecated >[2013/02/11 13:34:47, 5] ../lib/util/charset/codepoints.c:235(map_locale) > Substituting charset 'UTF-8' for LOCALE >[2013/02/11 13:34:47, 4] smbd/sec_ctx.c:174(get_current_groups) > get_current_groups: user is in 1 groups: 0 >[2013/02/11 13:34:47, 2] lib/tallocmsg.c:124(register_msg_pool_usage) > Registered MSG_REQ_POOL_USAGE >[2013/02/11 13:34:47, 2] lib/dmallocmsg.c:78(register_dmalloc_msgs) > Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >[2013/02/11 13:34:47.276603, 3, pid=12313] param/loadparm.c:9572(lp_load_ex) > lp_load_ex: refreshing parameters >[2013/02/11 13:34:47.276647, 3, pid=12313] param/loadparm.c:5192(init_globals) > Initialising global parameters >[2013/02/11 13:34:47.276676, 2, pid=12313] param/loadparm.c:4985(max_open_files) > rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >[2013/02/11 13:34:47.276726, 3, pid=12313] ../lib/util/params.c:550(pm_process) > params.c:pm_process() - Processing configuration file "/etc/samba/smb.conf" >[2013/02/11 13:34:47.276754, 3, pid=12313] param/loadparm.c:8310(do_section) > Processing section "[global]" > doing parameter workgroup = DISCWORLD > doing parameter security = share > doing parameter log level = 10 >[2013/02/11 13:34:47.276822, 5, pid=12313] ../lib/util/debug.c:330(debug_dump_status) > INFO: Current debug levels: > all: 10 > tdb: 10 > printdrivers: 10 > lanman: 10 > smb: 10 > rpc_parse: 10 > rpc_srv: 10 > rpc_cli: 10 > passdb: 10 > sam: 10 > auth: 10 > winbind: 10 > vfs: 10 > idmap: 10 > quota: 10 > acls: 10 > locking: 10 > msdfs: 10 > dmapi: 10 > registry: 10 > doing parameter debug pid = yes > doing parameter store dos attributes = yes > doing parameter dos filemode = yes >[2013/02/11 13:34:47.277128, 2, pid=12313] param/loadparm.c:8327(do_section) > Processing section "[guru]" >[2013/02/11 13:34:47.277180, 8, pid=12313] param/loadparm.c:6480(add_a_service) > add_a_service: Creating snum = 0 for guru >[2013/02/11 13:34:47.277206, 10, pid=12313] param/loadparm.c:6518(hash_a_service) > hash_a_service: creating servicehash >[2013/02/11 13:34:47.277232, 10, pid=12313] param/loadparm.c:6527(hash_a_service) > hash_a_service: hashing index 0 for service name guru > doing parameter path = /srv/samba/tmp > doing parameter read only = no > doing parameter guest ok = yes >[2013/02/11 13:34:47.277313, 4, pid=12313] param/loadparm.c:9608(lp_load_ex) > pm_process() returned Yes >[2013/02/11 13:34:47.277348, 7, pid=12313] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find homes >[2013/02/11 13:34:47.277402, 8, pid=12313] param/loadparm.c:6480(add_a_service) > add_a_service: Creating snum = 1 for IPC$ >[2013/02/11 13:34:47.277429, 10, pid=12313] param/loadparm.c:6527(hash_a_service) > hash_a_service: hashing index 1 for service name IPC$ >[2013/02/11 13:34:47.277461, 3, pid=12313] param/loadparm.c:6630(lp_add_ipc) > adding IPC service >[2013/02/11 13:34:47.277486, 10, pid=12313] param/loadparm_server_role.c:101(set_server_role) > set_server_role: role = ROLE_STANDALONE >[2013/02/11 13:34:47.277516, 1, pid=12313] param/loadparm.c:9670(lp_load_ex) > WARNING: The security=share option is deprecated >[2013/02/11 13:34:47.277544, 5, pid=12313] ../lib/util/charset/codepoints.c:235(map_locale) > Substituting charset 'UTF-8' for LOCALE >[2013/02/11 13:34:47.277577, 6, pid=12313] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:47.277790, 2, pid=12313] lib/interface.c:341(add_interface) > added interface vnet0 ip=fdfe::3 bcast=fdfe::ffff:ffff:ffff:ffff netmask=ffff:ffff:ffff:ffff:: >[2013/02/11 13:34:47.277831, 2, pid=12313] lib/interface.c:341(add_interface) > added interface eth1 ip=fe80::223:54ff:fe33:63ed%eth1 bcast=fe80::ffff:ffff:ffff:ffff%eth1 netmask=ffff:ffff:ffff:ffff:: >[2013/02/11 13:34:47.277907, 2, pid=12313] lib/interface.c:341(add_interface) > added interface vnet0 ip=fe80::2429:6aff:fe76:838d%vnet0 bcast=fe80::ffff:ffff:ffff:ffff%vnet0 netmask=ffff:ffff:ffff:ffff:: >[2013/02/11 13:34:47.277946, 2, pid=12313] lib/interface.c:341(add_interface) > added interface vnet0 ip=192.168.52.1 bcast=192.168.52.255 netmask=255.255.255.0 >[2013/02/11 13:34:47.277976, 2, pid=12313] lib/interface.c:341(add_interface) > added interface eth1 ip=192.168.178.30 bcast=192.168.178.255 netmask=255.255.255.0 >[2013/02/11 13:34:47.278017, 3, pid=12313] smbd/server.c:1061(main) > loaded services >[2013/02/11 13:34:47.278062, 5, pid=12313] lib/util.c:242(init_names) > Netbios name list:- > my_netbios_names[0]="MAGRATHEA" >[2013/02/11 13:34:47.278129, 0, pid=12313] smbd/server.c:1082(main) > standard input is not a socket, assuming -D option >[2013/02/11 13:34:47.278184, 3, pid=12313] smbd/server.c:1093(main) > Becoming a daemon. >[2013/02/11 13:34:47.279215, 8, pid=12314] ../lib/util/util.c:263(fcntl_lock) > fcntl_lock 10 6 0 1 1 >[2013/02/11 13:34:47.279295, 8, pid=12314] ../lib/util/util.c:298(fcntl_lock) > fcntl_lock: Lock call successful >[2013/02/11 13:34:47.279480, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend ldapsam >[2013/02/11 13:34:47.279513, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'ldapsam' >[2013/02/11 13:34:47.279539, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend ldapsam_compat >[2013/02/11 13:34:47.279566, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'ldapsam_compat' >[2013/02/11 13:34:47.279593, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend NDS_ldapsam >[2013/02/11 13:34:47.279620, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'NDS_ldapsam' >[2013/02/11 13:34:47.279645, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend NDS_ldapsam_compat >[2013/02/11 13:34:47.279670, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'NDS_ldapsam_compat' >[2013/02/11 13:34:47.279697, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend IPA_ldapsam >[2013/02/11 13:34:47.279725, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'IPA_ldapsam' >[2013/02/11 13:34:47.279751, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend ads >[2013/02/11 13:34:47.279778, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'ads' >[2013/02/11 13:34:47.279805, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend smbpasswd >[2013/02/11 13:34:47.279832, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'smbpasswd' >[2013/02/11 13:34:47.279858, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend tdbsam >[2013/02/11 13:34:47.279889, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'tdbsam' >[2013/02/11 13:34:47.279916, 5, pid=12314] passdb/pdb_interface.c:71(smb_register_passdb) > Attempting to register passdb backend wbc_sam >[2013/02/11 13:34:47.279942, 5, pid=12314] passdb/pdb_interface.c:84(smb_register_passdb) > Successfully added passdb backend 'wbc_sam' >[2013/02/11 13:34:47.279967, 5, pid=12314] passdb/pdb_interface.c:141(make_pdb_method_name) > Attempting to find a passdb backend to match tdbsam (tdbsam) >[2013/02/11 13:34:47.279992, 5, pid=12314] passdb/pdb_interface.c:162(make_pdb_method_name) > Found pdb backend tdbsam >[2013/02/11 13:34:47.280024, 5, pid=12314] passdb/pdb_interface.c:173(make_pdb_method_name) > pdb backend tdbsam has a valid init >[2013/02/11 13:34:47.280761, 10, pid=12314] registry/reg_backend_db.c:526(regdb_init) > regdb_init: registry db openend. refcount reset (1) >[2013/02/11 13:34:47.280799, 10, pid=12314] registry/reg_cachehook.c:70(reghook_cache_init) > reghook_cache_init: new tree with default ops 0x12be520 for key [] >[2013/02/11 13:34:47.280954, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2013/02/11 13:34:47.281001, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Samba Printer Port] len[2] >[2013/02/11 13:34:47.281041, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2013/02/11 13:34:47.281083, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DefaultSpoolDirectory] len[70] >[2013/02/11 13:34:47.281111, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.281149, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2013/02/11 13:34:47.281177, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.281205, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.281242, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2013/02/11 13:34:47.281270, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.281301, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be640 for key [\HKLM\SYSTEM\CurrentControlSet\Control\Print\Printers] >[2013/02/11 13:34:47.281329, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281357, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Control\Print\Printers] to tree >[2013/02/11 13:34:47.281383, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.281410, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be520 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2013/02/11 13:34:47.281436, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281464, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] to tree >[2013/02/11 13:34:47.281491, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.281521, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be520 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2013/02/11 13:34:47.281547, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281574, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] to tree >[2013/02/11 13:34:47.281601, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.281627, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be6a0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] >[2013/02/11 13:34:47.281653, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281680, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares] to tree >[2013/02/11 13:34:47.281707, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.281733, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be580 for key [\HKLM\SOFTWARE\Samba\smbconf] >[2013/02/11 13:34:47.281758, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281785, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Samba\smbconf] to tree >[2013/02/11 13:34:47.281810, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.281837, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be700 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] >[2013/02/11 13:34:47.281863, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281890, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters] to tree >[2013/02/11 13:34:47.281916, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.281942, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be760 for key [\HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] >[2013/02/11 13:34:47.281968, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.281995, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Control\ProductOptions] to tree >[2013/02/11 13:34:47.282022, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.282060, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be7c0 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters] >[2013/02/11 13:34:47.282086, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.282114, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters] to tree >[2013/02/11 13:34:47.282140, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.282166, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be820 for key [\HKPT] >[2013/02/11 13:34:47.282191, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.282218, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKPT] to tree >[2013/02/11 13:34:47.282243, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.282269, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be880 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] >[2013/02/11 13:34:47.282298, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.282325, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion] to tree >[2013/02/11 13:34:47.282351, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.282377, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be8e0 for key [\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] >[2013/02/11 13:34:47.282403, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.282430, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib] to tree >[2013/02/11 13:34:47.282457, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.282482, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (1->0) >[2013/02/11 13:34:47.282635, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user MAGRATHEA\root >[2013/02/11 13:34:47.282665, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is magrathea\root >[2013/02/11 13:34:47.283896, 5, pid=12314] lib/username.c:124(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as given is MAGRATHEA\root >[2013/02/11 13:34:47.285232, 5, pid=12314] lib/username.c:134(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is MAGRATHEA\ROOT >[2013/02/11 13:34:47.286295, 5, pid=12314] lib/username.c:143(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in magrathea\root >[2013/02/11 13:34:47.286329, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [MAGRATHEA\root]! >[2013/02/11 13:34:47.286356, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user root >[2013/02/11 13:34:47.286381, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is root >[2013/02/11 13:34:47.286448, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [root]! >[2013/02/11 13:34:47.286490, 10, pid=12314] passdb/lookup_sid.c:76(lookup_name) > lookup_name: MAGRATHEA\root => domain=[MAGRATHEA], name=[root] >[2013/02/11 13:34:47.286517, 10, pid=12314] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:47.286548, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.286579, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.286607, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.286634, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.286661, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.286737, 4, pid=12314] passdb/pdb_tdb.c:523(tdbsam_open) > tdbsam_open: successfully opened /etc/samba/passdb.tdb >[2013/02/11 13:34:47.286767, 5, pid=12314] passdb/pdb_tdb.c:562(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_root >[2013/02/11 13:34:47.286810, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.286837, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.286863, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.286888, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.286914, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.286942, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.287022, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.287066, 10, pid=12314] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\root => domain=[Unix User], name=[root] >[2013/02/11 13:34:47.287092, 10, pid=12314] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:47.287156, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user root >[2013/02/11 13:34:47.287182, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is root >[2013/02/11 13:34:47.287209, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [root]! >[2013/02/11 13:34:47.287241, 10, pid=12314] passdb/lookup_sid.c:1544(sid_to_uid) > sid S-1-22-1-0 -> uid 0 >[2013/02/11 13:34:47.287329, 10, pid=12314] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [root] >[2013/02/11 13:34:47.287437, 5, pid=12314] lib/gencache.c:68(gencache_init) > Opening cache file at /var/lib/samba/gencache.tdb >[2013/02/11 13:34:47.287496, 5, pid=12314] lib/gencache.c:111(gencache_init) > Opening cache file at /var/lib/samba/gencache_notrans.tdb >[2013/02/11 13:34:47.287609, 5, pid=12314] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 0 >[2013/02/11 13:34:47.287641, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.287667, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.287692, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.287718, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.287742, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.287788, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.287815, 10, pid=12314] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 0 -> sid S-1-22-2-0 >[2013/02/11 13:34:47.287847, 10, pid=12314] auth/token_util.c:339(create_local_nt_token) > Create local NT token for S-1-22-1-0 >[2013/02/11 13:34:47.287889, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:47.287917, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.287944, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.287969, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.287994, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.288019, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.288079, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.288105, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:47.288132, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288158, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.288183, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288209, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.288241, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.288296, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:47.288324, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.288350, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288376, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.288401, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.288425, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.288473, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288499, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:47.288529, 5, pid=12314] passdb/pdb_util.c:128(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2013/02/11 13:34:47.288559, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.288594, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:47.288621, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288647, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.288673, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288698, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.288723, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.288769, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.288795, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:47.288821, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288847, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.288872, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.288897, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.288921, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.288973, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:47.289000, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.289026, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289071, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.289096, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.289121, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.289169, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289196, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:47.289225, 5, pid=12314] passdb/pdb_util.c:99(create_builtin_users) > create_builtin_users: Failed to create Users >[2013/02/11 13:34:47.289253, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.289279, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289305, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.289330, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289356, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.289380, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.289448, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.289513, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-1-0] >[2013/02/11 13:34:47.289547, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-0] >[2013/02/11 13:34:47.289578, 5, pid=12314] lib/privileges.c:175(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2013/02/11 13:34:47.289617, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2013/02/11 13:34:47.289647, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-11] >[2013/02/11 13:34:47.289710, 10, pid=12314] passdb/lookup_sid.c:1468(sids_to_unix_ids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2013/02/11 13:34:47.289740, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289766, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.289792, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289817, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.289843, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.289889, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.289916, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:47.289943, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:47.289970, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.289996, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.290021, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.290060, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.290085, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.290132, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.290158, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:47.290188, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:47.290215, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.290241, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.290267, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.290293, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.290318, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.290364, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.290390, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-11 >[2013/02/11 13:34:47.290417, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-11 >[2013/02/11 13:34:47.290444, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2013/02/11 13:34:47.290471, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2013/02/11 13:34:47.290497, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-11 to gid, ignoring it >[2013/02/11 13:34:47.290525, 10, pid=12314] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (5): > SID[ 0]: S-1-22-1-0 > SID[ 1]: S-1-22-2-0 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-11 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:47.290634, 10, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 1 supplementary groups > Group[ 0]: 0 >[2013/02/11 13:34:47.290686, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:47.290712, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:47.290787, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:47.290821, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user MAGRATHEA\nobody >[2013/02/11 13:34:47.290847, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is magrathea\nobody >[2013/02/11 13:34:47.291887, 5, pid=12314] lib/username.c:124(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as given is MAGRATHEA\nobody >[2013/02/11 13:34:47.292833, 5, pid=12314] lib/username.c:134(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is MAGRATHEA\NOBODY >[2013/02/11 13:34:47.293874, 5, pid=12314] lib/username.c:143(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in magrathea\nobody >[2013/02/11 13:34:47.293905, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [MAGRATHEA\nobody]! >[2013/02/11 13:34:47.293932, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:47.293957, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:47.293984, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:47.294013, 10, pid=12314] auth/token_util.c:223(create_local_nt_token_from_info3) > Create local NT token for nobody >[2013/02/11 13:34:47.294061, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:47.294090, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294121, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.294147, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294173, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.294198, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.294245, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.294272, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:47.294299, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294325, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.294351, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294376, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.294401, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.294454, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:47.294482, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.294508, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294534, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.294559, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.294584, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.294631, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294657, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:47.294686, 5, pid=12314] passdb/pdb_util.c:128(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2013/02/11 13:34:47.294715, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.294750, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:47.294778, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294804, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.294830, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.294855, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.294880, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.294926, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.294953, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:47.294979, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295006, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.295046, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295074, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.295099, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.295152, 10, pid=12314] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:47.295181, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.295207, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295233, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.295259, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.295283, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.295330, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295357, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:47.295386, 5, pid=12314] passdb/pdb_util.c:99(create_builtin_users) > create_builtin_users: Failed to create Users >[2013/02/11 13:34:47.295414, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.295441, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295467, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.295493, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295518, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.295543, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.295614, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.295645, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-1406987565-2067085585-2387977275-501] >[2013/02/11 13:34:47.295678, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-21-1406987565-2067085585-2387977275-514] >[2013/02/11 13:34:47.295710, 5, pid=12314] lib/privileges.c:175(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2013/02/11 13:34:47.295749, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2013/02/11 13:34:47.295780, 4, pid=12314] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-546] >[2013/02/11 13:34:47.295856, 10, pid=12314] passdb/lookup_sid.c:1468(sids_to_unix_ids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2013/02/11 13:34:47.295884, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295910, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.295936, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.295961, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.295986, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.296035, 5, pid=12314] passdb/pdb_interface.c:1606(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 501. >[2013/02/11 13:34:47.296065, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.296091, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.296116, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.296142, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.296167, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.296207, 6, pid=12314] passdb/pdb_interface.c:401(pdb_getsampwsid) > pdb_getsampwsid: Building guest account >[2013/02/11 13:34:47.296233, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:47.296259, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:47.296285, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:47.296313, 10, pid=12314] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was >[2013/02/11 13:34:47.296344, 10, pid=12314] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name nobody, was >[2013/02/11 13:34:47.296370, 10, pid=12314] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain MAGRATHEA, was >[2013/02/11 13:34:47.296399, 10, pid=12314] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 >[2013/02/11 13:34:47.296429, 10, pid=12314] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 from rid 501 >[2013/02/11 13:34:47.296473, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.296502, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:47.296528, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:47.296554, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:47.296583, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.296609, 5, pid=12314] passdb/lookup_sid.c:1269(legacy_sid_to_gid) > LEGACY: sid S-1-5-21-1406987565-2067085585-2387977275-501 is a User, expected a group >[2013/02/11 13:34:47.296638, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.296664, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.296690, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.296715, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.296740, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.296779, 5, pid=12314] passdb/pdb_interface.c:1606(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 501. >[2013/02/11 13:34:47.296806, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.296831, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.296857, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.296882, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.296910, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.296949, 6, pid=12314] passdb/pdb_interface.c:401(pdb_getsampwsid) > pdb_getsampwsid: Building guest account >[2013/02/11 13:34:47.296975, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:47.297000, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:47.297026, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:47.297058, 10, pid=12314] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was >[2013/02/11 13:34:47.297085, 10, pid=12314] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name nobody, was >[2013/02/11 13:34:47.297111, 10, pid=12314] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain MAGRATHEA, was >[2013/02/11 13:34:47.297138, 10, pid=12314] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 >[2013/02/11 13:34:47.297165, 10, pid=12314] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 from rid 501 >[2013/02/11 13:34:47.297206, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297234, 5, pid=12314] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:47.297263, 5, pid=12314] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:47.297289, 5, pid=12314] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:47.297318, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.297343, 10, pid=12314] passdb/lookup_sid.c:1223(legacy_sid_to_uid) > LEGACY: sid S-1-5-21-1406987565-2067085585-2387977275-501 -> uid 65534 >[2013/02/11 13:34:47.297373, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297399, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.297424, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297449, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.297473, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.297512, 5, pid=12314] passdb/pdb_interface.c:1606(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 514. >[2013/02/11 13:34:47.297539, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.297564, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297589, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.297614, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.297639, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.297682, 5, pid=12314] passdb/pdb_tdb.c:614(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 514 by key RID_00000202. >[2013/02/11 13:34:47.297718, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297745, 5, pid=12314] passdb/pdb_interface.c:1668(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2013/02/11 13:34:47.297776, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.297802, 10, pid=12314] passdb/lookup_sid.c:1280(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-21-1406987565-2067085585-2387977275-514 >[2013/02/11 13:34:47.297830, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297856, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.297882, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.297907, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.297932, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.297971, 5, pid=12314] passdb/pdb_interface.c:1606(lookup_global_sam_rid) > lookup_global_sam_rid: looking up RID 514. >[2013/02/11 13:34:47.297998, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.298024, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298066, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:47.298091, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.298116, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.298158, 5, pid=12314] passdb/pdb_tdb.c:614(tdbsam_getsampwrid) > pdb_getsampwrid (TDB): error looking up RID 514 by key RID_00000202. >[2013/02/11 13:34:47.298194, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298220, 5, pid=12314] passdb/pdb_interface.c:1668(lookup_global_sam_rid) > Can't find a unix id for an unmapped group >[2013/02/11 13:34:47.298248, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298274, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-21-1406987565-2067085585-2387977275-514 >[2013/02/11 13:34:47.298302, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298328, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298354, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298379, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.298404, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.298450, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298476, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:47.298503, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:47.298530, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298556, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298581, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298607, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.298634, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.298680, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298706, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:47.298733, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:47.298760, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298786, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298811, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.298837, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.298862, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.298907, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.298933, 10, pid=12314] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:47.298960, 10, pid=12314] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:47.298987, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-21-1406987565-2067085585-2387977275-514 to gid, ignoring it >[2013/02/11 13:34:47.299015, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2013/02/11 13:34:47.299113, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2013/02/11 13:34:47.299140, 10, pid=12314] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2013/02/11 13:34:47.299169, 10, pid=12314] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-5-21-1406987565-2067085585-2387977275-501 > SID[ 1]: S-1-5-21-1406987565-2067085585-2387977275-514 > SID[ 2]: S-1-1-0 > SID[ 3]: S-1-5-2 > SID[ 4]: S-1-5-32-546 > SID[ 5]: S-1-22-1-65534 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:47.299290, 10, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 0 supplementary groups >[2013/02/11 13:34:47.299392, 3, pid=12314] rpc_server/svcctl/srv_svcctl_reg.c:565(svcctl_init_winreg) > Initialise the svcctl registry keys if needed. >[2013/02/11 13:34:47.299421, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.299448, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.299473, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.299499, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.299524, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.299587, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.299615, 10, pid=12314] registry/reg_backend_db.c:602(regdb_open) > regdb_open: registry db opened. refcount reset (1) >[2013/02/11 13:34:47.299654, 4, pid=12314] rpc_server/rpc_ncacn_np.c:132(make_internal_rpc_pipe_p) > Create pipe requested \winreg >[2013/02/11 13:34:47.299698, 10, pid=12314] rpc_server/rpc_handles.c:116(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe \winreg >[2013/02/11 13:34:47.299729, 10, pid=12314] rpc_server/rpc_handles.c:133(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe \winreg >[2013/02/11 13:34:47.299759, 4, pid=12314] rpc_server/rpc_ncacn_np.c:176(make_internal_rpc_pipe_p) > Created internal pipe \winreg (pipes_open=0) >[2013/02/11 13:34:47.299812, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > in: struct winreg_OpenHKLM > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2013/02/11 13:34:47.299979, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2013/02/11 13:34:47.300007, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (1->2) >[2013/02/11 13:34:47.300039, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2013/02/11 13:34:47.300066, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2013/02/11 13:34:47.300093, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.300117, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM] >[2013/02/11 13:34:47.300161, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.300217, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > out: struct winreg_OpenHKLM > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > result : WERR_OK >[2013/02/11 13:34:47.300384, 5, pid=12314] ../lib/util/charset/codepoints.c:235(map_locale) > Substituting charset 'UTF-8' for LOCALE >[2013/02/11 13:34:47.300422, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > in: struct winreg_OpenKey > parent_handle : * > parent_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > keyname: struct winreg_String > name_len : 0x0044 (68) > name_size : 0x0044 (68) > name : * > name : 'SYSTEM\CurrentControlSet\Services' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2013/02/11 13:34:47.300744, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.300800, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.300827, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (2->3) >[2013/02/11 13:34:47.300854, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.300879, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.300905, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.300929, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.300968, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.300998, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.301026, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.301074, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.301101, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.301125, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.301161, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.301187, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.301215, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.301240, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.301267, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.301291, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.301336, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.301364, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.301390, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.301444, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > out: struct winreg_OpenKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > result : WERR_OK >[2013/02/11 13:34:47.301562, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > in: struct winreg_QueryInfoKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL >[2013/02/11 13:34:47.301720, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.301776, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services' (ops 0x12be520) >[2013/02/11 13:34:47.301803, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.301836, 10, pid=12314] registry/reg_backend_db.c:1926(regdb_get_secdesc) > regdb_get_secdesc: Getting secdesc of key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.301877, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > out: struct winreg_QueryInfoKey > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL > num_subkeys : * > num_subkeys : 0x00000007 (7) > max_subkeylen : * > max_subkeylen : 0x0000001c (28) > max_classlen : * > max_classlen : 0x00000000 (0) > num_values : * > num_values : 0x00000000 (0) > max_valnamelen : * > max_valnamelen : 0x00000002 (2) > max_valbufsize : * > max_valbufsize : 0x00000000 (0) > secdescsize : * > secdescsize : 0x00000078 (120) > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.302212, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000000 (0) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.302481, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.302535, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.302566, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x001a (26) > size : 0x001e (30) > name : * > name : 'LanmanServer' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.302798, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000001 (1) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.303073, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.303128, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.303154, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0012 (18) > size : 0x001e (30) > name : * > name : 'Eventlog' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.303386, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000002 (2) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.303656, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.303711, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.303737, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x000c (12) > size : 0x001e (30) > name : * > name : 'Tcpip' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.303968, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000003 (3) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.304241, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.304296, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.304322, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0012 (18) > size : 0x001e (30) > name : * > name : 'Netlogon' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.304556, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000004 (4) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.304822, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.304877, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.304903, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x0010 (16) > size : 0x001e (30) > name : * > name : 'Spooler' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.305145, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000005 (5) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.305416, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.305471, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.305498, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x001e (30) > size : 0x001e (30) > name : * > name : 'RemoteRegistry' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.305728, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > in: struct winreg_EnumKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 > enum_index : 0x00000006 (6) > name : * > name: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x001e (30) > name : * > name : '' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) >[2013/02/11 13:34:47.305995, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.306055, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:420(_winreg_EnumKey) > _winreg_EnumKey: enumerating key [HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.306082, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_EnumKey: struct winreg_EnumKey > out: struct winreg_EnumKey > name : * > name: struct winreg_StringBuf > length : 0x000a (10) > size : 0x001e (30) > name : * > name : 'WINS' > keyclass : * > keyclass: struct winreg_StringBuf > length : 0x0000 (0) > size : 0x0002 (2) > name : * > name : '' > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.306331, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0054 (84) > name_size : 0x0054 (84) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Spooler' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2013/02/11 13:34:47.306744, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.306799, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\Spooler' >[2013/02/11 13:34:47.306829, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.306857, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.306883, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.306910, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.306937, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.306962, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.306988, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.307013, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.307054, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.307082, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.307111, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.307140, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.307165, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.307191, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.307216, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.307252, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.307279, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.307306, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.307332, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.307359, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.307384, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.307410, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.307435, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.307478, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.307506, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Spooler] >[2013/02/11 13:34:47.307532, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.307559, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.307584, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.307611, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.307636, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.307672, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.307699, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.307753, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.307897, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.308156, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.308210, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Start] >[2013/02/11 13:34:47.308237, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.308264, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Spooler' (ops 0x12be520) >[2013/02/11 13:34:47.308290, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.308326, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2013/02/11 13:34:47.308354, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2013/02/11 13:34:47.308381, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.308409, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2013/02/11 13:34:47.308436, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[28] >[2013/02/11 13:34:47.308464, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[46] >[2013/02/11 13:34:47.308492, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[106] >[2013/02/11 13:34:47.308520, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.308585, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.308835, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.308889, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Type] >[2013/02/11 13:34:47.308917, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.308943, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.309005, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.309265, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.309319, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ErrorControl] >[2013/02/11 13:34:47.309347, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.309374, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.309444, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2013/02/11 13:34:47.309942, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.309996, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ObjectName] >[2013/02/11 13:34:47.310023, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.310056, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.310121, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(28) > [0] : 0x50 (80) > [1] : 0x00 (0) > [2] : 0x72 (114) > [3] : 0x00 (0) > [4] : 0x69 (105) > [5] : 0x00 (0) > [6] : 0x6e (110) > [7] : 0x00 (0) > [8] : 0x74 (116) > [9] : 0x00 (0) > [10] : 0x20 (32) > [11] : 0x00 (0) > [12] : 0x53 (83) > [13] : 0x00 (0) > [14] : 0x70 (112) > [15] : 0x00 (0) > [16] : 0x6f (111) > [17] : 0x00 (0) > [18] : 0x6f (111) > [19] : 0x00 (0) > [20] : 0x6c (108) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x72 (114) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > size : 0x0000001c (28) >[2013/02/11 13:34:47.310666, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.310721, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:DisplayName] >[2013/02/11 13:34:47.310748, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.310775, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.310838, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(46) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x36 (54) > [17] : 0x00 (0) > [18] : 0x34 (52) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x63 (99) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x6c (108) > [33] : 0x00 (0) > [34] : 0x2f (47) > [35] : 0x00 (0) > [36] : 0x73 (115) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x62 (98) > [41] : 0x00 (0) > [42] : 0x64 (100) > [43] : 0x00 (0) > [44] : 0x00 (0) > [45] : 0x00 (0) > size : 0x0000002e (46) >[2013/02/11 13:34:47.311613, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.311668, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:ImagePath] >[2013/02/11 13:34:47.311695, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.311722, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.311786, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(106) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x66 (102) > [35] : 0x00 (0) > [36] : 0x6f (111) > [37] : 0x00 (0) > [38] : 0x72 (114) > [39] : 0x00 (0) > [40] : 0x20 (32) > [41] : 0x00 (0) > [42] : 0x73 (115) > [43] : 0x00 (0) > [44] : 0x70 (112) > [45] : 0x00 (0) > [46] : 0x6f (111) > [47] : 0x00 (0) > [48] : 0x6f (111) > [49] : 0x00 (0) > [50] : 0x6c (108) > [51] : 0x00 (0) > [52] : 0x69 (105) > [53] : 0x00 (0) > [54] : 0x6e (110) > [55] : 0x00 (0) > [56] : 0x67 (103) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x66 (102) > [61] : 0x00 (0) > [62] : 0x69 (105) > [63] : 0x00 (0) > [64] : 0x6c (108) > [65] : 0x00 (0) > [66] : 0x65 (101) > [67] : 0x00 (0) > [68] : 0x73 (115) > [69] : 0x00 (0) > [70] : 0x20 (32) > [71] : 0x00 (0) > [72] : 0x74 (116) > [73] : 0x00 (0) > [74] : 0x6f (111) > [75] : 0x00 (0) > [76] : 0x20 (32) > [77] : 0x00 (0) > [78] : 0x70 (112) > [79] : 0x00 (0) > [80] : 0x72 (114) > [81] : 0x00 (0) > [82] : 0x69 (105) > [83] : 0x00 (0) > [84] : 0x6e (110) > [85] : 0x00 (0) > [86] : 0x74 (116) > [87] : 0x00 (0) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x64 (100) > [91] : 0x00 (0) > [92] : 0x65 (101) > [93] : 0x00 (0) > [94] : 0x76 (118) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x63 (99) > [99] : 0x00 (0) > [100] : 0x65 (101) > [101] : 0x00 (0) > [102] : 0x73 (115) > [103] : 0x00 (0) > [104] : 0x00 (0) > [105] : 0x00 (0) > size : 0x0000006a (106) >[2013/02/11 13:34:47.313301, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.313356, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler:Description] >[2013/02/11 13:34:47.313384, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.313411, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.313476, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000003-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.313567, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.313622, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 03 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.313676, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.313702, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.313728, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.313846, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0066 (102) > name_size : 0x0066 (102) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Spooler\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2013/02/11 13:34:47.314266, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.314320, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\Spooler\Security' >[2013/02/11 13:34:47.314349, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.314376, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.314402, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.314428, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.314455, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.314480, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.314506, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.314531, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.314566, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.314593, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.314619, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.314647, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.314672, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.314699, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.314723, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.314759, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.314787, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.314813, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.314839, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.314867, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.314895, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.314922, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.314947, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.314990, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.315018, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.315050, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Spooler] >[2013/02/11 13:34:47.315076, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.315104, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.315129, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.315156, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.315181, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler] >[2013/02/11 13:34:47.315217, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.315244, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2013/02/11 13:34:47.315270, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.315298, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2013/02/11 13:34:47.315324, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2013/02/11 13:34:47.315350, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.315375, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2013/02/11 13:34:47.315409, 10, pid=12314] registry/reg_backend_db.c:1656(regdb_fetch_keys_internal) > regdb_fetch_keys: no subkeys found for key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2013/02/11 13:34:47.315437, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.315463, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.315517, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000004-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.315668, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000004-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2013/02/11 13:34:47.317360, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.317415, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security:Security] >[2013/02/11 13:34:47.317443, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.317473, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security' (ops 0x12be520) >[2013/02/11 13:34:47.317500, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Spooler\Security] >[2013/02/11 13:34:47.317536, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2013/02/11 13:34:47.317564, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.317624, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000004-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.317715, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.317770, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 04 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.317823, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.317849, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.317875, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.317992, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0056 (86) > name_size : 0x0056 (86) > name : * > name : 'SYSTEM\CurrentControlSet\Services\NETLOGON' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2013/02/11 13:34:47.318410, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.318465, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\NETLOGON' >[2013/02/11 13:34:47.318493, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.318520, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.318546, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.318572, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.318599, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.318624, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.318650, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.318675, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.318710, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.318737, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.318763, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.318791, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.318816, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.318842, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.318867, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.318903, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.318930, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.318957, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.318983, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.319010, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.319047, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.319074, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.319099, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.319143, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.319173, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [NETLOGON] >[2013/02/11 13:34:47.319200, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.319228, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.319253, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.319279, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.319304, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.319344, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.319371, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.319426, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.319565, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.319811, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.319865, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Start] >[2013/02/11 13:34:47.319893, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.319919, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON' (ops 0x12be520) >[2013/02/11 13:34:47.319945, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.319980, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2013/02/11 13:34:47.320012, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2013/02/11 13:34:47.320045, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.320073, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2013/02/11 13:34:47.320100, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[20] >[2013/02/11 13:34:47.320128, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[46] >[2013/02/11 13:34:47.320156, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[164] >[2013/02/11 13:34:47.320183, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.320247, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.320492, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.320547, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Type] >[2013/02/11 13:34:47.320574, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.320601, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.320663, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.320911, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.320965, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ErrorControl] >[2013/02/11 13:34:47.320992, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.321019, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.321088, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2013/02/11 13:34:47.321579, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.321633, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ObjectName] >[2013/02/11 13:34:47.321661, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.321688, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.321756, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(20) > [0] : 0x4e (78) > [1] : 0x00 (0) > [2] : 0x65 (101) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x20 (32) > [7] : 0x00 (0) > [8] : 0x4c (76) > [9] : 0x00 (0) > [10] : 0x6f (111) > [11] : 0x00 (0) > [12] : 0x67 (103) > [13] : 0x00 (0) > [14] : 0x6f (111) > [15] : 0x00 (0) > [16] : 0x6e (110) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > size : 0x00000014 (20) >[2013/02/11 13:34:47.322205, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.322259, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:DisplayName] >[2013/02/11 13:34:47.322287, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.322314, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.322377, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(46) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x36 (54) > [17] : 0x00 (0) > [18] : 0x34 (52) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x63 (99) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x6c (108) > [33] : 0x00 (0) > [34] : 0x2f (47) > [35] : 0x00 (0) > [36] : 0x73 (115) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x62 (98) > [41] : 0x00 (0) > [42] : 0x64 (100) > [43] : 0x00 (0) > [44] : 0x00 (0) > [45] : 0x00 (0) > size : 0x0000002e (46) >[2013/02/11 13:34:47.323148, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.323202, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:ImagePath] >[2013/02/11 13:34:47.323229, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.323256, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.323322, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(164) > [0] : 0x46 (70) > [1] : 0x00 (0) > [2] : 0x69 (105) > [3] : 0x00 (0) > [4] : 0x6c (108) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x20 (32) > [9] : 0x00 (0) > [10] : 0x73 (115) > [11] : 0x00 (0) > [12] : 0x65 (101) > [13] : 0x00 (0) > [14] : 0x72 (114) > [15] : 0x00 (0) > [16] : 0x76 (118) > [17] : 0x00 (0) > [18] : 0x69 (105) > [19] : 0x00 (0) > [20] : 0x63 (99) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x20 (32) > [25] : 0x00 (0) > [26] : 0x70 (112) > [27] : 0x00 (0) > [28] : 0x72 (114) > [29] : 0x00 (0) > [30] : 0x6f (111) > [31] : 0x00 (0) > [32] : 0x76 (118) > [33] : 0x00 (0) > [34] : 0x69 (105) > [35] : 0x00 (0) > [36] : 0x64 (100) > [37] : 0x00 (0) > [38] : 0x69 (105) > [39] : 0x00 (0) > [40] : 0x6e (110) > [41] : 0x00 (0) > [42] : 0x67 (103) > [43] : 0x00 (0) > [44] : 0x20 (32) > [45] : 0x00 (0) > [46] : 0x61 (97) > [47] : 0x00 (0) > [48] : 0x63 (99) > [49] : 0x00 (0) > [50] : 0x63 (99) > [51] : 0x00 (0) > [52] : 0x65 (101) > [53] : 0x00 (0) > [54] : 0x73 (115) > [55] : 0x00 (0) > [56] : 0x73 (115) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x74 (116) > [61] : 0x00 (0) > [62] : 0x6f (111) > [63] : 0x00 (0) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x70 (112) > [67] : 0x00 (0) > [68] : 0x6f (111) > [69] : 0x00 (0) > [70] : 0x6c (108) > [71] : 0x00 (0) > [72] : 0x69 (105) > [73] : 0x00 (0) > [74] : 0x63 (99) > [75] : 0x00 (0) > [76] : 0x79 (121) > [77] : 0x00 (0) > [78] : 0x20 (32) > [79] : 0x00 (0) > [80] : 0x61 (97) > [81] : 0x00 (0) > [82] : 0x6e (110) > [83] : 0x00 (0) > [84] : 0x64 (100) > [85] : 0x00 (0) > [86] : 0x20 (32) > [87] : 0x00 (0) > [88] : 0x70 (112) > [89] : 0x00 (0) > [90] : 0x72 (114) > [91] : 0x00 (0) > [92] : 0x6f (111) > [93] : 0x00 (0) > [94] : 0x66 (102) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x6c (108) > [99] : 0x00 (0) > [100] : 0x65 (101) > [101] : 0x00 (0) > [102] : 0x20 (32) > [103] : 0x00 (0) > [104] : 0x64 (100) > [105] : 0x00 (0) > [106] : 0x61 (97) > [107] : 0x00 (0) > [108] : 0x74 (116) > [109] : 0x00 (0) > [110] : 0x61 (97) > [111] : 0x00 (0) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x28 (40) > [115] : 0x00 (0) > [116] : 0x6e (110) > [117] : 0x00 (0) > [118] : 0x6f (111) > [119] : 0x00 (0) > [120] : 0x74 (116) > [121] : 0x00 (0) > [122] : 0x72 (114) > [123] : 0x00 (0) > [124] : 0x65 (101) > [125] : 0x00 (0) > [126] : 0x6d (109) > [127] : 0x00 (0) > [128] : 0x6f (111) > [129] : 0x00 (0) > [130] : 0x74 (116) > [131] : 0x00 (0) > [132] : 0x65 (101) > [133] : 0x00 (0) > [134] : 0x6c (108) > [135] : 0x00 (0) > [136] : 0x79 (121) > [137] : 0x00 (0) > [138] : 0x20 (32) > [139] : 0x00 (0) > [140] : 0x6d (109) > [141] : 0x00 (0) > [142] : 0x61 (97) > [143] : 0x00 (0) > [144] : 0x6e (110) > [145] : 0x00 (0) > [146] : 0x61 (97) > [147] : 0x00 (0) > [148] : 0x67 (103) > [149] : 0x00 (0) > [150] : 0x65 (101) > [151] : 0x00 (0) > [152] : 0x61 (97) > [153] : 0x00 (0) > [154] : 0x62 (98) > [155] : 0x00 (0) > [156] : 0x6c (108) > [157] : 0x00 (0) > [158] : 0x65 (101) > [159] : 0x00 (0) > [160] : 0x29 (41) > [161] : 0x00 (0) > [162] : 0x00 (0) > [163] : 0x00 (0) > size : 0x000000a4 (164) >[2013/02/11 13:34:47.325560, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.325614, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON:Description] >[2013/02/11 13:34:47.325642, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.325669, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.325728, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000005-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.325818, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.325873, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 05 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.325926, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.325953, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.325979, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.326101, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0068 (104) > name_size : 0x0068 (104) > name : * > name : 'SYSTEM\CurrentControlSet\Services\NETLOGON\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2013/02/11 13:34:47.326515, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.326569, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\NETLOGON\Security' >[2013/02/11 13:34:47.326597, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.326624, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.326651, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.326677, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.326704, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.326729, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.326755, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.326780, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.326815, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.326842, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.326868, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.326896, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.326922, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.326948, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.326976, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.327012, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.327046, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.327072, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.327098, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.327126, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.327151, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.327177, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.327201, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.327244, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.327272, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.327298, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [NETLOGON] >[2013/02/11 13:34:47.327324, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.327352, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.327377, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.327403, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.327428, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON] >[2013/02/11 13:34:47.327465, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.327492, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2013/02/11 13:34:47.327518, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.327546, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2013/02/11 13:34:47.327572, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2013/02/11 13:34:47.327599, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.327623, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2013/02/11 13:34:47.327657, 10, pid=12314] registry/reg_backend_db.c:1656(regdb_fetch_keys_internal) > regdb_fetch_keys: no subkeys found for key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2013/02/11 13:34:47.327685, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.327711, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.327769, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000006-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.327912, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000006-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2013/02/11 13:34:47.329614, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.329669, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security:Security] >[2013/02/11 13:34:47.329697, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.329723, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security' (ops 0x12be520) >[2013/02/11 13:34:47.329750, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\NETLOGON\Security] >[2013/02/11 13:34:47.329786, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2013/02/11 13:34:47.329813, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.329874, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000006-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.329964, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.330018, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 06 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.330077, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.330103, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.330129, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.330247, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0062 (98) > name_size : 0x0062 (98) > name : * > name : 'SYSTEM\CurrentControlSet\Services\RemoteRegistry' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2013/02/11 13:34:47.330658, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.330713, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\RemoteRegistry' >[2013/02/11 13:34:47.330740, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.330767, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.330793, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.330819, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.330846, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.330870, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.330896, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.330920, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.330954, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.330981, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.331007, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.331038, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.331065, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.331091, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.331115, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.331150, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.331178, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.331204, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.331233, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.331261, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.331285, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.331312, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.331336, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.331381, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.331409, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [RemoteRegistry] >[2013/02/11 13:34:47.331435, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.331462, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.331487, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.331514, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.331539, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.331575, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.331602, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.331656, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.331795, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.332046, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.332104, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Start] >[2013/02/11 13:34:47.332131, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.332157, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry' (ops 0x12be520) >[2013/02/11 13:34:47.332184, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.332220, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2013/02/11 13:34:47.332248, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2013/02/11 13:34:47.332275, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.332303, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2013/02/11 13:34:47.332330, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[48] >[2013/02/11 13:34:47.332357, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[46] >[2013/02/11 13:34:47.332385, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[126] >[2013/02/11 13:34:47.332412, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.332475, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.332722, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.332776, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Type] >[2013/02/11 13:34:47.332803, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.332830, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.332896, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.333148, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.333202, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ErrorControl] >[2013/02/11 13:34:47.333230, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.333257, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.333321, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2013/02/11 13:34:47.333819, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.333873, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ObjectName] >[2013/02/11 13:34:47.333901, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.333927, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.333993, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(48) > [0] : 0x52 (82) > [1] : 0x00 (0) > [2] : 0x65 (101) > [3] : 0x00 (0) > [4] : 0x6d (109) > [5] : 0x00 (0) > [6] : 0x6f (111) > [7] : 0x00 (0) > [8] : 0x74 (116) > [9] : 0x00 (0) > [10] : 0x65 (101) > [11] : 0x00 (0) > [12] : 0x20 (32) > [13] : 0x00 (0) > [14] : 0x52 (82) > [15] : 0x00 (0) > [16] : 0x65 (101) > [17] : 0x00 (0) > [18] : 0x67 (103) > [19] : 0x00 (0) > [20] : 0x69 (105) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x74 (116) > [25] : 0x00 (0) > [26] : 0x72 (114) > [27] : 0x00 (0) > [28] : 0x79 (121) > [29] : 0x00 (0) > [30] : 0x20 (32) > [31] : 0x00 (0) > [32] : 0x53 (83) > [33] : 0x00 (0) > [34] : 0x65 (101) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x76 (118) > [39] : 0x00 (0) > [40] : 0x69 (105) > [41] : 0x00 (0) > [42] : 0x63 (99) > [43] : 0x00 (0) > [44] : 0x65 (101) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > size : 0x00000030 (48) >[2013/02/11 13:34:47.334792, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.334846, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:DisplayName] >[2013/02/11 13:34:47.334874, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.334901, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.334964, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(46) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x36 (54) > [17] : 0x00 (0) > [18] : 0x34 (52) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x63 (99) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x6c (108) > [33] : 0x00 (0) > [34] : 0x2f (47) > [35] : 0x00 (0) > [36] : 0x73 (115) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x62 (98) > [41] : 0x00 (0) > [42] : 0x64 (100) > [43] : 0x00 (0) > [44] : 0x00 (0) > [45] : 0x00 (0) > size : 0x0000002e (46) >[2013/02/11 13:34:47.335737, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.335791, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:ImagePath] >[2013/02/11 13:34:47.335819, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.335846, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.335911, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(126) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x70 (112) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x6f (111) > [39] : 0x00 (0) > [40] : 0x76 (118) > [41] : 0x00 (0) > [42] : 0x69 (105) > [43] : 0x00 (0) > [44] : 0x64 (100) > [45] : 0x00 (0) > [46] : 0x69 (105) > [47] : 0x00 (0) > [48] : 0x6e (110) > [49] : 0x00 (0) > [50] : 0x67 (103) > [51] : 0x00 (0) > [52] : 0x20 (32) > [53] : 0x00 (0) > [54] : 0x72 (114) > [55] : 0x00 (0) > [56] : 0x65 (101) > [57] : 0x00 (0) > [58] : 0x6d (109) > [59] : 0x00 (0) > [60] : 0x6f (111) > [61] : 0x00 (0) > [62] : 0x74 (116) > [63] : 0x00 (0) > [64] : 0x65 (101) > [65] : 0x00 (0) > [66] : 0x20 (32) > [67] : 0x00 (0) > [68] : 0x61 (97) > [69] : 0x00 (0) > [70] : 0x63 (99) > [71] : 0x00 (0) > [72] : 0x63 (99) > [73] : 0x00 (0) > [74] : 0x65 (101) > [75] : 0x00 (0) > [76] : 0x73 (115) > [77] : 0x00 (0) > [78] : 0x73 (115) > [79] : 0x00 (0) > [80] : 0x20 (32) > [81] : 0x00 (0) > [82] : 0x74 (116) > [83] : 0x00 (0) > [84] : 0x6f (111) > [85] : 0x00 (0) > [86] : 0x20 (32) > [87] : 0x00 (0) > [88] : 0x74 (116) > [89] : 0x00 (0) > [90] : 0x68 (104) > [91] : 0x00 (0) > [92] : 0x65 (101) > [93] : 0x00 (0) > [94] : 0x20 (32) > [95] : 0x00 (0) > [96] : 0x53 (83) > [97] : 0x00 (0) > [98] : 0x61 (97) > [99] : 0x00 (0) > [100] : 0x6d (109) > [101] : 0x00 (0) > [102] : 0x62 (98) > [103] : 0x00 (0) > [104] : 0x61 (97) > [105] : 0x00 (0) > [106] : 0x20 (32) > [107] : 0x00 (0) > [108] : 0x72 (114) > [109] : 0x00 (0) > [110] : 0x65 (101) > [111] : 0x00 (0) > [112] : 0x67 (103) > [113] : 0x00 (0) > [114] : 0x69 (105) > [115] : 0x00 (0) > [116] : 0x73 (115) > [117] : 0x00 (0) > [118] : 0x74 (116) > [119] : 0x00 (0) > [120] : 0x72 (114) > [121] : 0x00 (0) > [122] : 0x79 (121) > [123] : 0x00 (0) > [124] : 0x00 (0) > [125] : 0x00 (0) > size : 0x0000007e (126) >[2013/02/11 13:34:47.337676, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.337730, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry:Description] >[2013/02/11 13:34:47.337758, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.337785, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.337845, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000007-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.337935, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.337990, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 07 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.338049, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.338076, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.338102, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.338223, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0074 (116) > name_size : 0x0074 (116) > name : * > name : 'SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2013/02/11 13:34:47.338633, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.338688, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' >[2013/02/11 13:34:47.338716, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.338743, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.338769, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.338795, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.338823, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.338848, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.338874, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.338899, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.338934, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.338961, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.338987, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.339019, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.339055, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.339081, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.339106, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.339142, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.339170, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.339196, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.339222, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.339250, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.339275, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.339301, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.339326, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.339369, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.339396, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.339423, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [RemoteRegistry] >[2013/02/11 13:34:47.339449, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.339476, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.339501, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.339528, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.339553, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry] >[2013/02/11 13:34:47.339591, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.339618, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2013/02/11 13:34:47.339644, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.339672, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2013/02/11 13:34:47.339698, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2013/02/11 13:34:47.339725, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.339749, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2013/02/11 13:34:47.339784, 10, pid=12314] registry/reg_backend_db.c:1656(regdb_fetch_keys_internal) > regdb_fetch_keys: no subkeys found for key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2013/02/11 13:34:47.339816, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.339843, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.339896, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000008-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.340043, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000008-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2013/02/11 13:34:47.341737, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.341792, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security:Security] >[2013/02/11 13:34:47.341820, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.341846, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security' (ops 0x12be520) >[2013/02/11 13:34:47.341873, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry\Security] >[2013/02/11 13:34:47.341910, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2013/02/11 13:34:47.341937, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.341997, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000008-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.342093, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.342148, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 08 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.342202, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.342228, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.342254, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.342372, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x004e (78) > name_size : 0x004e (78) > name : * > name : 'SYSTEM\CurrentControlSet\Services\WINS' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_ACTION_NONE (0) >[2013/02/11 13:34:47.342785, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.342840, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\WINS' >[2013/02/11 13:34:47.342868, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.342895, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.342921, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.342947, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.342975, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.343000, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.343025, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.343056, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.343091, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.343119, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.343145, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.343173, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.343198, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.343224, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.343249, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.343289, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.343317, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.343343, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.343369, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.343396, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.343421, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.343447, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.343472, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.343514, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.343542, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [WINS] >[2013/02/11 13:34:47.343568, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.343595, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.343621, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.343647, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.343672, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.343707, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.343735, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.343788, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.343927, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000c (12) > name_size : 0x000c (12) > name : * > name : 'Start' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x02 (2) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.344183, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.344238, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Start] >[2013/02/11 13:34:47.344265, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.344291, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\WINS' (ops 0x12be520) >[2013/02/11 13:34:47.344317, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.344352, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Start] len[4] >[2013/02/11 13:34:47.344380, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[Type] len[4] >[2013/02/11 13:34:47.344407, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[2]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.344435, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[3]: name[ObjectName] len[24] >[2013/02/11 13:34:47.344463, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[4]: name[DisplayName] len[74] >[2013/02/11 13:34:47.344490, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[5]: name[ImagePath] len[46] >[2013/02/11 13:34:47.344518, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[6]: name[Description] len[178] >[2013/02/11 13:34:47.344546, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.344609, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x000a (10) > name_size : 0x000a (10) > name : * > name : 'Type' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x10 (16) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.344855, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.344910, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Type] >[2013/02/11 13:34:47.344940, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.344967, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.345033, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x001a (26) > name_size : 0x001a (26) > name : * > name : 'ErrorControl' > type : REG_DWORD (4) > data : * > data: ARRAY(4) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x00 (0) > [3] : 0x00 (0) > size : 0x00000004 (4) >[2013/02/11 13:34:47.345282, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.345337, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ErrorControl] >[2013/02/11 13:34:47.345364, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.345391, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.345454, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0016 (22) > name_size : 0x0016 (22) > name : * > name : 'ObjectName' > type : REG_SZ (1) > data : * > data: ARRAY(24) > [0] : 0x4c (76) > [1] : 0x00 (0) > [2] : 0x6f (111) > [3] : 0x00 (0) > [4] : 0x63 (99) > [5] : 0x00 (0) > [6] : 0x61 (97) > [7] : 0x00 (0) > [8] : 0x6c (108) > [9] : 0x00 (0) > [10] : 0x53 (83) > [11] : 0x00 (0) > [12] : 0x79 (121) > [13] : 0x00 (0) > [14] : 0x73 (115) > [15] : 0x00 (0) > [16] : 0x74 (116) > [17] : 0x00 (0) > [18] : 0x65 (101) > [19] : 0x00 (0) > [20] : 0x6d (109) > [21] : 0x00 (0) > [22] : 0x00 (0) > [23] : 0x00 (0) > size : 0x00000018 (24) >[2013/02/11 13:34:47.345952, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.346006, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ObjectName] >[2013/02/11 13:34:47.346038, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.346066, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.346132, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'DisplayName' > type : REG_SZ (1) > data : * > data: ARRAY(74) > [0] : 0x57 (87) > [1] : 0x00 (0) > [2] : 0x69 (105) > [3] : 0x00 (0) > [4] : 0x6e (110) > [5] : 0x00 (0) > [6] : 0x64 (100) > [7] : 0x00 (0) > [8] : 0x6f (111) > [9] : 0x00 (0) > [10] : 0x77 (119) > [11] : 0x00 (0) > [12] : 0x73 (115) > [13] : 0x00 (0) > [14] : 0x20 (32) > [15] : 0x00 (0) > [16] : 0x49 (73) > [17] : 0x00 (0) > [18] : 0x6e (110) > [19] : 0x00 (0) > [20] : 0x74 (116) > [21] : 0x00 (0) > [22] : 0x65 (101) > [23] : 0x00 (0) > [24] : 0x72 (114) > [25] : 0x00 (0) > [26] : 0x6e (110) > [27] : 0x00 (0) > [28] : 0x65 (101) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x4e (78) > [35] : 0x00 (0) > [36] : 0x61 (97) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x65 (101) > [41] : 0x00 (0) > [42] : 0x20 (32) > [43] : 0x00 (0) > [44] : 0x53 (83) > [45] : 0x00 (0) > [46] : 0x65 (101) > [47] : 0x00 (0) > [48] : 0x72 (114) > [49] : 0x00 (0) > [50] : 0x76 (118) > [51] : 0x00 (0) > [52] : 0x69 (105) > [53] : 0x00 (0) > [54] : 0x63 (99) > [55] : 0x00 (0) > [56] : 0x65 (101) > [57] : 0x00 (0) > [58] : 0x20 (32) > [59] : 0x00 (0) > [60] : 0x28 (40) > [61] : 0x00 (0) > [62] : 0x57 (87) > [63] : 0x00 (0) > [64] : 0x49 (73) > [65] : 0x00 (0) > [66] : 0x4e (78) > [67] : 0x00 (0) > [68] : 0x53 (83) > [69] : 0x00 (0) > [70] : 0x29 (41) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > size : 0x0000004a (74) >[2013/02/11 13:34:47.347252, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.347307, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:DisplayName] >[2013/02/11 13:34:47.347334, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.347361, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.347432, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0014 (20) > name_size : 0x0014 (20) > name : * > name : 'ImagePath' > type : REG_SZ (1) > data : * > data: ARRAY(46) > [0] : 0x2f (47) > [1] : 0x00 (0) > [2] : 0x75 (117) > [3] : 0x00 (0) > [4] : 0x73 (115) > [5] : 0x00 (0) > [6] : 0x72 (114) > [7] : 0x00 (0) > [8] : 0x2f (47) > [9] : 0x00 (0) > [10] : 0x6c (108) > [11] : 0x00 (0) > [12] : 0x69 (105) > [13] : 0x00 (0) > [14] : 0x62 (98) > [15] : 0x00 (0) > [16] : 0x36 (54) > [17] : 0x00 (0) > [18] : 0x34 (52) > [19] : 0x00 (0) > [20] : 0x2f (47) > [21] : 0x00 (0) > [22] : 0x73 (115) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x63 (99) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x74 (116) > [31] : 0x00 (0) > [32] : 0x6c (108) > [33] : 0x00 (0) > [34] : 0x2f (47) > [35] : 0x00 (0) > [36] : 0x6e (110) > [37] : 0x00 (0) > [38] : 0x6d (109) > [39] : 0x00 (0) > [40] : 0x62 (98) > [41] : 0x00 (0) > [42] : 0x64 (100) > [43] : 0x00 (0) > [44] : 0x00 (0) > [45] : 0x00 (0) > size : 0x0000002e (46) >[2013/02/11 13:34:47.348204, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.348259, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:ImagePath] >[2013/02/11 13:34:47.348286, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.348313, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.348377, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0018 (24) > name_size : 0x0018 (24) > name : * > name : 'Description' > type : REG_SZ (1) > data : * > data: ARRAY(178) > [0] : 0x49 (73) > [1] : 0x00 (0) > [2] : 0x6e (110) > [3] : 0x00 (0) > [4] : 0x74 (116) > [5] : 0x00 (0) > [6] : 0x65 (101) > [7] : 0x00 (0) > [8] : 0x72 (114) > [9] : 0x00 (0) > [10] : 0x6e (110) > [11] : 0x00 (0) > [12] : 0x61 (97) > [13] : 0x00 (0) > [14] : 0x6c (108) > [15] : 0x00 (0) > [16] : 0x20 (32) > [17] : 0x00 (0) > [18] : 0x73 (115) > [19] : 0x00 (0) > [20] : 0x65 (101) > [21] : 0x00 (0) > [22] : 0x72 (114) > [23] : 0x00 (0) > [24] : 0x76 (118) > [25] : 0x00 (0) > [26] : 0x69 (105) > [27] : 0x00 (0) > [28] : 0x63 (99) > [29] : 0x00 (0) > [30] : 0x65 (101) > [31] : 0x00 (0) > [32] : 0x20 (32) > [33] : 0x00 (0) > [34] : 0x70 (112) > [35] : 0x00 (0) > [36] : 0x72 (114) > [37] : 0x00 (0) > [38] : 0x6f (111) > [39] : 0x00 (0) > [40] : 0x76 (118) > [41] : 0x00 (0) > [42] : 0x69 (105) > [43] : 0x00 (0) > [44] : 0x64 (100) > [45] : 0x00 (0) > [46] : 0x69 (105) > [47] : 0x00 (0) > [48] : 0x6e (110) > [49] : 0x00 (0) > [50] : 0x67 (103) > [51] : 0x00 (0) > [52] : 0x20 (32) > [53] : 0x00 (0) > [54] : 0x61 (97) > [55] : 0x00 (0) > [56] : 0x20 (32) > [57] : 0x00 (0) > [58] : 0x4e (78) > [59] : 0x00 (0) > [60] : 0x65 (101) > [61] : 0x00 (0) > [62] : 0x74 (116) > [63] : 0x00 (0) > [64] : 0x42 (66) > [65] : 0x00 (0) > [66] : 0x49 (73) > [67] : 0x00 (0) > [68] : 0x4f (79) > [69] : 0x00 (0) > [70] : 0x53 (83) > [71] : 0x00 (0) > [72] : 0x20 (32) > [73] : 0x00 (0) > [74] : 0x70 (112) > [75] : 0x00 (0) > [76] : 0x6f (111) > [77] : 0x00 (0) > [78] : 0x69 (105) > [79] : 0x00 (0) > [80] : 0x6e (110) > [81] : 0x00 (0) > [82] : 0x74 (116) > [83] : 0x00 (0) > [84] : 0x2d (45) > [85] : 0x00 (0) > [86] : 0x74 (116) > [87] : 0x00 (0) > [88] : 0x6f (111) > [89] : 0x00 (0) > [90] : 0x2d (45) > [91] : 0x00 (0) > [92] : 0x70 (112) > [93] : 0x00 (0) > [94] : 0x6f (111) > [95] : 0x00 (0) > [96] : 0x69 (105) > [97] : 0x00 (0) > [98] : 0x6e (110) > [99] : 0x00 (0) > [100] : 0x74 (116) > [101] : 0x00 (0) > [102] : 0x20 (32) > [103] : 0x00 (0) > [104] : 0x6e (110) > [105] : 0x00 (0) > [106] : 0x61 (97) > [107] : 0x00 (0) > [108] : 0x6d (109) > [109] : 0x00 (0) > [110] : 0x65 (101) > [111] : 0x00 (0) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x73 (115) > [115] : 0x00 (0) > [116] : 0x65 (101) > [117] : 0x00 (0) > [118] : 0x72 (114) > [119] : 0x00 (0) > [120] : 0x76 (118) > [121] : 0x00 (0) > [122] : 0x65 (101) > [123] : 0x00 (0) > [124] : 0x72 (114) > [125] : 0x00 (0) > [126] : 0x28 (40) > [127] : 0x00 (0) > [128] : 0x6e (110) > [129] : 0x00 (0) > [130] : 0x6f (111) > [131] : 0x00 (0) > [132] : 0x74 (116) > [133] : 0x00 (0) > [134] : 0x20 (32) > [135] : 0x00 (0) > [136] : 0x72 (114) > [137] : 0x00 (0) > [138] : 0x65 (101) > [139] : 0x00 (0) > [140] : 0x6d (109) > [141] : 0x00 (0) > [142] : 0x6f (111) > [143] : 0x00 (0) > [144] : 0x74 (116) > [145] : 0x00 (0) > [146] : 0x65 (101) > [147] : 0x00 (0) > [148] : 0x6c (108) > [149] : 0x00 (0) > [150] : 0x79 (121) > [151] : 0x00 (0) > [152] : 0x20 (32) > [153] : 0x00 (0) > [154] : 0x6d (109) > [155] : 0x00 (0) > [156] : 0x61 (97) > [157] : 0x00 (0) > [158] : 0x6e (110) > [159] : 0x00 (0) > [160] : 0x61 (97) > [161] : 0x00 (0) > [162] : 0x67 (103) > [163] : 0x00 (0) > [164] : 0x65 (101) > [165] : 0x00 (0) > [166] : 0x61 (97) > [167] : 0x00 (0) > [168] : 0x62 (98) > [169] : 0x00 (0) > [170] : 0x6c (108) > [171] : 0x00 (0) > [172] : 0x65 (101) > [173] : 0x00 (0) > [174] : 0x29 (41) > [175] : 0x00 (0) > [176] : 0x00 (0) > [177] : 0x00 (0) > size : 0x000000b2 (178) >[2013/02/11 13:34:47.350801, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.350856, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS:Description] >[2013/02/11 13:34:47.350883, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.350910, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.350971, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.351067, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.351125, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.351178, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.351205, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.351231, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.351348, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > in: struct winreg_CreateKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000001-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0060 (96) > name_size : 0x0060 (96) > name : * > name : 'SYSTEM\CurrentControlSet\Services\WINS\Security' > keyclass: struct winreg_String > name_len : 0x0002 (2) > name_size : 0x0002 (2) > name : * > name : '' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY > secdesc : NULL > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) >[2013/02/11 13:34:47.351760, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[1] [0000] 00 00 00 00 01 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.351814, 10, pid=12314] rpc_server/winreg/srv_winreg_nt.c:782(_winreg_CreateKey) > _winreg_CreateKey called with parent key 'HKLM' and subkey name 'SYSTEM\CurrentControlSet\Services\WINS\Security' >[2013/02/11 13:34:47.351842, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.351869, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.351896, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.351922, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.351949, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.351978, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.352004, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.352033, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.352070, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.352097, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.352124, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.352151, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.352177, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.352203, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.352227, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.352263, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.352291, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.352317, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.352343, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.352371, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.352396, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.352422, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.352447, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.352491, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.352520, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 2 >[2013/02/11 13:34:47.352546, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [WINS] >[2013/02/11 13:34:47.352572, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.352600, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.352625, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.352651, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.352676, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS] >[2013/02/11 13:34:47.352713, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.352740, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Security] >[2013/02/11 13:34:47.352766, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.352798, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2013/02/11 13:34:47.352823, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2013/02/11 13:34:47.352850, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.352874, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2013/02/11 13:34:47.352908, 10, pid=12314] registry/reg_backend_db.c:1656(regdb_fetch_keys_internal) > regdb_fetch_keys: no subkeys found for key [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2013/02/11 13:34:47.352935, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.352962, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.353016, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CreateKey: struct winreg_CreateKey > out: struct winreg_CreateKey > new_handle : * > new_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-1851-67e51a300000 > action_taken : * > action_taken : REG_OPENED_EXISTING_KEY (2) > result : WERR_OK >[2013/02/11 13:34:47.353165, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > in: struct winreg_SetValue > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-1851-67e51a300000 > name: struct winreg_String > name_len : 0x0012 (18) > name_size : 0x0012 (18) > name : * > name : 'Security' > type : REG_BINARY (3) > data : * > data: ARRAY(120) > [0] : 0x01 (1) > [1] : 0x00 (0) > [2] : 0x04 (4) > [3] : 0x80 (128) > [4] : 0x00 (0) > [5] : 0x00 (0) > [6] : 0x00 (0) > [7] : 0x00 (0) > [8] : 0x00 (0) > [9] : 0x00 (0) > [10] : 0x00 (0) > [11] : 0x00 (0) > [12] : 0x00 (0) > [13] : 0x00 (0) > [14] : 0x00 (0) > [15] : 0x00 (0) > [16] : 0x14 (20) > [17] : 0x00 (0) > [18] : 0x00 (0) > [19] : 0x00 (0) > [20] : 0x02 (2) > [21] : 0x00 (0) > [22] : 0x64 (100) > [23] : 0x00 (0) > [24] : 0x04 (4) > [25] : 0x00 (0) > [26] : 0x00 (0) > [27] : 0x00 (0) > [28] : 0x00 (0) > [29] : 0x00 (0) > [30] : 0x14 (20) > [31] : 0x00 (0) > [32] : 0x8d (141) > [33] : 0x01 (1) > [34] : 0x02 (2) > [35] : 0x00 (0) > [36] : 0x01 (1) > [37] : 0x01 (1) > [38] : 0x00 (0) > [39] : 0x00 (0) > [40] : 0x00 (0) > [41] : 0x00 (0) > [42] : 0x00 (0) > [43] : 0x01 (1) > [44] : 0x00 (0) > [45] : 0x00 (0) > [46] : 0x00 (0) > [47] : 0x00 (0) > [48] : 0x00 (0) > [49] : 0x00 (0) > [50] : 0x18 (24) > [51] : 0x00 (0) > [52] : 0xfd (253) > [53] : 0x01 (1) > [54] : 0x02 (2) > [55] : 0x00 (0) > [56] : 0x01 (1) > [57] : 0x02 (2) > [58] : 0x00 (0) > [59] : 0x00 (0) > [60] : 0x00 (0) > [61] : 0x00 (0) > [62] : 0x00 (0) > [63] : 0x05 (5) > [64] : 0x20 (32) > [65] : 0x00 (0) > [66] : 0x00 (0) > [67] : 0x00 (0) > [68] : 0x23 (35) > [69] : 0x02 (2) > [70] : 0x00 (0) > [71] : 0x00 (0) > [72] : 0x00 (0) > [73] : 0x00 (0) > [74] : 0x18 (24) > [75] : 0x00 (0) > [76] : 0xff (255) > [77] : 0x01 (1) > [78] : 0x0f (15) > [79] : 0x00 (0) > [80] : 0x01 (1) > [81] : 0x02 (2) > [82] : 0x00 (0) > [83] : 0x00 (0) > [84] : 0x00 (0) > [85] : 0x00 (0) > [86] : 0x00 (0) > [87] : 0x05 (5) > [88] : 0x20 (32) > [89] : 0x00 (0) > [90] : 0x00 (0) > [91] : 0x00 (0) > [92] : 0x25 (37) > [93] : 0x02 (2) > [94] : 0x00 (0) > [95] : 0x00 (0) > [96] : 0x00 (0) > [97] : 0x00 (0) > [98] : 0x18 (24) > [99] : 0x00 (0) > [100] : 0xff (255) > [101] : 0x01 (1) > [102] : 0x0f (15) > [103] : 0x00 (0) > [104] : 0x01 (1) > [105] : 0x02 (2) > [106] : 0x00 (0) > [107] : 0x00 (0) > [108] : 0x00 (0) > [109] : 0x00 (0) > [110] : 0x00 (0) > [111] : 0x05 (5) > [112] : 0x20 (32) > [113] : 0x00 (0) > [114] : 0x00 (0) > [115] : 0x00 (0) > [116] : 0x20 (32) > [117] : 0x02 (2) > [118] : 0x00 (0) > [119] : 0x00 (0) > size : 0x00000078 (120) >[2013/02/11 13:34:47.354850, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.354905, 8, pid=12314] rpc_server/winreg/srv_winreg_nt.c:812(_winreg_SetValue) > _winreg_SetValue: Setting value for [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security:Security] >[2013/02/11 13:34:47.354932, 5, pid=12314] ../lib/util/tdb_wrap.c:65(tdb_wrap_log) > tdb(/var/lib/samba/registry.tdb): tdb_transaction_start: nesting 1 >[2013/02/11 13:34:47.354958, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security' (ops 0x12be520) >[2013/02/11 13:34:47.354985, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\WINS\Security] >[2013/02/11 13:34:47.355021, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Security] len[120] >[2013/02/11 13:34:47.355054, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_SetValue: struct winreg_SetValue > out: struct winreg_SetValue > result : WERR_OK >[2013/02/11 13:34:47.355115, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.355205, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.355260, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.355314, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.355339, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.355369, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.355479, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000002-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.355569, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.355623, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 02 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.355677, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.355703, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (3->2) >[2013/02/11 13:34:47.355729, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.355837, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (2->1) >[2013/02/11 13:34:47.355878, 3, pid=12314] rpc_server/eventlog/srv_eventlog_reg.c:59(eventlog_init_winreg) > Initialise the eventlog registry keys if needed. >[2013/02/11 13:34:47.355906, 4, pid=12314] rpc_server/rpc_ncacn_np.c:132(make_internal_rpc_pipe_p) > Create pipe requested \winreg >[2013/02/11 13:34:47.355935, 10, pid=12314] rpc_server/rpc_handles.c:133(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 2 for pipe \winreg >[2013/02/11 13:34:47.355964, 4, pid=12314] rpc_server/rpc_ncacn_np.c:176(make_internal_rpc_pipe_p) > Created internal pipe \winreg (pipes_open=0) >[2013/02/11 13:34:47.355996, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > in: struct winreg_OpenHKLM > system_name : NULL > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2013/02/11 13:34:47.356160, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2013/02/11 13:34:47.356187, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (1->2) >[2013/02/11 13:34:47.356214, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2013/02/11 13:34:47.356239, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2013/02/11 13:34:47.356268, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.356293, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM] >[2013/02/11 13:34:47.356330, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[2] [0000] 00 00 00 00 0B 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.356386, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenHKLM: struct winreg_OpenHKLM > out: struct winreg_OpenHKLM > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000b-0000-0000-1851-67e51a300000 > result : WERR_OK >[2013/02/11 13:34:47.356500, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > in: struct winreg_OpenKey > parent_handle : * > parent_handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000b-0000-0000-1851-67e51a300000 > keyname: struct winreg_String > name_len : 0x0056 (86) > name_size : 0x0056 (86) > name : * > name : 'SYSTEM\CurrentControlSet\Services\Eventlog' > options : 0x00000000 (0) > 0: REG_OPTION_VOLATILE > 0: REG_OPTION_CREATE_LINK > 0: REG_OPTION_BACKUP_RESTORE > 0: REG_OPTION_OPEN_LINK > access_mask : 0x02000000 (33554432) > 0: KEY_QUERY_VALUE > 0: KEY_SET_VALUE > 0: KEY_CREATE_SUB_KEY > 0: KEY_ENUMERATE_SUB_KEYS > 0: KEY_NOTIFY > 0: KEY_CREATE_LINK > 0: KEY_WOW64_64KEY > 0: KEY_WOW64_32KEY >[2013/02/11 13:34:47.356815, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0B 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.356870, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SYSTEM] >[2013/02/11 13:34:47.356896, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (2->3) >[2013/02/11 13:34:47.356924, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM] >[2013/02/11 13:34:47.356949, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM] >[2013/02/11 13:34:47.356975, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.356999, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM] >[2013/02/11 13:34:47.357041, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [CurrentControlSet] >[2013/02/11 13:34:47.357070, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.357098, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.357123, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.357149, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.357178, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet] >[2013/02/11 13:34:47.357216, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Services] >[2013/02/11 13:34:47.357243, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.357271, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.357296, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.357322, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.357347, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services] >[2013/02/11 13:34:47.357393, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Eventlog] >[2013/02/11 13:34:47.357422, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (5->6) >[2013/02/11 13:34:47.357451, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.357476, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.357503, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.357527, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.357565, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (6->5) >[2013/02/11 13:34:47.357592, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.357618, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.357645, 4, pid=12314] rpc_server/rpc_handles.c:197(create_rpc_handle_internal) > Opened policy hnd[3] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.357699, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_OpenKey: struct winreg_OpenKey > out: struct winreg_OpenKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000c-0000-0000-1851-67e51a300000 > result : WERR_OK >[2013/02/11 13:34:47.357813, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > in: struct winreg_QueryInfoKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000c-0000-0000-1851-67e51a300000 > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL >[2013/02/11 13:34:47.357964, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.358023, 10, pid=12314] registry/reg_dispatcher.c:150(fetch_reg_values) > fetch_reg_values called for key 'HKLM\SYSTEM\CurrentControlSet\Services\Eventlog' (ops 0x12be520) >[2013/02/11 13:34:47.358056, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.358093, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2013/02/11 13:34:47.358122, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.358149, 10, pid=12314] registry/reg_backend_db.c:1926(regdb_get_secdesc) > regdb_get_secdesc: Getting secdesc of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.358186, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_QueryInfoKey: struct winreg_QueryInfoKey > out: struct winreg_QueryInfoKey > classname : * > classname: struct winreg_String > name_len : 0x0000 (0) > name_size : 0x0000 (0) > name : NULL > num_subkeys : * > num_subkeys : 0x00000000 (0) > max_subkeylen : * > max_subkeylen : 0x00000000 (0) > max_classlen : * > max_classlen : 0x00000000 (0) > num_values : * > num_values : 0x00000002 (2) > max_valnamelen : * > max_valnamelen : 0x0000001a (26) > max_valbufsize : * > max_valbufsize : 0x00000014 (20) > secdescsize : * > secdescsize : 0x00000078 (120) > last_changed_time : * > last_changed_time : NTTIME(0) > result : WERR_OK >[2013/02/11 13:34:47.358495, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > in: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000c-0000-0000-1851-67e51a300000 >[2013/02/11 13:34:47.358586, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.358641, 4, pid=12314] rpc_server/rpc_handles.c:232(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0C 00 00 00 00 00 00 00 18 51 67 E5 ........ .....Qg. > [0010] 1A 30 00 00 .0.. >[2013/02/11 13:34:47.358694, 3, pid=12314] rpc_server/rpc_handles.c:281(close_policy_hnd) > Closed policy >[2013/02/11 13:34:47.358720, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (3->2) >[2013/02/11 13:34:47.358746, 1, pid=12314] ../librpc/ndr/ndr.c:284(ndr_print_function_debug) > winreg_CloseKey: struct winreg_CloseKey > out: struct winreg_CloseKey > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : WERR_OK >[2013/02/11 13:34:47.358909, 3, pid=12314] printing/pcap.c:138(pcap_cache_reload) > reloading printcap cache >[2013/02/11 13:34:47.358947, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5052494E5445524C4953 >[2013/02/11 13:34:47.358988, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c6420 >[2013/02/11 13:34:47.359087, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5052494E5445524C4953 >[2013/02/11 13:34:47.359129, 5, pid=12314] printing/print_cups.c:449(cups_pcap_load_async) > cups_pcap_load_async: asynchronously loading cups printers >[2013/02/11 13:34:47.359411, 10, pid=12314] printing/print_cups.c:466(cups_pcap_load_async) > cups_pcap_load_async: child pid = 12321 >[2013/02/11 13:34:47.359475, 10, pid=12314] printing/print_cups.c:586(cups_cache_reload) > cups_cache_reload: async read on fd 26 >[2013/02/11 13:34:47.359511, 3, pid=12314] printing/pcap.c:189(pcap_cache_reload) > reload status: ok >[2013/02/11 13:34:47.359541, 3, pid=12314] printing/printing.c:1695(start_background_queue) > start_background_queue: Starting background LPQ thread >[2013/02/11 13:34:47.359780, 5, pid=12321] printing/print_cups.c:318(cups_cache_reload_async) > reloading cups printcap cache >[2013/02/11 13:34:47.359845, 5, pid=12322] printing/printing.c:1718(start_background_queue) > start_background_queue: background LPQ thread started >[2013/02/11 13:34:47.359972, 10, pid=12314] lib/util_sock.c:680(open_socket_in) > bind succeeded on port 445 >[2013/02/11 13:34:47.360014, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 >[2013/02/11 13:34:47.360166, 10, pid=12322] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > SO_RCVLOWAT = 1 >[2013/02/11 13:34:47.360184, 10, pid=12321] printing/print_cups.c:130(cups_connect) > SO_SNDTIMEO = 0 > Locking key 22300000FFFFFFFF > SO_RCVTIMEO = 0 > connecting to cups server /var/run/cups/cups.sock:631 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.360250, 5, pid=12314] lib/util_sock.c:165(print_socket_options) >[2013/02/11 13:34:47.360248, 10, pid=12322] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Socket options: > Allocated locked data 0x0x23c5b90 > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 >[2013/02/11 13:34:47.360394, 10, pid=12322] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > Unlocking key 22300000FFFFFFFF > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.360469, 10, pid=12322] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(printer_housekeeping) 0x23c8e50 >[2013/02/11 13:34:47.360510, 5, pid=12322] printing/printing.c:1763(start_background_queue) >[2013/02/11 13:34:47.360516, 10, pid=12314] lib/util_sock.c:680(open_socket_in) > start_background_queue: background LPQ thread waiting for messages > bind succeeded on port 139 >[2013/02/11 13:34:47.360558, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.360761, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.360995, 10, pid=12314] lib/util_sock.c:680(open_socket_in) > bind succeeded on port 445 >[2013/02/11 13:34:47.361025, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.361240, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.361469, 10, pid=12314] lib/util_sock.c:680(open_socket_in) > bind succeeded on port 139 >[2013/02/11 13:34:47.361500, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 0 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.361702, 5, pid=12314] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 16384 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:47.361916, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 1A300000FFFFFFFF >[2013/02/11 13:34:47.361948, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c8d10 >[2013/02/11 13:34:47.361991, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 1A300000FFFFFFFF >[2013/02/11 13:34:47.362023, 5, pid=12314] lib/messages.c:300(messaging_register) > Overriding messaging pointer for type 1 - private_data=(nil) >[2013/02/11 13:34:47.363650, 10, pid=12321] printing/print_cups.c:171(send_pcap_blob) > successfully sent blob of len 141 >[2013/02/11 13:34:47.363802, 10, pid=12314] smbd/avahi_register.c:79(avahi_client_callback) > avahi_client_callback: AVAHI_CLIENT_S_RUNNING >[2013/02/11 13:34:47.364163, 10, pid=12314] smbd/avahi_register.c:61(avahi_entry_group_callback) > avahi_entry_group_callback: AVAHI_ENTRY_GROUP_UNCOMMITED >[2013/02/11 13:34:47.364614, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (2->1) >[2013/02/11 13:34:47.364648, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (1->0) >[2013/02/11 13:34:47.364683, 10, pid=12314] rpc_server/rpc_handles.c:307(close_policy_by_pipe) > close_policy_by_pipe: deleted handle list for pipe \winreg >[2013/02/11 13:34:47.364726, 2, pid=12314] smbd/server.c:815(smbd_parent_loop) > waiting for connections >[2013/02/11 13:34:47.364765, 2, pid=12314] smbd/server.c:301(remove_child_pid) > Could not find child 12321 -- ignoring >[2013/02/11 13:34:47.364794, 10, pid=12314] lib/events.c:221(run_events_poll) > Running timed event "avahi_timeout_handler" 0x23d1440 >[2013/02/11 13:34:47.364835, 10, pid=12314] lib/events.c:221(run_events_poll) > Running timed event "avahi_timeout_handler" 0x23d2940 >[2013/02/11 13:34:47.364870, 10, pid=12314] smbd/avahi_register.c:65(avahi_entry_group_callback) > avahi_entry_group_callback: AVAHI_ENTRY_GROUP_REGISTERING >[2013/02/11 13:34:47.364913, 5, pid=12314] printing/print_cups.c:512(cups_async_callback) > cups_async_callback: callback received for printer data. fd = 26 >[2013/02/11 13:34:47.364943, 10, pid=12314] printing/print_cups.c:196(recv_pcap_blob) > successfully recvd blob of len 141 >[2013/02/11 13:34:47.364988, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5052494E5445524C4953 >[2013/02/11 13:34:47.365025, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c6840 >[2013/02/11 13:34:47.365061, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5052494E5445524C4953 >[2013/02/11 13:34:47.365101, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5052494E5445524C4953 >[2013/02/11 13:34:47.365130, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d1440 >[2013/02/11 13:34:47.365159, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5052494E5445524C4953 >[2013/02/11 13:34:47.365218, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:47.365258, 10, pid=12314] registry/reg_init_smbconf.c:41(registry_init_smbconf) > registry_init_smbconf called >[2013/02/11 13:34:47.365311, 10, pid=12314] registry/reg_backend_db.c:526(regdb_init) > regdb_init: registry db openend. refcount reset (1) >[2013/02/11 13:34:47.365454, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports] >[2013/02/11 13:34:47.365494, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[Samba Printer Port] len[2] >[2013/02/11 13:34:47.365522, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers] >[2013/02/11 13:34:47.365561, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DefaultSpoolDirectory] len[70] >[2013/02/11 13:34:47.365588, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.365625, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2013/02/11 13:34:47.365653, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.365681, 10, pid=12314] registry/reg_backend_db.c:1789(regdb_fetch_values_internal) > regdb_fetch_values: Looking for values of key [HKLM\SYSTEM\CurrentControlSet\Services\Eventlog] >[2013/02/11 13:34:47.365717, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[0]: name[DisplayName] len[20] >[2013/02/11 13:34:47.365745, 10, pid=12314] registry/reg_backend_db.c:1734(regdb_unpack_values) > regdb_unpack_values: value[1]: name[ErrorControl] len[4] >[2013/02/11 13:34:47.365778, 10, pid=12314] registry/reg_cachehook.c:94(reghook_cache_add) > reghook_cache_add: Adding ops 0x12be580 for key [\HKLM\SOFTWARE\Samba\smbconf] >[2013/02/11 13:34:47.365805, 8, pid=12314] lib/adt_tree.c:215(pathtree_add) > pathtree_add: Enter >[2013/02/11 13:34:47.365831, 10, pid=12314] lib/adt_tree.c:282(pathtree_add) > pathtree_add: Successfully added node [HKLM\SOFTWARE\Samba\smbconf] to tree >[2013/02/11 13:34:47.365857, 8, pid=12314] lib/adt_tree.c:284(pathtree_add) > pathtree_add: Exit >[2013/02/11 13:34:47.365881, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (1->0) >[2013/02/11 13:34:47.365912, 4, pid=12314] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.365939, 4, pid=12314] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.365965, 4, pid=12314] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:47.365990, 5, pid=12314] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:47.366015, 5, pid=12314] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:47.366095, 4, pid=12314] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:47.366122, 10, pid=12314] registry/reg_backend_db.c:602(regdb_open) > regdb_open: registry db opened. refcount reset (1) >[2013/02/11 13:34:47.366148, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [HKLM] >[2013/02/11 13:34:47.366174, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (1->2) >[2013/02/11 13:34:47.366201, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM] >[2013/02/11 13:34:47.366226, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM] >[2013/02/11 13:34:47.366251, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.366276, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM] >[2013/02/11 13:34:47.366314, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [SOFTWARE] >[2013/02/11 13:34:47.366341, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (2->3) >[2013/02/11 13:34:47.366369, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE] >[2013/02/11 13:34:47.366393, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE] >[2013/02/11 13:34:47.366419, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.366443, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SOFTWARE] >[2013/02/11 13:34:47.366484, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [Samba] >[2013/02/11 13:34:47.366511, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (3->4) >[2013/02/11 13:34:47.366538, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba] >[2013/02/11 13:34:47.366563, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba] >[2013/02/11 13:34:47.366589, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.366614, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be520 for key [\HKLM\SOFTWARE\Samba] >[2013/02/11 13:34:47.366652, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [smbconf] >[2013/02/11 13:34:47.366678, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (4->5) >[2013/02/11 13:34:47.366706, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf] >[2013/02/11 13:34:47.366730, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf] >[2013/02/11 13:34:47.366756, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.366781, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be580 for key [\HKLM\SOFTWARE\Samba\smbconf] >[2013/02/11 13:34:47.366817, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (5->4) >[2013/02/11 13:34:47.366844, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (4->3) >[2013/02/11 13:34:47.366870, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (3->2) >[2013/02/11 13:34:47.366896, 5, pid=12314] param/loadparm.c:7280(process_registry_service) > process_registry_service: service name printers >[2013/02/11 13:34:47.366925, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [printers] >[2013/02/11 13:34:47.366955, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (2->3) >[2013/02/11 13:34:47.366983, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2013/02/11 13:34:47.367008, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2013/02/11 13:34:47.367039, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.367066, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be580 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2013/02/11 13:34:47.367100, 10, pid=12314] registry/reg_backend_db.c:1623(regdb_fetch_keys_internal) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2013/02/11 13:34:47.367126, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (3->2) >[2013/02/11 13:34:47.367154, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:47.367181, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:47.367208, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:47.367233, 10, pid=12314] smbd/server_reload.c:53(reload_printers) > reloading printer services from pcap cache >[2013/02/11 13:34:47.367267, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:47.367294, 5, pid=12314] param/loadparm.c:7280(process_registry_service) > process_registry_service: service name printers >[2013/02/11 13:34:47.367319, 7, pid=12314] registry/reg_api.c:141(regkey_open_onelevel) > regkey_open_onelevel: name = [printers] >[2013/02/11 13:34:47.367345, 10, pid=12314] registry/reg_backend_db.c:583(regdb_open) > regdb_open: incrementing refcount (2->3) >[2013/02/11 13:34:47.367372, 10, pid=12314] registry/reg_cachehook.c:122(reghook_cache_find) > reghook_cache_find: Searching for keyname [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2013/02/11 13:34:47.367397, 10, pid=12314] lib/adt_tree.c:367(pathtree_find) > pathtree_find: Enter [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2013/02/11 13:34:47.367423, 10, pid=12314] lib/adt_tree.c:440(pathtree_find) > pathtree_find: Exit >[2013/02/11 13:34:47.367448, 10, pid=12314] registry/reg_cachehook.c:127(reghook_cache_find) > reghook_cache_find: found ops 0x12be580 for key [\HKLM\SOFTWARE\Samba\smbconf\printers] >[2013/02/11 13:34:47.367480, 10, pid=12314] registry/reg_backend_db.c:1623(regdb_fetch_keys_internal) > key [HKLM\SOFTWARE\Samba\smbconf\printers] not found >[2013/02/11 13:34:47.367506, 10, pid=12314] registry/reg_backend_db.c:619(regdb_close) > regdb_close: decrementing refcount (3->2) >[2013/02/11 13:34:47.367534, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:47.367560, 7, pid=12314] param/loadparm.c:9834(lp_servicenumber) > lp_servicenumber: couldn't find printers >[2013/02/11 13:34:48.222240, 10, pid=12314] lib/events.c:221(run_events_poll) > Running timed event "avahi_timeout_handler" 0x23d2940 >[2013/02/11 13:34:48.222336, 10, pid=12314] smbd/avahi_register.c:46(avahi_entry_group_callback) > avahi_entry_group_callback: AVAHI_ENTRY_GROUP_ESTABLISHED >[2013/02/11 13:34:50.404262, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 26300000FFFFFFFF >[2013/02/11 13:34:50.404392, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c1650 >[2013/02/11 13:34:50.404440, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 26300000FFFFFFFF >[2013/02/11 13:34:50.404488, 5, pid=12326] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:50.404699, 5, pid=12326] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:50.404963, 6, pid=12326] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:50.405034, 3, pid=12326] lib/access.c:338(allow_access) > Allowed connection from 192.168.52.63 (192.168.52.63) >[2013/02/11 13:34:50.405062, 10, pid=12326] smbd/process.c:3020(smbd_process) > Connection allowed from ipv4:192.168.52.63:1053 to ipv4:192.168.178.30:445 >[2013/02/11 13:34:50.405118, 3, pid=12326] smbd/oplock.c:922(init_oplocks) > init_oplocks: initializing messages. >[2013/02/11 13:34:50.405211, 3, pid=12326] smbd/oplock_linux.c:239(linux_init_kernel_oplocks) > Linux kernel oplocks enabled >[2013/02/11 13:34:50.405241, 5, pid=12326] lib/messages.c:332(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2013/02/11 13:34:50.405273, 10, pid=12326] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x23bd1b0 >[2013/02/11 13:34:50.405301, 10, pid=12326] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x23ce820 >[2013/02/11 13:34:50.405328, 10, pid=12326] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x23b3750 >[2013/02/11 13:34:50.405389, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 133 >[2013/02/11 13:34:50.405426, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x85 >[2013/02/11 13:34:50.405452, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 0 of length 137 (0 toread) >[2013/02/11 13:34:50.405479, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.405494, 5, pid=12326] lib/util.c:342(show_msg) > size=133 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51283 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=0 > smb_bcc=98 >[2013/02/11 13:34:50.405632, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 02 50 43 20 4E 45 54 57 4F 52 4B 20 50 52 4F 47 .PC NETW ORK PROG > [0010] 52 41 4D 20 31 2E 30 00 02 4C 41 4E 4D 41 4E 31 RAM 1.0. .LANMAN1 > [0020] 2E 30 00 02 57 69 6E 64 6F 77 73 20 66 6F 72 20 .0..Wind ows for > [0030] 57 6F 72 6B 67 72 6F 75 70 73 20 33 2E 31 61 00 Workgrou ps 3.1a. > [0040] 02 4C 4D 31 2E 32 58 30 30 32 00 02 4C 41 4E 4D .LM1.2X0 02..LANM > [0050] 41 4E 32 2E 31 00 02 4E 54 20 4C 4D 20 30 2E 31 AN2.1..N T LM 0.1 > [0060] 32 00 2. >[2013/02/11 13:34:50.405792, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBnegprot (pid 12326) conn 0x0 >[2013/02/11 13:34:50.405823, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.405852, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.405880, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.405929, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:50.406220, 3, pid=12326] smbd/negprot.c:598(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2013/02/11 13:34:50.406255, 3, pid=12326] smbd/negprot.c:598(reply_negprot) > Requested protocol [LANMAN1.0] >[2013/02/11 13:34:50.406286, 3, pid=12326] smbd/negprot.c:598(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2013/02/11 13:34:50.406313, 3, pid=12326] smbd/negprot.c:598(reply_negprot) > Requested protocol [LM1.2X002] >[2013/02/11 13:34:50.406340, 3, pid=12326] smbd/negprot.c:598(reply_negprot) > Requested protocol [LANMAN2.1] >[2013/02/11 13:34:50.406366, 3, pid=12326] smbd/negprot.c:598(reply_negprot) > Requested protocol [NT LM 0.12] >[2013/02/11 13:34:50.406394, 10, pid=12326] lib/util.c:1624(set_remote_arch) > set_remote_arch: Client arch is 'Win2K' >[2013/02/11 13:34:50.406426, 6, pid=12326] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:50.406481, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 26300000FFFFFFFF >[2013/02/11 13:34:50.406512, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d59d0 >[2013/02/11 13:34:50.406539, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 26300000FFFFFFFF >[2013/02/11 13:34:50.406577, 6, pid=12326] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:50.406642, 10, pid=12326] smbd/negprot.c:44(get_challenge) > get challenge: creating negprot_global_auth_context >[2013/02/11 13:34:50.406671, 5, pid=12326] auth/auth.c:508(make_auth_context_subsystem) > Making default auth method list for security=share, encrypt passwords = yes >[2013/02/11 13:34:50.406703, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam >[2013/02/11 13:34:50.406731, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam' >[2013/02/11 13:34:50.406756, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2013/02/11 13:34:50.406782, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2013/02/11 13:34:50.406809, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend unix >[2013/02/11 13:34:50.406835, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'unix' >[2013/02/11 13:34:50.406860, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend winbind >[2013/02/11 13:34:50.406886, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'winbind' >[2013/02/11 13:34:50.406911, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend wbc >[2013/02/11 13:34:50.406936, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'wbc' >[2013/02/11 13:34:50.406963, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend smbserver >[2013/02/11 13:34:50.406990, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'smbserver' >[2013/02/11 13:34:50.407016, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend trustdomain >[2013/02/11 13:34:50.407048, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'trustdomain' >[2013/02/11 13:34:50.407074, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend ntdomain >[2013/02/11 13:34:50.407100, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'ntdomain' >[2013/02/11 13:34:50.407126, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend guest >[2013/02/11 13:34:50.407152, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'guest' >[2013/02/11 13:34:50.407177, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend fixed_challenge >[2013/02/11 13:34:50.407203, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'fixed_challenge' >[2013/02/11 13:34:50.407231, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend name_to_ntstatus >[2013/02/11 13:34:50.407257, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'name_to_ntstatus' >[2013/02/11 13:34:50.407283, 5, pid=12326] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend netlogond >[2013/02/11 13:34:50.407310, 5, pid=12326] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'netlogond' >[2013/02/11 13:34:50.407335, 5, pid=12326] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2013/02/11 13:34:50.407361, 5, pid=12326] auth/auth.c:410(load_auth_module) > load_auth_module: auth method guest has a valid init >[2013/02/11 13:34:50.407387, 5, pid=12326] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2013/02/11 13:34:50.407413, 5, pid=12326] auth/auth.c:410(load_auth_module) > load_auth_module: auth method sam has a valid init >[2013/02/11 13:34:50.407438, 10, pid=12326] smbd/negprot.c:52(get_challenge) > get challenge: getting challenge >[2013/02/11 13:34:50.407463, 5, pid=12326] auth/auth.c:99(get_ntlm_challenge) > auth_get_challenge: module guest did not want to specify a challenge >[2013/02/11 13:34:50.407488, 5, pid=12326] auth/auth.c:99(get_ntlm_challenge) > auth_get_challenge: module sam did not want to specify a challenge >[2013/02/11 13:34:50.407523, 5, pid=12326] auth/auth.c:134(get_ntlm_challenge) > auth_context challenge created by random >[2013/02/11 13:34:50.407549, 5, pid=12326] auth/auth.c:135(get_ntlm_challenge) > challenge is: >[2013/02/11 13:34:50.407573, 5, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] EE B8 91 BF 4B 76 80 A9 ....Kv.. >[2013/02/11 13:34:50.407609, 3, pid=12326] smbd/negprot.c:401(reply_nt1) > not using SPNEGO >[2013/02/11 13:34:50.407634, 3, pid=12326] smbd/negprot.c:704(reply_negprot) > Selected protocol NT LM 0.12 >[2013/02/11 13:34:50.407659, 5, pid=12326] smbd/negprot.c:711(reply_negprot) > negprot index=5 >[2013/02/11 13:34:50.407684, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.407699, 5, pid=12326] lib/util.c:342(show_msg) > size=97 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=17 > smb_vwv[ 0]= 5 (0x5) > smb_vwv[ 1]=12802 (0x3202) > smb_vwv[ 2]= 256 (0x100) > smb_vwv[ 3]= 1024 (0x400) > smb_vwv[ 4]= 65 (0x41) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 256 (0x100) > smb_vwv[ 7]= 9728 (0x2600) > smb_vwv[ 8]= 48 (0x30) > smb_vwv[ 9]=64768 (0xFD00) > smb_vwv[10]=33011 (0x80F3) > smb_vwv[11]= 8960 (0x2300) > smb_vwv[12]=19293 (0x4B5D) > smb_vwv[13]=21551 (0x542F) > smb_vwv[14]=52744 (0xCE08) > smb_vwv[15]=50177 (0xC401) > smb_vwv[16]= 2303 (0x8FF) > smb_bcc=28 >[2013/02/11 13:34:50.408018, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] EE B8 91 BF 4B 76 80 A9 44 00 49 00 53 00 43 00 ....Kv.. D.I.S.C. > [0010] 57 00 4F 00 52 00 4C 00 44 00 00 00 W.O.R.L. D... >[2013/02/11 13:34:50.409875, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 272 >[2013/02/11 13:34:50.409963, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x110 >[2013/02/11 13:34:50.409992, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 1 of length 276 (0 toread) >[2013/02/11 13:34:50.410018, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.410039, 5, pid=12326] lib/util.c:342(show_msg) > size=272 > smb_com=0x73 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=64 > smt_wct=13 > smb_vwv[ 0]= 117 (0x75) > smb_vwv[ 1]= 186 (0xBA) > smb_vwv[ 2]=16644 (0x4104) > smb_vwv[ 3]= 50 (0x32) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]=12326 (0x3026) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 1 (0x1) > smb_vwv[ 8]= 1 (0x1) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]= 212 (0xD4) > smb_vwv[12]= 0 (0x0) > smb_bcc=125 >[2013/02/11 13:34:50.410325, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 61 00 73 00 6E 00 00 00 57 00 49 00 4E ...a.s.n ...W.I.N > [0010] 00 58 00 50 00 00 00 57 00 69 00 6E 00 64 00 6F .X.P...W .i.n.d.o > [0020] 00 77 00 73 00 20 00 32 00 30 00 30 00 32 00 20 .w.s. .2 .0.0.2. > [0030] 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 20 .S.e.r.v .i.c.e. > [0040] 00 50 00 61 00 63 00 6B 00 20 00 33 00 20 00 32 .P.a.c.k . .3. .2 > [0050] 00 36 00 30 00 30 00 00 00 57 00 69 00 6E 00 64 .6.0.0.. .W.i.n.d > [0060] 00 6F 00 77 00 73 00 20 00 32 00 30 00 30 00 32 .o.w.s. .2.0.0.2 > [0070] 00 20 00 35 00 2E 00 31 00 00 00 00 00 . .5...1 ..... >[2013/02/11 13:34:50.410513, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBsesssetupX (pid 12326) conn 0x0 >[2013/02/11 13:34:50.410540, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.410566, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.410591, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.410635, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:50.410664, 3, pid=12326] smbd/sesssetup.c:1333(reply_sesssetup_and_X) > wct=13 flg2=0xc807 >[2013/02/11 13:34:50.410700, 3, pid=12326] smbd/sesssetup.c:1536(reply_sesssetup_and_X) > Domain=[WINXP] NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2013/02/11 13:34:50.410728, 10, pid=12326] lib/util.c:1624(set_remote_arch) > set_remote_arch: Client arch is 'WinXP' >[2013/02/11 13:34:50.410753, 2, pid=12326] smbd/sesssetup.c:1279(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2013/02/11 13:34:50.410779, 3, pid=12326] smbd/sesssetup.c:1552(reply_sesssetup_and_X) > sesssetupX:name=[WINXP]\[asn]@[192.168.52.63] >[2013/02/11 13:34:50.410822, 6, pid=12326] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:50.410888, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:50.410913, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:50.411040, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:50.411085, 3, pid=12326] smbd/sesssetup.c:151(check_guest_password) > Got anonymous request >[2013/02/11 13:34:50.411113, 5, pid=12326] auth/auth.c:508(make_auth_context_subsystem) > Making default auth method list for security=share, encrypt passwords = yes >[2013/02/11 13:34:50.411144, 5, pid=12326] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2013/02/11 13:34:50.411170, 5, pid=12326] auth/auth.c:410(load_auth_module) > load_auth_module: auth method guest has a valid init >[2013/02/11 13:34:50.411195, 5, pid=12326] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2013/02/11 13:34:50.411221, 5, pid=12326] auth/auth.c:410(load_auth_module) > load_auth_module: auth method sam has a valid init >[2013/02/11 13:34:50.411251, 5, pid=12326] auth/user_info.c:59(make_user_info) > attempting to make a user_info for () >[2013/02/11 13:34:50.411278, 5, pid=12326] auth/user_info.c:70(make_user_info) > making strings for 's user_info struct >[2013/02/11 13:34:50.411303, 5, pid=12326] auth/user_info.c:87(make_user_info) > making blobs for 's user_info struct >[2013/02/11 13:34:50.411332, 10, pid=12326] auth/user_info.c:123(make_user_info) > made a user_info for () >[2013/02/11 13:34:50.411358, 3, pid=12326] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user []\[]@[] with the new password interface >[2013/02/11 13:34:50.411384, 3, pid=12326] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: []\[]@[] >[2013/02/11 13:34:50.411409, 10, pid=12326] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by fixed >[2013/02/11 13:34:50.411434, 10, pid=12326] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:50.411459, 5, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 00 00 00 ........ >[2013/02/11 13:34:50.411494, 10, pid=12326] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [] >[2013/02/11 13:34:50.411531, 3, pid=12326] auth/auth.c:268(check_ntlm_password) > check_ntlm_password: guest authentication for user [] succeeded >[2013/02/11 13:34:50.411557, 5, pid=12326] auth/auth.c:309(check_ntlm_password) > check_ntlm_password: guest authentication for user [] -> [] -> [nobody] succeeded >[2013/02/11 13:34:50.411593, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtconX (pid 12326) conn 0x0 >[2013/02/11 13:34:50.411619, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.411645, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.411670, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.411710, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:50.411742, 4, pid=12326] smbd/reply.c:794(reply_tcon_and_X) > Client requested device type [?????] for share [GURU] >[2013/02/11 13:34:50.411783, 5, pid=12326] smbd/service.c:1354(make_connection) > making a connection to 'normal' service guru >[2013/02/11 13:34:50.411817, 3, pid=12326] lib/access.c:338(allow_access) > Allowed connection from 192.168.52.63 (192.168.52.63) >[2013/02/11 13:34:50.411851, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user guru >[2013/02/11 13:34:50.411877, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is guru >[2013/02/11 13:34:50.413145, 5, pid=12326] lib/username.c:134(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is GURU >[2013/02/11 13:34:50.414134, 5, pid=12326] lib/username.c:143(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in guru >[2013/02/11 13:34:50.414167, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [guru]! >[2013/02/11 13:34:50.414202, 5, pid=12326] auth/auth_util.c:110(make_user_info_map) > Mapping user [WINXP]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.414230, 5, pid=12326] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [WINXP] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.414256, 5, pid=12326] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:50.414282, 5, pid=12326] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:50.414308, 5, pid=12326] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:50.414333, 10, pid=12326] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:50.414358, 3, pid=12326] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [WINXP]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:50.414385, 3, pid=12326] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:50.414414, 10, pid=12326] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:50.414440, 10, pid=12326] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:50.414465, 5, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] EE B8 91 BF 4B 76 80 A9 ....Kv.. >[2013/02/11 13:34:50.414502, 10, pid=12326] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:50.414526, 10, pid=12326] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:50.414554, 10, pid=12326] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:50.414579, 8, pid=12326] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:50.414608, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.414634, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.414660, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.414685, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.414710, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.414778, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.414806, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.414832, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.414859, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.414887, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.414920, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.414947, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.414974, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.415000, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.415034, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.415064, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.415092, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.415119, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.415144, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.415169, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.415194, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.415243, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.415274, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.415305, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.415338, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.415382, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.415408, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.415433, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.415459, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.415484, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.415526, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.415555, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.415584, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:50.415609, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:50.415636, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:50.415703, 5, pid=12326] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 100 >[2013/02/11 13:34:50.415732, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.415758, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.415783, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.415808, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.415833, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.415885, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.415912, 10, pid=12326] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 100 -> sid S-1-22-2-100 >[2013/02/11 13:34:50.415947, 3, pid=12326] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:50.415975, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.416001, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.416027, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.416077, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.416102, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.416144, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.416173, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.416205, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.416231, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.416256, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.416282, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.416312, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.416340, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.416367, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.416394, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.416420, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.416448, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.416475, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.416502, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.416528, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.416553, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.416578, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.416603, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.416646, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.416675, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.416702, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.416729, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.416769, 10, pid=12326] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:50.416802, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.416832, 4, pid=12326] ../libcli/auth/ntlm_check.c:404(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password >[2013/02/11 13:34:50.417024, 3, pid=12326] ../libcli/auth/ntlm_check.c:418(ntlm_password_check) > ntlm_password_check: NT MD4 password check failed for user asn >[2013/02/11 13:34:50.417060, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417087, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.417113, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417138, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.417162, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.417204, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.417233, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.417261, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417287, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.417315, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417340, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.417365, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.417404, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.417430, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417455, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.417480, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.417505, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.417547, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:50.417576, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417605, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.417630, 9, pid=12326] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:50.417656, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417681, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.417706, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.417731, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.417756, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.417809, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.417836, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.417862, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.417887, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.417914, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.417942, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.417968, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.417994, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.418021, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.418054, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.418080, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.418107, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.418133, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.418158, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.418187, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.418212, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.418254, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.418283, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.418310, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.418338, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.418378, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.418404, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.418430, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.418455, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.418480, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.418522, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.418551, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.418578, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.418604, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.418629, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.418654, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.418679, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.418720, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.418749, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.418778, 5, pid=12326] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:50.418807, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:50.418835, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d7000 >[2013/02/11 13:34:50.418863, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:50.418891, 10, pid=12326] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:50.418920, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:50.418947, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d7000 >[2013/02/11 13:34:50.418974, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:50.419007, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.419051, 5, pid=12326] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.419085, 2, pid=12326] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.419115, 5, pid=12326] auth/auth_util.c:110(make_user_info_map) > Mapping user [WINXP]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.419141, 5, pid=12326] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [WINXP] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.419167, 5, pid=12326] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:50.419192, 5, pid=12326] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:50.419218, 5, pid=12326] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:50.419243, 10, pid=12326] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:50.419268, 3, pid=12326] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [WINXP]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:50.419294, 3, pid=12326] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:50.419320, 10, pid=12326] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:50.419345, 10, pid=12326] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:50.419369, 5, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] EE B8 91 BF 4B 76 80 A9 ....Kv.. >[2013/02/11 13:34:50.419404, 10, pid=12326] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:50.419429, 10, pid=12326] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:50.419456, 10, pid=12326] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:50.419480, 8, pid=12326] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:50.419507, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.419532, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.419557, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.419583, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.419607, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.419653, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.419679, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.419705, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.419730, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.419757, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.419785, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.419811, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.419837, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.419864, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.419895, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.419922, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.419948, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.419974, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.419999, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.420025, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.420055, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.420097, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.420126, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.420153, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.420181, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.420220, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.420246, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.420272, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.420297, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.420322, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.420364, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.420393, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.420420, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:50.420445, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:50.420472, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:50.420503, 3, pid=12326] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:50.420531, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.420557, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.420582, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.420607, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.420632, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.420675, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.420703, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.420734, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.420763, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.420788, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.420814, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.420840, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.420868, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.420894, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.420921, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.420947, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.420975, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.421001, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.421031, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.421061, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.421086, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.421111, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.421136, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.421179, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.421207, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.421234, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.421261, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.421306, 10, pid=12326] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:50.421338, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.421365, 3, pid=12326] ../libcli/auth/ntlm_check.c:442(ntlm_password_check) > ntlm_password_check: Lanman passwords NOT PERMITTED for user asn >[2013/02/11 13:34:50.421391, 4, pid=12326] ../libcli/auth/ntlm_check.c:479(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with domain WINXP >[2013/02/11 13:34:50.421427, 4, pid=12326] ../libcli/auth/ntlm_check.c:508(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with upper-cased version of domain WINXP >[2013/02/11 13:34:50.421461, 4, pid=12326] ../libcli/auth/ntlm_check.c:536(ntlm_password_check) > ntlm_password_check: Checking LMv2 password without a domain >[2013/02/11 13:34:50.421494, 4, pid=12326] ../libcli/auth/ntlm_check.c:567(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password in LM field >[2013/02/11 13:34:50.421678, 3, pid=12326] ../libcli/auth/ntlm_check.c:586(ntlm_password_check) > ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user asn >[2013/02/11 13:34:50.421705, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.421734, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.421760, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.421785, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.421810, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.421853, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.421881, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.421908, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.421934, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.421959, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.421984, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.422009, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.422069, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.422095, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.422121, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.422146, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.422171, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.422213, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:50.422241, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.422269, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.422295, 9, pid=12326] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:50.422321, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.422346, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.422372, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.422397, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.422422, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.422472, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.422499, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.422524, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.422550, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.422576, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.422605, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.422634, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.422660, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.422686, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.422714, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.422740, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.422767, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.422793, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.422818, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.422844, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.422868, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.422910, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.422938, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.422965, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.422992, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.423046, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.423075, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.423101, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.423126, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.423151, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.423193, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.423222, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.423249, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.423275, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.423300, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.423325, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.423350, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.423392, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.423420, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.423449, 5, pid=12326] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:50.423480, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:50.423508, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c3af0 >[2013/02/11 13:34:50.423536, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:50.423564, 10, pid=12326] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:50.423592, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:50.423620, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c3830 >[2013/02/11 13:34:50.423646, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:50.423679, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.423707, 5, pid=12326] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.423734, 2, pid=12326] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.423764, 5, pid=12326] auth/auth_util.c:110(make_user_info_map) > Mapping user [DISCWORLD]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.423790, 5, pid=12326] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [DISCWORLD] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.423816, 5, pid=12326] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:50.423841, 5, pid=12326] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:50.423867, 5, pid=12326] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:50.423892, 10, pid=12326] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:50.423917, 3, pid=12326] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [DISCWORLD]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:50.423944, 3, pid=12326] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:50.423969, 10, pid=12326] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:50.423994, 10, pid=12326] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:50.424019, 5, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] EE B8 91 BF 4B 76 80 A9 ....Kv.. >[2013/02/11 13:34:50.424060, 10, pid=12326] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:50.424084, 10, pid=12326] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:50.424111, 10, pid=12326] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:50.424136, 8, pid=12326] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:50.424163, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.424188, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.424214, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.424239, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.424264, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.424310, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.424339, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.424365, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.424390, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.424417, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.424445, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.424471, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.424498, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.424524, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.424552, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.424579, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.424605, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.424631, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.424656, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.424681, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.424706, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.424748, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.424777, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.424804, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.424831, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.424871, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.424897, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.424923, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.424948, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.424973, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.425015, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.425049, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.425076, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:50.425101, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:50.425128, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:50.425159, 3, pid=12326] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:50.425190, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.425216, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.425241, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.425266, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.425291, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.425333, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.425362, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.425392, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.425418, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.425443, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.425469, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.425496, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.425524, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.425550, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.425576, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.425603, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.425631, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.425657, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.425684, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.425709, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.425735, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.425760, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.425785, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.425827, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.425855, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.425882, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.425910, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.425949, 10, pid=12326] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:50.425981, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.426011, 4, pid=12326] ../libcli/auth/ntlm_check.c:404(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password >[2013/02/11 13:34:50.426209, 3, pid=12326] ../libcli/auth/ntlm_check.c:418(ntlm_password_check) > ntlm_password_check: NT MD4 password check failed for user asn >[2013/02/11 13:34:50.426236, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426262, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.426288, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426314, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.426338, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.426381, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.426410, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.426437, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426462, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.426487, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426513, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.426537, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.426576, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.426602, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426627, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.426652, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.426677, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.426719, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:50.426747, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426776, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.426802, 9, pid=12326] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:50.426827, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426853, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.426878, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.426903, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.426928, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.426979, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.427006, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.427035, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.427065, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.427092, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.427121, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.427147, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.427173, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.427199, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.427227, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.427253, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.427280, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.427306, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.427332, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.427357, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.427382, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.427424, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.427454, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.427480, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.427508, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.427549, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.427575, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.427600, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.427626, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.427651, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.427693, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.427722, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.427749, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.427775, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.427800, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.427825, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.427850, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.427895, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.427924, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.427953, 5, pid=12326] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:50.427981, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:50.428009, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23cb660 >[2013/02/11 13:34:50.428041, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:50.428069, 10, pid=12326] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:50.428098, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:50.428125, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23cb410 >[2013/02/11 13:34:50.428152, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:50.428185, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.428213, 5, pid=12326] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.428240, 2, pid=12326] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.428270, 5, pid=12326] auth/auth_util.c:110(make_user_info_map) > Mapping user [DISCWORLD]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.428296, 5, pid=12326] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [DISCWORLD] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:50.428322, 5, pid=12326] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:50.428347, 5, pid=12326] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:50.428373, 5, pid=12326] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:50.428399, 10, pid=12326] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:50.428424, 3, pid=12326] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [DISCWORLD]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:50.428450, 3, pid=12326] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:50.428475, 10, pid=12326] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:50.428501, 10, pid=12326] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:50.428525, 5, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] EE B8 91 BF 4B 76 80 A9 ....Kv.. >[2013/02/11 13:34:50.428560, 10, pid=12326] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:50.428585, 10, pid=12326] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:50.428612, 10, pid=12326] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:50.428637, 8, pid=12326] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:50.428663, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.428689, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.428715, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.428743, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.428768, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.428814, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.428840, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.428866, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.428891, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.428918, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.428946, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.428972, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.428999, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.429025, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.429065, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.429092, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.429119, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.429144, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.429170, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.429196, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.429220, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.429263, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.429292, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.429318, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.429346, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.429386, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.429412, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.429438, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.429463, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.429489, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.429531, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.429559, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.429586, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:50.429614, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:50.429641, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:50.429673, 3, pid=12326] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:50.429700, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.429726, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.429752, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.429777, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.429801, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.429843, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.429872, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.429902, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.429928, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.429954, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.429979, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.430006, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.430038, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.430066, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.430092, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.430118, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.430146, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.430173, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.430199, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.430225, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.430250, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.430275, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.430300, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.430342, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.430371, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.430397, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.430424, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.430468, 10, pid=12326] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:50.430500, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.430527, 3, pid=12326] ../libcli/auth/ntlm_check.c:442(ntlm_password_check) > ntlm_password_check: Lanman passwords NOT PERMITTED for user asn >[2013/02/11 13:34:50.430552, 4, pid=12326] ../libcli/auth/ntlm_check.c:479(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with domain DISCWORLD >[2013/02/11 13:34:50.430586, 4, pid=12326] ../libcli/auth/ntlm_check.c:508(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with upper-cased version of domain DISCWORLD >[2013/02/11 13:34:50.430620, 4, pid=12326] ../libcli/auth/ntlm_check.c:536(ntlm_password_check) > ntlm_password_check: Checking LMv2 password without a domain >[2013/02/11 13:34:50.430653, 4, pid=12326] ../libcli/auth/ntlm_check.c:567(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password in LM field >[2013/02/11 13:34:50.430839, 3, pid=12326] ../libcli/auth/ntlm_check.c:586(ntlm_password_check) > ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user asn >[2013/02/11 13:34:50.430865, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.430891, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.430916, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.430942, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.430966, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.431009, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.431084, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.431112, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.431137, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.431163, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.431188, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.431213, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.431252, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.431278, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.431303, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.431328, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.431353, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.431395, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:50.431423, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.431451, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.431477, 9, pid=12326] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:50.431505, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.431531, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.431556, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.431582, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.431606, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.431656, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:50.431683, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:50.431708, 10, pid=12326] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:50.431734, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:50.431761, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.431789, 10, pid=12326] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:50.431815, 10, pid=12326] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:50.431842, 10, pid=12326] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:50.431868, 4, pid=12326] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:50.431896, 10, pid=12326] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:50.431923, 10, pid=12326] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:50.431950, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.431976, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.432001, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.432027, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.432058, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.432100, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.432129, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.432155, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:50.432183, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:50.432224, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.432250, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.432276, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.432301, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.432329, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.432371, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:50.432399, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.432426, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.432452, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.432478, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.432503, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.432528, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.432569, 10, pid=12326] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:50.432598, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.432627, 5, pid=12326] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:50.432655, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:50.432683, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c9690 >[2013/02/11 13:34:50.432710, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:50.432738, 10, pid=12326] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:50.432767, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:50.432795, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c9440 >[2013/02/11 13:34:50.432821, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:50.432854, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.432882, 5, pid=12326] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.432909, 2, pid=12326] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:50.432941, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:50.432966, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:50.432993, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:50.433019, 3, pid=12326] smbd/password.c:721(authorise_login) > authorise_login: ACCEPTED: guest account and guest ok (nobody) >[2013/02/11 13:34:50.433053, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:50.433078, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:50.433105, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:50.433135, 10, pid=12326] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\nobody => domain=[Unix User], name=[nobody] >[2013/02/11 13:34:50.433161, 10, pid=12326] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:50.433192, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:50.433217, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:50.433247, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:50.433275, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was >[2013/02/11 13:34:50.433301, 10, pid=12326] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name nobody, was >[2013/02/11 13:34:50.433326, 10, pid=12326] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain MAGRATHEA, was >[2013/02/11 13:34:50.433353, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 >[2013/02/11 13:34:50.433381, 10, pid=12326] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 from rid 501 >[2013/02/11 13:34:50.433419, 10, pid=12326] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was nobody >[2013/02/11 13:34:50.433444, 10, pid=12326] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-22-1-65534 >[2013/02/11 13:34:50.433481, 5, pid=12326] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 65533 >[2013/02/11 13:34:50.433507, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.433533, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.433559, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.433584, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.433609, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.433654, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.433680, 10, pid=12326] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 65533 -> sid S-1-22-2-65533 >[2013/02/11 13:34:50.433713, 3, pid=12326] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for nobody >[2013/02/11 13:34:50.433741, 10, pid=12326] auth/server_info.c:349(samu_to_SamInfo3) > Unix User found in struct samu. Rid marked as special and sid (S-1-22-1-65534) saved as extra sid >[2013/02/11 13:34:50.433772, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:50.433798, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:50.433825, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:50.433869, 10, pid=12326] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2013/02/11 13:34:50.433955, 5, pid=12326] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 65534 >[2013/02/11 13:34:50.433988, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.434015, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.434054, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.434080, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.434105, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.434151, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.434182, 10, pid=12326] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 65534 -> sid S-1-22-2-65534 >[2013/02/11 13:34:50.434220, 10, pid=12326] passdb/lookup_sid.c:76(lookup_name) > lookup_name: MAGRATHEA\nobody => domain=[MAGRATHEA], name=[nobody] >[2013/02/11 13:34:50.434246, 10, pid=12326] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:50.434274, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.434300, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.434326, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.434351, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.434376, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.434418, 5, pid=12326] passdb/pdb_tdb.c:562(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_nobody >[2013/02/11 13:34:50.434461, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.434487, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.434513, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.434538, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.434564, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.434589, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.434633, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.434662, 10, pid=12326] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\nobody => domain=[Unix User], name=[nobody] >[2013/02/11 13:34:50.434687, 10, pid=12326] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:50.434716, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:50.434742, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:50.434768, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:50.434798, 10, pid=12326] passdb/lookup_sid.c:1544(sid_to_uid) > sid S-1-22-1-65534 -> uid 65534 >[2013/02/11 13:34:50.434869, 10, pid=12326] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2013/02/11 13:34:50.434932, 10, pid=12326] auth/token_util.c:339(create_local_nt_token) > Create local NT token for S-1-22-1-65534 >[2013/02/11 13:34:50.434976, 10, pid=12326] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:50.435004, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435064, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435093, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435118, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.435143, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.435191, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435218, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:50.435248, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435274, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435299, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435325, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.435349, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.435411, 10, pid=12326] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:50.435442, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.435468, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435494, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.435519, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.435544, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.435589, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435615, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:50.435644, 5, pid=12326] passdb/pdb_util.c:128(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2013/02/11 13:34:50.435671, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435707, 10, pid=12326] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:50.435734, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435760, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435785, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435810, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.435835, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.435880, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435906, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:50.435932, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.435958, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.435983, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436008, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.436037, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.436091, 10, pid=12326] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:50.436119, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.436145, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436173, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:50.436199, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.436223, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.436268, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436295, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:50.436323, 5, pid=12326] passdb/pdb_util.c:99(create_builtin_users) > create_builtin_users: Failed to create Users >[2013/02/11 13:34:50.436351, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.436377, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436402, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.436427, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436453, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.436477, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.436548, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.436581, 4, pid=12326] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-1-65534] >[2013/02/11 13:34:50.436611, 4, pid=12326] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65533] >[2013/02/11 13:34:50.436642, 4, pid=12326] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65534] >[2013/02/11 13:34:50.436673, 5, pid=12326] lib/privileges.c:175(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2013/02/11 13:34:50.436712, 4, pid=12326] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2013/02/11 13:34:50.436742, 4, pid=12326] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-546] >[2013/02/11 13:34:50.436804, 10, pid=12326] passdb/lookup_sid.c:1468(sids_to_unix_ids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2013/02/11 13:34:50.436832, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436858, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.436884, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.436909, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.436934, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.436978, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.437004, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:50.437043, 10, pid=12326] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:50.437073, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.437099, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.437124, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.437152, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.437177, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.437222, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.437248, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:50.437275, 10, pid=12326] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:50.437301, 4, pid=12326] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.437327, 4, pid=12326] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.437352, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:50.437378, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.437402, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.437447, 4, pid=12326] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.437473, 10, pid=12326] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:50.437500, 10, pid=12326] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:50.437528, 10, pid=12326] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2013/02/11 13:34:50.437554, 10, pid=12326] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2013/02/11 13:34:50.437581, 10, pid=12326] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2013/02/11 13:34:50.437608, 10, pid=12326] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:50.437727, 10, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:50.437787, 5, pid=12326] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:50.437812, 5, pid=12326] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:50.437839, 5, pid=12326] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:50.437871, 10, pid=12326] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:50.437899, 3, pid=12326] smbd/service.c:872(make_connection_snum) > Connect path is '/srv/samba/tmp' for service [guru] >[2013/02/11 13:34:50.437940, 10, pid=12326] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:50.437971, 10, pid=12326] ../libcli/security/access_check.c:178(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x101f01ff, remaining = 0x101f01ff >[2013/02/11 13:34:50.438000, 3, pid=12326] smbd/vfs.c:102(vfs_init_default) > Initialising default vfs hooks >[2013/02/11 13:34:50.438053, 10, pid=12326] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2013/02/11 13:34:50.438083, 5, pid=12326] smbd/vfs.c:92(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2013/02/11 13:34:50.438113, 10, pid=12326] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2013/02/11 13:34:50.438139, 5, pid=12326] smbd/vfs.c:92(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2013/02/11 13:34:50.438164, 3, pid=12326] smbd/vfs.c:128(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2013/02/11 13:34:50.438190, 10, pid=12326] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2013/02/11 13:34:50.438231, 5, pid=12326] smbd/connection.c:134(claim_connection) > claiming [guru] >[2013/02/11 13:34:50.438295, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 26300000FFFFFFFF3EBF >[2013/02/11 13:34:50.438326, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c7220 >[2013/02/11 13:34:50.438515, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 26300000FFFFFFFF3EBF >[2013/02/11 13:34:50.438631, 10, pid=12326] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:50.438666, 10, pid=12326] smbd/share_access.c:241(user_ok_token) > user_ok_token: share guru is ok for unix user nobody >[2013/02/11 13:34:50.438695, 10, pid=12326] smbd/share_access.c:286(is_share_read_only_for_token) > is_share_read_only_for_user: share guru is read-write for unix user nobody >[2013/02/11 13:34:50.438727, 10, pid=12326] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:50.438761, 10, pid=12326] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:50.438791, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (65534, 65533) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.438818, 5, pid=12326] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:50.438936, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:50.438998, 5, pid=12326] smbd/uid.c:317(change_to_user_internal) > Impersonated user: uid=(0,65534), gid=(0,65533) >[2013/02/11 13:34:50.439045, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.439080, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:50.439105, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:50.439146, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:50.439178, 10, pid=12326] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:50.439221, 10, pid=12326] modules/vfs_default.c:160(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share guru, directory /srv/samba/tmp >[2013/02/11 13:34:50.439250, 1, pid=12326] smbd/service.c:1114(make_connection_snum) > 192.168.52.63 (192.168.52.63) connect to service guru initially as user nobody (uid=65534, gid=65533) (pid 12326) >[2013/02/11 13:34:50.439285, 3, pid=12326] smbd/reply.c:871(reply_tcon_and_X) > tconX service=GURU >[2013/02/11 13:34:50.439705, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 76 >[2013/02/11 13:34:50.439743, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x4c >[2013/02/11 13:34:50.439769, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 2 of length 80 (0 toread) >[2013/02/11 13:34:50.439795, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.439810, 5, pid=12326] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=128 > smt_wct=15 > smb_vwv[ 0]= 8 (0x8) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 8 (0x8) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=11 >[2013/02/11 13:34:50.440137, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 00 00 ........ ... >[2013/02/11 13:34:50.440174, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:50.440201, 10, pid=12326] smbd/share_access.c:241(user_ok_token) > user_ok_token: share guru is ok for unix user nobody >[2013/02/11 13:34:50.440228, 10, pid=12326] smbd/share_access.c:286(is_share_read_only_for_token) > is_share_read_only_for_user: share guru is read-write for unix user nobody >[2013/02/11 13:34:50.440261, 10, pid=12326] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:50.440293, 10, pid=12326] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:50.440321, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (65534, 65533) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:50.440348, 5, pid=12326] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:50.440469, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:50.440531, 5, pid=12326] smbd/uid.c:317(change_to_user_internal) > Impersonated user: uid=(0,65534), gid=(0,65533) >[2013/02/11 13:34:50.440561, 4, pid=12326] smbd/vfs.c:780(vfs_ChDir) > vfs_ChDir to /srv/samba/tmp >[2013/02/11 13:34:50.440598, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:50.440635, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "" >[2013/02/11 13:34:50.440664, 5, pid=12326] smbd/filename.c:291(unix_convert) > conversion finished "" -> . >[2013/02/11 13:34:50.440691, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:50.440721, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:50.440747, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:50.440784, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:50.440821, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:50.440849, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo . (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:50.440877, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: . (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:50.440909, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:50.440962, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:50.440990, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:50.441022, 10, pid=12326] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:50.441054, 5, pid=12326] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:28 2013 > access: Mon Feb 11 13:34:28 2013 > write: Mon Feb 11 13:34:28 2013 > change: Mon Feb 11 13:34:28 2013 > mode: 10 >[2013/02/11 13:34:50.441140, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:50.441166, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:50.441193, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.441207, 5, pid=12326] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=128 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:50.441455, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 8A BD CF 21 54 08 CE 01 8A BD CF ........ !T...... > [0010] 21 54 08 CE 01 8A BD CF 21 54 08 CE 01 8A BD CF !T...... !T...... > [0020] 21 54 08 CE 01 10 00 00 00 00 00 00 00 !T...... ..... >[2013/02/11 13:34:50.441818, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 86 >[2013/02/11 13:34:50.441850, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x56 >[2013/02/11 13:34:50.441876, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 3 of length 90 (0 toread) >[2013/02/11 13:34:50.441902, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.441916, 5, pid=12326] lib/util.c:342(show_msg) > size=86 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=192 > smt_wct=15 > smb_vwv[ 0]= 18 (0x12) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 18 (0x12) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=21 >[2013/02/11 13:34:50.442221, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 06 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 2A 00 00 00 .*... >[2013/02/11 13:34:50.442276, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:50.442303, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:50.442333, 3, pid=12326] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=0, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:50.442363, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "*" >[2013/02/11 13:34:50.442390, 10, pid=12326] smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [*] >[2013/02/11 13:34:50.442416, 5, pid=12326] smbd/filename.c:416(unix_convert) > unix_convert begin: name = *, dirpath = , start = * >[2013/02/11 13:34:50.442449, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled * ? >[2013/02/11 13:34:50.442475, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component * (len 1) ? >[2013/02/11 13:34:50.442502, 5, pid=12326] smbd/filename.c:609(unix_convert) > Wildcard * >[2013/02/11 13:34:50.442527, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [*] [/srv/samba/tmp] >[2013/02/11 13:34:50.442565, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [*] -> [/srv/samba/tmp/*] >[2013/02/11 13:34:50.442591, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: * reduced to /srv/samba/tmp/* >[2013/02/11 13:34:50.442618, 5, pid=12326] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = * >[2013/02/11 13:34:50.442648, 5, pid=12326] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:50.442674, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:50.442702, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:50.442728, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:50.442772, 3, pid=12326] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:50.442799, 4, pid=12326] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = *, attr = 22 >[2013/02/11 13:34:50.442825, 8, pid=12326] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:50.442857, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23d1170 now at offset 0 >[2013/02/11 13:34:50.442895, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: ./. >[2013/02/11 13:34:50.442926, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:50.442953, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:50.442982, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:50.443008, 3, pid=12326] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found ./. fname=. (.) >[2013/02/11 13:34:50.443049, 10, pid=12326] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:50.443077, 10, pid=12326] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:50.443113, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23d1170 now at offset 2147483648 >[2013/02/11 13:34:50.443146, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: ./.. >[2013/02/11 13:34:50.443184, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:50.443211, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:50.443242, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:50.443267, 3, pid=12326] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[*] found ./.. fname=.. (..) >[2013/02/11 13:34:50.443295, 10, pid=12326] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16288 >[2013/02/11 13:34:50.443320, 10, pid=12326] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:50.443362, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23d1170 now at offset -1 >[2013/02/11 13:34:50.443389, 5, pid=12326] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:50.443415, 4, pid=12326] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:50.443457, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 196, useable_space = 16582 >[2013/02/11 13:34:50.443485, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 196, paramsize = 10, datasize = 196 >[2013/02/11 13:34:50.443511, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:50.443526, 5, pid=12326] lib/util.c:342(show_msg) > size=264 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=192 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 196 (0xC4) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 196 (0xC4) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=209 >[2013/02/11 13:34:50.443770, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 02 00 01 00 00 00 60 00 00 00 60 00 00 ........ .`...`.. > [0010] 00 00 00 00 00 8A BD CF 21 54 08 CE 01 8A BD CF ........ !T...... > [0020] 21 54 08 CE 01 8A BD CF 21 54 08 CE 01 8A BD CF !T...... !T...... > [0030] 21 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 !T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 02 00 00 00 00 00 00 ........ ........ > [0050] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ > [0060] 00 00 00 00 00 00 00 00 00 00 00 2E 00 64 00 00 ........ .....d.. > [0070] 00 00 00 00 00 57 7A 9C A0 14 FE CD 01 57 7A 9C .....Wz. .....Wz. > [0080] A0 14 FE CD 01 8A BD CF 21 54 08 CE 01 8A BD CF ........ !T...... > [0090] 21 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 !T...... ........ > [00A0] 00 00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 ........ ........ > [00B0] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ > [00C0] 00 00 00 00 00 00 00 00 00 00 00 2E 00 2E 00 00 ........ ........ > [00D0] 00 . >[2013/02/11 13:34:50.444092, 4, pid=12326] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=* directory=. dirtype=22 numentries=2 >[2013/02/11 13:34:50.444128, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: * -> 0A877AA5 -> _2X68P~X (cache=1) >[2013/02/11 13:34:51.391562, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 86 >[2013/02/11 13:34:51.391673, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x56 >[2013/02/11 13:34:51.391712, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 4 of length 90 (0 toread) >[2013/02/11 13:34:51.391749, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.391770, 5, pid=12326] lib/util.c:342(show_msg) > size=86 > smb_com=0xa2 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=256 > smt_wct=24 > smb_vwv[ 0]= 255 (0xFF) > smb_vwv[ 1]=57054 (0xDEDE) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 5632 (0x1600) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]=33024 (0x8100) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 0 (0x0) > smb_vwv[14]= 0 (0x0) > smb_vwv[15]= 768 (0x300) > smb_vwv[16]= 0 (0x0) > smb_vwv[17]= 256 (0x100) > smb_vwv[18]= 0 (0x0) > smb_vwv[19]= 0 (0x0) > smb_vwv[20]= 0 (0x0) > smb_vwv[21]= 512 (0x200) > smb_vwv[22]= 0 (0x0) > smb_vwv[23]= 768 (0x300) > smb_bcc=3 >[2013/02/11 13:34:51.392346, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 ... >[2013/02/11 13:34:51.392396, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBntcreateX (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:51.392435, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:51.392483, 10, pid=12326] smbd/nttrans.c:500(reply_ntcreate_and_X) > reply_ntcreate_and_X: flags = 0x16, access_mask = 0x81 file_attributes = 0x0, share_access = 0x3, create_disposition = 0x1 create_options = 0x0 root_dir_fid = 0x0, fname = >[2013/02/11 13:34:51.392533, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "" >[2013/02/11 13:34:51.392574, 5, pid=12326] smbd/filename.c:291(unix_convert) > conversion finished "" -> . >[2013/02/11 13:34:51.392610, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:51.392652, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:51.392689, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:51.392731, 10, pid=12326] smbd/open.c:3613(create_file_default) > create_file: access_mask = 0x81 file_attributes = 0x0, share_access = 0x3, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x3 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = . >[2013/02/11 13:34:51.392778, 10, pid=12326] smbd/open.c:3137(create_file_unixpath) > create_file_unixpath: access_mask = 0x81 file_attributes = 0x0, share_access = 0x3, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x3 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = . >[2013/02/11 13:34:51.392829, 5, pid=12326] smbd/files.c:140(file_new) > allocated file structure 5453, fnum = 9549 (1 used) >[2013/02/11 13:34:51.392870, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:51.392912, 3, pid=12326] smbd/dosmode.c:159(unix_mode) > unix_mode(.) returning 0744 >[2013/02/11 13:34:51.392949, 10, pid=12326] smbd/open.c:1615(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x0 access_mask=0x81 share_access=0x3 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=3 private_flags = 0x0 >[2013/02/11 13:34:51.392992, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:51.393054, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:51.393094, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:51.393151, 10, pid=12326] smbd/open.c:1788(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x81 >[2013/02/11 13:34:51.393200, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.393251, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23dfa30 >[2013/02/11 13:34:51.393290, 10, pid=12326] locking/brlock.c:1814(brl_get_locks_internal) > brl_get_locks_internal: 0 current locks on file_id 14:218de02:0 >[2013/02/11 13:34:51.393331, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.393383, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.393423, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23dfc70 >[2013/02/11 13:34:51.393463, 10, pid=12326] smbd/open.c:1160(grant_fsp_oplock_type) > grant_fsp_oplock_type: oplock type 0x3 on file . >[2013/02/11 13:34:51.393501, 4, pid=12326] smbd/open.c:2079(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x0 mode=0744, access_mask = 0x81, open_access_mask = 0x81 >[2013/02/11 13:34:51.393549, 10, pid=12326] smbd/open.c:196(fd_open) > fd_open: name ., flags = 00 mode = 0744, fd = 28. >[2013/02/11 13:34:51.393592, 10, pid=12326] locking/posix.c:516(get_windows_lock_ref_count) > get_windows_lock_count for file . = 0 >[2013/02/11 13:34:51.393631, 10, pid=12326] locking/posix.c:542(delete_windows_lock_ref_count) > delete_windows_lock_ref_count for file . >[2013/02/11 13:34:51.393672, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.393723, 5, pid=12326] smbd/files.c:482(file_free) > freed files structure 9549 (0 used) >[2013/02/11 13:34:51.393761, 5, pid=12326] smbd/open.c:2609(open_directory) > open_directory: opening directory ., access_mask = 0x81, share_access = 0x3 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x10 >[2013/02/11 13:34:51.393804, 10, pid=12326] smbd/posix_acls.c:3440(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2013/02/11 13:34:51.393931, 10, pid=12326] smbd/posix_acls.c:2565(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2013/02/11 13:34:51.393970, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.394013, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.394148, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2013/02/11 13:34:51.394247, 10, pid=12326] smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.394430, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2013/02/11 13:34:51.394469, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:51.394506, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:51.394553, 10, pid=12326] smbd/open.c:139(smbd_check_open_rights) > smbd_check_open_rights: file . requesting 0x81 returning 0x1 (NT_STATUS_OK) >[2013/02/11 13:34:51.394597, 5, pid=12326] smbd/files.c:140(file_new) > allocated file structure 5454, fnum = 9550 (1 used) >[2013/02/11 13:34:51.394638, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:51.394678, 10, pid=12326] smbd/open.c:196(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 28. >[2013/02/11 13:34:51.394722, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.394764, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23e10d0 >[2013/02/11 13:34:51.394806, 10, pid=12326] locking/locking.c:801(unparse_share_modes) > unparse_share_modes: owrt: Mon Feb 11 13:34:28 2013 CET cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num: 1 >[2013/02/11 13:34:51.394864, 10, pid=12326] locking/locking.c:536(print_share_mode_table) > print_share_mode_table: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x81, mid = 0x100, type= 0x0, gen_id = 2359372042, uid = 65534, flags = 0, file_id 14:218de02:0, name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.395064, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.395117, 10, pid=12326] smbd/open.c:3425(create_file_unixpath) > create_file_unixpath: info=1 >[2013/02/11 13:34:51.395154, 10, pid=12326] smbd/open.c:3701(create_file_default) > create_file: info=1 >[2013/02/11 13:34:51.395191, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:51.395239, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:51.395277, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:51.395323, 10, pid=12326] locking/locking.c:663(parse_share_modes) > parse_share_modes: owrt: Mon Feb 11 13:34:28 2013 CET, cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num_share_modes: 1 >[2013/02/11 13:34:51.395380, 10, pid=12326] locking/locking.c:725(parse_share_modes) > parse_share_modes: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x81, mid = 0x100, type= 0x0, gen_id = 2359372042, uid = 65534, flags = 0, file_id 14:218de02:0, name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.395428, 5, pid=12326] smbd/nttrans.c:725(reply_ntcreate_and_X) > reply_ntcreate_and_X: fnum = 9550, open name = . >[2013/02/11 13:34:51.395775, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 84 >[2013/02/11 13:34:51.395819, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x54 >[2013/02/11 13:34:51.395856, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 5 of length 88 (0 toread) >[2013/02/11 13:34:51.395892, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.395913, 5, pid=12326] lib/util.c:342(show_msg) > size=84 > smb_com=0xa0 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=320 > smt_wct=23 > smb_vwv[ 0]= 4 (0x4) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 4096 (0x1000) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]=21504 (0x5400) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 0 (0x0) > smb_vwv[14]= 0 (0x0) > smb_vwv[15]= 0 (0x0) > smb_vwv[16]= 0 (0x0) > smb_vwv[17]= 1024 (0x400) > smb_vwv[18]= 2 (0x2) > smb_vwv[19]=16484 (0x4064) > smb_vwv[20]= 20 (0x14) > smb_vwv[21]= 9550 (0x254E) > smb_vwv[22]= 1 (0x1) > smb_bcc=3 >[2013/02/11 13:34:51.396466, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 ... >[2013/02/11 13:34:51.396512, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBnttrans (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:51.396550, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:51.396589, 10, pid=12326] smbd/nttrans.c:3155(reply_nttrans) > num_setup=8, param_total=0, this_param=0, max_param=0, data_total=0, this_data=0, max_data=16, param_offset=84, data_offset=0 >[2013/02/11 13:34:51.396631, 10, pid=12326] smbd/nttrans.c:3227(reply_nttrans) > reply_nttrans: state->setup_count = 8 >[2013/02/11 13:34:51.396667, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 64 40 14 00 4E 25 01 00 d@..N%.. >[2013/02/11 13:34:51.396718, 10, pid=12326] smbd/nttrans.c:2528(call_nt_transact_ioctl) > call_nt_transact_ioctl: function[0x00144064] FID[0x254E] isFSctl[0x01] compfilter[0x00] >[2013/02/11 13:34:51.396759, 5, pid=12326] smbd/nttrans.c:2282(smb_fsctl) > FSCTL_GET_SHADOW_COPY_DATA: connectpath /srv/samba/tmp, not supported. >[2013/02/11 13:34:51.396799, 3, pid=12326] smbd/error.c:81(error_packet_set) > error packet at smbd/nttrans.c(2561) cmd=160 (SMBnttrans) NT_STATUS_NOT_SUPPORTED >[2013/02/11 13:34:51.396844, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.396865, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0xa0 > smb_rcls=187 > smb_reh=0 > smb_err=49152 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=320 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:51.397078, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:51.397368, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 41 >[2013/02/11 13:34:51.397410, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x29 >[2013/02/11 13:34:51.397447, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 6 of length 45 (0 toread) >[2013/02/11 13:34:51.397488, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.397513, 5, pid=12326] lib/util.c:342(show_msg) > size=41 > smb_com=0x4 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=384 > smt_wct=3 > smb_vwv[ 0]= 9550 (0x254E) > smb_vwv[ 1]=65535 (0xFFFF) > smb_vwv[ 2]=65535 (0xFFFF) > smb_bcc=0 >[2013/02/11 13:34:51.397752, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:51.397774, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBclose (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:51.397812, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:51.397850, 3, pid=12326] smbd/reply.c:4838(reply_close) > close directory fnum=9550 >[2013/02/11 13:34:51.397897, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.397938, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23df570 >[2013/02/11 13:34:51.397974, 10, pid=12326] locking/locking.c:663(parse_share_modes) > parse_share_modes: owrt: Mon Feb 11 13:34:28 2013 CET, cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num_share_modes: 1 >[2013/02/11 13:34:51.398035, 10, pid=12326] locking/locking.c:725(parse_share_modes) > parse_share_modes: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x81, mid = 0x100, type= 0x0, gen_id = 2359372042, uid = 65534, flags = 0, file_id 14:218de02:0, name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.398081, 10, pid=12326] locking/locking.c:1656(get_delete_on_close_token) > get_delete_on_close_token: name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.398124, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.398173, 10, pid=12326] locking/posix.c:516(get_windows_lock_ref_count) > get_windows_lock_count for file . = 0 >[2013/02/11 13:34:51.398211, 10, pid=12326] locking/posix.c:542(delete_windows_lock_ref_count) > delete_windows_lock_ref_count for file . >[2013/02/11 13:34:51.398250, 5, pid=12326] smbd/files.c:482(file_free) > freed files structure 9550 (0 used) >[2013/02/11 13:34:51.398288, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.398309, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0x4 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=384 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:51.398505, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:51.399644, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 88 >[2013/02/11 13:34:51.399689, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x58 >[2013/02/11 13:34:51.399726, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 7 of length 92 (0 toread) >[2013/02/11 13:34:51.399762, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.399783, 5, pid=12326] lib/util.c:342(show_msg) > size=88 > smb_com=0xa2 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=448 > smt_wct=24 > smb_vwv[ 0]= 255 (0xFF) > smb_vwv[ 1]=57054 (0xDEDE) > smb_vwv[ 2]= 512 (0x200) > smb_vwv[ 3]= 4096 (0x1000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]=32768 (0x8000) > smb_vwv[ 8]= 4096 (0x1000) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]=32768 (0x8000) > smb_vwv[14]= 0 (0x0) > smb_vwv[15]= 768 (0x300) > smb_vwv[16]= 0 (0x0) > smb_vwv[17]= 256 (0x100) > smb_vwv[18]= 0 (0x0) > smb_vwv[19]= 0 (0x0) > smb_vwv[20]= 0 (0x0) > smb_vwv[21]= 512 (0x200) > smb_vwv[22]= 0 (0x0) > smb_vwv[23]= 768 (0x300) > smb_bcc=5 >[2013/02/11 13:34:51.400322, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 5C 00 00 00 .\... >[2013/02/11 13:34:51.400356, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBntcreateX (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:51.400386, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:51.400413, 10, pid=12326] smbd/nttrans.c:500(reply_ntcreate_and_X) > reply_ntcreate_and_X: flags = 0x10, access_mask = 0x100080 file_attributes = 0x80, share_access = 0x3, create_disposition = 0x1 create_options = 0x0 root_dir_fid = 0x0, fname = >[2013/02/11 13:34:51.400442, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "" >[2013/02/11 13:34:51.400469, 5, pid=12326] smbd/filename.c:291(unix_convert) > conversion finished "" -> . >[2013/02/11 13:34:51.400494, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:51.400521, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:51.400547, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:51.400573, 10, pid=12326] smbd/open.c:3613(create_file_default) > create_file: access_mask = 0x100080 file_attributes = 0x80, share_access = 0x3, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = . >[2013/02/11 13:34:51.400603, 10, pid=12326] smbd/open.c:3137(create_file_unixpath) > create_file_unixpath: access_mask = 0x100080 file_attributes = 0x80, share_access = 0x3, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = . >[2013/02/11 13:34:51.400633, 5, pid=12326] smbd/files.c:140(file_new) > allocated file structure 5455, fnum = 9551 (1 used) >[2013/02/11 13:34:51.400661, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:51.400688, 3, pid=12326] smbd/dosmode.c:159(unix_mode) > unix_mode(.) returning 0744 >[2013/02/11 13:34:51.400714, 10, pid=12326] smbd/open.c:1615(open_file_ntcreate) > open_file_ntcreate: fname=., dos_attrs=0x80 access_mask=0x100080 share_access=0x3 create_disposition = 0x1 create_options=0x0 unix mode=0744 oplock_request=0 private_flags = 0x0 >[2013/02/11 13:34:51.400742, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:51.400774, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:51.400800, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:51.400826, 10, pid=12326] smbd/open.c:1788(open_file_ntcreate) > open_file_ntcreate: fname=., after mapping access_mask=0x100080 >[2013/02/11 13:34:51.400857, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.400885, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23dfa30 >[2013/02/11 13:34:51.400910, 10, pid=12326] locking/brlock.c:1814(brl_get_locks_internal) > brl_get_locks_internal: 0 current locks on file_id 14:218de02:0 >[2013/02/11 13:34:51.400937, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.400972, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.401000, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23dfc70 >[2013/02/11 13:34:51.401031, 10, pid=12326] smbd/open.c:1122(grant_fsp_oplock_type) > grant_fsp_oplock_type: oplock type 0x0 on file . >[2013/02/11 13:34:51.401059, 4, pid=12326] smbd/open.c:2079(open_file_ntcreate) > calling open_file with flags=0x0 flags2=0x0 mode=0744, access_mask = 0x100080, open_access_mask = 0x100080 >[2013/02/11 13:34:51.401086, 10, pid=12326] smbd/posix_acls.c:3440(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2013/02/11 13:34:51.401121, 10, pid=12326] smbd/posix_acls.c:2565(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2013/02/11 13:34:51.401147, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.401181, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.401247, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2013/02/11 13:34:51.401308, 10, pid=12326] smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.401435, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2013/02/11 13:34:51.401463, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:51.401489, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:51.401518, 10, pid=12326] smbd/open.c:139(smbd_check_open_rights) > smbd_check_open_rights: file . requesting 0x100080 returning 0x100000 (NT_STATUS_OK) >[2013/02/11 13:34:51.401546, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.401578, 5, pid=12326] smbd/files.c:482(file_free) > freed files structure 9551 (0 used) >[2013/02/11 13:34:51.401605, 5, pid=12326] smbd/open.c:2609(open_directory) > open_directory: opening directory ., access_mask = 0x100080, share_access = 0x3 create_options = 0x0, create_disposition = 0x1, file_attributes = 0x90 >[2013/02/11 13:34:51.401634, 10, pid=12326] smbd/posix_acls.c:3440(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2013/02/11 13:34:51.401668, 10, pid=12326] smbd/posix_acls.c:2565(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2013/02/11 13:34:51.401694, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.401723, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.401777, 10, pid=12326] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2013/02/11 13:34:51.401831, 10, pid=12326] smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:51.401968, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2013/02/11 13:34:51.401995, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:51.402020, 10, pid=12326] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:51.402062, 10, pid=12326] smbd/open.c:139(smbd_check_open_rights) > smbd_check_open_rights: file . requesting 0x100080 returning 0x100000 (NT_STATUS_OK) >[2013/02/11 13:34:51.402095, 5, pid=12326] smbd/files.c:140(file_new) > allocated file structure 5456, fnum = 9552 (1 used) >[2013/02/11 13:34:51.402124, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:51.402152, 10, pid=12326] smbd/open.c:196(fd_open) > fd_open: name ., flags = 0200000 mode = 00, fd = 28. >[2013/02/11 13:34:51.402184, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.402213, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c6da0 >[2013/02/11 13:34:51.402240, 10, pid=12326] locking/locking.c:801(unparse_share_modes) > unparse_share_modes: owrt: Mon Feb 11 13:34:28 2013 CET cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num: 1 >[2013/02/11 13:34:51.402280, 10, pid=12326] locking/locking.c:536(print_share_mode_table) > print_share_mode_table: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x100080, mid = 0x1c0, type= 0x0, gen_id = 2359372044, uid = 65534, flags = 0, file_id 14:218de02:0, name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.402310, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.402342, 10, pid=12326] smbd/open.c:3425(create_file_unixpath) > create_file_unixpath: info=1 >[2013/02/11 13:34:51.402368, 10, pid=12326] smbd/open.c:3701(create_file_default) > create_file: info=1 >[2013/02/11 13:34:51.402394, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:51.402425, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:51.402451, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:51.402481, 10, pid=12326] locking/locking.c:663(parse_share_modes) > parse_share_modes: owrt: Mon Feb 11 13:34:28 2013 CET, cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num_share_modes: 1 >[2013/02/11 13:34:51.402519, 10, pid=12326] locking/locking.c:725(parse_share_modes) > parse_share_modes: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x100080, mid = 0x1c0, type= 0x0, gen_id = 2359372044, uid = 65534, flags = 0, file_id 14:218de02:0, name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.402551, 5, pid=12326] smbd/nttrans.c:725(reply_ntcreate_and_X) > reply_ntcreate_and_X: fnum = 9552, open name = . >[2013/02/11 13:34:51.402809, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 84 >[2013/02/11 13:34:51.402840, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x54 >[2013/02/11 13:34:51.402866, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 8 of length 88 (0 toread) >[2013/02/11 13:34:51.402892, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.402907, 5, pid=12326] lib/util.c:342(show_msg) > size=84 > smb_com=0xa0 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=512 > smt_wct=23 > smb_vwv[ 0]= 4 (0x4) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 64 (0x40) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]=21504 (0x5400) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 0 (0x0) > smb_vwv[14]= 0 (0x0) > smb_vwv[15]= 0 (0x0) > smb_vwv[16]= 0 (0x0) > smb_vwv[17]= 1024 (0x400) > smb_vwv[18]= 2 (0x2) > smb_vwv[19]= 168 (0xA8) > smb_vwv[20]= 9 (0x9) > smb_vwv[21]= 9552 (0x2550) > smb_vwv[22]= 1 (0x1) > smb_bcc=3 >[2013/02/11 13:34:51.403298, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 ... >[2013/02/11 13:34:51.403331, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBnttrans (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:51.403358, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:51.403388, 10, pid=12326] smbd/nttrans.c:3155(reply_nttrans) > num_setup=8, param_total=0, this_param=0, max_param=0, data_total=0, this_data=0, max_data=16384, param_offset=84, data_offset=0 >[2013/02/11 13:34:51.403415, 10, pid=12326] smbd/nttrans.c:3227(reply_nttrans) > reply_nttrans: state->setup_count = 8 >[2013/02/11 13:34:51.403441, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] A8 00 09 00 50 25 01 00 ....P%.. >[2013/02/11 13:34:51.403474, 10, pid=12326] smbd/nttrans.c:2528(call_nt_transact_ioctl) > call_nt_transact_ioctl: function[0x000900A8] FID[0x2550] isFSctl[0x01] compfilter[0x00] >[2013/02/11 13:34:51.403501, 10, pid=12326] smbd/nttrans.c:2230(smb_fsctl) > FSCTL_GET_REPARSE_POINT: called on FID[0x2550] Status: NOT_IMPLEMENTED >[2013/02/11 13:34:51.403527, 3, pid=12326] smbd/error.c:81(error_packet_set) > error packet at smbd/nttrans.c(2561) cmd=160 (SMBnttrans) NT_STATUS_NOT_A_REPARSE_POINT >[2013/02/11 13:34:51.403559, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.403574, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0xa0 > smb_rcls=117 > smb_reh=2 > smb_err=49152 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=512 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:51.403712, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:51.403945, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 41 >[2013/02/11 13:34:51.403975, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x29 >[2013/02/11 13:34:51.404001, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 9 of length 45 (0 toread) >[2013/02/11 13:34:51.404026, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.404048, 5, pid=12326] lib/util.c:342(show_msg) > size=41 > smb_com=0x4 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=576 > smt_wct=3 > smb_vwv[ 0]= 9552 (0x2550) > smb_vwv[ 1]=65535 (0xFFFF) > smb_vwv[ 2]=65535 (0xFFFF) > smb_bcc=0 >[2013/02/11 13:34:51.404220, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:51.404236, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBclose (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:51.404262, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:51.404288, 3, pid=12326] smbd/reply.c:4838(reply_close) > close directory fnum=9552 >[2013/02/11 13:34:51.404317, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000002DE >[2013/02/11 13:34:51.404346, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23df570 >[2013/02/11 13:34:51.404371, 10, pid=12326] locking/locking.c:663(parse_share_modes) > parse_share_modes: owrt: Mon Feb 11 13:34:28 2013 CET, cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num_share_modes: 1 >[2013/02/11 13:34:51.404410, 10, pid=12326] locking/locking.c:725(parse_share_modes) > parse_share_modes: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x100080, mid = 0x1c0, type= 0x0, gen_id = 2359372044, uid = 65534, flags = 0, file_id 14:218de02:0, name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.404438, 10, pid=12326] locking/locking.c:1656(get_delete_on_close_token) > get_delete_on_close_token: name_hash = 0x7b0b73a6 >[2013/02/11 13:34:51.404465, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000002DE >[2013/02/11 13:34:51.404497, 10, pid=12326] locking/posix.c:516(get_windows_lock_ref_count) > get_windows_lock_count for file . = 0 >[2013/02/11 13:34:51.404524, 10, pid=12326] locking/posix.c:542(delete_windows_lock_ref_count) > delete_windows_lock_ref_count for file . >[2013/02/11 13:34:51.404551, 5, pid=12326] smbd/files.c:482(file_free) > freed files structure 9552 (0 used) >[2013/02/11 13:34:51.404578, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:51.404596, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0x4 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=576 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:51.404736, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:52.797719, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 70 >[2013/02/11 13:34:52.797809, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x46 >[2013/02/11 13:34:52.797837, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 10 of length 74 (0 toread) >[2013/02/11 13:34:52.797863, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:52.797878, 5, pid=12326] lib/util.c:342(show_msg) > size=70 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=640 > smt_wct=15 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 560 (0x230) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 2 (0x2) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 3 (0x3) > smb_bcc=5 >[2013/02/11 13:34:52.798184, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 05 01 ..... >[2013/02/11 13:34:52.798222, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:52.798249, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:52.798283, 3, pid=12326] smbd/trans2.c:3507(call_trans2qfsinfo) > call_trans2qfsinfo: level = 261 >[2013/02/11 13:34:52.798317, 3, pid=12326] smbd/trans2.c:2945(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 261 >[2013/02/11 13:34:52.798356, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 0, data_sent_thistime = 20, useable_space = 16584 >[2013/02/11 13:34:52.798383, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 0, data_to_send = 20, paramsize = 0, datasize = 20 >[2013/02/11 13:34:52.798409, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:52.798423, 5, pid=12326] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=640 > smt_wct=10 > smb_vwv[ 0]= 0 (0x0) > smb_vwv[ 1]= 20 (0x14) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 20 (0x14) > smb_vwv[ 7]= 56 (0x38) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=21 >[2013/02/11 13:34:52.798671, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 2F 00 01 00 FF 00 00 00 08 00 00 00 4E 00 54 ./...... .....N.T > [0010] 00 46 00 53 00 .F.S. >[2013/02/11 13:34:52.798743, 4, pid=12326] smbd/trans2.c:3523(call_trans2qfsinfo) > SMBtrans2 info_level = 261 >[2013/02/11 13:34:53.501505, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 70 >[2013/02/11 13:34:53.501610, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x46 >[2013/02/11 13:34:53.501638, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 11 of length 74 (0 toread) >[2013/02/11 13:34:53.501664, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.501679, 5, pid=12326] lib/util.c:342(show_msg) > size=70 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=704 > smt_wct=15 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 560 (0x230) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 2 (0x2) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 3 (0x3) > smb_bcc=5 >[2013/02/11 13:34:53.501983, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 05 01 ..... >[2013/02/11 13:34:53.502020, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.502059, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.502090, 3, pid=12326] smbd/trans2.c:3507(call_trans2qfsinfo) > call_trans2qfsinfo: level = 261 >[2013/02/11 13:34:53.502123, 3, pid=12326] smbd/trans2.c:2945(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 261 >[2013/02/11 13:34:53.502162, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 0, data_sent_thistime = 20, useable_space = 16584 >[2013/02/11 13:34:53.502188, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 0, data_to_send = 20, paramsize = 0, datasize = 20 >[2013/02/11 13:34:53.502214, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.502229, 5, pid=12326] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=704 > smt_wct=10 > smb_vwv[ 0]= 0 (0x0) > smb_vwv[ 1]= 20 (0x14) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 20 (0x14) > smb_vwv[ 7]= 56 (0x38) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=21 >[2013/02/11 13:34:53.502473, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 2F 00 01 00 FF 00 00 00 08 00 00 00 4E 00 54 ./...... .....N.T > [0010] 00 46 00 53 00 .F.S. >[2013/02/11 13:34:53.502549, 4, pid=12326] smbd/trans2.c:3523(call_trans2qfsinfo) > SMBtrans2 info_level = 261 >[2013/02/11 13:34:53.502924, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.502955, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.502982, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 12 of length 102 (0 toread) >[2013/02/11 13:34:53.503007, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.503022, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=768 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.503329, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.503403, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.503431, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.503458, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:53.503490, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.503519, 10, pid=12326] smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [NEW FOLDER] >[2013/02/11 13:34:53.503545, 5, pid=12326] smbd/filename.c:416(unix_convert) > unix_convert begin: name = New Folder, dirpath = , start = New Folder >[2013/02/11 13:34:53.503596, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled New Folder ? >[2013/02/11 13:34:53.503622, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component New Folder (len 10) ? >[2013/02/11 13:34:53.503649, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled New Folder ? >[2013/02/11 13:34:53.503674, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component New Folder (len 10) ? >[2013/02/11 13:34:53.503726, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled New Folder ? >[2013/02/11 13:34:53.503753, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component New Folder (len 10) ? >[2013/02/11 13:34:53.503778, 5, pid=12326] smbd/filename.c:781(unix_convert) > New file New Folder >[2013/02/11 13:34:53.503804, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.503838, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.503864, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.503892, 3, pid=12326] smbd/trans2.c:5251(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: SMB_VFS_STAT of New Folder failed (No such file or directory) >[2013/02/11 13:34:53.503944, 3, pid=12326] smbd/error.c:81(error_packet_set) > error packet at smbd/trans2.c(5253) cmd=50 (SMBtrans2) NT_STATUS_OBJECT_NAME_NOT_FOUND >[2013/02/11 13:34:53.503972, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.503987, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0x32 > smb_rcls=52 > smb_reh=0 > smb_err=49152 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=768 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:53.504141, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.504447, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 108 >[2013/02/11 13:34:53.504486, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x6c >[2013/02/11 13:34:53.504513, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 13 of length 112 (0 toread) >[2013/02/11 13:34:53.504540, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.504554, 5, pid=12326] lib/util.c:342(show_msg) > size=108 > smb_com=0xa2 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=832 > smt_wct=24 > smb_vwv[ 0]= 255 (0xFF) > smb_vwv[ 1]=57054 (0xDEDE) > smb_vwv[ 2]= 5632 (0x1600) > smb_vwv[ 3]= 4096 (0x1000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 256 (0x100) > smb_vwv[ 8]= 4096 (0x1000) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]=32768 (0x8000) > smb_vwv[14]= 0 (0x0) > smb_vwv[15]= 768 (0x300) > smb_vwv[16]= 0 (0x0) > smb_vwv[17]= 512 (0x200) > smb_vwv[18]= 0 (0x0) > smb_vwv[19]= 256 (0x100) > smb_vwv[20]= 0 (0x0) > smb_vwv[21]= 512 (0x200) > smb_vwv[22]= 0 (0x0) > smb_vwv[23]= 0 (0x0) > smb_bcc=25 >[2013/02/11 13:34:53.504951, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 5C 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C .\.N.e.w . .F.o.l > [0010] 00 64 00 65 00 72 00 00 00 .d.e.r.. . >[2013/02/11 13:34:53.505007, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBntcreateX (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.505042, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.505070, 10, pid=12326] smbd/nttrans.c:500(reply_ntcreate_and_X) > reply_ntcreate_and_X: flags = 0x10, access_mask = 0x100001 file_attributes = 0x80, share_access = 0x3, create_disposition = 0x2 create_options = 0x1 root_dir_fid = 0x0, fname = New Folder >[2013/02/11 13:34:53.505103, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.505130, 10, pid=12326] smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [NEW FOLDER] >[2013/02/11 13:34:53.505157, 5, pid=12326] smbd/filename.c:416(unix_convert) > unix_convert begin: name = New Folder, dirpath = , start = New Folder >[2013/02/11 13:34:53.505184, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled New Folder ? >[2013/02/11 13:34:53.505209, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component New Folder (len 10) ? >[2013/02/11 13:34:53.505235, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled New Folder ? >[2013/02/11 13:34:53.505260, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component New Folder (len 10) ? >[2013/02/11 13:34:53.505301, 10, pid=12326] smbd/mangle_hash2.c:418(is_mangled) > is_mangled New Folder ? >[2013/02/11 13:34:53.505327, 10, pid=12326] smbd/mangle_hash2.c:357(is_mangled_component) > is_mangled_component New Folder (len 10) ? >[2013/02/11 13:34:53.505353, 5, pid=12326] smbd/filename.c:781(unix_convert) > New file New Folder >[2013/02/11 13:34:53.505378, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.505410, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.505436, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.505462, 10, pid=12326] smbd/open.c:3613(create_file_default) > create_file: access_mask = 0x100001 file_attributes = 0x80, share_access = 0x3, create_disposition = 0x2 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = New Folder >[2013/02/11 13:34:53.505494, 10, pid=12326] smbd/open.c:3137(create_file_unixpath) > create_file_unixpath: access_mask = 0x100001 file_attributes = 0x80, share_access = 0x3, create_disposition = 0x2 create_options = 0x1 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = New Folder >[2013/02/11 13:34:53.505524, 5, pid=12326] smbd/open.c:2609(open_directory) > open_directory: opening directory New Folder, access_mask = 0x100001, share_access = 0x3 create_options = 0x1, create_disposition = 0x2, file_attributes = 0x90 >[2013/02/11 13:34:53.505553, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.505584, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.505610, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.505637, 3, pid=12326] smbd/dosmode.c:159(unix_mode) > unix_mode(New Folder) returning 0755 >[2013/02/11 13:34:53.505775, 10, pid=12326] smbd/dosmode.c:707(file_set_dosmode) > file_set_dosmode: setting dos mode 0x10 on file New Folder >[2013/02/11 13:34:53.505809, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.505841, 8, pid=12326] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:53.505868, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.505894, 10, pid=12326] smbd/dosmode.c:369(set_ea_dos_attribute) > set_ea_dos_attributes: set attribute 0x10, btime = Mon Feb 11 13:34:54 2013 > on file New Folder >[2013/02/11 13:34:53.505985, 10, pid=12326] smbd/dosmode.c:436(set_ea_dos_attribute) > set_ea_dos_attribute: set EA 0x10 on file New Folder >[2013/02/11 13:34:53.506047, 10, pid=12326] smbd/notify_internal.c:930(notify_trigger) > notify_trigger called action=0x1, filter=0x2, path=/srv/samba/tmp/New Folder >[2013/02/11 13:34:53.506088, 5, pid=12326] smbd/files.c:140(file_new) > allocated file structure 5457, fnum = 9553 (1 used) >[2013/02/11 13:34:53.506118, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.506147, 10, pid=12326] smbd/open.c:196(fd_open) > fd_open: name New Folder, flags = 0200000 mode = 00, fd = 28. >[2013/02/11 13:34:53.506180, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000003DE >[2013/02/11 13:34:53.506209, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23e0510 >[2013/02/11 13:34:53.506238, 10, pid=12326] locking/locking.c:801(unparse_share_modes) > unparse_share_modes: owrt: Mon Feb 11 13:34:54 2013 CET cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num: 1 >[2013/02/11 13:34:53.506280, 10, pid=12326] locking/locking.c:536(print_share_mode_table) > print_share_mode_table: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x100081, mid = 0x340, type= 0x0, gen_id = 2359372045, uid = 65534, flags = 0, file_id 14:218de03:0, name_hash = 0x73dbb840 >[2013/02/11 13:34:53.506313, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000003DE >[2013/02/11 13:34:53.506346, 10, pid=12326] smbd/open.c:3425(create_file_unixpath) > create_file_unixpath: info=2 >[2013/02/11 13:34:53.506371, 10, pid=12326] smbd/open.c:3701(create_file_default) > create_file: info=2 >[2013/02/11 13:34:53.506397, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.506438, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.506466, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.506505, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.506531, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.506562, 10, pid=12326] locking/locking.c:663(parse_share_modes) > parse_share_modes: owrt: Mon Feb 11 13:34:54 2013 CET, cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num_share_modes: 1 >[2013/02/11 13:34:53.506601, 10, pid=12326] locking/locking.c:725(parse_share_modes) > parse_share_modes: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x100081, mid = 0x340, type= 0x0, gen_id = 2359372045, uid = 65534, flags = 0, file_id 14:218de03:0, name_hash = 0x73dbb840 >[2013/02/11 13:34:53.506633, 5, pid=12326] smbd/nttrans.c:725(reply_ntcreate_and_X) > reply_ntcreate_and_X: fnum = 9553, open name = New Folder >[2013/02/11 13:34:53.506898, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 41 >[2013/02/11 13:34:53.506932, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x29 >[2013/02/11 13:34:53.506959, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 14 of length 45 (0 toread) >[2013/02/11 13:34:53.506985, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.507000, 5, pid=12326] lib/util.c:342(show_msg) > size=41 > smb_com=0x4 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=896 > smt_wct=3 > smb_vwv[ 0]= 9553 (0x2551) > smb_vwv[ 1]=65535 (0xFFFF) > smb_vwv[ 2]=65535 (0xFFFF) > smb_bcc=0 >[2013/02/11 13:34:53.507180, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.507196, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBclose (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.507223, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.507249, 3, pid=12326] smbd/reply.c:4838(reply_close) > close directory fnum=9553 >[2013/02/11 13:34:53.507279, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 140000000000000003DE >[2013/02/11 13:34:53.507313, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23df570 >[2013/02/11 13:34:53.507340, 10, pid=12326] locking/locking.c:663(parse_share_modes) > parse_share_modes: owrt: Mon Feb 11 13:34:54 2013 CET, cwrt: Thu Jan 1 01:00:00 1970 CET, ntok: 0, num_share_modes: 1 >[2013/02/11 13:34:53.507379, 10, pid=12326] locking/locking.c:725(parse_share_modes) > parse_share_modes: share_mode_entry[0]: pid = 12326, share_access = 0x3, private_options = 0x0, access_mask = 0x100081, mid = 0x340, type= 0x0, gen_id = 2359372045, uid = 65534, flags = 0, file_id 14:218de03:0, name_hash = 0x73dbb840 >[2013/02/11 13:34:53.507408, 10, pid=12326] locking/locking.c:1656(get_delete_on_close_token) > get_delete_on_close_token: name_hash = 0x73dbb840 >[2013/02/11 13:34:53.507438, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 140000000000000003DE >[2013/02/11 13:34:53.507471, 10, pid=12326] locking/posix.c:516(get_windows_lock_ref_count) > get_windows_lock_count for file New Folder = 0 >[2013/02/11 13:34:53.507499, 10, pid=12326] locking/posix.c:542(delete_windows_lock_ref_count) > delete_windows_lock_ref_count for file New Folder >[2013/02/11 13:34:53.507527, 5, pid=12326] smbd/files.c:482(file_free) > freed files structure 9553 (0 used) >[2013/02/11 13:34:53.507554, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.507569, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0x4 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=896 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:53.507708, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.508745, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 104 >[2013/02/11 13:34:53.508782, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x68 >[2013/02/11 13:34:53.508808, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 15 of length 108 (0 toread) >[2013/02/11 13:34:53.508834, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.508848, 5, pid=12326] lib/util.c:342(show_msg) > size=104 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=960 > smt_wct=15 > smb_vwv[ 0]= 36 (0x24) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 36 (0x24) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=39 >[2013/02/11 13:34:53.509179, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 07 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C 00 64 .N.e.w. .F.o.l.d > [0020] 00 65 00 72 00 00 00 .e.r... >[2013/02/11 13:34:53.509257, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.509284, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.509313, 3, pid=12326] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=1, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:53.509344, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.509372, 10, pid=12326] smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [NEW FOLDER] >[2013/02/11 13:34:53.509398, 5, pid=12326] smbd/filename.c:416(unix_convert) > unix_convert begin: name = New Folder, dirpath = , start = New Folder >[2013/02/11 13:34:53.509429, 5, pid=12326] smbd/statcache.c:143(stat_cache_add) > stat_cache_add: Added entry (23df690:size a) NEW FOLDER -> New Folder >[2013/02/11 13:34:53.509459, 5, pid=12326] smbd/filename.c:439(unix_convert) > conversion of base_name finished New Folder -> New Folder >[2013/02/11 13:34:53.509486, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.509519, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.509545, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.509572, 5, pid=12326] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = New Folder >[2013/02/11 13:34:53.509598, 5, pid=12326] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:53.509624, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:53.509653, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:53.509679, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:53.509711, 3, pid=12326] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:53.509738, 4, pid=12326] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = New Folder, attr = 22 >[2013/02/11 13:34:53.509764, 8, pid=12326] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:53.509798, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23bf570 now at offset -1 >[2013/02/11 13:34:53.509827, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: ./New Folder >[2013/02/11 13:34:53.509868, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: ./New Folder attr = 0x10 >[2013/02/11 13:34:53.509896, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file ./New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.509935, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.509962, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.509993, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.510019, 3, pid=12326] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[New Folder] found ./New Folder fname=New Folder (New Folder) >[2013/02/11 13:34:53.510055, 10, pid=12326] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:53.510081, 10, pid=12326] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:53.510112, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.510147, 5, pid=12326] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:53.510174, 4, pid=12326] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:53.510204, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 116, useable_space = 16582 >[2013/02/11 13:34:53.510234, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 116, paramsize = 10, datasize = 116 >[2013/02/11 13:34:53.510260, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.510275, 5, pid=12326] lib/util.c:342(show_msg) > size=184 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=960 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 116 (0x74) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 116 (0x74) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=129 >[2013/02/11 13:34:53.510525, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 01 00 01 00 00 00 00 00 00 00 74 00 00 ........ .....t.. > [0010] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0020] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0030] 31 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 1T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 14 00 00 00 00 00 00 ........ ........ > [0050] 00 10 00 4E 00 55 00 4A 00 52 00 48 00 57 00 7E ...N.U.J .R.H.W.~ > [0060] 00 37 00 00 00 00 00 00 00 00 00 4E 00 65 00 77 .7...... ...N.e.w > [0070] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0080] 00 . >[2013/02/11 13:34:53.510738, 4, pid=12326] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=New Folder directory=. dirtype=22 numentries=1 >[2013/02/11 13:34:53.510768, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.511095, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.511129, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.511156, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 16 of length 102 (0 toread) >[2013/02/11 13:34:53.511181, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.511196, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1024 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.511495, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.511569, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.511595, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.511622, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:53.511650, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.511676, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.511704, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.511733, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.511759, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.511788, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.511817, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.511842, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:53.511873, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:53.511900, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.511935, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.511962, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.512001, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.512032, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.512063, 10, pid=12326] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:53.512089, 5, pid=12326] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:54 2013 > access: Mon Feb 11 13:34:54 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:53.512171, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:53.512197, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:53.512223, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.512237, 5, pid=12326] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1024 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:53.512483, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0010] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:53.512787, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 70 >[2013/02/11 13:34:53.512823, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x46 >[2013/02/11 13:34:53.512850, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 17 of length 74 (0 toread) >[2013/02/11 13:34:53.512876, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.512891, 5, pid=12326] lib/util.c:342(show_msg) > size=70 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1088 > smt_wct=15 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 560 (0x230) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 2 (0x2) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 3 (0x3) > smb_bcc=5 >[2013/02/11 13:34:53.513199, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 02 01 ..... >[2013/02/11 13:34:53.513233, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.513259, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.513286, 3, pid=12326] smbd/trans2.c:3507(call_trans2qfsinfo) > call_trans2qfsinfo: level = 258 >[2013/02/11 13:34:53.513314, 3, pid=12326] smbd/trans2.c:2945(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 258 >[2013/02/11 13:34:53.513350, 5, pid=12326] smbd/trans2.c:3087(smbd_do_qfsinfo) > smbd_do_qfsinfo : SMB_QUERY_FS_VOLUME_INFO namelen = 4, vol=guru serv=guru >[2013/02/11 13:34:53.513379, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 0, data_sent_thistime = 26, useable_space = 16584 >[2013/02/11 13:34:53.513405, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 0, data_to_send = 26, paramsize = 0, datasize = 26 >[2013/02/11 13:34:53.513434, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.513448, 5, pid=12326] lib/util.c:342(show_msg) > size=82 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1088 > smt_wct=10 > smb_vwv[ 0]= 0 (0x0) > smb_vwv[ 1]= 26 (0x1A) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 26 (0x1A) > smb_vwv[ 7]= 56 (0x38) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=27 >[2013/02/11 13:34:53.513694, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 00 00 00 00 41 D0 2D 11 08 00 00 ........ .A.-.... > [0010] 00 00 00 67 00 75 00 72 00 75 00 ...g.u.r .u. >[2013/02/11 13:34:53.513760, 4, pid=12326] smbd/trans2.c:3523(call_trans2qfsinfo) > SMBtrans2 info_level = 258 >[2013/02/11 13:34:53.513937, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.513967, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.513993, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 18 of length 102 (0 toread) >[2013/02/11 13:34:53.514019, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.514041, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1152 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 104 (0x68) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.514340, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.514414, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.514441, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.514467, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:53.514495, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.514522, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.514550, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.514579, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.514605, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.514634, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.514664, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.514693, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:53.514721, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1004 max_data=104 >[2013/02/11 13:34:53.514747, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.514782, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.514810, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.514849, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.514875, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.514903, 10, pid=12326] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:53.514928, 5, pid=12326] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:54 2013 > access: Mon Feb 11 13:34:54 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:53.515010, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:53.515042, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:53.515068, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.515083, 5, pid=12326] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1152 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:53.515329, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0010] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:53.515598, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.515633, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.515659, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 19 of length 102 (0 toread) >[2013/02/11 13:34:53.515688, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.515703, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1216 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 64 (0x40) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.516003, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 ED 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.516085, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.516116, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.516143, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1005 >[2013/02/11 13:34:53.516171, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.516198, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.516226, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.516255, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.516281, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.516310, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.516340, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.516365, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1005 call=5 total_data=0 >[2013/02/11 13:34:53.516392, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1005 max_data=64 >[2013/02/11 13:34:53.516419, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.516454, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.516481, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.516520, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.516546, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.516575, 10, pid=12326] smbd/trans2.c:4493(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_STANDARD_INFORMATION >[2013/02/11 13:34:53.516601, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 24, useable_space = 16582 >[2013/02/11 13:34:53.516627, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 24, paramsize = 2, datasize = 24 >[2013/02/11 13:34:53.516653, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.516667, 5, pid=12326] lib/util.c:342(show_msg) > size=84 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1216 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 24 (0x18) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 24 (0x18) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=29 >[2013/02/11 13:34:53.516914, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........ > [0010] 00 00 00 00 00 01 00 00 00 00 01 00 00 ........ ..... >[2013/02/11 13:34:53.517159, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.517195, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.517222, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 20 of length 102 (0 toread) >[2013/02/11 13:34:53.517248, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.517263, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1280 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.517568, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EE 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.517642, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.517669, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.517695, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1006 >[2013/02/11 13:34:53.517723, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.517749, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.517778, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.517807, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.517832, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.517861, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.517890, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.517916, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1006 call=5 total_data=0 >[2013/02/11 13:34:53.517943, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1006 max_data=40 >[2013/02/11 13:34:53.517970, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.518004, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.518036, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.518078, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.518104, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.518135, 10, pid=12326] smbd/trans2.c:4635(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_INTERNAL_INFORMATION >[2013/02/11 13:34:53.518161, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 8, useable_space = 16582 >[2013/02/11 13:34:53.518187, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 8, paramsize = 2, datasize = 8 >[2013/02/11 13:34:53.518213, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.518227, 5, pid=12326] lib/util.c:342(show_msg) > size=68 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1280 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 8 (0x8) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 8 (0x8) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=13 >[2013/02/11 13:34:53.518476, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 03 DE 18 02 00 00 00 00 ........ ..... >[2013/02/11 13:34:53.518696, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.518730, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.518757, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 21 of length 102 (0 toread) >[2013/02/11 13:34:53.518782, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.518797, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1344 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 32 (0x20) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.519110, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EF 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.519185, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.519211, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.519238, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1007 >[2013/02/11 13:34:53.519265, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.519292, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.519320, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.519349, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.519374, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.519403, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.519435, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.519461, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1007 call=5 total_data=0 >[2013/02/11 13:34:53.519488, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1007 max_data=32 >[2013/02/11 13:34:53.519515, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.519550, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.519577, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.519616, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.519642, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.519670, 10, pid=12326] smbd/trans2.c:4508(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_EA_INFORMATION >[2013/02/11 13:34:53.519700, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 4, useable_space = 16582 >[2013/02/11 13:34:53.519726, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 4, paramsize = 2, datasize = 4 >[2013/02/11 13:34:53.519752, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.519767, 5, pid=12326] lib/util.c:342(show_msg) > size=64 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1344 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 4 (0x4) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 4 (0x4) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=9 >[2013/02/11 13:34:53.520014, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 00 00 00 00 ........ . >[2013/02/11 13:34:53.520525, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 104 >[2013/02/11 13:34:53.520559, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x68 >[2013/02/11 13:34:53.520586, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 22 of length 108 (0 toread) >[2013/02/11 13:34:53.520611, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.520626, 5, pid=12326] lib/util.c:342(show_msg) > size=104 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1408 > smt_wct=15 > smb_vwv[ 0]= 36 (0x24) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 36 (0x24) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=39 >[2013/02/11 13:34:53.520927, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 07 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C 00 64 .N.e.w. .F.o.l.d > [0020] 00 65 00 72 00 00 00 .e.r... >[2013/02/11 13:34:53.521004, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.521042, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.521073, 3, pid=12326] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=1, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:53.521103, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.521130, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.521158, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.521187, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.521213, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.521239, 5, pid=12326] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = New Folder >[2013/02/11 13:34:53.521265, 5, pid=12326] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:53.521290, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:53.521318, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:53.521346, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:53.521377, 3, pid=12326] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:53.521403, 4, pid=12326] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = New Folder, attr = 22 >[2013/02/11 13:34:53.521432, 8, pid=12326] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:53.521464, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23bf570 now at offset -1 >[2013/02/11 13:34:53.521492, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: ./New Folder >[2013/02/11 13:34:53.521527, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: ./New Folder attr = 0x10 >[2013/02/11 13:34:53.521555, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file ./New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.521594, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.521620, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.521649, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.521675, 3, pid=12326] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[New Folder] found ./New Folder fname=New Folder (New Folder) >[2013/02/11 13:34:53.521704, 10, pid=12326] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:53.521729, 10, pid=12326] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:53.521757, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.521787, 5, pid=12326] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:53.521813, 4, pid=12326] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:53.521841, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 116, useable_space = 16582 >[2013/02/11 13:34:53.521868, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 116, paramsize = 10, datasize = 116 >[2013/02/11 13:34:53.521894, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.521908, 5, pid=12326] lib/util.c:342(show_msg) > size=184 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1408 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 116 (0x74) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 116 (0x74) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=129 >[2013/02/11 13:34:53.522163, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 01 00 01 00 00 00 00 00 00 00 74 00 00 ........ .....t.. > [0010] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0020] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0030] 31 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 1T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 14 00 00 00 00 00 00 ........ ........ > [0050] 00 10 00 4E 00 55 00 4A 00 52 00 48 00 57 00 7E ...N.U.J .R.H.W.~ > [0060] 00 37 00 00 00 00 00 00 00 00 00 4E 00 65 00 77 .7...... ...N.e.w > [0070] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0080] 00 . >[2013/02/11 13:34:53.522373, 4, pid=12326] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=New Folder directory=. dirtype=22 numentries=1 >[2013/02/11 13:34:53.522406, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.523099, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 104 >[2013/02/11 13:34:53.523139, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x68 >[2013/02/11 13:34:53.523165, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 23 of length 108 (0 toread) >[2013/02/11 13:34:53.523191, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.523206, 5, pid=12326] lib/util.c:342(show_msg) > size=104 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1472 > smt_wct=15 > smb_vwv[ 0]= 36 (0x24) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 36 (0x24) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=39 >[2013/02/11 13:34:53.523506, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 07 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C 00 64 .N.e.w. .F.o.l.d > [0020] 00 65 00 72 00 00 00 .e.r... >[2013/02/11 13:34:53.523583, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.523609, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.523636, 3, pid=12326] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=1, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:53.523666, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.523693, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.523721, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.523749, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.523775, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.523801, 5, pid=12326] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = New Folder >[2013/02/11 13:34:53.523827, 5, pid=12326] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:53.523852, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:53.523879, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:53.523904, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:53.523934, 3, pid=12326] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:53.523960, 4, pid=12326] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = New Folder, attr = 22 >[2013/02/11 13:34:53.523986, 8, pid=12326] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:53.524017, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23bf570 now at offset -1 >[2013/02/11 13:34:53.524053, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: ./New Folder >[2013/02/11 13:34:53.524088, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: ./New Folder attr = 0x10 >[2013/02/11 13:34:53.524120, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file ./New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.524159, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.524185, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.524214, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.524240, 3, pid=12326] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[New Folder] found ./New Folder fname=New Folder (New Folder) >[2013/02/11 13:34:53.524269, 10, pid=12326] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:53.524294, 10, pid=12326] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:53.524322, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.524351, 5, pid=12326] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:53.524377, 4, pid=12326] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:53.524405, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 116, useable_space = 16582 >[2013/02/11 13:34:53.524432, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 116, paramsize = 10, datasize = 116 >[2013/02/11 13:34:53.524458, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.524472, 5, pid=12326] lib/util.c:342(show_msg) > size=184 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1472 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 116 (0x74) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 116 (0x74) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=129 >[2013/02/11 13:34:53.524717, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 01 00 01 00 00 00 00 00 00 00 74 00 00 ........ .....t.. > [0010] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0020] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0030] 31 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 1T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 14 00 00 00 00 00 00 ........ ........ > [0050] 00 10 00 4E 00 55 00 4A 00 52 00 48 00 57 00 7E ...N.U.J .R.H.W.~ > [0060] 00 37 00 00 00 00 00 00 00 00 00 4E 00 65 00 77 .7...... ...N.e.w > [0070] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0080] 00 . >[2013/02/11 13:34:53.524926, 4, pid=12326] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=New Folder directory=. dirtype=22 numentries=1 >[2013/02/11 13:34:53.524956, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.526253, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 104 >[2013/02/11 13:34:53.526364, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x68 >[2013/02/11 13:34:53.526403, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 24 of length 108 (0 toread) >[2013/02/11 13:34:53.526440, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.526461, 5, pid=12326] lib/util.c:342(show_msg) > size=104 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1536 > smt_wct=15 > smb_vwv[ 0]= 36 (0x24) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 36 (0x24) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=39 >[2013/02/11 13:34:53.526897, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 07 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C 00 64 .N.e.w. .F.o.l.d > [0020] 00 65 00 72 00 00 00 .e.r... >[2013/02/11 13:34:53.527009, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.527058, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.527103, 3, pid=12326] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=1, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:53.527151, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.527193, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.527240, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.527285, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.527322, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.527360, 5, pid=12326] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = New Folder >[2013/02/11 13:34:53.527397, 5, pid=12326] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:53.527433, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:53.527473, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:53.527509, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:53.527557, 3, pid=12326] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:53.527595, 4, pid=12326] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = New Folder, attr = 22 >[2013/02/11 13:34:53.527632, 8, pid=12326] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:53.527680, 6, pid=12326] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23bf570 now at offset -1 >[2013/02/11 13:34:53.527721, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: ./New Folder >[2013/02/11 13:34:53.527791, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: ./New Folder attr = 0x10 >[2013/02/11 13:34:53.527830, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file ./New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.527887, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.527924, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.527974, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.528011, 3, pid=12326] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[New Folder] found ./New Folder fname=New Folder (New Folder) >[2013/02/11 13:34:53.528062, 10, pid=12326] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:53.528100, 10, pid=12326] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:53.528148, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.528196, 5, pid=12326] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:53.528234, 4, pid=12326] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:53.528277, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 116, useable_space = 16582 >[2013/02/11 13:34:53.528315, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 116, paramsize = 10, datasize = 116 >[2013/02/11 13:34:53.528352, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.528373, 5, pid=12326] lib/util.c:342(show_msg) > size=184 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1536 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 116 (0x74) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 116 (0x74) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=129 >[2013/02/11 13:34:53.528722, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 01 00 01 00 00 00 00 00 00 00 74 00 00 ........ .....t.. > [0010] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0020] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0030] 31 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 1T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 14 00 00 00 00 00 00 ........ ........ > [0050] 00 10 00 4E 00 55 00 4A 00 52 00 48 00 57 00 7E ...N.U.J .R.H.W.~ > [0060] 00 37 00 00 00 00 00 00 00 00 00 4E 00 65 00 77 .7...... ...N.e.w > [0070] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0080] 00 . >[2013/02/11 13:34:53.529054, 4, pid=12326] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=New Folder directory=. dirtype=22 numentries=1 >[2013/02/11 13:34:53.529099, 10, pid=12326] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:53.529400, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.529430, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.529456, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 25 of length 102 (0 toread) >[2013/02/11 13:34:53.529482, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.529497, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1600 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.529797, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.529871, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.529897, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.529927, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:53.529956, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.529982, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.530010, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.530045, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.530071, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.530101, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.530131, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.530156, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:53.530184, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:53.530210, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.530245, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.530272, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.530311, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.530337, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.530366, 10, pid=12326] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:53.530392, 5, pid=12326] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:54 2013 > access: Mon Feb 11 13:34:54 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:53.530474, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:53.530500, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:53.530526, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.530541, 5, pid=12326] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1600 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:53.530788, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0010] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:53.531095, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:53.531128, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:53.531154, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 26 of length 102 (0 toread) >[2013/02/11 13:34:53.531180, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.531198, 5, pid=12326] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1664 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:53.531497, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:53.531571, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.531597, 4, pid=12326] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:53.531624, 3, pid=12326] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:53.531651, 5, pid=12326] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:53.531678, 10, pid=12326] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:53.531706, 3, pid=12326] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:53.531735, 10, pid=12326] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:53.531761, 3, pid=12326] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:53.531790, 10, pid=12326] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:53.531819, 10, pid=12326] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.531844, 3, pid=12326] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:53.531872, 5, pid=12326] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:53.531898, 8, pid=12326] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:53.531932, 10, pid=12326] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:53.531960, 10, pid=12326] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:53.531998, 8, pid=12326] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:53.532025, 8, pid=12326] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.532060, 10, pid=12326] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:53.532086, 5, pid=12326] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:54 2013 > access: Mon Feb 11 13:34:54 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:53.532168, 9, pid=12326] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:53.532194, 9, pid=12326] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:53.532220, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.532238, 5, pid=12326] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=1664 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:53.532483, 10, pid=12326] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0010] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:53.543165, 10, pid=12326] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 35 >[2013/02/11 13:34:53.543201, 6, pid=12326] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x23 >[2013/02/11 13:34:53.543227, 3, pid=12326] smbd/process.c:1662(process_smb) > Transaction 27 of length 39 (0 toread) >[2013/02/11 13:34:53.543253, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.543268, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0x71 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=1728 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:53.543407, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.543423, 3, pid=12326] smbd/process.c:1467(switch_message) > switch message SMBtdis (pid 12326) conn 0x23d1b00 >[2013/02/11 13:34:53.543450, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.543476, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.543501, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.543551, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.543585, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.543611, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.543636, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.543675, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.543701, 1, pid=12326] smbd/service.c:1378(close_cnum) > 192.168.52.63 (192.168.52.63) closed connection to service guru >[2013/02/11 13:34:53.543730, 3, pid=12326] smbd/connection.c:35(yield_connection) > Yielding connection to guru >[2013/02/11 13:34:53.543791, 10, pid=12326] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 26300000FFFFFFFF3EBF >[2013/02/11 13:34:53.543823, 10, pid=12326] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23df560 >[2013/02/11 13:34:53.543859, 10, pid=12326] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 26300000FFFFFFFF3EBF >[2013/02/11 13:34:53.543923, 4, pid=12326] smbd/vfs.c:780(vfs_ChDir) > vfs_ChDir to / >[2013/02/11 13:34:53.543951, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.543977, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.544002, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.544068, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.544104, 5, pid=12326] lib/messages.c:332(messaging_deregister) > Deregistering messaging pointer for type 784 - private_data=0x23c7220 >[2013/02/11 13:34:53.544151, 5, pid=12326] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.544169, 5, pid=12326] lib/util.c:342(show_msg) > size=35 > smb_com=0x71 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=1728 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:53.544337, 10, pid=12326] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.545939, 5, pid=12326] lib/util_sock.c:319(read_fd_with_timeout) > read_fd_with_timeout: blocking read. EOF from client. >[2013/02/11 13:34:53.545975, 5, pid=12326] smbd/process.c:457(receive_smb_talloc) > receive_smb_raw_talloc failed for client 192.168.52.63 read error = NT_STATUS_END_OF_FILE. >[2013/02/11 13:34:53.546011, 4, pid=12326] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.546051, 5, pid=12326] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.546082, 5, pid=12326] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.546130, 5, pid=12326] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.546221, 3, pid=12326] smbd/server_exit.c:181(exit_server_common) > Server exit (failed to receive smb request) >[2013/02/11 13:34:53.547315, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 26300000FFFFFFFF >[2013/02/11 13:34:53.547443, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d31c0 >[2013/02/11 13:34:53.547498, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 26300000FFFFFFFF >[2013/02/11 13:34:53.550259, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 29300000FFFFFFFF >[2013/02/11 13:34:53.550353, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d2940 >[2013/02/11 13:34:53.550399, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 29300000FFFFFFFF >[2013/02/11 13:34:53.550444, 5, pid=12329] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 >[2013/02/11 13:34:53.550530, 10, pid=12330] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > Locking key 2A300000FFFFFFFF > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 >[2013/02/11 13:34:53.550611, 10, pid=12330] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > SO_SNDTIMEO = 0 > Allocated locked data 0x0x23d2940 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:53.550654, 10, pid=12330] lib/dbwrap_tdb.c:44(db_tdb_record_destr) >[2013/02/11 13:34:53.550656, 5, pid=12329] lib/util_sock.c:165(print_socket_options) > Unlocking key 2A300000FFFFFFFF > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 >[2013/02/11 13:34:53.550696, 5, pid=12330] lib/util_sock.c:165(print_socket_options) > SO_BROADCAST = 0 > Socket options: > TCP_NODELAY = 1 > SO_KEEPALIVE = 1 > TCP_KEEPCNT = 9 > SO_REUSEADDR = 1 > TCP_KEEPIDLE = 7200 > SO_BROADCAST = 0 > TCP_KEEPINTVL = 75 > TCP_NODELAY = 1 > IPTOS_LOWDELAY = 0 > TCP_KEEPCNT = 9 > IPTOS_THROUGHPUT = 0 > TCP_KEEPIDLE = 7200 > SO_SNDBUF = 23400 > TCP_KEEPINTVL = 75 > SO_RCVBUF = 87380 > IPTOS_LOWDELAY = 0 > SO_SNDLOWAT = 1 > IPTOS_THROUGHPUT = 0 > SO_RCVLOWAT = 1 > SO_SNDBUF = 23400 > SO_SNDTIMEO = 0 > SO_RCVBUF = 87380 > SO_RCVTIMEO = 0 > SO_SNDLOWAT = 1 > TCP_QUICKACK = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:53.550906, 5, pid=12330] lib/util_sock.c:165(print_socket_options) > Socket options: >[2013/02/11 13:34:53.550922, 6, pid=12329] param/loadparm.c:7490(lp_file_list_changed) > SO_KEEPALIVE = 1 > lp_file_list_changed() > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > TCP_NODELAY = 1 > > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 >[2013/02/11 13:34:53.550993, 3, pid=12329] lib/access.c:338(allow_access) > TCP_KEEPINTVL = 75 > Allowed connection from 192.168.52.63 (192.168.52.63) > IPTOS_LOWDELAY = 0 >[2013/02/11 13:34:53.551021, 10, pid=12329] smbd/process.c:3020(smbd_process) > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > Connection allowed from ipv4:192.168.52.63:1055 to ipv4:192.168.178.30:445 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 >[2013/02/11 13:34:53.551086, 3, pid=12329] smbd/oplock.c:922(init_oplocks) > SO_RCVTIMEO = 0 > init_oplocks: initializing messages. > TCP_QUICKACK = 1 >[2013/02/11 13:34:53.551167, 6, pid=12330] param/loadparm.c:7490(lp_file_list_changed) >[2013/02/11 13:34:53.551172, 3, pid=12329] smbd/oplock_linux.c:239(linux_init_kernel_oplocks) > lp_file_list_changed() > Linux kernel oplocks enabled > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 >[2013/02/11 13:34:53.551205, 5, pid=12329] lib/messages.c:332(messaging_deregister) > > Deregistering messaging pointer for type 1 - private_data=(nil) >[2013/02/11 13:34:53.551232, 3, pid=12330] lib/access.c:338(allow_access) >[2013/02/11 13:34:53.551240, 10, pid=12329] smbd/process.c:920(event_add_idle) > Allowed connection from 192.168.52.63 (192.168.52.63) > event_add_idle: idle_evt(keepalive) 0x23bd1b0 >[2013/02/11 13:34:53.551260, 10, pid=12330] smbd/process.c:3020(smbd_process) >[2013/02/11 13:34:53.551268, 10, pid=12329] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x23ce820 > Connection allowed from ipv4:192.168.52.63:1056 to ipv4:192.168.178.30:139 >[2013/02/11 13:34:53.551296, 10, pid=12329] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x23b3750 >[2013/02/11 13:34:53.551308, 3, pid=12330] smbd/oplock.c:922(init_oplocks) > init_oplocks: initializing messages. >[2013/02/11 13:34:53.551350, 10, pid=12329] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 133 >[2013/02/11 13:34:53.551377, 3, pid=12330] smbd/oplock_linux.c:239(linux_init_kernel_oplocks) >[2013/02/11 13:34:53.551384, 6, pid=12329] smbd/process.c:1660(process_smb) > Linux kernel oplocks enabled > got message type 0x0 of len 0x85 >[2013/02/11 13:34:53.551407, 5, pid=12330] lib/messages.c:332(messaging_deregister) >[2013/02/11 13:34:53.551411, 3, pid=12329] smbd/process.c:1662(process_smb) > Deregistering messaging pointer for type 1 - private_data=(nil) > Transaction 0 of length 137 (0 toread) >[2013/02/11 13:34:53.551439, 10, pid=12330] smbd/process.c:920(event_add_idle) >[2013/02/11 13:34:53.551441, 5, pid=12329] lib/util.c:332(show_msg) > event_add_idle: idle_evt(keepalive) 0x23bd1b0 >[2013/02/11 13:34:53.551457, 5, pid=12329] lib/util.c:342(show_msg) >[2013/02/11 13:34:53.551467, 10, pid=12330] smbd/process.c:920(event_add_idle) > size=133 > event_add_idle: idle_evt(deadtime) 0x23ce820 > smb_com=0x72 > smb_rcls=0 >[2013/02/11 13:34:53.551495, 10, pid=12330] smbd/process.c:920(event_add_idle) > smb_reh=0 > event_add_idle: idle_evt(housekeeping) 0x23b3750 > smb_err=0 > smb_flg=24 > smb_flg2=51283 > smb_tid=0 >[2013/02/11 13:34:53.551548, 10, pid=12330] lib/util_sock.c:519(read_smb_length_return_keepalive) > smb_pid=65279 > got smb length of 68 > smb_uid=0 > smb_mid=0 >[2013/02/11 13:34:53.551581, 6, pid=12330] smbd/process.c:1660(process_smb) > smt_wct=0 > got message type 0x81 of len 0x44 > smb_bcc=98 >[2013/02/11 13:34:53.551609, 3, pid=12330] smbd/process.c:1662(process_smb) >[2013/02/11 13:34:53.551614, 10, pid=12329] ../lib/util/util.c:415(dump_data) > Transaction 0 of length 72 (0 toread) > [0000] 02 50 43 20 4E 45 54 57 4F 52 4B 20 50 52 4F 47 .PC NETW ORK PROG >[2013/02/11 13:34:53.551643, 2, pid=12330] smbd/reply.c:553(reply_special) > netbios connect: name1=*SMBSERV0x0 name2=WINXP 0x0 > [0010] 52 41 4D 20 31 2E 30 00 02 4C 41 4E 4D 41 4E 31 RAM 1.0. .LANMAN1 >[2013/02/11 13:34:53.551681, 2, pid=12330] smbd/reply.c:573(reply_special) > [0020] 2E 30 00 02 57 69 6E 64 6F 77 73 20 66 6F 72 20 .0..Wind ows for > netbios connect: local=_smbserv remote=winxp, name type = 0 > [0030] 57 6F 72 6B 67 72 6F 75 70 73 20 33 2E 31 61 00 Workgrou ps 3.1a. >[2013/02/11 13:34:53.551712, 5, pid=12330] lib/username.c:171(Get_Pwnam_alloc) > Finding user winxp > [0040] 02 4C 4D 31 2E 32 58 30 30 32 00 02 4C 41 4E 4D .LM1.2X0 02..LANM >[2013/02/11 13:34:53.551741, 5, pid=12330] lib/username.c:116(Get_Pwnam_internals) > [0050] 41 4E 32 2E 31 00 02 4E 54 20 4C 4D 20 30 2E 31 AN2.1..N T LM 0.1 > Trying _Get_Pwnam(), username as lowercase is winxp > [0060] 32 00 2. >[2013/02/11 13:34:53.551786, 3, pid=12329] smbd/process.c:1467(switch_message) > switch message SMBnegprot (pid 12329) conn 0x0 >[2013/02/11 13:34:53.551816, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.551845, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.551874, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.551920, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.552179, 3, pid=12329] smbd/negprot.c:598(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2013/02/11 13:34:53.552214, 3, pid=12329] smbd/negprot.c:598(reply_negprot) > Requested protocol [LANMAN1.0] >[2013/02/11 13:34:53.552241, 3, pid=12329] smbd/negprot.c:598(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2013/02/11 13:34:53.552268, 3, pid=12329] smbd/negprot.c:598(reply_negprot) > Requested protocol [LM1.2X002] >[2013/02/11 13:34:53.552295, 3, pid=12329] smbd/negprot.c:598(reply_negprot) > Requested protocol [LANMAN2.1] >[2013/02/11 13:34:53.552321, 3, pid=12329] smbd/negprot.c:598(reply_negprot) > Requested protocol [NT LM 0.12] >[2013/02/11 13:34:53.552350, 10, pid=12329] lib/util.c:1624(set_remote_arch) > set_remote_arch: Client arch is 'Win2K' >[2013/02/11 13:34:53.552382, 6, pid=12329] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:53.552437, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 29300000FFFFFFFF >[2013/02/11 13:34:53.552469, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d59d0 >[2013/02/11 13:34:53.552496, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 29300000FFFFFFFF >[2013/02/11 13:34:53.552534, 6, pid=12329] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:53.552599, 10, pid=12329] smbd/negprot.c:44(get_challenge) > get challenge: creating negprot_global_auth_context >[2013/02/11 13:34:53.552627, 5, pid=12329] auth/auth.c:508(make_auth_context_subsystem) > Making default auth method list for security=share, encrypt passwords = yes >[2013/02/11 13:34:53.552659, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam >[2013/02/11 13:34:53.552688, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam' >[2013/02/11 13:34:53.552714, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2013/02/11 13:34:53.552740, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2013/02/11 13:34:53.552767, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend unix >[2013/02/11 13:34:53.552793, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'unix' >[2013/02/11 13:34:53.552822, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend winbind >[2013/02/11 13:34:53.552848, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'winbind' >[2013/02/11 13:34:53.552873, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend wbc >[2013/02/11 13:34:53.552899, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'wbc' >[2013/02/11 13:34:53.552926, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend smbserver >[2013/02/11 13:34:53.552952, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'smbserver' >[2013/02/11 13:34:53.552979, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend trustdomain >[2013/02/11 13:34:53.553005, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'trustdomain' >[2013/02/11 13:34:53.553042, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend ntdomain >[2013/02/11 13:34:53.553077, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'ntdomain' >[2013/02/11 13:34:53.553104, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend guest >[2013/02/11 13:34:53.553133, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'guest' >[2013/02/11 13:34:53.553165, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend fixed_challenge >[2013/02/11 13:34:53.553173, 5, pid=12330] lib/username.c:134(Get_Pwnam_internals) >[2013/02/11 13:34:53.553192, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Trying _Get_Pwnam(), username as uppercase is WINXP > Successfully added auth method 'fixed_challenge' >[2013/02/11 13:34:53.553238, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend name_to_ntstatus >[2013/02/11 13:34:53.553264, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'name_to_ntstatus' >[2013/02/11 13:34:53.553290, 5, pid=12329] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend netlogond >[2013/02/11 13:34:53.553318, 5, pid=12329] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'netlogond' >[2013/02/11 13:34:53.553343, 5, pid=12329] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2013/02/11 13:34:53.553370, 5, pid=12329] auth/auth.c:410(load_auth_module) > load_auth_module: auth method guest has a valid init >[2013/02/11 13:34:53.553396, 5, pid=12329] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2013/02/11 13:34:53.553423, 5, pid=12329] auth/auth.c:410(load_auth_module) > load_auth_module: auth method sam has a valid init >[2013/02/11 13:34:53.553448, 10, pid=12329] smbd/negprot.c:52(get_challenge) > get challenge: getting challenge >[2013/02/11 13:34:53.553474, 5, pid=12329] auth/auth.c:99(get_ntlm_challenge) > auth_get_challenge: module guest did not want to specify a challenge >[2013/02/11 13:34:53.553500, 5, pid=12329] auth/auth.c:99(get_ntlm_challenge) > auth_get_challenge: module sam did not want to specify a challenge >[2013/02/11 13:34:53.553536, 5, pid=12329] auth/auth.c:134(get_ntlm_challenge) > auth_context challenge created by random >[2013/02/11 13:34:53.553562, 5, pid=12329] auth/auth.c:135(get_ntlm_challenge) > challenge is: >[2013/02/11 13:34:53.553587, 5, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 37 0B DC CF 65 4C 12 80 7...eL.. >[2013/02/11 13:34:53.553623, 3, pid=12329] smbd/negprot.c:401(reply_nt1) > not using SPNEGO >[2013/02/11 13:34:53.553648, 3, pid=12329] smbd/negprot.c:704(reply_negprot) > Selected protocol NT LM 0.12 >[2013/02/11 13:34:53.553673, 5, pid=12329] smbd/negprot.c:711(reply_negprot) > negprot index=5 >[2013/02/11 13:34:53.553698, 5, pid=12329] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.553717, 5, pid=12329] lib/util.c:342(show_msg) > size=97 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=17 > smb_vwv[ 0]= 5 (0x5) > smb_vwv[ 1]=12802 (0x3202) > smb_vwv[ 2]= 256 (0x100) > smb_vwv[ 3]= 1024 (0x400) > smb_vwv[ 4]= 65 (0x41) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 256 (0x100) > smb_vwv[ 7]=10496 (0x2900) > smb_vwv[ 8]= 48 (0x30) > smb_vwv[ 9]=64768 (0xFD00) > smb_vwv[10]=33011 (0x80F3) > smb_vwv[11]= 5120 (0x1400) > smb_vwv[12]=11110 (0x2B66) > smb_vwv[13]=21553 (0x5431) > smb_vwv[14]=52744 (0xCE08) > smb_vwv[15]=50177 (0xC401) > smb_vwv[16]= 2303 (0x8FF) > smb_bcc=28 >[2013/02/11 13:34:53.554059, 10, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 37 0B DC CF 65 4C 12 80 44 00 49 00 53 00 43 00 7...eL.. D.I.S.C. > [0010] 57 00 4F 00 52 00 4C 00 44 00 00 00 W.O.R.L. D... >[2013/02/11 13:34:53.554361, 5, pid=12330] lib/username.c:143(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in winxp >[2013/02/11 13:34:53.554407, 5, pid=12330] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [winxp]! >[2013/02/11 13:34:53.554455, 6, pid=12330] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:53.554520, 5, pid=12330] smbd/reply.c:614(reply_special) > init msg_type=0x81 msg_flags=0x0 >[2013/02/11 13:34:53.556294, 10, pid=12329] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 272 >[2013/02/11 13:34:53.556357, 6, pid=12329] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x110 >[2013/02/11 13:34:53.556386, 3, pid=12329] smbd/process.c:1662(process_smb) > Transaction 1 of length 276 (0 toread) >[2013/02/11 13:34:53.556399, 5, pid=12330] lib/util_sock.c:319(read_fd_with_timeout) >[2013/02/11 13:34:53.556413, 5, pid=12329] lib/util.c:332(show_msg) > read_fd_with_timeout: blocking read. EOF from client. >[2013/02/11 13:34:53.556429, 5, pid=12329] lib/util.c:342(show_msg) > size=272 >[2013/02/11 13:34:53.556437, 5, pid=12330] smbd/process.c:457(receive_smb_talloc) > smb_com=0x73 > smb_rcls=0 > receive_smb_raw_talloc failed for client 192.168.52.63 read error = NT_STATUS_END_OF_FILE. > smb_reh=0 > smb_err=0 >[2013/02/11 13:34:53.556483, 4, pid=12330] smbd/sec_ctx.c:314(set_sec_ctx) > smb_flg=24 > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 > smb_flg2=51207 > smb_tid=0 >[2013/02/11 13:34:53.556514, 5, pid=12330] ../libcli/security/security_token.c:53(security_token_debug) > smb_pid=65279 > Security token: (NULL) > smb_uid=0 > smb_mid=64 >[2013/02/11 13:34:53.556544, 5, pid=12330] auth/token_util.c:527(debug_unix_user_token) > smt_wct=13 > UNIX token of user 0 > smb_vwv[ 0]= 117 (0x75) > Primary group is 0 and contains 0 supplementary groups > smb_vwv[ 1]= 186 (0xBA) > smb_vwv[ 2]=16644 (0x4104) >[2013/02/11 13:34:53.556594, 5, pid=12330] smbd/uid.c:400(change_to_root_user) > smb_vwv[ 3]= 50 (0x32) > change_to_root_user: now uid=(0,0) gid=(0,0) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]=12329 (0x3029) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 1 (0x1) > smb_vwv[ 8]= 1 (0x1) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) >[2013/02/11 13:34:53.556674, 3, pid=12330] smbd/server_exit.c:181(exit_server_common) > smb_vwv[11]= 212 (0xD4) > Server exit (failed to receive smb request) > smb_vwv[12]= 0 (0x0) > smb_bcc=125 >[2013/02/11 13:34:53.556722, 10, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 61 00 73 00 6E 00 00 00 57 00 49 00 4E ...a.s.n ...W.I.N > [0010] 00 58 00 50 00 00 00 57 00 69 00 6E 00 64 00 6F .X.P...W .i.n.d.o > [0020] 00 77 00 73 00 20 00 32 00 30 00 30 00 32 00 20 .w.s. .2 .0.0.2. > [0030] 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 20 .S.e.r.v .i.c.e. > [0040] 00 50 00 61 00 63 00 6B 00 20 00 33 00 20 00 32 .P.a.c.k . .3. .2 > [0050] 00 36 00 30 00 30 00 00 00 57 00 69 00 6E 00 64 .6.0.0.. .W.i.n.d > [0060] 00 6F 00 77 00 73 00 20 00 32 00 30 00 30 00 32 .o.w.s. .2.0.0.2 > [0070] 00 20 00 35 00 2E 00 31 00 00 00 00 00 . .5...1 ..... >[2013/02/11 13:34:53.556914, 3, pid=12329] smbd/process.c:1467(switch_message) > switch message SMBsesssetupX (pid 12329) conn 0x0 >[2013/02/11 13:34:53.556942, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.556969, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.556994, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.557044, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.557076, 3, pid=12329] smbd/sesssetup.c:1333(reply_sesssetup_and_X) > wct=13 flg2=0xc807 >[2013/02/11 13:34:53.557114, 3, pid=12329] smbd/sesssetup.c:1536(reply_sesssetup_and_X) > Domain=[WINXP] NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2013/02/11 13:34:53.557144, 10, pid=12329] lib/util.c:1624(set_remote_arch) > set_remote_arch: Client arch is 'WinXP' >[2013/02/11 13:34:53.557169, 2, pid=12329] smbd/sesssetup.c:1279(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2013/02/11 13:34:53.557195, 3, pid=12329] smbd/sesssetup.c:1552(reply_sesssetup_and_X) > sesssetupX:name=[WINXP]\[asn]@[192.168.52.63] >[2013/02/11 13:34:53.557236, 6, pid=12329] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:53.557300, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:53.557326, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:53.557431, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:53.557463, 3, pid=12329] smbd/sesssetup.c:151(check_guest_password) > Got anonymous request >[2013/02/11 13:34:53.557492, 5, pid=12329] auth/auth.c:508(make_auth_context_subsystem) > Making default auth method list for security=share, encrypt passwords = yes >[2013/02/11 13:34:53.557520, 5, pid=12329] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2013/02/11 13:34:53.557594, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 2A300000FFFFFFFF >[2013/02/11 13:34:53.557642, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d1440 >[2013/02/11 13:34:53.557675, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 2A300000FFFFFFFF >[2013/02/11 13:34:53.557547, 5, pid=12329] auth/auth.c:410(load_auth_module) > load_auth_module: auth method guest has a valid init >[2013/02/11 13:34:53.557743, 5, pid=12329] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2013/02/11 13:34:53.557770, 5, pid=12329] auth/auth.c:410(load_auth_module) > load_auth_module: auth method sam has a valid init >[2013/02/11 13:34:53.557801, 5, pid=12329] auth/user_info.c:59(make_user_info) > attempting to make a user_info for () >[2013/02/11 13:34:53.557828, 5, pid=12329] auth/user_info.c:70(make_user_info) > making strings for 's user_info struct >[2013/02/11 13:34:53.557855, 5, pid=12329] auth/user_info.c:87(make_user_info) > making blobs for 's user_info struct >[2013/02/11 13:34:53.557880, 10, pid=12329] auth/user_info.c:123(make_user_info) > made a user_info for () >[2013/02/11 13:34:53.557905, 3, pid=12329] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user []\[]@[] with the new password interface >[2013/02/11 13:34:53.557931, 3, pid=12329] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: []\[]@[] >[2013/02/11 13:34:53.557961, 10, pid=12329] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by fixed >[2013/02/11 13:34:53.557986, 10, pid=12329] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:53.558011, 5, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 00 00 00 ........ >[2013/02/11 13:34:53.558062, 10, pid=12329] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [] >[2013/02/11 13:34:53.558101, 3, pid=12329] auth/auth.c:268(check_ntlm_password) > check_ntlm_password: guest authentication for user [] succeeded >[2013/02/11 13:34:53.558127, 5, pid=12329] auth/auth.c:309(check_ntlm_password) > check_ntlm_password: guest authentication for user [] -> [] -> [nobody] succeeded >[2013/02/11 13:34:53.558164, 3, pid=12329] smbd/process.c:1467(switch_message) > switch message SMBtconX (pid 12329) conn 0x0 >[2013/02/11 13:34:53.558191, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.558217, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.558242, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.558282, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.558316, 4, pid=12329] smbd/reply.c:794(reply_tcon_and_X) > Client requested device type [?????] for share [GURU] >[2013/02/11 13:34:53.558356, 5, pid=12329] smbd/service.c:1354(make_connection) > making a connection to 'normal' service guru >[2013/02/11 13:34:53.558391, 3, pid=12329] lib/access.c:338(allow_access) > Allowed connection from 192.168.52.63 (192.168.52.63) >[2013/02/11 13:34:53.558426, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user guru >[2013/02/11 13:34:53.558451, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is guru >[2013/02/11 13:34:53.558511, 5, pid=12329] lib/username.c:134(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is GURU >[2013/02/11 13:34:53.558567, 5, pid=12329] lib/username.c:143(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in guru >[2013/02/11 13:34:53.558595, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [guru]! >[2013/02/11 13:34:53.558627, 5, pid=12329] auth/auth_util.c:110(make_user_info_map) > Mapping user [WINXP]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.558656, 5, pid=12329] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [WINXP] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.558682, 5, pid=12329] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:53.558708, 5, pid=12329] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:53.558734, 5, pid=12329] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:53.558759, 10, pid=12329] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:53.558785, 3, pid=12329] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [WINXP]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:53.558812, 3, pid=12329] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:53.558837, 10, pid=12329] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:53.558863, 10, pid=12329] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:53.558888, 5, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 37 0B DC CF 65 4C 12 80 7...eL.. >[2013/02/11 13:34:53.558928, 10, pid=12329] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:53.558954, 10, pid=12329] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:53.558981, 10, pid=12329] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:53.559006, 8, pid=12329] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:53.559053, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.559082, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.559108, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.559134, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.559159, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.559224, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.559253, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.559279, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.559310, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.559339, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.559369, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.559396, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.559423, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.559449, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.559478, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.559504, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.559533, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.559559, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.559584, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.559610, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.559635, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.559685, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.559716, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.559748, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.559779, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.559823, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.559852, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.559878, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.559904, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.559928, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.559971, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.560000, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.560034, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:53.560061, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:53.560088, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:53.560157, 5, pid=12329] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 100 >[2013/02/11 13:34:53.560186, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.560212, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.560238, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.560263, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.560288, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.560342, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.560369, 10, pid=12329] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 100 -> sid S-1-22-2-100 >[2013/02/11 13:34:53.560404, 3, pid=12329] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:53.560433, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.560459, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.560485, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.560511, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.560536, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.560578, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.560607, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.560639, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.560665, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.560691, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.560717, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.560744, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.560772, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.560802, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.560829, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.560856, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.560884, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.560910, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.560937, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.560963, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.560989, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.561014, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.561073, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.561116, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.561146, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.561173, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.561201, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.561241, 10, pid=12329] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:53.561274, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.561304, 4, pid=12329] ../libcli/auth/ntlm_check.c:404(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password >[2013/02/11 13:34:53.561497, 3, pid=12329] ../libcli/auth/ntlm_check.c:418(ntlm_password_check) > ntlm_password_check: NT MD4 password check failed for user asn >[2013/02/11 13:34:53.561527, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.561553, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.561579, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.561604, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.561629, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.561675, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.561703, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.561732, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.561758, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.561783, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.561809, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.561833, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.561875, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.561901, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.561927, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.561952, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.561977, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.562019, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:53.562062, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.562092, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.562117, 9, pid=12329] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:53.562143, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.562169, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.562194, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.562219, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.562244, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.562298, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.562325, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.562350, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.562376, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.562403, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.562431, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.562457, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.562484, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.562510, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.562538, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.562565, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.562591, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.562617, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.562643, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.562668, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.562693, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.562739, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.562768, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.562795, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.562823, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.562864, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.562890, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.562916, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.562941, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.562966, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.563008, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.563044, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.563071, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.563097, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.563123, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.563148, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.563173, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.563216, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.563244, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.563273, 5, pid=12329] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:53.563302, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:53.563330, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d7000 >[2013/02/11 13:34:53.563358, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:53.563386, 10, pid=12329] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:53.563415, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:53.563443, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d7000 >[2013/02/11 13:34:53.563469, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:53.563503, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.563532, 5, pid=12329] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.563562, 2, pid=12329] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.563592, 5, pid=12329] auth/auth_util.c:110(make_user_info_map) > Mapping user [WINXP]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.563621, 5, pid=12329] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [WINXP] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.563648, 5, pid=12329] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:53.563674, 5, pid=12329] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:53.563700, 5, pid=12329] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:53.563725, 10, pid=12329] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:53.563750, 3, pid=12329] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [WINXP]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:53.563777, 3, pid=12329] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:53.563803, 10, pid=12329] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:53.563828, 10, pid=12329] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:53.563853, 5, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 37 0B DC CF 65 4C 12 80 7...eL.. >[2013/02/11 13:34:53.563888, 10, pid=12329] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:53.563913, 10, pid=12329] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:53.563940, 10, pid=12329] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:53.563965, 8, pid=12329] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:53.563992, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.564018, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.564050, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.564076, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.564101, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.564147, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.564173, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.564199, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.564225, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.564251, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.564282, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.564308, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.564335, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.564361, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.564390, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.564416, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.564446, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.564472, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.564497, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.564523, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.564548, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.564590, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.564619, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.564646, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.564674, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.564714, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.564740, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.564766, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.564792, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.564817, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.564859, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.564888, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.564915, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:53.564940, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:53.564967, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:53.564998, 3, pid=12329] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:53.565026, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.565082, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.565107, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.565133, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.565158, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.565200, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.565228, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.565259, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.565285, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.565311, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.565337, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.565366, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.565395, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.565421, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.565447, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.565474, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.565502, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.565529, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.565555, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.565581, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.565607, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.565632, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.565657, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.565699, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.565728, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.565755, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.565783, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.565823, 10, pid=12329] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:53.565854, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.565881, 3, pid=12329] ../libcli/auth/ntlm_check.c:442(ntlm_password_check) > ntlm_password_check: Lanman passwords NOT PERMITTED for user asn >[2013/02/11 13:34:53.565907, 4, pid=12329] ../libcli/auth/ntlm_check.c:479(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with domain WINXP >[2013/02/11 13:34:53.565944, 4, pid=12329] ../libcli/auth/ntlm_check.c:508(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with upper-cased version of domain WINXP >[2013/02/11 13:34:53.565977, 4, pid=12329] ../libcli/auth/ntlm_check.c:536(ntlm_password_check) > ntlm_password_check: Checking LMv2 password without a domain >[2013/02/11 13:34:53.566011, 4, pid=12329] ../libcli/auth/ntlm_check.c:567(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password in LM field >[2013/02/11 13:34:53.566202, 3, pid=12329] ../libcli/auth/ntlm_check.c:586(ntlm_password_check) > ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user asn >[2013/02/11 13:34:53.566230, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566256, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.566282, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566307, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.566335, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.566378, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.566406, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.566433, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566459, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.566484, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566510, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.566534, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.566573, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.566599, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566624, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.566650, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.566675, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.566716, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:53.566745, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566773, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.566798, 9, pid=12329] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:53.566824, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566849, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.566875, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.566900, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.566925, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.566975, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.567002, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.567031, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.567059, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.567086, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.567114, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.567141, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.567167, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.567197, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.567226, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.567252, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.567279, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.567305, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.567331, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.567357, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.567382, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.567424, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.567453, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.567480, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.567508, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.567548, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.567575, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.567600, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.567626, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.567651, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.567693, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.567721, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.567749, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.567774, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.567800, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.567825, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.567850, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.567892, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.567921, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.567950, 5, pid=12329] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:53.567979, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:53.568007, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c39e0 >[2013/02/11 13:34:53.568038, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:53.568071, 10, pid=12329] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:53.568101, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:53.568128, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c3530 >[2013/02/11 13:34:53.568155, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:53.568189, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.568217, 5, pid=12329] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.568244, 2, pid=12329] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.568274, 5, pid=12329] auth/auth_util.c:110(make_user_info_map) > Mapping user [DISCWORLD]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.568300, 5, pid=12329] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [DISCWORLD] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.568326, 5, pid=12329] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:53.568352, 5, pid=12329] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:53.568377, 5, pid=12329] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:53.568403, 10, pid=12329] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:53.568428, 3, pid=12329] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [DISCWORLD]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:53.568455, 3, pid=12329] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:53.568480, 10, pid=12329] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:53.568505, 10, pid=12329] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:53.568530, 5, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 37 0B DC CF 65 4C 12 80 7...eL.. >[2013/02/11 13:34:53.568566, 10, pid=12329] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:53.568590, 10, pid=12329] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:53.568617, 10, pid=12329] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:53.568642, 8, pid=12329] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:53.568669, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.568695, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.568720, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.568746, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.568771, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.568816, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.568843, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.568869, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.568894, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.568924, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.568953, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.568979, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.569005, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.569045, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.569075, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.569102, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.569129, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.569155, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.569181, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.569206, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.569231, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.569274, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.569303, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.569329, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.569357, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.569398, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.569424, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.569449, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.569475, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.569500, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.569542, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.569571, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.569598, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:53.569623, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:53.569650, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:53.569681, 3, pid=12329] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:53.569709, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.569735, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.569760, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.569789, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.569814, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.569856, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.569884, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.569915, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.569941, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.569967, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.569992, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.570019, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.570053, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.570079, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.570106, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.570133, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.570161, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.570187, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.570213, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.570239, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.570265, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.570290, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.570315, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.570358, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.570387, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.570413, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.570441, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.570481, 10, pid=12329] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:53.570513, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.570540, 4, pid=12329] ../libcli/auth/ntlm_check.c:404(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password >[2013/02/11 13:34:53.570723, 3, pid=12329] ../libcli/auth/ntlm_check.c:418(ntlm_password_check) > ntlm_password_check: NT MD4 password check failed for user asn >[2013/02/11 13:34:53.570750, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.570779, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.570804, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.570830, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.570855, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.570896, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.570925, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.570951, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.570977, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.571002, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571031, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.571058, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.571097, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.571123, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571148, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.571174, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.571198, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.571240, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:53.571269, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571298, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.571324, 9, pid=12329] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:53.571349, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571374, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.571400, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571425, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.571450, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.571500, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.571526, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.571552, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.571578, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.571605, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.571635, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.571662, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.571689, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.571715, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.571743, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.571770, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.571796, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.571822, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571848, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.571874, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.571899, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.571941, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.571971, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.571998, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.572026, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.572072, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.572099, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.572124, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.572150, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.572175, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.572217, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.572246, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.572273, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.572299, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.572324, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.572350, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.572375, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.572416, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.572445, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.572474, 5, pid=12329] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:53.572505, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:53.572533, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23cb410 >[2013/02/11 13:34:53.572560, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:53.572589, 10, pid=12329] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:53.572618, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:53.572645, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c3650 >[2013/02/11 13:34:53.572672, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:53.572706, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.572733, 5, pid=12329] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.572760, 2, pid=12329] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.572790, 5, pid=12329] auth/auth_util.c:110(make_user_info_map) > Mapping user [DISCWORLD]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.572816, 5, pid=12329] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [DISCWORLD] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:53.572842, 5, pid=12329] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:53.572868, 5, pid=12329] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:53.572894, 5, pid=12329] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:53.572920, 10, pid=12329] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:53.572945, 3, pid=12329] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [DISCWORLD]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:53.572971, 3, pid=12329] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:53.572997, 10, pid=12329] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:53.573022, 10, pid=12329] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:53.573053, 5, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 37 0B DC CF 65 4C 12 80 7...eL.. >[2013/02/11 13:34:53.573089, 10, pid=12329] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:53.573114, 10, pid=12329] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:53.573141, 10, pid=12329] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:53.573166, 8, pid=12329] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:53.573193, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.573219, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.573244, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.573270, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.573295, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.573341, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.573371, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.573397, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.573423, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.573449, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.573477, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.573504, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.573531, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.573557, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.573585, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.573612, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.573638, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.573664, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.573690, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.573715, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.573741, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.573783, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.573812, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.573839, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.573867, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.573907, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.573934, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.573959, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.573985, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.574010, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.574079, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.574108, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.574135, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:53.574160, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:53.574187, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:53.574218, 3, pid=12329] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:53.574249, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.574275, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.574300, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.574326, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.574351, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.574392, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.574421, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.574451, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.574477, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.574503, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.574529, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.574555, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.574584, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.574610, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.574636, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.574663, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.574691, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.574718, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.574744, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.574770, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.574796, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.574821, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.574846, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.574888, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.574916, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.574943, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.574971, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.575011, 10, pid=12329] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:53.575049, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.575079, 3, pid=12329] ../libcli/auth/ntlm_check.c:442(ntlm_password_check) > ntlm_password_check: Lanman passwords NOT PERMITTED for user asn >[2013/02/11 13:34:53.575105, 4, pid=12329] ../libcli/auth/ntlm_check.c:479(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with domain DISCWORLD >[2013/02/11 13:34:53.575139, 4, pid=12329] ../libcli/auth/ntlm_check.c:508(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with upper-cased version of domain DISCWORLD >[2013/02/11 13:34:53.575173, 4, pid=12329] ../libcli/auth/ntlm_check.c:536(ntlm_password_check) > ntlm_password_check: Checking LMv2 password without a domain >[2013/02/11 13:34:53.575206, 4, pid=12329] ../libcli/auth/ntlm_check.c:567(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password in LM field >[2013/02/11 13:34:53.575392, 3, pid=12329] ../libcli/auth/ntlm_check.c:586(ntlm_password_check) > ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user asn >[2013/02/11 13:34:53.575419, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.575445, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.575470, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.575496, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.575521, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.575563, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.575591, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.575618, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.575643, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.575669, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.575694, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.575719, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.575757, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.575784, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.575809, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.575835, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.575859, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.575901, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:53.575933, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.575961, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.575987, 9, pid=12329] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:53.576012, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576043, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.576071, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576097, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.576122, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.576172, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:53.576199, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:53.576224, 10, pid=12329] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:53.576250, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:53.576277, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.576305, 10, pid=12329] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:53.576331, 10, pid=12329] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:53.576358, 10, pid=12329] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:53.576384, 4, pid=12329] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:53.576412, 10, pid=12329] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:53.576439, 10, pid=12329] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:53.576465, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.576491, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576517, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.576543, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.576568, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.576610, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.576639, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576666, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:53.576694, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:53.576734, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.576760, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576786, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.576811, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.576836, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.576878, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:53.576907, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576938, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.576964, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.576989, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.577015, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.577045, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.577087, 10, pid=12329] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:53.577116, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.577145, 5, pid=12329] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:53.577173, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:53.577201, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c9550 >[2013/02/11 13:34:53.577228, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:53.577257, 10, pid=12329] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:53.577286, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:53.577313, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c9300 >[2013/02/11 13:34:53.577340, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:53.577373, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.577401, 5, pid=12329] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.577428, 2, pid=12329] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:53.577460, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:53.577485, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:53.577512, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:53.577538, 3, pid=12329] smbd/password.c:721(authorise_login) > authorise_login: ACCEPTED: guest account and guest ok (nobody) >[2013/02/11 13:34:53.577567, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:53.577592, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:53.577619, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:53.577649, 10, pid=12329] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\nobody => domain=[Unix User], name=[nobody] >[2013/02/11 13:34:53.577675, 10, pid=12329] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:53.577706, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:53.577732, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:53.577758, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:53.577786, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was >[2013/02/11 13:34:53.577815, 10, pid=12329] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name nobody, was >[2013/02/11 13:34:53.577841, 10, pid=12329] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain MAGRATHEA, was >[2013/02/11 13:34:53.577868, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 >[2013/02/11 13:34:53.577896, 10, pid=12329] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 from rid 501 >[2013/02/11 13:34:53.577934, 10, pid=12329] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was nobody >[2013/02/11 13:34:53.577960, 10, pid=12329] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-22-1-65534 >[2013/02/11 13:34:53.577997, 5, pid=12329] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 65533 >[2013/02/11 13:34:53.578023, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.578089, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.578115, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.578140, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.578165, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.578210, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.578237, 10, pid=12329] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 65533 -> sid S-1-22-2-65533 >[2013/02/11 13:34:53.578270, 3, pid=12329] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for nobody >[2013/02/11 13:34:53.578298, 10, pid=12329] auth/server_info.c:349(samu_to_SamInfo3) > Unix User found in struct samu. Rid marked as special and sid (S-1-22-1-65534) saved as extra sid >[2013/02/11 13:34:53.578329, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:53.578355, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:53.578382, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:53.578427, 10, pid=12329] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2013/02/11 13:34:53.578514, 5, pid=12329] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 65534 >[2013/02/11 13:34:53.578547, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.578575, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.578601, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.578626, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.578651, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.578698, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.578725, 10, pid=12329] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 65534 -> sid S-1-22-2-65534 >[2013/02/11 13:34:53.578762, 10, pid=12329] passdb/lookup_sid.c:76(lookup_name) > lookup_name: MAGRATHEA\nobody => domain=[MAGRATHEA], name=[nobody] >[2013/02/11 13:34:53.578789, 10, pid=12329] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:53.578821, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.578847, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.578872, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.578898, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.578923, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.578966, 5, pid=12329] passdb/pdb_tdb.c:562(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_nobody >[2013/02/11 13:34:53.579004, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.579052, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.579081, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.579106, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.579132, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.579157, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.579203, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.579232, 10, pid=12329] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\nobody => domain=[Unix User], name=[nobody] >[2013/02/11 13:34:53.579257, 10, pid=12329] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:53.579286, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:53.579312, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:53.579339, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:53.579368, 10, pid=12329] passdb/lookup_sid.c:1544(sid_to_uid) > sid S-1-22-1-65534 -> uid 65534 >[2013/02/11 13:34:53.579434, 10, pid=12329] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2013/02/11 13:34:53.579498, 10, pid=12329] auth/token_util.c:339(create_local_nt_token) > Create local NT token for S-1-22-1-65534 >[2013/02/11 13:34:53.579541, 10, pid=12329] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:53.579569, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.579595, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.579621, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.579647, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.579671, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.579720, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.579747, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:53.579773, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.579799, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.579825, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.579854, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.579878, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.579940, 10, pid=12329] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:53.579968, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.579994, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580019, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.580057, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.580083, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.580129, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580155, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:53.580184, 5, pid=12329] passdb/pdb_util.c:128(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2013/02/11 13:34:53.580212, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.580247, 10, pid=12329] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:53.580275, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580301, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.580326, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580352, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.580376, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.580421, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.580448, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:53.580474, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580500, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.580525, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580551, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.580575, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.580627, 10, pid=12329] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:53.580655, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.580681, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580706, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:53.580732, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.580757, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.580805, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580832, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:53.580861, 5, pid=12329] passdb/pdb_util.c:99(create_builtin_users) > create_builtin_users: Failed to create Users >[2013/02/11 13:34:53.580888, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.580914, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580940, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.580965, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.580991, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.581015, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.581112, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.581145, 4, pid=12329] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-1-65534] >[2013/02/11 13:34:53.581176, 4, pid=12329] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65533] >[2013/02/11 13:34:53.581206, 4, pid=12329] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65534] >[2013/02/11 13:34:53.581237, 5, pid=12329] lib/privileges.c:175(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2013/02/11 13:34:53.581277, 4, pid=12329] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2013/02/11 13:34:53.581307, 4, pid=12329] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-546] >[2013/02/11 13:34:53.581369, 10, pid=12329] passdb/lookup_sid.c:1468(sids_to_unix_ids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2013/02/11 13:34:53.581398, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.581424, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.581450, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.581475, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.581500, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.581545, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.581572, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:53.581598, 10, pid=12329] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:53.581625, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.581651, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.581676, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.581702, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.581727, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.581774, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.581801, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:53.581827, 10, pid=12329] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:53.581854, 4, pid=12329] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.581880, 4, pid=12329] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.581905, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:53.581931, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.581955, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.582000, 4, pid=12329] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.582026, 10, pid=12329] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:53.582062, 10, pid=12329] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:53.582090, 10, pid=12329] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2013/02/11 13:34:53.582116, 10, pid=12329] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2013/02/11 13:34:53.582143, 10, pid=12329] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2013/02/11 13:34:53.582171, 10, pid=12329] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:53.582290, 10, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:53.582350, 5, pid=12329] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:53.582376, 5, pid=12329] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:53.582402, 5, pid=12329] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:53.582434, 10, pid=12329] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:53.582462, 3, pid=12329] smbd/service.c:872(make_connection_snum) > Connect path is '/srv/samba/tmp' for service [guru] >[2013/02/11 13:34:53.582503, 10, pid=12329] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:53.582534, 10, pid=12329] ../libcli/security/access_check.c:178(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x101f01ff, remaining = 0x101f01ff >[2013/02/11 13:34:53.582564, 3, pid=12329] smbd/vfs.c:102(vfs_init_default) > Initialising default vfs hooks >[2013/02/11 13:34:53.582592, 10, pid=12329] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2013/02/11 13:34:53.582620, 5, pid=12329] smbd/vfs.c:92(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2013/02/11 13:34:53.582647, 10, pid=12329] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2013/02/11 13:34:53.582672, 5, pid=12329] smbd/vfs.c:92(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2013/02/11 13:34:53.582701, 3, pid=12329] smbd/vfs.c:128(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2013/02/11 13:34:53.582727, 10, pid=12329] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2013/02/11 13:34:53.582768, 5, pid=12329] smbd/connection.c:134(claim_connection) > claiming [guru] >[2013/02/11 13:34:53.582833, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 29300000FFFFFFFF26FE >[2013/02/11 13:34:53.582864, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c7060 >[2013/02/11 13:34:53.582920, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 29300000FFFFFFFF26FE >[2013/02/11 13:34:53.583036, 10, pid=12329] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:53.583072, 10, pid=12329] smbd/share_access.c:241(user_ok_token) > user_ok_token: share guru is ok for unix user nobody >[2013/02/11 13:34:53.583101, 10, pid=12329] smbd/share_access.c:286(is_share_read_only_for_token) > is_share_read_only_for_user: share guru is read-write for unix user nobody >[2013/02/11 13:34:53.583134, 10, pid=12329] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:53.583167, 10, pid=12329] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:53.583198, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (65534, 65533) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.583226, 5, pid=12329] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:53.583343, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:53.583406, 5, pid=12329] smbd/uid.c:317(change_to_user_internal) > Impersonated user: uid=(0,65534), gid=(0,65533) >[2013/02/11 13:34:53.583436, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.583462, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.583487, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.583528, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.583560, 10, pid=12329] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:53.583598, 10, pid=12329] modules/vfs_default.c:160(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share guru, directory /srv/samba/tmp >[2013/02/11 13:34:53.583627, 1, pid=12329] smbd/service.c:1114(make_connection_snum) > 192.168.52.63 (192.168.52.63) connect to service guru initially as user nobody (uid=65534, gid=65533) (pid 12329) >[2013/02/11 13:34:53.583662, 3, pid=12329] smbd/reply.c:871(reply_tcon_and_X) > tconX service=GURU >[2013/02/11 13:34:53.583940, 10, pid=12329] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 76 >[2013/02/11 13:34:53.584012, 6, pid=12329] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x4c >[2013/02/11 13:34:53.584052, 3, pid=12329] smbd/process.c:1662(process_smb) > Transaction 2 of length 80 (0 toread) >[2013/02/11 13:34:53.584078, 5, pid=12329] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.584093, 5, pid=12329] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=128 > smt_wct=15 > smb_vwv[ 0]= 8 (0x8) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 8 (0x8) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=11 >[2013/02/11 13:34:53.584397, 10, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 00 00 ........ ... >[2013/02/11 13:34:53.584435, 3, pid=12329] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12329) conn 0x23d1b00 >[2013/02/11 13:34:53.584464, 10, pid=12329] smbd/share_access.c:241(user_ok_token) > user_ok_token: share guru is ok for unix user nobody >[2013/02/11 13:34:53.584492, 10, pid=12329] smbd/share_access.c:286(is_share_read_only_for_token) > is_share_read_only_for_user: share guru is read-write for unix user nobody >[2013/02/11 13:34:53.584531, 10, pid=12329] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:53.584565, 10, pid=12329] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:53.584594, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (65534, 65533) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.584622, 5, pid=12329] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:53.584740, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:53.584806, 5, pid=12329] smbd/uid.c:317(change_to_user_internal) > Impersonated user: uid=(0,65534), gid=(0,65533) >[2013/02/11 13:34:53.584837, 4, pid=12329] smbd/vfs.c:780(vfs_ChDir) > vfs_ChDir to /srv/samba/tmp >[2013/02/11 13:34:53.584880, 3, pid=12329] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:53.584919, 5, pid=12329] smbd/filename.c:257(unix_convert) > unix_convert called on file "" >[2013/02/11 13:34:53.584949, 5, pid=12329] smbd/filename.c:291(unix_convert) > conversion finished "" -> . >[2013/02/11 13:34:53.584976, 3, pid=12329] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:53.585007, 10, pid=12329] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:53.585040, 3, pid=12329] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:53.585078, 10, pid=12329] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:53.585134, 10, pid=12329] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:53.585163, 3, pid=12329] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo . (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:53.585191, 5, pid=12329] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: . (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:53.585219, 8, pid=12329] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:53.585278, 8, pid=12329] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:53.585309, 8, pid=12329] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:53.585344, 10, pid=12329] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:53.585371, 5, pid=12329] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:28 2013 > access: Mon Feb 11 13:34:28 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:53.585456, 9, pid=12329] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:53.585482, 9, pid=12329] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:53.585507, 5, pid=12329] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.585522, 5, pid=12329] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=128 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:53.585763, 10, pid=12329] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 8A BD CF 21 54 08 CE 01 8A BD CF ........ !T...... > [0010] 21 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 !T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:53.588085, 10, pid=12329] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 35 >[2013/02/11 13:34:53.588155, 6, pid=12329] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x23 >[2013/02/11 13:34:53.588182, 3, pid=12329] smbd/process.c:1662(process_smb) > Transaction 3 of length 39 (0 toread) >[2013/02/11 13:34:53.588208, 5, pid=12329] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.588223, 5, pid=12329] lib/util.c:342(show_msg) > size=35 > smb_com=0x71 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=192 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:53.588363, 10, pid=12329] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.588380, 3, pid=12329] smbd/process.c:1467(switch_message) > switch message SMBtdis (pid 12329) conn 0x23d1b00 >[2013/02/11 13:34:53.588407, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.588434, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.588459, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.588502, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.588534, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.588560, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.588585, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.588623, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.588649, 1, pid=12329] smbd/service.c:1378(close_cnum) > 192.168.52.63 (192.168.52.63) closed connection to service guru >[2013/02/11 13:34:53.588679, 3, pid=12329] smbd/connection.c:35(yield_connection) > Yielding connection to guru >[2013/02/11 13:34:53.588740, 10, pid=12329] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 29300000FFFFFFFF26FE >[2013/02/11 13:34:53.588774, 10, pid=12329] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23df560 >[2013/02/11 13:34:53.588806, 10, pid=12329] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 29300000FFFFFFFF26FE >[2013/02/11 13:34:53.588874, 4, pid=12329] smbd/vfs.c:780(vfs_ChDir) > vfs_ChDir to / >[2013/02/11 13:34:53.588904, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.588929, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.588954, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.588993, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.589022, 5, pid=12329] lib/messages.c:332(messaging_deregister) > Deregistering messaging pointer for type 784 - private_data=0x23c7060 >[2013/02/11 13:34:53.589073, 5, pid=12329] lib/util.c:332(show_msg) >[2013/02/11 13:34:53.589088, 5, pid=12329] lib/util.c:342(show_msg) > size=35 > smb_com=0x71 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=65279 > smb_uid=0 > smb_mid=192 > smt_wct=0 > smb_bcc=0 >[2013/02/11 13:34:53.589229, 10, pid=12329] ../lib/util/util.c:415(dump_data) >[2013/02/11 13:34:53.589445, 5, pid=12329] lib/util_sock.c:319(read_fd_with_timeout) > read_fd_with_timeout: blocking read. EOF from client. >[2013/02/11 13:34:53.589474, 5, pid=12329] smbd/process.c:457(receive_smb_talloc) > receive_smb_raw_talloc failed for client 192.168.52.63 read error = NT_STATUS_END_OF_FILE. >[2013/02/11 13:34:53.589504, 4, pid=12329] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:53.589530, 5, pid=12329] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:53.589555, 5, pid=12329] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:53.589594, 5, pid=12329] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:53.589668, 3, pid=12329] smbd/server_exit.c:181(exit_server_common) > Server exit (failed to receive smb request) >[2013/02/11 13:34:53.590548, 10, pid=12314] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 29300000FFFFFFFF >[2013/02/11 13:34:53.590599, 10, pid=12314] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c57d0 >[2013/02/11 13:34:53.590631, 10, pid=12314] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 29300000FFFFFFFF >[2013/02/11 13:34:55.578863, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 2D300000FFFFFFFF >[2013/02/11 13:34:55.579019, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d1440 >[2013/02/11 13:34:55.579098, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 2D300000FFFFFFFF >[2013/02/11 13:34:55.579163, 5, pid=12333] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:55.579390, 5, pid=12333] lib/util_sock.c:165(print_socket_options) > Socket options: > SO_KEEPALIVE = 1 > SO_REUSEADDR = 1 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_SNDBUF = 23400 > SO_RCVBUF = 87380 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 >[2013/02/11 13:34:55.579655, 6, pid=12333] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:55.579721, 3, pid=12333] lib/access.c:338(allow_access) > Allowed connection from 192.168.52.63 (192.168.52.63) >[2013/02/11 13:34:55.579753, 10, pid=12333] smbd/process.c:3020(smbd_process) > Connection allowed from ipv4:192.168.52.63:1057 to ipv4:192.168.178.30:445 >[2013/02/11 13:34:55.579809, 3, pid=12333] smbd/oplock.c:922(init_oplocks) > init_oplocks: initializing messages. >[2013/02/11 13:34:55.579898, 3, pid=12333] smbd/oplock_linux.c:239(linux_init_kernel_oplocks) > Linux kernel oplocks enabled >[2013/02/11 13:34:55.579928, 5, pid=12333] lib/messages.c:332(messaging_deregister) > Deregistering messaging pointer for type 1 - private_data=(nil) >[2013/02/11 13:34:55.579961, 10, pid=12333] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(keepalive) 0x23bd1b0 >[2013/02/11 13:34:55.579989, 10, pid=12333] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(deadtime) 0x23ce820 >[2013/02/11 13:34:55.580016, 10, pid=12333] smbd/process.c:920(event_add_idle) > event_add_idle: idle_evt(housekeeping) 0x23b3750 >[2013/02/11 13:34:55.580099, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 133 >[2013/02/11 13:34:55.580136, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x85 >[2013/02/11 13:34:55.580162, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 0 of length 137 (0 toread) >[2013/02/11 13:34:55.580190, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.580204, 5, pid=12333] lib/util.c:342(show_msg) > size=133 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51283 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=0 > smb_bcc=98 >[2013/02/11 13:34:55.580344, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 02 50 43 20 4E 45 54 57 4F 52 4B 20 50 52 4F 47 .PC NETW ORK PROG > [0010] 52 41 4D 20 31 2E 30 00 02 4C 41 4E 4D 41 4E 31 RAM 1.0. .LANMAN1 > [0020] 2E 30 00 02 57 69 6E 64 6F 77 73 20 66 6F 72 20 .0..Wind ows for > [0030] 57 6F 72 6B 67 72 6F 75 70 73 20 33 2E 31 61 00 Workgrou ps 3.1a. > [0040] 02 4C 4D 31 2E 32 58 30 30 32 00 02 4C 41 4E 4D .LM1.2X0 02..LANM > [0050] 41 4E 32 2E 31 00 02 4E 54 20 4C 4D 20 30 2E 31 AN2.1..N T LM 0.1 > [0060] 32 00 2. >[2013/02/11 13:34:55.580507, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBnegprot (pid 12333) conn 0x0 >[2013/02/11 13:34:55.580538, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.580567, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.580596, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.580645, 5, pid=12333] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:55.580919, 3, pid=12333] smbd/negprot.c:598(reply_negprot) > Requested protocol [PC NETWORK PROGRAM 1.0] >[2013/02/11 13:34:55.580953, 3, pid=12333] smbd/negprot.c:598(reply_negprot) > Requested protocol [LANMAN1.0] >[2013/02/11 13:34:55.580980, 3, pid=12333] smbd/negprot.c:598(reply_negprot) > Requested protocol [Windows for Workgroups 3.1a] >[2013/02/11 13:34:55.581008, 3, pid=12333] smbd/negprot.c:598(reply_negprot) > Requested protocol [LM1.2X002] >[2013/02/11 13:34:55.581040, 3, pid=12333] smbd/negprot.c:598(reply_negprot) > Requested protocol [LANMAN2.1] >[2013/02/11 13:34:55.581069, 3, pid=12333] smbd/negprot.c:598(reply_negprot) > Requested protocol [NT LM 0.12] >[2013/02/11 13:34:55.581097, 10, pid=12333] lib/util.c:1624(set_remote_arch) > set_remote_arch: Client arch is 'Win2K' >[2013/02/11 13:34:55.581131, 6, pid=12333] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:55.581188, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 2D300000FFFFFFFF >[2013/02/11 13:34:55.581226, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d59d0 >[2013/02/11 13:34:55.581255, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 2D300000FFFFFFFF >[2013/02/11 13:34:55.581293, 6, pid=12333] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:55.581360, 10, pid=12333] smbd/negprot.c:44(get_challenge) > get challenge: creating negprot_global_auth_context >[2013/02/11 13:34:55.581389, 5, pid=12333] auth/auth.c:508(make_auth_context_subsystem) > Making default auth method list for security=share, encrypt passwords = yes >[2013/02/11 13:34:55.581422, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam >[2013/02/11 13:34:55.581451, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam' >[2013/02/11 13:34:55.581476, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend sam_ignoredomain >[2013/02/11 13:34:55.581502, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'sam_ignoredomain' >[2013/02/11 13:34:55.581528, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend unix >[2013/02/11 13:34:55.581555, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'unix' >[2013/02/11 13:34:55.581580, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend winbind >[2013/02/11 13:34:55.581605, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'winbind' >[2013/02/11 13:34:55.581630, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend wbc >[2013/02/11 13:34:55.581655, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'wbc' >[2013/02/11 13:34:55.581682, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend smbserver >[2013/02/11 13:34:55.581709, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'smbserver' >[2013/02/11 13:34:55.581736, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend trustdomain >[2013/02/11 13:34:55.581762, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'trustdomain' >[2013/02/11 13:34:55.581787, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend ntdomain >[2013/02/11 13:34:55.581813, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'ntdomain' >[2013/02/11 13:34:55.581839, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend guest >[2013/02/11 13:34:55.581865, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'guest' >[2013/02/11 13:34:55.581890, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend fixed_challenge >[2013/02/11 13:34:55.581916, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'fixed_challenge' >[2013/02/11 13:34:55.581941, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend name_to_ntstatus >[2013/02/11 13:34:55.581967, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'name_to_ntstatus' >[2013/02/11 13:34:55.581994, 5, pid=12333] auth/auth.c:48(smb_register_auth) > Attempting to register auth backend netlogond >[2013/02/11 13:34:55.582021, 5, pid=12333] auth/auth.c:60(smb_register_auth) > Successfully added auth method 'netlogond' >[2013/02/11 13:34:55.582053, 5, pid=12333] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2013/02/11 13:34:55.582080, 5, pid=12333] auth/auth.c:410(load_auth_module) > load_auth_module: auth method guest has a valid init >[2013/02/11 13:34:55.582105, 5, pid=12333] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2013/02/11 13:34:55.582135, 5, pid=12333] auth/auth.c:410(load_auth_module) > load_auth_module: auth method sam has a valid init >[2013/02/11 13:34:55.582161, 10, pid=12333] smbd/negprot.c:52(get_challenge) > get challenge: getting challenge >[2013/02/11 13:34:55.582187, 5, pid=12333] auth/auth.c:99(get_ntlm_challenge) > auth_get_challenge: module guest did not want to specify a challenge >[2013/02/11 13:34:55.582212, 5, pid=12333] auth/auth.c:99(get_ntlm_challenge) > auth_get_challenge: module sam did not want to specify a challenge >[2013/02/11 13:34:55.582247, 5, pid=12333] auth/auth.c:134(get_ntlm_challenge) > auth_context challenge created by random >[2013/02/11 13:34:55.582273, 5, pid=12333] auth/auth.c:135(get_ntlm_challenge) > challenge is: >[2013/02/11 13:34:55.582298, 5, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] E5 B5 CC C2 0E A7 BF 38 .......8 >[2013/02/11 13:34:55.582334, 3, pid=12333] smbd/negprot.c:401(reply_nt1) > not using SPNEGO >[2013/02/11 13:34:55.582359, 3, pid=12333] smbd/negprot.c:704(reply_negprot) > Selected protocol NT LM 0.12 >[2013/02/11 13:34:55.582384, 5, pid=12333] smbd/negprot.c:711(reply_negprot) > negprot index=5 >[2013/02/11 13:34:55.582409, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.582424, 5, pid=12333] lib/util.c:342(show_msg) > size=97 > smb_com=0x72 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=0 > smt_wct=17 > smb_vwv[ 0]= 5 (0x5) > smb_vwv[ 1]=12802 (0x3202) > smb_vwv[ 2]= 256 (0x100) > smb_vwv[ 3]= 1024 (0x400) > smb_vwv[ 4]= 65 (0x41) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 256 (0x100) > smb_vwv[ 7]=11520 (0x2D00) > smb_vwv[ 8]= 48 (0x30) > smb_vwv[ 9]=64768 (0xFD00) > smb_vwv[10]=33011 (0x80F3) > smb_vwv[11]=35584 (0x8B00) > smb_vwv[12]=24822 (0x60F6) > smb_vwv[13]=21554 (0x5432) > smb_vwv[14]=52744 (0xCE08) > smb_vwv[15]=50177 (0xC401) > smb_vwv[16]= 2303 (0x8FF) > smb_bcc=28 >[2013/02/11 13:34:55.582745, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] E5 B5 CC C2 0E A7 BF 38 44 00 49 00 53 00 43 00 .......8 D.I.S.C. > [0010] 57 00 4F 00 52 00 4C 00 44 00 00 00 W.O.R.L. D... >[2013/02/11 13:34:55.584114, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 272 >[2013/02/11 13:34:55.584161, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x110 >[2013/02/11 13:34:55.584199, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 1 of length 276 (0 toread) >[2013/02/11 13:34:55.584235, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.584256, 5, pid=12333] lib/util.c:342(show_msg) > size=272 > smb_com=0x73 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=0 > smb_pid=65279 > smb_uid=0 > smb_mid=64 > smt_wct=13 > smb_vwv[ 0]= 117 (0x75) > smb_vwv[ 1]= 186 (0xBA) > smb_vwv[ 2]=16644 (0x4104) > smb_vwv[ 3]= 50 (0x32) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]=12333 (0x302D) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 1 (0x1) > smb_vwv[ 8]= 1 (0x1) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]= 212 (0xD4) > smb_vwv[12]= 0 (0x0) > smb_bcc=125 >[2013/02/11 13:34:55.584545, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 61 00 73 00 6E 00 00 00 57 00 49 00 4E ...a.s.n ...W.I.N > [0010] 00 58 00 50 00 00 00 57 00 69 00 6E 00 64 00 6F .X.P...W .i.n.d.o > [0020] 00 77 00 73 00 20 00 32 00 30 00 30 00 32 00 20 .w.s. .2 .0.0.2. > [0030] 00 53 00 65 00 72 00 76 00 69 00 63 00 65 00 20 .S.e.r.v .i.c.e. > [0040] 00 50 00 61 00 63 00 6B 00 20 00 33 00 20 00 32 .P.a.c.k . .3. .2 > [0050] 00 36 00 30 00 30 00 00 00 57 00 69 00 6E 00 64 .6.0.0.. .W.i.n.d > [0060] 00 6F 00 77 00 73 00 20 00 32 00 30 00 30 00 32 .o.w.s. .2.0.0.2 > [0070] 00 20 00 35 00 2E 00 31 00 00 00 00 00 . .5...1 ..... >[2013/02/11 13:34:55.584728, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBsesssetupX (pid 12333) conn 0x0 >[2013/02/11 13:34:55.584758, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.584784, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.584809, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.584850, 5, pid=12333] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:55.584878, 3, pid=12333] smbd/sesssetup.c:1333(reply_sesssetup_and_X) > wct=13 flg2=0xc807 >[2013/02/11 13:34:55.584911, 3, pid=12333] smbd/sesssetup.c:1536(reply_sesssetup_and_X) > Domain=[WINXP] NativeOS=[Windows 2002 Service Pack 3 2600] NativeLanMan=[Windows 2002 5.1] PrimaryDomain=[] >[2013/02/11 13:34:55.584939, 10, pid=12333] lib/util.c:1624(set_remote_arch) > set_remote_arch: Client arch is 'WinXP' >[2013/02/11 13:34:55.584964, 2, pid=12333] smbd/sesssetup.c:1279(setup_new_vc_session) > setup_new_vc_session: New VC == 0, if NT4.x compatible we would close all old resources. >[2013/02/11 13:34:55.584990, 3, pid=12333] smbd/sesssetup.c:1552(reply_sesssetup_and_X) > sesssetupX:name=[WINXP]\[asn]@[192.168.52.63] >[2013/02/11 13:34:55.585024, 6, pid=12333] param/loadparm.c:7490(lp_file_list_changed) > lp_file_list_changed() > file /etc/samba/smb.conf -> /etc/samba/smb.conf last mod_time: Mon Feb 11 13:23:18 2013 > >[2013/02/11 13:34:55.585093, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:55.585118, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:55.585211, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:55.585243, 3, pid=12333] smbd/sesssetup.c:151(check_guest_password) > Got anonymous request >[2013/02/11 13:34:55.585270, 5, pid=12333] auth/auth.c:508(make_auth_context_subsystem) > Making default auth method list for security=share, encrypt passwords = yes >[2013/02/11 13:34:55.585297, 5, pid=12333] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match guest >[2013/02/11 13:34:55.585324, 5, pid=12333] auth/auth.c:410(load_auth_module) > load_auth_module: auth method guest has a valid init >[2013/02/11 13:34:55.585349, 5, pid=12333] auth/auth.c:385(load_auth_module) > load_auth_module: Attempting to find an auth method to match sam >[2013/02/11 13:34:55.585375, 5, pid=12333] auth/auth.c:410(load_auth_module) > load_auth_module: auth method sam has a valid init >[2013/02/11 13:34:55.585406, 5, pid=12333] auth/user_info.c:59(make_user_info) > attempting to make a user_info for () >[2013/02/11 13:34:55.585432, 5, pid=12333] auth/user_info.c:70(make_user_info) > making strings for 's user_info struct >[2013/02/11 13:34:55.585458, 5, pid=12333] auth/user_info.c:87(make_user_info) > making blobs for 's user_info struct >[2013/02/11 13:34:55.585483, 10, pid=12333] auth/user_info.c:123(make_user_info) > made a user_info for () >[2013/02/11 13:34:55.585508, 3, pid=12333] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user []\[]@[] with the new password interface >[2013/02/11 13:34:55.585534, 3, pid=12333] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: []\[]@[] >[2013/02/11 13:34:55.585560, 10, pid=12333] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by fixed >[2013/02/11 13:34:55.585585, 10, pid=12333] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:55.585614, 5, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 00 00 00 ........ >[2013/02/11 13:34:55.585650, 10, pid=12333] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [] >[2013/02/11 13:34:55.585685, 3, pid=12333] auth/auth.c:268(check_ntlm_password) > check_ntlm_password: guest authentication for user [] succeeded >[2013/02/11 13:34:55.585715, 5, pid=12333] auth/auth.c:309(check_ntlm_password) > check_ntlm_password: guest authentication for user [] -> [] -> [nobody] succeeded >[2013/02/11 13:34:55.585751, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtconX (pid 12333) conn 0x0 >[2013/02/11 13:34:55.585778, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.585804, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.585829, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.585868, 5, pid=12333] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:55.585900, 4, pid=12333] smbd/reply.c:794(reply_tcon_and_X) > Client requested device type [?????] for share [GURU] >[2013/02/11 13:34:55.585941, 5, pid=12333] smbd/service.c:1354(make_connection) > making a connection to 'normal' service guru >[2013/02/11 13:34:55.585974, 3, pid=12333] lib/access.c:338(allow_access) > Allowed connection from 192.168.52.63 (192.168.52.63) >[2013/02/11 13:34:55.586009, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user guru >[2013/02/11 13:34:55.586052, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is guru >[2013/02/11 13:34:55.586116, 5, pid=12333] lib/username.c:134(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as uppercase is GURU >[2013/02/11 13:34:55.586181, 5, pid=12333] lib/username.c:143(Get_Pwnam_internals) > Checking combinations of 0 uppercase letters in guru >[2013/02/11 13:34:55.586210, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals didn't find user [guru]! >[2013/02/11 13:34:55.586243, 5, pid=12333] auth/auth_util.c:110(make_user_info_map) > Mapping user [WINXP]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.586271, 5, pid=12333] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [WINXP] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.586298, 5, pid=12333] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:55.586324, 5, pid=12333] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:55.586350, 5, pid=12333] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:55.586375, 10, pid=12333] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:55.586401, 3, pid=12333] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [WINXP]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:55.586428, 3, pid=12333] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:55.586454, 10, pid=12333] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:55.586480, 10, pid=12333] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:55.586505, 5, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] E5 B5 CC C2 0E A7 BF 38 .......8 >[2013/02/11 13:34:55.586541, 10, pid=12333] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:55.586566, 10, pid=12333] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:55.586593, 10, pid=12333] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:55.586619, 8, pid=12333] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:55.586648, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.586678, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.586705, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.586730, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.586755, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.586821, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.586850, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.586876, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.586903, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.586932, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.586962, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.586989, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.587016, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.587056, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.587085, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.587112, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.587141, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.587167, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.587193, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.587219, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.587244, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.587293, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.587324, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.587355, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.587385, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.587428, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.587455, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.587480, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.587506, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.587531, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.587574, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.587606, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.587635, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:55.587661, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:55.587688, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:55.587760, 5, pid=12333] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 100 >[2013/02/11 13:34:55.587789, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.587815, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.587841, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.587867, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.587892, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.587944, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.587971, 10, pid=12333] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 100 -> sid S-1-22-2-100 >[2013/02/11 13:34:55.588006, 3, pid=12333] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:55.588038, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.588067, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.588093, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.588119, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.588144, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.588186, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.588215, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.588247, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.588274, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.588300, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.588326, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.588353, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.588381, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.588408, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.588435, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.588461, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.588490, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.588517, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.588547, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.588574, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.588599, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.588625, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.588650, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.588693, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.588722, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.588749, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.588777, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.588817, 10, pid=12333] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:55.588849, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.588880, 4, pid=12333] ../libcli/auth/ntlm_check.c:404(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password >[2013/02/11 13:34:55.589089, 3, pid=12333] ../libcli/auth/ntlm_check.c:418(ntlm_password_check) > ntlm_password_check: NT MD4 password check failed for user asn >[2013/02/11 13:34:55.589122, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589149, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.589175, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589200, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.589225, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.589268, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.589297, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.589325, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589351, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.589377, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589402, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.589427, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.589466, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.589492, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589518, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.589544, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.589569, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.589614, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:55.589643, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589672, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.589698, 9, pid=12333] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:55.589724, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589750, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.589775, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.589801, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.589826, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.589880, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.589907, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.589933, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.589958, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.589985, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.590014, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.590046, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.590073, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.590100, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.590129, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.590156, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.590182, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.590208, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.590234, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.590260, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.590285, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.590328, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.590356, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.590384, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.590412, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.590456, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.590483, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.590509, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.590535, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.590560, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.590602, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.590630, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.590658, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.590684, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.590709, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.590735, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.590760, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.590803, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.590831, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.590861, 5, pid=12333] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:55.590889, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:55.590918, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d7000 >[2013/02/11 13:34:55.590945, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:55.590973, 10, pid=12333] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:55.591003, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:55.591034, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23d7000 >[2013/02/11 13:34:55.591063, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:55.591097, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.591125, 5, pid=12333] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.591157, 2, pid=12333] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.591186, 5, pid=12333] auth/auth_util.c:110(make_user_info_map) > Mapping user [WINXP]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.591213, 5, pid=12333] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [WINXP] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.591239, 5, pid=12333] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:55.591265, 5, pid=12333] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:55.591291, 5, pid=12333] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:55.591316, 10, pid=12333] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:55.591345, 3, pid=12333] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [WINXP]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:55.591372, 3, pid=12333] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:55.591398, 10, pid=12333] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:55.591423, 10, pid=12333] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:55.591448, 5, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] E5 B5 CC C2 0E A7 BF 38 .......8 >[2013/02/11 13:34:55.591483, 10, pid=12333] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:55.591508, 10, pid=12333] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:55.591535, 10, pid=12333] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:55.591560, 8, pid=12333] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:55.591586, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.591613, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.591638, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.591664, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.591689, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.591735, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.591761, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.591787, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.591813, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.591840, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.591870, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.591896, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.591923, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.591950, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.591978, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.592004, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.592035, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.592064, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.592089, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.592115, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.592140, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.592186, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.592215, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.592242, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.592270, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.592310, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.592337, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.592363, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.592388, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.592414, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.592457, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.592486, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.592513, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:55.592539, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:55.592565, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:55.592597, 3, pid=12333] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:55.592625, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.592651, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.592677, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.592702, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.592727, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.592770, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.592799, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.592830, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.592856, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.592882, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.592908, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.592935, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.592963, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.592989, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.593016, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.593054, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.593084, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.593110, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.593137, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.593163, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.593189, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.593215, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.593240, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.593283, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.593312, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.593339, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.593367, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.593407, 10, pid=12333] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:55.593439, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.593466, 3, pid=12333] ../libcli/auth/ntlm_check.c:442(ntlm_password_check) > ntlm_password_check: Lanman passwords NOT PERMITTED for user asn >[2013/02/11 13:34:55.593492, 4, pid=12333] ../libcli/auth/ntlm_check.c:479(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with domain WINXP >[2013/02/11 13:34:55.593529, 4, pid=12333] ../libcli/auth/ntlm_check.c:508(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with upper-cased version of domain WINXP >[2013/02/11 13:34:55.593563, 4, pid=12333] ../libcli/auth/ntlm_check.c:536(ntlm_password_check) > ntlm_password_check: Checking LMv2 password without a domain >[2013/02/11 13:34:55.593596, 4, pid=12333] ../libcli/auth/ntlm_check.c:567(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password in LM field >[2013/02/11 13:34:55.593779, 3, pid=12333] ../libcli/auth/ntlm_check.c:586(ntlm_password_check) > ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user asn >[2013/02/11 13:34:55.593806, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.593832, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.593858, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.593884, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.593909, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.593951, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.593980, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.594007, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594040, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.594068, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594094, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.594119, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.594158, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.594184, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594210, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.594235, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.594260, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.594302, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:55.594331, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594360, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.594386, 9, pid=12333] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:55.594411, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594437, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.594462, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594488, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.594513, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.594563, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.594590, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.594616, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.594642, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.594669, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.594697, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.594724, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.594750, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.594777, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.594805, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.594832, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.594859, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.594885, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.594914, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.594940, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.594965, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.595009, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.595044, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.595071, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.595099, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.595140, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.595166, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.595192, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.595218, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.595243, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.595285, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.595314, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.595342, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.595368, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.595393, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.595419, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.595444, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.595486, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.595514, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.595544, 5, pid=12333] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:55.595572, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:55.595600, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c39e0 >[2013/02/11 13:34:55.595627, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:55.595656, 10, pid=12333] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:55.595685, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:55.595712, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c3530 >[2013/02/11 13:34:55.595743, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:55.595777, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.595808, 5, pid=12333] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.595835, 2, pid=12333] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.595865, 5, pid=12333] auth/auth_util.c:110(make_user_info_map) > Mapping user [DISCWORLD]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.595891, 5, pid=12333] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [DISCWORLD] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.595918, 5, pid=12333] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:55.595943, 5, pid=12333] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:55.595969, 5, pid=12333] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:55.595995, 10, pid=12333] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:55.596020, 3, pid=12333] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [DISCWORLD]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:55.596052, 3, pid=12333] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:55.596078, 10, pid=12333] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:55.596103, 10, pid=12333] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:55.596128, 5, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] E5 B5 CC C2 0E A7 BF 38 .......8 >[2013/02/11 13:34:55.596164, 10, pid=12333] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:55.596189, 10, pid=12333] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:55.596216, 10, pid=12333] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:55.596241, 8, pid=12333] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:55.596267, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.596294, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.596319, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.596345, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.596370, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.596416, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.596443, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.596469, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.596495, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.596521, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.596550, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.596576, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.596603, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.596633, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.596661, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.596688, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.596715, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.596741, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.596767, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.596793, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.596818, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.596860, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.596890, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.596917, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.596945, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.596985, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.597011, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.597057, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.597083, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.597109, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.597151, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.597180, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.597207, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:55.597232, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:55.597259, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:55.597291, 3, pid=12333] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:55.597318, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.597344, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.597370, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.597396, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.597421, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.597467, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.597495, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.597529, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.597555, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.597581, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.597606, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.597633, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.597661, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.597688, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.597714, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.597741, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.597769, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.597796, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.597823, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.597849, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.597875, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.597901, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.597926, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.597968, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.597996, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598023, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.598058, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.598099, 10, pid=12333] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:55.598130, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.598158, 4, pid=12333] ../libcli/auth/ntlm_check.c:404(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password >[2013/02/11 13:34:55.598342, 3, pid=12333] ../libcli/auth/ntlm_check.c:418(ntlm_password_check) > ntlm_password_check: NT MD4 password check failed for user asn >[2013/02/11 13:34:55.598368, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598394, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.598420, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598446, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.598470, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.598515, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.598544, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.598571, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598597, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.598623, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598648, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.598673, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.598712, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.598738, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598763, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.598789, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.598814, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.598856, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:55.598884, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598913, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.598939, 9, pid=12333] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:55.598964, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.598990, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.599016, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.599052, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.599077, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.599128, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.599155, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.599181, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.599207, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.599234, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.599262, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.599289, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.599315, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.599342, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.599370, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.599400, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.599427, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.599454, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.599479, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.599505, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.599530, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.599572, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.599602, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.599629, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.599657, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.599698, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.599724, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.599750, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.599775, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.599800, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.599843, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.599872, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.599899, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.599925, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.599951, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.599976, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.600001, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.600049, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.600078, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.600108, 5, pid=12333] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:55.600136, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:55.600164, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23cb410 >[2013/02/11 13:34:55.600191, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:55.600220, 10, pid=12333] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:55.600249, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:55.600279, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c3650 >[2013/02/11 13:34:55.600307, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:55.600340, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.600368, 5, pid=12333] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.600395, 2, pid=12333] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.600425, 5, pid=12333] auth/auth_util.c:110(make_user_info_map) > Mapping user [DISCWORLD]\[asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.600451, 5, pid=12333] auth/auth_util.c:131(make_user_info_map) > Mapped domain from [DISCWORLD] to [MAGRATHEA] for user [asn] from workstation [192.168.52.63] >[2013/02/11 13:34:55.600477, 5, pid=12333] auth/user_info.c:59(make_user_info) > attempting to make a user_info for asn (asn) >[2013/02/11 13:34:55.600503, 5, pid=12333] auth/user_info.c:70(make_user_info) > making strings for asn's user_info struct >[2013/02/11 13:34:55.600529, 5, pid=12333] auth/user_info.c:87(make_user_info) > making blobs for asn's user_info struct >[2013/02/11 13:34:55.600554, 10, pid=12333] auth/user_info.c:123(make_user_info) > made a user_info for asn (asn) >[2013/02/11 13:34:55.600579, 3, pid=12333] auth/auth.c:219(check_ntlm_password) > check_ntlm_password: Checking password for unmapped user [DISCWORLD]\[asn]@[192.168.52.63] with the new password interface >[2013/02/11 13:34:55.600606, 3, pid=12333] auth/auth.c:222(check_ntlm_password) > check_ntlm_password: mapped user is: [MAGRATHEA]\[asn]@[192.168.52.63] >[2013/02/11 13:34:55.600632, 10, pid=12333] auth/auth.c:231(check_ntlm_password) > check_ntlm_password: auth_context challenge created by random >[2013/02/11 13:34:55.600657, 10, pid=12333] auth/auth.c:233(check_ntlm_password) > challenge is: >[2013/02/11 13:34:55.600682, 5, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] E5 B5 CC C2 0E A7 BF 38 .......8 >[2013/02/11 13:34:55.600717, 10, pid=12333] auth/auth_builtin.c:44(check_guest_security) > Check auth for: [asn] >[2013/02/11 13:34:55.600742, 10, pid=12333] auth/auth.c:259(check_ntlm_password) > check_ntlm_password: guest had nothing to say >[2013/02/11 13:34:55.600769, 10, pid=12333] auth/auth_sam.c:75(auth_samstrict_auth) > Check auth for: [asn] >[2013/02/11 13:34:55.600794, 8, pid=12333] lib/util.c:1521(is_myname) > is_myname("MAGRATHEA") returns 1 >[2013/02/11 13:34:55.600821, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.600847, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.600872, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.600898, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.600923, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.600969, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.600996, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.601022, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.601056, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.601083, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.601115, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.601141, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.601168, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.601194, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.601222, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.601249, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.601276, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.601302, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.601327, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.601353, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.601378, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.601421, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.601450, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.601477, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.601505, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.601545, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.601572, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.601597, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.601623, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.601648, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.601690, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.601719, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.601746, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user asn >[2013/02/11 13:34:55.601772, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is asn >[2013/02/11 13:34:55.601799, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [asn]! >[2013/02/11 13:34:55.601830, 3, pid=12333] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for asn >[2013/02/11 13:34:55.601857, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.601883, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.601909, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.601935, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.601963, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.602006, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.602039, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.602072, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.602098, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.602124, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.602150, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.602177, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.602205, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.602232, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.602259, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.602285, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.602314, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.602340, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.602367, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.602393, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.602419, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.602445, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.602470, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.602512, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.602541, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.602568, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.602596, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.602637, 10, pid=12333] passdb/pdb_get_set.c:562(pdb_set_group_sid) > pdb_set_group_sid: setting group sid S-1-5-21-1406987565-2067085585-2387977275-513 >[2013/02/11 13:34:55.602672, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.602699, 3, pid=12333] ../libcli/auth/ntlm_check.c:442(ntlm_password_check) > ntlm_password_check: Lanman passwords NOT PERMITTED for user asn >[2013/02/11 13:34:55.602725, 4, pid=12333] ../libcli/auth/ntlm_check.c:479(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with domain DISCWORLD >[2013/02/11 13:34:55.602760, 4, pid=12333] ../libcli/auth/ntlm_check.c:508(ntlm_password_check) > ntlm_password_check: Checking LMv2 password with upper-cased version of domain DISCWORLD >[2013/02/11 13:34:55.602793, 4, pid=12333] ../libcli/auth/ntlm_check.c:536(ntlm_password_check) > ntlm_password_check: Checking LMv2 password without a domain >[2013/02/11 13:34:55.602830, 4, pid=12333] ../libcli/auth/ntlm_check.c:567(ntlm_password_check) > ntlm_password_check: Checking NT MD4 password in LM field >[2013/02/11 13:34:55.603013, 3, pid=12333] ../libcli/auth/ntlm_check.c:586(ntlm_password_check) > ntlm_password_check: LM password, NT MD4 password in LM field and LMv2 failed for user asn >[2013/02/11 13:34:55.603046, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603072, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.603098, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603124, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.603149, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.603191, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.603220, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.603247, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603272, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.603298, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603323, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.603348, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.603387, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.603414, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603439, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.603465, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.603490, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.603532, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: bad lockout attempt, val: 0 >[2013/02/11 13:34:55.603564, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603593, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.603619, 9, pid=12333] passdb/passdb.c:2253(pdb_increment_bad_password_count) > No lockout policy, don't track bad passwords >[2013/02/11 13:34:55.603644, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603670, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.603696, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.603721, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.603746, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.603796, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username asn, was >[2013/02/11 13:34:55.603823, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain DISCWORLD, was >[2013/02/11 13:34:55.603852, 10, pid=12333] passdb/pdb_get_set.c:621(pdb_set_nt_username) > pdb_set_nt_username: setting nt username , was >[2013/02/11 13:34:55.603878, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name Andreas Schneider, was >[2013/02/11 13:34:55.603905, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.603933, 10, pid=12333] passdb/pdb_get_set.c:737(pdb_set_homedir) > pdb_set_homedir: setting home dir \\magrathea\asn, was >[2013/02/11 13:34:55.603960, 10, pid=12333] passdb/pdb_get_set.c:713(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2013/02/11 13:34:55.603986, 10, pid=12333] passdb/pdb_get_set.c:667(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2013/02/11 13:34:55.604013, 4, pid=12333] lib/substitute.c:527(automount_server) > Home server: magrathea >[2013/02/11 13:34:55.604046, 10, pid=12333] passdb/pdb_get_set.c:690(pdb_set_profile_path) > pdb_set_profile_path: setting profile path \\magrathea\asn\profile, was >[2013/02/11 13:34:55.604073, 10, pid=12333] passdb/pdb_get_set.c:780(pdb_set_workstations) > pdb_set_workstations: setting workstations , was >[2013/02/11 13:34:55.604100, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.604126, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.604152, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.604177, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.604202, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.604245, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.604274, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.604301, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 >[2013/02/11 13:34:55.604329, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-1000 from rid 1000 >[2013/02/11 13:34:55.604370, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.604396, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.604422, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.604447, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.604472, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.604514, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: maximum password age, val: -1 >[2013/02/11 13:34:55.604543, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.604570, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.604596, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.604622, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.604647, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.604672, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.604718, 10, pid=12333] passdb/account_pol.c:339(account_policy_get) > account_policy_get: name: password history, val: 0 >[2013/02/11 13:34:55.604746, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.604776, 5, pid=12333] passdb/pdb_tdb.c:763(tdb_update_samacct_only) > Storing account asn with RID 1000 >[2013/02/11 13:34:55.604804, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 555345525F61736E00 >[2013/02/11 13:34:55.604832, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c9550 >[2013/02/11 13:34:55.604859, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 555345525F61736E00 >[2013/02/11 13:34:55.604887, 10, pid=12333] passdb/pdb_tdb.c:896(tdb_update_sam) > tdb_update_sam: Updating key for RID 1000 >[2013/02/11 13:34:55.604916, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 5249445F303030303033 >[2013/02/11 13:34:55.604944, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c9300 >[2013/02/11 13:34:55.604970, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 5249445F303030303033 >[2013/02/11 13:34:55.605003, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.605066, 5, pid=12333] auth/auth.c:271(check_ntlm_password) > check_ntlm_password: sam authentication for user [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.605096, 2, pid=12333] auth/auth.c:319(check_ntlm_password) > check_ntlm_password: Authentication for user [asn] -> [asn] FAILED with error NT_STATUS_WRONG_PASSWORD >[2013/02/11 13:34:55.605127, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:55.605153, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:55.605180, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:55.605206, 3, pid=12333] smbd/password.c:721(authorise_login) > authorise_login: ACCEPTED: guest account and guest ok (nobody) >[2013/02/11 13:34:55.605234, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:55.605260, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:55.605287, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:55.605317, 10, pid=12333] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\nobody => domain=[Unix User], name=[nobody] >[2013/02/11 13:34:55.605342, 10, pid=12333] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:55.605374, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:55.605399, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:55.605425, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:55.605453, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was >[2013/02/11 13:34:55.605479, 10, pid=12333] passdb/pdb_get_set.c:644(pdb_set_fullname) > pdb_set_full_name: setting full name nobody, was >[2013/02/11 13:34:55.605505, 10, pid=12333] passdb/pdb_get_set.c:598(pdb_set_domain) > pdb_set_domain: setting domain MAGRATHEA, was >[2013/02/11 13:34:55.605532, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 >[2013/02/11 13:34:55.605560, 10, pid=12333] passdb/pdb_compat.c:73(pdb_set_user_sid_from_rid) > pdb_set_user_sid_from_rid: > setting user sid S-1-5-21-1406987565-2067085585-2387977275-501 from rid 501 >[2013/02/11 13:34:55.605601, 10, pid=12333] passdb/pdb_get_set.c:575(pdb_set_username) > pdb_set_username: setting username nobody, was nobody >[2013/02/11 13:34:55.605628, 10, pid=12333] passdb/pdb_get_set.c:500(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-22-1-65534 >[2013/02/11 13:34:55.605665, 5, pid=12333] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 65533 >[2013/02/11 13:34:55.605691, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.605718, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.605743, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.605769, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.605794, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.605839, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.605866, 10, pid=12333] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 65533 -> sid S-1-22-2-65533 >[2013/02/11 13:34:55.605899, 3, pid=12333] passdb/lookup_sid.c:1754(get_primary_group_sid) > Forcing Primary Group to 'Domain Users' for nobody >[2013/02/11 13:34:55.605926, 10, pid=12333] auth/server_info.c:349(samu_to_SamInfo3) > Unix User found in struct samu. Rid marked as special and sid (S-1-22-1-65534) saved as extra sid >[2013/02/11 13:34:55.605958, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:55.605984, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:55.606011, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:55.606063, 10, pid=12333] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2013/02/11 13:34:55.606146, 5, pid=12333] passdb/lookup_sid.c:1384(gid_to_sid) > gid_to_sid: winbind failed to find a sid for gid 65534 >[2013/02/11 13:34:55.606174, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.606200, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.606226, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.606252, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.606277, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.606322, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.606349, 10, pid=12333] passdb/lookup_sid.c:1181(legacy_gid_to_sid) > LEGACY: gid 65534 -> sid S-1-22-2-65534 >[2013/02/11 13:34:55.606386, 10, pid=12333] passdb/lookup_sid.c:76(lookup_name) > lookup_name: MAGRATHEA\nobody => domain=[MAGRATHEA], name=[nobody] >[2013/02/11 13:34:55.606412, 10, pid=12333] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:55.606440, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.606466, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.606492, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.606518, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.606543, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.606589, 5, pid=12333] passdb/pdb_tdb.c:562(tdbsam_getsampwnam) > pdb_getsampwnam (TDB): error fetching database. > Key: USER_nobody >[2013/02/11 13:34:55.606628, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.606655, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.606681, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.606706, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.606732, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.606757, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.606801, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.606829, 10, pid=12333] passdb/lookup_sid.c:76(lookup_name) > lookup_name: Unix User\nobody => domain=[Unix User], name=[nobody] >[2013/02/11 13:34:55.606854, 10, pid=12333] passdb/lookup_sid.c:77(lookup_name) > lookup_name: flags = 0x073 >[2013/02/11 13:34:55.606883, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:55.606908, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:55.606935, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:55.606964, 10, pid=12333] passdb/lookup_sid.c:1544(sid_to_uid) > sid S-1-22-1-65534 -> uid 65534 >[2013/02/11 13:34:55.607071, 10, pid=12333] lib/system_smbd.c:175(sys_getgrouplist) > sys_getgrouplist: user [nobody] >[2013/02/11 13:34:55.607151, 10, pid=12333] auth/token_util.c:339(create_local_nt_token) > Create local NT token for S-1-22-1-65534 >[2013/02/11 13:34:55.607194, 10, pid=12333] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:55.607223, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607249, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.607275, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607300, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.607325, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.607373, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.607399, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:55.607426, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607452, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.607478, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607503, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.607528, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.607590, 10, pid=12333] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-544 >[2013/02/11 13:34:55.607618, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.607648, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607674, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.607699, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.607724, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.607770, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607796, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-544 >[2013/02/11 13:34:55.607826, 5, pid=12333] passdb/pdb_util.c:128(create_builtin_administrators) > create_builtin_administrators: Failed to create Administrators >[2013/02/11 13:34:55.607853, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.607889, 10, pid=12333] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:55.607917, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607943, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.607969, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.607994, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.608019, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.608077, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.608104, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:55.608131, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.608157, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.608182, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.608208, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.608233, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.608285, 10, pid=12333] passdb/lookup_sid.c:1628(sid_to_gid) > winbind failed to find a gid for sid S-1-5-32-545 >[2013/02/11 13:34:55.608313, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.608339, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.608365, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 2 >[2013/02/11 13:34:55.608390, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.608415, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.608461, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.608487, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-545 >[2013/02/11 13:34:55.608516, 5, pid=12333] passdb/pdb_util.c:99(create_builtin_users) > create_builtin_users: Failed to create Users >[2013/02/11 13:34:55.608543, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.608573, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.608599, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.608625, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.608650, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.608675, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.608746, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.608779, 4, pid=12333] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-1-65534] >[2013/02/11 13:34:55.608810, 4, pid=12333] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65533] >[2013/02/11 13:34:55.608840, 4, pid=12333] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-22-2-65534] >[2013/02/11 13:34:55.608871, 5, pid=12333] lib/privileges.c:175(get_privileges_for_sids) > get_privileges_for_sids: sid = S-1-1-0 > Privilege set: 0x0 >[2013/02/11 13:34:55.608911, 4, pid=12333] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-2] >[2013/02/11 13:34:55.608941, 4, pid=12333] lib/privileges.c:97(get_privileges) > get_privileges: No privileges assigned to SID [S-1-5-32-546] >[2013/02/11 13:34:55.609003, 10, pid=12333] passdb/lookup_sid.c:1468(sids_to_unix_ids) > wbcSidsToUnixIds returned WBC_ERR_WINBIND_NOT_AVAILABLE >[2013/02/11 13:34:55.609043, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.609072, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.609098, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.609123, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.609148, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.609194, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.609220, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:55.609247, 10, pid=12333] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-1-0 >[2013/02/11 13:34:55.609275, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.609301, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.609327, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.609352, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.609377, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.609422, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.609449, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:55.609475, 10, pid=12333] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-2 >[2013/02/11 13:34:55.609503, 4, pid=12333] smbd/sec_ctx.c:214(push_sec_ctx) > push_sec_ctx(0, 0) : sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.609529, 4, pid=12333] smbd/uid.c:460(push_conn_ctx) > push_conn_ctx(0) : conn_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.609558, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 1 >[2013/02/11 13:34:55.609584, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.609609, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.609654, 4, pid=12333] smbd/sec_ctx.c:422(pop_sec_ctx) > pop_sec_ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.609680, 10, pid=12333] passdb/lookup_sid.c:1253(legacy_sid_to_gid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:55.609707, 10, pid=12333] passdb/lookup_sid.c:1218(legacy_sid_to_uid) > LEGACY: mapping failed for sid S-1-5-32-546 >[2013/02/11 13:34:55.609735, 10, pid=12333] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-1-0 to gid, ignoring it >[2013/02/11 13:34:55.609762, 10, pid=12333] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-2 to gid, ignoring it >[2013/02/11 13:34:55.609789, 10, pid=12333] auth/auth_util.c:505(create_local_token) > Could not convert SID S-1-5-32-546 to gid, ignoring it >[2013/02/11 13:34:55.609817, 10, pid=12333] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:55.609936, 10, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:55.609997, 5, pid=12333] lib/username.c:171(Get_Pwnam_alloc) > Finding user nobody >[2013/02/11 13:34:55.610022, 5, pid=12333] lib/username.c:116(Get_Pwnam_internals) > Trying _Get_Pwnam(), username as lowercase is nobody >[2013/02/11 13:34:55.610056, 5, pid=12333] lib/username.c:149(Get_Pwnam_internals) > Get_Pwnam_internals did find user [nobody]! >[2013/02/11 13:34:55.610088, 10, pid=12333] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:55.610116, 3, pid=12333] smbd/service.c:872(make_connection_snum) > Connect path is '/srv/samba/tmp' for service [guru] >[2013/02/11 13:34:55.610157, 10, pid=12333] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:55.610189, 10, pid=12333] ../libcli/security/access_check.c:178(se_access_check) > se_access_check: MAX desired = 0x2000000, granted = 0x101f01ff, remaining = 0x101f01ff >[2013/02/11 13:34:55.610219, 3, pid=12333] smbd/vfs.c:102(vfs_init_default) > Initialising default vfs hooks >[2013/02/11 13:34:55.610247, 10, pid=12333] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ >[2013/02/11 13:34:55.610274, 5, pid=12333] smbd/vfs.c:92(smb_register_vfs) > Successfully added vfs backend '/[Default VFS]/' >[2013/02/11 13:34:55.610301, 10, pid=12333] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for posixacl >[2013/02/11 13:34:55.610327, 5, pid=12333] smbd/vfs.c:92(smb_register_vfs) > Successfully added vfs backend 'posixacl' >[2013/02/11 13:34:55.610352, 3, pid=12333] smbd/vfs.c:128(vfs_init_custom) > Initialising custom vfs hooks from [/[Default VFS]/] >[2013/02/11 13:34:55.610378, 10, pid=12333] smbd/vfs.c:53(vfs_find_backend_entry) > vfs_find_backend_entry called for /[Default VFS]/ > Successfully loaded vfs module [/[Default VFS]/] with the new modules system >[2013/02/11 13:34:55.610419, 5, pid=12333] smbd/connection.c:134(claim_connection) > claiming [guru] >[2013/02/11 13:34:55.610483, 10, pid=12333] lib/dbwrap_tdb.c:102(db_tdb_fetch_locked) > Locking key 2D300000FFFFFFFF3FBA >[2013/02/11 13:34:55.610515, 10, pid=12333] lib/dbwrap_tdb.c:131(db_tdb_fetch_locked) > Allocated locked data 0x0x23c7060 >[2013/02/11 13:34:55.610572, 10, pid=12333] lib/dbwrap_tdb.c:44(db_tdb_record_destr) > Unlocking key 2D300000FFFFFFFF3FBA >[2013/02/11 13:34:55.610679, 10, pid=12333] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:55.610713, 10, pid=12333] smbd/share_access.c:241(user_ok_token) > user_ok_token: share guru is ok for unix user nobody >[2013/02/11 13:34:55.610742, 10, pid=12333] smbd/share_access.c:286(is_share_read_only_for_token) > is_share_read_only_for_user: share guru is read-write for unix user nobody >[2013/02/11 13:34:55.610775, 10, pid=12333] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:55.610808, 10, pid=12333] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:55.610839, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (65534, 65533) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.610866, 5, pid=12333] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:55.610984, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:55.611053, 5, pid=12333] smbd/uid.c:317(change_to_user_internal) > Impersonated user: uid=(0,65534), gid=(0,65533) >[2013/02/11 13:34:55.611083, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (0, 0) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.611109, 5, pid=12333] ../libcli/security/security_token.c:53(security_token_debug) > Security token: (NULL) >[2013/02/11 13:34:55.611135, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 0 > Primary group is 0 and contains 0 supplementary groups >[2013/02/11 13:34:55.611175, 5, pid=12333] smbd/uid.c:400(change_to_root_user) > change_to_root_user: now uid=(0,0) gid=(0,0) >[2013/02/11 13:34:55.611207, 10, pid=12333] smbd/service.c:162(set_conn_connectpath) > set_conn_connectpath: service guru, connectpath = /srv/samba/tmp >[2013/02/11 13:34:55.611246, 10, pid=12333] modules/vfs_default.c:160(vfswrap_fs_capabilities) > vfswrap_fs_capabilities: timestamp resolution of sec available on share guru, directory /srv/samba/tmp >[2013/02/11 13:34:55.611275, 1, pid=12333] smbd/service.c:1114(make_connection_snum) > 192.168.52.63 (192.168.52.63) connect to service guru initially as user nobody (uid=65534, gid=65533) (pid 12333) >[2013/02/11 13:34:55.611310, 3, pid=12333] smbd/reply.c:871(reply_tcon_and_X) > tconX service=GURU >[2013/02/11 13:34:55.611679, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 76 >[2013/02/11 13:34:55.611777, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x4c >[2013/02/11 13:34:55.611816, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 2 of length 80 (0 toread) >[2013/02/11 13:34:55.611853, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.611874, 5, pid=12333] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=128 > smt_wct=15 > smb_vwv[ 0]= 8 (0x8) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 8 (0x8) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=11 >[2013/02/11 13:34:55.612324, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 00 00 ........ ... >[2013/02/11 13:34:55.612386, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.612428, 10, pid=12333] smbd/share_access.c:241(user_ok_token) > user_ok_token: share guru is ok for unix user nobody >[2013/02/11 13:34:55.612469, 10, pid=12333] smbd/share_access.c:286(is_share_read_only_for_token) > is_share_read_only_for_user: share guru is read-write for unix user nobody >[2013/02/11 13:34:55.612524, 10, pid=12333] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:55.612572, 10, pid=12333] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0x10000000 to 0x001f01ff >[2013/02/11 13:34:55.612614, 4, pid=12333] smbd/sec_ctx.c:314(set_sec_ctx) > setting sec ctx (65534, 65533) - sec_ctx_stack_ndx = 0 >[2013/02/11 13:34:55.612653, 5, pid=12333] ../libcli/security/security_token.c:63(security_token_debug) > Security token SIDs (6): > SID[ 0]: S-1-22-1-65534 > SID[ 1]: S-1-22-2-65533 > SID[ 2]: S-1-22-2-65534 > SID[ 3]: S-1-1-0 > SID[ 4]: S-1-5-2 > SID[ 5]: S-1-5-32-546 > Privileges (0x 0): > Rights (0x 0): >[2013/02/11 13:34:55.612823, 5, pid=12333] auth/token_util.c:527(debug_unix_user_token) > UNIX token of user 65534 > Primary group is 65533 and contains 2 supplementary groups > Group[ 0]: 65533 > Group[ 1]: 65534 >[2013/02/11 13:34:55.612916, 5, pid=12333] smbd/uid.c:317(change_to_user_internal) > Impersonated user: uid=(0,65534), gid=(0,65533) >[2013/02/11 13:34:55.612960, 4, pid=12333] smbd/vfs.c:780(vfs_ChDir) > vfs_ChDir to /srv/samba/tmp >[2013/02/11 13:34:55.613024, 3, pid=12333] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:55.613093, 5, pid=12333] smbd/filename.c:257(unix_convert) > unix_convert called on file "" >[2013/02/11 13:34:55.613136, 5, pid=12333] smbd/filename.c:291(unix_convert) > conversion finished "" -> . >[2013/02/11 13:34:55.613174, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:55.613216, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:55.613253, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:55.613305, 10, pid=12333] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/. hash 0x7b0b73a6 >[2013/02/11 13:34:55.613372, 10, pid=12333] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:55.613413, 3, pid=12333] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo . (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:55.613454, 5, pid=12333] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: . (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:55.613494, 8, pid=12333] smbd/dosmode.c:621(dos_mode) > dos_mode: . >[2013/02/11 13:34:55.613572, 8, pid=12333] smbd/dosmode.c:199(dos_mode_from_sbuf) > dos_mode_from_sbuf returning d >[2013/02/11 13:34:55.613611, 8, pid=12333] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:55.613657, 10, pid=12333] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:55.613693, 5, pid=12333] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:28 2013 > access: Mon Feb 11 13:34:28 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:55.613815, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:55.613852, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:55.613894, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.613915, 5, pid=12333] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=128 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:55.614271, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 8A BD CF 21 54 08 CE 01 8A BD CF ........ !T...... > [0010] 21 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 !T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:55.614740, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 70 >[2013/02/11 13:34:55.614795, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x46 >[2013/02/11 13:34:55.614833, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 3 of length 74 (0 toread) >[2013/02/11 13:34:55.614870, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.614891, 5, pid=12333] lib/util.c:342(show_msg) > size=70 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=192 > smt_wct=15 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 560 (0x230) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 2 (0x2) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 3 (0x3) > smb_bcc=5 >[2013/02/11 13:34:55.615340, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 05 01 ..... >[2013/02/11 13:34:55.615388, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.615428, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.615468, 3, pid=12333] smbd/trans2.c:3507(call_trans2qfsinfo) > call_trans2qfsinfo: level = 261 >[2013/02/11 13:34:55.615512, 3, pid=12333] smbd/trans2.c:2945(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 261 >[2013/02/11 13:34:55.615564, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 0, data_sent_thistime = 20, useable_space = 16584 >[2013/02/11 13:34:55.615602, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 0, data_to_send = 20, paramsize = 0, datasize = 20 >[2013/02/11 13:34:55.615639, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.615660, 5, pid=12333] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=192 > smt_wct=10 > smb_vwv[ 0]= 0 (0x0) > smb_vwv[ 1]= 20 (0x14) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 20 (0x14) > smb_vwv[ 7]= 56 (0x38) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=21 >[2013/02/11 13:34:55.616008, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 2F 00 01 00 FF 00 00 00 08 00 00 00 4E 00 54 ./...... .....N.T > [0010] 00 46 00 53 00 .F.S. >[2013/02/11 13:34:55.616107, 4, pid=12333] smbd/trans2.c:3523(call_trans2qfsinfo) > SMBtrans2 info_level = 261 >[2013/02/11 13:34:55.616748, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 104 >[2013/02/11 13:34:55.616797, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x68 >[2013/02/11 13:34:55.616840, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 4 of length 108 (0 toread) >[2013/02/11 13:34:55.616877, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.616897, 5, pid=12333] lib/util.c:342(show_msg) > size=104 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=256 > smt_wct=15 > smb_vwv[ 0]= 36 (0x24) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 36 (0x24) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=39 >[2013/02/11 13:34:55.617332, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 07 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C 00 64 .N.e.w. .F.o.l.d > [0020] 00 65 00 72 00 00 00 .e.r... >[2013/02/11 13:34:55.617446, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.617483, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.617525, 3, pid=12333] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=1, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:55.617568, 5, pid=12333] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:55.617607, 10, pid=12333] smbd/statcache.c:244(stat_cache_lookup) > stat_cache_lookup: lookup failed for name [NEW FOLDER] >[2013/02/11 13:34:55.617645, 5, pid=12333] smbd/filename.c:416(unix_convert) > unix_convert begin: name = New Folder, dirpath = , start = New Folder >[2013/02/11 13:34:55.617693, 5, pid=12333] smbd/statcache.c:143(stat_cache_add) > stat_cache_add: Added entry (23df690:size a) NEW FOLDER -> New Folder >[2013/02/11 13:34:55.617731, 5, pid=12333] smbd/filename.c:439(unix_convert) > conversion of base_name finished New Folder -> New Folder >[2013/02/11 13:34:55.617768, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:55.617810, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:55.617846, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:55.617883, 5, pid=12333] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = New Folder >[2013/02/11 13:34:55.617924, 5, pid=12333] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:55.617962, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:55.618001, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:55.618046, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:55.618111, 3, pid=12333] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:55.618150, 4, pid=12333] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = New Folder, attr = 22 >[2013/02/11 13:34:55.618187, 8, pid=12333] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:55.618236, 6, pid=12333] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23b43f0 now at offset -1 >[2013/02/11 13:34:55.618280, 8, pid=12333] smbd/dosmode.c:621(dos_mode) > dos_mode: ./New Folder >[2013/02/11 13:34:55.618350, 10, pid=12333] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: ./New Folder attr = 0x10 >[2013/02/11 13:34:55.618394, 10, pid=12333] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file ./New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:55.618455, 8, pid=12333] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:55.618493, 8, pid=12333] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:55.618539, 10, pid=12333] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:55.618576, 3, pid=12333] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[New Folder] found ./New Folder fname=New Folder (New Folder) >[2013/02/11 13:34:55.618617, 10, pid=12333] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:55.618656, 10, pid=12333] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:55.618706, 10, pid=12333] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:55.618754, 5, pid=12333] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:55.618792, 4, pid=12333] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:55.618847, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 116, useable_space = 16582 >[2013/02/11 13:34:55.618886, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 116, paramsize = 10, datasize = 116 >[2013/02/11 13:34:55.618922, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.618943, 5, pid=12333] lib/util.c:342(show_msg) > size=184 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=256 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 116 (0x74) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 116 (0x74) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=129 >[2013/02/11 13:34:55.619297, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 01 00 01 00 00 00 00 00 00 00 74 00 00 ........ .....t.. > [0010] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0020] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0030] 31 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 1T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 14 00 00 00 00 00 00 ........ ........ > [0050] 00 10 00 4E 00 55 00 4A 00 52 00 48 00 57 00 7E ...N.U.J .R.H.W.~ > [0060] 00 37 00 00 00 00 00 00 00 00 00 4E 00 65 00 77 .7...... ...N.e.w > [0070] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0080] 00 . >[2013/02/11 13:34:55.619509, 4, pid=12333] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=New Folder directory=. dirtype=22 numentries=1 >[2013/02/11 13:34:55.619540, 10, pid=12333] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:55.619958, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 70 >[2013/02/11 13:34:55.619989, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x46 >[2013/02/11 13:34:55.620015, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 5 of length 74 (0 toread) >[2013/02/11 13:34:55.620047, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.620062, 5, pid=12333] lib/util.c:342(show_msg) > size=70 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=320 > smt_wct=15 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 560 (0x230) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 2 (0x2) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 3 (0x3) > smb_bcc=5 >[2013/02/11 13:34:55.620366, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 05 01 ..... >[2013/02/11 13:34:55.620399, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.620426, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.620452, 3, pid=12333] smbd/trans2.c:3507(call_trans2qfsinfo) > call_trans2qfsinfo: level = 261 >[2013/02/11 13:34:55.620479, 3, pid=12333] smbd/trans2.c:2945(smbd_do_qfsinfo) > smbd_do_qfsinfo: level = 261 >[2013/02/11 13:34:55.620510, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 0, data_sent_thistime = 20, useable_space = 16584 >[2013/02/11 13:34:55.620536, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 0, data_to_send = 20, paramsize = 0, datasize = 20 >[2013/02/11 13:34:55.620562, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.620576, 5, pid=12333] lib/util.c:342(show_msg) > size=76 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=320 > smt_wct=10 > smb_vwv[ 0]= 0 (0x0) > smb_vwv[ 1]= 20 (0x14) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 0 (0x0) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 20 (0x14) > smb_vwv[ 7]= 56 (0x38) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=21 >[2013/02/11 13:34:55.620823, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 2F 00 01 00 FF 00 00 00 08 00 00 00 4E 00 54 ./...... .....N.T > [0010] 00 46 00 53 00 .F.S. >[2013/02/11 13:34:55.620886, 4, pid=12333] smbd/trans2.c:3523(call_trans2qfsinfo) > SMBtrans2 info_level = 261 >[2013/02/11 13:34:55.621780, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:55.621812, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:55.621838, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 6 of length 102 (0 toread) >[2013/02/11 13:34:55.621864, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.621878, 5, pid=12333] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=384 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:55.622187, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:55.622261, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.622288, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.622314, 3, pid=12333] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:55.622343, 5, pid=12333] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:55.622373, 10, pid=12333] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:55.622402, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:55.622431, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:55.622457, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:55.622486, 10, pid=12333] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:55.622515, 10, pid=12333] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:55.622541, 3, pid=12333] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:55.622568, 5, pid=12333] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:55.622594, 8, pid=12333] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:55.622630, 10, pid=12333] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:55.622657, 10, pid=12333] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:55.622696, 8, pid=12333] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:55.622722, 8, pid=12333] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:55.622751, 10, pid=12333] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:55.622776, 5, pid=12333] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:54 2013 > access: Mon Feb 11 13:34:54 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:55.622858, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:55.622884, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:55.622910, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.622925, 5, pid=12333] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=384 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:55.623177, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0010] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:55.623469, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 98 >[2013/02/11 13:34:55.623505, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x62 >[2013/02/11 13:34:55.623532, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 7 of length 102 (0 toread) >[2013/02/11 13:34:55.623558, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.623573, 5, pid=12333] lib/util.c:342(show_msg) > size=98 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=448 > smt_wct=15 > smb_vwv[ 0]= 30 (0x1E) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 2 (0x2) > smb_vwv[ 3]= 40 (0x28) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 30 (0x1E) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 5 (0x5) > smb_bcc=33 >[2013/02/11 13:34:55.623879, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 EC 03 00 00 00 00 5C 00 4E 00 65 00 77 ........ .\.N.e.w > [0010] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0020] 00 . >[2013/02/11 13:34:55.623953, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.623979, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.624006, 3, pid=12333] smbd/trans2.c:5132(call_trans2qfilepathinfo) > call_trans2qfilepathinfo: TRANSACT2_QPATHINFO: level = 1004 >[2013/02/11 13:34:55.624041, 5, pid=12333] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:55.624071, 10, pid=12333] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:55.624099, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:55.624129, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:55.624155, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:55.624184, 10, pid=12333] smbd/files.c:705(file_name_hash) > file_name_hash: /srv/samba/tmp/New Folder hash 0x73dbb840 >[2013/02/11 13:34:55.624214, 10, pid=12333] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:55.624240, 3, pid=12333] smbd/trans2.c:5276(call_trans2qfilepathinfo) > call_trans2qfilepathinfo New Folder (fnum = -1) level=1004 call=5 total_data=0 >[2013/02/11 13:34:55.624267, 5, pid=12333] smbd/trans2.c:4243(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: New Folder (fnum = -1) level=1004 max_data=40 >[2013/02/11 13:34:55.624294, 8, pid=12333] smbd/dosmode.c:621(dos_mode) > dos_mode: New Folder >[2013/02/11 13:34:55.624329, 10, pid=12333] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: New Folder attr = 0x10 >[2013/02/11 13:34:55.624357, 10, pid=12333] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:55.624396, 8, pid=12333] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:55.624422, 8, pid=12333] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:55.624454, 10, pid=12333] smbd/trans2.c:4472(smbd_do_qfilepathinfo) > smbd_do_qfilepathinfo: SMB_FILE_BASIC_INFORMATION >[2013/02/11 13:34:55.624480, 5, pid=12333] smbd/trans2.c:4482(smbd_do_qfilepathinfo) > SMB_QFBI - create: Mon Feb 11 13:34:54 2013 > access: Mon Feb 11 13:34:54 2013 > write: Mon Feb 11 13:34:54 2013 > change: Mon Feb 11 13:34:54 2013 > mode: 10 >[2013/02/11 13:34:55.624562, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 2, data_sent_thistime = 40, useable_space = 16582 >[2013/02/11 13:34:55.624588, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 2, data_to_send = 40, paramsize = 2, datasize = 40 >[2013/02/11 13:34:55.624614, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.624629, 5, pid=12333] lib/util.c:342(show_msg) > size=100 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=448 > smt_wct=10 > smb_vwv[ 0]= 2 (0x2) > smb_vwv[ 1]= 40 (0x28) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 2 (0x2) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 40 (0x28) > smb_vwv[ 7]= 60 (0x3C) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=45 >[2013/02/11 13:34:55.624881, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0010] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0020] 31 54 08 CE 01 10 00 00 00 00 00 00 00 1T...... ..... >[2013/02/11 13:34:55.625432, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 104 >[2013/02/11 13:34:55.625468, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x68 >[2013/02/11 13:34:55.625495, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 8 of length 108 (0 toread) >[2013/02/11 13:34:55.625521, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.625535, 5, pid=12333] lib/util.c:342(show_msg) > size=104 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=512 > smt_wct=15 > smb_vwv[ 0]= 36 (0x24) > smb_vwv[ 1]= 0 (0x0) > smb_vwv[ 2]= 10 (0xA) > smb_vwv[ 3]=16384 (0x4000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]= 0 (0x0) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 36 (0x24) > smb_vwv[10]= 68 (0x44) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 1 (0x1) > smb_vwv[14]= 1 (0x1) > smb_bcc=39 >[2013/02/11 13:34:55.625836, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 00 00 16 00 56 05 07 00 04 01 00 00 00 00 5C .....V.. .......\ > [0010] 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C 00 64 .N.e.w. .F.o.l.d > [0020] 00 65 00 72 00 00 00 .e.r... >[2013/02/11 13:34:55.625912, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBtrans2 (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.625938, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.625966, 3, pid=12333] smbd/trans2.c:2286(call_trans2findfirst) > call_trans2findfirst: dirtype = 16, maxentries = 1366, close_after_first=1, close_if_end = 1 requires_resume_key = 1 level = 0x104, max_data_bytes = 16384 >[2013/02/11 13:34:55.625996, 5, pid=12333] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:55.626023, 10, pid=12333] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:55.626057, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:55.626086, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:55.626112, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:55.626138, 5, pid=12333] smbd/trans2.c:2371(call_trans2findfirst) > dir=., mask = New Folder >[2013/02/11 13:34:55.626164, 5, pid=12333] smbd/dir.c:439(dptr_create) > dptr_create dir=. >[2013/02/11 13:34:55.626189, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [.] [/srv/samba/tmp] >[2013/02/11 13:34:55.626216, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [.] -> [/srv/samba/tmp] >[2013/02/11 13:34:55.626242, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: . reduced to /srv/samba/tmp >[2013/02/11 13:34:55.626272, 3, pid=12333] smbd/dir.c:578(dptr_create) > creating new dirptr 256 for path ., expect_close = 1 >[2013/02/11 13:34:55.626298, 4, pid=12333] smbd/trans2.c:2439(call_trans2findfirst) > dptr_num is 256, wcard = New Folder, attr = 22 >[2013/02/11 13:34:55.626324, 8, pid=12333] smbd/trans2.c:2448(call_trans2findfirst) > dirpath=<.> dontdescend=<> >[2013/02/11 13:34:55.626360, 6, pid=12333] smbd/dir.c:969(smbd_dirptr_get_entry) > smbd_dirptr_get_entry: dirptr 0x23b2a10 now at offset -1 >[2013/02/11 13:34:55.626388, 8, pid=12333] smbd/dosmode.c:621(dos_mode) > dos_mode: ./New Folder >[2013/02/11 13:34:55.626423, 10, pid=12333] smbd/dosmode.c:268(get_ea_dos_attribute) > get_ea_dos_attribute: ./New Folder attr = 0x10 >[2013/02/11 13:34:55.626450, 10, pid=12333] smbd/dosmode.c:310(get_ea_dos_attribute) > get_ea_dos_attribute: file ./New Folder case 3 set btime Mon Feb 11 13:34:54 2013 > >[2013/02/11 13:34:55.626489, 8, pid=12333] smbd/dosmode.c:326(get_ea_dos_attribute) > get_ea_dos_attribute returning (0x10)d >[2013/02/11 13:34:55.626516, 8, pid=12333] smbd/dosmode.c:672(dos_mode) > dos_mode returning d >[2013/02/11 13:34:55.626545, 10, pid=12333] locking/locking.c:1026(fetch_share_mode_unlocked) > fetch_share_mode_unlocked: no share_mode record around (file not open) >[2013/02/11 13:34:55.626571, 3, pid=12333] smbd/dir.c:1041(smbd_dirptr_get_entry) > smbd_dirptr_get_entry mask=[New Folder] found ./New Folder fname=New Folder (New Folder) >[2013/02/11 13:34:55.626600, 10, pid=12333] smbd/trans2.c:1572(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: space_remaining = 16384 >[2013/02/11 13:34:55.626626, 10, pid=12333] smbd/trans2.c:1721(smbd_marshall_dir_entry) > smbd_marshall_dir_entry: SMB_FIND_FILE_BOTH_DIRECTORY_INFO >[2013/02/11 13:34:55.626654, 10, pid=12333] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:55.626684, 5, pid=12333] smbd/trans2.c:2505(call_trans2findfirst) > call_trans2findfirst - (2) closing dptr_num 256 >[2013/02/11 13:34:55.626710, 4, pid=12333] smbd/dir.c:257(dptr_close_internal) > closing dptr key 256 >[2013/02/11 13:34:55.626739, 9, pid=12333] smbd/trans2.c:935(send_trans2_replies) > t2_rep: params_sent_thistime = 10, data_sent_thistime = 116, useable_space = 16582 >[2013/02/11 13:34:55.626765, 9, pid=12333] smbd/trans2.c:937(send_trans2_replies) > t2_rep: params_to_send = 10, data_to_send = 116, paramsize = 10, datasize = 116 >[2013/02/11 13:34:55.626791, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.626806, 5, pid=12333] lib/util.c:342(show_msg) > size=184 > smb_com=0x32 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=136 > smb_flg2=49155 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=512 > smt_wct=10 > smb_vwv[ 0]= 10 (0xA) > smb_vwv[ 1]= 116 (0x74) > smb_vwv[ 2]= 0 (0x0) > smb_vwv[ 3]= 10 (0xA) > smb_vwv[ 4]= 56 (0x38) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 116 (0x74) > smb_vwv[ 7]= 68 (0x44) > smb_vwv[ 8]= 0 (0x0) > smb_vwv[ 9]= 0 (0x0) > smb_bcc=129 >[2013/02/11 13:34:55.627061, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 FD FF 01 00 01 00 00 00 00 00 00 00 74 00 00 ........ .....t.. > [0010] 00 00 00 00 00 65 0E 24 31 54 08 CE 01 65 0E 24 .....e.$ 1T...e.$ > [0020] 31 54 08 CE 01 65 0E 24 31 54 08 CE 01 65 0E 24 1T...e.$ 1T...e.$ > [0030] 31 54 08 CE 01 00 00 00 00 00 00 00 00 00 00 00 1T...... ........ > [0040] 00 00 00 00 00 10 00 00 00 14 00 00 00 00 00 00 ........ ........ > [0050] 00 10 00 4E 00 55 00 4A 00 52 00 48 00 57 00 7E ...N.U.J .R.H.W.~ > [0060] 00 37 00 00 00 00 00 00 00 00 00 4E 00 65 00 77 .7...... ...N.e.w > [0070] 00 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 00 . .F.o.l .d.e.r.. > [0080] 00 . >[2013/02/11 13:34:55.627271, 4, pid=12333] smbd/trans2.c:2549(call_trans2findfirst) > SMBtrans2 mask=New Folder directory=. dirtype=22 numentries=1 >[2013/02/11 13:34:55.627301, 10, pid=12333] smbd/mangle_hash2.c:792(hash2_name_to_8_3) > hash2_name_to_8_3: New Folder -> 6E19BE57 -> NUJRHW~7 (cache=1) >[2013/02/11 13:34:55.627654, 10, pid=12333] lib/util_sock.c:519(read_smb_length_return_keepalive) > got smb length of 108 >[2013/02/11 13:34:55.627686, 6, pid=12333] smbd/process.c:1660(process_smb) > got message type 0x0 of len 0x6c >[2013/02/11 13:34:55.627712, 3, pid=12333] smbd/process.c:1662(process_smb) > Transaction 9 of length 112 (0 toread) >[2013/02/11 13:34:55.627742, 5, pid=12333] lib/util.c:332(show_msg) >[2013/02/11 13:34:55.627757, 5, pid=12333] lib/util.c:342(show_msg) > size=108 > smb_com=0xa2 > smb_rcls=0 > smb_reh=0 > smb_err=0 > smb_flg=24 > smb_flg2=51207 > smb_tid=1 > smb_pid=1552 > smb_uid=0 > smb_mid=576 > smt_wct=24 > smb_vwv[ 0]= 255 (0xFF) > smb_vwv[ 1]=57054 (0xDEDE) > smb_vwv[ 2]= 5632 (0x1600) > smb_vwv[ 3]= 4096 (0x1000) > smb_vwv[ 4]= 0 (0x0) > smb_vwv[ 5]= 0 (0x0) > smb_vwv[ 6]= 0 (0x0) > smb_vwv[ 7]=32768 (0x8000) > smb_vwv[ 8]= 4352 (0x1100) > smb_vwv[ 9]= 0 (0x0) > smb_vwv[10]= 0 (0x0) > smb_vwv[11]= 0 (0x0) > smb_vwv[12]= 0 (0x0) > smb_vwv[13]= 0 (0x0) > smb_vwv[14]= 0 (0x0) > smb_vwv[15]= 1792 (0x700) > smb_vwv[16]= 0 (0x0) > smb_vwv[17]= 256 (0x100) > smb_vwv[18]= 0 (0x0) > smb_vwv[19]= 0 (0x0) > smb_vwv[20]= 0 (0x0) > smb_vwv[21]= 512 (0x200) > smb_vwv[22]= 0 (0x0) > smb_vwv[23]= 0 (0x0) > smb_bcc=25 >[2013/02/11 13:34:55.628155, 10, pid=12333] ../lib/util/util.c:415(dump_data) > [0000] 00 5C 00 4E 00 65 00 77 00 20 00 46 00 6F 00 6C .\.N.e.w . .F.o.l > [0010] 00 64 00 65 00 72 00 00 00 .d.e.r.. . >[2013/02/11 13:34:55.628211, 3, pid=12333] smbd/process.c:1467(switch_message) > switch message SMBntcreateX (pid 12333) conn 0x23d1b00 >[2013/02/11 13:34:55.628237, 4, pid=12333] smbd/uid.c:345(change_to_user) > Skipping user change - already user >[2013/02/11 13:34:55.628267, 10, pid=12333] smbd/nttrans.c:500(reply_ntcreate_and_X) > reply_ntcreate_and_X: flags = 0x10, access_mask = 0x110080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 root_dir_fid = 0x0, fname = New Folder >[2013/02/11 13:34:55.628296, 5, pid=12333] smbd/filename.c:257(unix_convert) > unix_convert called on file "New Folder" >[2013/02/11 13:34:55.628322, 10, pid=12333] smbd/statcache.c:283(stat_cache_lookup) > stat_cache_lookup: lookup succeeded for name [NEW FOLDER] -> [New Folder] >[2013/02/11 13:34:55.628350, 3, pid=12333] smbd/vfs.c:905(check_reduced_name) > check_reduced_name [New Folder] [/srv/samba/tmp] >[2013/02/11 13:34:55.628379, 10, pid=12333] smbd/vfs.c:969(check_reduced_name) > check_reduced_name realpath [New Folder] -> [/srv/samba/tmp/New Folder] >[2013/02/11 13:34:55.628405, 3, pid=12333] smbd/vfs.c:1039(check_reduced_name) > check_reduced_name: New Folder reduced to /srv/samba/tmp/New Folder >[2013/02/11 13:34:55.628438, 10, pid=12333] smbd/open.c:3613(create_file_default) > create_file: access_mask = 0x110080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 root_dir_fid = 0x0, ea_list = 0x(nil), sd = 0x(nil), fname = New Folder >[2013/02/11 13:34:55.628470, 10, pid=12333] smbd/open.c:3137(create_file_unixpath) > create_file_unixpath: access_mask = 0x110080 file_attributes = 0x0, share_access = 0x7, create_disposition = 0x1 create_options = 0x0 oplock_request = 0x0 private_flags = 0x0 ea_list = 0x(nil), sd = 0x(nil), fname = New Folder >[2013/02/11 13:34:55.628505, 10, pid=12333] smbd/posix_acls.c:3440(posix_get_nt_acl) > posix_get_nt_acl: called for file . >[2013/02/11 13:34:55.628589, 10, pid=12333] smbd/posix_acls.c:2565(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2013/02/11 13:34:55.628616, 10, pid=12333] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:55.628646, 10, pid=12333] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x >[2013/02/11 13:34:55.628737, 10, pid=12333] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2013/02/11 13:34:55.628799, 10, pid=12333] smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:55.628936, 10, pid=12333] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2013/02/11 13:34:55.628964, 10, pid=12333] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:55.628991, 10, pid=12333] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:55.629025, 10, pid=12333] smbd/file_access.c:76(can_access_file_acl) > can_access_file_acl for file . access_mask 0x40, access_granted 0x40 access DENIED >[2013/02/11 13:34:55.629070, 1, pid=12333] ../librpc/ndr/ndr.c:247(ndr_print_debug) > secdesc: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-1406987565-2067085585-2387977275-501 > group_sid : * > group_sid : S-1-22-2-65533 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-1406987565-2067085585-2387977275-501 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-65533 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2013/02/11 13:34:55.630038, 10, pid=12333] smbd/posix_acls.c:3440(posix_get_nt_acl) > posix_get_nt_acl: called for file New Folder >[2013/02/11 13:34:55.630083, 10, pid=12333] smbd/posix_acls.c:2565(canonicalise_acl) > canonicalise_acl: Access ace entries before arrange : >[2013/02/11 13:34:55.630110, 10, pid=12333] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 0. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:55.630139, 10, pid=12333] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x >[2013/02/11 13:34:55.630197, 10, pid=12333] smbd/posix_acls.c:2578(canonicalise_acl) > canon_ace index 2. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx >[2013/02/11 13:34:55.630259, 10, pid=12333] smbd/posix_acls.c:848(print_canon_ace_list) > print_canon_ace_list: canonicalise_acl: ace entries after arrange > canon_ace index 0. Type = allow SID = S-1-5-21-1406987565-2067085585-2387977275-501 uid 65534 (nobody) SMB_ACL_USER_OBJ ace_flags = 0x0 perms rwx > canon_ace index 1. Type = allow SID = S-1-22-2-65533 gid 65533 (nobody) SMB_ACL_GROUP_OBJ ace_flags = 0x0 perms r-x > canon_ace index 2. Type = allow SID = S-1-1-0 other SMB_ACL_OTHER ace_flags = 0x0 perms r-x >[2013/02/11 13:34:55.630381, 10, pid=12333] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 1c0 to (NT) 1f01ff >[2013/02/11 13:34:55.630408, 10, pid=12333] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:55.630437, 10, pid=12333] smbd/posix_acls.c:1124(map_canon_ace_perms) > map_canon_ace_perms: Mapped (UNIX) 140 to (NT) 1200a9 >[2013/02/11 13:34:55.630469, 10, pid=12333] smbd/file_access.c:76(can_access_file_acl) > can_access_file_acl for file New Folder access_mask 0x10000, access_granted 0x10000 access DENIED >[2013/02/11 13:34:55.630496, 1, pid=12333] ../librpc/ndr/ndr.c:247(ndr_print_debug) > secdesc: struct security_descriptor > revision : SECURITY_DESCRIPTOR_REVISION_1 (1) > type : 0x9004 (36868) > 0: SEC_DESC_OWNER_DEFAULTED > 0: SEC_DESC_GROUP_DEFAULTED > 1: SEC_DESC_DACL_PRESENT > 0: SEC_DESC_DACL_DEFAULTED > 0: SEC_DESC_SACL_PRESENT > 0: SEC_DESC_SACL_DEFAULTED > 0: SEC_DESC_DACL_TRUSTED > 0: SEC_DESC_SERVER_SECURITY > 0: SEC_DESC_DACL_AUTO_INHERIT_REQ > 0: SEC_DESC_SACL_AUTO_INHERIT_REQ > 0: SEC_DESC_DACL_AUTO_INHERITED > 0: SEC_DESC_SACL_AUTO_INHERITED > 1: SEC_DESC_DACL_PROTECTED > 0: SEC_DESC_SACL_PROTECTED > 0: SEC_DESC_RM_CONTROL_VALID > 1: SEC_DESC_SELF_RELATIVE > owner_sid : * > owner_sid : S-1-5-21-1406987565-2067085585-2387977275-501 > group_sid : * > group_sid : S-1-22-2-65533 > sacl : NULL > dacl : * > dacl: struct security_acl > revision : SECURITY_ACL_REVISION_NT4 (2) > size : 0x0058 (88) > num_aces : 0x00000003 (3) > aces: ARRAY(3) > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0024 (36) > access_mask : 0x001f01ff (2032127) > object : union security_ace_object_ctr(case 0) > trustee : S-1-5-21-1406987565-2067085585-2387977275-501 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0018 (24) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-22-2-65533 > aces: struct security_ace > type : SEC_ACE_TYPE_ACCESS_ALLOWED (0) > flags : 0x00 (0) > 0: SEC_ACE_FLAG_OBJECT_INHERIT > 0: SEC_ACE_FLAG_CONTAINER_INHERIT > 0: SEC_ACE_FLAG_NO_PROPAGATE_INHERIT > 0: SEC_ACE_FLAG_INHERIT_ONLY > 0: SEC_ACE_FLAG_INHERITED_ACE > 0x00: SEC_ACE_FLAG_VALID_INHERIT (0) > 0: SEC_ACE_FLAG_SUCCESSFUL_ACCESS > 0: SEC_ACE_FLAG_FAILED_ACCESS > size : 0x0014 (20) > access_mask : 0x001200a9 (1179817) > object : union security_ace_object_ctr(case 0) > trustee : S-1-1-0 >[2013/02/11 13:34:55.631459, 10, pid=12333] smbd/open.c:3183(create_file_unixpath) > create_file_unixpath: open file New Folder for delete ACCESS_DENIED >[2013/02/11 13:34:55.631486, 10, pid=12333] smbd/open.c:3437(create_file_unixpath) > create_file_unixpath: NT_STATUS_ACCESS_DENIED >[2013/02/11 13:34:55.631512, 10, pid=1