The autobuild test system (on sn-devel-184) has detected an intermittent failing test in the current master tree.
The autobuild log of the failure is available here: https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-16-2213/flakey.log The failure seems to be in the "samba-ad-member" suite, whose build logs are available here: https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-16-2213/samba-ad-member.stderr https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-16-2213/samba-ad-member.stdout The top commit at the time of the failure was: commit 749f1290ce654d2d47e84ff455212b008de6b54c Author: Rikard Falkeborn <[email protected]> Date: Thu May 9 21:17:24 2019 +0200 lib:util: Fix tfork return value if sigprocmask fails Returning a non-zero value from a function with bool as return value is the same as returning true. Change the return value to false if sigprocmask or pthread_sigmask fails to indicate failure. Detected with the help of cppcheck. Signed-off-by: Rikard Falkeborn <[email protected]> Reviewed-by: Ralph Boehme <[email protected]> Reviewed-by: Andreas Schneider <[email protected]> Autobuild-User(master): Andreas Schneider <[email protected]> Autobuild-Date(master): Thu May 16 19:08:29 UTC 2019 on sn-devel-184 and the last 50 lines of the stdout log were: [79(600)/85 at 7m9s] samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) [80(601)/85 at 7m23s] samba.tests.ntlm_auth(ad_member:local) [81(614)/85 at 7m27s] samba.nss.test using winbind(ad_member:local)(ad_member:local) [82(615)/85 at 7m28s] samba.tests.auth_log_winbind(ad_member:local) WARNING: The "server schannel" option is deprecated INFO: Received PING message from server 2860112.28 [] {"timestamp": "2019-05-16T22:13:14.216754+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "acf16ce6de055156", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.29:23197", "serviceDescription": "SamLogon", "authDescription": "network", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "\\\\LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-2981545554-2333333291-3611967971-500", "mappedAccount": "Administrator", "mappedDomain": "ADDOMAIN", "netlogonComputer": "LOCALADMEMBER", "netlogonTrustAccount": "LOCALADMEMBER$", "netlogonNegotiateFlags": "0x610FFFFF", "netlogonSecureChannelType": 2, "netlogonTrustAccountSid": "S-1-5-21-2981545554-2333333291-3611967971-1109", "passwordType": "NTLMv1", "duration": 6725}} INFO: Received PING message from server 2863194.4248009649 [] {"timestamp": "2019-05-16T22:13:14.203110+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "1dcc8bee3812eb24", "logonType": 2, "status": "NT_STATUS_NO_SUCH_USER", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PASSDB, wbinfo, 2862989", "clientDomain": "", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": null, "becameDomain": null, "becameSid": null, "mappedAccount": "Administrator", "mappedDomain": "", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 210}} INFO: Received PING message from server 2863194.722411440 [] {"timestamp": "2019-05-16T22:13:14.208056+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "1dcc8bee3812eb24", "logonType": 8, "status": "NT_STATUS_INVALID_HANDLE", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PAM_AUTH, wbinfo, 2862989", "clientDomain": "", "clientAccount": "Administrator", "workstation": null, "becameAccount": "", "becameDomain": "", "becameSid": null, "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "Plaintext", "duration": 5301}} INFO: Received PING message from server 2863135.2876803205 [] {"timestamp": "2019-05-16T22:13:14.218098+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "acf16ce6de055156", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "NTLM_AUTH, wbinfo, 2862989", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-2981545554-2333333291-3611967971-500", "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv1", "duration": 8672}} INFO: Received PING message from server 2860188 [] {"timestamp": "2019-05-16T22:13:14.488897+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "4d797cfcaf9336df", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:50491", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "[email protected]", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-2981545554-2333333291-3611967971-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 6490}} INFO: Received PING message from server 2860188 [] {"timestamp": "2019-05-16T22:13:14.501327+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "d57aaa201f2b0fd2", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:50492", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "[email protected]", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-2981545554-2333333291-3611967971-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 6654}} INFO: Received PING message from server 2990504.1 [] {"timestamp": "2019-05-16T22:13:14.824107+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:445", "remoteAddress": "ipv4:127.0.0.20:50489", "serviceDescription": "SMB2", "authType": "krb5", "domain": "ADDOMAIN", "account": "idmapridmember$", "sid": "S-1-5-21-2981545554-2333333291-3611967971-1113", "sessionId": "dca55703-4344-43e0-9609-e00d03e719b8", "logonServer": "ADDC", "transportProtection": "SMB", "accountFlags": "0x00000280"}} INFO: Received PING message from server 2860103.61 [] {"timestamp": "2019-05-16T22:13:14.844989+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:135", "remoteAddress": "ipv4:127.0.0.20:50495", "serviceDescription": "DCE/RPC", "authType": "ncacn_ip_tcp", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "72b6b97a-c940-4078-a8c7-45f025c326ca", "logonServer": "ADDC", "transportProtection": "NONE", "accountFlags": "0x00000010"}} INFO: Received PING message from server 2860122.34 [] {"timestamp": "2019-05-16T22:13:14.850671+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.20:50496", "serviceDescription": "DCE/RPC", "authType": "schannel", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "ce3a26ab-3797-4a92-a3dd-e0a67120934a", "logonServer": "ADDC", "transportProtection": "SEAL", "accountFlags": "0x00000010"}} UNEXPECTED(failure): samba.tests.auth_log_winbind.samba.tests.auth_log_winbind.AuthLogTestsWinbind.test_wbinfo_ntlmv1(ad_member:local) REASON: Exception: Exception: Traceback (most recent call last): File "bin/python/samba/tests/auth_log_winbind.py", line 437, in test_wbinfo_ntlmv1 self.assertEquals("Authentication", msg["type"]) AssertionError: 'Authentication' != 'Authorization' - Authentication ? ^^^ ^ + Authorization ? ^^ ^ FAILED (1 failures, 0 errors and 0 unexpected successes in 0 testsuites) A summary with detailed information can be found in: ./bin/ab/summary TOP 10 slowest tests samba3.smb2.session krb5(ad_member_idmap_rid) -> 95 idmap.rfc2307(ad_member_rfc2307) -> 48 samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) -> 14 samba3.blackbox.smbclient_s3.NT1.sign (ad_member) member creds(ad_member) -> 13 samba3.blackbox.smbclient_s3.SMB3.sign (ad_member) member creds(ad_member) -> 12 samba3.blackbox.smbclient_s3.SMB3.plain (ad_member) member creds(ad_member) -> 12 samba3.blackbox.smbclient_s3.NT1.plain (ad_member) member creds(ad_member) -> 12 samba4.blackbox.trust_ntlm(ad_member:local) -> 6 samba4.blackbox.net_ads_dns(ad_member:local)(ad_member:local) -> 6 idmap.ad(ad_member_idmap_ad) -> 6 ERROR: test failed with exit code 1 Makefile:16: recipe for target 'test' failed
