autobuild[sn-devel-184]: intermittent test failure detected

autobuild autobuild at samba.org
Mon May 27 03:43:04 UTC 2019


The autobuild test system (on sn-devel-184) has detected an intermittent failing test in 
the current master tree.

The autobuild log of the failure is available here:

   https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-27-0343/flakey.log

The failure seems to be in the "samba-ad-member" suite, whose build logs are available here:

   https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-27-0343/samba-ad-member.stderr
   https://git.samba.org/autobuild.flakey.sn-devel-184/2019-05-27-0343/samba-ad-member.stdout
  
The top commit at the time of the failure was:

commit 412afb2aef100e09eb433b8f0cae064fc2a736b7
Author: Gary Lockyer <gary at catalyst.net.nz>
Date:   Fri May 24 11:00:05 2019 +1200

    Fix ubsan null pointer passed as argument 2
    
    Fix ubsan warning null pointer passed as argument 2 when the source
    pointer is NULL.  The calls to memcpy are now guarded by an
    if (len > 0)
    
    Signed-off-by: Gary Lockyer <gary at catalyst.net.nz>
    Reviewed-by: Andreas Schneider <asn at samba.org>
    
    Autobuild-User(master): Gary Lockyer <gary at samba.org>
    Autobuild-Date(master): Mon May 27 01:29:48 UTC 2019 on sn-devel-184

and the last 50 lines of the stdout log were:

[81(640)/87 at 7m11s] samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local)
[82(641)/87 at 7m24s] samba.tests.ntlm_auth(ad_member:local)
[83(654)/87 at 7m28s] samba.nss.test using winbind(ad_member:local)(ad_member:local)
[84(655)/87 at 7m28s] samba.tests.auth_log_winbind(ad_member:local)
WARNING: The "server schannel" option is deprecated
INFO: Received PING message from server 1229516 []
{"timestamp": "2019-05-27T03:42:43.531581+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "bed342d40b839ea2", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:45094", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "IDMAPRIDMEMBER$@ADDOM.SAMBA.EXAMPLE.COM", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-1080727060-3191255640-25690637-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 5758}}
INFO: Received PING message from server 1229516 []
{"timestamp": "2019-05-27T03:42:43.542011+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "871eaf8405d6c78b", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": null, "remoteAddress": "ipv4:127.0.0.20:45095", "serviceDescription": "Kerberos KDC", "authDescription": "ENC-TS Pre-authentication", "clientDomain": null, "clientAccount": "IDMAPRIDMEMBER$@ADDOM.SAMBA.EXAMPLE.COM", "workstation": null, "becameAccount": "idmapridmember$", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-1080727060-3191255640-25690637-1113", "mappedAccount": "idmapridmember$", "mappedDomain": "ADDOMAIN", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "aes256-cts-hmac-sha1-96", "duration": 5395}}
INFO: Received PING message from server 1229491.8 []
{"timestamp": "2019-05-27T03:42:43.594258+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "46ccb1cdd96f2587", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.29:45525", "serviceDescription": "SamLogon", "authDescription": "network", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "\\\\LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-1080727060-3191255640-25690637-500", "mappedAccount": "Administrator", "mappedDomain": "ADDOMAIN", "netlogonComputer": "LOCALADMEMBER", "netlogonTrustAccount": "LOCALADMEMBER$", "netlogonNegotiateFlags": "0x610FFFFF", "netlogonSecureChannelType": 2, "netlogonTrustAccountSid": "S-1-5-21-1080727060-3191255640-25690637-1109", "passwordType": "NTLMv1", "duration": 8323}}
INFO: Received PING message from server 1235470.1912685632 []
{"timestamp": "2019-05-27T03:42:43.577278+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "da54c39aa401ac28", "logonType": 2, "status": "NT_STATUS_NO_SUCH_USER", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PASSDB, wbinfo, 1235428", "clientDomain": "", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": null, "becameDomain": null, "becameSid": null, "mappedAccount": "Administrator", "mappedDomain": "", "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv2", "duration": 174}}
INFO: Received PING message from server 1235470.1658043866 []
{"timestamp": "2019-05-27T03:42:43.583926+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4625, "logonId": "da54c39aa401ac28", "logonType": 8, "status": "NT_STATUS_INVALID_HANDLE", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "PAM_AUTH, wbinfo, 1235428", "clientDomain": "", "clientAccount": "Administrator", "workstation": null, "becameAccount": "", "becameDomain": "", "becameSid": null, "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "Plaintext", "duration": 6928}}
INFO: Received PING message from server 1235463.459286425 []
{"timestamp": "2019-05-27T03:42:43.595707+0000", "type": "Authentication", "Authentication": {"version": {"major": 1, "minor": 2}, "eventId": 4624, "logonId": "46ccb1cdd96f2587", "logonType": 3, "status": "NT_STATUS_OK", "localAddress": "unix:", "remoteAddress": "unix:", "serviceDescription": "winbind", "authDescription": "NTLM_AUTH, wbinfo, 1235428", "clientDomain": "ADDOMAIN", "clientAccount": "Administrator", "workstation": "LOCALADMEMBER", "becameAccount": "Administrator", "becameDomain": "ADDOMAIN", "becameSid": "S-1-5-21-1080727060-3191255640-25690637-500", "mappedAccount": null, "mappedDomain": null, "netlogonComputer": null, "netlogonTrustAccount": null, "netlogonNegotiateFlags": "0x00000000", "netlogonSecureChannelType": 0, "netlogonTrustAccountSid": null, "passwordType": "NTLMv1", "duration": 10414}}
INFO: Received PING message from server 1335092.1 []
{"timestamp": "2019-05-27T03:42:43.794796+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:445", "remoteAddress": "ipv4:127.0.0.20:45092", "serviceDescription": "SMB2", "authType": "krb5", "domain": "ADDOMAIN", "account": "idmapridmember$", "sid": "S-1-5-21-1080727060-3191255640-25690637-1113", "sessionId": "8f773c91-e2a1-4d71-81e0-63ae3468dc7c", "logonServer": "ADDC", "transportProtection": "SMB", "accountFlags": "0x00000280"}}
INFO: Received PING message from server 1229475.66 []
{"timestamp": "2019-05-27T03:42:43.822625+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:135", "remoteAddress": "ipv4:127.0.0.20:45098", "serviceDescription": "DCE/RPC", "authType": "ncacn_ip_tcp", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "02288814-4002-4cd4-abf3-d7cb1f1f099e", "logonServer": "ADDC", "transportProtection": "NONE", "accountFlags": "0x00000010"}}
INFO: Received PING message from server 1229491.34 []
{"timestamp": "2019-05-27T03:42:43.828341+0000", "type": "Authorization", "Authorization": {"version": {"major": 1, "minor": 1}, "localAddress": "ipv4:127.0.0.30:1026", "remoteAddress": "ipv4:127.0.0.20:45099", "serviceDescription": "DCE/RPC", "authType": "schannel", "domain": "NT AUTHORITY", "account": "ANONYMOUS LOGON", "sid": "S-1-5-7", "sessionId": "5b74e491-829e-4ef5-b6dc-8f6de4634547", "logonServer": "ADDC", "transportProtection": "SEAL", "accountFlags": "0x00000010"}}
UNEXPECTED(failure): samba.tests.auth_log_winbind.samba.tests.auth_log_winbind.AuthLogTestsWinbind.test_wbinfo_ntlmv1(ad_member:local)
REASON: Exception: Exception: Traceback (most recent call last):
  File "bin/python/samba/tests/auth_log_winbind.py", line 437, in test_wbinfo_ntlmv1
    self.assertEquals("Authentication", msg["type"])
AssertionError: 'Authentication' != 'Authorization'
- Authentication
?     ^^^ ^
+ Authorization
?     ^^ ^

FAILED (1 failures, 0 errors and 0 unexpected successes in 0 testsuites)

A summary with detailed information can be found in:
  ./bin/ab/summary
TOP 10 slowest tests
samba3.smb2.session krb5(ad_member_idmap_rid) -> 95
idmap.rfc2307(ad_member_rfc2307) -> 51
samba3.blackbox.smbclient_s3.SMB3.sign (ad_member) member creds(ad_member) -> 14
samba3.blackbox.smbclient_s3.SMB3.plain (ad_member) member creds(ad_member) -> 14
samba3.blackbox.smbclient_s3.NT1.sign (ad_member) member creds(ad_member) -> 14
samba.wbinfo_sids2xids.(ad_member:local)(ad_member:local) -> 13
samba3.blackbox.smbclient_s3.NT1.plain (ad_member) member creds(ad_member) -> 10
samba4.blackbox.net_ads_dns(ad_member:local)(ad_member:local) -> 6
idmap.ad(ad_member_idmap_ad) -> 6
samba4.blackbox.trust_ntlm(ad_member:local) -> 6
ERROR: test failed with exit code 1
Makefile:16: recipe for target 'test' failed



More information about the samba-cvs mailing list