[rtems-test] sparc/leon3: RTEMS_POSIX_API: Passed:587 Failed:1 Timeout:0 Test-Too-long:1 Invalid:0 Wrong:0

OAR Tester rtems-tester at oarcorp.com
Sun Jan 16 04:51:40 UTC 2022


Testing time     : 0:01:28.075746
Average test time: 0:00:00.147038

Host
====
FreeBSD-12.2-RELEASE-amd64-64bit-ELF (FreeBSD VM-FreeBSD12 12.2-RELEASE FreeBSD 12.2-RELEASE r366954 GENERIC amd64 amd64)

Configuration
=============
Version: 6.0.0.944c210b3daed384b5d8a46152e5ed51b7b45b1d
Build  : RTEMS_POSIX_API
Tools  : 10.3.1 20211214 (RTEMS 6, RSB a553ce1fe632e46356d79891ecd831dc98968a90, Newlib ebe756e)

Summary
=======

Passed:        587
Failed:          1
User Input:      6
Expected Fail:   1
Indeterminate:   0
Benchmark:       3
Timeout:         0
Test too long:   1
Invalid:         0
Wrong Version:   0
Wrong Build:     0
Wrong Tools:     0
Wrong Header:    0
------------------
Total:         599

Failures:
 dl06.exe
User Input:
 dl10.exe
 monitor.exe
 termios.exe
 top.exe
 capture.exe
 fileio.exe
Expected Fail:
 psxfenv01.exe
Benchmark:
 whetstone.exe
 dhrystone.exe
 linpack.exe
Test too long:
 crypt01.exe
Log
===

RTEMS Testing - Tester, 6.0.not_released
 Command Line: /home/tester/rtems-cron-6/tools/6/bin/rtems-test --rtems-tools=/home/tester/rtems-cron-6/tools/6 --rtems-bsp=leon3-sis --log=run-leon3-sis.log --use-gitconfig --mail .
 Host: FreeBSD VM-FreeBSD12 12.2-RELEASE FreeBSD 12.2-RELEASE r366954 GENERIC amd64
 Python: 3.8.12 (default, Sep 21 2021, 01:09:51) [Clang 10.0.1 (git at github.com:llvm/llvm-project.git llvmorg-10.0.1-0-gef32c611a
Host: FreeBSD-12.2-RELEASE-amd64-64bit-ELF (FreeBSD VM-FreeBSD12 12.2-RELEASE FreeBSD 12.2-RELEASE r366954 GENERIC amd64 amd64)
[  1/599] p:0   f:0   u:0   e:0   I:0   B:0   t:0   L:0   i:0   W:0   | sparc/leon3: dhrystone.exe
 <<skipping passes>>
[ 82/599] p:73  f:0   u:0   e:0   I:0   B:3   t:0   L:0   i:0   W:0   | sparc/leon3: crypt01.exe
Result: test-too-long
Time: 0:01:20.296999 crypt01.exe
=>  exe: /home/tester/rtems-cron-6/tools/6/bin/sparc-rtems6-sis -leon3 -nouartrx -r -tlim 200 s -m 4 ./b-leon3/sparc/leon3/testsuites/libtests/crypt01.exe
] 
]  SIS - SPARC/RISCV instruction simulator 2.29,  copyright Jiri Gaisler 2020
]  Bug-reports to jiri at gaisler.se
] 
]  LEON3 emulation enabled, 4 cpus online, delta 50 clocks
] 
]  Loaded ./b-leon3/sparc/leon3/testsuites/libtests/crypt01.exe, entry 0x40000000
] 
] 
=>  test start: CRYPT 1
] *** BEGIN OF TEST CRYPT 1 ***
] *** TEST VERSION: 6.0.0.944c210b3daed384b5d8a46152e5ed51b7b45b1d
] *** TEST STATE: EXPECTED_PASS
] *** TEST BUILD: RTEMS_POSIX_API
] *** TEST TOOLS: 10.3.1 20211214 (RTEMS 6, RSB a553ce1fe632e46356d79891ecd831dc98968a90, Newlib ebe756e)
] test crypt_md5_r()
] test crypt_sha256_r()
] input:    Hello world!
] salt:     $5$saltstring
] expected: $5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5
] actual:   $5$saltstring$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5
] input:    Hello world!
] salt:     $5$rounds=10000$saltstringsaltstring
] expected: $5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA
] actual:   $5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA
] input:    This is just a test
] salt:     $5$rounds=5000$toolongsaltstring
] expected: $5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5
] actual:   $5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5
] input:    a very much longer text to encrypt.  This one even stretches over morethan one line.
] salt:     $5$rounds=1400$anotherlongsaltstring
] expected: $5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1
] actual:   $5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1
] input:    we have a short salt string but not a short password
] salt:     $5$rounds=77777$short
] expected: $5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/
] actual:   $5$rounds=77777$short$JiO1O3ZpDAxGJeaDIuqCoEFysAe1mZNJRs3pw0KQRd/
] input:    a short string
] salt:     $5$rounds=123456$asaltof16chars..
] expected: $5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/cZKmF/wJvD
] actual:   $5$rounds=123456$asaltof16chars..$gP3VQ/6X7UUEW3HkBn2w1/Ptq2jxPyzV/cZKmF/wJvD
] input:    the minimum number is still observed
] salt:     $5$rounds=10$roundstoolow
] expected: $5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC
] actual:   $5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC
] test crypt_sha512_r()
] input:    Hello world!
] salt:     $6$saltstring
] expected: $6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1
] actual:   $6$saltstring$svn8UoSVapNtMuq1ukKS4tPQd8iKwSMHWjl/O817G3uBnIFNjnQJuesI68u4OTLiBFdcbYEdFCoEOfaS35inz1
] input:    Hello world!
] salt:     $6$rounds=10000$saltstringsaltstring
] expected: $6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v.
] actual:   $6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0Dp8vOuZeHBy/YTBmSK6H9qs/y3RnOaw5v.
] input:    This is just a test
] salt:     $6$rounds=5000$toolongsaltstring
] expected: $6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQzQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0
] actual:   $6$rounds=5000$toolongsaltstrin$lQ8jolhgVRVhY4b5pZKaysCLi0QBxGoNeKQzQ3glMhwllF7oGDZxUhx1yxdYcz/e1JSbq3y6JMxxl8audkUEm0
] input:    a very much longer text to encrypt.  This one even stretches over morethan one line.
] salt:     $6$rounds=1400$anotherlongsaltstring
] expected: $6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wPvMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1
] actual:   $6$rounds=1400$anotherlongsalts$POfYwTEok97VWcjxIiSOjiykti.o/pQs.wPvMxQ6Fm7I6IoYN3CmLs66x9t0oSwbtEW7o7UmJEiDwGqd8p4ur1
] input:    we have a short salt string but not a short password
] salt:     $6$rounds=77777$short
] expected: $6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0
] actual:   $6$rounds=77777$short$WuQyW2YR.hBNpjjRhpYD/ifIw05xdfeEyQoMxIXbkvr0gge1a1x3yRULJ5CCaUeOxFmtlcGZelFl5CxtgfiAc0
] *** TEST TOO LONG
[ 83/599] p:74  f:0   u:0   e:0   I:0   B:3   t:0   L:0   i:0   W:0   | sparc/leon3: defaultconfig01.exe
 <<skipping passes>>
[ 93/599] p:82  f:0   u:0   e:0   I:0   B:3   t:0   L:0   i:0   W:0   | sparc/leon3: dl06.exe
Result: failed    
Time: 0:00:00.269880 dl06.exe
=>  exe: /home/tester/rtems-cron-6/tools/6/bin/sparc-rtems6-sis -leon3 -nouartrx -r -tlim 200 s -m 4 ./b-leon3/sparc/leon3/testsuites/libtests/dl06.exe
] 
]  SIS - SPARC/RISCV instruction simulator 2.29,  copyright Jiri Gaisler 2020
]  Bug-reports to jiri at gaisler.se
] 
]  LEON3 emulation enabled, 4 cpus online, delta 50 clocks
] 
]  Loaded ./b-leon3/sparc/leon3/testsuites/libtests/dl06.exe, entry 0x40000000
] 
] 
=>  test start: libdl (RTL) 6
] *** BEGIN OF TEST libdl (RTL) 6 ***
] *** TEST VERSION: 6.0.0.944c210b3daed384b5d8a46152e5ed51b7b45b1d
] *** TEST STATE: EXPECTED_PASS
] *** TEST BUILD: RTEMS_POSIX_API
] *** TEST TOOLS: 10.3.1 20211214 (RTEMS 6, RSB a553ce1fe632e46356d79891ecd831dc98968a90, Newlib ebe756e)
] 
] load: /dl06.rap
] dlopen failed: offset past end of file: offset=10043 size=10043
] cpu 0 in error mode (tt = 0x80)
]   3209700  4000cf00:  91d02000   ta  0x0
[ 94/599] p:86  f:1   u:0   e:0   I:0   B:3   t:0   L:0   i:0   W:0   | sparc/leon3: dl07.exe
 <<skipping passes>>
[599/599] p:581 f:1   u:6   e:1   I:0   B:3   t:0   L:0   i:0   W:0   | sparc/leon3: ts-validation-1.exe

Passed:        587
Failed:          1
User Input:      6
Expected Fail:   1
Indeterminate:   0
Benchmark:       3
Timeout:         0
Test too long:   1
Invalid:         0
Wrong Version:   0
Wrong Build:     0
Wrong Tools:     0
Wrong Header:    0
------------------
Total:         599
Failures:
 dl06.exe
User Input:
 dl10.exe
 monitor.exe
 termios.exe
 top.exe
 capture.exe
 fileio.exe
Expected Fail:
 psxfenv01.exe
Benchmark:
 whetstone.exe
 dhrystone.exe
 linpack.exe
Test too long:
 crypt01.exe
Average test time: 0:00:00.147038
Testing time     : 0:01:28.075746


More information about the build mailing list