Date
June 30, 2025, 8:07 a.m.
Failure - ltp-syscalls - getxattr04
tst_device.c:98: TINFO: Found free device 0 '/dev/loop0' tst_test.c:1217: TINFO: Formatting /dev/loop0 with xfs opts='' extra opts='' tst_test.c:1229: TINFO: Mounting /dev/loop0 to /tmp/LTP_getS6ArCS/mntpoint fstyp=xfs flags=0 tst_test.c:1229: TBROK: mount(/dev/loop0, mntpoint, xfs, 0, (nil)) failed: ENODEV (19) Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 getxattr04 getxattr04
Failure - ltp-syscalls - accept02
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_accRpRBJx as tmpdir (tmpfs filesystem) tst_test.c:1953: TINFO: LTP version: 20250530 tst_test.c:1956: TINFO: Tested kernel: 6.16.0-rc4-next-20250630 #1 SMP PREEMPT @1751271154 aarch64 tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz' tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s tst_buffers.c:57: TINFO: Test is using guarded buffers accept02.c:129: TINFO: Starting listener on port: 58971 accept02.c:52: TBROK: setsockopt(3, 0, 42, 0xffffb6ee7f78, 136) failed: ENODEV (19) HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=657831ff HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890 Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 accept02 accept02 accept02.c:129: TINFO: Starting listener on port: 58971 accept02.c:52: TBROK: setsockopt(3, 0, 42, 0xffffb6ee7f78, 136) failed: ENODEV (19)