Hay
Date
July 17, 2025, 10:12 a.m.
Failure - ltp-cve - cve-2017-17712
[  637.809982] <LAVA_SIGNAL_STARTTC cve-2017-17712>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  637.814722] <LAVA_SIGNAL_ENDTC cve-2017-17712>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-17712 sendmsg03
Failure - ltp-cve - cve-2017-16939
[  637.607875] <LAVA_SIGNAL_STARTTC cve-2017-16939>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  637.612757] <LAVA_SIGNAL_ENDTC cve-2017-16939>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-16939 cve-2017-16939
Failure - ltp-cve - cve-2017-10661
[  637.223890] <LAVA_SIGNAL_STARTTC cve-2017-10661>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  637.228911] <LAVA_SIGNAL_ENDTC cve-2017-10661>
\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-10661 timerfd_settime02
Failure - log-parser-boot - internal-error-oops-oops-smp
[   11.353305] Internal error: Oops: 0000000096000005 [#1]  SMP
[   11.361731] Modules linked in: snd_timer qcom_pil_info snd qcom_spmi_vadc qcom_q6v5 qcom_sysmon soundcore qcom_vadc_common ubwc_config qcom_camss venus_core(+) qcom_common llcc_qcom qcom_glink_smem videobuf2_dma_sg v4l2_mem2mem ocmem videobuf2_memops qmi_helpers mdt_loader qnoc_msm8916 drm_gpuvm drm_exec videobuf2_v4l2 gpu_sched drm_dp_aux_bus qcom_rng qcom_stats videobuf2_common drm_display_helper cec drm_client_lib rpmsg_ctrl display_connector rpmsg_char ramoops socinfo reed_solomon rmtfs_mem drm_kms_helper fuse drm backlight ip_tables x_tables
[   11.393794] CPU: 1 UID: 0 PID: 221 Comm: (udev-worker) Not tainted 6.16.0-rc6-next-20250717 #1 PREEMPT 
[   11.415987] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[   11.425094] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   11.432039] pc : dev_pm_opp_put+0x24/0x58
[   11.438716] lr : core_clks_enable+0x54/0x148 [venus_core]
[   11.442887] sp : ffff8000871af620
[   11.448263] x29: ffff8000871af620 x28: ffff80007c600c98 x27: ffff000020d73d38
[   11.451570] x26: 0000000000000000 x25: ffff800082df8bc0 x24: ffff80007c681ba0
[   11.458687] x23: ffff0000200a00c8 x22: ffff0000200a0080 x21: 0000000000000000
[   11.465806] x20: 0000000000000000 x19: ffffffffffffffee x18: 0000000000000000
[   11.472924] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   11.480041] x14: 0000000000000000 x13: 007473696c5f7974 x12: 696e696666615f65
[   11.487160] x11: ffff000021759800 x10: 0000000000000020 x9 : ffff80007c5dc68c
[   11.494277] x8 : ffffffffffffffde x7 : ffff0000209b8100 x6 : 0000000000000000
[   11.501396] x5 : 0000000000000002 x4 : 00000000c0000000 x3 : 0000000000000001
[   11.508514] x2 : 0000000000000002 x1 : ffffffffffffffde x0 : ffffffffffffffee
[   11.515632] Call trace:
[   11.522740]  dev_pm_opp_put+0x24/0x58 (P)
[   11.525002]  core_clks_enable+0x54/0x148 [venus_core]
[   11.529171]  core_power_v1+0x78/0x90 [venus_core]
[   11.534205]  venus_runtime_resume+0x6c/0x98 [venus_core]
[   11.538893]  pm_generic_runtime_resume+0x34/0x58
[   11.544274]  __genpd_runtime_resume+0x38/0x90
[   11.548873]  genpd_runtime_resume+0xe0/0x2f0
[   11.553126]  __rpm_callback+0x50/0x1f0
[   11.557464]  rpm_callback+0x7c/0x90
[   11.561022]  rpm_resume+0x46c/0x650
[   11.564409]  __pm_runtime_resume+0x58/0xa8
[   11.567882]  venus_probe+0x2d8/0x588 [venus_core]
[   11.572051]  platform_probe+0x64/0xa8
[   11.576822]  really_probe+0xc8/0x3a0
[   11.580467]  __driver_probe_device+0x84/0x170
[   11.584116]  driver_probe_device+0x44/0x120
[   11.588369]  __driver_attach+0xf8/0x208
[   11.592360]  bus_for_each_dev+0x90/0xf8
[   11.596180]  driver_attach+0x2c/0x40
[   11.599999]  bus_add_driver+0x118/0x248
[   11.603818]  driver_register+0x64/0x138
[   11.607378]  __platform_driver_register+0x2c/0x40
[   11.611199]  qcom_venus_driver_init+0x28/0xffb8 [venus_core]
[   11.616062]  do_one_initcall+0x60/0x290
[   11.621788]  do_init_module+0x60/0x268
[   11.625348]  load_module+0x1fa0/0x20a0
[   11.629166]  init_module_from_file+0x90/0xe0
[   11.632900]  __arm64_sys_finit_module+0x270/0x370
[   11.637327]  invoke_syscall.constprop.0+0x58/0xf8
[   11.641929]  do_el0_svc+0xb0/0xd8
[   11.646613]  el0_svc+0x44/0x190
[   11.649911]  el0t_64_sync_handler+0xa0/0xe8
[   11.652865]  el0t_64_sync+0x198/0x1a0
[   11.657037] Code: 910003fd f9000bf3 91004013 aa1303e0 (f9402821) 
[   11.660860] ---[ end trace 0000000000000000 ]---
Failure - ltp-cve - cve-2022-4378
[  640.594551] <LAVA_SIGNAL_STARTTC cve-2022-4378>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  640.598716] <LAVA_SIGNAL_ENDTC cve-2022-4378>
\0\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2022-4378 cve-2022-4378
Failure - ltp-cve - cve-2022-0185
[  640.541991] <LAVA_SIGNAL_STARTTC cve-2022-0185>
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_fsc8DqmB4 as tmpdir (tmpfs filesystem)
[  640.547392] <LAVA_SIGNAL_ENDTC cve-2022-0185>
\0\0tst_device.c:98: TINFO: Found free device 0 '/dev/loop0'
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2022-0185 fsconfig03
Failure - ltp-cve - cve-2022-23222
\0\0[  640.246821] <LAVA_SIGNAL_STARTTC cve-2022-23222>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  640.252263] <LAVA_SIGNAL_ENDTC cve-2022-23222>
\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2022-23222 bpf_prog07
Failure - ltp-cve - cve-2021-22600
[  640.000663] <LAVA_SIGNAL_STARTTC cve-2021-22600>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  640.005495] <LAVA_SIGNAL_ENDTC cve-2021-22600>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2021-22600 setsockopt09
Failure - ltp-cve - cve-2021-4204
[  639.835107] <LAVA_SIGNAL_STARTTC cve-2021-4204>
tst_buffers.c:57: TINFO: Test is using guarded buffers
[  639.840258] <LAVA_SIGNAL_ENDTC cve-2021-4204>
\0\0tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2021-4204 bpf_prog06
Failure - ltp-cve - cve-2021-3444
[  639.588652] <LAVA_SIGNAL_STARTTC cve-2021-3444>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  639.594009] <LAVA_SIGNAL_ENDTC cve-2021-3444>
\0\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2021-3444 bpf_prog05
Failure - ltp-cve - cve-2020-36557
broken   1
cve-2020-36557 pty06
Failure - ltp-cve - cve-2020-14386
[  639.332014] <LAVA_SIGNAL_STARTTC cve-2020-14386>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  639.336794] <LAVA_SIGNAL_ENDTC cve-2020-14386>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2020-14386 sendto03
Failure - ltp-cve - cve-2019-8912
[  639.186632] <LAVA_SIGNAL_STARTTC cve-2019-8912>
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_af_QZf3HJ as tmpdir (tmpfs filesyste[  639.191328] <LAVA_SIGNAL_ENDTC cve-2019-8912>
\0\0m)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2019-8912 af_alg07
Failure - ltp-cve - cve-2018-18445
[  638.876042] <LAVA_SIGNAL_STARTTC cve-2018-18445>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  638.882288] <LAVA_SIGNAL_ENDTC cve-2018-18445>
\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2018-18445 bpf_prog04
Failure - ltp-cve - cve-2018-9568
[  638.626320] <LAVA_SIGNAL_STARTTC cve-2018-9568>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  638.631029] <LAVA_SIGNAL_ENDTC cve-2018-9568>
\0\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2018-9568 connect02
Failure - ltp-cve - cve-2018-7566
[  638.519437] <LAVA_SIGNAL_STARTTC cve-2018-7566>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  638.524445] <LAVA_SIGNAL_ENDTC cve-2018-7566>
\0\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2018-7566 snd_seq01
Failure - ltp-cve - cve-2017-1000380
[  638.304075] <LAVA_SIGNAL_STARTTC cve-2017-1000380>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  638.308971] <LAVA_SIGNAL_ENDTC cve-2017-1000380>
\0\0\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-1000380 snd_timer01
Failure - ltp-cve - cve-2017-1000112
[  638.193966] <LAVA_SIGNAL_STARTTC cve-2017-1000112>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  638.198667] <LAVA_SIGNAL_ENDTC cve-2017-1000112>
\0\0\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-1000112 setsockopt05
Failure - ltp-cve - cve-2017-8890
[  637.120640] <LAVA_SIGNAL_STARTTC cve-2017-8890>
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_accWxqcBR as tmpdir (tmpfs filesyste[  637.125426] <LAVA_SIGNAL_ENDTC cve-2017-8890>
\0\0m)
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.16.0-rc6-next-20250717 #1 SMP PREEMPT @1752747461 aarch64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_buffers.c:57: TINFO: Test is using guarded buffers
accept02.c:129: TINFO: Starting listener on port: 48777
accept02.c:52: TBROK: setsockopt(3, 0, 42, 0xffffa706ff78, 136) failed: ENODEV (19)
HINT: You _MAY_ be missing kernel fixes:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=657831ff
HINT: You _MAY_ be vulnerable to CVE(s):
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
\r[  637.170230] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=cve-2017-8890 RESULT=fail>
\0\0
cve-2017-8890 accept02
Failure - ltp-cve - cve-2017-2636
broken   1
cve-2017-2636 pty05
Failure - ltp-cve - cve-2016-8655
[  636.529245] <LAVA_SIGNAL_STARTTC cve-2016-8655>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  636.533879] <LAVA_SIGNAL_ENDTC cve-2016-8655>
\0\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2016-8655 setsockopt06