Hay
Date
July 24, 2025, 4:41 a.m.
Failure - ltp-cve/cve-2022-4378
[  766.726997] <LAVA_SIGNAL_STARTTC cve-2022-4378>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  766.731691] <LAVA_SIGNAL_ENDTC cve-2022-4378>
\0\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2022-4378 cve-2022-4378
Failure - log-parser-boot/internal-error-oops-oops-smp
[   11.538194] Internal error: Oops: 0000000096000004 [#1]  SMP
[   11.544906] Modules linked in: qcom_pil_info qcom_spmi_vadc soundcore qcom_vadc_common llcc_qcom qcom_q6v5 qcom_camss ocmem venus_core(+) qcom_sysmon drm_gpuvm qcom_common qcom_glink_smem drm_exec v4l2_mem2mem videobuf2_dma_sg qmi_helpers gpu_sched qnoc_msm8916 mdt_loader videobuf2_memops qcom_stats videobuf2_v4l2 qcom_rng drm_dp_aux_bus videobuf2_common drm_display_helper cec drm_client_lib rpmsg_ctrl rpmsg_char display_connector drm_kms_helper ramoops rmtfs_mem socinfo reed_solomon fuse drm backlight ip_tables x_tables
[   11.574377] CPU: 3 UID: 0 PID: 228 Comm: (udev-worker) Not tainted 6.16.0-rc7-next-20250724 #1 PREEMPT 
[   11.596566] Hardware name: Qualcomm Technologies, Inc. APQ 8016 SBC (DT)
[   11.605846] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   11.612789] pc : dev_pm_opp_put+0x24/0x58
[   11.619467] lr : core_clks_enable+0x54/0x148 [venus_core]
[   11.623638] sp : ffff80008411b600
[   11.629014] x29: ffff80008411b600 x28: ffff80008411bba0 x27: ffff00000489c538
[   11.632321] x26: 0000000000000000 x25: ffff800082c4f5f0 x24: ffff80007b392ba0
[   11.639438] x23: ffff0000042400c8 x22: ffff000004240080 x21: 0000000000000000
[   11.646555] x20: 0000000000000000 x19: ffffffffffffffee x18: 0000000000000000
[   11.653674] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   11.660792] x14: 0000000000000000 x13: 007473696c5f7974 x12: 696e696666615f65
[   11.667910] x11: 00000000000000c0 x10: 0000000000000020 x9 : ffff80007b404684
[   11.675028] x8 : ffffffffffffffde x7 : ffff0000055a2680 x6 : 0000000000000000
[   11.682145] x5 : 0000000000000002 x4 : 00000000c0000000 x3 : 0000000000000001
[   11.689265] x2 : 0000000000000002 x1 : ffffffffffffffde x0 : ffffffffffffffee
[   11.696383] Call trace:
[   11.703491]  dev_pm_opp_put+0x24/0x58 (P)
[   11.705751]  core_clks_enable+0x54/0x148 [venus_core]
[   11.709921]  core_power_v1+0x78/0x90 [venus_core]
[   11.714955]  venus_runtime_resume+0x6c/0x98 [venus_core]
[   11.719643]  pm_generic_runtime_resume+0x34/0x58
[   11.725023]  __genpd_runtime_resume+0x38/0x90
[   11.729623]  genpd_runtime_resume+0xe0/0x2f0
[   11.733877]  __rpm_callback+0x50/0x1f0
[   11.738216]  rpm_callback+0x7c/0x90
[   11.741773]  rpm_resume+0x46c/0x650
[   11.745158]  __pm_runtime_resume+0x58/0xa8
[   11.748633]  venus_probe+0x2d8/0x588 [venus_core]
[   11.752801]  platform_probe+0x64/0xa8
[   11.757573]  really_probe+0xc8/0x3a0
[   11.761219]  __driver_probe_device+0x84/0x170
[   11.764866]  driver_probe_device+0x44/0x120
[   11.769120]  __driver_attach+0xf8/0x208
[   11.773113]  bus_for_each_dev+0x90/0xf8
[   11.776930]  driver_attach+0x2c/0x40
[   11.780749]  bus_add_driver+0x118/0x248
[   11.784570]  driver_register+0x64/0x138
[   11.788129]  __platform_driver_register+0x2c/0x40
[   11.791949]  qcom_venus_driver_init+0x28/0xfb8 [venus_core]
[   11.796813]  do_one_initcall+0x60/0x290
[   11.802191]  do_init_module+0x60/0x268
[   11.806011]  load_module+0x1e00/0x2060
[   11.809829]  init_module_from_file+0x90/0xe0
[   11.813564]  __arm64_sys_finit_module+0x270/0x370
[   11.817992]  invoke_syscall+0x50/0x120
[   11.822590]  el0_svc_common.constprop.0+0xc8/0xf0
[   11.826239]  do_el0_svc+0x24/0x38
[   11.831009]  el0_svc+0x3c/0x138
[   11.834307]  el0t_64_sync_handler+0xa0/0xe8
[   11.837261]  el0t_64_sync+0x198/0x1a0
[   11.841432] Code: 910003fd f9000bf3 91004013 aa1303e0 (f9402821) 
[   11.845258] ---[ end trace 0000000000000000 ]---
Failure - ltp-cve/cve-2022-0185
[  766.670826] <LAVA_SIGNAL_STARTTC cve-2022-0185>
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_fscj3phSN as tmpdir (tmpfs filesyste[  766.675303] <LAVA_SIGNAL_ENDTC cve-2022-0185>
\0\0m)
tst_device.c:98: TINFO: Found free device 0 '/dev/loop0'
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2022-0185 fsconfig03
Failure - ltp-cve/cve-2022-23222
\0\0[  766.374346] <LAVA_SIGNAL_STARTTC cve-2022-23222>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  766.379530] <LAVA_SIGNAL_ENDTC cve-2022-23222>
\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2022-23222 bpf_prog07
Failure - ltp-cve/cve-2021-22600
[  766.132484] <LAVA_SIGNAL_STARTTC cve-2021-22600>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  766.137677] <LAVA_SIGNAL_ENDTC cve-2021-22600>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2021-22600 setsockopt09
Failure - ltp-cve/cve-2021-4204
[  765.961583] <LAVA_SIGNAL_STARTTC cve-2021-4204>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  765.966911] <LAVA_SIGNAL_ENDTC cve-2021-4204>
\0\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2021-4204 bpf_prog06
Failure - ltp-cve/cve-2021-3444
[  765.687745] <LAVA_SIGNAL_STARTTC cve-2021-3444>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  765.693316] <LAVA_SIGNAL_ENDTC cve-2021-3444>
\0\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2021-3444 bpf_prog05
Failure - ltp-cve/cve-2020-36557
[  765.629938] <LAVA_SIGNAL_STARTTC cve-2020-36557>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  765.634864] <LAVA_SIGNAL_ENDTC cve-2020-36557>
\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2020-36557 pty06
Failure - ltp-cve/cve-2020-14386
[  765.398518] <LAVA_SIGNAL_STARTTC cve-2020-14386>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  765.403696] <LAVA_SIGNAL_ENDTC cve-2020-14386>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2020-14386 sendto03
Failure - ltp-cve/cve-2019-8912
[  765.242037] <LAVA_SIGNAL_STARTTC cve-2019-8912>
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_af_rI1L1C as tmpdir (tmpfs filesyste[  765.246974] <LAVA_SIGNAL_ENDTC cve-2019-8912>
\0\0m)
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2019-8912 af_alg07
Failure - ltp-cve/cve-2018-18445
[  764.903339] <LAVA_SIGNAL_STARTTC cve-2018-18445>
tst_buffers.c:57: TINFO: Test is using guarded buffe[  764.908165] <LAVA_SIGNAL_ENDTC cve-2018-18445>
\0rs
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2018-18445 bpf_prog04
Failure - ltp-cve/cve-2018-9568
[  764.625082] <LAVA_SIGNAL_STARTTC cve-2018-9568>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  764.632262] <LAVA_SIGNAL_ENDTC cve-2018-9568>
\0\0
cve-2018-9568 connect02
Failure - ltp-cve/cve-2018-7566
[  764.508940] <LAVA_SIGNAL_STARTTC cve-2018-7566>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  764.516404] <LAVA_SIGNAL_ENDTC cve-2018-7566>
\0\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2018-7566 snd_seq01
Failure - ltp-cve/cve-2017-1000380
[  764.277075] <LAVA_SIGNAL_STARTTC cve-2017-1000380>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  764.282506] <LAVA_SIGNAL_ENDTC cve-2017-1000380>
\0\0\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-1000380 snd_timer01
Failure - ltp-cve/cve-2017-1000112
[  764.163182] <LAVA_SIGNAL_STARTTC cve-2017-1000112>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  764.169594] <LAVA_SIGNAL_ENDTC cve-2017-1000112>
\0\0\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-1000112 setsockopt05
Failure - ltp-cve/cve-2017-17712
[  763.731728] <LAVA_SIGNAL_STARTTC cve-2017-17712>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  763.736671] <LAVA_SIGNAL_ENDTC cve-2017-17712>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-17712 sendmsg03
Failure - ltp-cve/cve-2017-16939
[  763.504270] <LAVA_SIGNAL_STARTTC cve-2017-16939>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  763.509566] <LAVA_SIGNAL_ENDTC cve-2017-16939>
\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-16939 cve-2017-16939
Failure - ltp-cve/cve-2017-10661
[  763.079248] <LAVA_SIGNAL_STARTTC cve-2017-10661>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  763.084516] <LAVA_SIGNAL_ENDTC cve-2017-10661>
\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-10661 timerfd_settime02
Failure - ltp-cve/cve-2017-8890
[  762.973935] <LAVA_SIGNAL_STARTTC cve-2017-8890>
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_accqELEqj as tmpdir (tmpfs filesyste[  762.979535] <LAVA_SIGNAL_ENDTC cve-2017-8890>
\0\0m)
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.16.0-rc7-next-20250724 #1 SMP PREEMPT @1753332396 aarch64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
tst_buffers.c:57: TINFO: Test is using guarded buffers
accept02.c:129: TINFO: Starting listener on port: 57797
accept02.c:52: TBROK: setsockopt(3, 0, 42, 0xffffa2c15f78, 136) failed: ENODEV (19)
HINT: You _MAY_ be missing kernel fixes:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=657831ff
HINT: You _MAY_ be vulnerable to CVE(s):
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
\r[  763.025252] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=cve-2017-8890 RESULT=fail>
\0\0
cve-2017-8890 accept02
Failure - ltp-cve/cve-2017-2636
[  762.589081] <LAVA_SIGNAL_STARTTC cve-2017-2636>
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)[  762.594134] <LAVA_SIGNAL_ENDTC cve-2017-2636>
\0\0
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2017-2636 pty05
Failure - ltp-cve/cve-2016-8655
[  762.311776] <LAVA_SIGNAL_STARTTC cve-2016-8655>
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'[  762.316578] <LAVA_SIGNAL_ENDTC cve-2016-8655>
\0\0
tst_taint.c:92: TINFO: tainted: D (OOPS/BUG)
tst_taint.c:95: TBROK: Kernel is already tainted
Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
cve-2016-8655 setsockopt06