Date
June 2, 2025, 2:13 p.m.
Failure - ltp-syscalls - getxattr04
tst_test.c:1170: TINFO: Formatting /dev/loop0 with xfs opts='' extra opts='' tst_test.c:1182: TINFO: Mounting /dev/loop0 to /tmp/LTP_getkx2Cpb/mntpoint fstyp=xfs flags=0 tst_test.c:1182: TBROK: mount(/dev/loop0, mntpoint, xfs, 0, (nil)) failed: ENODEV (19) Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 getxattr04 getxattr04 getxattr04: [ 512.346379] loop0: detected capacity change from 0 to 614400
Failure - ltp-syscalls - accept02
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_acchieeZJ as tmpdir (tmpfs filesystem) tst_test.c:1900: TINFO: LTP version: 20250130 tst_test.c:1904: TINFO: Tested kernel: 6.14.10-rc1 #1 SMP PREEMPT @1748873846 aarch64 tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz' tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution tst_test.c:1722: TINFO: Overall timeout per run is 0h 21m 36s tst_buffers.c:57: TINFO: Test is using guarded buffers accept02.c:131: TINFO: Starting listener on port: 45679 accept02.c:54: TBROK: setsockopt(3, 0, 42, 0xffffbb8eff78, 136) failed: ENODEV (19) HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=657831ff HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890 Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 accept02 accept02 accept02: [1;36mbroken[0m (0.026s) accept02.c:131: TINFO: Starting listener on port: 45679 accept02.c:54: TBROK: setsockopt(3, 0, 42, 0xffffbb8eff78, 136) failed: ENODEV (19)