Hay
Date
June 2, 2025, 2:13 p.m.
Failure - ltp-syscalls - getxattr04
tst_test.c:1170: TINFO: Formatting /dev/loop0 with xfs opts='' extra opts=''
tst_test.c:1182: TINFO: Mounting /dev/loop0 to /tmp/LTP_getkx2Cpb/mntpoint fstyp=xfs flags=0
tst_test.c:1182: TBROK: mount(/dev/loop0, mntpoint, xfs, 0, (nil)) failed: ENODEV (19)

Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0

getxattr04 getxattr04
getxattr04: [  512.346379] loop0: detected capacity change from 0 to 614400
Failure - ltp-syscalls - accept02
tst_tmpdir.c:316: TINFO: Using /tmp/LTP_acchieeZJ as tmpdir (tmpfs filesystem)
tst_test.c:1900: TINFO: LTP version: 20250130
tst_test.c:1904: TINFO: Tested kernel: 6.14.10-rc1 #1 SMP PREEMPT @1748873846 aarch64
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1722: TINFO: Overall timeout per run is 0h 21m 36s
tst_buffers.c:57: TINFO: Test is using guarded buffers
accept02.c:131: TINFO: Starting listener on port: 45679
accept02.c:54: TBROK: setsockopt(3, 0, 42, 0xffffbb8eff78, 136) failed: ENODEV (19)

HINT: You _MAY_ be missing kernel fixes:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=657831ff

HINT: You _MAY_ be vulnerable to CVE(s):

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890

Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0

accept02 accept02
accept02: [1;36mbroken[0m  (0.026s)
accept02.c:131: TINFO: Starting listener on port: 45679
accept02.c:54: TBROK: setsockopt(3, 0, 42, 0xffffbb8eff78, 136) failed: ENODEV (19)