Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-i386

<8>[  390.514843] <LAVA_SIGNAL_STARTTC cve-2017-7616>
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.6.94-rc1 #1 SMP PREEMPT_DYNAMIC @1750177230 i686
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
set_mempolicy05.c:61: TINFO: stack pattern is in 0xbfb567b0-0xbfb56bb0
set_mempolicy05.c:105: TFAIL: set_mempolicy should fail with EFAULT or EINVAL, instead returned 38

HINT: You _MAY_ be missing kernel fixes:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8

HINT: You _MAY_ be vulnerable to CVE(s):

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2017-7616

Summary:
passed   0
failed   1
broken   0
skipped  0
warnings 0

<8>[  390.533125] <LAVA_SIGNAL_ENDTC cve-2017-7616>
cve-2017-7616 set_mempolicy05
cve-2017-7616: <12>[   88.199010] /usr/local/bin/kirk[301]: cve-2017-7616: start (command: set_mempolicy05)


<8>[  393.194572] <LAVA_SIGNAL_STARTTC cve-2017-7616>
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.6.94-rc1 #1 SMP PREEMPT_DYNAMIC @1750177714 i686
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
set_mempolicy05.c:61: TINFO: stack pattern is in 0xbfb4ba80-0xbfb4be80
set_mempolicy05.c:105: TFAIL: set_mempolicy should fail with EFAULT or EINVAL, instead returned 38

HINT: You _MAY_ be missing kernel fixes:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8

HINT: You _MAY_ be vulnerable to CVE(s):

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2017-7616

Summary:
passed   0
failed   1
broken   0
skipped  0
warnings 0

<8>[  393.213134] <LAVA_SIGNAL_ENDTC cve-2017-7616>
cve-2017-7616 set_mempolicy05
cve-2017-7616: <12>[   90.702286] /usr/local/bin/kirk[299]: cve-2017-7616: start (command: set_mempolicy05)


<8>[  288.343113] <LAVA_SIGNAL_STARTTC cve-2017-7616>
tst_test.c:1953: TINFO: LTP version: 20250530
tst_test.c:1956: TINFO: Tested kernel: 6.6.94-rc1 #1 SMP PREEMPT_DYNAMIC @1750177222 i686
tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz'
tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution
tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s
set_mempolicy05.c:61: TINFO: stack pattern is in 0xbff78fd0-0xbff793d0
set_mempolicy05.c:105: TFAIL: set_mempolicy should fail with EFAULT or EINVAL, instead returned 38

HINT: You _MAY_ be missing kernel fixes:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8

HINT: You _MAY_ be vulnerable to CVE(s):

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2017-7616

Summary:
passed   0
failed   1
broken   0
skipped  0
warnings 0

<8>[  288.354925] <LAVA_SIGNAL_ENDTC cve-2017-7616>
cve-2017-7616 set_mempolicy05
cve-2017-7616: <12>[  123.901092] /usr/local/bin/kirk[300]: cve-2017-7616: start (command: set_mempolicy05)