Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-i386 |
<8>[ 390.514843] <LAVA_SIGNAL_STARTTC cve-2017-7616> tst_test.c:1953: TINFO: LTP version: 20250530 tst_test.c:1956: TINFO: Tested kernel: 6.6.94-rc1 #1 SMP PREEMPT_DYNAMIC @1750177230 i686 tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz' tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s set_mempolicy05.c:61: TINFO: stack pattern is in 0xbfb567b0-0xbfb56bb0 set_mempolicy05.c:105: TFAIL: set_mempolicy should fail with EFAULT or EINVAL, instead returned 38 HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8 HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2017-7616 Summary: passed 0 failed 1 broken 0 skipped 0 warnings 0 <8>[ 390.533125] <LAVA_SIGNAL_ENDTC cve-2017-7616> cve-2017-7616 set_mempolicy05 cve-2017-7616: <12>[ 88.199010] /usr/local/bin/kirk[301]: cve-2017-7616: start (command: set_mempolicy05)
<8>[ 393.194572] <LAVA_SIGNAL_STARTTC cve-2017-7616> tst_test.c:1953: TINFO: LTP version: 20250530 tst_test.c:1956: TINFO: Tested kernel: 6.6.94-rc1 #1 SMP PREEMPT_DYNAMIC @1750177714 i686 tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz' tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s set_mempolicy05.c:61: TINFO: stack pattern is in 0xbfb4ba80-0xbfb4be80 set_mempolicy05.c:105: TFAIL: set_mempolicy should fail with EFAULT or EINVAL, instead returned 38 HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8 HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2017-7616 Summary: passed 0 failed 1 broken 0 skipped 0 warnings 0 <8>[ 393.213134] <LAVA_SIGNAL_ENDTC cve-2017-7616> cve-2017-7616 set_mempolicy05 cve-2017-7616: <12>[ 90.702286] /usr/local/bin/kirk[299]: cve-2017-7616: start (command: set_mempolicy05)
<8>[ 288.343113] <LAVA_SIGNAL_STARTTC cve-2017-7616> tst_test.c:1953: TINFO: LTP version: 20250530 tst_test.c:1956: TINFO: Tested kernel: 6.6.94-rc1 #1 SMP PREEMPT_DYNAMIC @1750177222 i686 tst_kconfig.c:88: TINFO: Parsing kernel config '/proc/config.gz' tst_kconfig.c:676: TINFO: CONFIG_TRACE_IRQFLAGS kernel option detected which might slow the execution tst_test.c:1774: TINFO: Overall timeout per run is 0h 21m 36s set_mempolicy05.c:61: TINFO: stack pattern is in 0xbff78fd0-0xbff793d0 set_mempolicy05.c:105: TFAIL: set_mempolicy should fail with EFAULT or EINVAL, instead returned 38 HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8 HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2017-7616 Summary: passed 0 failed 1 broken 0 skipped 0 warnings 0 <8>[ 288.354925] <LAVA_SIGNAL_ENDTC cve-2017-7616> cve-2017-7616 set_mempolicy05 cve-2017-7616: <12>[ 123.901092] /usr/local/bin/kirk[300]: cve-2017-7616: start (command: set_mempolicy05)