LTP fork updated - 20260115
Po-Hsu Lin
po-hsu.lin at canonical.com
Thu Jan 15 10:03:02 UTC 2026
Hello folks,
I have our LTP fork updated:
Rebased on top of upstream commit:
262221320c listmount04.c: update struct mnt_id_req support to kernel >=
6.17.9
Update Note:
* This update fixes the following issues:
- LP: #2093139 listmount04 from ubuntu_ltp_syscalls failed on Noble
- LP: #2137362 listmount04 - TFAIL: invalid mnt_id_req.spare expected
EINVAL: EBADF
- LP: #2092274 CONFIG_MODULE_SIG_FORCE cause failure when inserting
test modules
- LP: #2137534 lsm_get_self_attr02 from ubuntu_ltp_syscalls failed on
N-6.8 ppc64el
- LP: #2129928 ubuntu_ltp_syscall clock and timer *02 tests failed
- LP: #2129850 commands in ubuntu_ltp_stable fails on questing because
of rust coreutils
- LP: #2111577 mmap22 from ubuntu_ltp_syscalls timeout with 6.11 / 6.14
kernel
- KTNT-1698 ubuntu_ltp_syscalls/epoll_ctl04 failing in 2025.10.13
* This update has revealed the following issues:
- LP: #2137362 listmount04 - TFAIL: invalid mnt_id_req.spare expected
EINVAL: EBADF
- LP: #2137199 mount08 from ubuntu_ltp_syscalls failed - TFAIL:
mount(/proc/139835/fd/4) succeeded
- LP: #2137211 clone304 from ubuntu_ltp_syscalls failed - clone3(*)
set_tid_size=1 expected EPERM: E2BIG
- LP: #2137239 file_attr02 from ubuntu_ltp_syscalls failed - unknown
option -m reflink=1
- LP: #2137534 lsm_get_self_attr02 from ubuntu_ltp_syscalls failed on
N-6.8 ppc64el
* The following SAUCE patches and cherry-picks are part of this update
therefore they have been dropped:
- mmap22: Improve MAP_DROPPABLE test stability using mincore()
- Add tst_get_max_clocks() routine based on tst_kconfig_check()
- define TST_MAX_CLOCKS to account MAX_AUX_CLOCKS also
- mkdir_tests.sh: Handle error message from mkdir from rust coreutils
- cve/cve-2015-3290: Correct the length parameter for perf munmap
- syscalls/epoll_ctl04: add ELOOP to expected errnos
* This update contains the following SAUCE patch which cannot be
upstreamed:
- UBUNTU: SAUCE: listmount04.c: reduce struct mnt_id_req support to >=
6.17.0
* sru-trusty branch is not be updated.
This has been tested with generic kernels from X~Q on Openstack. We might
discover more issues when we have more kernels tested.
Please feel to contact me if you have any question.
Thanks
Sam
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260115/a4ad44fe/attachment.html>
More information about the kernel-team
mailing list