Thanks for the bug report! I did some test with b/kvm 4.15.0-1142-kvm Despite this is an older kernel but my experiment shows it's very likely a test case issue with https://github.com/linux-test-project/ltp/commit/be0aaca2f742005d3bc5a43f22099f87f1cab004 upstream from our LTP update test on openstack.
Test output with our LTP tip-testing branch: <<<test_output>>> incrementing stop tst_tmpdir.c:317: TINFO: Using /tmp/ltp-8gJBQaOsGK/LTP_cvepsLLAh as tmpdir (ext2/ext3/ext4 filesystem) tst_test.c:1952: TINFO: LTP version: 20230929-1381-g227fe3ccb tst_test.c:1955: TINFO: Tested kernel: 4.15.0-1142-kvm #147-Ubuntu SMP Wed Jun 21 14:33:42 UTC 2023 x86_64 tst_kconfig.c:88: TINFO: Parsing kernel config '/lib/modules/4.15.0-1142-kvm/build/.config' tst_test.c:1775: TINFO: Overall timeout per run is 0h 03m 30s cve-2015-3290.c:424: TINFO: attempting to corrupt nested NMI stack state cve-2015-3290.c:200: TBROK: modify_ltd(1, 0x7ffcc8c27320, 16) invalid retval -22: ENOENT (2) tst_test.c:439: TINFO: Child process reported TBROK killing the test tst_test.c:1836: TINFO: Killed the leftover descendant processes HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d5 HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290 Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 <<<execution_status>>> With that change reverted: <<<test_output>>> incrementing stop tst_tmpdir.c:317: TINFO: Using /tmp/ltp-YGVGkbsm38/LTP_cveON2IZZ as tmpdir (ext2/ext3/ext4 filesystem) tst_test.c:1952: TINFO: LTP version: 20230929-1380-gc9e5b1e50 tst_test.c:1955: TINFO: Tested kernel: 4.15.0-1142-kvm #147-Ubuntu SMP Wed Jun 21 14:33:42 UTC 2023 x86_64 tst_kconfig.c:88: TINFO: Parsing kernel config '/lib/modules/4.15.0-1142-kvm/build/.config' tst_test.c:1775: TINFO: Overall timeout per run is 0h 03m 30s cve-2015-3290.c:446: TINFO: attempting to corrupt nested NMI stack state cve-2015-3290.c:212: TINFO: WARNING: Libc mishandled modify_ldt() return value cve-2015-3290.c:219: TCONF: modify_ldt: 16-bit data segments are probably disabled: EINVAL (22) Summary: passed 0 failed 0 broken 0 skipped 1 warnings 0 <<<execution_status>>> ** Tags added: 4.15 bionic sru-s20250414 ubuntu-ltp-cve ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-3290 ** Summary changed: - cve-2015-3290: TBROK: ENOENT in bionic/kvm + ubuntu_ltp_cve/cve-2015-3290: TBROK: ENOENT in bionic/kvm -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2111834 Title: ubuntu_ltp_cve/cve-2015-3290: TBROK: ENOENT in bionic/kvm To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2111834/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
