Thanks for the bug report!

I did some test with b/kvm 4.15.0-1142-kvm
Despite this is an older kernel but my experiment shows it's very likely a test 
case issue with 
https://github.com/linux-test-project/ltp/commit/be0aaca2f742005d3bc5a43f22099f87f1cab004
 upstream from our LTP update test on openstack.

Test output with our LTP tip-testing branch:
<<<test_output>>>
incrementing stop
tst_tmpdir.c:317: TINFO: Using /tmp/ltp-8gJBQaOsGK/LTP_cvepsLLAh as tmpdir 
(ext2/ext3/ext4 filesystem)
tst_test.c:1952: TINFO: LTP version: 20230929-1381-g227fe3ccb
tst_test.c:1955: TINFO: Tested kernel: 4.15.0-1142-kvm #147-Ubuntu SMP Wed Jun 
21 14:33:42 UTC 2023 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config 
'/lib/modules/4.15.0-1142-kvm/build/.config'
tst_test.c:1775: TINFO: Overall timeout per run is 0h 03m 30s
cve-2015-3290.c:424: TINFO: attempting to corrupt nested NMI stack state
cve-2015-3290.c:200: TBROK: modify_ltd(1, 0x7ffcc8c27320, 16) invalid retval 
-22: ENOENT (2)
tst_test.c:439: TINFO: Child process reported TBROK killing the test
tst_test.c:1836: TINFO: Killed the leftover descendant processes

HINT: You _MAY_ be missing kernel fixes:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d5

HINT: You _MAY_ be vulnerable to CVE(s):

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290

Summary:
passed   0
failed   0
broken   1
skipped  0
warnings 0
<<<execution_status>>>


With that change reverted:
<<<test_output>>>
incrementing stop
tst_tmpdir.c:317: TINFO: Using /tmp/ltp-YGVGkbsm38/LTP_cveON2IZZ as tmpdir 
(ext2/ext3/ext4 filesystem)
tst_test.c:1952: TINFO: LTP version: 20230929-1380-gc9e5b1e50
tst_test.c:1955: TINFO: Tested kernel: 4.15.0-1142-kvm #147-Ubuntu SMP Wed Jun 
21 14:33:42 UTC 2023 x86_64
tst_kconfig.c:88: TINFO: Parsing kernel config 
'/lib/modules/4.15.0-1142-kvm/build/.config'
tst_test.c:1775: TINFO: Overall timeout per run is 0h 03m 30s
cve-2015-3290.c:446: TINFO: attempting to corrupt nested NMI stack state
cve-2015-3290.c:212: TINFO: WARNING: Libc mishandled modify_ldt() return value
cve-2015-3290.c:219: TCONF: modify_ldt: 16-bit data segments are probably 
disabled: EINVAL (22)

Summary:
passed   0
failed   0
broken   0
skipped  1
warnings 0
<<<execution_status>>>


** Tags added: 4.15 bionic sru-s20250414 ubuntu-ltp-cve

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-3290

** Summary changed:

- cve-2015-3290: TBROK: ENOENT in bionic/kvm
+ ubuntu_ltp_cve/cve-2015-3290: TBROK: ENOENT in bionic/kvm

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2111834

Title:
  ubuntu_ltp_cve/cve-2015-3290: TBROK: ENOENT in bionic/kvm

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2111834/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to