[Pkg-xen-devel] Bug#988477: xen-hypervisor-4.14-amd64: xen dmesg shows (XEN) AMD-Vi: IO_PAGE_FAULT on sata pci device
Elliott Mitchell
ehem+debian at m5p.com
Tue Sep 3 22:58:18 BST 2024
found 988477 4.17.3+10-g091466ba55-1~deb12u1
severity 988477 critical
quit
Justification is same as original, data loss. I'm unsure about of the
border between "data loss" and "serious data loss" is, but the original
reportter declared it so and I don't disagree.
On Sun, Aug 25, 2024 at 11:41:44PM +0200, Maximilian Engelhardt wrote:
> I am changing the severity back to normal as the xen package works fine for
> many people without any serious issues. From your last message it also seems
critical
makes unrelated software on the system (or the whole system) break,
or causes serious data loss, or introduces a security hole on systems
where you install the package.
grave
makes the package in question unusable or mostly so, or causes data
loss, or introduces a security hole allowing access to the accounts
of users who use the package.
Both of those are lists of conditions. Since the conditions are
"causes serious data loss" and "causes data loss", those have been met
as there is no mention of "and cannot work acceptably for anyone".
> you found a workaround for your problem. Please don't change the bug severity
> without at least giving an explanation why you think the new severity is
> justified.
The key word was "may". I was being cautious when testing due to the
severity of the issue. As stated in the previous message, it was found
to merely mildly change the messages and not fix the issue.
> >From the few log lines in this bug report this seems to be an upstream issue
> with xen or the linux kernel. Please report your observations upstream. The
> Debian xen team does not have the resources and knowledge to debug or fix such
> problems. Once the issue has been identified and fixed upstream we can see if
> we can backport a fix to our Debian packages, but this is only possible once
> an upstream fix has landed.
My understanding is being an upstream issue has no effect on severity.
It allows tagging as "upstream", but does not allow reducing severity.
The severity is meant as an alert to others there is a *severe* problem
lurking.
I've tried interacting with upstream, yet there has been a demand to
release `xl dmesg` to a public area. While I cannot state any
information in `xl dmesg` can be used to compromise systems, nor can
point to hardware serial numbers or other private data which leak in, it
still triggers the TMI detector.
As such I'm uncomfortable with that being public and I don't know any way
to bridge that chasm. If I was an installation of 10K nodes I wouldn't
be too bothered with details of a single test machine leaking, alas I'm
not in that category.
I could also send someone a pair of SATA devices known to manifest the
issue, but that has failed to generate interest. As such I'm stuck.
Question for the original submitter, Imre Szőllősi, what was your
situation prior to seeing #988477 manifest?
Were you installing Xen 4.14 for the first time on Debian 11/bullseye?
Had you previously used Xen 4.11 with Debian 10/buster or earlier?
Knowing whether the bug was introduced between Xen 4.11 and Xen 4.14
would be valuable knowledge if you have it. I had been using an older
processor with 4.14, so I hadn't observed it until 4.17.
--
(\___(\___(\______ --=> 8-) EHM <=-- ______/)___/)___/)
\BS ( | ehem+sigmsg at m5p.com PGP 87145445 | ) /
\_CS\ | _____ -O #include <stddisclaimer.h> O- _____ | / _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445
More information about the Pkg-xen-devel
mailing list