That information sounds incorrect. The changes for XSA-39 which caused this regressions where to xen-netback (the driver in dom0). The problem is that this depends on MAX_SKB_FRAGS which changed in v3.3 from 18 to 17. So if dom0 runs a v3.3 or later kernel with XSA-39 applied, it will shutdown the network for any guest that uses a bigger value than 17 (which is pre v3.3 linux guests but from descriptions it seems also some Windows guests). I think the patches below (which probably are in v3.10) will fix this. But those will have to be applied to dom0 kernels.
commit 2810e5b9a7731ca5fce22bfbe12c96e16ac44b6f Author: Wei Liu <wei.l...@citrix.com> Date: Mon Apr 22 02:20:42 2013 +0000 xen-netback: coalesce slots in TX path and fix regressions commit 03393fd5cc2b6cdeec32b704ecba64dbb0feae3c Author: Wei Liu <wei.l...@citrix.com> Date: Mon Apr 22 02:20:43 2013 +0000 xen-netback: don't disconnect frontend when seeing oversize packet -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1162924 Title: bug disabling Xen guest interface To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1162924/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs