That information sounds incorrect. The changes for XSA-39 which caused
this regressions where to xen-netback (the driver in dom0). The problem
is that this depends on MAX_SKB_FRAGS which changed in v3.3 from 18 to
17. So if dom0 runs a v3.3 or later kernel with XSA-39 applied, it will
shutdown the network for any guest that uses a bigger value than 17
(which is pre v3.3 linux guests but from descriptions it seems also some
Windows guests). I think the patches below (which probably are in v3.10)
will fix this. But those will have to be applied to dom0 kernels.

commit 2810e5b9a7731ca5fce22bfbe12c96e16ac44b6f
Author: Wei Liu <wei.l...@citrix.com>
Date:   Mon Apr 22 02:20:42 2013 +0000

    xen-netback: coalesce slots in TX path and fix regressions

commit 03393fd5cc2b6cdeec32b704ecba64dbb0feae3c
Author: Wei Liu <wei.l...@citrix.com>
Date:   Mon Apr 22 02:20:43 2013 +0000

    xen-netback: don't disconnect frontend when seeing oversize packet

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1162924

Title:
  bug disabling Xen guest interface

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1162924/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to