← Back to team overview

kernel-packages team mailing list archive

[Bug 1162924] Re: bug disabling Xen guest interface

 

We are hitting this issue at the moment on our 12.04 domU guests.

It happened 4 times over the course of a couple of days.. it'd be nice
to see the fix for this backported into 12.04 domU kernels.


Our dom0 is CentOS 5.9.. might chase them up separately about perhaps
merging 03393fd5cc2b6cdeec32b704ecba64dbb0feae3c to prevent the dom0
disconnecting the guest.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1162924

Title:
  bug disabling Xen guest interface

Status in “linux” package in Ubuntu:
  Confirmed

Bug description:
  Kernels that have applied Xen Security Advisory 39 (CVE-2013-0216,
  CVE-2013-0217) now disable Xen guest networking in undesirable
  situations. The case that many people encounter is where the guest has
  MAX_SKB_FRAGS larger than MAX_SKB_FRAGS on dom0. This also occurs with
  Windows HVM guests.

  We should resolve this issue soon because most people using Ubuntu
  dom0 to host VMs will be affected after they apply the latest security
  updates.

  Logs show something like the following:
  xenbr1: port 8(vif51.0) entered forwarding state
  vif vif-51-0 vif51.0: Too many frags
  vif vif-51-0 vif51.0: fatal error; disabling device
  xenbr1: port 8(vif51.0) entered disabled state

  There is a thread on the Xen-devel mailing list discussing the issue:
  http://lists.xen.org/archives/html/xen-devel/2013-03/msg00404.html

  It seems that setting MAX_SKB_FRAGS to 19 on the dom0 kernel will
  avoid this issue.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1162924/+subscriptions