← Back to team overview

kernel-packages team mailing list archive

[Bug 1290151] Re: hyper-v: Hyper-V network broken for Trusty on Server 2008R2

 

This bug was fixed in the package linux - 3.13.0-18.38

---------------
linux (3.13.0-18.38) trusty; urgency=low

  [ Tim Gardner ]

  * Release Tracking Bug
    - LP: #1293725
  * [Config] Add hv_balloon to d-i virtio-modules
    - LP: #1292216

  [ Andy Whitcroft ]

  * [Config] d-i -- add virtio_scsi to virtio-modules
    - LP: #1288607

  [ Colin Ian King ]

  * SAUCE: intel_pstate: inform user that thermald is worth considering

  [ dann frazier ]

  * [Config] arm64: KVM=y

  [ Gerd Hoffmann ]

  * SAUCE: vmbus: add missing breaks
    - LP: #1287398
  * SAUCE: vmbus: use resource for hyperv mmio region
    - LP: #1287398
  * SAUCE: hyperv-fb: add support for generation 2 virtual machines.
    - LP: #1287398
  * SAUCE: hyperv-fb: kick off efifb early
    - LP: #1287398

  [ Haiyang Zhang ]

  * SAUCE: hyperv: Change the receive buffer size for legacy hosts
    - LP: #1290151

  [ K. Y. Srinivasan ]

  * SAUCE: Drivers: hv: vmbus: Extract the mmio information from DSDT
    - LP: #1287398

  [ Paolo Pisati ]

  * SAUCE: leds-gpio: of: introduce MODULE_DEVICE_TABLE for module
    autoloading
  * [Config] amhf: LEDS_TRIGGER_HEARTBEAT=y

  [ Upstream Kernel Changes ]

  * Revert "xhci 1.0: Limit arbitrarily-aligned scatter gather."
    - LP: #1293361
  * Revert "USBNET: ax88179_178a: enable tso if usb host supports sg dma"
    - LP: #1293361
  * powerpc/tm: Fix crash when forking inside a transaction
  * AX88179_178A: Add VID:DID for Lenovo OneLinkDock Gigabit LAN
    - LP: #1291890
  * drm/vmwgfx: Fix a surface reference corner-case in legacy emulation
    mode
  * Input: wacom - scale up touch width and height values for Intuos Pro
  * Input: wacom - make sure touch_max is set for touch devices
  * Input: wacom - add support for three new Intuos devices
  * Input: wacom - add reporting of SW_MUTE_DEVICE events
  * Input: wacom - fix wacom->shared guards for dual input devices
  * Input: wacom - add support for DTU-1031
  * net: fix for a race condition in the inet frag code
    - CVE-2014-0100
  * net: sctp: fix sctp_sf_do_5_1D_ce to verify if we/peer is AUTH capable
    - CVE-2014-0101
  * KEYS: Make the keyring cycle detector ignore other keyrings of the same
    name
    - CVE-2014-0102
  * ipv6: don't set DST_NOCOUNT for remotely added routes
    - CVE-2014-2309
 -- Andy Whitcroft <apw@xxxxxxxxxxxxx>   Thu, 13 Mar 2014 10:06:05 +0000

** Changed in: linux (Ubuntu)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0100

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0101

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0102

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-2309

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1290151

Title:
  hyper-v: Hyper-V network broken for Trusty on Server 2008R2

Status in “linux” package in Ubuntu:
  Fix Released

Bug description:
  Due to a bug in the Hyper-V host verion 2008R2, we need to use a
  slightly smaller  receive buffer size, otherwise the buffer will not
  be accepted by the legacy hosts. Without this fix, the network driver
  will not load while hosting Trusty on Server 2008R2. The following
  patch addresses the problem:

  [PATCH net-next] hyperv: Change the receive buffer size for legacy
  hosts

  Due to a bug in the Hyper-V host verion 2008R2, we need to use a slightly smaller
   receive buffer size, otherwise the buffer will not be accepted by the legacy hosts.

   Signed-off-by: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
   ---
    drivers/net/hyperv/hyperv_net.h |    1 +
    drivers/net/hyperv/netvsc.c     |    6 +++++-
   2 files changed, 6 insertions(+), 1 deletions(-)

  diff --git a/drivers/net/hyperv/hyperv_net.h b/drivers/net/hyperv/hyperv_net.h
   index 39fc230..ea5f182 100644
   --- a/drivers/net/hyperv/hyperv_net.h
   +++ b/drivers/net/hyperv/hyperv_net.h
   @@ -516,6 +516,7 @@ struct nvsp_message {
    #define NETVSC_MTU 65536
    
    #define NETVSC_RECEIVE_BUFFER_SIZE              (1024*1024*16)  /* 16MB */
   +#define NETVSC_RECEIVE_BUFFER_SIZE_LEGACY      (1024*1024*15)  /* 15MB */
    
    #define NETVSC_RECEIVE_BUFFER_ID                0xcafe
    
   diff --git a/drivers/net/hyperv/netvsc.c b/drivers/net/hyperv/netvsc.c
   index 1a0280d..daddea2 100644
   --- a/drivers/net/hyperv/netvsc.c
   +++ b/drivers/net/hyperv/netvsc.c
   @@ -365,6 +365,11 @@ static int netvsc_connect_vsp(struct hv_device *device)
                    goto cleanup;
    
            /* Post the big receive buffer to NetVSP */
   +       if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2)
   +               net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY;
   +       else
   +               net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
   +
            ret = netvsc_init_recv_buf(device);
    
    cleanup:
   @@ -898,7 +903,6 @@ int netvsc_device_add(struct hv_device *device, void *additional_info)
            ndev = net_device->ndev;
    
            /* Initialize the NetVSC channel extension */
   -       net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
            spin_lock_init(&net_device->recv_pkt_list_lock);
    
            INIT_LIST_HEAD(&net_device->recv_pkt_list);
   -- 
   1.7.4.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1290151/+subscriptions


References