Back to bug 1402584
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Stephen Gordon | 2016-12-07 21:44:47 UTC | Link ID | OpenStack gerrit 397932 | |
| RHOS Integration | 2016-12-08 05:01:53 UTC | Whiteboard | upstream_milestone_none upstream_definition_drafting upstream_status_unknown | |
| Franck Baudin | 2017-01-16 17:16:30 UTC | CC | fbaudin | |
| Stephen Gordon | 2017-01-24 20:50:20 UTC | CC | nyechiel | |
| Flags | needinfo?(nyechiel) | |||
| Nir Yechiel | 2017-01-25 07:17:35 UTC | Flags | needinfo?(fbaudin) | |
| Franck Baudin | 2017-01-25 08:14:10 UTC | Flags | needinfo?(nyechiel) needinfo?(fbaudin) | |
| Stephen Gordon | 2017-01-25 19:16:12 UTC | Keywords | Triaged | |
| Status | NEW | ASSIGNED | ||
| Target Release | --- | 12.0 (Pike) | ||
| Assignee | eglynn | vromanov | ||
| Target Milestone | --- | Upstream M2 | ||
| Stephen Gordon | 2017-01-25 19:18:20 UTC | Flags | needinfo?(nyechiel) | |
| JP Jung | 2017-01-26 19:23:56 UTC | CC | jjung | |
| atelang | 2017-02-02 06:07:58 UTC | CC | atelang | |
| Stephen Gordon | 2017-02-03 22:55:43 UTC | Priority | unspecified | medium |
| Severity | unspecified | medium | ||
| RHOS Integration | 2017-02-04 05:01:55 UTC | Severity | medium | unspecified |
| Scott Lewis | 2017-04-13 15:51:48 UTC | Blocks | 1442136 | |
| Sahid Ferdjaoui | 2017-04-20 14:00:03 UTC | Assignee | vromanov | sferdjao |
| Sahid Ferdjaoui | 2017-04-21 13:02:28 UTC | Status | ASSIGNED | ON_DEV |
| Eoghan Glynn | 2017-06-07 13:14:12 UTC | Target Release | 12.0 (Pike) | 13.0 (Queens) |
| Joe H. Rahme | 2017-06-07 14:36:23 UTC | CC | jhakimra | |
| QA Contact | panbalag | gszasz | ||
| Nir Yechiel | 2017-06-12 11:18:45 UTC | Flags | needinfo?(nyechiel) | |
| Sahid Ferdjaoui | 2017-07-20 09:48:01 UTC | CC | awaugama | |
| QA Contact | gszasz | awaugama | ||
| Link ID | OpenStack gerrit 397932 | OpenStack gerrit 485522 | ||
| Bertrand | 2017-08-09 15:42:37 UTC | CC | brault | |
| Bertrand | 2017-08-09 15:45:40 UTC | Blocks | 1419948 | |
| Lee Yarwood | 2017-11-22 16:37:38 UTC | Target Release | 13.0 (Queens) | 14.0 (Rocky) |
| CC | lyarwood | |||
| Severity | unspecified | medium | ||
| Red Hat Bugzilla Rules Engine | 2017-11-22 16:37:46 UTC | Target Release | 14.0 (Rocky) | --- |
| Red Hat Bugzilla Rules Engine | 2017-11-22 17:13:20 UTC | Target Release | --- | 14.0 (Rocky) |
| David Juran | 2017-11-29 08:37:36 UTC | CC | djuran | |
| Joe Donohue | 2017-11-30 19:24:38 UTC | CC | jdonohue | |
| Blocks | 1419948 | 1476900 | ||
| jingjing niu | 2017-12-06 09:39:01 UTC | CC | jniu | |
| jingjing niu | 2017-12-06 09:39:50 UTC | Blocks | 1500557 | |
| Wei Yongjun | 2018-01-04 01:30:24 UTC | CC | weiyongjun | |
| Stephen Gordon | 2018-01-16 17:43:02 UTC | Priority | medium | high |
| Severity | medium | high | ||
| Joe Donohue | 2018-02-08 19:07:36 UTC | CC | jdonohue | |
| Sahid Ferdjaoui | 2018-06-04 08:09:34 UTC | Status | ON_DEV | POST |
| Thierry Vignaud | 2018-07-13 07:29:14 UTC | Status | POST | MODIFIED |
| Thierry Vignaud | 2018-07-13 15:53:30 UTC | Fixed In Version | openstack-nova-18.0.0-0.20180710150340.8469fa7 | |
| PnT Account Manager | 2018-07-13 21:31:26 UTC | CC | jjung | |
| errata-xmlrpc | 2018-07-23 19:34:07 UTC | Status | MODIFIED | ON_QA |
| atelang | 2018-08-14 02:01:16 UTC | Blocks | 1615667 | |
| Edu Alcaniz | 2018-09-20 09:46:26 UTC | CC | ealcaniz | |
| Edu Alcaniz | 2018-09-20 09:57:54 UTC | Flags | needinfo?(sferdjao) | |
| Sahid Ferdjaoui | 2018-09-20 13:08:42 UTC | Flags | needinfo?(sferdjao) | |
| Luca Miccini | 2018-09-21 14:43:49 UTC | CC | lmiccini | |
| Edu Alcaniz | 2018-09-26 14:24:26 UTC | Severity | high | urgent |
| atelang | 2018-10-04 16:29:39 UTC | Flags | needinfo?(lyarwood) | |
| Sahid Ferdjaoui | 2018-10-05 10:15:33 UTC | Blocks | 1636395 | |
| PnT Account Manager | 2018-11-02 21:54:03 UTC | Assignee | sferdjao | nova-maint |
| PnT Account Manager | 2018-11-02 22:00:34 UTC | CC | sferdjao | |
| Stephen Finucane | 2018-11-07 15:09:14 UTC | CC | sfinucan | |
| Assignee | nova-maint | sfinucan | ||
| Flags | needinfo?(lyarwood) | |||
| Joe H. Rahme | 2018-11-14 16:03:53 UTC | Status | ON_QA | VERIFIED |
| atelang | 2018-12-04 15:30:40 UTC | Blocks | 1656071 | |
| atelang | 2018-12-04 15:31:22 UTC | Blocks | 1656073 | |
| Stephen Finucane | 2018-12-04 16:46:47 UTC | Depends On | 1379787, 1384439 | |
| Stephen Finucane | 2018-12-04 16:46:52 UTC | Blocks | 1382052 | |
| Stephen Finucane | 2018-12-04 16:50:41 UTC | Version | 10.0 (Newton) | 8.0 (Liberty) |
| Stephen Finucane | 2018-12-17 11:57:28 UTC | Doc Text | Feature: The libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF is able to perform certain operations, such as modifying the VF’s MAC address in the guest. Reason: Interface bonding require all slaves use the same MAC address, which in turn require MAC address modifications on one of the VFs during a fail-over. As MAC address altering is a privileged operation, participating VFs should be trusted in order to successfully configure bonding in the guest. Result: Administrators can now configure trusted mode for VFs. This requires two steps. Firstly, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example: [pci] passthrough_whitelist = {"devname": "eth0", "trusted": "true", "physical_network":"sriovnet1"} Then, when creating the port, 'trusted=true' must be set for the binding profile. For example: $ neutron port-create <net-id> \ --name sriov_port \ --vnic-type direct \ --binding:profile type=dict trusted=true As trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'. |
|
| Chuck Copello | 2019-01-07 21:03:00 UTC | Flags | needinfo?(sfinucan) | |
| James Smith | 2019-01-09 17:30:14 UTC | CC | jamsmith | |
| Doc Text | Feature: The libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF is able to perform certain operations, such as modifying the VF’s MAC address in the guest. Reason: Interface bonding require all slaves use the same MAC address, which in turn require MAC address modifications on one of the VFs during a fail-over. As MAC address altering is a privileged operation, participating VFs should be trusted in order to successfully configure bonding in the guest. Result: Administrators can now configure trusted mode for VFs. This requires two steps. Firstly, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example: [pci] passthrough_whitelist = {"devname": "eth0", "trusted": "true", "physical_network":"sriovnet1"} Then, when creating the port, 'trusted=true' must be set for the binding profile. For example: $ neutron port-create <net-id> \ --name sriov_port \ --vnic-type direct \ --binding:profile type=dict trusted=true As trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'. | With this update, the libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF can perform certain operations, such as modifying the VF’s MAC address in the guest. Interface bonding requires that all slaves use the same MAC address, which in turn requires MAC address modifications on one of the VFs during a fail-over. Because MAC address altering is a privileged operation, participating VFs must be trusted in order to successfully configure bonding in the guest. Administrators can now configure trusted mode for VFs. This requires two steps. First, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example: [pci] passthrough_whitelist = {"devname": "eth0", "trusted": "true", "physical_network":"sriovnet1"} Then, when creating the port, 'trusted=true' must be set for the binding profile. For example: $ neutron port-create <net-id> \ --name sriov_port \ --vnic-type direct \ --binding:profile type=dict trusted=true Because trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'. | ||
| Flags | needinfo?(sfinucan) | |||
| errata-xmlrpc | 2019-01-09 23:55:09 UTC | Status | VERIFIED | RELEASE_PENDING |
| James Smith | 2019-01-10 17:45:56 UTC | Doc Text | With this update, the libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF can perform certain operations, such as modifying the VF’s MAC address in the guest. Interface bonding requires that all slaves use the same MAC address, which in turn requires MAC address modifications on one of the VFs during a fail-over. Because MAC address altering is a privileged operation, participating VFs must be trusted in order to successfully configure bonding in the guest. Administrators can now configure trusted mode for VFs. This requires two steps. First, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example: [pci] passthrough_whitelist = {"devname": "eth0", "trusted": "true", "physical_network":"sriovnet1"} Then, when creating the port, 'trusted=true' must be set for the binding profile. For example: $ neutron port-create <net-id> \ --name sriov_port \ --vnic-type direct \ --binding:profile type=dict trusted=true Because trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'. | With this update, the libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF can perform certain operations, such as modifying the VF’s MAC address in the guest. Interface bonding requires that all slaves use the same MAC address, which in turn requires MAC address modifications on one of the VFs during a failover. Because MAC address altering is a privileged operation, participating VFs must be trusted in order to successfully configure bonding in the guest. Administrators can now configure trusted mode for VFs. This requires two steps. First, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example: [pci] passthrough_whitelist = {"devname": "eth0", "trusted": "true", "physical_network":"sriovnet1"} Then, when creating the port, 'trusted=true' must be set for the binding profile. For example: $ neutron port-create <net-id> \ --name sriov_port \ --vnic-type direct \ --binding:profile type=dict trusted=true Because trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'. |
| errata-xmlrpc | 2019-01-11 11:47:00 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2019-01-11 11:47:00 UTC | |||
| errata-xmlrpc | 2019-01-11 11:47:58 UTC | Link ID | Red Hat Product Errata RHEA-2019:0045 | |
| David Vallee Delisle | 2019-03-11 18:08:11 UTC | Blocks | 1687560 | |
| Mikey Ariel | 2019-07-24 12:29:20 UTC | Blocks | 1732816 | |
| Russell Bryant | 2019-09-09 15:15:09 UTC | CC | rbryant | |
| Stephen Finucane | 2019-11-20 14:15:32 UTC | Flags | needinfo?(sfinucan) needinfo?(sfinucan) | |
| Red Hat One Jira (issues.redhat.com) | 2021-12-10 15:07:12 UTC | Link ID | Red Hat Issue Tracker OSP-11289 |
Back to bug 1402584