Back to bug 1402584

Who When What Removed Added
Stephen Gordon 2016-12-07 21:44:47 UTC Link ID OpenStack gerrit 397932
RHOS Integration 2016-12-08 05:01:53 UTC Whiteboard upstream_milestone_none upstream_definition_drafting upstream_status_unknown
Franck Baudin 2017-01-16 17:16:30 UTC CC fbaudin
Stephen Gordon 2017-01-24 20:50:20 UTC CC nyechiel
Flags needinfo?(nyechiel)
Nir Yechiel 2017-01-25 07:17:35 UTC Flags needinfo?(fbaudin)
Franck Baudin 2017-01-25 08:14:10 UTC Flags needinfo?(nyechiel) needinfo?(fbaudin)
Stephen Gordon 2017-01-25 19:16:12 UTC Keywords Triaged
Status NEW ASSIGNED
Target Release --- 12.0 (Pike)
Assignee eglynn vromanov
Target Milestone --- Upstream M2
Stephen Gordon 2017-01-25 19:18:20 UTC Flags needinfo?(nyechiel)
JP Jung 2017-01-26 19:23:56 UTC CC jjung
atelang 2017-02-02 06:07:58 UTC CC atelang
Stephen Gordon 2017-02-03 22:55:43 UTC Priority unspecified medium
Severity unspecified medium
RHOS Integration 2017-02-04 05:01:55 UTC Severity medium unspecified
Scott Lewis 2017-04-13 15:51:48 UTC Blocks 1442136
Sahid Ferdjaoui 2017-04-20 14:00:03 UTC Assignee vromanov sferdjao
Sahid Ferdjaoui 2017-04-21 13:02:28 UTC Status ASSIGNED ON_DEV
Eoghan Glynn 2017-06-07 13:14:12 UTC Target Release 12.0 (Pike) 13.0 (Queens)
Joe H. Rahme 2017-06-07 14:36:23 UTC CC jhakimra
QA Contact panbalag gszasz
Nir Yechiel 2017-06-12 11:18:45 UTC Flags needinfo?(nyechiel)
Sahid Ferdjaoui 2017-07-20 09:48:01 UTC CC awaugama
QA Contact gszasz awaugama
Link ID OpenStack gerrit 397932 OpenStack gerrit 485522
Bertrand 2017-08-09 15:42:37 UTC CC brault
Bertrand 2017-08-09 15:45:40 UTC Blocks 1419948
Lee Yarwood 2017-11-22 16:37:38 UTC Target Release 13.0 (Queens) 14.0 (Rocky)
CC lyarwood
Severity unspecified medium
Red Hat Bugzilla Rules Engine 2017-11-22 16:37:46 UTC Target Release 14.0 (Rocky) ---
Red Hat Bugzilla Rules Engine 2017-11-22 17:13:20 UTC Target Release --- 14.0 (Rocky)
David Juran 2017-11-29 08:37:36 UTC CC djuran
Joe Donohue 2017-11-30 19:24:38 UTC CC jdonohue
Blocks 1419948 1476900
jingjing niu 2017-12-06 09:39:01 UTC CC jniu
jingjing niu 2017-12-06 09:39:50 UTC Blocks 1500557
Wei Yongjun 2018-01-04 01:30:24 UTC CC weiyongjun
Stephen Gordon 2018-01-16 17:43:02 UTC Priority medium high
Severity medium high
Joe Donohue 2018-02-08 19:07:36 UTC CC jdonohue
Sahid Ferdjaoui 2018-06-04 08:09:34 UTC Status ON_DEV POST
Thierry Vignaud 2018-07-13 07:29:14 UTC Status POST MODIFIED
Thierry Vignaud 2018-07-13 15:53:30 UTC Fixed In Version openstack-nova-18.0.0-0.20180710150340.8469fa7
PnT Account Manager 2018-07-13 21:31:26 UTC CC jjung
errata-xmlrpc 2018-07-23 19:34:07 UTC Status MODIFIED ON_QA
atelang 2018-08-14 02:01:16 UTC Blocks 1615667
Edu Alcaniz 2018-09-20 09:46:26 UTC CC ealcaniz
Edu Alcaniz 2018-09-20 09:57:54 UTC Flags needinfo?(sferdjao)
Sahid Ferdjaoui 2018-09-20 13:08:42 UTC Flags needinfo?(sferdjao)
Luca Miccini 2018-09-21 14:43:49 UTC CC lmiccini
Edu Alcaniz 2018-09-26 14:24:26 UTC Severity high urgent
atelang 2018-10-04 16:29:39 UTC Flags needinfo?(lyarwood)
Sahid Ferdjaoui 2018-10-05 10:15:33 UTC Blocks 1636395
PnT Account Manager 2018-11-02 21:54:03 UTC Assignee sferdjao nova-maint
PnT Account Manager 2018-11-02 22:00:34 UTC CC sferdjao
Stephen Finucane 2018-11-07 15:09:14 UTC CC sfinucan
Assignee nova-maint sfinucan
Flags needinfo?(lyarwood)
Joe H. Rahme 2018-11-14 16:03:53 UTC Status ON_QA VERIFIED
atelang 2018-12-04 15:30:40 UTC Blocks 1656071
atelang 2018-12-04 15:31:22 UTC Blocks 1656073
Stephen Finucane 2018-12-04 16:46:47 UTC Depends On 1379787, 1384439
Stephen Finucane 2018-12-04 16:46:52 UTC Blocks 1382052
Stephen Finucane 2018-12-04 16:50:41 UTC Version 10.0 (Newton) 8.0 (Liberty)
Stephen Finucane 2018-12-17 11:57:28 UTC Doc Text Feature:
The libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF is able to perform certain operations, such as modifying the VF’s MAC address in the guest.

Reason:
Interface bonding require all slaves use the same MAC address, which in turn require MAC address modifications on one of the VFs during a fail-over. As MAC address altering is a privileged operation, participating VFs should be trusted in order to successfully configure bonding in the guest.

Result:
Administrators can now configure trusted mode for VFs. This requires two steps. Firstly, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example:

[pci]
passthrough_whitelist = {"devname": "eth0", "trusted": "true",
"physical_network":"sriovnet1"}

Then, when creating the port, 'trusted=true' must be set for the binding profile. For example:

$ neutron port-create <net-id> \
--name sriov_port \
--vnic-type direct \
--binding:profile type=dict trusted=true

As trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'.
Chuck Copello 2019-01-07 21:03:00 UTC Flags needinfo?(sfinucan)
James Smith 2019-01-09 17:30:14 UTC CC jamsmith
Doc Text Feature:
The libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF is able to perform certain operations, such as modifying the VF’s MAC address in the guest.

Reason:
Interface bonding require all slaves use the same MAC address, which in turn require MAC address modifications on one of the VFs during a fail-over. As MAC address altering is a privileged operation, participating VFs should be trusted in order to successfully configure bonding in the guest.

Result:
Administrators can now configure trusted mode for VFs. This requires two steps. Firstly, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example:

[pci]
passthrough_whitelist = {"devname": "eth0", "trusted": "true",
"physical_network":"sriovnet1"}

Then, when creating the port, 'trusted=true' must be set for the binding profile. For example:

$ neutron port-create <net-id> \
--name sriov_port \
--vnic-type direct \
--binding:profile type=dict trusted=true

As trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'.
With this update, the libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF can perform certain operations, such as modifying the VF’s MAC address in the guest.

Interface bonding requires that all slaves use the same MAC address, which in turn requires MAC address modifications on one of the VFs during a fail-over. Because MAC address altering is a privileged operation, participating VFs must be trusted in order to successfully configure bonding in the guest.

Administrators can now configure trusted mode for VFs. This requires two steps. First, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example:

[pci]
passthrough_whitelist = {"devname": "eth0", "trusted": "true",
"physical_network":"sriovnet1"}

Then, when creating the port, 'trusted=true' must be set for the binding profile. For example:

$ neutron port-create <net-id> \
--name sriov_port \
--vnic-type direct \
--binding:profile type=dict trusted=true

Because trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'.
Flags needinfo?(sfinucan)
errata-xmlrpc 2019-01-09 23:55:09 UTC Status VERIFIED RELEASE_PENDING
James Smith 2019-01-10 17:45:56 UTC Doc Text With this update, the libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF can perform certain operations, such as modifying the VF’s MAC address in the guest.

Interface bonding requires that all slaves use the same MAC address, which in turn requires MAC address modifications on one of the VFs during a fail-over. Because MAC address altering is a privileged operation, participating VFs must be trusted in order to successfully configure bonding in the guest.

Administrators can now configure trusted mode for VFs. This requires two steps. First, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example:

[pci]
passthrough_whitelist = {"devname": "eth0", "trusted": "true",
"physical_network":"sriovnet1"}

Then, when creating the port, 'trusted=true' must be set for the binding profile. For example:

$ neutron port-create <net-id> \
--name sriov_port \
--vnic-type direct \
--binding:profile type=dict trusted=true

Because trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'.
With this update, the libvirt compute driver now allows users to create instances with trusted SR-IOV virtual functions. When trusted, a VF can perform certain operations, such as modifying the VF’s MAC address in the guest.

Interface bonding requires that all slaves use the same MAC address, which in turn requires MAC address modifications on one of the VFs during a failover. Because MAC address altering is a privileged operation, participating VFs must be trusted in order to successfully configure bonding in the guest.

Administrators can now configure trusted mode for VFs. This requires two steps. First, the 'trusted' value of the '[pci] passthrough_whitelist' JSON configuration option in nova.conf must be set to 'true'. For example:

[pci]
passthrough_whitelist = {"devname": "eth0", "trusted": "true",
"physical_network":"sriovnet1"}

Then, when creating the port, 'trusted=true' must be set for the binding profile. For example:

$ neutron port-create <net-id> \
--name sriov_port \
--vnic-type direct \
--binding:profile type=dict trusted=true

Because trusted mode only applies to SR-IOV VFs, the 'vnic-type' must be one of 'hw_veb' or 'direct'.
errata-xmlrpc 2019-01-11 11:47:00 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2019-01-11 11:47:00 UTC
errata-xmlrpc 2019-01-11 11:47:58 UTC Link ID Red Hat Product Errata RHEA-2019:0045
David Vallee Delisle 2019-03-11 18:08:11 UTC Blocks 1687560
Mikey Ariel 2019-07-24 12:29:20 UTC Blocks 1732816
Russell Bryant 2019-09-09 15:15:09 UTC CC rbryant
Stephen Finucane 2019-11-20 14:15:32 UTC Flags needinfo?(sfinucan) needinfo?(sfinucan)
Red Hat One Jira (issues.redhat.com) 2021-12-10 15:07:12 UTC Link ID Red Hat Issue Tracker OSP-11289

Back to bug 1402584