[22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function

Bug #1959542 reported by bugproxy
16
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Ubuntu on IBM z Systems
Fix Released
High
Skipper Bug Screeners
linux (Ubuntu)
Fix Released
High
Canonical Kernel Team

Bug Description

Title: Independent Usage of Secondary Physical Function"

Description:
"This feature adds the ability for a Linux running in LPAR to use the Physical Function (PF) associated with the second port of a ConnectX-5/6 card independent of that of the first port.
Prior to this feature, if the secondary PF was attached to an LPAR without also attaching the primary PF, no PCI function would be visible in Linux. The function would instead remain
in a hidden and disabled state. Conversely it has always been possible to use the primary PF without attaching the secondary PF. This existing behavior is confusing and needlessly
restricts flexible usage of these powerful network cards. The new behavior of allowing independent usage is also in accordance with the PCI SR-IOV specification which explicitly
defines the dependencies between PCI functions in the Dependency Link field which is still honored and for ConnectX-5/6 cards allows this independent usage."

CVE References

bugproxy (bugproxy)
tags: added: architecture-s39064 bugnameltc-196210 severity-high targetmilestone-inin2204
Changed in ubuntu:
assignee: nobody → Skipper Bug Screeners (skipper-screen-team)
affects: ubuntu → linux (Ubuntu)
Revision history for this message
Frank Heimes (fheimes) wrote :

Waiting for the upstream acceptance (probably 5.17?), then trying to get it into jammy's 5.15.
Updating ticket to Incomplete for now.
Please share commit(s) once they've landed upstream.

Changed in ubuntu-z-systems:
assignee: nobody → Skipper Bug Screeners (skipper-screen-team)
Changed in linux (Ubuntu):
importance: Undecided → High
Changed in ubuntu-z-systems:
importance: Undecided → High
Changed in linux (Ubuntu):
status: New → Fix Released
Changed in ubuntu-z-systems:
status: New → Incomplete
Changed in linux (Ubuntu):
status: Fix Released → Incomplete
Revision history for this message
bugproxy (bugproxy) wrote : Comment bridged from LTC Bugzilla

------- Comment From <email address hidden> 2022-03-15 06:22 EDT-------
This item will not make it in time for jammy, therefore moving to Ubuntu 22.10.
Updating target milestone from 22.04 ==> 22.10

tags: added: targetmilestone-inin2210
removed: targetmilestone-inin2204
Frank Heimes (fheimes)
summary: - [22.04 FEAT] ROCE: Support for new IBM Z Hardware
+ [22.10 FEAT] ROCE: Support for new IBM Z Hardware
Revision history for this message
bugproxy (bugproxy) wrote :

------- Comment From <email address hidden> 2022-07-20 06:52 EDT-------
The fix didn't make it into 5.19, therefore changing "Public Release" to kernel 5.20.
Expecting fix to be upstream soon.

Frank Heimes (fheimes)
summary: - [22.10 FEAT] ROCE: Support for new IBM Z Hardware
+ [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function
description: updated
Revision history for this message
bugproxy (bugproxy) wrote :

------- Comment From <email address hidden> 2022-09-13 08:25 EDT-------
These are the required patches (upstream with v6.0-rc1)

[Commit IDs]:
c3df83e01a96ca569d261bcdffa2fb858b1012fa ("PCI: Clean up pci_scan_slot()")
fbed59ed8781d7eecd7f45cde0188cf24eeb5c38 ("PCI: Split out next_ari_fn() from next_fn()")
db360b1ea7faef290471bc1b2a7463b96fd20a07 ("PCI: Move jailhouse's isolated function handling to pci_scan_slot()")
189c6c33ff421def040b904fb14ef76c5bf5af4c ("PCI: Extend isolated function probing to s390")
960ac362648780469b2f5584bb8cff540444d119 ("s390/pci: allow zPCI zbus without a function zero")
----

Frank Heimes (fheimes)
Changed in linux (Ubuntu):
status: Incomplete → New
Changed in ubuntu-z-systems:
status: Incomplete → New
Revision history for this message
Frank Heimes (fheimes) wrote :

Patch request submitted:
https://lists.ubuntu.com/archives/kernel-team/2022-September/thread.html#133176
Updating status to 'In Progress'.

In addition test builds in PPA were done for all major architectures with a kinetic master-next kernel that incl. the patches mentioned above.

Changed in linux (Ubuntu):
assignee: Skipper Bug Screeners (skipper-screen-team) → Canonical Kernel Team (canonical-kernel-team)
status: New → In Progress
Changed in ubuntu-z-systems:
status: New → In Progress
information type: Private → Public
Revision history for this message
Frank Heimes (fheimes) wrote :

This is now incl. in linux-generic | 5.19.0.18.18 | kinetic-proposed
hence updating the status to Fix Committed.

Changed in linux (Ubuntu):
status: In Progress → Fix Committed
Changed in ubuntu-z-systems:
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (18.6 KiB)

This bug was fixed in the package linux - 5.19.0-18.18

---------------
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0000000000000084
    (LP: #1990236)
    - Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
      flags"
    - Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
    - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
    - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
    - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
    - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
      request""
    - Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
      reset""
    - Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
      request""
    - Revert "UBUNTU: [Config] update configs after apply new apparmor patch set"
    - Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
    - Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
    - Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
    - Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
      flag"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for full
      LSM context"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
      lsmcontext_init"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
      audit data"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
      object contexts"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm values
      for netlabel"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple task
      security contexts"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in an
      audit_buffer"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
      multiple LSMs"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
      structure"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
      audit_names"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
      module selection"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
      confirmation"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
      lsmblob"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
      netlink netfilter"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
      security_dentry_init_security"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
      security_inode_getsecctx"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
      security_secid_to_secctx"
    - Revert "UBUNTU: SAUCE: lsm stacking v37: LSM:...

Changed in linux (Ubuntu):
status: Fix Committed → Fix Released
Frank Heimes (fheimes)
Changed in ubuntu-z-systems:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.