Update Broadcom Emulex FC HBA lpfc driver to 14.0.0.4 for Ubuntu 22.04

Bug #1956982 reported by Laurie Barry
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Medium
Jeff Lane 

Bug Description

Please integrate this customer critical/reported fix that was submitted as a stand along patch:
Accepted 11/29/21:

Applied to 5.16/scsi-fixes, thanks!

[1/1] lpfc: Fix nonrecovery of remote ports following an unsolicited LOGO
      https://git.kernel.org/mkp/scsi/c/0956ba63bd94

As well as this latest set of bug fix patches accepted upstream 12/6/2021:

scsi: lpfc: Fix leaked lpfc_dmabuf mbox allocations with NPIV
  commit f0d3919697492950f57a26a1093aee53880d669d
scsi: lpfc: Change return code on I/Os received during link bounce
  commit 2e81b1a374da5d6024208c16c4a5224a70cafa64
scsi: lpfc: Fix lpfc_force_rscn ndlp kref imbalance
  commit 7576d48c64f36f6fea9df2882f710a474fa35f40
scsi: lpfc: Fix NPIV port deletion crash
  commit 8ed190a91950564775cbaae9e8e8083a69a8da23
scsi: lpfc: Trigger SLI4 firmware dump before doing driver cleanup
  commit 7dd2e2a923173d637c272e483966be8e96a72b64
scsi: lpfc: Adjust CMF total bytes and rxmonitor
  commit a6269f837045acb02904f31f05acde847ec8f8a7
scsi: lpfc: Cap CMF read bytes to MBPI
  commit 05116ef9c4b444f7fdbb56f9e13c2ec941726639
scsi: lpfc: Add additional debugfs support for CMF
  commit 6014a2468f0e49194f612b1f09f99eacee0a409a
scsi: lpfc: Update lpfc version to 14.0.0.4
  commit 4437503bfbec2f02b41b2492520fe627715889a7

Extended log info:

  0000-cover-letter.patch

  0001-lpfc-Fix-leaked-lpfc_dmabuf-mbox-allocations-with-np.patch
   commit f0d3919697492950f57a26a1093aee53880d669d
   lpfc: Fix memory leaked lpfc_dmabuf mbox allocations
   Fix leaked lpfc_dmabuf allocations in an mbox.
     svn: r82112
      bz: 249968 250131

  0002-lpfc-Change-return-code-on-ios-received-during-link-.patch
   commit 2e81b1a374da5d6024208c16c4a5224a70cafa64
   lpfc: Group RPI_SUSPENDED error action with DID_REQUEUE
   Fix Medusa IO errors on Scope and Scale LIP test
     svn: r82348
      bz: 247164 250466
   Fix Medusa IO errors on Scope and Scale LIP test - build
     svn: r82377
      bz: 247164 250466

  0003-lpfc-Fix-lpfc_force_rscn-ndlp-kref-imbalance.patch
   commit 7576d48c64f36f6fea9df2882f710a474fa35f40
   lpfc: Fix lpfc_force_rscn ndlp kref imbalance
   Fix ndlp kref crash during lpfc_force_rscn
     svn: r82526
      bz: 250692 250695

  0004-lpfc-Fix-NPIV-port-deletion-crash.patch
   commit 8ed190a91950564775cbaae9e8e8083a69a8da23
   lpfc: Fix NPIV port deletion crash
   Fix crash when deleting a large number of vports.
     svn: r82120
      bz: 240671 250158
   Fix a log message formatting error introduced in svn r82120.
     svn: r82743
      bz: 249968 250131

  0005-lpfc-Trigger-SLI4-firmware-dump-before-doing-driver-.patch
   commit 7dd2e2a923173d637c272e483966be8e96a72b64
   lpfc: Trigger SLI4 firmware dump immediately without delays
   Trigger SLI4 firmware dump immediately without delays
     svn: r82770
      bz: 250111 251061

  0006-lpfc-Adjust-CMF-total-bytes-and-rxmonitor.patch
   commit a6269f837045acb02904f31f05acde847ec8f8a7
   lpfc: Adjust CMF total bytes and rxmonitor
   Adjust CMF total bytes and add to rxmonitor
     svn: r82429
      bz: 250581 250587

  0007-lpfc-Cap-CMF-read-bytes-to-MBPI.patch
   commit 05116ef9c4b444f7fdbb56f9e13c2ec941726639
   lpfc: Cap CMF read bytes to MBPI
   Cap CMF read bytes to MBPI only for shortened timer intervals
     svn: r82483
      bz: 250605 251274

  0008-lpfc-Add-additional-debugfs-support-for-CMF.patch
   commit 6014a2468f0e49194f612b1f09f99eacee0a409a
   lpfc: Add additional debugfs support for CMF
   Add debugfs support for CMF parameters
     svn: r82144
      bz: 250206 250237
   Coverity: CID 19805 Fix memory illegal access
     svn: r82349
      bz: 250454 250465

  0009-lpfc-Update-lpfc-version-to-14.0.0.4.patch
    commit 4437503bfbec2f02b41b2492520fe627715889a7

thamanna (sinbinha)
Changed in linux (Ubuntu):
status: New → Confirmed
Jeff Lane  (bladernr)
Changed in linux (Ubuntu):
assignee: nobody → Jeff Lane (bladernr)
Revision history for this message
Jeff Lane  (bladernr) wrote :

Hi Laurie,

These do not appear to have even landed in mkp/scsi yet, I don't have a local copy of 5.16/scsi so I'm guessing they are there and will make their way into 5.16 at some point before release?

Do you have an ETA on when these should land in 5.16 (either mainline, or linux-next) to give me an idea on when I can look at pulling them?

Changed in linux (Ubuntu):
status: Confirmed → Incomplete
Revision history for this message
Jeff Lane  (bladernr) wrote :

Just a summary of patches pulled:
From the patches listed, these were already in 22.04 in a previous 5.15 sync:
[1/1] lpfc: Fix nonrecovery of remote ports following an unsolicited LOGO
      https://git.kernel.org/mkp/scsi/c/0956ba63bd94
scsi: lpfc: Fix leaked lpfc_dmabuf mbox allocations with NPIV
  commit f0d3919697492950f57a26a1093aee53880d669d
scsi: lpfc: Fix lpfc_force_rscn ndlp kref imbalance
  commit 7576d48c64f36f6fea9df2882f710a474fa35f40
scsi: lpfc: Trigger SLI4 firmware dump before doing driver cleanup
  commit 7dd2e2a923173d637c272e483966be8e96a72b64

These have been submitted and are awaiting final inclusion:
scsi: lpfc: Change return code on I/Os received during link bounce
  commit 2e81b1a374da5d6024208c16c4a5224a70cafa64
scsi: lpfc: Fix NPIV port deletion crash
  commit 8ed190a91950564775cbaae9e8e8083a69a8da23
scsi: lpfc: Adjust CMF total bytes and rxmonitor
  commit a6269f837045acb02904f31f05acde847ec8f8a7
scsi: lpfc: Cap CMF read bytes to MBPI
  commit 05116ef9c4b444f7fdbb56f9e13c2ec941726639
scsi: lpfc: Add additional debugfs support for CMF
  commit 6014a2468f0e49194f612b1f09f99eacee0a409a
scsi: lpfc: Update lpfc version to 14.0.0.4
  commit 4437503bfbec2f02b41b2492520fe627715889a7

Jeff Lane  (bladernr)
tags: added: servcert-187
Jeff Lane  (bladernr)
Changed in linux (Ubuntu):
status: Incomplete → Fix Committed
importance: Undecided → Medium
Revision history for this message
Laurie Barry (laurie-barry-4) wrote :

Jeff - thank you for the update but what is the ETA for a kernel with these patches integrated?

Laurie

Revision history for this message
Jeff Lane  (bladernr) wrote :

test kernels can be found for now here: https://people.canonical.com/~jlane/kernels/1956982/

I've built those this morning as the patches have landed in the Jammy kernel tree but have yet to be built into the next binary due to delays in the kernel release.

So for now, that should be sufficient to test, it's a straight build of the 5.15 tree as of this morning.

Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (67.6 KiB)

This bug was fixed in the package linux - 5.15.0-23.23

---------------
linux (5.15.0-23.23) jammy; urgency=medium

  * jammy/linux: 5.15.0-23.23 -proposed tracker (LP: #1964573)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync dkms-build{,--nvidia-N} from LRMv5
    - debian/dkms-versions -- update from kernel-versions (main/master)

  * [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests
    (LP: #1959977)
    - KVM: s390: pv: make use of ultravisor AIV support

  * intel_iommu breaks Intel IPU6 camera: isys port open ready failed -16
    (LP: #1958004)
    - SAUCE: iommu: intel-ipu: use IOMMU passthrough mode for Intel IPUs

  * CVE-2022-23960
    - ARM: report Spectre v2 status through sysfs
    - ARM: early traps initialisation
    - ARM: use LOADADDR() to get load address of sections
    - ARM: Spectre-BHB workaround
    - ARM: include unprivileged BPF status in Spectre V2 reporting
    - arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
    - arm64: Add HWCAP for self-synchronising virtual counter
    - arm64: Add Cortex-X2 CPU part definition
    - arm64: add ID_AA64ISAR2_EL1 sys register
    - arm64: cpufeature: add HWCAP for FEAT_AFP
    - arm64: cpufeature: add HWCAP for FEAT_RPRES
    - arm64: entry.S: Add ventry overflow sanity checks
    - arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
    - KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
    - arm64: entry: Make the trampoline cleanup optional
    - arm64: entry: Free up another register on kpti's tramp_exit path
    - arm64: entry: Move the trampoline data page before the text page
    - arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
    - arm64: entry: Don't assume tramp_vectors is the start of the vectors
    - arm64: entry: Move trampoline macros out of ifdef'd section
    - arm64: entry: Make the kpti trampoline's kpti sequence optional
    - arm64: entry: Allow the trampoline text to occupy multiple pages
    - arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
    - arm64: entry: Add vectors that have the bhb mitigation sequences
    - arm64: entry: Add macro for reading symbol addresses from the trampoline
    - arm64: Add percpu vectors for EL1
    - arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
    - arm64: Mitigate spectre style branch history side channels
    - KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
    - arm64: Use the clearbhb instruction in mitigations
    - arm64: proton-pack: Include unprivileged eBPF status in Spectre v2
      mitigation reporting
    - ARM: fix build error when BPF_SYSCALL is disabled

  * CVE-2021-26401
    - x86/speculation: Use generic retpoline by default on AMD
    - x86/speculation: Update link to AMD speculation whitepaper
    - x86/speculation: Warn about Spectre v2 LFENCE mitigation
    - x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT

  * CVE-2022-0001
    - x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
    - x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
    - x86/speculation: Add eIBRS + Retpoline options
    - Document...

Changed in linux (Ubuntu):
status: Fix Committed → Fix Released
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote :

This bug is awaiting verification that the linux-oracle-5.15/5.15.0-1006.8~20.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-focal
Revision history for this message
Laurie Barry (laurie-barry-4) wrote :

Broadcom Emulex has verified the 14.0.0.4 lpfc Ubuntu 22.04 driver patchset in the package linux - 5.15.0-23.23 kernel.

Thank you for your support
Laurie Barry
Software Program Manager

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.