Browse Source

ovs firewall: fix mac learning on the ingress rule table when ovs offload enabled

In RULES_INGRESS_TABLE table 82 there is a rule for allow established and
related connections. The current rule sends the packet directly to the dest
port without doing a mac learning. This is causing ovs to age out the dest mac
of the remote VM and causing the rule to be changed in flood rule. For the normal
case it fine as they try to avoid high cpu. ovs hardware offload reduce cpu usage
by moving some of the packet processing to nic and flood rule is not offloaded,
therefore it prefre to use the NORMAL action to avoid the flood rule.
We also keep the same logic as today when using explicitly_egress_direct=True
which avoid NORMAL action in the entire pipeline.

Closes-Bug: #1897637

Change-Id: I9b611d62be5d0529e8b35e3d8280baa5be54bc2b
(cherry picked from commit 8fc80b7e13)
changes/37/759537/1
Moshe Levi 1 year ago
parent
commit
51c7c3cb2e
  1. 14
      neutron/agent/linux/openvswitch_firewall/firewall.py
  2. 10
      releasenotes/notes/fix-mac-learning-in-case--ovs-offload-26193bf1638fd673.yaml

14
neutron/agent/linux/openvswitch_firewall/firewall.py

@ -1309,6 +1309,18 @@ class OVSFirewallDriver(firewall.FirewallDriver):
actions='resubmit(,%d)' % ovs_consts.DROPPED_TRAFFIC_TABLE
)
# NOTE: The OUTPUT action is used instead of NORMAL action to reduce
# cpu utilization, but it causes the datapath rule to be flood rule.
# This is due to mac learning not happened on ingress traffic.
# While this is ok for no offload case, in ovs offload flood rule
# is not offloaded. Therefore, we change the action to be NORMAL in
# offload case. In case the explicitly_egress_direct is used the
# pipeline don't contain action NORMAL so we don't have flood rule
# issue.
actions = 'output:{:d}'.format(port.ofport)
if (self.int_br.br.is_hw_offload_enabled and
not cfg.CONF.AGENT.explicitly_egress_direct):
actions = 'mod_vlan_vid:{:d},normal'.format(port.vlan_tag)
# Allow established and related connections
for state in (ovsfw_consts.OF_STATE_ESTABLISHED_REPLY,
ovsfw_consts.OF_STATE_RELATED):
@ -1319,7 +1331,7 @@ class OVSFirewallDriver(firewall.FirewallDriver):
ct_state=state,
ct_mark=ovsfw_consts.CT_MARK_NORMAL,
ct_zone=port.vlan_tag,
actions='output:{:d}'.format(port.ofport)
actions=actions
)
self._add_flow(
table=ovs_consts.RULES_INGRESS_TABLE,

10
releasenotes/notes/fix-mac-learning-in-case--ovs-offload-26193bf1638fd673.yaml

@ -0,0 +1,10 @@
---
fixes:
- |
Fixed MAC learning issue when ovs offload enabled. OVS firewall reduce
the usage of normal actions to reduce cpu utilization. This causing flood
rule because there is no MAC learning on ingress traffic. While this ok
for none offload case, when using ovs offload flood rule is not
offloaded. This fix the MAC learning in the offload, so we avoid flood
rule.
`#1897637 <https://bugs.launchpad.net/neutron/+bug/1897637>`_.
Loading…
Cancel
Save