neutron/neutron/agent/linux/openvswitch_firewall
Moshe Levi 51c7c3cb2e ovs firewall: fix mac learning on the ingress rule table when ovs offload enabled
In RULES_INGRESS_TABLE table 82 there is a rule for allow established and
related connections. The current rule sends the packet directly to the dest
port without doing a mac learning. This is causing ovs to age out the dest mac
of the remote VM and causing the rule to be changed in flood rule. For the normal
case it fine as they try to avoid high cpu. ovs hardware offload reduce cpu usage
by moving some of the packet processing to nic and flood rule is not offloaded,
therefore it prefre to use the NORMAL action to avoid the flood rule.
We also keep the same logic as today when using explicitly_egress_direct=True
which avoid NORMAL action in the entire pipeline.

Closes-Bug: #1897637

Change-Id: I9b611d62be5d0529e8b35e3d8280baa5be54bc2b
(cherry picked from commit 8fc80b7e13)
2020-10-24 01:01:07 +00:00
..
__init__.py Open vSwitch conntrack based firewall driver 2016-02-16 16:47:21 +00:00
constants.py [log] ovs fw logging implementation 2018-01-09 09:26:40 +07:00
exceptions.py ovsfw: Don't create rules if updated port doesn't exist 2018-01-05 16:28:18 +00:00
firewall.py ovs firewall: fix mac learning on the ingress rule table when ovs offload enabled 2020-10-24 01:01:07 +00:00
iptables.py fullstack: Migration from iptables_hybrid to openvswitch 2018-04-26 16:44:24 +00:00
rules.py [Security] fix allowed-address-pair 0.0.0.0/0 issue 2020-07-31 11:23:18 +00:00