Bug 1315243

Summary: Enable spoofchk control for SR-IOV ports
Product: Red Hat OpenStack Reporter: Jaison Raju <jraju>
Component: openstack-neutronAssignee: Assaf Muller <amuller>
Status: CLOSED CURRENTRELEASE QA Contact: Toni Freger <tfreger>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 7.0 (Kilo)CC: amuller, chrisw, jraju, nyechiel, srevivo
Target Milestone: ---Keywords: FutureFeature, ZStream
Target Release: 8.0 (Liberty)   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-01-16 18:46:51 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jaison Raju 2016-03-07 10:56:28 UTC
1. Proposed title of this feature request  
      Enable spoofchk control for SR-IOV ports      

    3. What is the nature and description of the request?
Allow user to control the spoofchk status on VF used by SRIOV based ports.
https://review.openstack.org/#/c/182593/5/specs/liberty/sriov-spoofchk.rst
      
    4. Why does the customer need this? (List the business requirements here)  
Need SRIOV ports to have mac spoofing disabled to allow VIPs in instances or
in scenarios of bonding
      
    7. Is there already an existing RFE upstream or in Red Hat Bugzilla?  
      https://blueprints.launchpad.net/neutron/+spec/sriov-spoofchk

Comment 4 Assaf Muller 2017-01-16 18:46:51 UTC
The code landed in Liberty and is present in OSP 8.