{"id":2220046,"url":"http://patchwork.ozlabs.org/api/covers/2220046/?format=json","web_url":"http://patchwork.ozlabs.org/project/ovn/cover/20260406044444.311931-1-naveen.yerramneni@nutanix.com/","project":{"id":68,"url":"http://patchwork.ozlabs.org/api/projects/68/?format=json","name":"Open Virtual Network development","link_name":"ovn","list_id":"ovs-dev.openvswitch.org","list_email":"ovs-dev@openvswitch.org","web_url":"http://openvswitch.org/","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260406044444.311931-1-naveen.yerramneni@nutanix.com>","list_archive_url":null,"date":"2026-04-06T04:44:40","name":"[ovs-dev,v2,0/4] Add support for Network Function VTAP mode.","submitter":{"id":85983,"url":"http://patchwork.ozlabs.org/api/people/85983/?format=json","name":"Naveen Yerramneni","email":"naveen.yerramneni@nutanix.com"},"mbox":"http://patchwork.ozlabs.org/project/ovn/cover/20260406044444.311931-1-naveen.yerramneni@nutanix.com/mbox/","series":[{"id":498821,"url":"http://patchwork.ozlabs.org/api/series/498821/?format=json","web_url":"http://patchwork.ozlabs.org/project/ovn/list/?series=498821","date":"2026-04-06T04:44:41","name":"Add support for Network Function VTAP mode.","version":2,"mbox":"http://patchwork.ozlabs.org/series/498821/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2220046/comments/","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=nutanix.com header.i=@nutanix.com header.a=rsa-sha256\n header.s=proofpoint20171006 header.b=xYYH7X2/;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=nutanix.com header.i=@nutanix.com header.a=rsa-sha256\n header.s=selector1 header.b=Y83snpsx;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp4.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key)\n header.d=nutanix.com header.i=@nutanix.com header.a=rsa-sha256\n header.s=proofpoint20171006 header.b=xYYH7X2/;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key,\n unprotected) header.d=nutanix.com header.i=@nutanix.com header.a=rsa-sha256\n header.s=selector1 header.b=Y83snpsx","smtp3.osuosl.org;\n dmarc=pass (p=none dis=none) header.from=nutanix.com","smtp3.osuosl.org;\n dkim=pass (2048-bit key, unprotected) header.d=nutanix.com\n header.i=@nutanix.com header.a=rsa-sha256 header.s=proofpoint20171006\n header.b=xYYH7X2/; dkim=pass (2048-bit key,\n unprotected) header.d=nutanix.com header.i=@nutanix.com header.a=rsa-sha256\n header.s=selector1 header.b=Y83snpsx"],"Received":["from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fpy0v1QQlz1xy1\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 06 Apr 2026 15:04:13 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 36C23409C8;\n\tMon,  6 Apr 2026 05:04:10 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id aZYkcmlK_bZy; Mon,  6 Apr 2026 05:04:08 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56])\n\tby smtp4.osuosl.org (Postfix) with ESMTPS id 558B540994;\n\tMon,  6 Apr 2026 05:04:08 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id 00A44C0904;\n\tMon,  6 Apr 2026 05:04:08 +0000 (UTC)","from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 9C9E3C04FA\n for <dev@openvswitch.org>; Mon,  6 Apr 2026 05:04:06 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 7F329606A8\n for <dev@openvswitch.org>; Mon,  6 Apr 2026 05:04:06 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id jgJjR9giiLbO for <dev@openvswitch.org>;\n Mon,  6 Apr 2026 05:04:05 +0000 (UTC)","from mx0a-002c1b01.pphosted.com (mx0a-002c1b01.pphosted.com\n [148.163.151.68])\n by smtp3.osuosl.org (Postfix) with ESMTPS id AA5AA60698\n for <dev@openvswitch.org>; Mon,  6 Apr 2026 05:04:05 +0000 (UTC)","from pps.filterd (m0127840.ppops.net [127.0.0.1])\n by mx0a-002c1b01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 635NI5nH3403854\n for <dev@openvswitch.org>; Sun, 5 Apr 2026 21:44:59 -0700","from ph7pr06cu001.outbound.protection.outlook.com\n (mail-westus3azon11020092.outbound.protection.outlook.com [52.101.201.92])\n by mx0a-002c1b01.pphosted.com (PPS) with ESMTPS id 4daxyn24ej-1\n (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT)\n for <dev@openvswitch.org>; Sun, 05 Apr 2026 21:44:59 -0700 (PDT)","from SJ0PR02MB8369.namprd02.prod.outlook.com (2603:10b6:a03:3e4::5)\n by CH0PR02MB8091.namprd02.prod.outlook.com (2603:10b6:610:10b::13)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.18; Mon, 6 Apr\n 2026 04:44:57 +0000","from SJ0PR02MB8369.namprd02.prod.outlook.com\n ([fe80::7c30:f56e:e3cb:cb38]) by SJ0PR02MB8369.namprd02.prod.outlook.com\n ([fe80::7c30:f56e:e3cb:cb38%4]) with mapi id 15.20.9769.018; Mon, 6 Apr 2026\n 04:44:57 +0000"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.9.56;\n helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp4.osuosl.org 558B540994","OpenDKIM Filter v2.11.0 smtp3.osuosl.org AA5AA60698"],"Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=148.163.151.68;\n helo=mx0a-002c1b01.pphosted.com; envelope-from=naveen.yerramneni@nutanix.com;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp3.osuosl.org AA5AA60698","DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=nutanix.com; h=\n cc:content-transfer-encoding:content-type:date:from:message-id\n :mime-version:subject:to; s=proofpoint20171006; bh=9qsKTBibZzXXy\n lyiDuBsZmSMi0IeJYoxLG+h6Z/Qysw=; b=xYYH7X2/mqjVxgxdv6+QWfQp4vte9\n lSQbBBTi0qpct7kDtisVY5jqEoBA1mofVgRNxHfQXgzJrHKNBFU0X1bBVmR2NSDH\n uRVA3z7PLWCclkbGtwJoAHi5MemKYwEZEuVR8UDxqpaIAPoS/VswQu4vN7MEC3j3\n eC25EPi/LyeflVYPZEclJK/t5CYd5GZiUNWzKLLhTINFHnyVu/zT5CLBH0kiab+N\n 62GcZCDouHdzGJK9lR3OO1Qp9Ra7rmjTdykHXu+pCOGV2VrW3C0LyQCZlBINFRlH\n fopP89KbPGOHcIKha30sL3iQfFPKaLt1sqmRboOZluuvry1aFSgNAPBlw==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=nutanix.com;\n s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=9qsKTBibZzXXylyiDuBsZmSMi0IeJYoxLG+h6Z/Qysw=;\n b=Y83snpsx+OKy7OQ979CZm9ty6rcfsFSeyo+XutHR37XwUcvrnezoitZiUrgPg0M78RrasxbJzJqFV4xbwO+TfqmOb5tKyxMf7DD4ySlpDNs/cXXp1hwPIO4wnzDzRA8syph2qenB9yFd599+ZfqJGfD5VcQ5eMQwFWAeudvTbxxZVMO4gAjBv6zRhF5trKb5JNmmo5g7nQ8Nd/rjkfyVt3siqpxemC5hfPUurzrG96bDgNU4ipNLujRsNopa7IasWjuUkn8jCP4/PsaOz1MrDd76CixXmJq8xJUdLyhJEyacpKk7KCmHcsRwQhYyMVutoxiquKofxklkxEQbE2za8g=="],"ARC-Seal":"i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=XFnTBrNyydJYCy5kZ+1MjddMImtuODGFn7x3TluhB88/mncrOg/Nj/ahxZcr+h50lkCZnBEE/UMQZ1ZP+kvznq5uxR4E7VbT09cXD27nZfxm5SNbK8QeTyYL9s3nJSJJSpEXfNQpEXJX0n8awdS2CocG+XMJ6UfzBKnXu7z2v2dpIW2121R7TZTHaLWx6SpMsbpECnzcjh4vc18DAK1o0Rb92kUlSZxnnPsGdGBBrGChja6kpdRO4cxzFMt+v9hRaZffp/PAd4rK4eNGC21yMM1XGAS3WvTvhOc0IpzmGLEzowUtijzTv6JgSclUlZbITZKLpwTMSh5sWZ5C2wqJYA==","ARC-Message-Signature":"i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=9qsKTBibZzXXylyiDuBsZmSMi0IeJYoxLG+h6Z/Qysw=;\n b=FTK0l9zZfyTHhTf9hgVCnFmLZ34w9J+J9XTdgNSBEXw6l+dn+njERPhSIy2Ed9vHdZ4JtMvVnnJ1bJIl6lPkjqY01BP2ZGMuIFT58dMCBaEWPmpxTx4lkVusoUVyDwv5KTcPRRJMU0O/Hf/x1u+5fAeQUFT1iZJdndgFjbsSeyQD+0iwKWK39Cri4/N3KxsqXwBv8sCvBtsTncTpTsv/00UTgicgzpXgy+w8xrxEFOlGXJBo9uQmaJhVVYVh5RIdKXWAZrIzBuC9iIhlYVb3lxxEE74PFndt2ez4eFHWkYJb7OT6wR+4jvxTyUK9Ro0vrczz4IAQ5rRdTc+lXiTL0w==","ARC-Authentication-Results":"i=1; mx.microsoft.com 1; spf=pass\n smtp.mailfrom=nutanix.com; dmarc=pass action=none header.from=nutanix.com;\n dkim=pass header.d=nutanix.com; arc=none","From":"Naveen Yerramneni <naveen.yerramneni@nutanix.com>","To":"dev@openvswitch.org","Date":"Mon,  6 Apr 2026 04:44:40 +0000","Message-ID":"<20260406044444.311931-1-naveen.yerramneni@nutanix.com>","X-Mailer":"git-send-email 2.43.5","X-ClientProxiedBy":"CY8PR10CA0035.namprd10.prod.outlook.com\n (2603:10b6:930:4b::20) To SJ0PR02MB8369.namprd02.prod.outlook.com\n (2603:10b6:a03:3e4::5)","MIME-Version":"1.0","X-MS-PublicTrafficType":"Email","X-MS-TrafficTypeDiagnostic":"SJ0PR02MB8369:EE_|CH0PR02MB8091:EE_","X-MS-Office365-Filtering-Correlation-Id":"260b7beb-f03b-4228-4447-08de939740c2","x-proofpoint-crosstenant":"true","X-MS-Exchange-SenderADCheck":"1","X-MS-Exchange-AntiSpam-Relay":"0","X-Microsoft-Antispam":"BCL:0;\n ARA:13230040|1800799024|376014|52116014|366016|38350700014|18002099003|56012099003;","X-Microsoft-Antispam-Message-Info":"\n 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","X-Forefront-Antispam-Report":"CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:SJ0PR02MB8369.namprd02.prod.outlook.com; PTR:; CAT:NONE;\n SFS:(13230040)(1800799024)(376014)(52116014)(366016)(38350700014)(18002099003)(56012099003);\n DIR:OUT; SFP:1102;","X-MS-Exchange-AntiSpam-MessageData-ChunkCount":"1","X-MS-Exchange-AntiSpam-MessageData-0":"\n 2i5+h7vMe1gykwtSF4575/fqANpCoOLH4CkLNDt2Zthf9yCxxqVu0UztEmRMpioTCromvu6gxQ/s4cFm0+QbWl8URjraUmvcRG24JCoMCr4rcgblXyAswiikPN8RaaYzsR2e+uxPmo9n5JnMV4ym8kN14fl6AZTNw6bvUHP4x/QMbUH90nfT5BBJR3mhdTSnG2qE4gCh8ynd/vL0I5e/yr/jsYQBT+39J5Uf49ArLyeTMJnaKxuVntmmyM/4Z2ETmWlpjnZkKSZ7Fjs0ktX/Zk3K2ynnaiU4tTLfonZogLBlQeLc4gkYzdxetxyaiJ8jKJ9CSfT2z4ISIBMAEefeJXHcJKkGSJ9Z1zha70Q6/32pDNshiH6KoIrGqCuZhITyvus5skzY8yTZc+ZcTBL26p+sZ7x3PEclmxntGS6bcTamZ56de2JKOW+ndvfJUKCGzfWRE4kckqIuKlYgXfawt3fweUL0M9YVgTr8O95NQ22yKk+E3lZgC46gXur6i7hsrL00iVlNFQz5pDNRvzzJdCBPoS5SXT9Vh1Fay7s4MIorPu5fQaOD42mFMxuDoTGFvSAn+x8H0hVW8/oOtv6jTBLotviNp77Dr5NlbFkEHO5F+NzP0r5NQjQLdUXBFbI+duRNtUj3NDeo0hjcpmvEDtjZN3xgjMP/0zRRb51Je+fb+cFszTFFVjEJJofaka7xevMs1yTe6xDg/zIjQKLeocbTVfvW1mU42nspSzyaU0iq7x+ex0VtBZghaNXLETEaxPJBVboX953TbB5SDQUvoVyCAdf95mG9hZwZxaSLr8ikXs3NwCAjWNj7ZJYYladsX2bj5+9RbwqTW15WcmZ0Jb4FbwPlJOFl068fbkb05DMJJjY5LBqnXZWzOCD8LLscKBGg2YlBsWyBZ3tvradQ9weiTCGVD6NXyUR4+IvP+yrcTtfNOwBjcg7cTXAO8G2beELhHOrTEO1GyKfW38amdGUdq1poqmVMEsNU4vJbSoTD+4uL9LFsQfYBL/oh2KPLLA7pwoqxa78gc5iHZnZ/6uYAzIzr80LZgp8VOFChaSs1PfAfzf/Asi2rLFnLaHY19t21VlWQr4OYIu6Q/+hrhjyJpRBq1aZqo4WUxzkOqZZTQ0E6iSfONauV1dps6cTaLxfnuEqGIdy6iklaTeIq0V4yfITC4d0PPVhAHFX+sqZblIhIaUe2kDtOHres306A2vGXw/CsZz9haTq7cAsFIN75QNAf2C5FNecYb9aO8la/ybpTHzTA4iuqwjTgzkLhX7UR8/EGWgz/NYXeybqO3q80C8BhuOzN4dD9H+JZz9/mVP4oGIAx4kqtxm9EyOOIanoqfd3COCfmK8UecZ12lCni0uT2ur5oWQLLVi8AlVlsz5GGBZtWIf6yUaULYvVISqyChBj+cRVhABHxDi0F0KbLQnQ2mFB83IDpg6a7sTKL5VBud9gAwb+ErxsnefbkcSx7fGEkpFg9pAcDWz6qbnW+b9sk6a25DLrCFNC8qftgyhYH3gjnQYRZS2C9l+kUpPBkw76uOR5eecYx4xKBb/k974Nt5qNYYr7rpnhE4f7On316NTB/UqOz7TBl6TmXr6CiV47WTNlD9kwniYktkiBrQvD5GqK8jLE+qchMVFuaDbessKVHP9Flxv2JEZK9NsyXnmE5MuU/3kUgApvwlkpxQaTOzYCSvGICRj42KwMP3S14daTM+75Ys5hP56btOIz+SMMLLgtwMArn/zQVIUHnnHS8EVPPP+laRl+f9dU=","X-Exchange-RoutingPolicyChecked":"\n gsHPZDknHmEBvNl1SSZogE4gpA5F5ytN+ea2ccbSGfFfmTmOz48pNbnDSdPz472bfezIKhNuSOssdzrI/D7KiLmjLPZAycJp0K5+iq1ijiDgAVS1dZ1hCafkJsjKRaSfyWUNCZhI+B1O3bi6oVa7d8c9AruXZ/+QT1EQ0EHWh3HAIIrLsURtG7oUIxchC93AkXRDOBdemn8ZJcSQ6+ba1rEabrYbbl3L4D6rUo1WTiw8RLsMnr01Yx0CRx9lDmwEDGh556iIL8PgZdwUyzXWkBlHlM0vLhELZZ5FbiMOKRpdrYUcqcU7towcRx78m+EMjvPPomHIL1Z95m/iKKh3ng==","X-OriginatorOrg":"nutanix.com","X-MS-Exchange-CrossTenant-Network-Message-Id":"\n 260b7beb-f03b-4228-4447-08de939740c2","X-MS-Exchange-CrossTenant-AuthSource":"SJ0PR02MB8369.namprd02.prod.outlook.com","X-MS-Exchange-CrossTenant-AuthAs":"Internal","X-MS-Exchange-CrossTenant-OriginalArrivalTime":"06 Apr 2026 04:44:57.1857 (UTC)","X-MS-Exchange-CrossTenant-FromEntityHeader":"Hosted","X-MS-Exchange-CrossTenant-Id":"bb047546-786f-4de1-bd75-24e5b6f79043","X-MS-Exchange-CrossTenant-MailboxType":"HOSTED","X-MS-Exchange-CrossTenant-UserPrincipalName":"\n FmvDg2pdInWM7M2oYt6wC1MwsHVwlMVbcCz0kFxsC0IE1jkoqAT8WPOPWOATqVR7x0B8GmFMWoI11/xwkDRb4Znp/OO2zbjzUZVVeskpYAA=","X-MS-Exchange-Transport-CrossTenantHeadersStamped":"CH0PR02MB8091","X-Authority-Analysis":"v=2.4 cv=IuMTsb/g c=1 sm=1 tr=0 ts=69d33a4b cx=c_pps\n a=LY2ru7gGMFScFVOHk0H8xQ==:117 a=6eWqkTHjU83fiwn7nKZWdM+Sl24=:19\n a=z/mQ4Ysz8XfWz/Q5cLBRGdckG28=:19 a=lCpzRmAYbLLaTzLvsPZ7Mbvzbb8=:19\n a=xqWC_Br6kY4A:10 a=A5OVakUREuEA:10 a=0kUYKlekyDsA:10\n a=VkNPw1HP01LnGYTKEx00:22 a=VofLwUrZ8Iiv6rRUPXIb:22 a=_-M8LpHI31CeLmyZm6wg:22\n a=4FHCHvMsF13O6Kyf-b8A:9","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDA2MDA0MiBTYWx0ZWRfX2O1ZjAVzFJw0\n 4efxLlwPV0ZGXpduKiqe90hKbCxS0zPqOgHmLvjALT5aEC8n07iaX5TuiWrfo9lk57LCxHJjeZ0\n mvHnSgg3mHBZa6svv12WFIupSAABgQOfRou6nQ/7auzV9NnGI9FOO5RkdJOY54quRaPKILsduGh\n 2E5tURiytSlo1wi2vda/eK7UjLO7y0wGrcH3E14lbncKexyd5HwoH7ILWDxe0PLXKbPYTcO/aMf\n PWOoPEZGHQPq3vnK+QwiGcfBHsw1QjKhojQx8nfgXgcS2EWY4+cWwnCayOU3a92bHjK6gEm6vw/\n 6xJ0EGBSqalWulRylF/2HTb5sE1n9ClrICdwwvH2r21X9gzWF2SPh2MS9LEKoDwoUw9MD5cNx62\n RS6iUAlp/NnobFn+aoS1G+UqIbJ9/hWZRH3N4L0iDh+Zs66uJ/wnU7XHVh+V8aMnnLXxU8zEZnr\n +dxgwIgIsu8nJZGYG7g==","X-Proofpoint-GUID":"tfoN0oZGVQkQmtPBKAaIojUoTXWKhwBb","X-Proofpoint-ORIG-GUID":"tfoN0oZGVQkQmtPBKAaIojUoTXWKhwBb","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-06_01,2026-04-03_01,2025-10-01_01","X-Proofpoint-Spam-Reason":"safe","Subject":"[ovs-dev] [PATCH OVN v2 0/4] Add support for Network Function VTAP\n mode.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"},"content":"This patch series adds vtap mode support for Network Functions in OVN.\nUnlike the existing inline mode where traffic is redirected through the\nnetwork function, vtap mode mirrors (clones) the traffic matching the ACL\nto the network function while allowing the original packet to continue to\nits destination unmodified.\n\nKey Differences from Inline Mode:\n---------------------------------\n- Traffic is mirrored, not redirected\n- Only inport is required (no outport needed)\n- Original traffic flow is unaffected\n- NF health is determined by port binding status (no health check\n  probes)\n- Fallback behaviour is always fail-open for VATP NFs\n\nNaveen Yerramneni (4):\n  ovn-nb: Network Function vtap mode schema changes\n  ovn-nbctl: Network Function vtap mode commands\n  controller: Network Function vtap mode physical flow changes\n  northd, tests: Network Function vtap mode logical flow changes\n\nV2:\n==\n  - Rebase on top of main\n\nNaveen Yerramneni (4):\n  ovn-nb: Network Function vtap mode schema changes.\n  ovn-nbctl: Network Function vtap mode commands.\n  controller: Network Function vtap mode physical flow changes.\n  northd, tests: Network Function vtap mode logical flow changes.\n\n NEWS                    |   5 +\n controller/physical.c   |  35 +++-\n northd/northd.c         | 438 +++++++++++++++++++++++++++++++++++-----\n northd/ovn-northd.8.xml | 270 +++++++++++++++----------\n ovn-nb.ovsschema        |   7 +-\n ovn-nb.xml              |  75 +++++--\n tests/ovn-nbctl.at      |  14 ++\n tests/ovn-northd.at     | 231 ++++++++++++++++++++-\n tests/ovn.at            | 372 +++++++++++++++++++++++++++++++++-\n tests/system-ovn.at     | 265 +++++++++++++++++++++++-\n utilities/ovn-nbctl.c   |  20 +-\n 11 files changed, 1530 insertions(+), 202 deletions(-)"}