<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Kconfig</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>b261d222 - lib/crc: remove CONFIG_LIBCRC32C</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#b261d222</link>
        <description>lib/crc: remove CONFIG_LIBCRC32CNow that LIBCRC32C does nothing besides select CRC32, make every optionthat selects LIBCRC32C instead select CRC32 directly.  Then removeLIBCRC32C.Reviewed-by: Christoph Hellwig &lt;hch@lst.de&gt;Reviewed-by: &quot;Martin K. Petersen&quot; &lt;martin.petersen@oracle.com&gt;Acked-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;Link: https://lore.kernel.org/r/20250401221600.24878-8-ebiggers@kernel.orgSigned-off-by: Eric Biggers &lt;ebiggers@google.com&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Tue, 01 Apr 2025 22:16:00 +0000</pubDate>
        <dc:creator>Eric Biggers &lt;ebiggers@google.com&gt;</dc:creator>
    </item>
<item>
        <title>aae0b82b - net: openvswitch: add psample action</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#aae0b82b</link>
        <description>net: openvswitch: add psample actionAdd support for a new action: psample.This action accepts a u32 group id and a variable-length cookie and usesthe psample multicast group to make the packet available forobservability.The maximum length of the user-defined cookie is set to 16, same astc_cookie, to discourage using cookies that will not be offloadable.Reviewed-by: Michal Kubiak &lt;michal.kubiak@intel.com&gt;Reviewed-by: Aaron Conole &lt;aconole@redhat.com&gt;Reviewed-by: Ilya Maximets &lt;i.maximets@ovn.org&gt;Acked-by: Eelco Chaudron &lt;echaudro@redhat.com&gt;Signed-off-by: Adrian Moreno &lt;amorenoz@redhat.com&gt;Link: https://patch.msgid.link/20240704085710.353845-6-amorenoz@redhat.comSigned-off-by: Jakub Kicinski &lt;kuba@kernel.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Thu, 04 Jul 2024 08:56:56 +0000</pubDate>
        <dc:creator>Adrian Moreno &lt;amorenoz@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>c0c3ab63 - net: create nf_conntrack_ovs for ovs and tc use</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#c0c3ab63</link>
        <description>net: create nf_conntrack_ovs for ovs and tc useSimilar to nf_nat_ovs created by Commit ebddb1404900 (&quot;net: move thenat function to nf_nat_ovs for ovs and tc&quot;), this patch is to createnf_conntrack_ovs to get these functions shared by OVS and TC only.There are nf_ct_helper() and nf_ct_add_helper() from nf_conntrak_helperin this patch, and will be more in the following patches.Signed-off-by: Xin Long &lt;lucien.xin@gmail.com&gt;Reviewed-by: Simon Horman &lt;simon.horman@corigine.com&gt;Reviewed-by: Aaron Conole &lt;aconole@redhat.com&gt;Acked-by: Florian Westphal &lt;fw@strlen.de&gt;Signed-off-by: Jakub Kicinski &lt;kuba@kernel.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Tue, 07 Feb 2023 22:52:06 +0000</pubDate>
        <dc:creator>Xin Long &lt;lucien.xin@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>ebddb140 - net: move the nat function to nf_nat_ovs for ovs and tc</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#ebddb140</link>
        <description>net: move the nat function to nf_nat_ovs for ovs and tcThere are two nat functions are nearly the same in both OVS andTC code, (ovs_)ct_nat_execute() and ovs_ct_nat/tcf_ct_act_nat().This patch creates nf_nat_ovs.c under netfilter and moves themthere then exports nf_ct_nat() so that it can be shared by bothOVS and TC, and keeps the nat (type) check and nat flag updatein OVS and TC&apos;s own place, as these parts are different betweenOVS and TC.Note that in OVS nat function it was using skb-&gt;protocol to getthe proto as it already skips vlans in key_extract(), while itdoesn&apos;t in TC, and TC has to call skb_protocol() to get proto.So in nf_ct_nat_execute(), we keep using skb_protocol() whichworks for both OVS and TC contrack.Signed-off-by: Xin Long &lt;lucien.xin@gmail.com&gt;Acked-by: Aaron Conole &lt;aconole@redhat.com&gt;Acked-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Thu, 08 Dec 2022 16:56:12 +0000</pubDate>
        <dc:creator>Xin Long &lt;lucien.xin@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>a7f7f624 - treewide: replace &apos;---help---&apos; in Kconfig files with &apos;help&apos;</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#a7f7f624</link>
        <description>treewide: replace &apos;---help---&apos; in Kconfig files with &apos;help&apos;Since commit 84af7a6194e4 (&quot;checkpatch: kconfig: prefer &apos;help&apos; over&apos;---help---&apos;&quot;), the number of &apos;---help---&apos; has been graduallydecreasing, but there are still more than 2400 instances.This commit finishes the conversion. While I touched the lines,I also fixed the indentation.There are a variety of indentation styles found.  a) 4 spaces + &apos;---help---&apos;  b) 7 spaces + &apos;---help---&apos;  c) 8 spaces + &apos;---help---&apos;  d) 1 space + 1 tab + &apos;---help---&apos;  e) 1 tab + &apos;---help---&apos;    (correct indentation)  f) 1 tab + 1 space + &apos;---help---&apos;  g) 1 tab + 2 spaces + &apos;---help---&apos;In order to convert all of them to 1 tab + &apos;help&apos;, I ran thefollowing commend:  $ find . -name &apos;Kconfig*&apos; | xargs sed -i &apos;s/^[[:space:]]*---help---/\thelp/&apos;Signed-off-by: Masahiro Yamada &lt;masahiroy@kernel.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Sat, 13 Jun 2020 16:50:22 +0000</pubDate>
        <dc:creator>Masahiro Yamada &lt;masahiroy@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>ec8f24b7 - treewide: Add SPDX license identifier - Makefile/Kconfig</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#ec8f24b7</link>
        <description>treewide: Add SPDX license identifier - Makefile/KconfigAdd SPDX license identifiers to all Make/Kconfig files which: - Have no license information of any formThese files fall under the project license, GPL v2 only. The resulting SPDXlicense identifier is:  GPL-2.0-onlySigned-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Sun, 19 May 2019 12:07:45 +0000</pubDate>
        <dc:creator>Thomas Gleixner &lt;tglx@linutronix.de&gt;</dc:creator>
    </item>
<item>
        <title>3bf195ae - netfilter: nat: merge nf_nat_ipv4,6 into nat core</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#3bf195ae</link>
        <description>netfilter: nat: merge nf_nat_ipv4,6 into nat corebefore:   text    data     bss     dec     hex filename  16566    1576    4136   22278    5706 nf_nat.ko   3598	    844	      0	   4442	   115a	nf_nat_ipv6.ko   3187	    844	      0	   4031	    fbf	nf_nat_ipv4.koafter:   text    data     bss     dec     hex filename  22948    1612    4136   28696    7018 nf_nat.ko... with ipv4/v6 nat now provided directly via nf_nat.ko.Also changes:       ret = nf_nat_ipv4_fn(priv, skb, state);       if (ret != NF_DROP &amp;&amp; ret != NF_STOLEN &amp;&amp;into	if (ret != NF_ACCEPT)		return ret;everywhere.The nat hooks never should return anything other thanACCEPT or DROP (and the latter only in rare error cases).The original code uses multi-line ANDing including assignment-in-if:        if (ret != NF_DROP &amp;&amp; ret != NF_STOLEN &amp;&amp;           !(IPCB(skb)-&gt;flags &amp; IPSKB_XFRM_TRANSFORMED) &amp;&amp;            (ct = nf_ct_get(skb, &amp;ctinfo)) != NULL) {I removed this while moving, breaking those in separate conditionalsand moving the assignments into extra lines.checkpatch still generates some warnings: 1. Overly long lines (of moved code).    Breaking them is even more ugly. so I kept this as-is. 2. use of extern function declarations in a .c file.    This is necessary evil, we must call    nf_nat_l3proto_register() from the nat core now.    All l3proto related functions are removed later in this series,    those prototypes are then removed as well.v2: keep empty nf_nat_ipv6_csum_update stub for CONFIG_IPV6=n case.v3: remove IS_ENABLED(NF_NAT_IPV4/6) tests, NF_NAT_IPVx toggles    are removed here.v4: also get rid of the assignments in conditionals.Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Tue, 19 Feb 2019 16:38:21 +0000</pubDate>
        <dc:creator>Florian Westphal &lt;fw@strlen.de&gt;</dc:creator>
    </item>
<item>
        <title>11efd5cb - openvswitch: Support conntrack zone limit</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#11efd5cb</link>
        <description>openvswitch: Support conntrack zone limitCurrently, nf_conntrack_max is used to limit the maximum number ofconntrack entries in the conntrack table for every network namespace.For the VMs and containers that reside in the same namespace,they share the same conntrack table, and the total # of conntrack entriesfor all the VMs and containers are limited by nf_conntrack_max.  In thiscase, if one of the VM/container abuses the usage the conntrack entries,it blocks the others from committing valid conntrack entries into theconntrack table.  Even if we can possibly put the VM in different networknamespace, the current nf_conntrack_max configuration is kind of rigidthat we cannot limit different VM/container to have different # conntrackentries.To address the aforementioned issue, this patch proposes to have afine-grained mechanism that could further limit the # of conntrack entriesper-zone.  For example, we can designate different zone to different VM,and set conntrack limit to each zone.  By providing this isolation, amis-behaved VM only consumes the conntrack entries in its own zone, andit will not influence other well-behaved VMs.  Moreover, the users canset various conntrack limit to different zone based on their preference.The proposed implementation utilizes Netfilter&apos;s nf_conncount backendto count the number of connections in a particular zone.  If the number ofconnection is above a configured limitation, ovs will return ENOMEM to theuserspace.  If userspace does not configure the zone limit, the limitdefaults to zero that is no limitation, which is backward compatible tothe behavior without this patch.The following high leve APIs are provided to the userspace:  - OVS_CT_LIMIT_CMD_SET:    * set default connection limit for all zones    * set the connection limit for a particular zone  - OVS_CT_LIMIT_CMD_DEL:    * remove the connection limit for a particular zone  - OVS_CT_LIMIT_CMD_GET:    * get the default connection limit for all zones    * get the connection limit for a particular zoneSigned-off-by: Yi-Hung Wei &lt;yihung.wei@gmail.com&gt;Acked-by: Pravin B Shelar &lt;pshelar@ovn.org&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Fri, 25 May 2018 00:56:43 +0000</pubDate>
        <dc:creator>Yi-Hung Wei &lt;yihung.wei@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>b2d0f5d5 - openvswitch: enable NSH support</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#b2d0f5d5</link>
        <description>openvswitch: enable NSH supportv16-&gt;17 - Fixed disputed check code: keep them in nsh_push and nsh_pop   but also add them in __ovs_nla_copy_actionsv15-&gt;v16 - Add csum recalculation for nsh_push, nsh_pop and set_nsh   pointed out by Pravin - Move nsh key into the union with ipv4 and ipv6 and add   check for nsh key in match_validate pointed out by Pravin - Add nsh check in validate_set and __ovs_nla_copy_actionsv14-&gt;v15 - Check size in nsh_hdr_from_nlattr - Fixed four small issues pointed out By Jiri and Ericv13-&gt;v14 - Rename skb_push_nsh to nsh_push per Dave&apos;s comment - Rename skb_pop_nsh to nsh_pop per Dave&apos;s commentv12-&gt;v13 - Fix NSH header length check in set_nshv11-&gt;v12 - Fix missing changes old comments pointed out - Fix new comments for v11v10-&gt;v11 - Fix the left three disputable comments for v9   but not fixed in v10.v9-&gt;v10 - Change struct ovs_key_nsh to       struct ovs_nsh_key_base base;       __be32 context[NSH_MD1_CONTEXT_SIZE]; - Fix new comments for v9v8-&gt;v9 - Fix build error reported by daily intel build   because nsh module isn&apos;t selected by openvswitchv7-&gt;v8 - Rework nested value and mask for OVS_KEY_ATTR_NSH - Change pop_nsh to adapt to nsh kernel module - Fix many issues per comments from Jiri Bencv6-&gt;v7 - Remove NSH GSO patches in v6 because Jiri Benc   reworked it as another patch series and they have   been merged. - Change it to adapt to nsh kernel module added by NSH   GSO patch seriesv5-&gt;v6 - Fix the rest comments for v4. - Add NSH GSO support for VxLAN-gpe + NSH and   Eth + NSH.v4-&gt;v5 - Fix many comments by Jiri Benc and Eric Garver   for v4.v3-&gt;v4 - Add new NSH match field ttl - Update NSH header to the latest format   which will be final format and won&apos;t change   per its author&apos;s confirmation. - Fix comments for v3.v2-&gt;v3 - Change OVS_KEY_ATTR_NSH to nested key to handle   length-fixed attributes and length-variable   attriubte more flexibly. - Remove struct ovs_action_push_nsh completely - Add code to handle nested attribute for SET_MASKED - Change PUSH_NSH to use the nested OVS_KEY_ATTR_NSH   to transfer NSH header data. - Fix comments and coding style issues by Jiri and Ericv1-&gt;v2 - Change encap_nsh and decap_nsh to push_nsh and pop_nsh - Dynamically allocate struct ovs_action_push_nsh for   length-variable metadata.OVS master and 2.8 branch has merged NSH userspacepatch series, this patch is to enable NSH supportin kernel data path in order that OVS can supportNSH in compat mode by porting this.Signed-off-by: Yi Yang &lt;yi.y.yang@intel.com&gt;Acked-by: Jiri Benc &lt;jbenc@redhat.com&gt;Acked-by: Eric Garver &lt;e@erig.me&gt;Acked-by: Pravin Shelar &lt;pshelar@ovn.org&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Tue, 07 Nov 2017 13:07:02 +0000</pubDate>
        <dc:creator>Yi Yang &lt;yi.y.yang@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>99b7248e - openvswitch: call only into reachable nf-nat code</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#99b7248e</link>
        <description>openvswitch: call only into reachable nf-nat codeThe openvswitch code has gained support for calling into thenf-nat-ipv4/ipv6 modules, however those can be loadable modulesin a configuration in which openvswitch is built-in, leadingto link errors:net/built-in.o: In function `__ovs_ct_lookup&apos;::(.text+0x2cc2c8): undefined reference to `nf_nat_icmp_reply_translation&apos;:(.text+0x2cc66c): undefined reference to `nf_nat_icmpv6_reply_translation&apos;The dependency on (!NF_NAT || NF_NAT) prevents similar issues,but NF_NAT is set to &apos;y&apos; if any of the symbols selectingit are built-in, but the link error happens when any of themare modular.A second issue is that even if CONFIG_NF_NAT_IPV6 is built-in,CONFIG_NF_NAT_IPV4 might be completely disabled. This is unlikelyto be useful in practice, but the driver currently only handlesIPv6 being optional.This patch improves the Kconfig dependency so that openvswitchcannot be built-in if either of the two other symbols are setto &apos;m&apos;, and it replaces the incorrect #ifdef in ovs_ct_nat_execute()with two &quot;if (IS_ENABLED())&quot; checks that should catch all cornercases also make the code more readable.The same #ifdef exists ovs_ct_nat_to_attr(), where it does notcause a link error, but for consistency I&apos;m changing it the sameway.Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Fixes: 05752523e565 (&quot;openvswitch: Interface with NAT.&quot;)Acked-by: Joe Stringer &lt;joe@ovn.org&gt;Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Fri, 18 Mar 2016 13:33:45 +0000</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>05752523 - openvswitch: Interface with NAT.</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#05752523</link>
        <description>openvswitch: Interface with NAT.Extend OVS conntrack interface to cover NAT.  New nestedOVS_CT_ATTR_NAT attribute may be used to include NAT with a CT action.A bare OVS_CT_ATTR_NAT only mangles existing and expected connections.If OVS_NAT_ATTR_SRC or OVS_NAT_ATTR_DST is included within the nestedattributes, new (non-committed/non-confirmed) connections are mangledaccording to the rest of the nested attributes.The corresponding OVS userspace patch series includes test cases (intests/system-traffic.at) that also serve as example uses.This work extends on a branch by Thomas Graf athttps://github.com/tgraf/ovs/tree/nat.Signed-off-by: Jarno Rajahalme &lt;jarno@ovn.org&gt;Acked-by: Thomas Graf &lt;tgraf@suug.ch&gt;Acked-by: Joe Stringer &lt;joe@ovn.org&gt;Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Thu, 10 Mar 2016 18:54:23 +0000</pubDate>
        <dc:creator>Jarno Rajahalme &lt;jarno@ovn.org&gt;</dc:creator>
    </item>
<item>
        <title>d71785ff - net: add dst_cache to ovs vxlan lwtunnel</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#d71785ff</link>
        <description>net: add dst_cache to ovs vxlan lwtunnelIn case of UDP traffic with datagram lengthbelow MTU this give about 2% performance increasewhen tunneling over ipv4 and about 60% when tunnelingover ipv6Signed-off-by: Paolo Abeni &lt;pabeni@redhat.com&gt;Suggested-and-acked-by: Hannes Frederic Sowa &lt;hannes@stressinduktion.org&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Fri, 12 Feb 2016 14:43:57 +0000</pubDate>
        <dc:creator>Paolo Abeni &lt;pabeni@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>38c089d1 - openvswitch: Fix dependency on IPv6 defrag.</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#38c089d1</link>
        <description>openvswitch: Fix dependency on IPv6 defrag.When NF_CONNTRACK is built-in, NF_DEFRAG_IPV6 is a module, andOPENVSWITCH is built-in, the following build error would occur:net/built-in.o: In function `ovs_ct_execute&apos;:(.text+0x10f587): undefined reference to `nf_ct_frag6_gather&apos;Fixes: 7f8a436eaa2c (&quot;openvswitch: Add conntrack action&quot;)Reported-by: Jim Davis &lt;jim.epost@gmail.com&gt;Signed-off-by: Joe Stringer &lt;joestringer@nicira.com&gt;Acked-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Fri, 11 Sep 2015 22:01:16 +0000</pubDate>
        <dc:creator>Joe Stringer &lt;joestringer@nicira.com&gt;</dc:creator>
    </item>
<item>
        <title>f88f69dd - openvswitch: Remove conntrack Kconfig option.</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#f88f69dd</link>
        <description>openvswitch: Remove conntrack Kconfig option.There&apos;s no particular desire to have conntrack action support in OpenvSwitch as an independently configurable bit, rather just to ensurethere is not a hard dependency. This exposed option doesn&apos;t accuratelyreflect the conntrack dependency when enabled, so simplify this byremoving the option. Compile the support if NF_CONNTRACK is enabled.Fixes: 7f8a436eaa2c (&quot;openvswitch: Add conntrack action&quot;)Signed-off-by: Joe Stringer &lt;joestringer@nicira.com&gt;Acked-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Fri, 04 Sep 2015 20:07:40 +0000</pubDate>
        <dc:creator>Joe Stringer &lt;joestringer@nicira.com&gt;</dc:creator>
    </item>
<item>
        <title>6b001e68 - openvswitch: Use Geneve device.</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#6b001e68</link>
        <description>openvswitch: Use Geneve device.With help of tunnel metadata mode OVS can directly useGeneve devices to implement Geneve tunnels.This patch removes all of the OVS specific Geneve codeand make OVS use a Geneve net_device. Basic geneve vportis still there to handle compatibility with currentuserspace application.Signed-off-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Reviewed-by: Jesse Gross &lt;jesse@nicira.com&gt;Acked-by: Thomas Graf &lt;tgraf@suug.ch&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Thu, 27 Aug 2015 06:46:53 +0000</pubDate>
        <dc:creator>Pravin B Shelar &lt;pshelar@nicira.com&gt;</dc:creator>
    </item>
<item>
        <title>7f8a436e - openvswitch: Add conntrack action</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#7f8a436e</link>
        <description>openvswitch: Add conntrack actionExpose the kernel connection tracker via OVS. Userspace components canmake use of the CT action to populate the connection state (ct_state)field for a flow. This state can be subsequently matched.Exposed connection states are OVS_CS_F_*:- NEW (0x01) - Beginning of a new connection.- ESTABLISHED (0x02) - Part of an existing connection.- RELATED (0x04) - Related to an established connection.- INVALID (0x20) - Could not track the connection for this packet.- REPLY_DIR (0x40) - This packet is in the reply direction for the flow.- TRACKED (0x80) - This packet has been sent through conntrack.When the CT action is executed by itself, it will send the packetthrough the connection tracker and populate the ct_state field with oneor more of the connection state flags above. The CT action will alwaysset the TRACKED bit.When the COMMIT flag is passed to the conntrack action, this specifiesthat information about the connection should be stored. This allowssubsequent packets for the same (or related) connections to becorrelated with this connection. Sending subsequent packets for theconnection through conntrack allows the connection tracker to considerthe packets as ESTABLISHED, RELATED, and/or REPLY_DIR.The CT action may optionally take a zone to track the flow within. Thisallows connections with the same 5-tuple to be kept logically separatefrom connections in other zones. If the zone is specified, then the&quot;ct_zone&quot; match field will be subsequently populated with the zone id.IP fragments are handled by transparently assembling them as part of theCT action. The maximum received unit (MRU) size is tracked so thatrefragmentation can occur during output.IP frag handling contributed by Andy Zhou.Based on original design by Justin Pettit.Signed-off-by: Joe Stringer &lt;joestringer@nicira.com&gt;Signed-off-by: Justin Pettit &lt;jpettit@nicira.com&gt;Signed-off-by: Andy Zhou &lt;azhou@nicira.com&gt;Acked-by: Thomas Graf &lt;tgraf@suug.ch&gt;Acked-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Wed, 26 Aug 2015 18:31:48 +0000</pubDate>
        <dc:creator>Joe Stringer &lt;joestringer@nicira.com&gt;</dc:creator>
    </item>
<item>
        <title>b2acd1dc - openvswitch: Use regular GRE net_device instead of vport</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#b2acd1dc</link>
        <description>openvswitch: Use regular GRE net_device instead of vportUsing GRE tunnel meta data collection feature, we can implementOVS GRE vport. This patch removes all of the OVSspecific GRE code and make OVS use a ip_gre net_device.Minimal GRE vport is kept to handle compatibility withcurrent userspace application.Signed-off-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Acked-by: Thomas Graf &lt;tgraf@suug.ch&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Sat, 08 Aug 2015 06:51:47 +0000</pubDate>
        <dc:creator>Pravin B Shelar &lt;pshelar@nicira.com&gt;</dc:creator>
    </item>
<item>
        <title>dcc38c03 - openvswitch: Re-add CONFIG_OPENVSWITCH_VXLAN</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#dcc38c03</link>
        <description>openvswitch: Re-add CONFIG_OPENVSWITCH_VXLANThis readds the config option CONFIG_OPENVSWITCH_VXLAN to avoid ahard dependency of OVS on VXLAN. It moves the VXLAN config compatcode to vport-vxlan.c and allows compliation as a module.Fixes: 614732eaa12d (&quot;openvswitch: Use regular VXLAN net_device device&quot;)Fixes: 2661371ace96 (&quot;openvswitch: fix compilation when vxlan is a module&quot;)Cc: Pravin B Shelar &lt;pshelar@nicira.com&gt;Cc: Nicolas Dichtel &lt;nicolas.dichtel@6wind.com&gt;Signed-off-by: Thomas Graf &lt;tgraf@suug.ch&gt;Acked-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Wed, 29 Jul 2015 11:52:06 +0000</pubDate>
        <dc:creator>Thomas Graf &lt;tgraf@suug.ch&gt;</dc:creator>
    </item>
<item>
        <title>2661371a - openvswitch: fix compilation when vxlan is a module</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#2661371a</link>
        <description>openvswitch: fix compilation when vxlan is a moduleWith CONFIG_VXLAN=m and CONFIG_OPENVSWITCH=y, there was the followingcompilation error:  LD      init/built-in.o  net/built-in.o: In function `vxlan_tnl_create&apos;:  .../net/openvswitch/vport-netdev.c:322: undefined reference to `vxlan_dev_create&apos;  make: *** [vmlinux] Error 1CC: Thomas Graf &lt;tgraf@suug.ch&gt;Fixes: 614732eaa12d (&quot;openvswitch: Use regular VXLAN net_device device&quot;)Signed-off-by: Nicolas Dichtel &lt;nicolas.dichtel@6wind.com&gt;Acked-by: Thomas Graf &lt;tgraf@suug.ch&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Thu, 23 Jul 2015 09:29:07 +0000</pubDate>
        <dc:creator>Nicolas Dichtel &lt;nicolas.dichtel@6wind.com&gt;</dc:creator>
    </item>
<item>
        <title>614732ea - openvswitch: Use regular VXLAN net_device device</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/net/openvswitch/Kconfig#614732ea</link>
        <description>openvswitch: Use regular VXLAN net_device deviceThis gets rid of all OVS specific VXLAN code in the receive andtransmit path by using a VXLAN net_device to represent the vport.Only a small shim layer remains which takes care of handling theVXLAN specific OVS Netlink configuration.Unexports vxlan_sock_add(), vxlan_sock_release(), vxlan_xmit_skb()since they are no longer needed.Signed-off-by: Thomas Graf &lt;tgraf@suug.ch&gt;Signed-off-by: Pravin B Shelar &lt;pshelar@nicira.com&gt;Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;

            List of files:
            /linux-6.15/net/openvswitch/Kconfig</description>
        <pubDate>Tue, 21 Jul 2015 08:44:06 +0000</pubDate>
        <dc:creator>Thomas Graf &lt;tgraf@suug.ch&gt;</dc:creator>
    </item>
</channel>
</rss>
