[{"id":3678029,"web_url":"http://patchwork.ozlabs.org/comment/3678029/","msgid":"<20260416090556.2721250-1-robot@bytheb.org>","list_archive_url":null,"date":"2026-04-16T09:05:56","subject":"Re: [ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","submitter":{"id":74326,"url":"http://patchwork.ozlabs.org/api/people/74326/","name":"0-day Robot","email":"robot@bytheb.org"},"content":"Bleep bloop.  Greetings Alexandra Rukomoinikova, I am a robot and I have tried out your patch.\nThanks for your contribution.\n\nI encountered some error that I wasn't expecting.  See the details below.\n\n\ncheckpatch:\nERROR: Author Alexandra Rukomoinikova <ARukomoinikova@k2.cloud> needs to sign off.\nWARNING: Unexpected sign-offs from developers who are not authors or co-authors or committers: Alexandra Rukomoinikova <arukomoinikova@k2.cloud>\nLines checked: 293, Warnings: 1, Errors: 1\n\n\nPlease check this out.  If you feel there has been an error, please email aconole@redhat.com\n\nThanks,\n0-day Robot","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=bytheb-org.20251104.gappssmtp.com\n header.i=@bytheb-org.20251104.gappssmtp.com header.a=rsa-sha256\n header.s=20251104 header.b=UvkKEASd;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp4.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key,\n unprotected) header.d=bytheb-org.20251104.gappssmtp.com\n header.i=@bytheb-org.20251104.gappssmtp.com header.a=rsa-sha256\n header.s=20251104 header.b=UvkKEASd","smtp2.osuosl.org;\n dmarc=none (p=none dis=none) header.from=bytheb.org","smtp2.osuosl.org; dkim=pass (2048-bit key,\n unprotected) header.d=bytheb-org.20251104.gappssmtp.com\n header.i=@bytheb-org.20251104.gappssmtp.com header.a=rsa-sha256\n header.s=20251104 header.b=UvkKEASd"],"Received":["from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fxBvJ6qKvz1yG9\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 16 Apr 2026 19:06:04 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 646FC402D9;\n\tThu, 16 Apr 2026 09:06:03 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id rraBVuz0j7pY; Thu, 16 Apr 2026 09:06:02 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56])\n\tby smtp4.osuosl.org (Postfix) with ESMTPS id 91FF6402D1;\n\tThu, 16 Apr 2026 09:06:02 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id 65FE1C0902;\n\tThu, 16 Apr 2026 09:06:02 +0000 (UTC)","from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 893F6C0549\n for <dev@openvswitch.org>; Thu, 16 Apr 2026 09:06:01 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 7AE88401A2\n for <dev@openvswitch.org>; Thu, 16 Apr 2026 09:06:01 +0000 (UTC)","from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id bNibh9jpCaxr for <dev@openvswitch.org>;\n Thu, 16 Apr 2026 09:06:00 +0000 (UTC)","from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com\n [IPv6:2607:f8b0:4864:20::82f])\n by smtp2.osuosl.org (Postfix) with ESMTPS id B535E4018E\n for <dev@openvswitch.org>; Thu, 16 Apr 2026 09:05:59 +0000 (UTC)","by mail-qt1-x82f.google.com with SMTP id\n d75a77b69052e-50d876329bbso79421871cf.2\n for <dev@openvswitch.org>; Thu, 16 Apr 2026 02:05:59 -0700 (PDT)","from upstream-bot-ci.anl.eng.rdu2.dc.redhat.com ([66.187.232.140])\n by smtp.gmail.com with ESMTPSA id\n d75a77b69052e-50e1d860485sm30402721cf.27.2026.04.16.02.05.56\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 16 Apr 2026 02:05:57 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.9.56;\n helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp4.osuosl.org 91FF6402D1","OpenDKIM Filter v2.11.0 smtp2.osuosl.org B535E4018E"],"Received-SPF":"Pass (mailfrom) identity=mailfrom;\n client-ip=2607:f8b0:4864:20::82f; helo=mail-qt1-x82f.google.com;\n envelope-from=robot@bytheb.org; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp2.osuosl.org B535E4018E","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=bytheb-org.20251104.gappssmtp.com; s=20251104; t=1776330358; x=1776935158;\n darn=openvswitch.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=zTZB38NuZ6BEC7uDrCpv/HZqnDnUc6ZaunW8eYXgleU=;\n b=UvkKEASduD4CMmwF+f8XnlUbpd5GwL8pxcVWgaclI2inktMcGSDUa2HoCnaJbTdYcE\n 2SV5+dpaFr7wO1s4pGbl5FKyHX4kWoqHqRjUEHVSVHykibhfJ4YU4hO59+UUSlKEF/zD\n sJRzOEM3HwIh2Z6/HzXesyW7eOpUd8spqqUoLQGw9+tuxLlZxHrjY9knXGMKHsfO59Jw\n wZpgthgyVkmeiWD2etflHYhgjFsPN/hqNN8Tru2Qv4pA1cm13NKc3wTyqACDYO+qen9Q\n r6o02JaLeRnsxOmVcTwZ6bWqu5t3AhdPmtyk3+4qWxrQEJzinqLcbgv9+/0UodI6DAFC\n pQ2w==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776330358; x=1776935158;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=zTZB38NuZ6BEC7uDrCpv/HZqnDnUc6ZaunW8eYXgleU=;\n b=cN44Fz4cXbD3+yThQpzUlqxdnVrvioqrV31y5EDhxUK1gz+vZA4CxGteK/qlFqWf5T\n XE1yw5NQ8OARf/EXapA2CjzDWEdmcZQFcCYoKBRXZT6NAet3RDGF2ODWAnsk18Y1uMr8\n ukyNEugwLU6VaQXahetZ5guvDJ1u2FUAmc826UPYcgH0E9PGgbN05OmYziFdCgRN/sbe\n SN/ApdfP8+l8tIkIkMMnPQXsSBhGUIDym2m/ubGEqce2q+RBOjB5y6fpurihLq8/W2r6\n VhORtwPBuJjOUfuh/50FzvehJAJIJgjdp7Afa3YlvKqqSMjsYZXZbT3tHqyNSdkXFzhI\n ccEQ==","X-Gm-Message-State":"AOJu0YzEvBbmK1nGin5VC2E1u5aLbaZKtdIHE6DK+8xFbVZWSGmOJUaf\n Q9e9D++FHfLjFxNjqCOduKL2uJtmY4/nwojuXTR1g7OKo8WUu5CRqKOUX+fKvK/JuhaJq9gyV+r\n OoxJu","X-Gm-Gg":"AeBDiesx4Nk+NDI5iAFK4nxfvHRHRvQPO7n9sJ9jlvMX0XcBAPibVmqs5ghXyU292cW\n RUK0MBdV1/3YOWfNhKrMI3SlpERMZaf+0U47Lo2MmgKG+z0bUGrWVS9nm75JBBKvcCjtiPTLzm+\n 2oIEGLR4lmcV8mxSkOWm/XmkCAmHkk/zDklwz2mDuOsW2hFGkFl6g5LjRFWoI2KFlKQUMvgHGwE\n +gJKgvpOxmiXsxRp+MO0aO+BIL01+jdYY2ytaGJBqDurMlz6hqUVeyC/axPcZtpxll75OnXZ7iM\n ybbXqcIIfDBBYHsfd1yUcK9XMJU2toZs+YTYK0FSIuG0tc2dPX8TbbDlkPQV/AvhjUJZUiHDxsQ\n G3lohDT7ZiD8i4xyL1BWFWUF7kmPnVmZCLUsSWJHCqjcfN8pc9gPXPYTazuLPLDNKsz893GC28z\n gf48C45uDTxSHTPbLOCmBgi5Mfuz1zrDLKpzCH6t4lQoWwgVyjoZg1Jmcrpnk=","X-Received":"by 2002:ac8:5714:0:b0:50b:4b3c:7554 with SMTP id\n d75a77b69052e-50dd5a989c0mr375551241cf.10.1776330358292;\n Thu, 16 Apr 2026 02:05:58 -0700 (PDT)","From":"0-day Robot <robot@bytheb.org>","To":"Alexandra Rukomoinikova <ARukomoinikova@k2.cloud>","Cc":"dev@openvswitch.org","Date":"Thu, 16 Apr 2026 05:05:56 -0400","Message-ID":"<20260416090556.2721250-1-robot@bytheb.org>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<20260416085643.32847-1-arukomoinikova@k2.cloud>","References":"<20260416085643.32847-1-arukomoinikova@k2.cloud>","MIME-Version":"1.0","Subject":"Re: [ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}},{"id":3678839,"web_url":"http://patchwork.ozlabs.org/comment/3678839/","msgid":"<aeJmRT_lXSUf-YD8@lore-desk>","list_archive_url":null,"date":"2026-04-17T16:56:37","subject":"Re: [ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","submitter":{"id":73083,"url":"http://patchwork.ozlabs.org/api/people/73083/","name":"Lorenzo Bianconi","email":"lorenzo.bianconi@redhat.com"},"content":"> Commit [1] added handling for E/W ICMPv4/v6 \"fragmentation needed\"\n> packets generated for overlay tunneled traffic. This was required\n> because the GENEVE kernel module generates ICMP \"need frag\" packets\n> when a tunneled packet exceeds the path MTU, and such packets were\n> previously dropped due to metadata needing to be swapped.\n> \n> However, it did not cover the case where similar ICMP packets\n> arrive from VTEP tunnels. Such packets are not subject to the same\n> metadata handling constraints, since they are VXLAN-encapsulated and\n> are already delivered directly to the destination VIF MAC address.\n> \n> As a result, they do not match the added for such packets rules and are\n> dropped. Exclude packets coming from VTEP tunnels from this special handling.\n> \n> [1] https://github.com/ovn-org/ovn/commit/221476a01f2670cf4eb78cd9353e709cb8a16329\n> Fixes: 221476a01f26 (\"ovn: Add tunnel PMTUD support.\")\n> Signed-off-by: Alexandra Rukomoinikova <arukomoinikova@k2.cloud>\n\nHi Alexandra,\n\nI think the patch is fine, just a couple of nits inline.\n\nAcked-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>\n\n> ---\n>  controller/encaps.c          | 29 +++++++++++-----\n>  controller/local_data.c      |  2 ++\n>  controller/local_data.h      |  1 +\n>  controller/physical.c        | 66 ++++++++++++++++++++++++------------\n>  tests/ovn-controller-vtep.at |  4 +++\n>  5 files changed, 71 insertions(+), 31 deletions(-)\n\n[...]\n\n>  /* Flow-based tunnel that consolidates multiple endpoints into a single\n> diff --git a/controller/physical.c b/controller/physical.c\n> index 228f3d171..c1401074e 100644\n> --- a/controller/physical.c\n> +++ b/controller/physical.c\n> @@ -351,31 +351,34 @@ put_flow_based_remote_port_redirect_overlay(\n>      }\n>  }\n>  \n> +/* Add handling for E/W ICMPv4/v6 packets when tunneled packets exceed\n> + * path MTU.\n> + * If packet needs to be tunneled to another node and the physical\n> + * interface used for tunneling has a lower MTU than the packet size,\n> + * or if there is a route exception with a smaller MTU, kernel\n> + * generates an ICMP \"Fragmentation Needed\" message, but the package\n> + * metadata didn't change. Such packets might have been dropped due\n> + * to required metadata modifications for returned packet.\n> + *\n> + * Mark these packets with MLF_RX_FROM_TUNNEL_BIT for further\n> + * processing. Packets received from a VTEP tunnel should be passed\n> + * through, and errors handled via the normal processing path, since\n> + * port metadata is not carried in VTEP packets in VNI.\n> + */\n>  static void\n> -add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n> -                         enum mf_field_id mff_ovn_geneve,\n> -                         struct ovn_desired_flow_table *flow_table,\n> -                         struct ofpbuf *ofpacts)\n> +add_tunnel_ingress_icmp_need_frag_flows(const struct chassis_tunnel *tun,\n> +                                        struct ofpbuf *ofpacts,\n> +                                        struct ovn_desired_flow_table *table)\n\nI guess if you keep the name flow_table here, the patch is easier to read.\n\n>  {\n> -    /* Main ingress flow (priority 100) */\n> -    struct match match = MATCH_CATCHALL_INITIALIZER;\n> -    match_set_in_port(&match, tun->ofport);\n> -\n> -    ofpbuf_clear(ofpacts);\n> -    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n> -    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n> +    if (tun->is_vtep_tunnel) {\n> +        return;\n> +    }\n>  \n> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n> -                    ofpacts, hc_uuid);\n> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n>  \n> -    /* Set allow rx from tunnel bit */\n\nWhy are you removing this comment?\n\n>      put_load(1, MFF_LOG_FLAGS, MLF_RX_FROM_TUNNEL_BIT, 1, ofpacts);\n>      put_resubmit(OFTABLE_CT_ZONE_LOOKUP, ofpacts);\n>  \n> -    /* Add specific flows for E/W ICMPv{4,6} packets if tunnelled packets\n> -     * do not fit path MTU. */\n> -\n> -    /* IPv4 ICMP flow (priority 120) */\n\nsame here.\n\n>      match_init_catchall(&match);\n>      match_set_in_port(&match, tun->ofport);\n>      match_set_dl_type(&match, htons(ETH_TYPE_IP));\n> @@ -383,10 +386,9 @@ add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>      match_set_icmp_type(&match, 3);\n>      match_set_icmp_code(&match, 4);\n>  \n> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n> +    ofctrl_add_flow(table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n>                      ofpacts, hc_uuid);\n>  \n> -    /* IPv6 ICMP flow (priority 120) */\n>      match_init_catchall(&match);\n>      match_set_in_port(&match, tun->ofport);\n>      match_set_dl_type(&match, htons(ETH_TYPE_IPV6));\n> @@ -394,10 +396,30 @@ add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>      match_set_icmp_type(&match, 2);\n>      match_set_icmp_code(&match, 0);\n>  \n> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n> +    ofctrl_add_flow(table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n>                      ofpacts, hc_uuid);\n>  }\n>  \n> +static void\n> +add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n> +                         enum mf_field_id mff_ovn_geneve,\n> +                         struct ovn_desired_flow_table *flow_table,\n> +                         struct ofpbuf *ofpacts)\n> +{\n> +    /* Main ingress flow (priority 100) */\n> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n> +    match_set_in_port(&match, tun->ofport);\n> +\n> +    ofpbuf_clear(ofpacts);\n> +    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n> +    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n> +\n> +    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n> +                    ofpacts, hc_uuid);\n> +\n> +    add_tunnel_ingress_icmp_need_frag_flows(tun, ofpacts, flow_table);\n> +}\n> +\n>  static void\n>  put_stack(enum mf_field_id field, struct ofpact_stack *stack)\n>  {\n> @@ -3943,7 +3965,7 @@ physical_run(struct physical_ctx *p_ctx,\n>      struct chassis_tunnel *tun;\n>      HMAP_FOR_EACH (tun, hmap_node, p_ctx->chassis_tunnels) {\n>          add_tunnel_ingress_flows(tun, p_ctx->mff_ovn_geneve, flow_table,\n> -                                &ofpacts);\n> +                                 &ofpacts);\n>      }\n>  \n>      /* Process packets that arrive from flow-based tunnels. */\n> diff --git a/tests/ovn-controller-vtep.at b/tests/ovn-controller-vtep.at\n> index 961324bd2..caf53e291 100644\n> --- a/tests/ovn-controller-vtep.at\n> +++ b/tests/ovn-controller-vtep.at\n> @@ -775,6 +775,10 @@ AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | grep 'priority=\n>  priority=110,tun_id=0x<>,in_port=<> actions=move:NXM_NX_TUN_ID[[0..23]]->OXM_OF_METADATA[[0..23]],load:0x<>->NXM_NX_REG14[[0..14]],load:0x<>->NXM_NX_REG10[[1]],resubmit(,OFTABLE_LOG_INGRESS_PIPELINE)\n>  ])\n>  \n> +# Skip processing ICMP \"packet too big\" errors in this table if the packet came from a VTEP tunnel.\n> +AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | \\\n> +          grep -E 'icmp_type=3,icmp_code=4|icmp_type=2,icmp_code=0'], [1], [])\n> +\n>  OVN_CONTROLLER_VTEP_STOP([], vtep1)\n>  OVN_CLEANUP([hv1])\n>  AT_CLEANUP\n> -- \n> 2.48.1\n> \n> _______________________________________________\n> dev mailing list\n> dev@openvswitch.org\n> https://mail.openvswitch.org/mailman/listinfo/ovs-dev\n>","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=X5iHc7Q/;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=Lur5FUUV;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=140.211.166.133; helo=smtp2.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp2.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=X5iHc7Q/;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=Lur5FUUV","smtp3.osuosl.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","smtp3.osuosl.org;\n dkim=pass (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=X5iHc7Q/;\n dkim=pass (2048-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=google header.b=Lur5FUUV"],"Received":["from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fy1J50F1nz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 18 Apr 2026 02:56:52 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp2.osuosl.org (Postfix) with ESMTP id 15EA440671;\n\tFri, 17 Apr 2026 16:56:50 +0000 (UTC)","from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id W6x8K2IOIqEK; Fri, 17 Apr 2026 16:56:49 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56])\n\tby smtp2.osuosl.org (Postfix) with ESMTPS id DB2884063E;\n\tFri, 17 Apr 2026 16:56:48 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id B3F83C058E;\n\tFri, 17 Apr 2026 16:56:48 +0000 (UTC)","from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists.linuxfoundation.org (Postfix) with ESMTP id C1D83C058D\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 16:56:46 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id A146960E82\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 16:56:46 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id UTuHdwQVPQ80 for <dev@openvswitch.org>;\n Fri, 17 Apr 2026 16:56:45 +0000 (UTC)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n by smtp3.osuosl.org (Postfix) with ESMTPS id 56D3860E69\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 16:56:44 +0000 (UTC)","from mail-wr1-f69.google.com (mail-wr1-f69.google.com\n [209.85.221.69]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-298-6PzCRsz3NpSO47IuvX0hxw-1; Fri, 17 Apr 2026 12:56:41 -0400","by mail-wr1-f69.google.com with SMTP id\n ffacd0b85a97d-43d121c4271so617013f8f.3\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 09:56:41 -0700 (PDT)","from localhost (net-37-119-153-93.cust.vodafonedsl.it.\n [37.119.153.93]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43fe4cb135asm6390991f8f.6.2026.04.17.09.56.38\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Fri, 17 Apr 2026 09:56:38 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.9.56;\n helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp2.osuosl.org DB2884063E","OpenDKIM Filter v2.11.0 smtp3.osuosl.org 56D3860E69"],"Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=170.10.133.124;\n helo=us-smtp-delivery-124.mimecast.com;\n envelope-from=lorenzo.bianconi@redhat.com; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp3.osuosl.org 56D3860E69","DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776445003;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n in-reply-to:in-reply-to:references:references;\n bh=dvv56peyWvPpgLsHAZ60eKjyFBBbEpIoOYkwpYH86x8=;\n b=X5iHc7Q/BsqK9Hxz+PaJKLXauS9z0TBU6bSmPy5wSaF+yZ4wOLHClXxl1L6hIPA9QVlNhP\n QDs4pbitLLP3THZAfVUB4ASdGJyK3KVC9CuY5FDBeTsQjwb6AAJ6ssl83SdjxnIzsgUSI/\n ieNYs8LhBM4cg8lnzElX9QdK37yJiWQ=","v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=redhat.com; s=google; t=1776445000; x=1777049800; darn=openvswitch.org;\n h=in-reply-to:content-disposition:mime-version:references:message-id\n :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to;\n bh=dvv56peyWvPpgLsHAZ60eKjyFBBbEpIoOYkwpYH86x8=;\n b=Lur5FUUVtse2uN9s/lCEVc6ym1gA92Jgk3VlLaeDYAcKsxIwuTeTEBbx4VTvvY/+Dh\n 6YCoRdhxnhv8N4m6OcUgk6xzyFyoyMsPQIeajisEEQIBfQo7qCOkavR34/tJ7VsXodvP\n F3wRfK3Sh/eu86NHNs540QhfIKmAVCfN/CffRaE2oJhxxhDfC59Fq40N9CQFwujUxh67\n jhGmhHm0R7KJaEuq147SyCOz51uTF86FAO79ILGXT63KE+t8o9t5BoPsb7LtSYH8ZX7e\n tNA9eTSLIxbvSGwybQtFjgOBXLz5DIChPFAeEsP1/KEk6FX1Enc+DUdRokVXGNrBEJrn\n /xPw=="],"X-MC-Unique":"6PzCRsz3NpSO47IuvX0hxw-1","X-Mimecast-MFC-AGG-ID":"6PzCRsz3NpSO47IuvX0hxw_1776445001","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776445000; x=1777049800;\n h=in-reply-to:content-disposition:mime-version:references:message-id\n :subject:cc:to:from:date:x-gm-gg:x-gm-message-state:from:to:cc\n :subject:date:message-id:reply-to;\n bh=dvv56peyWvPpgLsHAZ60eKjyFBBbEpIoOYkwpYH86x8=;\n b=PZyCQmy652/cfKaYsKGC9/6vAeCAsbCLtR4MJASCemGU0syFG83TcIDpRvxBH5JrYf\n Co4+xTMpKAJkDV8ptadOlSCjf4rPVLNS+F4QTTkfmu/fk9rKUJWuPpQteinjuA772FS/\n izYSzFRRF7FvJlCQnrrFotFfbmLYBHUdp2svODhomJQt0XAz23Sf1Q7N96QZ7YFotCZP\n u4lX8+EKGXpaLs7wHAmqEgbyvmVyWVBq8EuMo7VfG+gSvMCBgcUJNXj0+d51/hBOFs74\n +bLrDbFObDL4Z6hJE5vCSqjdzqEV9Jnbo33jLZ/8edhi1/roT4/hmjkJ81g6qf6bRYfB\n g91A==","X-Gm-Message-State":"AOJu0YzgL+ivJBx1uLl09TEOOYVYU9L4bax3zujvydKo5oGriw5TKJDW\n GqotpD7wg5twfgMwoItt4v3iFr2VV2Jm9HQfz5EZFkFWP84J7aICtNHNTsurFMQyYfh2deNeFfG\n cNqoNVkk1vzLmjXv7C+dA6umBrrsBywDaMahPdyeN4a06ZAaa2Yn4yQ==","X-Gm-Gg":"AeBDiev9/YySvGMes+MYSz56PYkMmDQb1qaO5FYqXBmfFvK18Hl2TebvFXGD1KKVom8\n Z9poFzQP+Ul8Wfd3+rJMabqHQ+Ihbexu+CF+ZywzOqJxxQjmkqaqpnsXHuMEgzJOTSZ6tfM9Iw5\n CCOXsUbzxgJSwAwoXTt23PP7XjDCNBpxj20fcQZGQ2+lCisaHt1nzJ+8DYlKvSBQRuo43hvugwl\n owo9L0hsOmkdFMOuQTk5W1N6hyeGS61DhA9rtBRJ75wZ/1mwLTGZrFLFsfn57yyQEb8MS6mBcCQ\n TAgIwYdR51i5gIm2xTcQOrubf3pjPVcRdeLGK72V2wqqSMZZrLC25/MikIhCfQIJa38h2qKIxM9\n 8aZr/jrRavuWP8DCKEKW7jdFMEhg1jGm4Zf3ibDNOhw75/jN5LCCSKZXto/fEMeMHEwxF9Ma7HI\n skAqnj","X-Received":["by 2002:a05:6000:1888:b0:43d:3088:76ab with SMTP id\n ffacd0b85a97d-43fe3da63famr5443495f8f.6.1776445000395;\n Fri, 17 Apr 2026 09:56:40 -0700 (PDT)","by 2002:a05:6000:1888:b0:43d:3088:76ab with SMTP id\n ffacd0b85a97d-43fe3da63famr5443449f8f.6.1776444999721;\n Fri, 17 Apr 2026 09:56:39 -0700 (PDT)"],"Date":"Fri, 17 Apr 2026 18:56:37 +0200","To":"Alexandra Rukomoinikova <arukomoinikova@k2.cloud>","Cc":"dev@openvswitch.org","Message-ID":"<aeJmRT_lXSUf-YD8@lore-desk>","References":"<20260416085643.32847-1-arukomoinikova@k2.cloud>","MIME-Version":"1.0","In-Reply-To":"<20260416085643.32847-1-arukomoinikova@k2.cloud>","X-Content-Filtered-By":"Mailman/MimeDel 2.1.30","Subject":"Re: [ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","From":"Lorenzo Bianconi via dev <ovs-dev@openvswitch.org>","Reply-To":"Lorenzo Bianconi <lorenzo.bianconi@redhat.com>","Content-Type":"multipart/mixed; boundary=\"===============8206915606767646235==\"","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}},{"id":3678844,"web_url":"http://patchwork.ozlabs.org/comment/3678844/","msgid":"<0c0acc1c-9a44-4c38-9f01-becb1b2b403c@k2.cloud>","list_archive_url":null,"date":"2026-04-17T17:23:13","subject":"Re: [ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","submitter":{"id":89461,"url":"http://patchwork.ozlabs.org/api/people/89461/","name":"Rukomoinikova Aleksandra","email":"ARukomoinikova@k2.cloud"},"content":"On 17.04.2026 19:56, Lorenzo Bianconi wrote:\n>> Commit [1] added handling for E/W ICMPv4/v6 \"fragmentation needed\"\n>> packets generated for overlay tunneled traffic. This was required\n>> because the GENEVE kernel module generates ICMP \"need frag\" packets\n>> when a tunneled packet exceeds the path MTU, and such packets were\n>> previously dropped due to metadata needing to be swapped.\n>>\n>> However, it did not cover the case where similar ICMP packets\n>> arrive from VTEP tunnels. Such packets are not subject to the same\n>> metadata handling constraints, since they are VXLAN-encapsulated and\n>> are already delivered directly to the destination VIF MAC address.\n>>\n>> As a result, they do not match the added for such packets rules and are\n>> dropped. Exclude packets coming from VTEP tunnels from this special handling.\n>>\n>> [1] https://github.com/ovn-org/ovn/commit/221476a01f2670cf4eb78cd9353e709cb8a16329\n>> Fixes: 221476a01f26 (\"ovn: Add tunnel PMTUD support.\")\n>> Signed-off-by: Alexandra Rukomoinikova <arukomoinikova@k2.cloud>\n> Hi Alexandra,\n>\n> I think the patch is fine, just a couple of nits inline.\n>\n> Acked-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>\nHi Lorenzo!  Thanks for the review, I will answer below\n>\n>> ---\n>>   controller/encaps.c          | 29 +++++++++++-----\n>>   controller/local_data.c      |  2 ++\n>>   controller/local_data.h      |  1 +\n>>   controller/physical.c        | 66 ++++++++++++++++++++++++------------\n>>   tests/ovn-controller-vtep.at |  4 +++\n>>   5 files changed, 71 insertions(+), 31 deletions(-)\n> [...]\n>\n>>   /* Flow-based tunnel that consolidates multiple endpoints into a single\n>> diff --git a/controller/physical.c b/controller/physical.c\n>> index 228f3d171..c1401074e 100644\n>> --- a/controller/physical.c\n>> +++ b/controller/physical.c\n>> @@ -351,31 +351,34 @@ put_flow_based_remote_port_redirect_overlay(\n>>       }\n>>   }\n>>   \n>> +/* Add handling for E/W ICMPv4/v6 packets when tunneled packets exceed\n>> + * path MTU.\n>> + * If packet needs to be tunneled to another node and the physical\n>> + * interface used for tunneling has a lower MTU than the packet size,\n>> + * or if there is a route exception with a smaller MTU, kernel\n>> + * generates an ICMP \"Fragmentation Needed\" message, but the package\n>> + * metadata didn't change. Such packets might have been dropped due\n>> + * to required metadata modifications for returned packet.\n>> + *\n>> + * Mark these packets with MLF_RX_FROM_TUNNEL_BIT for further\n>> + * processing. Packets received from a VTEP tunnel should be passed\n>> + * through, and errors handled via the normal processing path, since\n>> + * port metadata is not carried in VTEP packets in VNI.\n>> + */\n>>   static void\n>> -add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>> -                         enum mf_field_id mff_ovn_geneve,\n>> -                         struct ovn_desired_flow_table *flow_table,\n>> -                         struct ofpbuf *ofpacts)\n>> +add_tunnel_ingress_icmp_need_frag_flows(const struct chassis_tunnel *tun,\n>> +                                        struct ofpbuf *ofpacts,\n>> +                                        struct ovn_desired_flow_table *table)\n> I guess if you keep the name flow_table here, the patch is easier to read.\nack\n>\n>>   {\n>> -    /* Main ingress flow (priority 100) */\n>> -    struct match match = MATCH_CATCHALL_INITIALIZER;\n>> -    match_set_in_port(&match, tun->ofport);\n>> -\n>> -    ofpbuf_clear(ofpacts);\n>> -    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n>> -    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n>> +    if (tun->is_vtep_tunnel) {\n>> +        return;\n>> +    }\n>>   \n>> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n>> -                    ofpacts, hc_uuid);\n>> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n>>   \n>> -    /* Set allow rx from tunnel bit */\n> Why are you removing this comment?\nHonestly, I don't think these comments provide any useful information. \nfunctions below clearly show priority, packet code types, and the \nprotocol — so I removed them. I wrote about installed register in the \ndoc string above. If you think they should be restored, I will.\n>\n>>       put_load(1, MFF_LOG_FLAGS, MLF_RX_FROM_TUNNEL_BIT, 1, ofpacts);\n>>       put_resubmit(OFTABLE_CT_ZONE_LOOKUP, ofpacts);\n>>   \n>> -    /* Add specific flows for E/W ICMPv{4,6} packets if tunnelled packets\n>> -     * do not fit path MTU. */\n>> -\n>> -    /* IPv4 ICMP flow (priority 120) */\n> same here.\n>\n>>       match_init_catchall(&match);\n>>       match_set_in_port(&match, tun->ofport);\n>>       match_set_dl_type(&match, htons(ETH_TYPE_IP));\n>> @@ -383,10 +386,9 @@ add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>>       match_set_icmp_type(&match, 3);\n>>       match_set_icmp_code(&match, 4);\n>>   \n>> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n>> +    ofctrl_add_flow(table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n>>                       ofpacts, hc_uuid);\n>>   \n>> -    /* IPv6 ICMP flow (priority 120) */\n>>       match_init_catchall(&match);\n>>       match_set_in_port(&match, tun->ofport);\n>>       match_set_dl_type(&match, htons(ETH_TYPE_IPV6));\n>> @@ -394,10 +396,30 @@ add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>>       match_set_icmp_type(&match, 2);\n>>       match_set_icmp_code(&match, 0);\n>>   \n>> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n>> +    ofctrl_add_flow(table, OFTABLE_PHY_TO_LOG, 120, 0, &match,\n>>                       ofpacts, hc_uuid);\n>>   }\n>>   \n>> +static void\n>> +add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>> +                         enum mf_field_id mff_ovn_geneve,\n>> +                         struct ovn_desired_flow_table *flow_table,\n>> +                         struct ofpbuf *ofpacts)\n>> +{\n>> +    /* Main ingress flow (priority 100) */\n>> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n>> +    match_set_in_port(&match, tun->ofport);\n>> +\n>> +    ofpbuf_clear(ofpacts);\n>> +    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n>> +    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n>> +\n>> +    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n>> +                    ofpacts, hc_uuid);\n>> +\n>> +    add_tunnel_ingress_icmp_need_frag_flows(tun, ofpacts, flow_table);\n>> +}\n>> +\n>>   static void\n>>   put_stack(enum mf_field_id field, struct ofpact_stack *stack)\n>>   {\n>> @@ -3943,7 +3965,7 @@ physical_run(struct physical_ctx *p_ctx,\n>>       struct chassis_tunnel *tun;\n>>       HMAP_FOR_EACH (tun, hmap_node, p_ctx->chassis_tunnels) {\n>>           add_tunnel_ingress_flows(tun, p_ctx->mff_ovn_geneve, flow_table,\n>> -                                &ofpacts);\n>> +                                 &ofpacts);\n>>       }\n>>   \n>>       /* Process packets that arrive from flow-based tunnels. */\n>> diff --git a/tests/ovn-controller-vtep.at b/tests/ovn-controller-vtep.at\n>> index 961324bd2..caf53e291 100644\n>> --- a/tests/ovn-controller-vtep.at\n>> +++ b/tests/ovn-controller-vtep.at\n>> @@ -775,6 +775,10 @@ AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | grep 'priority=\n>>   priority=110,tun_id=0x<>,in_port=<> actions=move:NXM_NX_TUN_ID[[0..23]]->OXM_OF_METADATA[[0..23]],load:0x<>->NXM_NX_REG14[[0..14]],load:0x<>->NXM_NX_REG10[[1]],resubmit(,OFTABLE_LOG_INGRESS_PIPELINE)\n>>   ])\n>>   \n>> +# Skip processing ICMP \"packet too big\" errors in this table if the packet came from a VTEP tunnel.\n>> +AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | \\\n>> +          grep -E 'icmp_type=3,icmp_code=4|icmp_type=2,icmp_code=0'], [1], [])\n>> +\n>>   OVN_CONTROLLER_VTEP_STOP([], vtep1)\n>>   OVN_CLEANUP([hv1])\n>>   AT_CLEANUP\n>> -- \n>> 2.48.1\n>>\n>> _______________________________________________\n>> dev mailing list\n>> dev@openvswitch.org\n>> https://mail.openvswitch.org/mailman/listinfo/ovs-dev\n>>","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=k2.cloud header.i=@k2.cloud header.a=rsa-sha256\n header.s=mail header.b=eNFzz7Y4;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::136; helo=smtp3.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp3.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key)\n header.d=k2.cloud header.i=@k2.cloud header.a=rsa-sha256 header.s=mail\n header.b=eNFzz7Y4","smtp3.osuosl.org; dmarc=pass (p=quarantine dis=none)\n header.from=k2.cloud"],"Received":["from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fy1tq4bDjz1yD3\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 18 Apr 2026 03:23:29 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id 783B060ECC;\n\tFri, 17 Apr 2026 17:23:22 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 7Juwd0hBRs5X; Fri, 17 Apr 2026 17:23:21 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org\n [IPv6:2605:bc80:3010:104::8cd3:938])\n\tby smtp3.osuosl.org (Postfix) with ESMTPS id 440C960EC7;\n\tFri, 17 Apr 2026 17:23:21 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id EE46FC058E;\n\tFri, 17 Apr 2026 17:23:20 +0000 (UTC)","from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 79E33C058D\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 17:23:19 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 6477060EC8\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 17:23:19 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id RDVPKn2Zd_kF for <dev@openvswitch.org>;\n Fri, 17 Apr 2026 17:23:18 +0000 (UTC)","from ksmg2.croc.ru (ksmg2.croc.ru [195.38.23.102])\n by smtp3.osuosl.org (Postfix) with ESMTPS id 8443360EC7\n for <dev@openvswitch.org>; Fri, 17 Apr 2026 17:23:16 +0000 (UTC)","from ksmg2 (localhost [127.0.0.1])\n by ksmg2.croc.ru (Postfix) with ESMTP id 534B41E0030;\n Fri, 17 Apr 2026 20:23:14 +0300 (MSK)","from MXONE (unknown [195.38.23.35])\n by ksmg2.croc.ru (Postfix) with ESMTP;\n Fri, 17 Apr 2026 20:23:14 +0300 (MSK)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections -\n client-ip=2605:bc80:3010:104::8cd3:938; helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp3.osuosl.org 440C960EC7","OpenDKIM Filter v2.11.0 smtp3.osuosl.org 8443360EC7","OpenDKIM Filter v2.11.0 ksmg2.croc.ru 534B41E0030"],"Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=195.38.23.102;\n helo=ksmg2.croc.ru; envelope-from=arukomoinikova@k2.cloud;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp3.osuosl.org 8443360EC7","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=k2.cloud; s=mail;\n t=1776446594; bh=aHB1vCUWa5OQZckdwetKNzQkOk78P/Em9Ne31qyXi+U=;\n h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version:From;\n b=eNFzz7Y4jEMV2mP2Aqzr9GEmTSJErJN9rq+nCT/aReP34dl7H8hjSRQKYf7oF4kyV\n FGAW/qKc7kdY5LZuXaoVofWsBspkEJmP1ZHO77bTRFWwd+1/QQwnwX0K5r3zyI7RM2\n bIILMnzSVTNzDyGWmsZ/z0cL8E1OMlW1g9hbusmTZVAqy/FTyec8ug+0B/tkbTmc0M\n G8irF4dUyMYf+vXArv2ezSRpnJAEWCDENIfOdGMfuVGu8MSsid3CXGJzl8GwEg0U3A\n k68zucCrFvwacfq85UcdU43oe1n3TUy5+pmofY4zyvuVEatjLQ9zmPR0Q1p8ZAnk4o\n qLUMVAMKYVnzA==","To":"Lorenzo Bianconi <lorenzo.bianconi@redhat.com>, Rukomoinikova Aleksandra\n <ARukomoinikova@k2.cloud>","CC":"\"dev@openvswitch.org\" <dev@openvswitch.org>","Thread-Topic":"[ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","Thread-Index":"AQHczX7zWc4GjClJJ0mXemi7Hxx46LXjSQaAgAAHboA=","Date":"Fri, 17 Apr 2026 17:23:13 +0000","Message-ID":"<0c0acc1c-9a44-4c38-9f01-becb1b2b403c@k2.cloud>","References":"<20260416085643.32847-1-arukomoinikova@k2.cloud>\n <aeJmRT_lXSUf-YD8@lore-desk>","In-Reply-To":"<aeJmRT_lXSUf-YD8@lore-desk>","Accept-Language":"en-US","Content-Language":"en-US","X-MS-Has-Attach":"","X-MS-TNEF-Correlator":"","dlp-except":"1","Content-ID":"<0D42AFAA1DFA5F4F8E916EBAA26A4AD1@croc.ru>","MIME-Version":"1.0","X-SEG-SpamProfiler-Score":"-1","X-KSMG-Rule-ID":"4","X-KSMG-Message-Action":"skipped","X-KSMG-AntiSpam-Status":"not scanned, allowlist","X-KSMG-AntiPhishing":"not scanned, allowlist","X-KSMG-LinksScanning":"not scanned, allowlist","X-KSMG-AntiVirus":"Kaspersky Secure Mail Gateway, version 2.0.1.6960,\n not scanned, allowlist","Subject":"Re: [ovs-dev] [PATCH ovn] controller: Exclude ICMP frag-needed from\n VTEP tunnels.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","From":"Rukomoinikova Aleksandra via dev <ovs-dev@openvswitch.org>","Reply-To":"Rukomoinikova Aleksandra <ARukomoinikova@k2.cloud>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}}]