[{"id":3679360,"web_url":"http://patchwork.ozlabs.org/comment/3679360/","msgid":"<20260420110547.3586535-1-robot@bytheb.org>","list_archive_url":null,"date":"2026-04-20T11:05:47","subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","submitter":{"id":74326,"url":"http://patchwork.ozlabs.org/api/people/74326/","name":"0-day Robot","email":"robot@bytheb.org"},"content":"Bleep bloop.  Greetings Alexandra Rukomoinikova, I am a robot and I have tried out your patch.\nThanks for your contribution.\n\nI encountered some error that I wasn't expecting.  See the details below.\n\n\ncheckpatch:\nERROR: Author Alexandra Rukomoinikova <ARukomoinikova@k2.cloud> needs to sign off.\nWARNING: Unexpected sign-offs from developers who are not authors or co-authors or committers: Alexandra Rukomoinikova <arukomoinikova@k2.cloud>\nLines checked: 276, Warnings: 1, Errors: 1\n\n\nPlease check this out.  If you feel there has been an error, please email aconole@redhat.com\n\nThanks,\n0-day Robot","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=bytheb-org.20251104.gappssmtp.com\n header.i=@bytheb-org.20251104.gappssmtp.com header.a=rsa-sha256\n header.s=20251104 header.b=paAYlAsJ;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp4.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key,\n unprotected) header.d=bytheb-org.20251104.gappssmtp.com\n header.i=@bytheb-org.20251104.gappssmtp.com header.a=rsa-sha256\n header.s=20251104 header.b=paAYlAsJ","smtp2.osuosl.org;\n dmarc=none (p=none dis=none) header.from=bytheb.org","smtp2.osuosl.org; dkim=pass (2048-bit key,\n unprotected) header.d=bytheb-org.20251104.gappssmtp.com\n header.i=@bytheb-org.20251104.gappssmtp.com header.a=rsa-sha256\n header.s=20251104 header.b=paAYlAsJ"],"Received":["from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fzjMm1bN6z1yD4\n\tfor <incoming@patchwork.ozlabs.org>; Mon, 20 Apr 2026 21:05:55 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 5DA5740BB9;\n\tMon, 20 Apr 2026 11:05:54 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id IAuEd-uP5krj; Mon, 20 Apr 2026 11:05:53 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org\n [IPv6:2605:bc80:3010:104::8cd3:938])\n\tby smtp4.osuosl.org (Postfix) with ESMTPS id 759DC40BA3;\n\tMon, 20 Apr 2026 11:05:53 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id 5A413C058E;\n\tMon, 20 Apr 2026 11:05:53 +0000 (UTC)","from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133])\n by lists.linuxfoundation.org (Postfix) with ESMTP id A920BC058D\n for <dev@openvswitch.org>; Mon, 20 Apr 2026 11:05:51 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 9B18840142\n for <dev@openvswitch.org>; Mon, 20 Apr 2026 11:05:51 +0000 (UTC)","from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id CQn1UjYK6Pcc for <dev@openvswitch.org>;\n Mon, 20 Apr 2026 11:05:51 +0000 (UTC)","from mail-qk1-x731.google.com (mail-qk1-x731.google.com\n [IPv6:2607:f8b0:4864:20::731])\n by smtp2.osuosl.org (Postfix) with ESMTPS id 6DA97400A1\n for <dev@openvswitch.org>; Mon, 20 Apr 2026 11:05:50 +0000 (UTC)","by mail-qk1-x731.google.com with SMTP id\n af79cd13be357-8d560ede296so316794885a.0\n for <dev@openvswitch.org>; Mon, 20 Apr 2026 04:05:50 -0700 (PDT)","from upstream-bot-ci.anl.eng.rdu2.dc.redhat.com ([66.187.232.140])\n by smtp.gmail.com with ESMTPSA id\n af79cd13be357-8e7d8edb734sm855151085a.29.2026.04.20.04.05.48\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Mon, 20 Apr 2026 04:05:48 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections -\n client-ip=2605:bc80:3010:104::8cd3:938; helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp4.osuosl.org 759DC40BA3","OpenDKIM Filter v2.11.0 smtp2.osuosl.org 6DA97400A1"],"Received-SPF":"Pass (mailfrom) identity=mailfrom;\n client-ip=2607:f8b0:4864:20::731; helo=mail-qk1-x731.google.com;\n envelope-from=robot@bytheb.org; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp2.osuosl.org 6DA97400A1","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=bytheb-org.20251104.gappssmtp.com; s=20251104; t=1776683149; x=1777287949;\n darn=openvswitch.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=CPpr+JURt4glN8oUzaScOMmjfXH1heRFpNNzajOnnUk=;\n b=paAYlAsJhbuzHLwwOvoE8qlFlKJn9tZ+3CP014JbrMBOozq88VUC/mxpz+aSo2ov+Z\n 6HVyukIS9t/3Wg8LepB+Da2zNc1ACMD0WsscgfxMJ3h1Uk1xiazgN3m2ucjN4cfdQNDA\n cOlvfKckP6uFVbpKtE0nW6yQeQo1VLhEtJbnsIGBoccbCp7qlA08wCqlMoDmjdihKmrv\n 6akp8Nx0LyFDhNywD7V70nHQWjYguLl3xCWQt1bkynv4cFAbHcx3X3uhd3WaeB46NR1g\n Iunh2tyRQ0hl4GLcRTBLrEMvFdimSZAPX9GRVyyQbEOrWAN2Z0g/mvQ4GEnQkTRkTfVa\n uKYg==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776683149; x=1777287949;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=CPpr+JURt4glN8oUzaScOMmjfXH1heRFpNNzajOnnUk=;\n b=nG6V9fmembCjNZw9EyRZIPjkG775bWsQlaGILoRTvUrJvz5FjCf/In/1Z/xprI4K6w\n vPCMd/c97Bvljlt9yzyPJytJEof0NKQb5K+WZELYgOnNkkoEG5fpA1l9DQ2S6Stv0z6h\n IDNT0gswlQTMas8+tFuZf7EIz2Ov9fSXL+OhdFVYzBB1cqURkx5ST8f1V6htpp5Bp3+R\n oz3kw2si1A0iEuIDkVYU44x4mYRIu88vYzzvZ+4FsRpZ7ewwAOXMWfh3v/3eM210IWIF\n fLGpxgUaBa6fHl0e/OUs6twJ4Yc4IWWutUNTG+gtaOFMqy7DpS2k9Bhw3BRGv8Bg4ab9\n Q8iQ==","X-Gm-Message-State":"AOJu0YxSmbhPpoXOa901qaPZlBAjJiXBlID9Ft9rz8qsujLbNEWepIr2\n JmgmZn36BEVsXTsvrEJRqoHyTB7AUXgpF2qCMB7vHnITkoj8qY8ViHlQgmFk1LSUDy5eFTY/wOM\n YEijB","X-Gm-Gg":"AeBDies9Fr/rGCVH3hn/L8UY26MAdy4fzMyRLtehRtKAO6b10GDqsNuo+dvAZAq5P85\n enhzCCcKZLkacOgDD9LFznuoC5OKCMaQtv+5WdCo0UUcMW4OiqLTPjvQ4tRQtxRkKla3OKWUOft\n 4bxEanvu+T9IsNmnDa7cDJrZj39KXeiwb/9Pw7nOX8oMdq/MZpnXLn9pYeXeHLKMkahOeTO+jco\n lrmzMr+PbCrAM//oafWW//zGQm0Aa8YnW5mk/N9lqM3iHv/OCxcfhbX6ot4gK1q9bF0ihJm0Gt4\n xSp/9aDhxKMCBxUYZCqiQypqNineKyhqlX9jw2wQVY/vWMHuYMReYgAaG29gvmnDv/oW5EDHQKe\n 8u00/hjEn37P9PZDDov0GrVeaBwHKsYOycxuXfZtQhtP7l6BofE3Uej0tgkrzg9EBjqM+VKmLcw\n hFmOGdwz+dEmkxSRUQc1CUuW9E+8ai18MPUkZS4lNp91+IB22gm7yde5I33Xg6dBtGEe/+DA==","X-Received":"by 2002:a05:620a:19a2:b0:8eb:d38d:2030 with SMTP id\n af79cd13be357-8ebd38d2605mr201328485a.34.1776683149135;\n Mon, 20 Apr 2026 04:05:49 -0700 (PDT)","From":"0-day Robot <robot@bytheb.org>","To":"Alexandra Rukomoinikova <ARukomoinikova@k2.cloud>","Cc":"dev@openvswitch.org","Date":"Mon, 20 Apr 2026 07:05:47 -0400","Message-ID":"<20260420110547.3586535-1-robot@bytheb.org>","X-Mailer":"git-send-email 2.43.0","In-Reply-To":"<20260420105419.5583-1-arukomoinikova@k2.cloud>","References":"<20260420105419.5583-1-arukomoinikova@k2.cloud>","MIME-Version":"1.0","Subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}},{"id":3681365,"web_url":"http://patchwork.ozlabs.org/comment/3681365/","msgid":"<ba3d0eaf-eead-4979-ad2a-b96e99990888@redhat.com>","list_archive_url":null,"date":"2026-04-23T10:33:00","subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","submitter":{"id":76591,"url":"http://patchwork.ozlabs.org/api/people/76591/","name":"Dumitru Ceara","email":"dceara@redhat.com"},"content":"On 4/20/26 12:54 PM, Alexandra Rukomoinikova via dev wrote:\n> Commit [1] added handling for E/W ICMPv4/v6 \"fragmentation needed\"\n> packets generated for overlay tunneled traffic. This was required\n> because the GENEVE kernel module generates ICMP \"need frag\" packets\n> when a tunneled packet exceeds the path MTU, and such packets were\n> previously dropped due to metadata needing to be swapped.\n> \n> However, it did not cover the case where similar ICMP packets\n> arrive from VTEP tunnels. Such packets are not subject to the same\n> metadata handling constraints, since they are VXLAN-encapsulated and\n> are already delivered directly to the destination VIF MAC address.\n> \n> As a result, they do not match the added for such packets rules and are\n> dropped. Exclude packets coming from VTEP tunnels from this special handling.\n> \n> [1] https://github.com/ovn-org/ovn/commit/221476a01f2670cf4eb78cd9353e709cb8a16329\n> Fixes: 221476a01f26 (\"ovn: Add tunnel PMTUD support.\")\n> Acked-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>\n> Signed-off-by: Alexandra Rukomoinikova <arukomoinikova@k2.cloud>\n> ---\n\nHi Alexandra, Lorenzo,\n\nThanks for the patch and review!\n\n>  v1 --> v2: added ACK by\n>             rename add_tunnel_ingress_icmp_need_frag_flow func to add_tunnel_ingress_pmtud_flows\n>             fixed Lorenzo's comments\n> ---\n>  controller/encaps.c          | 29 ++++++++++++------\n>  controller/local_data.c      |  2 ++\n>  controller/local_data.h      |  1 +\n>  controller/physical.c        | 59 +++++++++++++++++++++++++-----------\n>  tests/ovn-controller-vtep.at |  4 +++\n>  5 files changed, 69 insertions(+), 26 deletions(-)\n> \n> diff --git a/controller/encaps.c b/controller/encaps.c\n> index 61f41bf3a..0f3dd5aed 100644\n> --- a/controller/encaps.c\n> +++ b/controller/encaps.c\n> @@ -44,6 +44,7 @@ encaps_register_ovs_idl(struct ovsdb_idl *ovs_idl)\n>      ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_name);\n>      ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_type);\n>      ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_options);\n> +    ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_other_config);\n>  }\n>  \n>  /* Enough context to create a new tunnel, using tunnel_add(). */\n> @@ -201,12 +202,14 @@ out:\n>  }\n>  \n>  static void\n> -tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n> -           const char *new_chassis_id, const struct sbrec_encap *encap,\n> -           const char *local_ip,\n> +tunnel_add(struct tunnel_ctx *tc,\n> +           const struct sbrec_sb_global *sbg,\n> +           const struct sbrec_chassis *chassis_rec,\n> +           const struct sbrec_encap *encap, const char *local_ip,\n>             const struct ovsrec_open_vswitch_table *ovs_table)\n>  {\n>      struct smap options = SMAP_INITIALIZER(&options);\n> +    struct smap other_config = SMAP_INITIALIZER(&other_config);\n>      smap_add(&options, \"remote_ip\", encap->ip);\n>      smap_add(&options, \"local_ip\", local_ip);\n>      smap_add(&options, \"key\", \"flow\");\n> @@ -214,6 +217,8 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>      const char *csum = smap_get(&encap->options, \"csum\");\n>      char *tunnel_entry_id = NULL;\n>      char *tunnel_entry_id_old = NULL;\n> +    bool is_vtep_tunnel = smap_get_bool(&chassis_rec->other_config,\n> +                                        \"is-vtep\", false);\n\nThis is duplicated in chassis.c (as a static function), should we unify\nall the \"is-vtep\" helpers?\n\n>  \n>      /*\n>       * Since a chassis may have multiple encap-ip, we can't just add the\n> @@ -221,9 +226,9 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>       * combination of the chassis_name and the remote and local encap-ips to\n>       * identify a specific tunnel to the remote chassis.\n>       */\n> -    tunnel_entry_id = encaps_tunnel_id_create(new_chassis_id, encap->ip,\n> +    tunnel_entry_id = encaps_tunnel_id_create(chassis_rec->name, encap->ip,\n>                                                local_ip);\n> -    tunnel_entry_id_old = encaps_tunnel_id_create_legacy(new_chassis_id,\n> +    tunnel_entry_id_old = encaps_tunnel_id_create_legacy(chassis_rec->name,\n>                                                           encap->ip);\n>      if (csum && (!strcmp(csum, \"true\") || !strcmp(csum, \"false\"))) {\n>          smap_add(&options, \"csum\", csum);\n> @@ -258,7 +263,7 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>  \n>      /* Add auth info if ipsec is enabled. */\n>      if (sbg->ipsec) {\n> -        smap_add(&options, \"remote_name\", new_chassis_id);\n> +        smap_add(&options, \"remote_name\", chassis_rec->name);\n>  \n>          /* Force NAT-T traversal via configuration */\n>          /* Two ipsec backends are supported: libreswan and strongswan */\n> @@ -276,6 +281,10 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>          }\n>      }\n>  \n> +    if (is_vtep_tunnel) {\n> +        smap_add(&other_config, \"is-vtep\", \"true\");\n> +    }\n> +\n>      /* If there's an existing tunnel record that does not need any change,\n>       * keep it.  Otherwise, create a new record (if there was an existing\n>       * record, the new record will supplant it and encaps_run() will delete\n> @@ -312,10 +321,10 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>       * its name, otherwise generate a new, unique name. */\n>      char *port_name = (tunnel\n>                         ? xstrdup(tunnel->port->name)\n> -                       : tunnel_create_name(tc, new_chassis_id));\n> +                       : tunnel_create_name(tc, chassis_rec->name));\n>      if (!port_name) {\n>          VLOG_WARN(\"Unable to allocate unique name for '%s' tunnel\",\n> -                  new_chassis_id);\n> +                  chassis_rec->name);\n>          goto exit;\n>      }\n>  \n> @@ -323,6 +332,7 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>      ovsrec_interface_set_name(iface, port_name);\n>      ovsrec_interface_set_type(iface, encap->type);\n>      ovsrec_interface_set_options(iface, &options);\n> +    ovsrec_interface_set_other_config(iface, &other_config);\n>  \n>      struct ovsrec_port *port = ovsrec_port_insert(tc->ovs_txn);\n>      ovsrec_port_set_name(port, port_name);\n> @@ -338,6 +348,7 @@ exit:\n>      free(tunnel_entry_id);\n>      free(tunnel_entry_id_old);\n>      smap_destroy(&options);\n> +    smap_destroy(&other_config);\n>  }\n>  \n>  static bool\n> @@ -403,7 +414,7 @@ chassis_tunnel_add(const struct sbrec_chassis *chassis_rec,\n>              }\n>              VLOG_DBG(\"tunnel_add: '%s', local ip: %s\", chassis_rec->name,\n>                       this_chassis->encaps[j]->ip);\n> -            tunnel_add(tc, sbg, chassis_rec->name, chassis_rec->encaps[i],\n> +            tunnel_add(tc, sbg, chassis_rec, chassis_rec->encaps[i],\n>                         this_chassis->encaps[j]->ip, ovs_table);\n>              tuncnt++;\n>          }\n> diff --git a/controller/local_data.c b/controller/local_data.c\n> index dda746d73..5f1a52771 100644\n> --- a/controller/local_data.c\n> +++ b/controller/local_data.c\n> @@ -532,6 +532,8 @@ local_nonvif_data_run(const struct ovsrec_bridge *br_int,\n>                  tun->ofport = u16_to_ofp(ofport);\n>                  tun->type = tunnel_type;\n>                  tun->is_ipv6 = ip ? addr_is_ipv6(ip) : false;\n> +                tun->is_vtep_tunnel = smap_get_bool(&iface_rec->other_config,\n> +                                                    \"is-vtep\", false);\n\nShould we have a small public helper in encaps.[ch] (where the tunnel\ninterface is actually created and this other_config value is set)?\n\n>  \n>                  free(hash_id);\n>                  free(ip);\n> diff --git a/controller/local_data.h b/controller/local_data.h\n> index 948c1a935..fdb81288c 100644\n> --- a/controller/local_data.h\n> +++ b/controller/local_data.h\n> @@ -146,6 +146,7 @@ struct chassis_tunnel {\n>      ofp_port_t ofport;\n>      enum chassis_tunnel_type type;\n>      bool is_ipv6;\n> +    bool is_vtep_tunnel;\n\nI think the terminology we agreed upon back when Ihar (in CC) added\nVXLAN support [0] (for ovn-chassis-to-ovn-chassis communication) was\n\"ramp switch\", should this be called \"is_ramp_tunnel\"?\n\n[0] https://github.com/ovn-org/ovn/commit/b07f1bc\n\n>  };\n>  \n>  /* Flow-based tunnel that consolidates multiple endpoints into a single\n> diff --git a/controller/physical.c b/controller/physical.c\n> index 228f3d171..4f1748c6e 100644\n> --- a/controller/physical.c\n> +++ b/controller/physical.c\n> @@ -351,30 +351,35 @@ put_flow_based_remote_port_redirect_overlay(\n>      }\n>  }\n>  \n> +/* Add handling for E/W ICMPv4/v6 packets when tunneled packets exceed\n> + * path MTU.\n> + * If packet needs to be tunneled to another node and the physical\n> + * interface used for tunneling has a lower MTU than the packet size,\n> + * or if there is a route exception with a smaller MTU, kernel\n> + * generates an ICMP \"Fragmentation Needed\" message, but the package\n\nNit: s/package/packet/\n\n> + * metadata didn't change. Such packets might have been dropped due\n> + * to required metadata modifications for returned packet.\n> + *\n> + * Mark these packets with MLF_RX_FROM_TUNNEL_BIT for further\n> + * processing. Packets received from a VTEP tunnel should be passed\n\nHere too, probably \"RAMP\" is more appropriate.\n\n> + * through, and errors handled via the normal processing path, since\n> + * port metadata is not carried in VTEP packets in VNI.\n> + */\n>  static void\n> -add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n> -                         enum mf_field_id mff_ovn_geneve,\n> -                         struct ovn_desired_flow_table *flow_table,\n> -                         struct ofpbuf *ofpacts)\n> +add_tunnel_ingress_pmtud_flows(const struct chassis_tunnel *tun,\n> +                               struct ofpbuf *ofpacts,\n> +                               struct ovn_desired_flow_table *flow_table)\n>  {\n> -    /* Main ingress flow (priority 100) */\n> -    struct match match = MATCH_CATCHALL_INITIALIZER;\n> -    match_set_in_port(&match, tun->ofport);\n> -\n> -    ofpbuf_clear(ofpacts);\n> -    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n> -    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n> +    if (tun->is_vtep_tunnel) {\n> +        return;\n> +    }\n>  \n> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n> -                    ofpacts, hc_uuid);\n> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n>  \n>      /* Set allow rx from tunnel bit */\n>      put_load(1, MFF_LOG_FLAGS, MLF_RX_FROM_TUNNEL_BIT, 1, ofpacts);\n>      put_resubmit(OFTABLE_CT_ZONE_LOOKUP, ofpacts);\n>  \n> -    /* Add specific flows for E/W ICMPv{4,6} packets if tunnelled packets\n> -     * do not fit path MTU. */\n> -\n>      /* IPv4 ICMP flow (priority 120) */\n>      match_init_catchall(&match);\n>      match_set_in_port(&match, tun->ofport);\n> @@ -398,6 +403,26 @@ add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>                      ofpacts, hc_uuid);\n>  }\n>  \n> +static void\n> +add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n> +                         enum mf_field_id mff_ovn_geneve,\n> +                         struct ovn_desired_flow_table *flow_table,\n> +                         struct ofpbuf *ofpacts)\n> +{\n> +    /* Main ingress flow (priority 100) */\n> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n> +    match_set_in_port(&match, tun->ofport);\n> +\n> +    ofpbuf_clear(ofpacts);\n> +    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n> +    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n> +\n> +    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n> +                    ofpacts, hc_uuid);\n> +\n> +    add_tunnel_ingress_pmtud_flows(tun, ofpacts, flow_table);\n> +}\n> +\n>  static void\n>  put_stack(enum mf_field_id field, struct ofpact_stack *stack)\n>  {\n> @@ -3943,7 +3968,7 @@ physical_run(struct physical_ctx *p_ctx,\n>      struct chassis_tunnel *tun;\n>      HMAP_FOR_EACH (tun, hmap_node, p_ctx->chassis_tunnels) {\n>          add_tunnel_ingress_flows(tun, p_ctx->mff_ovn_geneve, flow_table,\n> -                                &ofpacts);\n> +                                 &ofpacts);\n\nNit: unrelated change.\n\n>      }\n>  \n>      /* Process packets that arrive from flow-based tunnels. */\n> diff --git a/tests/ovn-controller-vtep.at b/tests/ovn-controller-vtep.at\n> index 961324bd2..caf53e291 100644\n> --- a/tests/ovn-controller-vtep.at\n> +++ b/tests/ovn-controller-vtep.at\n> @@ -775,6 +775,10 @@ AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | grep 'priority=\n>  priority=110,tun_id=0x<>,in_port=<> actions=move:NXM_NX_TUN_ID[[0..23]]->OXM_OF_METADATA[[0..23]],load:0x<>->NXM_NX_REG14[[0..14]],load:0x<>->NXM_NX_REG10[[1]],resubmit(,OFTABLE_LOG_INGRESS_PIPELINE)\n>  ])\n>  \n> +# Skip processing ICMP \"packet too big\" errors in this table if the packet came from a VTEP tunnel.\n> +AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | \\\n> +          grep -E 'icmp_type=3,icmp_code=4|icmp_type=2,icmp_code=0'], [1], [])\n> +\n>  OVN_CONTROLLER_VTEP_STOP([], vtep1)\n>  OVN_CLEANUP([hv1])\n>  AT_CLEANUP\n\nRegards,\nDumitru","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=f7B2C/sc;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp4.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=f7B2C/sc","smtp1.osuosl.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","smtp1.osuosl.org;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=f7B2C/sc"],"Received":["from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1XVp5lKfz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 20:33:22 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id A7D3F40E7D;\n\tThu, 23 Apr 2026 10:33:20 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id pv_NTeZJVzjg; Thu, 23 Apr 2026 10:33:17 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56])\n\tby smtp4.osuosl.org (Postfix) with ESMTPS id 3ADEF40E74;\n\tThu, 23 Apr 2026 10:33:17 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id 20B64C058E;\n\tThu, 23 Apr 2026 10:33:17 +0000 (UTC)","from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 7F901C058D\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 10:33:15 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp1.osuosl.org (Postfix) with ESMTP id 6C835830E2\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 10:33:15 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id elv1sVweq94p for <dev@openvswitch.org>;\n Thu, 23 Apr 2026 10:33:13 +0000 (UTC)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n by smtp1.osuosl.org (Postfix) with ESMTPS id 5D910813F4\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 10:33:12 +0000 (UTC)","from mail-pj1-f69.google.com (mail-pj1-f69.google.com\n [209.85.216.69]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-687-TrCquFX8MV-POhoXAUP3hA-1; Thu, 23 Apr 2026 06:33:10 -0400","by mail-pj1-f69.google.com with SMTP id\n 98e67ed59e1d1-35d99c2908cso6464842a91.0\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 03:33:09 -0700 (PDT)","from ?IPV6:2001:1c05:1417:d800:d1ef:9817:2a26:625d?\n (2001-1c05-1417-d800-d1ef-9817-2a26-625d.cable.dynamic.v6.ziggo.nl.\n [2001:1c05:1417:d800:d1ef:9817:2a26:625d])\n by smtp.gmail.com with ESMTPSA id\n 98e67ed59e1d1-3614195a9f0sm19400952a91.9.2026.04.23.03.33.03\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Thu, 23 Apr 2026 03:33:06 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.9.56;\n helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp4.osuosl.org 3ADEF40E74","OpenDKIM Filter v2.11.0 smtp1.osuosl.org 5D910813F4"],"Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=170.10.129.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=dceara@redhat.com;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp1.osuosl.org 5D910813F4","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776940391;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=FCQ+UC/8ZpogxXhE0uz5Ybd6GntHgVFF6HLXa/ER8/g=;\n b=f7B2C/sc4StSBYPDS0OyJWrEM0pph5QBTMXkoxhSA2jfPbH2bEOHnY43Gdnmj2780402ul\n UGd2qJHyZa/jbUaIxO8E4ToZlw5AriLyIl4YGSZ4ri51S2cF/ewXEf3k5A3M9K+XGsZR5n\n Ydc1DcFeWmHqHESAc3e8gGiY9ytgYsU=","X-MC-Unique":"TrCquFX8MV-POhoXAUP3hA-1","X-Mimecast-MFC-AGG-ID":"TrCquFX8MV-POhoXAUP3hA_1776940389","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776940388; x=1777545188;\n h=content-transfer-encoding:in-reply-to:cc:content-language:from\n :references:to:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=FCQ+UC/8ZpogxXhE0uz5Ybd6GntHgVFF6HLXa/ER8/g=;\n b=fme9bHM/xTUDxWrMQWf6dzNfqxBJ8wPbqbaXR3A94fax6ZeW51pq41lLU7YfAi3+jx\n BkV/Y5IMBrkL+jKh8zjRnYBnKPsRGPkfD6he3nPaTxHarcbb3C6MF43/B4x8H7eFUU5L\n aMiNbTXBD1Rmgsy3Xpcxq4mH24HF5FymzJbaf1iKgqeuBny6LIPeObHN63Y7Xy4ITRhN\n 3oH/nNqI+5sI+1WYFS1RK7Nh7HjjFaxx59qz6vcSr0AY5e0+11kltjX/JwxeBaCINgpy\n rl0CrIlpJjzyQjqRnfmctSTglo9yZ+KiWu76P00POlSgF41S6h0qbFwfLTPn1rALG3YE\n 3boA==","X-Forwarded-Encrypted":"i=1;\n AFNElJ82BWOrs3rYeAHCXI+pn4S/xYOzpTC1RB4jk6/NET0shO4giJAoUayMpqSgYHxq8wuPQp0=@openvswitch.org","X-Gm-Message-State":"AOJu0Yxjt+lrOAyX3IJhw2Ip3Y8cEFCgfPpYJ7+6mQjhldzjB4tSEqeD\n CnnINB/mQVglLNyBXn7SnGzEhz1IzqB2DJp1xCyIC6IGsBdFqyMoNG4QXRY2b2FhTZlg0677ugH\n /9CGp2y5oPI397VyMoTAXGioEmWuKgEsimXl4vSolaRyvjL+RqlU1JWp+oSteLw==","X-Gm-Gg":"AeBDieuQ4td16H2dvz1jLHhhAFXzyLtRwrL161GMGmaA1cmGXS8Uvojda9TwKaLyUlX\n lgi/6ATrIfK7ZdYd3ZMGoZPrBkp4nCdkKDNoJYgNlLLkoR7Z1EkVC25JzkMYT9wGyx8qgyI7xGt\n +KFjvtnMuER+hiEGUglG5kycpiUbENFiwqFF0pNOBUGPJwNOo8CI29VSmbsgLozD6+GOx723FFs\n hZFG73uJj7ruF96ic2I1V9kwS1t7/gHdfVpPQfp6V2nhsyYWu7lS+dns4a4Fy+Qak8fFDQi0hC3\n NUsQqibs85bFW+pdtgRoIYoyvrHRJWULyqXBm2cGm02uQcfUmcbZ9u+790UIDKuId8CF3TRdMao\n R+ZBBB0YPJN565Otk2h8zSt/+Awkg/51fVxEwHoBwg8oOgVfylVGRWVr5iLdNJRHpKZQ5DVOV1Z\n L18TVbQl1o9fW6CmBvkYMrXoj0BTxfRokeSGxEus5KygtLq6HyEakqxeplIA286zfc1ul6Nho6c\n qu7BG5pxD8=","X-Received":["by 2002:a17:90b:5203:b0:35d:9560:3efc with SMTP id\n 98e67ed59e1d1-361404632e8mr24650615a91.14.1776940388159;\n Thu, 23 Apr 2026 03:33:08 -0700 (PDT)","by 2002:a17:90b:5203:b0:35d:9560:3efc with SMTP id\n 98e67ed59e1d1-361404632e8mr24650577a91.14.1776940387482;\n Thu, 23 Apr 2026 03:33:07 -0700 (PDT)"],"Message-ID":"<ba3d0eaf-eead-4979-ad2a-b96e99990888@redhat.com>","Date":"Thu, 23 Apr 2026 12:33:00 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Alexandra Rukomoinikova <arukomoinikova@k2.cloud>, dev@openvswitch.org","References":"<20260420105419.5583-1-arukomoinikova@k2.cloud>","In-Reply-To":"<20260420105419.5583-1-arukomoinikova@k2.cloud>","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"_wbnJ6e0LLlYfC4cCRkLkpVtnb1fDuUgtSZrsok1E3s_1776940389","X-Mimecast-Originator":"redhat.com","Content-Language":"en-US","Subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","From":"Dumitru Ceara via dev <ovs-dev@openvswitch.org>","Reply-To":"Dumitru Ceara <dceara@redhat.com>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}},{"id":3681377,"web_url":"http://patchwork.ozlabs.org/comment/3681377/","msgid":"<f6cd4bef-c171-4311-a880-ca1910d9cdd8@k2.cloud>","list_archive_url":null,"date":"2026-04-23T11:13:27","subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","submitter":{"id":89461,"url":"http://patchwork.ozlabs.org/api/people/89461/","name":"Rukomoinikova Aleksandra","email":"ARukomoinikova@k2.cloud"},"content":"On 23.04.2026 13:33, Dumitru Ceara wrote:\n> On 4/20/26 12:54 PM, Alexandra Rukomoinikova via dev wrote:\n>> Commit [1] added handling for E/W ICMPv4/v6 \"fragmentation needed\"\n>> packets generated for overlay tunneled traffic. This was required\n>> because the GENEVE kernel module generates ICMP \"need frag\" packets\n>> when a tunneled packet exceeds the path MTU, and such packets were\n>> previously dropped due to metadata needing to be swapped.\n>>\n>> However, it did not cover the case where similar ICMP packets\n>> arrive from VTEP tunnels. Such packets are not subject to the same\n>> metadata handling constraints, since they are VXLAN-encapsulated and\n>> are already delivered directly to the destination VIF MAC address.\n>>\n>> As a result, they do not match the added for such packets rules and are\n>> dropped. Exclude packets coming from VTEP tunnels from this special handling.\n>>\n>> [1] https://github.com/ovn-org/ovn/commit/221476a01f2670cf4eb78cd9353e709cb8a16329\n>> Fixes: 221476a01f26 (\"ovn: Add tunnel PMTUD support.\")\n>> Acked-by: Lorenzo Bianconi <lorenzo.bianconi@redhat.com>\n>> Signed-off-by: Alexandra Rukomoinikova <arukomoinikova@k2.cloud>\n>> ---\n> Hi Alexandra, Lorenzo,\n>\n> Thanks for the patch and review!\n\n\nHi Dumitru! Thanks for review, i will answer below\n\n\n>\n>>   v1 --> v2: added ACK by\n>>              rename add_tunnel_ingress_icmp_need_frag_flow func to add_tunnel_ingress_pmtud_flows\n>>              fixed Lorenzo's comments\n>> ---\n>>   controller/encaps.c          | 29 ++++++++++++------\n>>   controller/local_data.c      |  2 ++\n>>   controller/local_data.h      |  1 +\n>>   controller/physical.c        | 59 +++++++++++++++++++++++++-----------\n>>   tests/ovn-controller-vtep.at |  4 +++\n>>   5 files changed, 69 insertions(+), 26 deletions(-)\n>>\n>> diff --git a/controller/encaps.c b/controller/encaps.c\n>> index 61f41bf3a..0f3dd5aed 100644\n>> --- a/controller/encaps.c\n>> +++ b/controller/encaps.c\n>> @@ -44,6 +44,7 @@ encaps_register_ovs_idl(struct ovsdb_idl *ovs_idl)\n>>       ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_name);\n>>       ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_type);\n>>       ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_options);\n>> +    ovsdb_idl_track_add_column(ovs_idl, &ovsrec_interface_col_other_config);\n>>   }\n>>   \n>>   /* Enough context to create a new tunnel, using tunnel_add(). */\n>> @@ -201,12 +202,14 @@ out:\n>>   }\n>>   \n>>   static void\n>> -tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>> -           const char *new_chassis_id, const struct sbrec_encap *encap,\n>> -           const char *local_ip,\n>> +tunnel_add(struct tunnel_ctx *tc,\n>> +           const struct sbrec_sb_global *sbg,\n>> +           const struct sbrec_chassis *chassis_rec,\n>> +           const struct sbrec_encap *encap, const char *local_ip,\n>>              const struct ovsrec_open_vswitch_table *ovs_table)\n>>   {\n>>       struct smap options = SMAP_INITIALIZER(&options);\n>> +    struct smap other_config = SMAP_INITIALIZER(&other_config);\n>>       smap_add(&options, \"remote_ip\", encap->ip);\n>>       smap_add(&options, \"local_ip\", local_ip);\n>>       smap_add(&options, \"key\", \"flow\");\n>> @@ -214,6 +217,8 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>>       const char *csum = smap_get(&encap->options, \"csum\");\n>>       char *tunnel_entry_id = NULL;\n>>       char *tunnel_entry_id_old = NULL;\n>> +    bool is_vtep_tunnel = smap_get_bool(&chassis_rec->other_config,\n>> +                                        \"is-vtep\", false);\n> This is duplicated in chassis.c (as a static function), should we unify\n> all the \"is-vtep\" helpers?\n\n\nYes, thanks, I will add\n\n\n>\n>>   \n>>       /*\n>>        * Since a chassis may have multiple encap-ip, we can't just add the\n>> @@ -221,9 +226,9 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>>        * combination of the chassis_name and the remote and local encap-ips to\n>>        * identify a specific tunnel to the remote chassis.\n>>        */\n>> -    tunnel_entry_id = encaps_tunnel_id_create(new_chassis_id, encap->ip,\n>> +    tunnel_entry_id = encaps_tunnel_id_create(chassis_rec->name, encap->ip,\n>>                                                 local_ip);\n>> -    tunnel_entry_id_old = encaps_tunnel_id_create_legacy(new_chassis_id,\n>> +    tunnel_entry_id_old = encaps_tunnel_id_create_legacy(chassis_rec->name,\n>>                                                            encap->ip);\n>>       if (csum && (!strcmp(csum, \"true\") || !strcmp(csum, \"false\"))) {\n>>           smap_add(&options, \"csum\", csum);\n>> @@ -258,7 +263,7 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>>   \n>>       /* Add auth info if ipsec is enabled. */\n>>       if (sbg->ipsec) {\n>> -        smap_add(&options, \"remote_name\", new_chassis_id);\n>> +        smap_add(&options, \"remote_name\", chassis_rec->name);\n>>   \n>>           /* Force NAT-T traversal via configuration */\n>>           /* Two ipsec backends are supported: libreswan and strongswan */\n>> @@ -276,6 +281,10 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>>           }\n>>       }\n>>   \n>> +    if (is_vtep_tunnel) {\n>> +        smap_add(&other_config, \"is-vtep\", \"true\");\n>> +    }\n>> +\n>>       /* If there's an existing tunnel record that does not need any change,\n>>        * keep it.  Otherwise, create a new record (if there was an existing\n>>        * record, the new record will supplant it and encaps_run() will delete\n>> @@ -312,10 +321,10 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>>        * its name, otherwise generate a new, unique name. */\n>>       char *port_name = (tunnel\n>>                          ? xstrdup(tunnel->port->name)\n>> -                       : tunnel_create_name(tc, new_chassis_id));\n>> +                       : tunnel_create_name(tc, chassis_rec->name));\n>>       if (!port_name) {\n>>           VLOG_WARN(\"Unable to allocate unique name for '%s' tunnel\",\n>> -                  new_chassis_id);\n>> +                  chassis_rec->name);\n>>           goto exit;\n>>       }\n>>   \n>> @@ -323,6 +332,7 @@ tunnel_add(struct tunnel_ctx *tc, const struct sbrec_sb_global *sbg,\n>>       ovsrec_interface_set_name(iface, port_name);\n>>       ovsrec_interface_set_type(iface, encap->type);\n>>       ovsrec_interface_set_options(iface, &options);\n>> +    ovsrec_interface_set_other_config(iface, &other_config);\n>>   \n>>       struct ovsrec_port *port = ovsrec_port_insert(tc->ovs_txn);\n>>       ovsrec_port_set_name(port, port_name);\n>> @@ -338,6 +348,7 @@ exit:\n>>       free(tunnel_entry_id);\n>>       free(tunnel_entry_id_old);\n>>       smap_destroy(&options);\n>> +    smap_destroy(&other_config);\n>>   }\n>>   \n>>   static bool\n>> @@ -403,7 +414,7 @@ chassis_tunnel_add(const struct sbrec_chassis *chassis_rec,\n>>               }\n>>               VLOG_DBG(\"tunnel_add: '%s', local ip: %s\", chassis_rec->name,\n>>                        this_chassis->encaps[j]->ip);\n>> -            tunnel_add(tc, sbg, chassis_rec->name, chassis_rec->encaps[i],\n>> +            tunnel_add(tc, sbg, chassis_rec, chassis_rec->encaps[i],\n>>                          this_chassis->encaps[j]->ip, ovs_table);\n>>               tuncnt++;\n>>           }\n>> diff --git a/controller/local_data.c b/controller/local_data.c\n>> index dda746d73..5f1a52771 100644\n>> --- a/controller/local_data.c\n>> +++ b/controller/local_data.c\n>> @@ -532,6 +532,8 @@ local_nonvif_data_run(const struct ovsrec_bridge *br_int,\n>>                   tun->ofport = u16_to_ofp(ofport);\n>>                   tun->type = tunnel_type;\n>>                   tun->is_ipv6 = ip ? addr_is_ipv6(ip) : false;\n>> +                tun->is_vtep_tunnel = smap_get_bool(&iface_rec->other_config,\n>> +                                                    \"is-vtep\", false);\n> Should we have a small public helper in encaps.[ch] (where the tunnel\n> interface is actually created and this other_config value is set)?\n>\n>>   \n>>                   free(hash_id);\n>>                   free(ip);\n>> diff --git a/controller/local_data.h b/controller/local_data.h\n>> index 948c1a935..fdb81288c 100644\n>> --- a/controller/local_data.h\n>> +++ b/controller/local_data.h\n>> @@ -146,6 +146,7 @@ struct chassis_tunnel {\n>>       ofp_port_t ofport;\n>>       enum chassis_tunnel_type type;\n>>       bool is_ipv6;\n>> +    bool is_vtep_tunnel;\n> I think the terminology we agreed upon back when Ihar (in CC) added\n> VXLAN support [0] (for ovn-chassis-to-ovn-chassis communication) was\n> \"ramp switch\", should this be called \"is_ramp_tunnel\"?\n>\n> [0] https://github.com/ovn-org/ovn/commit/b07f1bc\n\nYes, thanks! i'll fix it. i'll also correct statement in commit message \nabout vxlan encap,\n\nI'll make it clearer, now it seems like any vlxan encapsulation has no \nproblems with metadata swapping while icmp frag needed packet processing\n\n\n>\n>>   };\n>>   \n>>   /* Flow-based tunnel that consolidates multiple endpoints into a single\n>> diff --git a/controller/physical.c b/controller/physical.c\n>> index 228f3d171..4f1748c6e 100644\n>> --- a/controller/physical.c\n>> +++ b/controller/physical.c\n>> @@ -351,30 +351,35 @@ put_flow_based_remote_port_redirect_overlay(\n>>       }\n>>   }\n>>   \n>> +/* Add handling for E/W ICMPv4/v6 packets when tunneled packets exceed\n>> + * path MTU.\n>> + * If packet needs to be tunneled to another node and the physical\n>> + * interface used for tunneling has a lower MTU than the packet size,\n>> + * or if there is a route exception with a smaller MTU, kernel\n>> + * generates an ICMP \"Fragmentation Needed\" message, but the package\n> Nit: s/package/packet/\n>\n>> + * metadata didn't change. Such packets might have been dropped due\n>> + * to required metadata modifications for returned packet.\n>> + *\n>> + * Mark these packets with MLF_RX_FROM_TUNNEL_BIT for further\n>> + * processing. Packets received from a VTEP tunnel should be passed\n> Here too, probably \"RAMP\" is more appropriate.\n>\n>> + * through, and errors handled via the normal processing path, since\n>> + * port metadata is not carried in VTEP packets in VNI.\n>> + */\n>>   static void\n>> -add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>> -                         enum mf_field_id mff_ovn_geneve,\n>> -                         struct ovn_desired_flow_table *flow_table,\n>> -                         struct ofpbuf *ofpacts)\n>> +add_tunnel_ingress_pmtud_flows(const struct chassis_tunnel *tun,\n>> +                               struct ofpbuf *ofpacts,\n>> +                               struct ovn_desired_flow_table *flow_table)\n>>   {\n>> -    /* Main ingress flow (priority 100) */\n>> -    struct match match = MATCH_CATCHALL_INITIALIZER;\n>> -    match_set_in_port(&match, tun->ofport);\n>> -\n>> -    ofpbuf_clear(ofpacts);\n>> -    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n>> -    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n>> +    if (tun->is_vtep_tunnel) {\n>> +        return;\n>> +    }\n>>   \n>> -    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n>> -                    ofpacts, hc_uuid);\n>> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n>>   \n>>       /* Set allow rx from tunnel bit */\n>>       put_load(1, MFF_LOG_FLAGS, MLF_RX_FROM_TUNNEL_BIT, 1, ofpacts);\n>>       put_resubmit(OFTABLE_CT_ZONE_LOOKUP, ofpacts);\n>>   \n>> -    /* Add specific flows for E/W ICMPv{4,6} packets if tunnelled packets\n>> -     * do not fit path MTU. */\n>> -\n>>       /* IPv4 ICMP flow (priority 120) */\n>>       match_init_catchall(&match);\n>>       match_set_in_port(&match, tun->ofport);\n>> @@ -398,6 +403,26 @@ add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>>                       ofpacts, hc_uuid);\n>>   }\n>>   \n>> +static void\n>> +add_tunnel_ingress_flows(const struct chassis_tunnel *tun,\n>> +                         enum mf_field_id mff_ovn_geneve,\n>> +                         struct ovn_desired_flow_table *flow_table,\n>> +                         struct ofpbuf *ofpacts)\n>> +{\n>> +    /* Main ingress flow (priority 100) */\n>> +    struct match match = MATCH_CATCHALL_INITIALIZER;\n>> +    match_set_in_port(&match, tun->ofport);\n>> +\n>> +    ofpbuf_clear(ofpacts);\n>> +    put_decapsulation(mff_ovn_geneve, tun, ofpacts);\n>> +    put_resubmit(OFTABLE_LOCAL_OUTPUT, ofpacts);\n>> +\n>> +    ofctrl_add_flow(flow_table, OFTABLE_PHY_TO_LOG, 100, 0, &match,\n>> +                    ofpacts, hc_uuid);\n>> +\n>> +    add_tunnel_ingress_pmtud_flows(tun, ofpacts, flow_table);\n>> +}\n>> +\n>>   static void\n>>   put_stack(enum mf_field_id field, struct ofpact_stack *stack)\n>>   {\n>> @@ -3943,7 +3968,7 @@ physical_run(struct physical_ctx *p_ctx,\n>>       struct chassis_tunnel *tun;\n>>       HMAP_FOR_EACH (tun, hmap_node, p_ctx->chassis_tunnels) {\n>>           add_tunnel_ingress_flows(tun, p_ctx->mff_ovn_geneve, flow_table,\n>> -                                &ofpacts);\n>> +                                 &ofpacts);\n> Nit: unrelated change.\n\n\nI can drop it if you prefer, but I tend to fix small formatting \ninconsistencies when I’m already touching nearby code.\n\nThanks!\n\n>>       }\n>>   \n>>       /* Process packets that arrive from flow-based tunnels. */\n>> diff --git a/tests/ovn-controller-vtep.at b/tests/ovn-controller-vtep.at\n>> index 961324bd2..caf53e291 100644\n>> --- a/tests/ovn-controller-vtep.at\n>> +++ b/tests/ovn-controller-vtep.at\n>> @@ -775,6 +775,10 @@ AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | grep 'priority=\n>>   priority=110,tun_id=0x<>,in_port=<> actions=move:NXM_NX_TUN_ID[[0..23]]->OXM_OF_METADATA[[0..23]],load:0x<>->NXM_NX_REG14[[0..14]],load:0x<>->NXM_NX_REG10[[1]],resubmit(,OFTABLE_LOG_INGRESS_PIPELINE)\n>>   ])\n>>   \n>> +# Skip processing ICMP \"packet too big\" errors in this table if the packet came from a VTEP tunnel.\n>> +AT_CHECK([ovs-ofctl dump-flows br-int table=OFTABLE_PHY_TO_LOG | \\\n>> +          grep -E 'icmp_type=3,icmp_code=4|icmp_type=2,icmp_code=0'], [1], [])\n>> +\n>>   OVN_CONTROLLER_VTEP_STOP([], vtep1)\n>>   OVN_CLEANUP([hv1])\n>>   AT_CLEANUP\n> Regards,\n> Dumitru\n>","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=k2.cloud header.i=@k2.cloud header.a=rsa-sha256\n header.s=mail header.b=ZN5yaq7D;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp1.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key,\n unprotected) header.d=k2.cloud header.i=@k2.cloud header.a=rsa-sha256\n header.s=mail header.b=ZN5yaq7D","smtp2.osuosl.org; dmarc=pass (p=quarantine dis=none)\n header.from=k2.cloud","smtp2.osuosl.org; dkim=pass (2048-bit key,\n unprotected) header.d=k2.cloud header.i=@k2.cloud header.a=rsa-sha256\n header.s=mail header.b=ZN5yaq7D"],"Received":["from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1YPM2R5Wz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 21:13:41 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 515F483487;\n\tThu, 23 Apr 2026 11:13:39 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 3fWWn-I4Sfky; Thu, 23 Apr 2026 11:13:37 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56])\n\tby smtp1.osuosl.org (Postfix) with ESMTPS id AE570833CA;\n\tThu, 23 Apr 2026 11:13:35 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id 751FEC058E;\n\tThu, 23 Apr 2026 11:13:35 +0000 (UTC)","from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133])\n by lists.linuxfoundation.org (Postfix) with ESMTP id A11B3C058D\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 11:13:34 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 8D5A7406D9\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 11:13:34 +0000 (UTC)","from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id UmXV2to44zuM for <dev@openvswitch.org>;\n Thu, 23 Apr 2026 11:13:33 +0000 (UTC)","from ksmg2.croc.ru (ksmg2.croc.ru [195.38.23.102])\n by smtp2.osuosl.org (Postfix) with ESMTPS id 8A0D340071\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 11:13:30 +0000 (UTC)","from ksmg2 (localhost [127.0.0.1])\n by ksmg2.croc.ru (Postfix) with ESMTP id EF2391E002D;\n Thu, 23 Apr 2026 14:13:27 +0300 (MSK)","from MXONE (unknown [195.38.23.35])\n by ksmg2.croc.ru (Postfix) with ESMTP;\n Thu, 23 Apr 2026 14:13:27 +0300 (MSK)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.9.56;\n helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp1.osuosl.org AE570833CA","OpenDKIM Filter v2.11.0 smtp2.osuosl.org 8A0D340071","OpenDKIM Filter v2.11.0 ksmg2.croc.ru EF2391E002D"],"Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=195.38.23.102;\n helo=ksmg2.croc.ru; envelope-from=arukomoinikova@k2.cloud;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp2.osuosl.org 8A0D340071","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=k2.cloud; s=mail;\n t=1776942807; bh=mizDzRcz4XTqGvgU9ahY0JwTiPoFqSdDRCm1xqrwYHA=;\n h=From:To:Subject:Date:Message-ID:Content-Type:MIME-Version:From;\n b=ZN5yaq7D77YJI65LD66NObz6pvqjRC4zvaW9PEvd2oqeL5y2ee0OuiBI50EVGuiRC\n F+BZ8ZWMxVrcpATeKS8BJk0jInZfKuHXyYHipjcYumgZqx/OvfX1umgr4ydJZ4mhTU\n CvpquZ9Rc0N9DKPEoIaWmyy7PgiWQ4Yew9HhB1IZPPu8qnxK/5ZEN2XQp3Z4kss6pX\n hTEUCYsdX6iBanZgH/gjGZryIz0aOWqX51clzXp9FjsLPp8z36PvesLoJw4zAQIlu6\n nuTxXhG1jOjcT4Q8DpkaSD1dhw0/Rs41yh5u3ssxAguQFGEgkWxUD4fBETGDITDOqY\n AjSq3QUh/BO1Q==","To":"Dumitru Ceara <dceara@redhat.com>, Rukomoinikova Aleksandra\n <ARukomoinikova@k2.cloud>, \"dev@openvswitch.org\" <dev@openvswitch.org>","Thread-Topic":"[ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","Thread-Index":"AQHc0LQLLsXN/zY5LUGSvqsFOvyZMrXsRWoAgAALTAA=","Date":"Thu, 23 Apr 2026 11:13:27 +0000","Message-ID":"<f6cd4bef-c171-4311-a880-ca1910d9cdd8@k2.cloud>","References":"<20260420105419.5583-1-arukomoinikova@k2.cloud>\n <ba3d0eaf-eead-4979-ad2a-b96e99990888@redhat.com>","In-Reply-To":"<ba3d0eaf-eead-4979-ad2a-b96e99990888@redhat.com>","Accept-Language":"en-US","Content-Language":"en-US","X-MS-Has-Attach":"","X-MS-TNEF-Correlator":"","dlp-except":"1","Content-ID":"<E2036F6A8C5D3944B9DD59A33FA84D08@croc.ru>","MIME-Version":"1.0","X-SEG-SpamProfiler-Score":"-1","X-KSMG-Rule-ID":"4","X-KSMG-Message-Action":"skipped","X-KSMG-AntiSpam-Status":"not scanned, allowlist","X-KSMG-AntiPhishing":"not scanned, allowlist","X-KSMG-LinksScanning":"not scanned, allowlist","X-KSMG-AntiVirus":"Kaspersky Secure Mail Gateway, version 2.0.1.6960,\n not scanned, allowlist","Subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","From":"Rukomoinikova Aleksandra via dev <ovs-dev@openvswitch.org>","Reply-To":"Rukomoinikova Aleksandra <ARukomoinikova@k2.cloud>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}},{"id":3681382,"web_url":"http://patchwork.ozlabs.org/comment/3681382/","msgid":"<6c171277-ffd4-446c-9d33-3ac8c58308b9@redhat.com>","list_archive_url":null,"date":"2026-04-23T11:19:00","subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","submitter":{"id":76591,"url":"http://patchwork.ozlabs.org/api/people/76591/","name":"Dumitru Ceara","email":"dceara@redhat.com"},"content":"On 4/23/26 1:13 PM, Rukomoinikova Aleksandra wrote:\n>>>   static void\n>>>   put_stack(enum mf_field_id field, struct ofpact_stack *stack)\n>>>   {\n>>> @@ -3943,7 +3968,7 @@ physical_run(struct physical_ctx *p_ctx,\n>>>       struct chassis_tunnel *tun;\n>>>       HMAP_FOR_EACH (tun, hmap_node, p_ctx->chassis_tunnels) {\n>>>           add_tunnel_ingress_flows(tun, p_ctx->mff_ovn_geneve, flow_table,\n>>> -                                &ofpacts);\n>>> +                                 &ofpacts);\n>> Nit: unrelated change.\n> \n> I can drop it if you prefer, but I tend to fix small formatting \n> inconsistencies when I’m already touching nearby code.\n> \n\nOK, I won't oppose it in this case. :)\n\n> Thanks!\n\nThanks,\nDumitru","headers":{"Return-Path":"<ovs-dev-bounces@openvswitch.org>","X-Original-To":["incoming@patchwork.ozlabs.org","dev@openvswitch.org"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ovs-dev@lists.linuxfoundation.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=DIywfhtO;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org\n (client-ip=140.211.166.137; helo=smtp4.osuosl.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=patchwork.ozlabs.org)","smtp4.osuosl.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key)\n header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=DIywfhtO","smtp1.osuosl.org; dmarc=pass (p=quarantine dis=none)\n header.from=redhat.com","smtp1.osuosl.org; dkim=pass (1024-bit key,\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=DIywfhtO"],"Received":["from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1YWv6ZLrz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 21:19:23 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id CE21F40EE1;\n\tThu, 23 Apr 2026 11:19:16 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id k-lHnyxOkaOD; Thu, 23 Apr 2026 11:19:16 +0000 (UTC)","from lists.linuxfoundation.org (lf-lists.osuosl.org\n [IPv6:2605:bc80:3010:104::8cd3:938])\n\tby smtp4.osuosl.org (Postfix) with ESMTPS id F037740EC8;\n\tThu, 23 Apr 2026 11:19:15 +0000 (UTC)","from lf-lists.osuosl.org (localhost [127.0.0.1])\n\tby lists.linuxfoundation.org (Postfix) with ESMTP id E19F0C058E;\n\tThu, 23 Apr 2026 11:19:15 +0000 (UTC)","from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138])\n by lists.linuxfoundation.org (Postfix) with ESMTP id 09C66C058D\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 11:19:15 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp1.osuosl.org (Postfix) with ESMTP id DDBAC83478\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 11:19:14 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id cVS_CIrfACkS for <dev@openvswitch.org>;\n Thu, 23 Apr 2026 11:19:14 +0000 (UTC)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n by smtp1.osuosl.org (Postfix) with ESMTPS id C7A3583422\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 11:19:12 +0000 (UTC)","from mail-pj1-f71.google.com (mail-pj1-f71.google.com\n [209.85.216.71]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-670-1mHBi_fVMoeRwHVgJOU4TA-1; Thu, 23 Apr 2026 07:19:10 -0400","by mail-pj1-f71.google.com with SMTP id\n 98e67ed59e1d1-354c44bf176so7833776a91.0\n for <dev@openvswitch.org>; Thu, 23 Apr 2026 04:19:10 -0700 (PDT)","from ?IPV6:2001:1c05:1417:d800:d1ef:9817:2a26:625d?\n (2001-1c05-1417-d800-d1ef-9817-2a26-625d.cable.dynamic.v6.ziggo.nl.\n [2001:1c05:1417:d800:d1ef:9817:2a26:625d])\n by smtp.gmail.com with ESMTPSA id\n 98e67ed59e1d1-36140fc5d94sm25573080a91.2.2026.04.23.04.19.04\n (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n Thu, 23 Apr 2026 04:19:07 -0700 (PDT)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections -\n client-ip=2605:bc80:3010:104::8cd3:938; helo=lists.linuxfoundation.org;\n envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp4.osuosl.org F037740EC8","OpenDKIM Filter v2.11.0 smtp1.osuosl.org C7A3583422"],"Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=170.10.133.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=dceara@redhat.com;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp1.osuosl.org C7A3583422","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776943151;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding:\n in-reply-to:in-reply-to:references:references;\n bh=eIr1OpcbhqbIBXRqAmS1OHQZDqZd3/9/Ma5qviU9s8Q=;\n b=DIywfhtOyB5QTjIxS6I2gt4I6I/7/vjzNspPUkxXVo3fZQQvIGYdl3TTzwtK5llnRRS7Kr\n eotSvfR3f4+b7cEW4O/psJq9jssGkbS4YV/mU56QV49LmmXb6cV786INE4zyi5hmVp8QL6\n Ykfsyd39Az9LepzruPc7WeKCTw1YYRU=","X-MC-Unique":"1mHBi_fVMoeRwHVgJOU4TA-1","X-Mimecast-MFC-AGG-ID":"1mHBi_fVMoeRwHVgJOU4TA_1776943150","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776943149; x=1777547949;\n h=content-transfer-encoding:in-reply-to:content-language:from\n :references:cc:to:subject:user-agent:mime-version:date:message-id\n :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=eIr1OpcbhqbIBXRqAmS1OHQZDqZd3/9/Ma5qviU9s8Q=;\n b=Q/0rNlprxF0kCpbxf0ndRyi6MZpvFdtSLVwhtdpgHXSyTOfsoIsS2tNnTPMfpjPAv7\n j0Jdh6MdGonJoJHEa/NEP0ACwyq/cgFiDQrAamjkS4BG0XEvYiosDUulAudZhIEsi4sR\n 2shAT/hJYDn4kYVl2/Z01ihznqUn+lnbkqMuVeqXXgFW/8o4EQFPa4kpHrkfbAjF2lYH\n X/U0BfOLWvZTWFnZ7u7+V+nDzv2UBrlQQp2pWIUhq7YHKqFESMsFKPifftZtxwHNLwPT\n SdC/qCbZBuYfKMXeAK75C+ZGHjas8WsY7OPezdHzmxV75zRJVStt1skOlW43r1J5PQzf\n rmHg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8itDNskcWQBm+OUwyyteFJ7HZGanKCfeH24H+LjwtKtaALKZfvRNJCS1MAJhvPZQeLx2s=@openvswitch.org","X-Gm-Message-State":"AOJu0YxaVrVaa/c3YM1V5a685LVUWqfH9NCKQyJ8yJkmKm5cAjsWyiWL\n cWCut9HkkYwsrmucTypg3D+kGEr7EvWJqT4yoFjIbECtWOU/tKYhKq1t1DQ9fx+Cuo6zHGOYm2s\n lYF6TiytY4haG8Rqynjk6o7Y0bTWQAqzIhCYJ4p/jULaGvWCjhUMocoZgQKQntw==","X-Gm-Gg":"AeBDietntpfolDJXoW9z1cuaucIzb6Ys2GDp/IqTPgCcNbIUoVcVwX1Z7Loi1vWOlma\n h/F04K4H5u0+NiCvmQNM8AHW/NLp8DhWRJXPWmqYQwAFOly3f1laOIovJxmh5bZrBiZvwDV7pxe\n iqa3X1z9ALoYdrdpsEXUtqV1Y0JjpzdXhBgfShIv2FqEJNtNbib3iQVKt9zPk5+7RnDCZnUnAb7\n exgaeK5zICeGaUsKrQ3mPCDw4QN1DSvOR4oNP4V1Et0d5uC34u60yOe6Fc0qoDusl7LlPk3MYpZ\n HYZQK5KQdm397ZVKWhGja80+oOCBFtdtbnFucWvoZ17m1oBfxMu/x3lpCuTVmAD1AgN+p0hXzUm\n SRxRXQWFf+KT2ORYPR3T4i3sPe9D7QmEafNNfrUQcr68SMW0UZQNSuScbLX7x4gEZ1IThJx3H6d\n mXNSMAQGa5yWjII8UFChQwHfsZNWZe0isi/alEaT8+q0BYFLRIE4LmFxtwsi6bJOl4jqIk1bUQv\n ioCH5/tiaA=","X-Received":["by 2002:a17:90b:2f0c:b0:35b:a9f3:62ee with SMTP id\n 98e67ed59e1d1-361404b247cmr30581490a91.27.1776943148977;\n Thu, 23 Apr 2026 04:19:08 -0700 (PDT)","by 2002:a17:90b:2f0c:b0:35b:a9f3:62ee with SMTP id\n 98e67ed59e1d1-361404b247cmr30581458a91.27.1776943148511;\n Thu, 23 Apr 2026 04:19:08 -0700 (PDT)"],"Message-ID":"<6c171277-ffd4-446c-9d33-3ac8c58308b9@redhat.com>","Date":"Thu, 23 Apr 2026 13:19:00 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Rukomoinikova Aleksandra <ARukomoinikova@k2.cloud>,\n \"dev@openvswitch.org\" <dev@openvswitch.org>","References":"<20260420105419.5583-1-arukomoinikova@k2.cloud>\n <ba3d0eaf-eead-4979-ad2a-b96e99990888@redhat.com>\n <f6cd4bef-c171-4311-a880-ca1910d9cdd8@k2.cloud>","In-Reply-To":"<f6cd4bef-c171-4311-a880-ca1910d9cdd8@k2.cloud>","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"IYW3RKZUbZF81N_Bz52CYB9VQmHnGy5znkf2dqhmZPQ_1776943150","X-Mimecast-Originator":"redhat.com","Content-Language":"en-US","Subject":"Re: [ovs-dev] [PATCH ovn v2] controller: Skip frag-needed handling\n for VTEP ICMP packets.","X-BeenThere":"ovs-dev@openvswitch.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"<ovs-dev.openvswitch.org>","List-Unsubscribe":"<https://mail.openvswitch.org/mailman/options/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe>","List-Archive":"<http://mail.openvswitch.org/pipermail/ovs-dev/>","List-Post":"<mailto:ovs-dev@openvswitch.org>","List-Help":"<mailto:ovs-dev-request@openvswitch.org?subject=help>","List-Subscribe":"<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>,\n <mailto:ovs-dev-request@openvswitch.org?subject=subscribe>","From":"Dumitru Ceara via dev <ovs-dev@openvswitch.org>","Reply-To":"Dumitru Ceara <dceara@redhat.com>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"ovs-dev-bounces@openvswitch.org","Sender":"\"dev\" <ovs-dev-bounces@openvswitch.org>"}}]