]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled
authorAleksei Oladko <aleksey.oladko@virtuozzo.com>
Fri, 13 Feb 2026 13:19:06 +0000 (13:19 +0000)
committerPaolo Abeni <pabeni@redhat.com>
Tue, 17 Feb 2026 12:34:11 +0000 (13:34 +0100)
The test generates VXLAN traffic using mausezahn, where the encapsulated
inner IPv6 packet has an incorrect payload length set in the IPv6 header.
After VXLAN decapsulation, such packets do not pass sanity checks in
br_netfilter and are dropped, which causes the test to fail.

Fix this by setting the correct IPv6 payload length for the encapsulated
packet generated by mausezahn, so that the packet is accepted
by br_netfilter.

tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh
lines 698-706

              )"00:03:"$(           : Payload length
              )"3a:"$(              : Next header
              )"04:"$(              : Hop limit
              )"$saddr:"$(          : IP saddr
              )"$daddr:"$(          : IP daddr
              )"80:"$(              : ICMPv6.type
              )"00:"$(              : ICMPv6.code
              )"00:"$(              : ICMPv6.checksum
              )

Data after IPv6 header:
• 80: — 1 byte (ICMPv6 type)
• 00: — 1 byte (ICMPv6 code)
• 00: — 1 byte (ICMPv6 checksum, truncated)

Total: 3 bytes → 00:03 is correct. The old value 00:08 did not match
the actual payload size.

Fixes: b07e9957f220 ("selftests: forwarding: Add VxLAN tests with a VLAN-unaware bridge for IPv6")
Signed-off-by: Aleksei Oladko <aleksey.oladko@virtuozzo.com>
Reviewed-by: Ido Schimmel <idosch@nvidia.com>
Link: https://patch.msgid.link/20260213131907.43351-3-aleksey.oladko@virtuozzo.com
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh

index a603f7b0a08f07e5d7ac71cd916791c1a7774572..e642feeada0e7e269821489197196953caa6a508 100755 (executable)
@@ -695,7 +695,7 @@ vxlan_encapped_ping_do()
                    )"6"$(                        : IP version
                    )"$inner_tos"$(               : Traffic class
                    )"0:00:00:"$(                 : Flow label
-                   )"00:08:"$(                   : Payload length
+                   )"00:03:"$(                   : Payload length
                    )"3a:"$(                      : Next header
                    )"04:"$(                      : Hop limit
                    )"$saddr:"$(                  : IP saddr