From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6778C36C9CE for ; Sat, 28 Feb 2026 18:11:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772302261; cv=none; b=jWDzRbBPIeliKnFS7jds26jrvjXdqgKLdMVaU3+M02P132hF/DSA9x0rRwM70AvOw/zq64pCIwOhCkqFdqmDwepIgHfik4SHxdw6zcV7LoWux1aznX38S2EKicTTtyLCL1vTrns5opXfZmscvX+bx5CF+caIVzMA+vSBXjCYh9Y= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772302261; c=relaxed/simple; bh=NW9fuqdvgBtihHsto8OROm1ej/dvyaEfmqNZSfghbjM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=neuuaEMdPXfzQijv/tfjacEUJ5JFgpiZyBn9LeXI2T8IOfnMvdDgurlCIjkTb1JHRcvrabE0nHrvGzAJ/Qi9Y3Uo+0lFAt4Ryf0rp4vZicQOIw50q+uTCK5ypZ56O9QXA5j7KHuXFaMHY4OlXol3VUNGEl6e3iLagT8MFHOSn3k= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=vNBFvDGP; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="vNBFvDGP" Received: by smtp.kernel.org (Postfix) with ESMTPSA id B40AEC19423; Sat, 28 Feb 2026 18:11:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772302261; bh=NW9fuqdvgBtihHsto8OROm1ej/dvyaEfmqNZSfghbjM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vNBFvDGP63PeaD3gjSlvwG6F6/LbnEqyzZW1VNDR4QYYF6LHcCALKWN2hWuhto3x2 BHcZAT0VJtC/GI7j7tOUCGzU0kvOy/wIRhoaDd63dvbTUdxaZuNZkMsNgv8jPtkbPY 3NhKPRRDPVcp4IMEUTqzQ+FgkEkurr/cGio1C/xJ0mQATTWIS9hRVGuCuK/TMtTLKt On1KXzMRGqo3ux27oIyB76fBEg7hIWu0LUmis0x5ntmMBic2igOxouJox42twH9soJ mYm12oOXzp1BVN4rwk0HFp6/NaPRtXXN8VDGkX7hj4qqLI6YeW6vzkjR5Z9fKlYhnz Z8IicPgQsSYug== From: Sasha Levin To: patches@lists.linux.dev Cc: Aleksei Oladko , Ido Schimmel , Paolo Abeni , Sasha Levin Subject: [PATCH 6.6 276/283] selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled Date: Sat, 28 Feb 2026 13:06:58 -0500 Message-ID: <20260228180709.1583486-276-sashal@kernel.org> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260228180709.1583486-1-sashal@kernel.org> References: <20260228180709.1583486-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Aleksei Oladko [ Upstream commit ce9f6aec0fb780dafc1dfc5f47c688422aff464a ] The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv6 packet has an incorrect payload length set in the IPv6 header. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by setting the correct IPv6 payload length for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh lines 698-706 )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr )"$daddr:"$( : IP daddr )"80:"$( : ICMPv6.type )"00:"$( : ICMPv6.code )"00:"$( : ICMPv6.checksum ) Data after IPv6 header: • 80: — 1 byte (ICMPv6 type) • 00: — 1 byte (ICMPv6 code) • 00: — 1 byte (ICMPv6 checksum, truncated) Total: 3 bytes → 00:03 is correct. The old value 00:08 did not match the actual payload size. Fixes: b07e9957f220 ("selftests: forwarding: Add VxLAN tests with a VLAN-unaware bridge for IPv6") Signed-off-by: Aleksei Oladko Reviewed-by: Ido Schimmel Link: https://patch.msgid.link/20260213131907.43351-3-aleksey.oladko@virtuozzo.com Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh index bd3f7d492af2b..28284a5aa07a9 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh @@ -695,7 +695,7 @@ vxlan_encapped_ping_do() )"6"$( : IP version )"$inner_tos"$( : Traffic class )"0:00:00:"$( : Flow label - )"00:08:"$( : Payload length + )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr -- 2.51.0