From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 72E39359A72 for ; Sat, 28 Feb 2026 18:14:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772302477; cv=none; b=gk9xXECKVGjvlZg5/I+l6aVBz1b7bn0zBeo08nBG7+0pRivj+YhE3Cxr9b17IVhh7w3S9PYmj+lM3r1+SPYbDljWyYYrn3t8NNhm4GbwjcQhLrc4RJjn4WHc85HIy7DXITc78upufv0r0EaZ5u85SJYofq3t1FfBbwjECK6cDwU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772302477; c=relaxed/simple; bh=NW9fuqdvgBtihHsto8OROm1ej/dvyaEfmqNZSfghbjM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=DtDfGyxP/gr0azOcpUuQg+cpg7d88eioDI7r7NwDBcsVMxcf/4j0EUqi5q7pNV3F13FD6UrEYFqDRkisA0iLZPNYuv9/y9juk0oxf/ehi1YreFp4rPVl9B1DqV36Wf6TamDEuyHz6t3VevS9SoBxx2mH2Q2zSPe4Xb2arYnORoA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=UQGGx4eC; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="UQGGx4eC" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C33CDC19423; Sat, 28 Feb 2026 18:14:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772302477; bh=NW9fuqdvgBtihHsto8OROm1ej/dvyaEfmqNZSfghbjM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UQGGx4eCwMFqmwsFl0H8U39bTXGYZxTkTg/A34jlRS4UXMpaNtfas50fdLb6W75lb WeF4bkh3uAK4cuRWuHtHMCLa44Pqonzj8aOgCofQudI/5QqJjnH/KVKris6qGMCPly n9irQxQzNQWEbah8LvW9Cy4DExSQj/BZXU4FYfF1uqJZfV5JOQK1f6Au+V+g69MND3 N8wJakXkXYw+WgN0cXPKTdLQ5XP7JB0GrCzXbu3WWF15yvk6RaI7fyqRaBP/o2wfo+ +2iouncfwLvkZ+vCXHQ75Ml/ZpeIWVz04TitdzeWmyzWJkJhodmj484HgkeYh7wzYv QfABiQHkjFqMg== From: Sasha Levin To: patches@lists.linux.dev Cc: Aleksei Oladko , Ido Schimmel , Paolo Abeni , Sasha Levin Subject: [PATCH 6.1 223/232] selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled Date: Sat, 28 Feb 2026 13:11:16 -0500 Message-ID: <20260228181127.1592657-223-sashal@kernel.org> X-Mailer: git-send-email 2.51.0 In-Reply-To: <20260228181127.1592657-1-sashal@kernel.org> References: <20260228181127.1592657-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Aleksei Oladko [ Upstream commit ce9f6aec0fb780dafc1dfc5f47c688422aff464a ] The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv6 packet has an incorrect payload length set in the IPv6 header. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by setting the correct IPv6 payload length for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh lines 698-706 )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr )"$daddr:"$( : IP daddr )"80:"$( : ICMPv6.type )"00:"$( : ICMPv6.code )"00:"$( : ICMPv6.checksum ) Data after IPv6 header: • 80: — 1 byte (ICMPv6 type) • 00: — 1 byte (ICMPv6 code) • 00: — 1 byte (ICMPv6 checksum, truncated) Total: 3 bytes → 00:03 is correct. The old value 00:08 did not match the actual payload size. Fixes: b07e9957f220 ("selftests: forwarding: Add VxLAN tests with a VLAN-unaware bridge for IPv6") Signed-off-by: Aleksei Oladko Reviewed-by: Ido Schimmel Link: https://patch.msgid.link/20260213131907.43351-3-aleksey.oladko@virtuozzo.com Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh index bd3f7d492af2b..28284a5aa07a9 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh @@ -695,7 +695,7 @@ vxlan_encapped_ping_do() )"6"$( : IP version )"$inner_tos"$( : Traffic class )"0:00:00:"$( : Flow label - )"00:08:"$( : Payload length + )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr -- 2.51.0