On Tue, Feb 10, 2026 at 06:51:27PM +0000, Aleksei Oladko wrote: > The test generates VXLAN traffic using mausezahn, where the encapsulated > inner IPv4 packet contains a zero IP header checksum. After VXLAN > decapsulation, such packets do not pass sanity checks in br_netfilter > and are dropped, which causes the test to fail. > > Fix this by calculating and setting a valid IPv4 header checksum for the > encapsulated packet generated by mausezahn, so that the packet is accepted > by br_netfilter. > > Signed-off-by: Aleksei Oladko <[email protected]>
If you are targeting this as a fix, then: 1. Use "[PATCH net]" as subject prefix. See [1]. 2. Add a Fixes tag. 3. Please mention in the commit message that this is fixed by using the payload_template_calc_checksum() / payload_template_expand_checksum() helpers that are only available in v6.3 and newer kernels. Patch looks good otherwise (I also tested it). [1] https://docs.kernel.org/process/maintainer-netdev.html

