On Tue, Feb 10, 2026 at 06:51:27PM +0000, Aleksei Oladko wrote:
> The test generates VXLAN traffic using mausezahn, where the encapsulated
> inner IPv4 packet contains a zero IP header checksum. After VXLAN
> decapsulation, such packets do not pass sanity checks in br_netfilter
> and are dropped, which causes the test to fail.
> 
> Fix this by calculating and setting a valid IPv4 header checksum for the
> encapsulated packet generated by mausezahn, so that the packet is accepted
> by br_netfilter.
> 
> Signed-off-by: Aleksei Oladko <[email protected]>

If you are targeting this as a fix, then:

1. Use "[PATCH net]" as subject prefix. See [1].

2. Add a Fixes tag.

3. Please mention in the commit message that this is fixed by using the
payload_template_calc_checksum() / payload_template_expand_checksum()
helpers that are only available in v6.3 and newer kernels.

Patch looks good otherwise (I also tested it).

[1] https://docs.kernel.org/process/maintainer-netdev.html

Reply via email to