On Fri, Feb 13, 2026 at 01:19:06PM +0000, Aleksei Oladko wrote:
> The test generates VXLAN traffic using mausezahn, where the encapsulated
> inner IPv6 packet has an incorrect payload length set in the IPv6 header.
> After VXLAN decapsulation, such packets do not pass sanity checks in
> br_netfilter and are dropped, which causes the test to fail.
> 
> Fix this by setting the correct IPv6 payload length for the encapsulated
> packet generated by mausezahn, so that the packet is accepted
> by br_netfilter.
> 
> tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh
> lines 698-706
> 
>               )"00:03:"$(           : Payload length
>               )"3a:"$(              : Next header
>               )"04:"$(              : Hop limit
>               )"$saddr:"$(          : IP saddr
>               )"$daddr:"$(          : IP daddr
>               )"80:"$(              : ICMPv6.type
>               )"00:"$(              : ICMPv6.code
>               )"00:"$(              : ICMPv6.checksum
>               )
> 
> Data after IPv6 header:
> • 80: — 1 byte (ICMPv6 type)
> • 00: — 1 byte (ICMPv6 code)
> • 00: — 1 byte (ICMPv6 checksum, truncated)
> 
> Total: 3 bytes → 00:03 is correct. The old value 00:08 did not match
> the actual payload size.
> 
> Fixes: b07e9957f220 ("selftests: forwarding: Add VxLAN tests with a 
> VLAN-unaware bridge for IPv6")
> Signed-off-by: Aleksei Oladko <[email protected]>

Reviewed-by: Ido Schimmel <[email protected]>

Reply via email to