summaryrefslogtreecommitdiff
path: root/include/linux/netfilter
diff options
context:
space:
mode:
authorAleksei Oladko <aleksey.oladko@virtuozzo.com>2026-02-13 16:19:05 +0300
committerPaolo Abeni <pabeni@redhat.com>2026-02-17 15:34:11 +0300
commit02cb2e6bacbb08ebf6acb61be816efd11e1f4a21 (patch)
tree1c28f7991fabae364ea4da6e922e69a876981cc5 /include/linux/netfilter
parent26f29b14916964043bc25b55ad1b9f5e9a12ca53 (diff)
downloadlinux-02cb2e6bacbb08ebf6acb61be816efd11e1f4a21.tar.xz
selftests: forwarding: vxlan_bridge_1d: fix test failure with br_netfilter enabled
The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv4 packet contains a zero IP header checksum. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by calculating and setting a valid IPv4 header checksum for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. Fixed by using the payload_template_calc_checksum() / payload_template_expand_checksum() helpers that are only available in v6.3 and newer kernels. Fixes: a0b61f3d8ebf ("selftests: forwarding: vxlan_bridge_1d: Add an ECN decap test") Signed-off-by: Aleksei Oladko <aleksey.oladko@virtuozzo.com> Reviewed-by: Ido Schimmel <idosch@nvidia.com> Link: https://patch.msgid.link/20260213131907.43351-2-aleksey.oladko@virtuozzo.com Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Diffstat (limited to 'include/linux/netfilter')
0 files changed, 0 insertions, 0 deletions