The test generates VXLAN traffic using mausezahn, where the encapsulated
inner IPv6 packet an incorrect payload length set in the IPv6 header.
After VXLAN decapsulation, such packets do not pass sanity checks in
br_netfilter and are dropped, which causes the test to fail.

Fix this by setting the correct IPv6 payload length for the encapsulated
packet generated by mausezahn, so that the packet is accepted
by br_netfilter.

https://virtuozzo.atlassian.net/browse/VSTOR-123249

Signed-off-by: Aleksei Oladko <[email protected]>
---
 tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh 
b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh
index a603f7b0a08f..e642feeada0e 100755
--- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh
+++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh
@@ -695,7 +695,7 @@ vxlan_encapped_ping_do()
                    )"6"$(                        : IP version
                    )"$inner_tos"$(               : Traffic class
                    )"0:00:00:"$(                 : Flow label
-                   )"00:08:"$(                   : Payload length
+                   )"00:03:"$(                   : Payload length
                    )"3a:"$(                      : Next header
                    )"04:"$(                      : Hop limit
                    )"$saddr:"$(                  : IP saddr
-- 
2.43.0

_______________________________________________
Devel mailing list
[email protected]
https://lists.openvz.org/mailman/listinfo/devel

Reply via email to