From nobody Wed Feb 11 03:02:43 2026 Received: from relay.virtuozzo.com (relay.virtuozzo.com [130.117.225.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5470638B7BA; Tue, 10 Feb 2026 18:51:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=130.117.225.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770749513; cv=none; b=Ur5r+5lsygFaMRDkYebjJ/DXN7LaTdN4TNZbiAkk0MsnwRerj4cyEqokqtvSAHco7IxOeoxaEBvFRj8Gq+9gi1/Oqf02VI0SAFqASCE+1di4q8k9dEixeNm5U0NQieQW2/i88SOINje5s0gNQ6bf7RYWRCC2NuKdak2pMR8KmZY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770749513; c=relaxed/simple; bh=9qSWNqmZtl1eAid4nDqA9BtCZjbh+DXVBRur5Lnsbew=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=I2+7g88XOjzeMnD1uEdnkwzOp8uBM8tiRWANI2TqTB34PBg+38txfM34WsfEWgSUMRcG/x8+cA3ehDKPUZy10utXw8VcM+6k3gqrKqbTqB79rHdh06e2sd1EfVRnC0ocFmQfZwogb35d11iseAnkwfkRvaxiyLyzG95QpK261uA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com; spf=pass smtp.mailfrom=virtuozzo.com; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b=JkIiukWF; arc=none smtp.client-ip=130.117.225.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="JkIiukWF" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=MIME-Version:Message-ID:Date:Subject:From: Content-Type; bh=kvxXTq9rTsjJRgY8HpV206SkpT7OPYHYm1UHpG3IliU=; b=JkIiukWFLdJ6 FowJ6KJU3y/ryYGTIDQ5nuGzh/UeElKuEt21ImeoAzqnaVpoSdjhLO5F0JVPxmd/RpiP52uBlhAgn pdLm+1z2oA3ftTr206csV4VJcbbvD74yGTgEdeYKOomjdspfvNHu9+01yKGH8RcYpYPMWAuzk7WNY Mb5jexgGmMBl6XEgmI/ieuvGF3X+l6tFiik0V1evQCv51WNlPKkmls4HGWWGjfj1ubPvKV0k3/0QX gQAk8efSt3cEwEjTX58uLHl+t3tNtjzQ0OP6o6n0uuDfITZ3FOhM1afAeLTavIbmdh6ddwdkdHDd/ E+h+Q+YhPv4vHxwnL9mzSw==; Received: from [130.117.225.5] (helo=dev004.aci.vzint.dev) by relay.virtuozzo.com with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vpsow-00DIAB-0K; Tue, 10 Feb 2026 19:51:36 +0100 Received: from dev004.aci.vzint.dev (localhost [127.0.0.1]) by dev004.aci.vzint.dev (8.16.1/8.16.1) with ESMTPS id 61AIpjFG480036 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 10 Feb 2026 18:51:45 GMT Received: (from root@localhost) by dev004.aci.vzint.dev (8.16.1/8.16.1/Submit) id 61AIpj2E480035; Tue, 10 Feb 2026 18:51:45 GMT From: Aleksei Oladko To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , Ido Schimmel , Amit Cohen Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Aleksei Oladko Subject: [PATCH 1/3] selftests: forwarding: vxlan_bridge_1d: fix test failure with br_netfilter enabled Date: Tue, 10 Feb 2026 18:51:27 +0000 Message-ID: <20260210185129.480015-2-aleksey.oladko@virtuozzo.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260210185129.480015-1-aleksey.oladko@virtuozzo.com> References: <20260210185129.480015-1-aleksey.oladko@virtuozzo.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv4 packet contains a zero IP header checksum. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by calculating and setting a valid IPv4 header checksum for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. Signed-off-by: Aleksei Oladko --- .../net/forwarding/vxlan_bridge_1d.sh | 26 ++++++++++++------- 1 file changed, 16 insertions(+), 10 deletions(-) diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh b/to= ols/testing/selftests/net/forwarding/vxlan_bridge_1d.sh index b43816dd998c..457f41d5e584 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh @@ -567,6 +567,21 @@ vxlan_encapped_ping_do() local inner_tos=3D$1; shift local outer_tos=3D$1; shift =20 + local ipv4hdr=3D$(: + )"45:"$( : IP version + IHL + )"$inner_tos:"$( : IP TOS + )"00:54:"$( : IP total length + )"99:83:"$( : IP identification + )"40:00:"$( : IP flags + frag off + )"40:"$( : IP TTL + )"01:"$( : IP proto + )"CHECKSUM:"$( : IP header csum + )"c0:00:02:03:"$( : IP saddr: 192.0.2.3 + )"c0:00:02:01"$( : IP daddr: 192.0.2.1 + ) + local checksum=3D$(payload_template_calc_checksum "$ipv4hdr") + ipv4hdr=3D$(payload_template_expand_checksum "$ipv4hdr" $checksum) + $MZ $dev -c $count -d 100msec -q \ -b $next_hop_mac -B $dest_ip \ -t udp tos=3D$outer_tos,sp=3D23456,dp=3D$VXPORT,p=3D$(: @@ -577,16 +592,7 @@ vxlan_encapped_ping_do() )"$dest_mac:"$( : ETH daddr )"$(mac_get w2):"$( : ETH saddr )"08:00:"$( : ETH type - )"45:"$( : IP version + IHL - )"$inner_tos:"$( : IP TOS - )"00:54:"$( : IP total length - )"99:83:"$( : IP identification - )"40:00:"$( : IP flags + frag off - )"40:"$( : IP TTL - )"01:"$( : IP proto - )"00:00:"$( : IP header csum - )"c0:00:02:03:"$( : IP saddr: 192.0.2.3 - )"c0:00:02:01:"$( : IP daddr: 192.0.2.1 + )"$ipv4hdr:"$( : IPv4 header )"08:"$( : ICMP type )"00:"$( : ICMP code )"8b:f2:"$( : ICMP csum --=20 2.43.0 From nobody Wed Feb 11 03:02:43 2026 Received: from relay.virtuozzo.com (relay.virtuozzo.com [130.117.225.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A1D6B39448B; Tue, 10 Feb 2026 18:51:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=130.117.225.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770749517; cv=none; b=FgK8d3trczvF9LwOOWv1LVSEOLnVYoSZL6fE4e00X+MNRCKsVsGJA24ysII5o/W8f2CvXJ0W6TK/LIstf8LNuyLkjaRISLZ31ex4bOw8z73icOO2+/zciBZ7bUQBcFEB/vRZN2jAVFhEqiBXEzRpPuTLiVRks1xM2EKkWgqmED0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770749517; c=relaxed/simple; bh=E0PbZC8PEYwiRCBXwi6xK0GwQ4bGRsWMgQpxNYKH6NY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=eocgQ4C1xqLX+HCNyoOvYq/IBM6flezVQMvzPoV5YQVU1K9zCbP4Qhzt2c4g9sMu5ozne+scsjJonfUOxHfSkRb3otYbW1A6iAWhQC/phTo0PBILiN1hbQ4QtqrREXe78T+kEuIQ8SqFMx9CIXnPsobRYZG7GboSOuH5qzlP6/8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com; spf=pass smtp.mailfrom=virtuozzo.com; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b=PiMhhJuQ; arc=none smtp.client-ip=130.117.225.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="PiMhhJuQ" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Message-ID:Date:Subject :From; bh=GcQUDSAjUqO9ChaaBwPRlImvElsS6HbUiMepA5nvobY=; b=PiMhhJuQjuZEjYZxgd3 f/YLoRzbz1AmFvJwk8ootRuQw1fBq2f4cgpVC/rwJvMh/u4PwUYwWmRzePgv6r4EqBJRvHnbqEPt8 7rjgbNT2+PHz+wnouPBHfp28NTE2ftuahWKDeoaDEqvqJUVzWvLdeoFt5qmMxSFI8DDoPRXwmBcll mI5Rr+ixjIIlwmEM5S0McuhL/NrfLAJVpOgFWEVKOTntz5yNiY1Bvj7+KY3d/hTlQA4heyuPFyKUe YtB476Gf4PbTCkNzh1CyQAwQU93g06uVi6xDY8/BJIzozt0UtjZ/VW6wM6Z565lC/O9k2s/4Xa5Kk vuSZoFUixIN8UHQ==; Received: from [130.117.225.5] (helo=dev004.aci.vzint.dev) by relay.virtuozzo.com with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vpsp0-00DJJB-11; Tue, 10 Feb 2026 19:51:40 +0100 Received: from dev004.aci.vzint.dev (localhost [127.0.0.1]) by dev004.aci.vzint.dev (8.16.1/8.16.1) with ESMTPS id 61AIpnRh480040 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 10 Feb 2026 18:51:49 GMT Received: (from root@localhost) by dev004.aci.vzint.dev (8.16.1/8.16.1/Submit) id 61AIpnh4480039; Tue, 10 Feb 2026 18:51:49 GMT From: Aleksei Oladko To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , Ido Schimmel , Amit Cohen Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Aleksei Oladko Subject: [PATCH 2/3] selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled Date: Tue, 10 Feb 2026 18:51:28 +0000 Message-ID: <20260210185129.480015-3-aleksey.oladko@virtuozzo.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260210185129.480015-1-aleksey.oladko@virtuozzo.com> References: <20260210185129.480015-1-aleksey.oladko@virtuozzo.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv6 packet has an incorrect payload length set in the IPv6 header. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by setting the correct IPv6 payload length for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh lines 698-706 )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr )"$daddr:"$( : IP daddr )"80:"$( : ICMPv6.type )"00:"$( : ICMPv6.code )"00:"$( : ICMPv6.checksum ) Data after IPv6 header: =E2=80=A2 80: =E2=80=94 1 byte (ICMPv6 type) =E2=80=A2 00: =E2=80=94 1 byte (ICMPv6 code) =E2=80=A2 00: =E2=80=94 1 byte (ICMPv6 checksum, truncated) Total: 3 bytes =E2=86=92 00:03 is correct. The old value 00:08 did not match the actual payload size. Signed-off-by: Aleksei Oladko --- tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh= b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh index a603f7b0a08f..e642feeada0e 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh @@ -695,7 +695,7 @@ vxlan_encapped_ping_do() )"6"$( : IP version )"$inner_tos"$( : Traffic class )"0:00:00:"$( : Flow label - )"00:08:"$( : Payload length + )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr --=20 2.43.0 From nobody Wed Feb 11 03:02:43 2026 Received: from relay.virtuozzo.com (relay.virtuozzo.com [130.117.225.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3B83439A816; Tue, 10 Feb 2026 18:51:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=130.117.225.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770749519; cv=none; b=sK7V9l4PTnsG9wB2uMBlZfPFGObh49EVTIMMRfBM/PA2LguM1/Cs7pIC3NY11RffYCqU2+fjFnys4qelhdrIIlS7oyPx3fdAzPoLjusowNOwzhC94u5KMCZJiR0ypVeKF0kS23r7MyZ2tMxZIdR3NDIrXm5pzWAmKEJ/dzDr96E= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770749519; c=relaxed/simple; bh=i74Zuxfo66vmMqVjJGNwfc07THhDPoiG/0JuRpfvdq8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=bQlG7QW5YleMOyvBDr9c+cQkQAVvIVokmAuiF49lrwsge071FOwqQcmrwuRb2YnTHC4xg+Bl5f4u3H7SWON5qEidaXyKfmrzDEhRpnxawCjC+XrMYNDA5pGLusCMx1HtvngCqSqGCq/p75RUHneDa9KcOxFhwX5g0DMB4qoG/uI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com; spf=pass smtp.mailfrom=virtuozzo.com; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b=Fj4L7dfB; arc=none smtp.client-ip=130.117.225.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="Fj4L7dfB" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Message-ID:Date:Subject :From; bh=ot7Tdf4uDPS0aoShzU4t4fRC4FoKO2YRKcBiMOsi3xI=; b=Fj4L7dfBP/ZqkqDgrNv xCNHvsz099m40/5Ta0eUWaJJxGS1QZl2AqHJnDzz41g47nrVlj/8LMfWAaKER8jxhw9BHJuVE4Tji MoVzfDu9bxYxajatufewxL5OgZtST6BeIU2re8ao99hGWwPPsu2l7E5hvuyv0ne3jaNqbKniFgY6z olq9goozrIYFZcVBwXAn2m2VlSssPJrrIZ+QBLE46Jp5hc+AtOSxJDt5A7RpR29YDRWt4GwCMW276 tHDZ79rJNdZj3BUNPDQZN1ybP6cYA10lY/HGN5jxOaayQtet9tK+IlBW7E29DlsmE4kYBE8tVYx5+ ThYWasZSabKpb5A==; Received: from [130.117.225.5] (helo=dev004.aci.vzint.dev) by relay.virtuozzo.com with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vpsp3-00DJs2-0O; Tue, 10 Feb 2026 19:51:43 +0100 Received: from dev004.aci.vzint.dev (localhost [127.0.0.1]) by dev004.aci.vzint.dev (8.16.1/8.16.1) with ESMTPS id 61AIpqXB480044 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Tue, 10 Feb 2026 18:51:52 GMT Received: (from root@localhost) by dev004.aci.vzint.dev (8.16.1/8.16.1/Submit) id 61AIpq2m480043; Tue, 10 Feb 2026 18:51:52 GMT From: Aleksei Oladko To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , Ido Schimmel , Amit Cohen Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Aleksei Oladko Subject: [PATCH 3/3] selftests: forwarding: fix pedit tests failure with br_netfilter enabled Date: Tue, 10 Feb 2026 18:51:29 +0000 Message-ID: <20260210185129.480015-4-aleksey.oladko@virtuozzo.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260210185129.480015-1-aleksey.oladko@virtuozzo.com> References: <20260210185129.480015-1-aleksey.oladko@virtuozzo.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The tests use the tc pedit action to modify the IPv4 source address ("pedit ex munge ip src set"), but the IP header checksum is not recalculated after the modification. As a result, the modified packet fails sanity checks in br_netfilter after bridging and is dropped, which causes the test to fail. Fix this by adding an explicit checksum recalculation using the "csum ip" action, so the modified packet contains a valid IPv4 checksum. Note on IPv6: The tests in pedit_ip.sh also cover IPv6 (test_ip6_src, test_ip6_dst). The csum ip action is harmless for IPv6 packets since IPv6 has no header checksum =E2=80=94 it will be a no-op. Signed-off-by: Aleksei Oladko --- tools/testing/selftests/net/forwarding/pedit_dsfield.sh | 5 +++-- tools/testing/selftests/net/forwarding/pedit_ip.sh | 2 +- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/tools/testing/selftests/net/forwarding/pedit_dsfield.sh b/tool= s/testing/selftests/net/forwarding/pedit_dsfield.sh index af008fbf2725..310f96fb2274 100755 --- a/tools/testing/selftests/net/forwarding/pedit_dsfield.sh +++ b/tools/testing/selftests/net/forwarding/pedit_dsfield.sh @@ -156,7 +156,7 @@ do_test_pedit_dsfield() local daddr=3D$1; shift =20 tc filter add $pedit_locus handle 101 pref 1 \ - flower action pedit ex munge $pedit_action + flower action pedit ex munge $pedit_action pipe action csum ip tc filter add dev $h2 ingress handle 101 pref 1 prot $match_prot \ flower skip_hw $match_flower action pass =20 @@ -229,7 +229,8 @@ do_test_ip_dscp_ecn() =20 tc filter add $locus handle 101 pref 1 \ flower action pedit ex munge ip dsfield set 124 retain 0xfc \ - action pedit ex munge ip dsfield set 1 retain 0x03 + action pedit ex munge ip dsfield set 1 retain 0x03 \ + pipe action csum ip tc filter add dev $h2 ingress handle 101 pref 1 prot ip \ flower skip_hw ip_tos 125 action pass =20 diff --git a/tools/testing/selftests/net/forwarding/pedit_ip.sh b/tools/tes= ting/selftests/net/forwarding/pedit_ip.sh index d14efb2d23b2..a53ee3b1ef67 100755 --- a/tools/testing/selftests/net/forwarding/pedit_ip.sh +++ b/tools/testing/selftests/net/forwarding/pedit_ip.sh @@ -122,7 +122,7 @@ do_test_pedit_ip() local mz_flags=3D$1; shift =20 tc filter add $pedit_locus handle 101 pref 1 \ - flower action pedit ex munge $pedit_action + flower action pedit ex munge $pedit_action pipe action csum ip tc filter add dev $h2 ingress handle 101 pref 1 prot $match_prot \ flower skip_hw $match_flower action pass =20 --=20 2.43.0