From nobody Fri Apr 17 21:54:36 2026 Received: from relay.virtuozzo.com (relay.virtuozzo.com [130.117.225.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id DD00923536B; Fri, 13 Feb 2026 13:19:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=130.117.225.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770988771; cv=none; b=l/UvKuIe4Sc+FmqUgsloj7R7xmbVuwwE5DAKu1phnMVPdETXHJdDnd1nFYZmWf1nZfz33GRNRm5FLm+GiH1YKBCcObNs4KPmgj6ntx8QMB72yB1cXpYwpqUTP3ObN1WOK81dHvzhRBV2aBWq5asF8Nme6MZdWcL7+1dY+cT8818= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770988771; c=relaxed/simple; bh=vZzuCDwXSBbJSRkdH+RytmQj0C3INjcJ1OcEAXtUvpQ=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=TYFNiwIi6zggd0nK4UBzTWei5J3wE7765V7v3qxM73SyOiAv4UmJmWD3xBfcZNQugr3ct9g0vUQjQemScNmA48i+L8oKfXIcCiyGg2BggIxDQmTPeLYj9Krph6yI5dk7WC5Mq1RJMbWMxo37PObk/YM7zd56ZsrUzmXcbSgQE2A= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com; spf=pass smtp.mailfrom=virtuozzo.com; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b=WzQW+k/s; arc=none smtp.client-ip=130.117.225.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="WzQW+k/s" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=MIME-Version:Message-ID:Date:Subject:From: Content-Type; bh=mMzKmUnXIqEs0GkFahmVZ4wldSpKVM7NEynNeSohp+s=; b=WzQW+k/sfsO6 LLZkQQpHpPSnuJECdDkX1DUp+CbVW1G3cyR4dOitqhSLaco9T4hwf9ItVeMkzW4sgO1hgpS0IDmb0 Xp3VI/cl2jFEYZrPq8GDjUBh6OIv81WQJBcp9+t01SA+54kuTY0q2ESrabdbYWGxbEt4kcQodx5g2 y5/uN74FU/BmodNFx0AWEnrHmu+EW44vL4tX0l9KmTFrq1lSFxneVG6wfwCIaKYGAV8V3/cZfw6Ha mcRAx5uFwjaYpLauf2+eSaB5Xc0P8FRcfSLzqHQ/RqQiqBF1BhwRjRhB5nP8f0ntOFdw/CH2iWlUB PoZeGUyA0Km4NnUZ7oop6g==; Received: from [130.117.225.5] (helo=dev004.aci.vzint.dev) by relay.virtuozzo.com with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vqt3h-0014LK-0j; Fri, 13 Feb 2026 14:19:09 +0100 Received: from dev004.aci.vzint.dev (localhost [127.0.0.1]) by dev004.aci.vzint.dev (8.16.1/8.16.1) with ESMTPS id 61DDJCKk043372 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Fri, 13 Feb 2026 13:19:12 GMT Received: (from root@localhost) by dev004.aci.vzint.dev (8.16.1/8.16.1/Submit) id 61DDJCBo043371; Fri, 13 Feb 2026 13:19:12 GMT From: Aleksei Oladko To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , Ido Schimmel , Amit Cohen Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Aleksei Oladko Subject: [PATCH net v2 1/3] selftests: forwarding: vxlan_bridge_1d: fix test failure with br_netfilter enabled Date: Fri, 13 Feb 2026 13:19:05 +0000 Message-ID: <20260213131907.43351-2-aleksey.oladko@virtuozzo.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260213131907.43351-1-aleksey.oladko@virtuozzo.com> References: <20260213131907.43351-1-aleksey.oladko@virtuozzo.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv4 packet contains a zero IP header checksum. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by calculating and setting a valid IPv4 header checksum for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. Fixed by using the payload_template_calc_checksum() / payload_template_expand_checksum() helpers that are only available in v6.3 and newer kernels. Fixes: a0b61f3d8ebf ("selftests: forwarding: vxlan_bridge_1d: Add an ECN de= cap test") Signed-off-by: Aleksei Oladko Reviewed-by: Ido Schimmel --- .../net/forwarding/vxlan_bridge_1d.sh | 26 ++++++++++++------- 1 file changed, 16 insertions(+), 10 deletions(-) diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh b/to= ols/testing/selftests/net/forwarding/vxlan_bridge_1d.sh index b43816dd998c..457f41d5e584 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d.sh @@ -567,6 +567,21 @@ vxlan_encapped_ping_do() local inner_tos=3D$1; shift local outer_tos=3D$1; shift =20 + local ipv4hdr=3D$(: + )"45:"$( : IP version + IHL + )"$inner_tos:"$( : IP TOS + )"00:54:"$( : IP total length + )"99:83:"$( : IP identification + )"40:00:"$( : IP flags + frag off + )"40:"$( : IP TTL + )"01:"$( : IP proto + )"CHECKSUM:"$( : IP header csum + )"c0:00:02:03:"$( : IP saddr: 192.0.2.3 + )"c0:00:02:01"$( : IP daddr: 192.0.2.1 + ) + local checksum=3D$(payload_template_calc_checksum "$ipv4hdr") + ipv4hdr=3D$(payload_template_expand_checksum "$ipv4hdr" $checksum) + $MZ $dev -c $count -d 100msec -q \ -b $next_hop_mac -B $dest_ip \ -t udp tos=3D$outer_tos,sp=3D23456,dp=3D$VXPORT,p=3D$(: @@ -577,16 +592,7 @@ vxlan_encapped_ping_do() )"$dest_mac:"$( : ETH daddr )"$(mac_get w2):"$( : ETH saddr )"08:00:"$( : ETH type - )"45:"$( : IP version + IHL - )"$inner_tos:"$( : IP TOS - )"00:54:"$( : IP total length - )"99:83:"$( : IP identification - )"40:00:"$( : IP flags + frag off - )"40:"$( : IP TTL - )"01:"$( : IP proto - )"00:00:"$( : IP header csum - )"c0:00:02:03:"$( : IP saddr: 192.0.2.3 - )"c0:00:02:01:"$( : IP daddr: 192.0.2.1 + )"$ipv4hdr:"$( : IPv4 header )"08:"$( : ICMP type )"00:"$( : ICMP code )"8b:f2:"$( : ICMP csum --=20 2.43.0 From nobody Fri Apr 17 21:54:36 2026 Received: from relay.virtuozzo.com (relay.virtuozzo.com [130.117.225.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 430403612C6; Fri, 13 Feb 2026 13:19:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=130.117.225.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770988773; cv=none; b=oG/JEKS66+i840/ANpGAO7I1g14QDKpyY/MsNbA068V6SmLDBuRmxtxOM9cJplovHyr8c3zRSQaC6ttRLlIEczNa7nf1fX7kDDp3+KMn6bvqOAXseK7CACfMDgi9oDfq/FTq5r0WelL6j0ImGhFqvgTyT+60xBFmRhxT4azOz1U= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770988773; c=relaxed/simple; bh=aTQp/zyjnqK+F4n9sQEiYeJ9BCTTzUFxjX7jS1gMBuI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=hLHZHa/eJekGQSQIE+3GRP0oLUrqSGReLSA+FLjGNfd+WCarm9XKMhaQBlzK2Omth2nAxwSwKQGejVl9sCVspVrsIPkWzNal2UGC73jAY62HC/KAzkNqqq0CCbOq8Rw513u5r6pgnRhni7kxECXRy07kYPV64Bc676zf7+4iSUc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com; spf=pass smtp.mailfrom=virtuozzo.com; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b=R1SI2uHM; arc=none smtp.client-ip=130.117.225.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="R1SI2uHM" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Message-ID:Date:Subject :From; bh=3dcgH54XGCiGXjMM23OKe+wBbg4H7up+izK/yXH9e+s=; b=R1SI2uHM4lXKKK2IEuC 5D7et8O7NFoyDL99W6mVqYbUu92qQuJL1sCNZSiiTT4fu3DfFLq5P2P1i8dUzkjQ1Ub2xKMHHE0/+ ndGozLtWngOaZ/tbe5UrwlR4PXT9bJ1/GEgnlXTLsJk4NIS47f5x/fLiTo1JwMkFxwiBj5B+GsBMv iEn0rmr/bjiBp4DRcastJMdV2cCLexkmb8/VU9h/3MX+jE5YdVCZ9yWeHq2dxtvP8JjEtgQSpaeGo p+5YJ/bV5sN+GCXprbZZlL35NZyLidegsLQTJs8k+gTnge7q85u2kbKpiVJ9mRKX3jvwem2Ub3Eni C7CG9Za+Lh3uEEw==; Received: from [130.117.225.5] (helo=dev004.aci.vzint.dev) by relay.virtuozzo.com with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vqt3o-0014La-14; Fri, 13 Feb 2026 14:19:17 +0100 Received: from dev004.aci.vzint.dev (localhost [127.0.0.1]) by dev004.aci.vzint.dev (8.16.1/8.16.1) with ESMTPS id 61DDJJpe043376 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Fri, 13 Feb 2026 13:19:19 GMT Received: (from root@localhost) by dev004.aci.vzint.dev (8.16.1/8.16.1/Submit) id 61DDJE7F043375; Fri, 13 Feb 2026 13:19:14 GMT From: Aleksei Oladko To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , Ido Schimmel , Amit Cohen Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Aleksei Oladko Subject: [PATCH net v2 2/3] selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled Date: Fri, 13 Feb 2026 13:19:06 +0000 Message-ID: <20260213131907.43351-3-aleksey.oladko@virtuozzo.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260213131907.43351-1-aleksey.oladko@virtuozzo.com> References: <20260213131907.43351-1-aleksey.oladko@virtuozzo.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The test generates VXLAN traffic using mausezahn, where the encapsulated inner IPv6 packet has an incorrect payload length set in the IPv6 header. After VXLAN decapsulation, such packets do not pass sanity checks in br_netfilter and are dropped, which causes the test to fail. Fix this by setting the correct IPv6 payload length for the encapsulated packet generated by mausezahn, so that the packet is accepted by br_netfilter. tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh lines 698-706 )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr )"$daddr:"$( : IP daddr )"80:"$( : ICMPv6.type )"00:"$( : ICMPv6.code )"00:"$( : ICMPv6.checksum ) Data after IPv6 header: =E2=80=A2 80: =E2=80=94 1 byte (ICMPv6 type) =E2=80=A2 00: =E2=80=94 1 byte (ICMPv6 code) =E2=80=A2 00: =E2=80=94 1 byte (ICMPv6 checksum, truncated) Total: 3 bytes =E2=86=92 00:03 is correct. The old value 00:08 did not match the actual payload size. Fixes: b07e9957f220 ("selftests: forwarding: Add VxLAN tests with a VLAN-un= aware bridge for IPv6") Signed-off-by: Aleksei Oladko Reviewed-by: Ido Schimmel --- tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh= b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh index a603f7b0a08f..e642feeada0e 100755 --- a/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh +++ b/tools/testing/selftests/net/forwarding/vxlan_bridge_1d_ipv6.sh @@ -695,7 +695,7 @@ vxlan_encapped_ping_do() )"6"$( : IP version )"$inner_tos"$( : Traffic class )"0:00:00:"$( : Flow label - )"00:08:"$( : Payload length + )"00:03:"$( : Payload length )"3a:"$( : Next header )"04:"$( : Hop limit )"$saddr:"$( : IP saddr --=20 2.43.0 From nobody Fri Apr 17 21:54:36 2026 Received: from relay.virtuozzo.com (relay.virtuozzo.com [130.117.225.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 09B4135E556; Fri, 13 Feb 2026 13:19:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=130.117.225.111 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770988774; cv=none; b=tXztPDA5yq9CwElP0yx6W40XG1OReCyRsZxo7Cz1C5/mV6st/I6gBGRjFSXIH3jWIaKoe95YYwQsLPI98gDmhVaZO8lWtHIN0+Aibg97Hf4x2mgXTS7BfkxvbPLUomMzSXxGlBdMG/PcEeoj24yc00UR7d5GyL0V6+54J3A6Mi0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770988774; c=relaxed/simple; bh=zsFmpWRix+LX588rlGbg6RBUWzdhefraJWHeWfHLV1w=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=bItmAaG1HWqhyxbuzOGuZyLnvxVd2lodr5MvfGMHaDRGPu2OlAnnB9JSHYEdhkpch1AVbJbwoHKDD7YEA0cQufGYEcGmmh+V8c8p4k9RRhtEetMKeW95eELAOXyMXi2uerxCMjMjPnz0KpSB3t1WvWrEKrG8MeOadDCi9hqheq4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com; spf=pass smtp.mailfrom=virtuozzo.com; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b=vcx5qEIk; arc=none smtp.client-ip=130.117.225.111 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=virtuozzo.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=virtuozzo.com header.i=@virtuozzo.com header.b="vcx5qEIk" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=MIME-Version:Message-ID:Date:Subject:From: Content-Type; bh=piwRbugQuOmQuGtJk8tRpvV4jIE0EEmGxdDcUHa7eBo=; b=vcx5qEIkAXrS YE3sK4gNDRaXMxbJfLFNNfEkcluDoIBYMdiE6TfGKjYkK+CGurjlUPi5rXMbgZrjDo5VD8HNJzaiO 9hxNeghRJQejGf2L1uxUinF6jhCRsngM/GOGaYV88m9xZDWota5RDxvQG2UdrPQgX8K07jh4mq0dp 1x3oyn9z4RJ+sc3/uHMu933GUyf55MxK13tQeJ0vAg7KD7bbqwdslawPv9FJcV6PhZ+BDkfUufs9c LBXpN2AnLqPv6toGmyfS9Xwlg8RJBsdl+k9MO/YrrSsknuJwBLiR4HdJYeRJouMkcyyW5gF9z2G+Q raDkh1JlNYfIM/DapxaB8Q==; Received: from [130.117.225.5] (helo=dev004.aci.vzint.dev) by relay.virtuozzo.com with esmtps (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96) (envelope-from ) id 1vqt3q-0014Lj-0R; Fri, 13 Feb 2026 14:19:18 +0100 Received: from dev004.aci.vzint.dev (localhost [127.0.0.1]) by dev004.aci.vzint.dev (8.16.1/8.16.1) with ESMTPS id 61DDJLDR043380 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT); Fri, 13 Feb 2026 13:19:21 GMT Received: (from root@localhost) by dev004.aci.vzint.dev (8.16.1/8.16.1/Submit) id 61DDJLRU043379; Fri, 13 Feb 2026 13:19:21 GMT From: Aleksei Oladko To: "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Shuah Khan , Petr Machata , Ido Schimmel , Amit Cohen Cc: netdev@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Aleksei Oladko Subject: [PATCH net v2 3/3] selftests: forwarding: fix pedit tests failure with br_netfilter enabled Date: Fri, 13 Feb 2026 13:19:07 +0000 Message-ID: <20260213131907.43351-4-aleksey.oladko@virtuozzo.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260213131907.43351-1-aleksey.oladko@virtuozzo.com> References: <20260213131907.43351-1-aleksey.oladko@virtuozzo.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The tests use the tc pedit action to modify the IPv4 source address ("pedit ex munge ip src set"), but the IP header checksum is not recalculated after the modification. As a result, the modified packet fails sanity checks in br_netfilter after bridging and is dropped, which causes the test to fail. Fix this by ensuring net.bridge.bridge-nf-call-iptables is set to 0 during the test execution. This prevents the bridge from passing L2 traffic to netfilter, bypasing the checksum validation that causes the test failure. Fixes: 92ad3828944e ("selftests: forwarding: Add a test for pedit munge SIP= and DIP") Fixes: 226657ba2389 ("selftests: forwarding: Add a forwarding test for pedi= t munge dsfield") Signed-off-by: Aleksei Oladko Reviewed-by: Ido Schimmel --- tools/testing/selftests/net/forwarding/pedit_dsfield.sh | 8 ++++++++ tools/testing/selftests/net/forwarding/pedit_ip.sh | 8 ++++++++ 2 files changed, 16 insertions(+) diff --git a/tools/testing/selftests/net/forwarding/pedit_dsfield.sh b/tool= s/testing/selftests/net/forwarding/pedit_dsfield.sh index af008fbf2725..eb2d8034de9c 100755 --- a/tools/testing/selftests/net/forwarding/pedit_dsfield.sh +++ b/tools/testing/selftests/net/forwarding/pedit_dsfield.sh @@ -98,12 +98,20 @@ setup_prepare() h1_create h2_create switch_create + + if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then + sysctl_set net.bridge.bridge-nf-call-iptables 0 + fi } =20 cleanup() { pre_cleanup =20 + if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then + sysctl_restore net.bridge.bridge-nf-call-iptables + fi + switch_destroy h2_destroy h1_destroy diff --git a/tools/testing/selftests/net/forwarding/pedit_ip.sh b/tools/tes= ting/selftests/net/forwarding/pedit_ip.sh index d14efb2d23b2..9235674627ab 100755 --- a/tools/testing/selftests/net/forwarding/pedit_ip.sh +++ b/tools/testing/selftests/net/forwarding/pedit_ip.sh @@ -91,12 +91,20 @@ setup_prepare() h1_create h2_create switch_create + + if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then + sysctl_set net.bridge.bridge-nf-call-iptables 0 + fi } =20 cleanup() { pre_cleanup =20 + if [ -f /proc/sys/net/bridge/bridge-nf-call-iptables ]; then + sysctl_restore net.bridge.bridge-nf-call-iptables + fi + switch_destroy h2_destroy h1_destroy --=20 2.43.0