From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f48.google.com (mail-wr1-f48.google.com [209.85.221.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 726953BD225 for ; Wed, 29 Apr 2026 09:04:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.48 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777453471; cv=none; b=Md3PYSTJHUFSNpKDmmZYWtRKQFHauA5/b7dtNAHkIsk8Q/dmbP2OX9ZvPqmw9iGtWkOE+bHcaBJ26byQBoVVtncvOXRbdqb/gy67OEegS5emsdjB+2dKisuxvJrB78vlA0En24S4ID2lgjUPPE2W1kRFXKRN6UMN/kzm/tQN1Sc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777453471; c=relaxed/simple; bh=qSb3SGcwsDkoHlK03XEymnt83+9LDsaxAxUN607t7f0=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=k8DKysEkLWoQN6RIEyvCXL0XzeZVN5Sd/P1DWaYvCS1Hn7MaaE9AYFm5VIZBKBj0FK1qvZX00X4h9Dh929HnzWDc6pPgpOJD/aobVeKODLYHxirISwNhgRTfnn4eLLZsk6eSHHlKco0U0ZVROD9RCSIPi8w+7XWc60RNiZas8ZY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=blackwall.org; spf=none smtp.mailfrom=blackwall.org; dkim=pass (2048-bit key) header.d=blackwall.org header.i=@blackwall.org header.b=BW2o4e6U; arc=none smtp.client-ip=209.85.221.48 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=blackwall.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=blackwall.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=blackwall.org header.i=@blackwall.org header.b="BW2o4e6U" Received: by mail-wr1-f48.google.com with SMTP id ffacd0b85a97d-43cfd1f9fd1so7658225f8f.3 for ; Wed, 29 Apr 2026 02:04:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=blackwall.org; s=google; t=1777453468; x=1778058268; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=dkrOQ/G+RJZornxNRPNTMjR8gIzBGAkvbEb+2nxyTLg=; b=BW2o4e6UfLPAWck8gz2OITAGDUhrsdTFJBacHejebF3U6qk+YQlr05SJoNP/HvCtAn sqNUHxaol/shN0b//ErMfRquzqvFPKIEP/53E1OkG59rCY+lEdYfAmnTgqm47VSCJHEW s4mbe79bTiOFuD/cQSXMN6s+gdwh11Ly6DyQC7kow+1oHZXBFAeoiOwiiIxN2OISXSj3 AYPJIeedXgFUM+sdDLDu9OaWNp0LeRwPNBoZNpcVzpABEEsBXCz0fO/cN14EghTHaWm9 D0BZnT1eg5Hns0U4oxZLcgqQdmka/11q5qCiV2RwOvS0JbjijI/8B0gDz2zJ2QVUeI5Z vdGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777453468; x=1778058268; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=dkrOQ/G+RJZornxNRPNTMjR8gIzBGAkvbEb+2nxyTLg=; b=JlZ6RAZAfCp4NkW/D3TQbyla2LdGPM2Tn4YvvOvgEK4KVTTJsipcHmhx1FQS9qjwJK ubj+oUpjEKe4arRpai1HaEoLq16hhYjLtqAF2zouR/afj5vL3N4Fue0dLI+WrLqSxQjW tNRkKuxwNcu7d+kjFHXYjn4DcjKTKBQou7OPeErbozRG4HXwL53VW872phHkrP7VaG1z fvSaCGqSyFmIZae9nMm1nWTpHrsH3mRy17cW5jxk0ftKwR5vE6He95zGIXY/J8nUrGAX RFQTGTesMCya6mjT3jd3AkRngiN7NkgGTm7TzuZX/80Tdf9N08RP6eYHz7wj2Hgc4WHT wN8A== X-Forwarded-Encrypted: i=1; AFNElJ87EdS+MOqTahBTXhAgKhkcHv8jcWgfFGEcr5SEccJz0iYJq2LaopYaqIj66s5uYvp6oN9IK71ltns8eo0=@vger.kernel.org X-Gm-Message-State: AOJu0YycexA2gfg/b2vimMwdI80XTNDAN7gTN51UctffX2qhzNY5vghJ ozHfIWFcsWyA+pt8zDIaoUbwnUyP5BXlAr5ixbm0hO4PLh7nJKGFK5im3YXwha4yZKA= X-Gm-Gg: AeBDieu6vnqLtsHfYGFU2IwERzg8P4TJL5e7vM6hUq12IJOx2oeUVw1Wn1haGfpgO5K lYNoeODIvVlIrNXRG9kpBR4CM0LFA3u00x1VtslehLKTRs8SiiwsaOel46cX8kCrbyjYZhYOI51 cBDcQfmHHy5hFLX8B82P7jDe2B3dEbvVfywCN0iEtkmcXD5CsfjXjCEg39tdENeqWNuPFcSgXtr SEVkF0O1p29FlLuM6hrxy1552LtGfTLocRUBPSqmC9NelyDu3l66xo132W2EQK+aC5fVXhU+cgl yfklv6lPauzvUIYmxDgTIlbLSwWAP5dK+zDAQnYaD3HPNzXJix+kVhPnr/GzVS66NvMpgpRBUDN h3zP0anIgS3y4Q9A3IZq6Yn+13HYvT6uKa4kzlKRXGPuJzc9SxAS6FGXIJVw9BfI9rkaH2+k6Xg 7Vvkvp1kmx2YpFeqJ+quJDzbfpgtfx/pXn7a7xRfNUnoo7E8GOW7ylbd5SUCU4ixgP X-Received: by 2002:a05:600c:4645:b0:48a:7aad:4425 with SMTP id 5b1f17b1804b1-48a7aad4537mr42583695e9.3.1777453467792; Wed, 29 Apr 2026 02:04:27 -0700 (PDT) Received: from [192.168.0.161] (78-154-15-182.ip.btc-net.bg. [78.154.15.182]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-48a7c2d3811sm20967725e9.3.2026.04.29.02.04.25 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 29 Apr 2026 02:04:26 -0700 (PDT) Message-ID: Date: Wed, 29 Apr 2026 12:04:25 +0300 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH net-next 2/2] selftests: net: Add tests for ARP probe and DAD NS handling Content-Language: en-US, bg To: Danielle Ratson , netdev@vger.kernel.org Cc: idosch@nvidia.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, horms@kernel.org, shuah@kernel.org, bridge@lists.linux.dev, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org References: <20260429062405.1386417-1-danieller@nvidia.com> <20260429062405.1386417-3-danieller@nvidia.com> From: Nikolay Aleksandrov In-Reply-To: <20260429062405.1386417-3-danieller@nvidia.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 29/04/2026 09:24, Danielle Ratson wrote: > Add test cases to verify that ARP probes and DAD Neighbor Solicitations > are handled correctly by the bridge neighbor suppression feature. > > When neighbor suppression is enabled on a bridge VXLAN port, the bridge > should reply to ARP/NS messages on behalf of remote hosts when both FDB > and neighbor entries exist, and the answer is known. However, when > either the FDB or the neighbor exists, ARP probes / DAD NS should be > treated like regular ARP requests / NS and flood to VXLAN. > > Add two new test functions: > > neigh_suppress_arp_probe(): Tests ARP probe handling by triggering > duplicate address detection using arping -D. Verifies that probes are > flooded when the bridge doesn't know the answer, and suppressed when FDB > and neighbor entries exist. > > neigh_suppress_dad_ns(): Tests DAD NS handling by constructing DAD NS > packets using mausezahn and verifies correct flooding/suppression > behavior. > > Before the previous patch: > > $ ./test_bridge_neigh_suppress.sh -t "neigh_suppress_arp_probe neigh_suppress_dad_ns" > > Per-port ARP probe suppression > ------------------------------ > TEST: ARP probe suppression [ OK ] > TEST: "neigh_suppress" is on [ OK ] > TEST: ARP probe suppression [FAIL] > TEST: FDB and neighbor entry installation [ OK ] > TEST: arping [FAIL] > TEST: ARP probe suppression [FAIL] > TEST: neighbor removal [ OK ] > TEST: ARP probe suppression [FAIL] > TEST: "neigh_suppress" is off [ OK ] > TEST: ARP probe suppression [FAIL] > > Per-port DAD NS suppression > --------------------------- > TEST: DAD NS suppression [ OK ] > TEST: "neigh_suppress" is on [ OK ] > TEST: DAD NS suppression [FAIL] > TEST: FDB and neighbor entry installation [ OK ] > TEST: DAD NS suppression [FAIL] > TEST: neighbor removal [ OK ] > TEST: DAD NS suppression [FAIL] > TEST: DAD NS proxy NA reply [FAIL] > TEST: "neigh_suppress" is off [ OK ] > TEST: DAD NS suppression [FAIL] > > Tests passed: 10 > Tests failed: 10 > > After the previous patch: > > $ ./test_bridge_neigh_suppress.sh -t "neigh_suppress_arp_probe neigh_suppress_dad_ns" > > Per-port ARP probe suppression > ------------------------------ > TEST: ARP probe suppression [ OK ] > TEST: "neigh_suppress" is on [ OK ] > TEST: ARP probe suppression [ OK ] > TEST: FDB and neighbor entry installation [ OK ] > TEST: arping [ OK ] > TEST: ARP probe suppression [ OK ] > TEST: neighbor removal [ OK ] > TEST: ARP probe suppression [ OK ] > TEST: "neigh_suppress" is off [ OK ] > TEST: ARP probe suppression [ OK ] > > Per-port DAD NS suppression > --------------------------- > TEST: DAD NS suppression [ OK ] > TEST: "neigh_suppress" is on [ OK ] > TEST: DAD NS suppression [ OK ] > TEST: FDB and neighbor entry installation [ OK ] > TEST: DAD NS suppression [ OK ] > TEST: neighbor removal [ OK ] > TEST: DAD NS suppression [ OK ] > TEST: DAD NS proxy NA reply [ OK ] > TEST: "neigh_suppress" is off [ OK ] > TEST: DAD NS suppression [ OK ] > > Tests passed: 20 > Tests failed: 0 > > Signed-off-by: Danielle Ratson > --- > .../net/test_bridge_neigh_suppress.sh | 126 ++++++++++++++++++ > 1 file changed, 126 insertions(+) > Acked-by: Nikolay Aleksandrov