From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 494E8841F0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 51244841F3 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1682063430; bh=6/y8G0ZiqPAifVh+i5PDY7VpETrfy1glOu1IyKXJtnA=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=UOgmSicvboaxb7lj0j+c2vpcta80Fwxh3175QxIhJq1cMJj4taQBfY5hcLH50oR4v 4bQ9MPXU63G9zLBtVFT1sN0MDJLiw+FAh6QOb3EnVGLA41N10es7RPuAHpWSBDxYsG ygXnTDlKwrWoC09NCADZAJihpsmkgmVkiRlvPIOgl6dx65v8xo+65eYVTa7n3sUxmh 1zAXIc6dGzoCMxT2WDeughA+zEg/X4Hor3pUv5RoasA5zp8CFX6BAmcj9NYaDYI8pk /csAwyLvML6J9cmhaZmQ+T/NaBj3FcuYq9DlgDwNkbSmMBpeNeMSSDeCnOzNq5JoqU Eo8sSYW8ZOITg== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: patchwork-bot+netdevbpf@kernel.org Message-Id: <168206343031.30967.17590346122475626236.git-patchwork-notify@kernel.org> Date: Fri, 21 Apr 2023 07:50:30 +0000 References: <20230419153500.2655036-1-idosch@nvidia.com> In-Reply-To: <20230419153500.2655036-1-idosch@nvidia.com> Subject: Re: [Bridge] [PATCH net-next v2 0/9] bridge: Add per-{Port, VLAN} neighbor suppression List-Id: Linux Ethernet Bridging List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Ido Schimmel Cc: netdev@vger.kernel.org, razor@blackwall.org, bridge@lists.linux-foundation.org, edumazet@google.com, mlxsw@nvidia.com, roopa@nvidia.com, kuba@kernel.org, pabeni@redhat.com, davem@davemloft.net Hello: This series was applied to netdev/net-next.git (main) by David S. Miller : On Wed, 19 Apr 2023 18:34:51 +0300 you wrote: > Background > ========== > > In order to minimize the flooding of ARP and ND messages in the VXLAN > network, EVPN includes provisions [1] that allow participating VTEPs to > suppress such messages in case they know the MAC-IP binding and can > reply on behalf of the remote host. In Linux, the above is implemented > in the bridge driver using a per-port option called "neigh_suppress" > that was added in kernel version 4.15 [2]. > > [...] Here is the summary with links: - [net-next,v2,1/9] bridge: Reorder neighbor suppression check when flooding https://git.kernel.org/netdev/net-next/c/013a7ce81dd8 - [net-next,v2,2/9] bridge: Pass VLAN ID to br_flood() https://git.kernel.org/netdev/net-next/c/e408336a693e - [net-next,v2,3/9] bridge: Add internal flags for per-{Port, VLAN} neighbor suppression https://git.kernel.org/netdev/net-next/c/a714e3ec2308 - [net-next,v2,4/9] bridge: Take per-{Port, VLAN} neighbor suppression into account https://git.kernel.org/netdev/net-next/c/6be42ed0a5f4 - [net-next,v2,5/9] bridge: Encapsulate data path neighbor suppression logic https://git.kernel.org/netdev/net-next/c/3aca683e0654 - [net-next,v2,6/9] bridge: Add per-{Port, VLAN} neighbor suppression data path support https://git.kernel.org/netdev/net-next/c/412614b1457a - [net-next,v2,7/9] bridge: vlan: Allow setting VLAN neighbor suppression state https://git.kernel.org/netdev/net-next/c/83f6d600796c - [net-next,v2,8/9] bridge: Allow setting per-{Port, VLAN} neighbor suppression state https://git.kernel.org/netdev/net-next/c/160656d7201d - [net-next,v2,9/9] selftests: net: Add bridge neighbor suppression test https://git.kernel.org/netdev/net-next/c/7648ac72dcd7 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html