From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH] bridge: Add support for IEEE 802.11 Proxy ARP Date: Mon, 27 Oct 2014 19:02:23 -0400 (EDT) Message-ID: <20141027.190223.1203268588698497070.davem@davemloft.net> References: <1414100957-8288-1-git-send-email-kyeyoonp@qca.qualcomm.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: jouni@qca.qualcomm.com, netdev@vger.kernel.org To: kyeyoonp@qca.qualcomm.com Return-path: Received: from shards.monkeyblade.net ([149.20.54.216]:51682 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752297AbaJ0XCY (ORCPT ); Mon, 27 Oct 2014 19:02:24 -0400 In-Reply-To: <1414100957-8288-1-git-send-email-kyeyoonp@qca.qualcomm.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Kyeyoon Park Date: Thu, 23 Oct 2014 14:49:17 -0700 > From: Kyeyoon Park > > This feature is defined in IEEE Std 802.11-2012, 10.23.13. It allows > the AP devices to keep track of the hardware-address-to-IP-address > mapping of the mobile devices within the WLAN network. > > The AP will learn this mapping via observing DHCP, ARP, and NS/NA > frames. When a request for such information is made (i.e. ARP request, > Neighbor Solicitation), the AP will respond on behalf of the > associated mobile device. In the process of doing so, the AP will drop > the multicast request frame that was intended to go out to the wireless > medium. > > It was recommended at the LKS workshop to do this implementation in > the bridge layer. vxlan.c is already doing something very similar. > The DHCP snooping code will be added to the userspace application > (hostapd) per the recommendation. > > This RFC commit is only for IPv4. A similar approach in the bridge > layer will be taken for IPv6 as well. > > Signed-off-by: Kyeyoon Park Looks good to me, applied, thanks.