summaryrefslogtreecommitdiff
path: root/target/linux/generic/patches-4.1
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2015-09-08 14:29:55 +0000
committerFelix Fietkau <nbd@openwrt.org>2015-09-08 14:29:55 +0000
commit75744d133d3cd8a81642be885b497d821991000b (patch)
treee40ac2cf2f6cce1cc72d066e1adfb1d221ba41c8 /target/linux/generic/patches-4.1
parente29efa2fb75c2bbe70f5f4027973eab5660db9cc (diff)
downloadmtk-20170518-75744d133d3cd8a81642be885b497d821991000b.zip
mtk-20170518-75744d133d3cd8a81642be885b497d821991000b.tar.gz
mtk-20170518-75744d133d3cd8a81642be885b497d821991000b.tar.bz2
kernel: restore 640-bridge_no_eap_forward.patch to its original form
It was corrupted in r38528. The most obvious symptom is repeated messages like this: Tue Sep 8 08:25:18 2015 kern.warn kernel: [77141.972226] br-lan: received packet on wlan0 with own address as source address Signed-off-by: Dmitry Ivanov <dima@ubnt.com> SVN-Revision: 46821
Diffstat (limited to 'target/linux/generic/patches-4.1')
-rw-r--r--target/linux/generic/patches-4.1/640-bridge_no_eap_forward.patch2
1 files changed, 1 insertions, 1 deletions
diff --git a/target/linux/generic/patches-4.1/640-bridge_no_eap_forward.patch b/target/linux/generic/patches-4.1/640-bridge_no_eap_forward.patch
index 283bc85..d3871eb 100644
--- a/target/linux/generic/patches-4.1/640-bridge_no_eap_forward.patch
+++ b/target/linux/generic/patches-4.1/640-bridge_no_eap_forward.patch
@@ -8,7 +8,7 @@
+ if (skb->protocol == htons(ETH_P_PAE)) {
+ skb2 = skb;
+ /* Do not forward 802.1x/EAP frames */
-+
++ skb = NULL;
+ } else if (is_broadcast_ether_addr(dest)) {
skb2 = skb;
unicast = false;