Skip to content
Snippets Groups Projects
Select Git revision
  • 047d0cf54c63eb5ba994aebc45989c6df8d2abc1
  • experimental default protected
  • v2023.2.5-ffs
  • nrb/ex400-remove-wps
  • nrb/airmax-test
  • v2023.2.4-ffs
  • nrb/ar9344-reset-sequence
  • autinerd/experimental-openwrt-24.10
  • v2023.2.3-ffs
  • v2023.2.2-ffs
  • v2023.2-ffs
  • v2023.1-ffs
  • v2022.1.4-ffs
  • feature/addMikrotikwAP
  • v2022.1.3-ffs
  • v2021.1.2-ffs
  • v2022.1.1-ffs
  • master protected
  • v2021.1.1-ffs
  • nrb/gluon-master-cpe510
  • v2021.1-ffs
  • experimental-2025-08-29
  • experimental-2025-08-29-base
  • experimental-2025-08-26
  • experimental-2025-08-26-base
  • experimental-2025-08-25
  • experimental-2025-08-25-base
  • experimental-2025-08-20
  • experimental-2025-08-20-base
  • experimental-2025-08-13
  • experimental-2025-08-13-base
  • experimental-2025-08-04
  • experimental-2025-08-04-base
  • experimental-2025-07-31
  • experimental-2025-07-31-base
  • experimental-2025-07-29
  • experimental-2025-07-29-base
  • experimental-2025-07-28
  • experimental-2025-07-28-base
  • experimental-2025-07-26
  • experimental-2025-07-26-base
41 results

gluon

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Matthias Schiffer authored and github-actions[bot] committed
    An incorrectly connected node may send wired-mesh packets to another
    node's client port. For raw batman-adv, such frames are filtered by
    batman-adv, but this does not work with VXLAN encapsulation.
    
    While such packets are not flooded through the mesh because of the
    batman-adv noflood flag, they may still reach another node that is
    connected in the same incorrect way, which could result in loops and
    other connectivity issues.
    
    Filter out packets sent to our VXLAN multicast group address to avoid
    such problems.
    
    Fixes #3025
    
    (cherry picked from commit 090bcda7)
    7303e846
    History
    Name Last commit Last update