mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-08 05:34:58 +02:00
ipp2p: remove log flooding
Syslog was flooded by lots of messages due to if (plen >= 5) firing on any packet, when it should have been plen < 5. Incidentally, this turned up that plen also takes on huge nonsense values, assuming underflow - yet to be investigated.
This commit is contained in:
@@ -603,8 +603,13 @@ search_all_kazaa(const unsigned char *payload, const unsigned int plen)
|
|||||||
{
|
{
|
||||||
uint16_t c, end, rem;
|
uint16_t c, end, rem;
|
||||||
|
|
||||||
if (plen >= 5) {
|
if (plen < 5)
|
||||||
printk(KERN_WARNING KBUILD_MODNAME ": %s: plen (%u) < 5\n",
|
/* too short for anything we test for - early bailout */
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (plen >= 65535) {
|
||||||
|
/* Something seems _really_ fishy */
|
||||||
|
printk(KERN_WARNING KBUILD_MODNAME ": %s: plen (%u) >= 65535\n",
|
||||||
__func__, plen);
|
__func__, plen);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user