diff options
author | Pablo Neira Ayuso <pablo@netfilter.org> | 2009-07-22 20:28:56 +0200 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2009-07-22 20:28:56 +0200 |
commit | 9315d767d8e00e84c24a46ed01cea4b0e814fc8e (patch) | |
tree | ea276feec1a1a0a604c14c4ee35a2f73f4607e27 /input/flow | |
parent | f4a480e7cb3ed06b004e9d37f803ca35a7f334e1 (diff) |
NFCT: avoid spamming report about netlink overruns
This patch reduces the verbosity of the log messages that report
netlink overruns.
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'input/flow')
-rw-r--r-- | input/flow/ulogd_inpflow_NFCT.c | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/input/flow/ulogd_inpflow_NFCT.c b/input/flow/ulogd_inpflow_NFCT.c index f7e84ac..8d6347f 100644 --- a/input/flow/ulogd_inpflow_NFCT.c +++ b/input/flow/ulogd_inpflow_NFCT.c @@ -650,12 +650,18 @@ static int setnlbufsiz(struct ulogd_pluginstance *upi, int size) { struct nfct_pluginstance *cpi = (struct nfct_pluginstance *)upi->private; + static int warned = 0; if (size < nlsockbufmaxsize_ce(upi->config_kset).u.value) { cpi->nlbufsiz = nfnl_rcvbufsiz(nfct_nfnlh(cpi->cth), size); return 1; } + /* we have already warned the user, do not keep spamming */ + if (warned) + return 0; + + warned = 1; ulogd_log(ULOGD_NOTICE, "Maximum buffer size (%d) in NFCT has been " "reached. Please, consider rising " "`netlink_socket_buffer_size` and " @@ -670,6 +676,7 @@ static int read_cb_nfct(int fd, unsigned int what, void *param) struct ulogd_pluginstance *upi = container_of(param, struct ulogd_pluginstance, private); + static int warned = 0; if (!(what & ULOGD_FD_READ)) return 0; @@ -684,7 +691,8 @@ static int read_cb_nfct(int fd, unsigned int what, void *param) "increasing buffer size " "to %d\n", cpi->nlbufsiz); } - } else { + } else if (!warned) { + warned = 1; ulogd_log(ULOGD_NOTICE, "We are losing events. Please, " "consider using the clauses " |