diff options
author | Felix Fietkau <nbd@openwrt.org> | 2015-01-18 00:42:43 +0000 |
---|---|---|
committer | Felix Fietkau <nbd@openwrt.org> | 2015-01-18 00:42:43 +0000 |
commit | 92278f63ecfc4d08872719864c23911c52294925 (patch) | |
tree | 3f2543ac52b298a231e95e4fbd9fdb519e2f05a0 /package | |
parent | 39abef72dc1ac0470b0367ae2aa56947aa67a340 (diff) | |
download | master-187ad058-92278f63ecfc4d08872719864c23911c52294925.tar.gz master-187ad058-92278f63ecfc4d08872719864c23911c52294925.tar.bz2 master-187ad058-92278f63ecfc4d08872719864c23911c52294925.zip |
igmpproxy: add patch to silence unnecessary logging of downstream igmp traffic
This patch adds a simple check to silence logging of messages about
unrecognized igmp packets which originate from devices in local network.
Without this patch igmpproxy floods openwrt syslog with messages such as:
user.warn igmpproxy[19818]: The source address 192.168.1.175 for group
239.255.250.250, is not in any valid net for upstream VIF.
Signed-off-by: Antti Seppälä <a.seppala@gmail.com>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@44020 3c298f89-4303-0410-b956-a3cf2f4a3e73
Diffstat (limited to 'package')
-rw-r--r-- | package/network/services/igmpproxy/patches/020-Silence-downstream-interface-igmp-messages.patch | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/package/network/services/igmpproxy/patches/020-Silence-downstream-interface-igmp-messages.patch b/package/network/services/igmpproxy/patches/020-Silence-downstream-interface-igmp-messages.patch new file mode 100644 index 0000000000..ccd000c638 --- /dev/null +++ b/package/network/services/igmpproxy/patches/020-Silence-downstream-interface-igmp-messages.patch @@ -0,0 +1,19 @@ +--- a/src/igmp.c ++++ b/src/igmp.c +@@ -139,8 +139,14 @@ + return; + } + else if(!isAdressValidForIf(checkVIF, src)) { +- my_log(LOG_WARNING, 0, "The source address %s for group %s, is not in any valid net for upstream VIF.", +- inetFmt(src, s1), inetFmt(dst, s2)); ++ struct IfDesc *downVIF = getIfByAddress(src); ++ if (downVIF && downVIF->state & IF_STATE_DOWNSTREAM) { ++ my_log(LOG_NOTICE, 0, "The source address %s for group %s is from downstream VIF. Ignoring.", ++ inetFmt(src, s1), inetFmt(dst, s2)); ++ } else { ++ my_log(LOG_WARNING, 0, "The source address %s for group %s, is not in any valid net for upstream VIF.", ++ inetFmt(src, s1), inetFmt(dst, s2)); ++ } + return; + } + |