http://bugs.winehq.org/show_bug.cgi?id=12302 --- Comment #48 from Mikko Korkalo <mikko(a)korkalo.fi> 2008-07-07 20:44:10 --- (In reply to comment #47)
I propose a very simple hack that detects when the same packet is being sent within a 1 second time frame that will simply drop the additional packets.
This could work. I guess it would be easiest to write this as a netfilter match module. For example: iptables -A FORWARD -s 1.2.3.4 -p udp -m multiport --dports x,y,z -m length --length 1:100 -m filterdupes -j DROP Since the packets are so small, I guess checksumming them by CPU wouldn't be a problem. Another method could be to always cache the last packet, and once a new packet is queued, do a byte by byte comparision (probably faster than checksumming?). Sounds doable, assuming that the additional scanning won't cause too much CPU load. I would start off by fetching and modifying source code for some simple match module, such as "length". -- Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email Do not reply to this email, post in Bugzilla using the above URL to reply. ------- You are receiving this mail because: ------- You are watching all bug changes.