From: Phil Young Date: Mon, 5 Aug 2019 19:37:10 +0000 (-0400) Subject: stream: fix bypass callback for stream.depth X-Git-Tag: suricata-5.0.0-rc1~74 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=8aeff8f97334e3f8238d7af22a8ab6d94fad4573;p=thirdparty%2Fsuricata.git stream: fix bypass callback for stream.depth Fix bug with bypass callback when called with stream depth threshold. bug report: https://redmine.openinfosecfoundation.org/issues/2986 --- diff --git a/src/stream-tcp.c b/src/stream-tcp.c index c8b4e7df4c..2f795bdc39 100644 --- a/src/stream-tcp.c +++ b/src/stream-tcp.c @@ -4873,7 +4873,7 @@ int StreamTcpPacket (ThreadVars *tv, Packet *p, StreamTcpThread *stt, /* check for conditions that may make us not want to log this packet */ /* streams that hit depth */ - if ((ssn->client.flags & STREAMTCP_STREAM_FLAG_DEPTH_REACHED) && + if ((ssn->client.flags & STREAMTCP_STREAM_FLAG_DEPTH_REACHED) || (ssn->server.flags & STREAMTCP_STREAM_FLAG_DEPTH_REACHED)) { /* we can call bypass callback, if enabled */