Fix: network instrumentation handling of corrupted TCP headers
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Thu, 18 Jan 2018 19:18:14 +0000 (14:18 -0500)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Tue, 23 Jan 2018 22:04:03 +0000 (17:04 -0500)
commit92ffeac79340b97edea5f50b8c550da6df9ac634
tree01e4a116ad2fb923c62b41a7182d7ddeb2d098d7
parentcf54e2110324f6e372b86e265f3040b71893329b
Fix: network instrumentation handling of corrupted TCP headers

A malformed packet may contain a valid IPv4/IPv6 header, but an
inconsistent TCP header. As a result, the trace contains a fully
formed IPv4/IPv6 header, including the "protocol" or "nexthdr"
fields indicating TCP, but no following TCP header.

This scenario leads to an unreadable CTF trace, because the
trace viewer expects a TCP header, but instead gets the next
event.

Therefore, using the IP header fields as selector for the
transport layer variant is not the right approach: introduce
our own selector field, which allows to properly deal with this
corner-case.

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
instrumentation/events/lttng-module/net.h
This page took 0.025258 seconds and 4 git commands to generate.