Fix: network instrumentation handling of corrupted TCP headers
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Thu, 18 Jan 2018 19:18:14 +0000 (14:18 -0500)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Tue, 23 Jan 2018 22:03:39 +0000 (17:03 -0500)
commit0910ab71db3c3f618edae89ec46fe9b7487c7eac
tree80c8dd9cca10a3ac334e84949c5599864c4104f0
parentd21ec53c99395f0dad33afa0971e4a73ff2d0d83
Fix: network instrumentation handling of corrupted TCP headers

A malformed packet may contain a valid IPv4/IPv6 header, but an
inconsistent TCP header. As a result, the trace contains a fully
formed IPv4/IPv6 header, including the "protocol" or "nexthdr"
fields indicating TCP, but no following TCP header.

This scenario leads to an unreadable CTF trace, because the
trace viewer expects a TCP header, but instead gets the next
event.

Therefore, using the IP header fields as selector for the
transport layer variant is not the right approach: introduce
our own selector field, which allows to properly deal with this
corner-case.

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
instrumentation/events/lttng-module/net.h
This page took 0.027493 seconds and 4 git commands to generate.