Fix: network instrumentation handling of corrupted TCP headers
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Thu, 18 Jan 2018 19:18:14 +0000 (14:18 -0500)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Tue, 23 Jan 2018 22:04:07 +0000 (17:04 -0500)
commitd3419520db1b1c4306979fe4f081ec2885f1e0c0
tree42490b3d7fb357594ef80e2f94f207b8a3e9a47e
parent5ccd92b986899e07d327d085f220c3cc3c7533fa
Fix: network instrumentation handling of corrupted TCP headers

A malformed packet may contain a valid IPv4/IPv6 header, but an
inconsistent TCP header. As a result, the trace contains a fully
formed IPv4/IPv6 header, including the "protocol" or "nexthdr"
fields indicating TCP, but no following TCP header.

This scenario leads to an unreadable CTF trace, because the
trace viewer expects a TCP header, but instead gets the next
event.

Therefore, using the IP header fields as selector for the
transport layer variant is not the right approach: introduce
our own selector field, which allows to properly deal with this
corner-case.

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
instrumentation/events/lttng-module/net.h
This page took 0.025766 seconds and 4 git commands to generate.