|
@@ -315,8 +315,10 @@ sctp_disposition_t sctp_sf_do_5_1B_init(const struct sctp_endpoint *ep,
|
|
|
/* If the packet is an OOTB packet which is temporarily on the
|
|
|
* control endpoint, respond with an ABORT.
|
|
|
*/
|
|
|
- if (ep == sctp_sk((sctp_get_ctl_sock()))->ep)
|
|
|
+ if (ep == sctp_sk((sctp_get_ctl_sock()))->ep) {
|
|
|
+ SCTP_INC_STATS(SCTP_MIB_OUTOFBLUES);
|
|
|
return sctp_sf_tabort_8_4_8(ep, asoc, type, arg, commands);
|
|
|
+ }
|
|
|
|
|
|
/* 3.1 A packet containing an INIT chunk MUST have a zero Verification
|
|
|
* Tag.
|
|
@@ -635,8 +637,10 @@ sctp_disposition_t sctp_sf_do_5_1D_ce(const struct sctp_endpoint *ep,
|
|
|
/* If the packet is an OOTB packet which is temporarily on the
|
|
|
* control endpoint, respond with an ABORT.
|
|
|
*/
|
|
|
- if (ep == sctp_sk((sctp_get_ctl_sock()))->ep)
|
|
|
+ if (ep == sctp_sk((sctp_get_ctl_sock()))->ep) {
|
|
|
+ SCTP_INC_STATS(SCTP_MIB_OUTOFBLUES);
|
|
|
return sctp_sf_tabort_8_4_8(ep, asoc, type, arg, commands);
|
|
|
+ }
|
|
|
|
|
|
/* Make sure that the COOKIE_ECHO chunk has a valid length.
|
|
|
* In this case, we check that we have enough for at least a
|
|
@@ -3378,6 +3382,8 @@ sctp_disposition_t sctp_sf_do_8_5_1_E_sa(const struct sctp_endpoint *ep,
|
|
|
* packet and the state function that handles OOTB SHUTDOWN_ACK is
|
|
|
* called with a NULL association.
|
|
|
*/
|
|
|
+ SCTP_INC_STATS(SCTP_MIB_OUTOFBLUES);
|
|
|
+
|
|
|
return sctp_sf_shut_8_4_5(ep, NULL, type, arg, commands);
|
|
|
}
|
|
|
|