Demote RTC_NOTREACHED in pseudotcp RTT processing to warning.
This problem shouldn't be severe enough to require a crash, and it can be triggered by untrusted network data. We'll print a warning instead. Bug: chromium:877790 Change-Id: Ie1f33d85dc7f0ccbbc1d027b73f77b964c6f7e46 Reviewed-on: https://webrtc-review.googlesource.com/96880 Reviewed-by: Per Kjellander <perkj@webrtc.org> Reviewed-by: Niels Moller <nisse@webrtc.org> Commit-Queue: Jonas Olsson <jonasolsson@webrtc.org> Cr-Commit-Position: refs/heads/master@{#24579}
This commit is contained in:
@ -729,7 +729,7 @@ bool PseudoTcp::process(Segment& seg) {
|
|||||||
<< " rto: " << m_rx_rto;
|
<< " rto: " << m_rx_rto;
|
||||||
#endif // _DEBUGMSG
|
#endif // _DEBUGMSG
|
||||||
} else {
|
} else {
|
||||||
RTC_NOTREACHED();
|
RTC_LOG(LS_WARNING) << "rtt < 0";
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user