diff options
author | Jan Kiszka <jan.kiszka@siemens.com> | 2011-09-16 00:10:50 +0200 |
---|---|---|
committer | Jan Kiszka <jan.kiszka@siemens.com> | 2011-09-16 00:16:12 +0200 |
commit | d905bae82e4748449bc42ffde75c0941d24664f1 (patch) | |
tree | 32828fb28e5d3003f2e7375e09f8860171ebdb83 | |
parent | 690a66b63972f5b262fe1e3eab50715bd482ea5e (diff) | |
download | slirp-d905bae82e4748449bc42ffde75c0941d24664f1.zip slirp-d905bae82e4748449bc42ffde75c0941d24664f1.tar.gz slirp-d905bae82e4748449bc42ffde75c0941d24664f1.tar.bz2 |
slirp: Fill TCP/IP header template after SYN reception
This ensures we can cleanly signal the drop in case the connection timer
fires. So far we sent those frames to nowhere (target IP 0.0.0.0).
Found by the new assertion on invalid IPs in arp_table_search.
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
-rw-r--r-- | tcp_input.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/tcp_input.c b/tcp_input.c index 1813114..205f4e6 100644 --- a/tcp_input.c +++ b/tcp_input.c @@ -611,6 +611,7 @@ findso: so->so_ti = ti; tp->t_timer[TCPT_KEEP] = TCPTV_KEEP_INIT; tp->t_state = TCPS_SYN_RECEIVED; + tcp_template(tp); } return; |