diff options
author | Jan Kiszka <jan.kiszka@siemens.com> | 2011-09-16 00:10:50 +0200 |
---|---|---|
committer | Jan Kiszka <jan.kiszka@siemens.com> | 2011-09-16 00:16:12 +0200 |
commit | 144d192d33f031bced40012a114a15b6041c751e (patch) | |
tree | d5cc3bc277ec0b39a769b1081cd56c7bca2aeb75 /slirp/tcp_input.c | |
parent | 44520db10b1b92f272348ab7028e7afc68ac3edf (diff) |
slirp: Fill TCP/IP header template after SYN reception
This ensures we can cleanly signal the drop in case the connection timer
fires. So far we sent those frames to nowhere (target IP 0.0.0.0).
Found by the new assertion on invalid IPs in arp_table_search.
Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
Diffstat (limited to 'slirp/tcp_input.c')
-rw-r--r-- | slirp/tcp_input.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/slirp/tcp_input.c b/slirp/tcp_input.c index c1214c0659..5a79c68348 100644 --- a/slirp/tcp_input.c +++ b/slirp/tcp_input.c @@ -610,6 +610,7 @@ findso: so->so_ti = ti; tp->t_timer[TCPT_KEEP] = TCPTV_KEEP_INIT; tp->t_state = TCPS_SYN_RECEIVED; + tcp_template(tp); } return; |