On 2012-11-12 01:59, Nickolai Zeldovich wrote: > LWIP can generate packets with a source of 0.0.0.0, which triggers an > assertion failure in arp_table_add(). Instead of crashing, simply return > to avoid adding an invalid ARP table entry.
I would prefer to filter out such invalid packets at a different level. Did you analyzed which path it takes through the stack? > > Signed-off-by: Nickolai Zeldovich <nicko...@csail.mit.edu> > --- > slirp/arp_table.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/slirp/arp_table.c b/slirp/arp_table.c > index 5d7b8ac..3318ce9 100644 > --- a/slirp/arp_table.c > +++ b/slirp/arp_table.c > @@ -38,7 +38,8 @@ void arp_table_add(Slirp *slirp, uint32_t ip_addr, uint8_t > ethaddr[ETH_ALEN]) > ethaddr[3], ethaddr[4], ethaddr[5])); > > /* Check 0.0.0.0/8 invalid source-only addresses */ > - assert((ip_addr & htonl(~(0xf << 28))) != 0); > + if ((ip_addr & htonl(~(0xf << 28))) == 0) > + return; Please follow our coding style. There is also checkpatch.pl to help you. > > if (ip_addr == 0xffffffff || ip_addr == broadcast_addr) { > /* Do not register broadcast addresses */ > Jan -- Siemens AG, Corporate Technology, CT RTC ITP SDP-DE Corporate Competence Center Embedded Linux