Ensure we are not dereferencing a NULL pointer.

This was found by Coverity scanning the usrsctp stack (CID 203808).

MFC after:	3 days
This commit is contained in:
Michael Tuexen 2018-05-06 14:19:50 +00:00
parent b23ddc5855
commit 67e8b08bbe
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=333304

View File

@ -3621,7 +3621,9 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, struct sctp_association *asoc,
SCTP_SO_NOT_LOCKED);
}
/* Make sure to flag we had a FR */
tp1->whoTo->net_ack++;
if (tp1->whoTo != NULL) {
tp1->whoTo->net_ack++;
}
continue;
}
}