Ensure we are not dereferencing a NULL pointer.
This was found by Coverity scanning the usrsctp stack (CID 203808). MFC after: 3 days
This commit is contained in:
parent
b23ddc5855
commit
67e8b08bbe
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=333304
@ -3621,7 +3621,9 @@ sctp_strike_gap_ack_chunks(struct sctp_tcb *stcb, struct sctp_association *asoc,
|
||||
SCTP_SO_NOT_LOCKED);
|
||||
}
|
||||
/* Make sure to flag we had a FR */
|
||||
if (tp1->whoTo != NULL) {
|
||||
tp1->whoTo->net_ack++;
|
||||
}
|
||||
continue;
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user