In syncache_expand() insert a proper syncache_free() to fix a case

that currently can't be triggered.  But better be safe than sorry
later on.  Additionally it properly silences Coverity Prevent for
future tests.

Found by:	Coverity Prevent(tm)
Coverity ID:	CID802
Sponsored by:	TCP/IP Optimization Fundraise 2005
MFC after:	3 days
This commit is contained in:
andre 2006-01-18 18:25:03 +00:00
parent 59fe0d8fe8
commit b43ff06787

View File

@ -767,8 +767,11 @@ syncache_expand(inc, th, sop, m)
/*
* If seg contains an ACK, but not for our SYN/ACK, send a RST.
*/
if (th->th_ack != sc->sc_iss + 1)
if (th->th_ack != sc->sc_iss + 1) {
if (sch == NULL)
syncache_free(sc);
return (0);
}
so = syncache_socket(sc, *sop, m);
if (so == NULL) {