In syncache_expand() insert a proper syncache_free() to fix a case
that currently can't be triggered. But better be safe than sorry later on. Additionally it properly silences Coverity Prevent for future tests. Found by: Coverity Prevent(tm) Coverity ID: CID802 Sponsored by: TCP/IP Optimization Fundraise 2005 MFC after: 3 days
This commit is contained in:
parent
59fe0d8fe8
commit
b43ff06787
@ -767,8 +767,11 @@ syncache_expand(inc, th, sop, m)
|
||||
/*
|
||||
* If seg contains an ACK, but not for our SYN/ACK, send a RST.
|
||||
*/
|
||||
if (th->th_ack != sc->sc_iss + 1)
|
||||
if (th->th_ack != sc->sc_iss + 1) {
|
||||
if (sch == NULL)
|
||||
syncache_free(sc);
|
||||
return (0);
|
||||
}
|
||||
|
||||
so = syncache_socket(sc, *sop, m);
|
||||
if (so == NULL) {
|
||||
|
Loading…
Reference in New Issue
Block a user