Hello, On Tue, 6 Aug 2013, Daniel Borkmann wrote: > skb_header_pointer could return NULL, so check for it as we do it > everywhere else in ipvs code. This fixes a coverity warning. > > Signed-off-by: Daniel Borkmann <dborkman@xxxxxxxxxx> > --- > I'd consider the case of NULL quite unlikely, therefore ipvs-next should > be sufficient. Agreed, to avoid confusion... Acked-by: Julian Anastasov <ja@xxxxxx> At the time when SH patch was submitted I ignored it as problem because this code is part of the scheduling lookup and we already passed such skb_header_pointer() checks at top of tcp_conn_schedule(). > net/netfilter/ipvs/ip_vs_sh.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/net/netfilter/ipvs/ip_vs_sh.c b/net/netfilter/ipvs/ip_vs_sh.c > index f16c027..3588fae 100644 > --- a/net/netfilter/ipvs/ip_vs_sh.c > +++ b/net/netfilter/ipvs/ip_vs_sh.c > @@ -269,14 +269,20 @@ ip_vs_sh_get_port(const struct sk_buff *skb, struct ip_vs_iphdr *iph) > switch (iph->protocol) { > case IPPROTO_TCP: > th = skb_header_pointer(skb, iph->len, sizeof(_tcph), &_tcph); > + if (unlikely(th == NULL)) > + return 0; > port = th->source; > break; > case IPPROTO_UDP: > uh = skb_header_pointer(skb, iph->len, sizeof(_udph), &_udph); > + if (unlikely(uh == NULL)) > + return 0; > port = uh->source; > break; > case IPPROTO_SCTP: > sh = skb_header_pointer(skb, iph->len, sizeof(_sctph), &_sctph); > + if (unlikely(sh == NULL)) > + return 0; > port = sh->source; > break; > default: > -- > 1.7.11.7 Regards -- Julian Anastasov <ja@xxxxxx> -- To unsubscribe from this list: send the line "unsubscribe lvs-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html