> This function is called from nf_nat_ipv4_fn(), see do_chain(). > > And we're accepting the packet with no NAT mangling if we fail to add > the extension: > > nat = nf_ct_nat_ext_add(ct); > if (nat == NULL) > return NF_ACCEPT; > > Can you provide more information on what your static analysis software > reports? Thanks. > Sure, here is the report - In nf_nat_masquerade_ipv4.c line 40, 'nat' is assigned the value from function 'nfct_nat' - In nf_nat.h line 58, '__nf_ct_ext_find( (ct), (NF_CT_EXT_NAT) )' is assigned the return value from function '__nf_ct_ext_find'. - In nf_conntrack_extend.h line 68, '__nf_ct_ext_find' explicitly returns a NULL value. - As a result, pointer 'nat' returned from call to function 'nfct_nat' at line 40 may be NULL and may be dereferenced at line 59 'nat->masq_index = out->ifindex;' -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html