On Tue, Aug 06, 2013 at 10:27:55PM +0300, Julian Anastasov wrote:
>
> Hello,
>
> On Tue, 6 Aug 2013, Daniel Borkmann wrote:
>
> > skb_header_pointer could return NULL, so check for it as we do it
> > everywhere else in ipvs code. This fixes a coverity warning.
> >
> > Signed-off-by: Daniel Borkmann <dborkman@xxxxxxxxxx>
> > ---
> > I'd consider the case of NULL quite unlikely, therefore ipvs-next should
> > be sufficient.
>
> Agreed, to avoid confusion...
>
> Acked-by: Julian Anastasov <ja@xxxxxx>
Thanks, I have added your ack and forcibly re-pushed the change into ipvs-next.
> At the time when SH patch was submitted I ignored
> it as problem because this code is part of the scheduling
> lookup and we already passed such skb_header_pointer()
> checks at top of tcp_conn_schedule().
>
> > net/netfilter/ipvs/ip_vs_sh.c | 6 ++++++
> > 1 file changed, 6 insertions(+)
> >
> > diff --git a/net/netfilter/ipvs/ip_vs_sh.c b/net/netfilter/ipvs/ip_vs_sh.c
> > index f16c027..3588fae 100644
> > --- a/net/netfilter/ipvs/ip_vs_sh.c
> > +++ b/net/netfilter/ipvs/ip_vs_sh.c
> > @@ -269,14 +269,20 @@ ip_vs_sh_get_port(const struct sk_buff *skb, struct
> > ip_vs_iphdr *iph)
> > switch (iph->protocol) {
> > case IPPROTO_TCP:
> > th = skb_header_pointer(skb, iph->len, sizeof(_tcph), &_tcph);
> > + if (unlikely(th == NULL))
> > + return 0;
> > port = th->source;
> > break;
> > case IPPROTO_UDP:
> > uh = skb_header_pointer(skb, iph->len, sizeof(_udph), &_udph);
> > + if (unlikely(uh == NULL))
> > + return 0;
> > port = uh->source;
> > break;
> > case IPPROTO_SCTP:
> > sh = skb_header_pointer(skb, iph->len, sizeof(_sctph), &_sctph);
> > + if (unlikely(sh == NULL))
> > + return 0;
> > port = sh->source;
> > break;
> > default:
> > --
> > 1.7.11.7
>
> Regards
>
> --
> Julian Anastasov <ja@xxxxxx>
>
--
To unsubscribe from this list: send the line "unsubscribe lvs-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
|