On 14/10/2025 10:15, Eelco Chaudron wrote:
> 
> 
> On 14 Oct 2025, at 11:11, Kevin Traynor wrote:
> 
>> On 13/10/2025 13:32, Eelco Chaudron via dev wrote:
>>> This patch fixes a potential null pointer dereference reported
>>> by Coverity if an null actions list is passed to nl_attr_get()
>>> in odp_execute_sample().
>>>
>>> Fixes: 26c6b6cd2b2e ("dpif-netdev: Implement OVS_ACTION_ATTR_SAMPLE 
>>> action.")
>>> Signed-off-by: Eelco Chaudron <[email protected]>
>>> ---
>>> v2: Actually check for the actions non-null
>>> ---
>>>  lib/odp-execute.c | 7 +++++++
>>>  1 file changed, 7 insertions(+)
>>>
>>> diff --git a/lib/odp-execute.c b/lib/odp-execute.c
>>> index 7f4e337f8..8943db2a5 100644
>>> --- a/lib/odp-execute.c
>>> +++ b/lib/odp-execute.c
>>> @@ -739,6 +739,13 @@ odp_execute_sample(void *dp, struct dp_packet *packet, 
>>> bool steal,
>>>          }
>>>      }
>>>
>>> +    if (!subactions || !nl_attr_get_size(subactions)) {
>>> +        if (steal) {
>>> +            dp_packet_delete(packet);
>>
>> Seems like it needs the coverage counter increased here as well
>>
>> COVERAGE_INC(datapath_drop_sample_error);
> 
> Good catch, I can fold that in when applying. I’ll wait a bit longer to see 
> if any other comments come in.
> 

ok, thanks. With coverage counter,

Acked-by: Kevin Traynor <[email protected]>

> Thanks,
> 
> Eelco
> 
>>> +        }
>>> +        return;
>>> +    }
>>> +
>>>      if (!steal) {
>>>          /* The 'subactions' may modify the packet, but the modification
>>>           * should not propagate beyond this sample action. Make a copy
> 

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to