On 14/10/2025 10:15, Eelco Chaudron wrote:
>
>
> On 14 Oct 2025, at 11:11, Kevin Traynor wrote:
>
>> On 13/10/2025 13:32, Eelco Chaudron via dev wrote:
>>> This patch fixes a potential null pointer dereference reported
>>> by Coverity if an null actions list is passed to nl_attr_get()
>>> in odp_execute_sample().
>>>
>>> Fixes: 26c6b6cd2b2e ("dpif-netdev: Implement OVS_ACTION_ATTR_SAMPLE
>>> action.")
>>> Signed-off-by: Eelco Chaudron <[email protected]>
>>> ---
>>> v2: Actually check for the actions non-null
>>> ---
>>> lib/odp-execute.c | 7 +++++++
>>> 1 file changed, 7 insertions(+)
>>>
>>> diff --git a/lib/odp-execute.c b/lib/odp-execute.c
>>> index 7f4e337f8..8943db2a5 100644
>>> --- a/lib/odp-execute.c
>>> +++ b/lib/odp-execute.c
>>> @@ -739,6 +739,13 @@ odp_execute_sample(void *dp, struct dp_packet *packet,
>>> bool steal,
>>> }
>>> }
>>>
>>> + if (!subactions || !nl_attr_get_size(subactions)) {
>>> + if (steal) {
>>> + dp_packet_delete(packet);
>>
>> Seems like it needs the coverage counter increased here as well
>>
>> COVERAGE_INC(datapath_drop_sample_error);
>
> Good catch, I can fold that in when applying. I’ll wait a bit longer to see
> if any other comments come in.
>
ok, thanks. With coverage counter,
Acked-by: Kevin Traynor <[email protected]>
> Thanks,
>
> Eelco
>
>>> + }
>>> + return;
>>> + }
>>> +
>>> if (!steal) {
>>> /* The 'subactions' may modify the packet, but the modification
>>> * should not propagate beyond this sample action. Make a copy
>
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev