On 13/10/2025 13:32, Eelco Chaudron via dev wrote:
> This patch fixes a potential null pointer dereference reported
> by Coverity if an null actions list is passed to nl_attr_get()
> in odp_execute_sample().
> 
> Fixes: 26c6b6cd2b2e ("dpif-netdev: Implement OVS_ACTION_ATTR_SAMPLE action.")
> Signed-off-by: Eelco Chaudron <[email protected]>
> ---
> v2: Actually check for the actions non-null
> ---
>  lib/odp-execute.c | 7 +++++++
>  1 file changed, 7 insertions(+)
> 
> diff --git a/lib/odp-execute.c b/lib/odp-execute.c
> index 7f4e337f8..8943db2a5 100644
> --- a/lib/odp-execute.c
> +++ b/lib/odp-execute.c
> @@ -739,6 +739,13 @@ odp_execute_sample(void *dp, struct dp_packet *packet, 
> bool steal,
>          }
>      }
>  
> +    if (!subactions || !nl_attr_get_size(subactions)) {
> +        if (steal) {
> +            dp_packet_delete(packet);

Seems like it needs the coverage counter increased here as well

COVERAGE_INC(datapath_drop_sample_error);

> +        }
> +        return;
> +    }
> +
>      if (!steal) {
>          /* The 'subactions' may modify the packet, but the modification
>           * should not propagate beyond this sample action. Make a copy

_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to