diff options
author | Tom Rix <trix@redhat.com> | 2021-12-24 07:07:39 -0800 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2022-01-05 12:33:48 +0100 |
commit | 8a2644526ada31d5b6a165649c3220af38a770ee (patch) | |
tree | 804361ad1b8b9f96e742ea38ef20faedd2d53ae1 /security | |
parent | 49bcc08492070c114f11744ae7043de53de0cd4b (diff) | |
download | linux-stable-8a2644526ada31d5b6a165649c3220af38a770ee.tar.gz linux-stable-8a2644526ada31d5b6a165649c3220af38a770ee.tar.bz2 linux-stable-8a2644526ada31d5b6a165649c3220af38a770ee.zip |
selinux: initialize proto variable in selinux_ip_postroute_compat()
commit 732bc2ff080c447f8524f40c970c481f5da6eed3 upstream.
Clang static analysis reports this warning
hooks.c:5765:6: warning: 4th function call argument is an uninitialized
value
if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
selinux_parse_skb() can return ok without setting proto. The later call
to selinux_xfrm_postroute_last() does an early check of proto and can
return ok if the garbage proto value matches. So initialize proto.
Cc: stable@vger.kernel.org
Fixes: eef9b41622f2 ("selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()")
Signed-off-by: Tom Rix <trix@redhat.com>
[PM: typo/spelling and checkpatch.pl description fixes]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
-rw-r--r-- | security/selinux/hooks.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 9bb1d492f704..38a4db1f3aaa 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -5321,7 +5321,7 @@ static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb, struct common_audit_data ad; struct lsm_network_audit net = {0,}; char *addrp; - u8 proto; + u8 proto = 0; if (sk == NULL) return NF_ACCEPT; |