summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorTom Rix <trix@redhat.com>2021-12-24 07:07:39 -0800
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2022-01-05 12:42:34 +0100
commit172fc0a7d7abdb94b94544765ae13348862b1abf (patch)
treec48e658ef912b48e6ea739e497bc79e4d1fef387 /security
parentf5cb610fa3d2c7b1deceb5c8fc3a7251b923fa70 (diff)
downloadlinux-stable-172fc0a7d7abdb94b94544765ae13348862b1abf.tar.gz
linux-stable-172fc0a7d7abdb94b94544765ae13348862b1abf.tar.bz2
linux-stable-172fc0a7d7abdb94b94544765ae13348862b1abf.zip
selinux: initialize proto variable in selinux_ip_postroute_compat()
commit 732bc2ff080c447f8524f40c970c481f5da6eed3 upstream. Clang static analysis reports this warning hooks.c:5765:6: warning: 4th function call argument is an uninitialized value if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ selinux_parse_skb() can return ok without setting proto. The later call to selinux_xfrm_postroute_last() does an early check of proto and can return ok if the garbage proto value matches. So initialize proto. Cc: stable@vger.kernel.org Fixes: eef9b41622f2 ("selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()") Signed-off-by: Tom Rix <trix@redhat.com> [PM: typo/spelling and checkpatch.pl description fixes] Signed-off-by: Paul Moore <paul@paul-moore.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security')
-rw-r--r--security/selinux/hooks.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 51432ea74044..9309e62d46ed 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -5812,7 +5812,7 @@ static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
struct common_audit_data ad;
struct lsm_network_audit net = {0,};
char *addrp;
- u8 proto;
+ u8 proto = 0;
if (sk == NULL)
return NF_ACCEPT;