path: root/security/selinux/hooks.c
diff options
authorTom Rix <>2021-12-24 07:07:39 -0800
committerPaul Moore <>2021-12-27 10:41:20 -0500
commit732bc2ff080c447f8524f40c970c481f5da6eed3 (patch)
tree67fb464fe0aa6eeff99dd09d704089b9158627d2 /security/selinux/hooks.c
parentcc274ae7763d9700a56659f3228641d7069e7a3f (diff)
selinux: initialize proto variable in selinux_ip_postroute_compat()
Clang static analysis reports this warning hooks.c:5765:6: warning: 4th function call argument is an uninitialized value if (selinux_xfrm_postroute_last(sksec->sid, skb, &ad, proto)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ selinux_parse_skb() can return ok without setting proto. The later call to selinux_xfrm_postroute_last() does an early check of proto and can return ok if the garbage proto value matches. So initialize proto. Cc: Fixes: eef9b41622f2 ("selinux: cleanup selinux_xfrm_sock_rcv_skb() and selinux_xfrm_postroute_last()") Signed-off-by: Tom Rix <> [PM: typo/spelling and description fixes] Signed-off-by: Paul Moore <>
Diffstat (limited to 'security/selinux/hooks.c')
1 files changed, 1 insertions, 1 deletions
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index 1afc06ffd969..dde4ecc0cd18 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -5785,7 +5785,7 @@ static unsigned int selinux_ip_postroute_compat(struct sk_buff *skb,
struct sk_security_struct *sksec;
struct common_audit_data ad;
struct lsm_network_audit net = {0,};
- u8 proto;
+ u8 proto = 0;
sk = skb_to_full_sk(skb);
if (sk == NULL)