Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1728122pxb; Thu, 28 Oct 2021 09:00:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzAMxs1nhXfvPfBTy2PL62pHRejlMYKn7iYDtXCGvpyakz0qPmxAIPT7EXQf0yeOddk+UGV X-Received: by 2002:a63:b04c:: with SMTP id z12mr3804427pgo.363.1635436807505; Thu, 28 Oct 2021 09:00:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635436807; cv=none; d=google.com; s=arc-20160816; b=zCtG++/C20q2QEVoCqNdVMC5ZM8EgQuLPJUtaV1OAXpGZWQgFgKcoUHsphH1yo5ETl bWkynZxSRse6X+uoMEyQvbzykbxmcjYpCf/hzitnrC4G8jWVenhnpzBY9807m4kXbizy OqkRPWCI66XiTWIAP7pd9RU4Vw1+ZOGOBQ3b49WtJI9/pAePAGjzXDpqJ3MhRp4B4lyJ 8cdG9H27YaGWjGOJVvO5nT/4S0fSqPEZdyBLsH1rUX7RHrtSpCWM08Ji7FjVWmo+TgxI zdt9gKyXpshh0TEKvj4gy7YdRlyK0ml2dWA7jWB9dD1ShsEsqOsGLESBdJaKsowzbRbM Ok+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=/ZAZTdtyaSOOs5rc8T6wOKjWpg0v6cCvD+QvTGbgJzM=; b=ZIkoN3v6Z+HJ96g6S+WgVgxrzXe9txerKnvUk6Q0aEywG7e4ImwxRLMo+pDHvUpC08 GClb1RyS6c57HYU5LHzlyph0AoJ/a6PPi00dR+QsQsHtDQHKgKf1ckhU/7qoxrbn7YH2 P+V9gWEC0u+0vyySo2tXnHTHXpLa4CTm3S3sJcZjetEuyDCE5/y7dxBJJ1em2apZnnjs 4LFsIMJPm5779pVZpNoZfD9g2OI93aZth4AYOGZfQLZyLgWMyMNtrrS5D4u39pNVvsQm zIUd9sNhL47NI/NVnAxczfJvrCCoGB7VbR22RzRQ1L6XY9vGj2e6/zkKQYbU7dMNz5/5 hcjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=RwqCT3vi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k3si1157143plk.357.2021.10.28.08.59.55; Thu, 28 Oct 2021 09:00:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=RwqCT3vi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230164AbhJ1QBP (ORCPT + 99 others); Thu, 28 Oct 2021 12:01:15 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:33508 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229846AbhJ1QBO (ORCPT ); Thu, 28 Oct 2021 12:01:14 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1635436727; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=/ZAZTdtyaSOOs5rc8T6wOKjWpg0v6cCvD+QvTGbgJzM=; b=RwqCT3vi4JsC12m8UiZduV4+6NEMah7/6sZprhnnz0lSmuM/PjmuPyg1TOHixuAsqNlhu5 o6x8aWqc5v6jngayWVC569DgEwtt0OL6hI7uddnDgSNanJSKEL1qXORR3tIflXHJifk93H 1IJ41uR300iBe8hlxq451BSNTEh0anE= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-349-7JO76a4UO0ma4pJGbmmnkg-1; Thu, 28 Oct 2021 11:58:44 -0400 X-MC-Unique: 7JO76a4UO0ma4pJGbmmnkg-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 2C2E19126B; Thu, 28 Oct 2021 15:58:42 +0000 (UTC) Received: from ceranb.redhat.com (unknown [10.40.193.230]) by smtp.corp.redhat.com (Postfix) with ESMTP id AE9805DF56; Thu, 28 Oct 2021 15:58:36 +0000 (UTC) From: Ivan Vecera To: netdev@vger.kernel.org Cc: Henrik Bjoernlund , Roopa Prabhu , Nikolay Aleksandrov , "David S. Miller" , Jakub Kicinski , Horatiu Vultur , bridge@lists.linux-foundation.org (moderated list:ETHERNET BRIDGE), linux-kernel@vger.kernel.org (open list) Subject: [PATCH net v2] net: bridge: fix uninitialized variables when BRIDGE_CFM is disabled Date: Thu, 28 Oct 2021 17:58:35 +0200 Message-Id: <20211028155835.2134753-1-ivecera@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Function br_get_link_af_size_filtered() calls br_cfm_{,peer}_mep_count() that return a count. When BRIDGE_CFM is not enabled these functions simply return -EOPNOTSUPP but do not modify count parameter and calling function then works with uninitialized variables. Modify these inline functions to return zero in count parameter. Fixes: b6d0425b816e ("bridge: cfm: Netlink Notifications.") Cc: Henrik Bjoernlund Signed-off-by: Ivan Vecera --- net/bridge/br_private.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/net/bridge/br_private.h b/net/bridge/br_private.h index 37ca76406f1e..fd5e7e74573c 100644 --- a/net/bridge/br_private.h +++ b/net/bridge/br_private.h @@ -1911,11 +1911,13 @@ static inline int br_cfm_status_fill_info(struct sk_buff *skb, static inline int br_cfm_mep_count(struct net_bridge *br, u32 *count) { + *count = 0; return -EOPNOTSUPP; } static inline int br_cfm_peer_mep_count(struct net_bridge *br, u32 *count) { + *count = 0; return -EOPNOTSUPP; } #endif -- 2.32.0