Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp148133imd; Wed, 31 Oct 2018 16:16:41 -0700 (PDT) X-Google-Smtp-Source: AJdET5eCZj7pBZLKyLKMgARNMFwHzBhHqDYw7+dEnn9hmr0HLvc5tzkUQ46/iZJxuwnHmrMBsNWK X-Received: by 2002:a17:902:a9cb:: with SMTP id b11-v6mr5219057plr.219.1541027801565; Wed, 31 Oct 2018 16:16:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541027801; cv=none; d=google.com; s=arc-20160816; b=mw3VDUYHdqogLIT7YC3mUbUfheHylRP3NuB47l0XiOQumqKz9bxKzWz+SKN9D8wwHR ncnsRTxUWFkJJh2FwQivFMz7ODsEDdXFRPemCimb2uzwu/omFGg0ipoW5iMyiFZKJkig dO39A/mptcM8bSZpuztN3IQm7rEN6HHdxvFAKkwz+Mt/LO77ZDFHicf9egfMbB/Fsy64 TgK13yU36YPU4e27W4RLlVHkx0ujBkJOzBYgG99aduRrLGL83+HOMBl3U3ehKg4Z6myi JPISON3r5IDNCMjmsuhPVNOqt1uFMBalnfOlznJmUtxrzSuCdQ6MZ+r/qrMSh+EvilO2 QLTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=UFX9ZeAP0w/Ftnsc7KktZbgl+8+Q8qevrZZOnNHGb68=; b=BnUMkz5ttVN3jwG+YfYKQ8epcA0DHcaagvXr3e80ebc4k7nceIMRAq+WPPr4mPofJ8 7OqRo2UOZ1QwPFsU1IdPG+ttquvR6XyoN5v0C1JAOsafYwktnrE11yRDUP903EwqknC4 PGwAxtwJs1etOlMMQhEzrjH2UtC6IKyyk24X1lJQCahEa8rnRcUgdmDu/3xDXE77StAU yY1VFUuLh8a3xMFYxfV70vlJvtDiKLJ4lvM2L1E6iYz5RQo5JzxHokvBZ8KqYQ5xy7Ge glgomEHN5L++T3rtIrq2PWk+gI0erp2aGSsQQUw78BR0M8pYBD0gS+CdLPACzuZ5XDn/ J5Wg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZwBxH6qA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l63-v6si19070145plb.385.2018.10.31.16.16.26; Wed, 31 Oct 2018 16:16:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZwBxH6qA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732099AbeKAIML (ORCPT + 99 others); Thu, 1 Nov 2018 04:12:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:36768 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730312AbeKAIML (ORCPT ); Thu, 1 Nov 2018 04:12:11 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ED7F520989; Wed, 31 Oct 2018 23:11:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541027518; bh=345dE4yakgIXUDtObUSVfu218Nz+Df25oW6qn9P/YzY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZwBxH6qAqudL5XvVVJ3TEjoYtY85D2EJcy9fHGafRc7H/Wf4qGadxOHvn9eMN4H10 EWrl8uRP8GDZUWPMNL4mfW14AUrPIZjSvmpPh5CedtUF0L7jGU1yTTIe4SsSN/qtPc yRs8UGEsFvJC9OFSNEL51WYRJKcepSn4S+xHbPUY= From: Sasha Levin To: stable@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Dexuan Cui , "K . Y . Srinivasan" , Haiyang Zhang , Stephen Hemminger , Stable@vger.kernel.org, Greg Kroah-Hartman , Sasha Levin Subject: [PATCH AUTOSEL 4.4 23/32] Drivers: hv: kvp: Fix two "this statement may fall through" warnings Date: Wed, 31 Oct 2018 19:11:28 -0400 Message-Id: <20181031231137.29429-23-sashal@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20181031231137.29429-1-sashal@kernel.org> References: <20181031231137.29429-1-sashal@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dexuan Cui [ Upstream commit fc62c3b1977d62e6374fd6e28d371bb42dfa5c9d ] We don't need to call process_ib_ipinfo() if message->kvp_hdr.operation is KVP_OP_GET_IP_INFO in kvp_send_key(), because here we just need to pass on the op code from the host to the userspace; when the userspace returns the info requested by the host, we pass the info on to the host in kvp_respond_to_host() -> process_ob_ipinfo(). BTW, the current buggy code actually doesn't cause any harm, because only message->kvp_hdr.operation is used by the userspace, in the case of KVP_OP_GET_IP_INFO. The patch also adds a missing "break;" in kvp_send_key(). BTW, the current buggy code actually doesn't cause any harm, because in the case of KVP_OP_SET, the unexpected fall-through corrupts message->body.kvp_set.data.key_size, but that is not really used: see the definition of struct hv_kvp_exchg_msg_value. Signed-off-by: Dexuan Cui Cc: K. Y. Srinivasan Cc: Haiyang Zhang Cc: Stephen Hemminger Cc: Signed-off-by: K. Y. Srinivasan Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/hv/hv_kvp.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/hv/hv_kvp.c b/drivers/hv/hv_kvp.c index 1771a968c3f2..7f54e5beb718 100644 --- a/drivers/hv/hv_kvp.c +++ b/drivers/hv/hv_kvp.c @@ -336,7 +336,6 @@ static void process_ib_ipinfo(void *in_msg, void *out_msg, int op) out->body.kvp_ip_val.dhcp_enabled = in->kvp_ip_val.dhcp_enabled; - default: utf16s_to_utf8s((wchar_t *)in->kvp_ip_val.adapter_id, MAX_ADAPTER_ID_SIZE, UTF16_LITTLE_ENDIAN, @@ -389,7 +388,7 @@ kvp_send_key(struct work_struct *dummy) process_ib_ipinfo(in_msg, message, KVP_OP_SET_IP_INFO); break; case KVP_OP_GET_IP_INFO: - process_ib_ipinfo(in_msg, message, KVP_OP_GET_IP_INFO); + /* We only need to pass on message->kvp_hdr.operation. */ break; case KVP_OP_SET: switch (in_msg->body.kvp_set.data.value_type) { @@ -429,6 +428,9 @@ kvp_send_key(struct work_struct *dummy) break; } + + break; + case KVP_OP_GET: message->body.kvp_set.data.key_size = utf16s_to_utf8s( -- 2.17.1