Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1847487pxb; Fri, 5 Mar 2021 00:43:37 -0800 (PST) X-Google-Smtp-Source: ABdhPJxTk+UK4oSILXyYvNixAHe5a/7s1cnqZqpWFJxWDv4SOT1muJ+9JQTxuIzrBxmo1tOg6cyK X-Received: by 2002:a02:ec6:: with SMTP id 189mr4457265jae.91.1614933817398; Fri, 05 Mar 2021 00:43:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614933817; cv=none; d=google.com; s=arc-20160816; b=V7i3cee/RiFav8DKFT4nXcdeVW5rRcRVXodhrQkq4dH39EbMVCFyC25TWdKJP9LmEX sHUvu+lPfs/s7SYK5J/oVLF0z7qN2zu3+QLFc6Bhbac59YQ0aLOBM2814xbx9wemjEAB V/2qSMLTM7jJXAAQL+EXvhHPrq/YQDmD5eZJ7Tl4d4PxBTH7pvGpJFsJGzGGplX6ORH/ fgqBoPdXPmIOZsA11Pu/BVseC5edEniUJvXJSopMYlrAL/mC3kdCXtAosOgfOl0ypemL 88ncBABtClQCZEGyaM0Nt5xyUoDVYn3YNwwYyuRCCryfYHVRjkHkv02nSMACfuS0lyjJ TLUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=Whi8aSXls6xJnMcmUPj0BVWY5DH4+odZezz7UViQgK4=; b=lW7SfBaEL6C4p82sLxAbE1Joqjpbtoc+c/sADTaV4mDXBjDtxNG1JS9mTdhXiYbPI+ q/QobslFsKfd72alpDExUaWp/T8vqiZQSykeblsk0E3VA8BSZ3aobRXTk5rqbX5lBpT9 0zlzzJd7/h/8OO3QdHjD2Uf7oh8oW94ad87e2BTZi3e5g+WzwNeTjIcf9sUIgXgHEo1C ZhCadfGMVtG0bU+kVmjXMJWKFFmtqOSlCDrlivF1Zv+RVKdkInsVv5S5RhCTqTBOyW53 pGDPJ6w5fEkV+B0nm7bMauUmOWnOUenJMXYVonUBKGbBfH3Bh5oALfAUm8RourdwV6+A pGEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Nsuz6zi9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b9si1698878ior.88.2021.03.05.00.43.23; Fri, 05 Mar 2021 00:43:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Nsuz6zi9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229591AbhCEImd (ORCPT + 99 others); Fri, 5 Mar 2021 03:42:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:52116 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229493AbhCEImN (ORCPT ); Fri, 5 Mar 2021 03:42:13 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id DE2AE64F11; Fri, 5 Mar 2021 08:42:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1614933733; bh=mgxBLmLXHhIZquaeQklM8mANN4oNT1voBTTYJbZRqF4=; h=Date:From:To:Cc:Subject:From; b=Nsuz6zi9ZRmhDY6rbc7gE+6wo2JedEJwMFUpoBAmNFDgAxra49iHRWTky1ss2Z9mI 5CP3Rq/dbQbU6wXSLflPlwIhR+zq9s10j3tgnxbMbZ0IXhKlM9OqhaDvIytsM31Gtr Me+NCGj8JvwREpWAWL75JAxBdEbYY18JEGKMl0JxmOUSVb2+Ow5+phytN0/E0RhP08 J8BLaCKwMTYVqnfUypGx43tV6GKZZyk8nHrvaoI1RNXFPcsmifmG1+HtTw+qSpkxrM 6eo8YVZW1kGX0WOpUSkioxumzAaE5SS4WndADMViejYN8v11NZuXSnqI6zmvFyF6R7 LYyIbc/4xJAGQ== Date: Fri, 5 Mar 2021 02:42:09 -0600 From: "Gustavo A. R. Silva" To: Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , "David S. Miller" , Jakub Kicinski Cc: netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , linux-hardening@vger.kernel.org Subject: [PATCH RESEND][next] netfilter: Fix fall-through warnings for Clang Message-ID: <20210305084209.GA138063@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation to enable -Wimplicit-fallthrough for Clang, fix multiple warnings by explicitly adding multiple break statements instead of just letting the code fall through to the next case. Link: https://github.com/KSPP/linux/issues/115 Acked-by: Florian Westphal Signed-off-by: Gustavo A. R. Silva --- net/netfilter/nf_conntrack_proto_dccp.c | 1 + net/netfilter/nf_tables_api.c | 1 + net/netfilter/nft_ct.c | 1 + 3 files changed, 3 insertions(+) diff --git a/net/netfilter/nf_conntrack_proto_dccp.c b/net/netfilter/nf_conntrack_proto_dccp.c index db7479db8512..4f33307fa3cf 100644 --- a/net/netfilter/nf_conntrack_proto_dccp.c +++ b/net/netfilter/nf_conntrack_proto_dccp.c @@ -397,6 +397,7 @@ dccp_new(struct nf_conn *ct, const struct sk_buff *skb, msg = "not picking up existing connection "; goto out_invalid; } + break; case CT_DCCP_REQUEST: break; case CT_DCCP_INVALID: diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c index b07703e19108..1f53459e30e9 100644 --- a/net/netfilter/nf_tables_api.c +++ b/net/netfilter/nf_tables_api.c @@ -8557,6 +8557,7 @@ static int nf_tables_check_loops(const struct nft_ctx *ctx, data->verdict.chain); if (err < 0) return err; + break; default: break; } diff --git a/net/netfilter/nft_ct.c b/net/netfilter/nft_ct.c index 882fe8648653..0592a9456084 100644 --- a/net/netfilter/nft_ct.c +++ b/net/netfilter/nft_ct.c @@ -527,6 +527,7 @@ static void __nft_ct_set_destroy(const struct nft_ctx *ctx, struct nft_ct *priv) case NFT_CT_ZONE: if (--nft_ct_pcpu_template_refcnt == 0) nft_ct_tmpl_put_pcpu(); + break; #endif default: break; -- 2.27.0