Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp689444pxj; Fri, 28 May 2021 13:08:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw6bmaTxEv7gs9i/S3IOh3Ap3+/YfDewdzTSbT+SLHSDZArwuLDk3dAuELtYNJUOm0ZrQF9 X-Received: by 2002:a17:906:148f:: with SMTP id x15mr10437422ejc.535.1622232534837; Fri, 28 May 2021 13:08:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622232534; cv=none; d=google.com; s=arc-20160816; b=pdLdbnU+eLgO1HKpR1mi8TQ3DCQL0H/5l4sG4FvnKmlJHLx3lXSGBKar7lAAG1I1OF V1GMO7PuQ6l1d21FBg8sPVYSuzBPM526UP08ziCvoskbdZOwWa37WerwA6b8U1PI2MLc oQOMjjcpUmBeIN+2xm54iZ7J64FdOn/9RYuMGaBCFM/Hy2UTFwQCyWPQ8JrPI+fwcDyi VaosBKM898eI55kCTbVETHU2/Mtyb1svnxsC5YVnqMHhYTa2p+GNv9XPGHG8YCTwMyBO f0FMDB94jQ7DGWuIX61HSPFTMeYclb3sSrMJ5sMR6w3LROKkrYpCeabNl5whXCKbxrzS /ulw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=aXVplPipYv8vunDle+YVjBADiEeqkFWcLhOOy8k0Hk0=; b=PFGn+3tvVwgqviQOufhVQXA50cTFXkOkMXbTcBdo+xVdcXkfym0DlYofUmXoInhFIA AQCWVRJxee74ovOlnAK7eJY3vOQkH9ArsfJDJRr1gYXp0fRZFGHDW8pLhGdxSlFaA6HX lLdW7aznKZ64tMnZqAtxjL7TGGTJIBEZSO2UozHsKj7xvECf4sMQmnUTdJ0QwSYFdHYL 3fAFiyn60uGoyfWJGaTfwfVLc97ucSAmHTXX4HPQpiBGUZ40y6wmw8JEnR3RNEm1jFXz Weg4NdZkuzp6+EF279Z/a+XphPz3BPk30kazp+XuVgRDU7xyt82u9LpUjHMCy7ukHpuS 9rww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=VxmEw93M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s19si6308278ejj.534.2021.05.28.13.08.32; Fri, 28 May 2021 13:08:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=VxmEw93M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229658AbhE1UId (ORCPT + 99 others); Fri, 28 May 2021 16:08:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:38560 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229608AbhE1UIc (ORCPT ); Fri, 28 May 2021 16:08:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7EEA66139A; Fri, 28 May 2021 20:06:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1622232417; bh=ZV1SeuPvDYe6GKbtbIb0+ApRzqPbNzxh5Kl5WTNpluU=; h=Date:From:To:Cc:Subject:From; b=VxmEw93MsPS0xdknwmzQPvfz7ky8qPJs1+sggEaujPxUwBziQv2KXTkgkXPD82CzJ wf7bV/oBZTUbSVgE/Rw/LPYnCI+MfjHnlvkZcU0G0wwdFCbm/MFxVJwtsC4x7ha9F6 79QrI62QXrLA4bScfp69WW8Yo3ep8j/yAQ2xhoLNx+k9LVKt/V/KpT8Ei+wYlBmqKg mp5lTAzYSR0fjTh46oFAlFf/haw/2LYBh0EIIdUbSitfnJbzfOug3JKq2hY9Bl2UYO 1sgWNBVpVsbNqENJzoU0MJyfb1wfcbmb0RRHlvuUFNcoQk//qacC4zdY774Gf3GZEA zx8yt6XPD9Fgg== Date: Fri, 28 May 2021 15:07:56 -0500 From: "Gustavo A. R. Silva" To: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" Cc: x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , linux-hardening@vger.kernel.org Subject: [PATCH][next] KVM: x86: Fix fall-through warnings for Clang Message-ID: <20210528200756.GA39320@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation to enable -Wimplicit-fallthrough for Clang, fix a couple of warnings by explicitly adding break statements instead of just letting the code fall through to the next case. Link: https://github.com/KSPP/linux/issues/115 Signed-off-by: Gustavo A. R. Silva --- JFYI: We had thousands of these sorts of warnings and now we are down to just 25 in linux-next. These are some of those last remaining warnings. arch/x86/kvm/cpuid.c | 1 + arch/x86/kvm/vmx/vmx.c | 1 + 2 files changed, 2 insertions(+) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index 9a48f138832d..b4da665bb892 100644 --- a/arch/x86/kvm/cpuid.c +++ b/arch/x86/kvm/cpuid.c @@ -655,6 +655,7 @@ static int __do_cpuid_func_emulated(struct kvm_cpuid_array *array, u32 func) if (kvm_cpu_cap_has(X86_FEATURE_RDTSCP)) entry->ecx = F(RDPID); ++array->nent; + break; default: break; } diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index 4bceb5ca3a89..e7d98c3d398e 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -6248,6 +6248,7 @@ void vmx_set_virtual_apic_mode(struct kvm_vcpu *vcpu) switch (kvm_get_apic_mode(vcpu)) { case LAPIC_MODE_INVALID: WARN_ONCE(true, "Invalid local APIC state"); + break; case LAPIC_MODE_DISABLED: break; case LAPIC_MODE_XAPIC: -- 2.27.0