Received: by 10.223.164.221 with SMTP id h29csp3974090wrb; Thu, 19 Oct 2017 07:09:07 -0700 (PDT) X-Google-Smtp-Source: ABhQp+QUAvkeiz1jwoioufW0NoeYiK8RQrBYDZZ8syB49mMhZBU8f7Ykyr+lKLySZSx+r3JdUYgC X-Received: by 10.99.55.27 with SMTP id e27mr1503625pga.293.1508422147248; Thu, 19 Oct 2017 07:09:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1508422147; cv=none; d=google.com; s=arc-20160816; b=dTKB3hnw+52KK8navOe3YJJ+NGghx44vdts1qVmdGtCCsmuO7OmGX9d2pYU6JWAtjK lWdmkE66ufk+bb1K6E+vKuXB6KPqniNpcBPSRBoLOzOUAaTi+w1EkWgoaGuNFSB9QviV ukyLxeVG8d0Oi3u5TIaN27YvmSEMDVZPOYxjPIUhMAUIBOBBBf+cjUqMoL5xQzLSa3Dg Htu4kHdhASECUxIFIsLw5oj3xkI3MQ8Y8faectDXB9PbsBqdtDc7aUdehP0aNbKW3t3s DkbQoU1GF19FAE7kBbiT3l/exZ84B8sQDlb1WMJiVcd7W5GrjnMpEpLtjxRziZbZtfcd +WPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date :arc-authentication-results; bh=fooE1XijaKtL2ttoCcSeKdHz7fKG99zjFz7H0JpZjb4=; b=HLg9pz/DyPSsdal+15NAQlC2V1xP6X/LHv8G+WklfXXMyET+FcOR+Qnwew9/TRHnWV Et5DXFLXOpf6de+GnsDkB/flJDy5EXnjyq2QiwFmpUQOCT86QL4ycB665CBFRrA5ok8F iGVzNIMsWHSuhxXhMliWdxu89p8XDEiIOjNLKrGNLtrCFn3ZkpobFA62DA1LpDM1SE14 vzMb7Un2f2oAILnixTjwi0q/FxBBWa16fY8RFtLDuUKZQRXKvmcQUnRU5VD7632Qo5Bq oKmT34llqfv/qEZyAgpq3MSNzR0m/cieVDY6Ktm7Ac92+n2P9OYZr4CprR/Ujr2B/ADx e9iA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e12si3012419pga.78.2017.10.19.07.08.51; Thu, 19 Oct 2017 07:09:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754728AbdJSOGV (ORCPT + 99 others); Thu, 19 Oct 2017 10:06:21 -0400 Received: from gateway23.websitewelcome.com ([192.185.50.119]:48997 "EHLO gateway23.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754671AbdJSOGT (ORCPT ); Thu, 19 Oct 2017 10:06:19 -0400 Received: from cm10.websitewelcome.com (cm10.websitewelcome.com [100.42.49.4]) by gateway23.websitewelcome.com (Postfix) with ESMTP id BAD31102F2 for ; Thu, 19 Oct 2017 09:06:18 -0500 (CDT) Received: from gator4166.hostgator.com ([108.167.133.22]) by cmsmtp with SMTP id 5BSkezrfJpOTv5BSkepCkE; Thu, 19 Oct 2017 09:06:18 -0500 Received: from [187.172.29.132] (port=52650 helo=embeddedor) by gator4166.hostgator.com with esmtpa (Exim 4.87) (envelope-from ) id 1e5BSj-0000E7-RT; Thu, 19 Oct 2017 09:06:17 -0500 Date: Thu, 19 Oct 2017 09:06:16 -0500 From: "Gustavo A. R. Silva" To: Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , "David S. Miller" , Wensong Zhang , Simon Horman , Julian Anastasov Cc: netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, lvs-devel@vger.kernel.org, "Gustavo A. R. Silva" Subject: [PATCH] netfilter: mark expected switch fall-throughs Message-ID: <20171019140616.GA15989@embeddedor.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 187.172.29.132 X-Exim-ID: 1e5BSj-0000E7-RT X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (embeddedor) [187.172.29.132]:52650 X-Source-Auth: garsilva@embeddedor.com X-Email-Count: 11 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= X-Local-Domain: yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation to enabling -Wimplicit-fallthrough, mark switch cases where we are expecting to fall through. Notice that in some cases I placed the "fall through" comment on its own line, which is what GCC is expecting to find. Signed-off-by: Gustavo A. R. Silva --- This code was tested by compilation only (GCC 7.2.0 was used). Please, verify if the actual intention of the code is to fall through. net/netfilter/ipset/ip_set_core.c | 3 ++- net/netfilter/ipvs/ip_vs_proto_tcp.c | 1 + net/netfilter/ipvs/ip_vs_proto_udp.c | 1 + net/netfilter/nf_conntrack_h323_asn1.c | 3 +++ net/netfilter/nft_cmp.c | 2 ++ net/netfilter/x_tables.c | 3 ++- 6 files changed, 11 insertions(+), 2 deletions(-) diff --git a/net/netfilter/ipset/ip_set_core.c b/net/netfilter/ipset/ip_set_core.c index cf84f7b..72f654a 100644 --- a/net/netfilter/ipset/ip_set_core.c +++ b/net/netfilter/ipset/ip_set_core.c @@ -1386,7 +1386,8 @@ ip_set_dump_start(struct sk_buff *skb, struct netlink_callback *cb) goto next_set; if (set->variant->uref) set->variant->uref(set, cb, true); - /* Fall through and add elements */ + /* add elements */ + /* fall through */ default: rcu_read_lock_bh(); ret = set->variant->list(set, skb, cb); diff --git a/net/netfilter/ipvs/ip_vs_proto_tcp.c b/net/netfilter/ipvs/ip_vs_proto_tcp.c index 1c6e101..569631d 100644 --- a/net/netfilter/ipvs/ip_vs_proto_tcp.c +++ b/net/netfilter/ipvs/ip_vs_proto_tcp.c @@ -315,6 +315,7 @@ tcp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp) switch (skb->ip_summed) { case CHECKSUM_NONE: skb->csum = skb_checksum(skb, tcphoff, skb->len - tcphoff, 0); + /* fall through */ case CHECKSUM_COMPLETE: #ifdef CONFIG_IP_VS_IPV6 if (af == AF_INET6) { diff --git a/net/netfilter/ipvs/ip_vs_proto_udp.c b/net/netfilter/ipvs/ip_vs_proto_udp.c index 30e11cd..c15ef7c 100644 --- a/net/netfilter/ipvs/ip_vs_proto_udp.c +++ b/net/netfilter/ipvs/ip_vs_proto_udp.c @@ -319,6 +319,7 @@ udp_csum_check(int af, struct sk_buff *skb, struct ip_vs_protocol *pp) case CHECKSUM_NONE: skb->csum = skb_checksum(skb, udphoff, skb->len - udphoff, 0); + /* fall through */ case CHECKSUM_COMPLETE: #ifdef CONFIG_IP_VS_IPV6 if (af == AF_INET6) { diff --git a/net/netfilter/nf_conntrack_h323_asn1.c b/net/netfilter/nf_conntrack_h323_asn1.c index 89b2e46..7336e5c 100644 --- a/net/netfilter/nf_conntrack_h323_asn1.c +++ b/net/netfilter/nf_conntrack_h323_asn1.c @@ -250,12 +250,15 @@ static unsigned int get_uint(bitstr_t *bs, int b) case 4: v |= *bs->cur++; v <<= 8; + /* fall through */ case 3: v |= *bs->cur++; v <<= 8; + /* fall through */ case 2: v |= *bs->cur++; v <<= 8; + /* fall through */ case 1: v |= *bs->cur++; break; diff --git a/net/netfilter/nft_cmp.c b/net/netfilter/nft_cmp.c index c2945eb..fa90a84 100644 --- a/net/netfilter/nft_cmp.c +++ b/net/netfilter/nft_cmp.c @@ -44,6 +44,7 @@ static void nft_cmp_eval(const struct nft_expr *expr, case NFT_CMP_LT: if (d == 0) goto mismatch; + /* fall through */ case NFT_CMP_LTE: if (d > 0) goto mismatch; @@ -51,6 +52,7 @@ static void nft_cmp_eval(const struct nft_expr *expr, case NFT_CMP_GT: if (d == 0) goto mismatch; + /* fall through */ case NFT_CMP_GTE: if (d < 0) goto mismatch; diff --git a/net/netfilter/x_tables.c b/net/netfilter/x_tables.c index d8571f4..fa5cdd0 100644 --- a/net/netfilter/x_tables.c +++ b/net/netfilter/x_tables.c @@ -1382,7 +1382,8 @@ static void *xt_mttg_seq_next(struct seq_file *seq, void *v, loff_t *ppos, trav->curr = trav->curr->next; if (trav->curr != trav->head) break; - /* fallthru, _stop will unlock */ + /* _stop will unlock */ + /* fall through */ default: return NULL; } -- 2.7.4 From 1583482444782463928@xxx Wed Nov 08 07:35:38 +0000 2017 X-GM-THRID: 1583463356155294722 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread