Blame SOURCES/0004-Review-switch-statements-for-unmarked-fall-through-c.patch

ba04b3
From 8a8b80fafcbf3843e1736daff707b7cb5b64f31f Mon Sep 17 00:00:00 2001
ba04b3
From: Phil Sutter <psutter@redhat.com>
ba04b3
Date: Wed, 20 Jun 2018 09:22:00 +0200
ba04b3
Subject: [PATCH] Review switch statements for unmarked fall through cases
ba04b3
ba04b3
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1504157
ba04b3
Upstream Status: nftables commit 7f31d3191622b
ba04b3
ba04b3
commit 7f31d3191622b650521014e311ace96aa7c5522c
ba04b3
Author: Phil Sutter <phil@nwl.cc>
ba04b3
Date:   Wed Feb 28 16:06:16 2018 +0100
ba04b3
ba04b3
    Review switch statements for unmarked fall through cases
ba04b3
ba04b3
    While revisiting all of them, clear a few oddities as well:
ba04b3
ba04b3
    - There's no point in marking empty fall through cases: They are easy to
ba04b3
      spot and a common concept when using switch().
ba04b3
ba04b3
    - Fix indenting of break statement in one occasion.
ba04b3
ba04b3
    - Drop needless braces around one case which doesn't declare variables.
ba04b3
ba04b3
    Signed-off-by: Phil Sutter <phil@nwl.cc>
ba04b3
    Signed-off-by: Florian Westphal <fw@strlen.de>
ba04b3
---
ba04b3
 src/ct.c                  | 2 +-
ba04b3
 src/evaluate.c            | 1 +
ba04b3
 src/hash.c                | 2 +-
ba04b3
 src/netlink_delinearize.c | 1 +
ba04b3
 src/rule.c                | 5 +++--
ba04b3
 5 files changed, 7 insertions(+), 4 deletions(-)
ba04b3
ba04b3
diff --git a/src/ct.c b/src/ct.c
ba04b3
index 8ab32e9..1e06013 100644
ba04b3
--- a/src/ct.c
ba04b3
+++ b/src/ct.c
ba04b3
@@ -289,7 +289,7 @@ static void ct_print(enum nft_ct_keys key, int8_t dir, uint8_t nfproto,
ba04b3
 	}
ba04b3
 
ba04b3
 	switch (key) {
ba04b3
-	case NFT_CT_SRC: /* fallthrough */
ba04b3
+	case NFT_CT_SRC:
ba04b3
 	case NFT_CT_DST:
ba04b3
 		desc = proto_find_upper(&proto_inet, nfproto);
ba04b3
 		if (desc)
ba04b3
diff --git a/src/evaluate.c b/src/evaluate.c
ba04b3
index f16bb33..25a7376 100644
ba04b3
--- a/src/evaluate.c
ba04b3
+++ b/src/evaluate.c
ba04b3
@@ -2705,6 +2705,7 @@ static int stmt_evaluate_objref_map(struct eval_ctx *ctx, struct stmt *stmt)
ba04b3
 
ba04b3
 		map->mappings->set->flags |=
ba04b3
 			map->mappings->set->init->set_flags;
ba04b3
+		/* fall through */
ba04b3
 	case EXPR_SYMBOL:
ba04b3
 		if (expr_evaluate(ctx, &map->mappings) < 0)
ba04b3
 			return -1;
ba04b3
diff --git a/src/hash.c b/src/hash.c
ba04b3
index 9cd3c8c..3355cad 100644
ba04b3
--- a/src/hash.c
ba04b3
+++ b/src/hash.c
ba04b3
@@ -20,7 +20,7 @@ static void hash_expr_print(const struct expr *expr, struct output_ctx *octx)
ba04b3
 	switch (expr->hash.type) {
ba04b3
 	case NFT_HASH_SYM:
ba04b3
 		nft_print(octx, "symhash");
ba04b3
-	break;
ba04b3
+		break;
ba04b3
 	case NFT_HASH_JENKINS:
ba04b3
 	default:
ba04b3
 		nft_print(octx, "jhash ");
ba04b3
diff --git a/src/netlink_delinearize.c b/src/netlink_delinearize.c
ba04b3
index 11fd330..61cba52 100644
ba04b3
--- a/src/netlink_delinearize.c
ba04b3
+++ b/src/netlink_delinearize.c
ba04b3
@@ -1411,6 +1411,7 @@ static void ct_meta_common_postprocess(struct rule_pp_ctx *ctx,
ba04b3
 	case OP_NEQ:
ba04b3
 		if (right->ops->type != EXPR_SET && right->ops->type != EXPR_SET_REF)
ba04b3
 			break;
ba04b3
+		/* fall through */
ba04b3
 	case OP_LOOKUP:
ba04b3
 		expr_set_type(right, left->dtype, left->byteorder);
ba04b3
 		break;
ba04b3
diff --git a/src/rule.c b/src/rule.c
ba04b3
index d744cf6..e7ccb2b 100644
ba04b3
--- a/src/rule.c
ba04b3
+++ b/src/rule.c
ba04b3
@@ -1297,7 +1297,7 @@ static void obj_print_data(const struct obj *obj,
ba04b3
 		}
ba04b3
 		}
ba04b3
 		break;
ba04b3
-	case NFT_OBJECT_CT_HELPER: {
ba04b3
+	case NFT_OBJECT_CT_HELPER:
ba04b3
 		nft_print(octx, "ct helper %s {\n", obj->handle.obj);
ba04b3
 		nft_print(octx, "\t\ttype \"%s\" protocol ",
ba04b3
 			  obj->ct_helper.name);
ba04b3
@@ -1305,7 +1305,6 @@ static void obj_print_data(const struct obj *obj,
ba04b3
 		nft_print(octx, "\t\tl3proto %s",
ba04b3
 			  family2str(obj->ct_helper.l3proto));
ba04b3
 		break;
ba04b3
-		}
ba04b3
 	case NFT_OBJECT_LIMIT: {
ba04b3
 		bool inv = obj->limit.flags & NFT_LIMIT_F_INV;
ba04b3
 		const char *data_unit;
ba04b3
@@ -1617,11 +1616,13 @@ static int do_command_reset(struct netlink_ctx *ctx, struct cmd *cmd)
ba04b3
 	switch (cmd->obj) {
ba04b3
 	case CMD_OBJ_COUNTERS:
ba04b3
 		dump = true;
ba04b3
+		/* fall through */
ba04b3
 	case CMD_OBJ_COUNTER:
ba04b3
 		type = NFT_OBJECT_COUNTER;
ba04b3
 		break;
ba04b3
 	case CMD_OBJ_QUOTAS:
ba04b3
 		dump = true;
ba04b3
+		/* fall through */
ba04b3
 	case CMD_OBJ_QUOTA:
ba04b3
 		type = NFT_OBJECT_QUOTA;
ba04b3
 		break;
ba04b3
-- 
ba04b3
1.8.3.1
ba04b3