sctp: avoid compiler warning on implicit fallthru
These fall-through are expected. Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com> Acked-by: Neil Horman <nhorman@tuxdriver.com> Reviewed-by: Xin Long <lucien.xin@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
6503a30440
commit
37f47bc90c
|
@ -826,6 +826,7 @@ static int sctp_inet6_af_supported(sa_family_t family, struct sctp_sock *sp)
|
|||
case AF_INET:
|
||||
if (!__ipv6_only_sock(sctp_opt2sk(sp)))
|
||||
return 1;
|
||||
/* fallthru */
|
||||
default:
|
||||
return 0;
|
||||
}
|
||||
|
|
|
@ -918,9 +918,9 @@ static void sctp_outq_flush(struct sctp_outq *q, int rtx_timeout, gfp_t gfp)
|
|||
break;
|
||||
|
||||
case SCTP_CID_ABORT:
|
||||
if (sctp_test_T_bit(chunk)) {
|
||||
if (sctp_test_T_bit(chunk))
|
||||
packet->vtag = asoc->c.my_vtag;
|
||||
}
|
||||
/* fallthru */
|
||||
/* The following chunks are "response" chunks, i.e.
|
||||
* they are generated in response to something we
|
||||
* received. If we are sending these, then we can
|
||||
|
|
Loading…
Reference in New Issue