Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp485226imu; Tue, 22 Jan 2019 23:42:44 -0800 (PST) X-Google-Smtp-Source: ALg8bN5Bv3gtn/YnjNroIaDG4jlrviRbSBa5qgKLTacXyp6sU0KjYEZjvFRU2/o8dejc7ixkheDv X-Received: by 2002:a63:ac46:: with SMTP id z6mr1086408pgn.162.1548229364636; Tue, 22 Jan 2019 23:42:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548229364; cv=none; d=google.com; s=arc-20160816; b=DNTwVxQOtxWP3IMfeBEen23CnnyXSNhhblZCZJgrgZrc4i0SyiZoJZBVp9hGtcEE1M 6Mxm6UoCoGi4/Fsl6BIm4W9wiqKG1RhowAvKhx2FfLTn8d5rP/RHzkqsaiPMtvbEd56z aJ79pJ+cG+9KjM5wDuo50Rx7E3fyYnOUMDZYY/Tjuj2azwZnVH7f1lDqBDVNzy2PMZKs l+M23TbTwGF9+aBiJYzDZhgz+6msw6z31UXEPaZyHEn9VjAbw/xvKqD9CniqgfU7cHYe McRtQ5VCJkhmZkBgE/Izw8DaDJlMtl1WxsAIR63JbrXBEuTZjnYJOaTKcwfVPMyNBjKI yj6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date; bh=lXrYwCFkOJLDRNL0wEsUPjnrJLOaUeB8mdksMT0FH6c=; b=kSJ/iQD9Sqb/RuhfzYtaaljuUBkQibayshfcUYGgfC/mAU+LMgtr6voaFBrqw5RCWY 4Av1tH4ERSEJpw0cC0AxNNMadVyyKppTl/Fqe8zDJR/QKWig4R5hYwkXWr6HapFesvNQ H5vowltbBToYDhjLa6ztuisbKZUGIlEzBkUuzIcD8in8UgGsN6loBKJIPLb+3h1cLSZq b4NNsMPiI2EJ4iQ9YYCk+W8xDjjDLevxry8nHpKNffWTwKrparWvNWjAgNxQu7q3mO7h eJ1TEy2aEqsng6q6sf/9Qk1QRxFDSXo+LIa8207Lx4jGfQod0NC6DHj8hJZ8vt+oCP1l GlYQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p16si16710383pff.272.2019.01.22.23.42.28; Tue, 22 Jan 2019 23:42:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726575AbfAWHlX (ORCPT + 99 others); Wed, 23 Jan 2019 02:41:23 -0500 Received: from gateway34.websitewelcome.com ([192.185.148.164]:41409 "EHLO gateway34.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726229AbfAWHlX (ORCPT ); Wed, 23 Jan 2019 02:41:23 -0500 Received: from cm14.websitewelcome.com (cm14.websitewelcome.com [100.42.49.7]) by gateway34.websitewelcome.com (Postfix) with ESMTP id 23150C6994 for ; Wed, 23 Jan 2019 01:41:22 -0600 (CST) Received: from gator4166.hostgator.com ([108.167.133.22]) by cmsmtp with SMTP id mDA2g3i3z2qH7mDA2gfptS; Wed, 23 Jan 2019 01:41:22 -0600 X-Authority-Reason: nr=8 Received: from [189.250.130.205] (port=47018 helo=embeddedor) by gator4166.hostgator.com with esmtpa (Exim 4.91) (envelope-from ) id 1gmDA1-003L0w-9L; Wed, 23 Jan 2019 01:41:21 -0600 Date: Wed, 23 Jan 2019 01:41:19 -0600 From: "Gustavo A. R. Silva" To: Ariel Elior , Sudarsana Kalluru , everest-linux-l2@cavium.com, "David S. Miller" , Siva Reddy Kallam , Prashant Sreedharan , Michael Chan Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" Subject: [PATCH net-next] broadcom: Mark expected switch fall-throughs Message-ID: <20190123074119.GA18304@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.9.4 (2018-02-28) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 189.250.130.205 X-Source-L: No X-Exim-ID: 1gmDA1-003L0w-9L X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (embeddedor) [189.250.130.205]:47018 X-Source-Auth: gustavo@embeddedor.com X-Email-Count: 43 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= X-Local-Domain: yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation to enabling -Wimplicit-fallthrough, mark switch cases where we are expecting to fall through. This patch fixes the following warnings: drivers/net/ethernet/broadcom/bnx2x/bnx2x_link.c:6336:6: warning: this statement may fall through [-Wimplicit-fallthrough=] drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c:2231:6: warning: this statement may fall through [-Wimplicit-fallthrough=] drivers/net/ethernet/broadcom/tg3.c:722:6: warning: this statement may fall through [-Wimplicit-fallthrough=] drivers/net/ethernet/broadcom/tg3.c:783:6: warning: this statement may fall through [-Wimplicit-fallthrough=] Warning level 3 was used: -Wimplicit-fallthrough=3 This patch is part of the ongoing efforts to enabling -Wimplicit-fallthrough. Signed-off-by: Gustavo A. R. Silva --- drivers/net/ethernet/broadcom/bnx2x/bnx2x_link.c | 2 +- drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c | 2 +- drivers/net/ethernet/broadcom/tg3.c | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_link.c b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_link.c index 29738dfa878c..d581d0ae6584 100644 --- a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_link.c +++ b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_link.c @@ -6335,7 +6335,7 @@ int bnx2x_set_led(struct link_params *params, */ if (!vars->link_up) break; - /* else: fall through */ + /* fall through */ case LED_MODE_ON: if (((params->phy[EXT_PHY1].type == PORT_HW_CFG_XGXS_EXT_PHY_TYPE_BCM8727) || diff --git a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c index c835f6c7ecd0..c97b642e6537 100644 --- a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c +++ b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_sriov.c @@ -2230,7 +2230,7 @@ int bnx2x_vf_free(struct bnx2x *bp, struct bnx2x_virtf *vf) rc = bnx2x_vf_close(bp, vf); if (rc) goto op_err; - /* Fallthrough to release resources */ + /* Fall through - to release resources */ case VF_ACQUIRED: DP(BNX2X_MSG_IOV, "about to free resources\n"); bnx2x_vf_free_resc(bp, vf); diff --git a/drivers/net/ethernet/broadcom/tg3.c b/drivers/net/ethernet/broadcom/tg3.c index b1627dd5f2fd..328373e0578f 100644 --- a/drivers/net/ethernet/broadcom/tg3.c +++ b/drivers/net/ethernet/broadcom/tg3.c @@ -721,7 +721,7 @@ static int tg3_ape_lock(struct tg3 *tp, int locknum) case TG3_APE_LOCK_GPIO: if (tg3_asic_rev(tp) == ASIC_REV_5761) return 0; - /* else: fall through */ + /* fall through */ case TG3_APE_LOCK_GRC: case TG3_APE_LOCK_MEM: if (!tp->pci_fn) @@ -782,7 +782,7 @@ static void tg3_ape_unlock(struct tg3 *tp, int locknum) case TG3_APE_LOCK_GPIO: if (tg3_asic_rev(tp) == ASIC_REV_5761) return; - /* else: fall through */ + /* fall through */ case TG3_APE_LOCK_GRC: case TG3_APE_LOCK_MEM: if (!tp->pci_fn) -- 2.20.1