Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2550779yba; Mon, 15 Apr 2019 14:12:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqxxPdUfs4oQP/ET8T170kz/VUE2yPUpf77K638lJU/n7cD2X0c2h8I44UC8RmP4I2bepM/q X-Received: by 2002:a17:902:526:: with SMTP id 35mr77266385plf.276.1555362757605; Mon, 15 Apr 2019 14:12:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555362757; cv=none; d=google.com; s=arc-20160816; b=SYbwn1rPAa+4/eOmdZBycIcz6QB66ot08J9ML6ZLJ2hDr3DO0M4svWqh+TOO9OmiBv rfAq+ttrWPSAjrWDNnmdHWyPjULJCl31fpZ1nIGWbl6tBQo6hBzTOdO8CUFETVcDLMIe u/yYgR25AVJB8RC3Ersq9vTcnaWx8QC0CvFQcCxkSyc6j9aiPeupaNswvvrF4mdj7sLc +bBhyBKdfUweT2UGjZs50lvGE6B0ZKK/PKOkvFEOtXNt9q4eLLvRfuMbKzbs2tOXbrlj /v1No3UFSqL1LXibSoeE1F1z8fS0mM6h1qwKVEWirucyAfJsod0XOiQhZ70E9C3mA/iL 1uKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-transfer-encoding :content-disposition:mime-version:message-id:subject:cc:to:from:date; bh=GLxBxL2PFwbUPIVhIXM1c3v5hJocgxOueDR4GuupeNQ=; b=NKWhKiWH1NOX3pnPsLblhofsM4vD0M68gXozbpdxYD8223Ol4GtT+kUp7B2zeta0vg eH8PUWDz4SlYeBrg5qw2YF0fvWs8uFArS6oAllmhYBgtySLEP9h8FvPzhq1eNm7iMvqD +WV9Uzi6aTZIyTHWibLQHt9MasD15IG7k75GVYO1r9VLU4+jGX1ydno0oxblKZZvEKeg kp+b3A3eBiDseiHzvuN/iDH6qt5omCvAgyznlJYDyxtwilTBskNc/mg6Xy2QgYJaC5fI i5LP9SxTLkw97LdcKktXQKR8J+LBb77NsAuD9DXJAJvL4Cx58K4TGshyC/2RTUI5uXu1 jlqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5si26695044pla.230.2019.04.15.14.12.19; Mon, 15 Apr 2019 14:12:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727243AbfDOVLp (ORCPT + 99 others); Mon, 15 Apr 2019 17:11:45 -0400 Received: from gateway23.websitewelcome.com ([192.185.49.124]:14671 "EHLO gateway23.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726340AbfDOVLp (ORCPT ); Mon, 15 Apr 2019 17:11:45 -0400 Received: from cm10.websitewelcome.com (cm10.websitewelcome.com [100.42.49.4]) by gateway23.websitewelcome.com (Postfix) with ESMTP id 3FF40C3AB for ; Mon, 15 Apr 2019 16:11:44 -0500 (CDT) Received: from gator4166.hostgator.com ([108.167.133.22]) by cmsmtp with SMTP id G8tEhE8fA2PzOG8tEhmH6F; Mon, 15 Apr 2019 16:11:44 -0500 X-Authority-Reason: nr=8 Received: from [189.250.55.242] (port=53160 helo=embeddedor) by gator4166.hostgator.com with esmtpa (Exim 4.91) (envelope-from ) id 1hG8tD-001APC-Av; Mon, 15 Apr 2019 16:11:43 -0500 Date: Mon, 15 Apr 2019 16:11:41 -0500 From: "Gustavo A. R. Silva" To: Boris Ostrovsky , Juergen Gross , Stefano Stabellini , "David S. Miller" Cc: xen-devel@lists.xenproject.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , Kees Cook Subject: [PATCH net-next] xen-netfront: mark expected switch fall-through Message-ID: <20190415211141.GA1732@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit User-Agent: Mutt/1.9.4 (2018-02-28) X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 189.250.55.242 X-Source-L: No X-Exim-ID: 1hG8tD-001APC-Av X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: (embeddedor) [189.250.55.242]:53160 X-Source-Auth: gustavo@embeddedor.com X-Email-Count: 7 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= X-Local-Domain: yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation to enabling -Wimplicit-fallthrough, mark switch cases where we are expecting to fall through. This patch fixes the following warning: drivers/net/xen-netfront.c: In function ‘netback_changed’: drivers/net/xen-netfront.c:2038:6: warning: this statement may fall through [-Wimplicit-fallthrough=] if (dev->state == XenbusStateClosed) ^ drivers/net/xen-netfront.c:2041:2: note: here case XenbusStateClosing: ^~~~ Warning level 3 was used: -Wimplicit-fallthrough=3 Notice that, in this particular case, the code comment is modified in accordance with what GCC is expecting to find. This patch is part of the ongoing efforts to enable -Wimplicit-fallthrough. Signed-off-by: Gustavo A. R. Silva --- drivers/net/xen-netfront.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c index 80c30321de41..8d33970a2950 100644 --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -2037,7 +2037,7 @@ static void netback_changed(struct xenbus_device *dev, case XenbusStateClosed: if (dev->state == XenbusStateClosed) break; - /* Missed the backend's CLOSING state -- fallthrough */ + /* Fall through - Missed the backend's CLOSING state. */ case XenbusStateClosing: xenbus_frontend_closed(dev); break; -- 2.21.0