ath6kl: Use fallthrough pseudo-keyword
authorGustavo A. R. Silva <gustavoars@kernel.org>
Mon, 27 Jul 2020 19:51:11 +0000 (14:51 -0500)
committerKalle Valo <kvalo@codeaurora.org>
Mon, 17 Aug 2020 10:21:19 +0000 (13:21 +0300)
Replace the existing /* fall through */ comments and its variants with
the new pseudo-keyword macro fallthrough[1].

[1] https://www.kernel.org/doc/html/v5.7/process/deprecated.html?highlight=fallthrough#implicit-switch-case-fall-through

Signed-off-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Link: https://lore.kernel.org/r/20200727195111.GA1603@embeddedor
drivers/net/wireless/ath/ath6kl/cfg80211.c
drivers/net/wireless/ath/ath6kl/main.c

index 67f8f2aa7a5363de33f46a73cdd296eba1cd1235..9c83e9a4299b030786d95df4b79c68cb3e1a5551 100644 (file)
@@ -3897,19 +3897,19 @@ int ath6kl_cfg80211_init(struct ath6kl *ar)
        switch (ar->hw.cap) {
        case WMI_11AN_CAP:
                ht = true;
-               /* fall through */
+               fallthrough;
        case WMI_11A_CAP:
                band_5gig = true;
                break;
        case WMI_11GN_CAP:
                ht = true;
-               /* fall through */
+               fallthrough;
        case WMI_11G_CAP:
                band_2gig = true;
                break;
        case WMI_11AGN_CAP:
                ht = true;
-               /* fall through */
+               fallthrough;
        case WMI_11AG_CAP:
                band_2gig = true;
                band_5gig = true;
index 5e7ea838a9218565d2b4a7760df0d2a9fc4e2142..210218298e13c7cd9f595d5eadc2c0230e5439fc 100644 (file)
@@ -389,7 +389,7 @@ void ath6kl_connect_ap_mode_bss(struct ath6kl_vif *vif, u16 channel)
                if (!ik->valid || ik->key_type != WAPI_CRYPT)
                        break;
                /* for WAPI, we need to set the delayed group key, continue: */
-               /* fall through */
+               fallthrough;
        case WPA_PSK_AUTH:
        case WPA2_PSK_AUTH:
        case (WPA_PSK_AUTH | WPA2_PSK_AUTH):