}
default:
- break;
+ ;
}
fields[f] = utf8_to_utf16(buf, size);
default:
r = table_add_many(table, TABLE_EMPTY);
- break;
}
if (r < 0)
return table_log_add_error(r);
default:
r = table_add_many(table, TABLE_EMPTY);
- break;
}
-
if (r < 0)
return table_log_add_error(r);
case 2:
if (!is_locale_utf8())
return strdup("..");
-
- break;
-
- default:
break;
}
break;
default:
printf(" console-mode (config): %" PRIi64 "\n", config->console_mode);
- break;
}
/* EFI var console mode is always a concrete value or unset. */
fprintf(stdout, "\nUnknown key '%c'. Ignoring.", key);
fflush(stdout);
sleep(1);
- break;
}
}
}
default:
log_unit_error(UNIT(a), "Received unknown automount request %i", packet.hdr.type);
- break;
}
return 0;
break;
default:
- break;
+ ;
}
r = serialize_std_out_err(c, f, STDOUT_FILENO);
case LOG_TARGET_CONSOLE:
default:
command_line[pos++] = "--log-target=console";
- break;
};
if (log_get_show_color())
mount_set_state(m, MOUNT_MOUNTING_DONE);
break;
default:
- break;
+ ;
}
else
switch (m->state) {
mount_enter_dead(m, MOUNT_SUCCESS, /* flush_result = */ false);
break;
default:
- break;
+ ;
}
}
break;
default:
- break;
+ ;
}
} else if (mount->proc_flags & (MOUNT_PROC_JUST_MOUNTED|MOUNT_PROC_JUST_CHANGED)) {
* in case somebody is waiting for this. (e.g. file system ro/rw
* remounts.) */
mount_set_state(mount, mount->state);
- break;
}
}
break;
default:
log_warning_errno(r, "Failed to load Smack/CIPSO access rules, ignoring: %m");
- break;
}
r = write_netlabel_rules("/etc/smack/netlabel.d/");
break;
default:
log_warning_errno(r, "Failed to load Smack network host rules: %m, ignoring.");
- break;
}
r = write_onlycap_list();
default:
/* Fire again */
swap_set_state(swap, swap->state);
- break;
}
if (swap->what)
break;
default:
- /* Nothing really changed, but let's
- * issue an notification call
- * nonetheless, in case somebody is
- * waiting for this. */
+ /* Nothing really changed, but let's issue an notification call nonetheless,
+ * in case somebody is waiting for this. */
swap_set_state(swap, swap->state);
- break;
}
}
break;
default:
- break;
+ ;
}
r = iovw_put_string_field(iovw, meta_field_names[i], t);
v = detect_virtualization();
if (v < 0)
return log_error_errno(v, "Failed to check for virtualization: %m");
- break;
}
if (!arg_quiet)
default:
/* All other actions need the image dissected (except for ACTION_VALIDATE, see below) */
- break;
+ ;
}
if (arg_image) {
_found = true; \
break; \
default: \
- break; \
+ ; \
} \
_found; \
})
break;
default:
- break;
+ ;
}
r = home_store_header_identity_luks(new_home, &setup, header_home);
(void) pam_prompt_graceful(handle, PAM_ERROR_MSG, NULL, _("User record not valid, prohibiting access."));
return PAM_ACCT_EXPIRED;
}
-
- break;
}
t = user_record_ratelimit_next_try(ur);
(void) pam_prompt_graceful(handle, PAM_ERROR_MSG, NULL, _("User record not valid, prohibiting access."));
return PAM_AUTHTOK_EXPIRED;
}
-
- break;
}
return PAM_SUCCESS;
break;
default:
counter = h->good_authentication_counter + 1;
- break;
}
usec = now(CLOCK_REALTIME);
break;
default:
counter = h->bad_authentication_counter + 1;
- break;
}
usec = now(CLOCK_REALTIME);
default:
assert_not_reached();
- break;
}
if (r < 0)
return log_error_errno(r, "Failed to strip suffix from URL '%s': %m", remote);
break;
default:
- break;
+ ;
}
if (t->verify != _IMPORT_VERIFY_INVALID) {
default:
if (cb)
cb(code, len, option, userdata);
-
- break;
}
offset += len;
return -EINVAL;
default:
- break;
+ ;
}
return set_ensure_put(&client->req_opts, NULL, UINT8_TO_PTR(option));
default:
log_dhcp_client(client, "REQUEST (invalid)");
- break;
}
return 0;
default:
log_debug("Ignoring DHCP option %"PRIu8" while parsing.", code);
- break;
}
return 0;
break;
default:
- break;
+ ;
}
offset += plen;
}
static int check_options(uint8_t code, uint8_t len, const void *option, void *userdata) {
switch (code) {
- case SD_DHCP_OPTION_CLIENT_IDENTIFIER:
- {
+ case SD_DHCP_OPTION_CLIENT_IDENTIFIER: {
sd_dhcp_duid duid;
uint32_t iaid;
}
default:
- break;
+ ;
}
return 0;
break;
default:
assert_se(0);
- break;
}
}
default:
align = bus_type_get_alignment(type);
sz = bus_type_get_size(type);
- break;
}
assert(align > 0);
default:
p = userdata;
- break;
}
return sd_bus_message_append_basic(reply, v->x.property.signature[0], p);
r = sd_bus_message_read_basic(value, v->x.property.signature[0], userdata);
if (r < 0)
return r;
-
- break;
}
return 1;
return r;
wait = false;
- break;
- }
- }
+ }}
}
if (mmap_cache_fd_got_sigbus(f->cache_fd))
log_info("Type: %s \n", s);
else
log_info("Type: unknown (%i)", o->object.type);
-
- break;
}
c = COMPRESSION_FROM_OBJECT(o);
}
default:
- break;
+ ;
}
mismatch:
}
default:
- break;
+ ;
}
mismatch:
}
default:
- break;
+ ;
}
mismatch:
return false;
default:
- break;
+ ;
}
mismatch:
fprintf(f, "\\u%04x", (unsigned) *q);
else
fputc(*q, f);
- break;
}
if (flags & SD_JSON_FORMAT_COLOR)
default:
b->button_modifier_mask |= button_get_keycode_modifier_mask(ev.code);
- break;
}
} else if (ev.type == EV_KEY && ev.value == 0) {
default:
b->button_modifier_mask &= ~button_get_keycode_modifier_mask(ev.code);
- break;
}
} else if (ev.type == EV_SW && ev.value > 0) {
case DEVICE_TYPE_UNKNOWN:
default:
/* fallback for devices without synchronizations */
- break;
+ ;
}
return TAKE_FD(fd);
case DEVICE_TYPE_UNKNOWN:
default:
/* fallback for devices without synchronizations */
- break;
+ ;
}
sd->active = true;
case DEVICE_TYPE_UNKNOWN:
default:
/* fallback for devices without synchronization */
- break;
+ ;
}
sd->active = false;
break;
default:
- break;
+ ;
}
pam_debug_syslog(handle, debug, "Automatically chose session class '%s'.", c->class);
case NETDEV_L2TP_ENCAPTYPE_UDP:
default:
encap_type = L2TP_ENCAPTYPE_UDP;
- break;
}
r = sd_netlink_message_append_u16(m, L2TP_ATTR_ENCAP_TYPE, encap_type);
default:
l2_spec_type = L2TP_L2SPECTYPE_DEFAULT;
l2_spec_len = 4;
- break;
}
r = sd_netlink_message_append_u8(m, L2TP_ATTR_L2SPEC_TYPE, l2_spec_type);
case NETDEV_IP6_TNL_MODE_ANYIP6:
default:
proto = 0;
- break;
}
r = sd_netlink_message_append_u8(m, IFLA_IPTUN_PROTO, proto);
break;
default:
- /* treat any other address family as AF_UNSPEC */
- break;
+ assert_not_reached();
}
}
return r;
default:
- /* treat any other address family as AF_UNSPEC */
- return 0;
+ assert_not_reached();
}
}
"%s: MulticastGroupAddress= is the multicast all nodes address. "
"Ignoring [BridgeMDB] section from line %u.",
mdb->section->filename, mdb->section->line);
- break;
}
break;
default:
log_link_warning_errno(link, event, "DHCP error: Client failed: %m");
else
log_link_warning(link, "DHCP unknown event: %i", event);
- break;
}
return 0;
break;
default:
log_link_warning(link, "IPv4 link-local unknown event: %d", event);
- break;
}
}
break;
default:
- /* treat any other address family as AF_UNSPEC */
- break;
+ assert_not_reached();
}
}
return route_nexthops_compare_func(a, b);
default:
- /* treat any other address family as AF_UNSPEC */
- return 0;
+ assert_not_reached();
}
}
return -EALREADY; /* Not necessary to set the same value. */
req->userdata = UINT32_TO_PTR(mtu);
- return true;
+ break;
}
default:
- break;
+ ;
}
return true;
r = strextendf_with_separator(&rec->description, ", ", "Tag 0x%" PRIx32 ": %s", tag->taggedEventID, s);
if (r < 0)
return log_error_errno(r, "Failed to format EV_EVENT_TAG description string: %m");
-
- break;
}}
tag = (TCG_PCClientTaggedEvent*) ((uint8_t*) tag + m);
hdata = record->firmware_payload;
hsz = record->firmware_payload_size;
strict = false;
- break;
}
int mdsz = EVP_MD_size(md);
default:
bad = aux;
- break;
}
}
break;
default:
- break;
+ ;
}
return 1;
break;
default:
- break;
+ ;
}
return 1;
case DNS_TYPE_OPENPGPKEY:
case _DNS_TYPE_INVALID: /* unparsable */
default:
-
r = dns_packet_append_blob(p, rr->generic.data, rr->generic.data_size, NULL);
- break;
}
if (r < 0)
goto fail;
default:
unparsable:
r = dns_packet_read_memdup(p, rdlength, &rr->generic.data, &rr->generic.data_size, NULL);
-
- break;
}
if (r < 0)
return r;
default:
if (state != DNS_TRANSACTION_SUCCESS)
state = t->state;
-
- break;
}
return state;
DNS_PACKET_REPLACE(q->answer_full_packet, dns_packet_ref(t->received));
state = t->state;
- break;
}
}
default:
/* Any kind of failure */
bad = c;
- break;
}
}
}
return strv_join(values_strv, ",");
}
- default: {
+ default:
value = decescape((char*) &i->value, i->length, " ,");
if (!value)
return NULL;
- break;
- }
}
char *qvalue;
}
if (r < 0)
return NULL;
- break;
}
rr->to_string = s;
case DNS_TYPE_OPENPGPKEY:
default:
siphash24_compress_safe(rr->generic.data, rr->generic.data_size, state);
- break;
}
}
if (!copy->generic.data)
return NULL;
copy->generic.data_size = rr->generic.data_size;
- break;
}
t = TAKE_PTR(copy);
break;
default:
- break;
+ ;
}
return NULL;
default:
bad = aux;
- break;
}
}
if (!have_success) {
default:
log_debug("Unknown event %u from /dev/rfkill for index %u and type %s, ignoring.", event.op, event.idx, type);
- break;
}
}
default:
done = true;
- break;
}
} while (!done);
default:
log_notice("Received control signal %s with unknown command 0x%08x, ignoring.",
signal_to_string(si->ssi_signo), (unsigned) si->ssi_int);
- break;
}
return 0;
break;
default:
- break;
+ ;
}
/* So, when you request MS_RDONLY from ext4, then this means nothing. It happily still writes to the
default:
log_warning_errno(err, "An error was encountered while opening journal file or directory %s, ignoring file: %m", path);
- break;
}
}
break;
default:
- break;
+ ;
}
if (!retry_with_up && !retry_with_pin)
break;
default:
- break;
+ ;
}
if (!retry_with_up && !retry_with_pin)
/* These we either know we don't support (i.e. are the ones that do use socketcall()), or we
* don't know */
supported = false;
- break;
}
if (!supported)
}
printf(" Login OK: %syes%s\n", ansi_highlight_green(), ansi_normal());
- break;
}}
r = user_record_test_password_change_required(hr);
default:
on = ansi_highlight_red();
- break;
}
printf("%s%s%s ", on, special_glyph(unit_active_state_to_glyph(state)), ansi_normal());
default:
assert_not_reached();
- break;
}
instance_free(oldest);
break;
default:
- break;
+ ;
}
if (from_cred) {
break;
default:
printf("ID_TYPE=generic\n");
- break;
}
} else
printf("ID_TYPE=disk\n");
break;
default:
log_debug("GET CONFIGURATION: feature 0x%04x <ignored>, with 0x%02x bytes", feature, features[i + 3]);
- break;
}
}
break;
default:
spare_count = 24;
- break;
}
for (offset = 0; offset < block_size * spare_count; offset += sector_size) {
break;
default:
type = "generic";
- break;
}
strscpy(to, len, type);
}
default:
log_error("Unknown or bad option '%c' (0x%x)", option, (unsigned) option);
retval = -1;
- break;
}
}
break;
case 0xff: /* Vendor-specific */
break;
- default:
- break;
}
strncpy(to, type, len);
to[len-1] = '\0';
int type_num = 0;
const char *type = "generic";
- if (safe_atoi(from, &type_num) >= 0) {
+ if (safe_atoi(from, &type_num) >= 0)
switch (type_num) {
case 1: /* RBC devices */
type = "rbc";
case 6: /* Transparent SPC-2 devices */
type = "scsi";
break;
- default:
- break;
}
- }
+
strscpy(to, len, type);
return type_num;
}
unsigned type_num;
const char *type = "generic";
- if (safe_atou(from, &type_num) >= 0) {
+ if (safe_atou(from, &type_num) >= 0)
switch (type_num) {
case 0:
case 0xe:
case 5:
type = "cd";
break;
- default:
- break;
}
- }
+
strscpy(to, len, type);
}