Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1484724pxb; Fri, 20 Nov 2020 10:34:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJzyTTOyrPK65wxCKy8U9fcV1WHqqUZKCNA3vPKsF/+en2S4DvBm3IHc+CLLQGnRyRWXwSaF X-Received: by 2002:a17:906:c1ce:: with SMTP id bw14mr33664403ejb.302.1605897267327; Fri, 20 Nov 2020 10:34:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605897267; cv=none; d=google.com; s=arc-20160816; b=LYU4sVh34hNxABjR6+9oBtZ/vBVtUzmdzzzbzjmKN4D5hBlTB9ZeEtx2EpouW0dvK3 oa+gAiSqZ9yJ7PnXd7Wtah5ouYyVcbTYJodlzkodqZcEHQyJyfriTSmyv4zDccNfiV6z FwNcHhl+m8rRnMRd4WiuFfNZRKycciRLi98+NX6QwvD/TUlrBG1jQw5iHedgCJWNJVEL PDY9HUccxWwth6YcvYH/QSruaUsL9S+U6aiJFLNZKdE49/d3HachrP10uIQ0KCEV58z5 SNhSmZaWSS/K2R9RzJDStl8oLuYhHdu6gxBqmBuL39n6ijU6sRdFAdwdRBZQf2iYPx2t 3bQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=gkjwji2UI9rUiUGWCCrLxuInj2Dk9XfvgkTHneJ5z1s=; b=Gph2ic54CEiWHCpwHkGaK/ii9il3Oubrjw/GiznmEtrN0A1C0UXlHCuNAV8LEpuk8N GtyXxjkqkCQHehsHzve6qRxYh77zfZ6m6X+dFcf9hcO8g+LxY8YxvCIMoT7B4R1/CZJ7 lhDpEVZrzMrJJ42RWRAnRXsItHTsKvF0amXXZakFRS09hC0RKCuIroEMf6VlhsDawH6B Q92WYLWF8m5lGLJyzynScwUT76eNovDWuQguXBZxl4/hkswhQ8+U7ea75elFhUe6WbXS CoqXQM6AJNXl3L3N/ggCRULr+4ozAy7H/qFOYNme84m/dJ1Wl6YZ3bNWl+JT4S4vqMy0 hE+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="lQ2h4K/y"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q23si2807906edb.127.2020.11.20.10.34.04; Fri, 20 Nov 2020 10:34:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="lQ2h4K/y"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730690AbgKTScV (ORCPT + 99 others); Fri, 20 Nov 2020 13:32:21 -0500 Received: from mail.kernel.org ([198.145.29.99]:51404 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730416AbgKTScV (ORCPT ); Fri, 20 Nov 2020 13:32:21 -0500 Received: from embeddedor (187-162-31-110.static.axtel.net [187.162.31.110]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D2C0B2415A; Fri, 20 Nov 2020 18:32:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605897140; bh=1LZU8FpZUMLgvhSd5M/jyE0eLp713Xrz3qaYf9NDI8I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=lQ2h4K/yHomv4tUQRLyfVMLME7HMghpj5JWLVl1UZ/TkGGGgBWgtaVtFS1a7riutP 7lSdn4OnbVULu5xGcs+lZX8SAEYIllOrNMZX7y2Bpmy9ZK9kdunhTaBXpMn07u70K8 6dYLo73W84y05FwjIIFl4ojPOmiF5K/sm8FmXL/E= Date: Fri, 20 Nov 2020 12:32:26 -0600 From: "Gustavo A. R. Silva" To: Paul Moore , Stephen Smalley , Eric Paris Cc: selinux@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org, "Gustavo A. R. Silva" Subject: [PATCH 053/141] selinux: Fix fall-through warnings for Clang Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation to enable -Wimplicit-fallthrough for Clang, fix a warning by explicitly adding a break statement instead of letting the code fall through to the next case. Link: https://github.com/KSPP/linux/issues/115 Signed-off-by: Gustavo A. R. Silva --- security/selinux/hooks.c | 1 + 1 file changed, 1 insertion(+) diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index 6b1826fc3658..e57774367b3a 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c @@ -4029,6 +4029,7 @@ static int selinux_kernel_load_data(enum kernel_load_data_id id, bool contents) switch (id) { case LOADING_MODULE: rc = selinux_kernel_module_from_file(NULL); + break; default: break; } -- 2.27.0