lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20201005165643.GA32369@alley> Date: Mon, 5 Oct 2020 18:56:43 +0200 From: Petr Mladek <pmladek@...e.com> To: "Gustavo A. R. Silva" <gustavoars@...nel.org> Cc: Sergey Senozhatsky <sergey.senozhatsky@...il.com>, Steven Rostedt <rostedt@...dmis.org>, John Ogness <john.ogness@...utronix.de>, linux-kernel@...r.kernel.org, linux-hardening@...r.kernel.org Subject: Re: [PATCH][next] printk: Use fallthrough pseudo-keyword On Fri 2020-10-02 17:46:27, Gustavo A. R. Silva wrote: > Replace /* FALL THRU */ comment with the new pseudo-keyword macro > fallthrough[1]. > > [1] https://www.kernel.org/doc/html/v5.7/process/deprecated.html?highlight=fallthrough#implicit-switch-case-fall-through > > Signed-off-by: Gustavo A. R. Silva <gustavoars@...nel.org> The patch is committed in printk/linux.git, branch for-5.10. Best Regards, Petr
Powered by blists - more mailing lists