From mboxrd@z Thu Jan 1 00:00:00 1970 From: Krzysztof Halasa Subject: Re: [git patches] two warning fixes Date: Thu, 19 Jul 2007 15:38:46 +0200 Message-ID: References: <20070718235504.GA9601@havoc.gtf.org> Mime-Version: 1.0 Return-path: In-Reply-To: (Linus Torvalds's message of "Wed, 18 Jul 2007 18:37:53 -0700 (PDT)") Sender: linux-kernel-owner@vger.kernel.org List-Id: Cc: Jeff Garzik , Andrew Morton , LKML , ak@suse.de, adaplas@gmail.com, linux-fbdev-devel@lists.sourceforge.net, benh@kernel.crashing.org Linus Torvalds writes: > So let's make a new rule: > > We absolutely NEVER add things like "must_check" unless not checking > causes a real and obvious SECURITY ISSUE. Oh, come on, almost every kernel bug is a potential security issue. IMHO, if the function can only fail due to a kernel bug, it should return void and, in case of bug, explode with BUG_ON() or something like that. Sure, must_check doesn't apply too well to void. But, if I have functions which can fail for legitimate (not kernel bug) reasons, and I know ignoring their return values would always be a bug, then must_check seems an obvious best and simple defense against that. -- Krzysztof Halasa