From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965258AbeALTia (ORCPT + 1 other); Fri, 12 Jan 2018 14:38:30 -0500 Received: from mail-qk0-f195.google.com ([209.85.220.195]:36713 "EHLO mail-qk0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965081AbeALTi1 (ORCPT ); Fri, 12 Jan 2018 14:38:27 -0500 X-Google-Smtp-Source: ACJfBosd9nAvLJFpIQEaKmtkpWoNgJyJOL3cZRIw//LQ0pMfxOX0S2IrKJeGOWOI7DVAjnfiVlHbHA== Date: Fri, 12 Jan 2018 11:38:18 -0800 From: Tejun Heo To: Linus Torvalds Cc: Linux Kernel Mailing List , Li Zefan , Johannes Weiner , cgroups , Ma Shimiao , Arnd Bergmann , Chris Metcalf Subject: Re: [PATCH] string: drop __must_check from strscpy() and restore strscpy() usages in cgroup Message-ID: <20180112193818.GM3460072@devbig577.frc2.facebook.com> References: <20180108145223.GS3668920@devbig577.frc2.facebook.com> <20180108192801.GZ3668920@devbig577.frc2.facebook.com> <20180109152115.GH3668920@devbig577.frc2.facebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180109152115.GH3668920@devbig577.frc2.facebook.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: Hello, Linus. On Tue, Jan 09, 2018 at 07:21:15AM -0800, Tejun Heo wrote: > From ceb2d2b2e496f180be95adb670337bb254f89323 Mon Sep 17 00:00:00 2001 > From: Tejun Heo > Date: Tue, 9 Jan 2018 07:00:29 -0800 > MIME-Version: 1.0 > Content-Type: text/plain; charset=UTF-8 > Content-Transfer-Encoding: 8bit > > e7fd37ba1217 ("cgroup: avoid copying strings longer than the buffers") > converted possibly unsafe strncpy() usages in cgroup to strscpy(). > However, although the callsites are completely fine with truncated > copied, because strscpy() is marked __must_check, it led to the > following warnings. Do you want to pick up this patch? If not, I can route it through cgroup tree. Thanks. -- tejun