We actually do have a __must_check tag so it's easy enough to force
people to check.  A different option is we could make it trigger a
WARN_ONCE().

#define strXcpy(dest, src, len) (({                             \
        ssize_t __ret = strscpy_truncate(dest, src, len);       \
        WARN_ONCE(__ret < 0, "strXcpy trancates\n");            \
        __ret; }))

I have never really cared about truncation, though.  I think not caring
is the common case.

regards,
dan carpenter

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to