On Sun, 12 Oct 2025 12:34:08 +0900 Masami Hiramatsu (Google) <[email protected]> wrote:
> > Use a void pointer and get the offset via offsetof() to keep fortify > > string from warning about this copy. > > > > Cc: [email protected] > > Fixes: 64cf7d058a00 ("tracing: Have trace_marker use per-cpu data to read > > user space") > > Reported-by: [email protected] > > Closes: > > https://lore.kernel.org/all/[email protected]/ > > Signed-off-by: Steven Rostedt (Google) <[email protected]> > > Ah, fixed already. > > Acked-by: Masami Hiramatsu (Google) <[email protected]> Actually this was the wrong fix. Before submitting a pull request, I looked to see if there was a better way to handle this and discovered "unsafe_memcpy()" which is the proper solution: https://lore.kernel.org/all/[email protected]/ -- Steve
