We actually do have a __must_check tag so it's easy enough to force people to check. A different option is we could make it trigger a WARN_ONCE(). #define strXcpy(dest, src, len) (({ \ ssize_t __ret = strscpy_truncate(dest, src, len); \ WARN_ONCE(__ret < 0, "strXcpy trancates\n"); \ __ret; })) I have never really cared about truncation, though. I think not caring is the common case. regards, dan carpenter -- To unsubscribe from this list: send the line "unsubscribe linux-arch" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html