Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp2047608pxb; Mon, 11 Oct 2021 20:08:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyUYW0sbhI/i/jYcudYENjdaNAdMPIyswPEI6CqZ3ZYPuyOW86JuHI0MxRczuZ/UOOD4Xu8 X-Received: by 2002:a05:6a00:708:b0:43b:80ba:99c8 with SMTP id 8-20020a056a00070800b0043b80ba99c8mr29260401pfl.51.1634008100568; Mon, 11 Oct 2021 20:08:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634008100; cv=none; d=google.com; s=arc-20160816; b=TgCy8tURsJjS5hFlgyzpCFOool39aj6Dukd6UtIwUupbMTkWOo6MX4Ed6HWZaL0LoN IraB+om3tU8KPaUSm8Zgz5yNTgylJnuLC9mytEbXOMbpe1vZiNZCyccm1oe8ri4lXh2V /Rg611H16bn1dRmy9iWk47LGK6uCpCqGB+ut0bBZdgWQYLR1cMa2gEl/eOmgysn16zOM 9OtnAEG/jNlxlXK3slyOXVeVM3/0BAnvUjfBq6IxklgKPWM/EGkdJwgjDihk5PZIFL25 Axr3ASex+wY70OjgaIgmcijiTb29FfHNczNIIOlRBCs0iv0picZBCla/akq38/WLvJnQ O/rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=i0GYi441Cz1gN6baGx9imTv5XPAzDb0U8lUlunxw0II=; b=mgwa9WEtAVHRcmvOvmniqij1XTDOz84WCd9YDSJd7W8sPXvfY+YYyDPMGWJYRru8sk rIiiV7Ou308B73h4RtgMkytokXtm+PkysSuarmSLk31TOFeDfC+07TQaGXG9+BlvsWhH 7GWhZQCsjpp18FCumfmDkpgEw4WPtNfPMqrHt32vVh7GVE8Z+2ejqm/KNEKBHJEITEeS v+iInl19pfpT3hYyGbO3ZZ1CKUavIKmZK/gDOdqEQzNu/vYm5oFitc7t6qI9wcIWlfOP nZPR8WtQUBQri+oYqRwYNQAWoPg0f5lZkT4CTwRTXNDnwbWqf2zOzPgzCaHs9poAbP6J kmBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n63si13811670pfn.194.2021.10.11.20.08.06; Mon, 11 Oct 2021 20:08:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232034AbhJLDIh (ORCPT + 99 others); Mon, 11 Oct 2021 23:08:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:59440 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231742AbhJLDIg (ORCPT ); Mon, 11 Oct 2021 23:08:36 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AFB8560E05; Tue, 12 Oct 2021 03:06:34 +0000 (UTC) Date: Mon, 11 Oct 2021 23:06:33 -0400 From: Steven Rostedt To: davidcomponentone@gmail.com Cc: Viktor.Rosendahl@bmw.de, colin.king@canonical.com, vulab@iscas.ac.cn, linux-kernel@vger.kernel.org, Zeal Robot Subject: Re: [PATCH] Fix application of sizeof to pointer Message-ID: <20211011230633.262b54a5@oasis.local.home> In-Reply-To: <20211012025424.180781-1-davidcomponentone@gmail.com> References: <20211012025424.180781-1-davidcomponentone@gmail.com> X-Mailer: Claws Mail 3.18.0 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 12 Oct 2021 10:54:24 +0800 davidcomponentone@gmail.com wrote: > From: David Yang > > The coccinelle check report: > "./tools/tracing/latency/latency-collector.c:1541:10-16: > ERROR: application of sizeof to pointer" > Using the "strlen" to fix it. > > Reported-by: Zeal Robot > Signed-off-by: David Yang > --- > tools/tracing/latency/latency-collector.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/tools/tracing/latency/latency-collector.c b/tools/tracing/latency/latency-collector.c > index 3a2e6bb781a8..b131007e6c70 100644 > --- a/tools/tracing/latency/latency-collector.c > +++ b/tools/tracing/latency/latency-collector.c > @@ -1538,7 +1538,7 @@ static void tracing_loop(void) > mutex_lock(&print_mtx); > check_signals(); > write_or_die(fd_stdout, queue_full_warning, > - sizeof(queue_full_warning)); > + strlen(queue_full_warning) + 1); Really, the +1, although would match if queue_full_warning was an array, but in this use case, there's no reason to pass the nul character to the write. -- Steve > mutex_unlock(&print_mtx); > } > modified--;