• H
    mm: Adjust do_pages_stat() so gcc can see copy_from_user() is safe · b9255850
    H. Peter Anvin 提交于
    Slightly adjust the logic for determining the size of the
    copy_form_user() in do_pages_stat(); with this change, gcc can see
    that the copying is safe.
    
    Without this, we get a build error for i386 allyesconfig:
    
    /home/hpa/kernel/linux-2.6-tip.urgent/arch/x86/include/asm/uaccess_32.h:213:
    error: call to ‘copy_from_user_overflow’ declared with attribute
    error: copy_from_user() buffer size is not provably correct
    
    Unlike an earlier patch from Arjan, this doesn't introduce new
    variables; merely reshuffles the compare so that gcc can see that an
    overflow cannot happen.
    Signed-off-by: NH. Peter Anvin <hpa@zytor.com>
    Cc: Brice Goglin <Brice.Goglin@inria.fr>
    Cc: Arjan van de Ven <arjan@infradead.org>
    Cc: Andrew Morton <akpm@linux-foundation.org>
    Cc: KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
    LKML-Reference: <20090926205406.30d55b08@infradead.org>
    b9255850
migrate.c 26.3 KB