diff options
author | Stephen Boyd <sboyd@codeaurora.org> | 2011-05-12 16:50:07 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2011-05-13 16:15:35 -0700 |
commit | c42d2237143fcf35cff642cefe2bcf7786aae312 (patch) | |
tree | 24fb14faa42a47650567708f98fe035186721427 /ipc | |
parent | 82a3242e11d9e63c8195be46c954efaefee35e22 (diff) | |
download | linux-stable-c42d2237143fcf35cff642cefe2bcf7786aae312.tar.gz linux-stable-c42d2237143fcf35cff642cefe2bcf7786aae312.tar.bz2 linux-stable-c42d2237143fcf35cff642cefe2bcf7786aae312.zip |
debugfs: Silence DEBUG_STRICT_USER_COPY_CHECKS=y warning
Enabling DEBUG_STRICT_USER_COPY_CHECKS causes the following
warning:
In file included from arch/x86/include/asm/uaccess.h:573,
from include/linux/uaccess.h:5,
from include/linux/highmem.h:7,
from include/linux/pagemap.h:10,
from fs/debugfs/file.c:18:
In function 'copy_from_user',
inlined from 'write_file_bool' at fs/debugfs/file.c:435:
arch/x86/include/asm/uaccess_64.h:65: warning: call to
'copy_from_user_overflow' declared with attribute warning:
copy_from_user() buffer size is not provably correct
presumably due to buf_size being signed causing GCC to fail to
see that buf_size can't become negative.
Signed-off-by: Stephen Boyd <sboyd@codeaurora.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'ipc')
0 files changed, 0 insertions, 0 deletions