H. Peter Anvin b925585039 mm: Adjust do_pages_stat() so gcc can see copy_from_user() is safe
Slightly adjust the logic for determining the size of the
copy_form_user() in do_pages_stat(); with this change, gcc can see
that the copying is safe.

Without this, we get a build error for i386 allyesconfig:

/home/hpa/kernel/linux-2.6-tip.urgent/arch/x86/include/asm/uaccess_32.h:213:
error: call to ‘copy_from_user_overflow’ declared with attribute
error: copy_from_user() buffer size is not provably correct

Unlike an earlier patch from Arjan, this doesn't introduce new
variables; merely reshuffles the compare so that gcc can see that an
overflow cannot happen.

Signed-off-by: H. Peter Anvin <hpa@zytor.com>
Cc: Brice Goglin <Brice.Goglin@inria.fr>
Cc: Arjan van de Ven <arjan@infradead.org>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: KOSAKI Motohiro <kosaki.motohiro@jp.fujitsu.com>
LKML-Reference: <20090926205406.30d55b08@infradead.org>
2009-12-11 15:27:47 -08:00
..
2009-12-03 13:49:43 +01:00
2009-11-10 12:31:43 +01:00
2009-04-01 08:59:13 -07:00
2009-06-16 19:47:28 -07:00
2009-09-22 07:17:41 -07:00
2009-11-09 09:55:44 -08:00
2009-10-29 07:39:29 -07:00
2009-09-22 07:17:35 -07:00
2009-09-22 07:17:40 -07:00
2009-09-24 08:41:47 -04:00
2008-06-12 18:05:41 -07:00
2009-10-01 16:11:12 -07:00
2009-06-23 12:50:05 -07:00
2009-09-22 07:17:29 -07:00