From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758590AbZELHMh (ORCPT ); Tue, 12 May 2009 03:12:37 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1759160AbZELHMP (ORCPT ); Tue, 12 May 2009 03:12:15 -0400 Received: from mx2.redhat.com ([66.187.237.31]:38464 "EHLO mx2.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1759101AbZELHMP (ORCPT ); Tue, 12 May 2009 03:12:15 -0400 Date: Tue, 12 May 2009 03:11:09 -0400 From: Amerigo Wang To: linux-kernel@vger.kernel.org Cc: Steven Rostedt , akpm@linux-foundation.org, Amerigo Wang Message-Id: <20090512071156.5664.17626.sendpatchset@localhost.localdomain> In-Reply-To: <20090512071148.5664.91161.sendpatchset@localhost.localdomain> References: <20090512071148.5664.91161.sendpatchset@localhost.localdomain> Subject: [PATCH] trace: fix a wrong usage of simple_read_from_buffer() Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The last argument of simple_read_from_buffer() is the amount of the available bytes in the buffer, not the size of the buffer. Signed-off-by: WANG Cong Cc: Steven Rostedt --- diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index a884c09..3a0bc70 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -2125,7 +2125,7 @@ tracing_cpumask_read(struct file *filp, char __user *ubuf, goto out_err; } len += sprintf(mask_str + len, "\n"); - count = simple_read_from_buffer(ubuf, count, ppos, mask_str, NR_CPUS+1); + count = simple_read_from_buffer(ubuf, count, ppos, mask_str, len); out_err: mutex_unlock(&tracing_cpumask_update_lock);