Strict user copy checks are only really supported on x86_32 even though
[linux-2.6/next.git] / arch / sparc / lib / usercopy.c
blob14b363fec8a2a108636411db2acb49f5e5b03946
1 #include <linux/module.h>
2 #include <linux/bug.h>
4 void copy_from_user_overflow(void)
6 WARN(1, "Buffer overflow detected!\n");
8 EXPORT_SYMBOL(copy_from_user_overflow);