X-Git-Url: http://git.onelab.eu/?a=blobdiff_plain;f=Documentation%2Fexception.txt;h=2d5aded64247343e1cfa13ded99c3a1e0204517a;hb=refs%2Fheads%2Fvserver;hp=f1d436993eb156831f50a4ab32619f79929dbc02;hpb=5273a3df6485dc2ad6aa7ddd441b9a21970f003b;p=linux-2.6.git diff --git a/Documentation/exception.txt b/Documentation/exception.txt index f1d436993..2d5aded64 100644 --- a/Documentation/exception.txt +++ b/Documentation/exception.txt @@ -7,10 +7,10 @@ To protect itself the kernel has to verify this address. In older versions of Linux this was done with the int verify_area(int type, const void * addr, unsigned long size) -function. +function (which has since been replaced by access_ok()). This function verified that the memory area starting at address -addr and of size size was accessible for the operation specified +'addr' and of size 'size' was accessible for the operation specified in type (read or write). To do this, verify_read had to look up the virtual memory area (vma) that contained the address addr. In the normal case (correctly working program), this test was successful.