X-Git-Url: https://err.no/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=Documentation%2Fexception.txt;h=2d5aded64247343e1cfa13ded99c3a1e0204517a;hb=d0afc85f15deda94abdfe9118ac225c4208d5897;hp=f1d436993eb156831f50a4ab32619f79929dbc02;hpb=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2;p=linux-2.6 diff --git a/Documentation/exception.txt b/Documentation/exception.txt index f1d436993e..2d5aded642 100644 --- a/Documentation/exception.txt +++ b/Documentation/exception.txt @@ -7,10 +7,10 @@ To protect itself the kernel has to verify this address. In older versions of Linux this was done with the int verify_area(int type, const void * addr, unsigned long size) -function. +function (which has since been replaced by access_ok()). This function verified that the memory area starting at address -addr and of size size was accessible for the operation specified +'addr' and of size 'size' was accessible for the operation specified in type (read or write). To do this, verify_read had to look up the virtual memory area (vma) that contained the address addr. In the normal case (correctly working program), this test was successful.