X-Git-Url: https://err.no/cgi-bin/gitweb.cgi?a=blobdiff_plain;f=Documentation%2Fexception.txt;h=3cb39ade290eae9d3e3046cfb04fe340e601d5b9;hb=96803820b3d9830518083c02681fd3f72987ae4d;hp=f1d436993eb156831f50a4ab32619f79929dbc02;hpb=1da177e4c3f41524e886b7f1b8a0c1fc7321cac2;p=linux-2.6 diff --git a/Documentation/exception.txt b/Documentation/exception.txt index f1d436993e..3cb39ade29 100644 --- a/Documentation/exception.txt +++ b/Documentation/exception.txt @@ -7,7 +7,7 @@ To protect itself the kernel has to verify this address. In older versions of Linux this was done with the int verify_area(int type, const void * addr, unsigned long size) -function. +function (which has since been replaced by access_ok()). This function verified that the memory area starting at address addr and of size size was accessible for the operation specified