Index: [thread] [date] [subject] [author]
  From: Steffen Seeger <seeger@physik.tu-chemnitz.de>
  To  : ggi-develop@eskimo.com
  Date: Tue, 21 Jul 1998 11:45:48 +0200 (MEST)

Re: DMA BLTs

> On Mon, 20 Jul 1998, Steffen Seeger wrote:
> > > On Mon, 20 Jul 1998, Steffen Seeger wrote:
> > > > > 1) If a userspace process passes a pointer to blit from/to,
> > > > > /dev/graphN can tell whether access to the card is focused on
> > > > > that app, but can/how can the kernel identify the calling process and
> > > > > verify the physical region is valid and all permissions are kosher?
> > > > Using the verify_area() call. 
> > > Hasnt this changed somewhat since 2.1.8?
> > IIRC the article from the EXPO98 proceedings about kernel hacking states
> > this as the recommended procedure. How should it be done then?
> 
> http://www.redhat.com:8080/HyperNews/get/devices/exceptions.html

AFAIR that's what the article said:
Use the get_user() macro for small stuff of (compile-time-known) length, 
but if you have variable length, do a verify_area() call. 

> -Dan

			Steffen

----------------- e-mail: seeger@physik.tu-chemnitz.de -----------------

Index: [thread] [date] [subject] [author]