Update comment explaining the check, to reality.

Discussed with:	jhb
Sponsored by:	The FreeBSD Foundation
MFC after:	3 days
This commit is contained in:
kib 2018-01-11 12:07:24 +00:00
parent 0f2da3f309
commit 7429338dc0
2 changed files with 6 additions and 10 deletions

View File

@ -249,12 +249,10 @@ ENTRY(copyout)
jz done_copyout
/*
* Check explicitly for non-user addresses. If 486 write protection
* is being used, this check is essential because we are in kernel
* mode so the h/w does not provide any protection against writing
* kernel addresses.
* Check explicitly for non-user addresses. This check is essential
* because it prevents usermode from writing into kernel. We do not
* verify that user did not specified a rogue address anywhere else.
*/
/*
* First, prevent address wrapping.
*/

View File

@ -291,12 +291,10 @@ ENTRY(copyout)
jz done_copyout
/*
* Check explicitly for non-user addresses. If 486 write protection
* is being used, this check is essential because we are in kernel
* mode so the h/w does not provide any protection against writing
* kernel addresses.
* Check explicitly for non-user addresses. This check is essential
* because it prevents usermode from writing into kernel. We do not
* verify that user did not specified a rogue address anywhere else.
*/
/*
* First, prevent address wrapping.
*/