• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/arm/include/asm/

Lines Matching refs:to

27  * address of an instruction that is allowed to fault, and the second is
29 * modified, so it is entirely up to the continuation code to figure out
30 * what to do.
34 * we don't even have to jump over them. Further, they do not intrude
47 * code generates any references to them, that's a bug.
92 * which read from user space (*get_*) need to take care not to leak
93 * kernel data even if the calling code is buggy and fails to check
97 * main code path. When we only write to user space, there is no
197 * The "xxx_error" versions set the third argument to EFAULT if an
390 extern unsigned long __must_check __copy_from_user(void *to, const void __user *from, unsigned long n);
391 extern unsigned long __must_check __copy_to_user(void __user *to, const void *from, unsigned long n);
392 extern unsigned long __must_check __copy_to_user_std(void __user *to, const void *from, unsigned long n);
396 #define __copy_from_user(to,from,n) (memcpy(to, (void __force *)from, n), 0)
397 #define __copy_to_user(to,from,n) (memcpy((void __force *)to, from, n), 0)
401 extern unsigned long __must_check __strncpy_from_user(char *to, const char __user *from, unsigned long count);
404 static inline unsigned long __must_check copy_from_user(void *to, const void __user *from, unsigned long n)
407 n = __copy_from_user(to, from, n);
409 memset(to, 0, n);
413 static inline unsigned long __must_check copy_to_user(void __user *to, const void *from, unsigned long n)
415 if (access_ok(VERIFY_WRITE, to, n))
416 n = __copy_to_user(to, from, n);
423 static inline unsigned long __must_check clear_user(void __user *to, unsigned long n)
425 if (access_ok(VERIFY_WRITE, to, n))
426 n = __clear_user(to, n);