• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/score/include/asm/

Lines Matching refs:to

25  * __ua_size() is a trick to avoid runtime checking of positive constant
35 * to write to a block, it is always safe to read from it.
36 * @addr: User space pointer to start of block to check
37 * @size: Size of block to check
41 * Checks if a pointer to a block of memory in user space is valid.
61 * @x: Value to copy to user space.
66 * This macro copies a single simple value from kernel space to user
70 * @ptr must have pointer-to-simple-variable type, and @x must be assignable
71 * to the result of dereferencing @ptr.
79 * @x: Variable to store result.
84 * This macro copies a single simple variable from user space to kernel
88 * @ptr must have pointer-to-simple-variable type, and the result of
89 * dereferencing @ptr must be assignable to @x without a cast.
92 * On error, the variable @x is set to zero.
98 * @x: Value to copy to user space.
103 * This macro copies a single simple value from kernel space to user
107 * @ptr must have pointer-to-simple-variable type, and @x must be assignable
108 * to the result of dereferencing @ptr.
119 * @x: Variable to store result.
124 * This macro copies a single simple variable from user space to kernel
128 * @ptr must have pointer-to-simple-variable type, and the result of
129 * dereferencing @ptr must be assignable to @x without a cast.
135 * On error, the variable @x is set to zero.
291 extern int __copy_tofrom_user(void *to, const void *from, unsigned long len);
294 copy_from_user(void *to, const void *from, unsigned long len)
299 return __copy_tofrom_user(to, from, len);
303 return __copy_tofrom_user(to, from, len - over) + over;
309 copy_to_user(void *to, const void *from, unsigned long len)
313 if (access_ok(VERIFY_WRITE, to, len))
314 return __copy_tofrom_user(to, from, len);
316 if ((unsigned long)to < TASK_SIZE) {
317 over = (unsigned long)to + len - TASK_SIZE;
318 return __copy_tofrom_user(to, from, len - over) + over;
323 #define __copy_from_user(to, from, len) \
324 __copy_tofrom_user((to), (from), (len))
326 #define __copy_to_user(to, from, len) \
327 __copy_tofrom_user((to), (from), (len))
330 __copy_to_user_inatomic(void *to, const void *from, unsigned long len)
332 return __copy_to_user(to, from, len);
336 __copy_from_user_inatomic(void *to, const void *from, unsigned long len)
338 return __copy_from_user(to, from, len);
341 #define __copy_in_user(to, from, len) __copy_from_user(to, from, len)
344 copy_in_user(void *to, const void *from, unsigned long len)
347 access_ok(VERFITY_WRITE, to, len))
348 return copy_from_user(to, from, len);
353 * @to: Destination address, in user space.
354 * @n: Number of bytes to zero.
376 * @count: Maximum number of bytes to copy, including the trailing NUL.
378 * Copies a NUL-terminated string from userspace to kernel space.
385 * If access to userspace fails, returns -EFAULT (some data may have been