Lines Matching refs:to
36 * Careful to not
45 * doing multiple accesses to the same area (the user has to do the
105 __kernel_size_t __copy_user(void *to, const void *from, __kernel_size_t n);
108 __copy_from_user(void *to, const void __user *from, unsigned long n)
110 return __copy_user(to, (__force void *)from, n);
114 __copy_to_user(void __user *to, const void *from, unsigned long n)
116 return __copy_user((__force void *)to, from, n);
145 * @count: Maximum number of bytes to copy, including the trailing NUL.
147 * Copies a NUL-terminated string from userspace to kernel space.
152 * If access to userspace fails, returns -EFAULT (some data may have been
172 copy_from_user(void *to, const void __user *from, unsigned long n)
178 return __copy_user(to, from, __copy_size);
184 copy_to_user(void __user *to, const void *from, unsigned long n)
186 unsigned long __copy_to = (unsigned long) to;
190 return __copy_user(to, from, __copy_size);
197 * @s: The string to measure.
218 * @str: The string to measure.
227 * If there is a limit on the length of a valid string, you may wish to
234 * address of an instruction that is allowed to fault, and the second is
236 * modified, so it is entirely up to the continuation code to figure out
237 * what to do.
241 * we don't even have to jump over them. Further, they do not intrude