Lines Matching refs:to
23 * We use the secondary ASI to address user memory, which references a
28 * the kernel that expect to be able to manipulate, erum, "segments".
63 * address of an instruction that is allowed to fault, and the second is
65 * modified, so it is entirely up to the continuation code to figure out
66 * what to do.
70 * we don't even have to jump over them. Further, they do not intrude
85 * This gets kind of ugly. We want to return _two_ values in "get_user()"
86 * and yet we don't want to do any pointers, because that is too much
208 extern unsigned long __must_check ___copy_from_user(void *to,
211 extern unsigned long copy_from_user_fixup(void *to, const void __user *from,
214 copy_from_user(void *to, const void __user *from, unsigned long size)
216 unsigned long ret = ___copy_from_user(to, from, size);
219 ret = copy_from_user_fixup(to, from, size);
225 extern unsigned long __must_check ___copy_to_user(void __user *to,
228 extern unsigned long copy_to_user_fixup(void __user *to, const void *from,
231 copy_to_user(void __user *to, const void *from, unsigned long size)
233 unsigned long ret = ___copy_to_user(to, from, size);
236 ret = copy_to_user_fixup(to, from, size);
241 extern unsigned long __must_check ___copy_in_user(void __user *to,
244 extern unsigned long copy_in_user_fixup(void __user *to, void __user *from,
247 copy_in_user(void __user *to, void __user *from, unsigned long size)
249 unsigned long ret = ___copy_in_user(to, from, size);
252 ret = copy_in_user_fixup(to, from, size);