Lines Matching refs:to
15 * address of an instruction that is allowed to fault, and the second is
17 * modified, so it is entirely up to the continuation code to figure out
18 * what to do.
22 * we don't even have to jump over them. Further, they do not intrude
46 * which read from user space (*get_*) need to take care not to leak
47 * kernel data even if the calling code is buggy and fails to check
51 * main code path. When we only write to user space, there is no
58 * The "xxx_error" versions set the third argument to EFAULT if an
190 static __inline__ unsigned long copy_from_user(void *to, const void *from, unsigned long n)
193 __do_copy_from_user(to, from, n);
195 memzero(to, n);
199 static __inline__ unsigned long __copy_from_user(void *to, const void *from, unsigned long n)
201 __do_copy_from_user(to, from, n);
205 static __inline__ unsigned long copy_to_user(void *to, const void *from, unsigned long n)
207 if (access_ok(VERIFY_WRITE, to, n))
208 __do_copy_to_user(to, from, n);
212 static __inline__ unsigned long __copy_to_user(void *to, const void *from, unsigned long n)
214 __do_copy_to_user(to, from, n);
221 static __inline__ unsigned long clear_user (void *to, unsigned long n)
223 if (access_ok(VERIFY_WRITE, to, n))
224 __do_clear_user(to, n);
228 static __inline__ unsigned long __clear_user (void *to, unsigned long n)
230 __do_clear_user(to, n);