• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/asm-ia64/

Lines Matching refs:to

5  * This file defines various macros to transfer memory areas across
6 * the user/kernel boundary. This needs to be done carefully because
8 * addresses. Thus, we need to be careful not to let the user to
11 * so we want to spend as little time doing safety checks as
17 * to do: if get_fs()==USER_DS, checking is performed, if
24 * potential to fault. When such a fault occurs, the page fault
25 * handler checks to see whether the faulting instruction has a fixup
26 * associated and, if so, sets r8 to -EFAULT and clears r9 to 0 and
61 * When accessing user memory, we need to make sure the entire area really is in
62 * user-level space. In order to do this efficiently, we make sure that the page at
63 * address TASK_SIZE is never valid. We also need to make sure that the address doesn't
79 * Careful to not
88 * doing multiple accesses to the same area (the programmer has to do the
134 /* We need to declare the __ex_table section before we can use it in .xdata. */
151 * is because they do not write to any memory gcc knows about, so there are no aliasing
183 * could clobber r8 and r9 (among others). Thus, be careful not to evaluate it while
211 * could clobber r8 (among others). Thus, be careful not to evaluate them while using r8.
237 extern unsigned long __must_check __copy_user (void __user *to, const void __user *from,
241 __copy_to_user (void __user *to, const void *from, unsigned long count)
243 return __copy_user(to, (__force void __user *) from, count);
247 __copy_from_user (void *to, const void __user *from, unsigned long count)
249 return __copy_user((__force void __user *) to, from, count);
254 #define copy_to_user(to, from, n) \
256 void __user *__cu_to = (to); \
265 #define copy_from_user(to, from, n) \
267 void *__cu_to = (to); \
277 #define __copy_in_user(to, from, size) __copy_user((to), (from), (size))
280 copy_in_user (void __user *to, const void __user *from, unsigned long n)
282 if (likely(access_ok(VERIFY_READ, from, n) && access_ok(VERIFY_WRITE, to, n)))
283 n = __copy_user(to, from, n);
289 #define __clear_user(to, n) __do_clear_user(to, n)
291 #define clear_user(to, n) \
294 if (__access_ok(to, __cu_len, get_fs())) \
295 __cu_len = __do_clear_user(to, __cu_len); \
304 extern long __must_check __strncpy_from_user (char *to, const char __user *from, long to_len);
306 #define strncpy_from_user(to, from, n) \
311 __sfu_ret = __strncpy_from_user((to), __sfu_from, (n)); \
349 int cont; /* location-relative continuation addr.; if bit 2 is set, r9 is set to 0 */
384 * Convert a virtual cached kernel memory pointer to an uncached pointer