Lines Matching refs:unsafe_ptr
153 bpf_probe_read_user_common(void *dst, u32 size, const void __user *unsafe_ptr) in bpf_probe_read_user_common() argument
157 ret = copy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_common()
164 const void __user *, unsafe_ptr) in BPF_CALL_3() argument
166 return bpf_probe_read_user_common(dst, size, unsafe_ptr); in BPF_CALL_3()
180 const void __user *unsafe_ptr) in bpf_probe_read_user_str_common() argument
194 ret = strncpy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_str_common()
201 const void __user *, unsafe_ptr) in BPF_CALL_3() argument
203 return bpf_probe_read_user_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
216 bpf_probe_read_kernel_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_common() argument
222 ret = copy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_common()
232 const void *, unsafe_ptr) in BPF_CALL_3() argument
234 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
247 bpf_probe_read_kernel_str_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_str_common() argument
263 ret = strncpy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_str_common()
274 const void *, unsafe_ptr) in BPF_CALL_3() argument
276 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
290 const void *, unsafe_ptr) in BPF_CALL_3() argument
292 if ((unsigned long)unsafe_ptr < TASK_SIZE) { in BPF_CALL_3()
294 (__force void __user *)unsafe_ptr); in BPF_CALL_3()
296 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
309 const void *, unsafe_ptr) in BPF_CALL_3() argument
311 if ((unsigned long)unsafe_ptr < TASK_SIZE) { in BPF_CALL_3()
313 (__force void __user *)unsafe_ptr); in BPF_CALL_3()
315 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
328 BPF_CALL_3(bpf_probe_write_user, void __user *, unsafe_ptr, const void *, src, in BPF_CALL_3() argument
352 return copy_to_user_nofault(unsafe_ptr, src, size); in BPF_CALL_3()
375 static void bpf_trace_copy_string(char *buf, void *unsafe_ptr, char fmt_ptype, in bpf_trace_copy_string() argument
378 void __user *user_ptr = (__force void __user *)unsafe_ptr; in bpf_trace_copy_string()
385 if ((unsigned long)unsafe_ptr < TASK_SIZE) { in bpf_trace_copy_string()
392 strncpy_from_kernel_nofault(buf, unsafe_ptr, bufsz); in bpf_trace_copy_string()
433 void *unsafe_ptr = NULL; in BPF_CALL_5() local
498 unsafe_ptr = (void *)(long)arg1; in BPF_CALL_5()
502 unsafe_ptr = (void *)(long)arg2; in BPF_CALL_5()
506 unsafe_ptr = (void *)(long)arg3; in BPF_CALL_5()
511 bpf_trace_copy_string(buf, unsafe_ptr, fmt_ptype, in BPF_CALL_5()
672 void *unsafe_ptr; in BPF_CALL_5() local
680 unsafe_ptr = (void *)(long)args[fmt_cnt]; in BPF_CALL_5()
682 unsafe_ptr, MAX_SEQ_PRINTF_STR_LEN); in BPF_CALL_5()