Lines Matching refs:unsafe_ptr
168 bpf_probe_read_user_common(void *dst, u32 size, const void __user *unsafe_ptr) in bpf_probe_read_user_common() argument
172 ret = copy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_common()
179 const void __user *, unsafe_ptr) in BPF_CALL_3() argument
181 return bpf_probe_read_user_common(dst, size, unsafe_ptr); in BPF_CALL_3()
195 const void __user *unsafe_ptr) in bpf_probe_read_user_str_common() argument
209 ret = strncpy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_str_common()
216 const void __user *, unsafe_ptr) in BPF_CALL_3() argument
218 return bpf_probe_read_user_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
231 const void *, unsafe_ptr) in BPF_CALL_3() argument
233 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
246 bpf_probe_read_kernel_str_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_str_common() argument
259 ret = strncpy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_str_common()
266 const void *, unsafe_ptr) in BPF_CALL_3() argument
268 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
282 const void *, unsafe_ptr) in BPF_CALL_3() argument
284 if ((unsigned long)unsafe_ptr < TASK_SIZE) { in BPF_CALL_3()
286 (__force void __user *)unsafe_ptr); in BPF_CALL_3()
288 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr); in BPF_CALL_3()
301 const void *, unsafe_ptr) in BPF_CALL_3() argument
303 if ((unsigned long)unsafe_ptr < TASK_SIZE) { in BPF_CALL_3()
305 (__force void __user *)unsafe_ptr); in BPF_CALL_3()
307 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr); in BPF_CALL_3()
320 BPF_CALL_3(bpf_probe_write_user, void __user *, unsafe_ptr, const void *, src, in BPF_CALL_3() argument
342 return copy_to_user_nofault(unsafe_ptr, src, size); in BPF_CALL_3()