Searched refs:unsafe_ptr (Results 1 – 3 of 3) sorted by relevance
/linux-6.1.9/kernel/trace/ |
D | bpf_trace.c | 163 bpf_probe_read_user_common(void *dst, u32 size, const void __user *unsafe_ptr) in bpf_probe_read_user_common() argument 167 ret = copy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_common() 174 const void __user *, unsafe_ptr) in BPF_CALL_3() argument 176 return bpf_probe_read_user_common(dst, size, unsafe_ptr); in BPF_CALL_3() 190 const void __user *unsafe_ptr) in bpf_probe_read_user_str_common() argument 204 ret = strncpy_from_user_nofault(dst, unsafe_ptr, size); in bpf_probe_read_user_str_common() 211 const void __user *, unsafe_ptr) in BPF_CALL_3() argument 213 return bpf_probe_read_user_str_common(dst, size, unsafe_ptr); in BPF_CALL_3() 226 bpf_probe_read_kernel_common(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel_common() argument 230 ret = copy_from_kernel_nofault(dst, unsafe_ptr, size); in bpf_probe_read_kernel_common() [all …]
|
/linux-6.1.9/kernel/bpf/ |
D | helpers.c | 727 static int bpf_trace_copy_string(char *buf, void *unsafe_ptr, char fmt_ptype, in bpf_trace_copy_string() argument 730 void __user *user_ptr = (__force void __user *)unsafe_ptr; in bpf_trace_copy_string() 737 if ((unsigned long)unsafe_ptr < TASK_SIZE) in bpf_trace_copy_string() 742 return strncpy_from_kernel_nofault(buf, unsafe_ptr, bufsz); in bpf_trace_copy_string() 806 char *unsafe_ptr = NULL, *tmp_buf = NULL, *tmp_buf_end, *fmt_end; in bpf_bprintf_prepare() local 911 unsafe_ptr = (char *)(long)raw_args[num_spec]; in bpf_bprintf_prepare() 912 err = copy_from_kernel_nofault(cur_ip, unsafe_ptr, in bpf_bprintf_prepare() 948 unsafe_ptr = (char *)(long)raw_args[num_spec]; in bpf_bprintf_prepare() 949 err = bpf_trace_copy_string(tmp_buf, unsafe_ptr, in bpf_bprintf_prepare()
|
D | core.c | 1628 u64 __weak bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr) in bpf_probe_read_kernel() argument
|