Lines Matching defs:dst
175 bpf_probe_read_user_common(void *dst, u32 size, const void __user *unsafe_ptr)
179 ret = copy_from_user_nofault(dst, unsafe_ptr, size);
181 memset(dst, 0, size);
185 BPF_CALL_3(bpf_probe_read_user, void *, dst, u32, size,
188 return bpf_probe_read_user_common(dst, size, unsafe_ptr);
201 bpf_probe_read_user_str_common(void *dst, u32 size,
208 * terminator into `dst`.
212 * then there could be junk after the NUL in `dst`. If user takes `dst`
216 ret = strncpy_from_user_nofault(dst, unsafe_ptr, size);
218 memset(dst, 0, size);
222 BPF_CALL_3(bpf_probe_read_user_str, void *, dst, u32, size,
225 return bpf_probe_read_user_str_common(dst, size, unsafe_ptr);
237 BPF_CALL_3(bpf_probe_read_kernel, void *, dst, u32, size,
240 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr);
253 bpf_probe_read_kernel_str_common(void *dst, u32 size, const void *unsafe_ptr)
266 ret = strncpy_from_kernel_nofault(dst, unsafe_ptr, size);
268 memset(dst, 0, size);
272 BPF_CALL_3(bpf_probe_read_kernel_str, void *, dst, u32, size,
275 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr);
288 BPF_CALL_3(bpf_probe_read_compat, void *, dst, u32, size,
292 return bpf_probe_read_user_common(dst, size,
295 return bpf_probe_read_kernel_common(dst, size, unsafe_ptr);
307 BPF_CALL_3(bpf_probe_read_compat_str, void *, dst, u32, size,
311 return bpf_probe_read_user_str_common(dst, size,
314 return bpf_probe_read_kernel_str_common(dst, size, unsafe_ptr);