uinsns            304 kernel/bpf/offload.c 	char __user *uinsns;
uinsns            325 kernel/bpf/offload.c 		uinsns = u64_to_user_ptr(info->jited_prog_insns);
uinsns            327 kernel/bpf/offload.c 		if (copy_to_user(uinsns, aux->offload->jited_image, ulen)) {
uinsns           2333 kernel/bpf/syscall.c 	char __user *uinsns;
uinsns           2401 kernel/bpf/syscall.c 		uinsns = u64_to_user_ptr(info.xlated_prog_insns);
uinsns           2403 kernel/bpf/syscall.c 		fault = copy_to_user(uinsns, insns_sanitized, ulen);
uinsns           2433 kernel/bpf/syscall.c 			uinsns = u64_to_user_ptr(info.jited_prog_insns);
uinsns           2448 kernel/bpf/syscall.c 					if (copy_to_user(uinsns, img, len))
uinsns           2450 kernel/bpf/syscall.c 					uinsns += len;
uinsns           2456 kernel/bpf/syscall.c 				if (copy_to_user(uinsns, prog->bpf_func, ulen))