uinsns 304 kernel/bpf/offload.c char __user *uinsns; uinsns 325 kernel/bpf/offload.c uinsns = u64_to_user_ptr(info->jited_prog_insns); uinsns 327 kernel/bpf/offload.c if (copy_to_user(uinsns, aux->offload->jited_image, ulen)) { uinsns 2333 kernel/bpf/syscall.c char __user *uinsns; uinsns 2401 kernel/bpf/syscall.c uinsns = u64_to_user_ptr(info.xlated_prog_insns); uinsns 2403 kernel/bpf/syscall.c fault = copy_to_user(uinsns, insns_sanitized, ulen); uinsns 2433 kernel/bpf/syscall.c uinsns = u64_to_user_ptr(info.jited_prog_insns); uinsns 2448 kernel/bpf/syscall.c if (copy_to_user(uinsns, img, len)) uinsns 2450 kernel/bpf/syscall.c uinsns += len; uinsns 2456 kernel/bpf/syscall.c if (copy_to_user(uinsns, prog->bpf_func, ulen))