Lines Matching +full:0 +full:x42

14 int test_pid = 0;
18 __u64 payload1_len1 = 0;
19 __u64 payload1_len2 = 0;
20 __u64 total1 = 0;
22 __u64 ret_bad_read = 0;
40 char payload_bad[5] = { 0x42, 0x42, 0x42, 0x42, 0x42 };
51 return 0; in handler64_unsigned()
53 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_unsigned()
54 if (len >= 0) { in handler64_unsigned()
59 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_unsigned()
60 if (len >= 0) { in handler64_unsigned()
69 return 0; in handler64_unsigned()
81 return 0; in handler64_signed()
83 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler64_signed()
84 if (len >= 0) { in handler64_signed()
88 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler64_signed()
89 if (len >= 0) { in handler64_signed()
95 return 0; in handler64_signed()
107 return 0; in handler32_unsigned()
109 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler32_unsigned()
115 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler32_unsigned()
123 return 0; in handler32_unsigned()
135 return 0; in handler32_signed()
137 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in1[0]); in handler32_signed()
138 if (len >= 0) { in handler32_signed()
142 len = bpf_probe_read_kernel_str(payload, MAX_LEN, &buf_in2[0]); in handler32_signed()
143 if (len >= 0) { in handler32_signed()
149 return 0; in handler32_signed()
157 if (bpf_probe_read_kernel(&bla, sizeof(bla), 0)) in handler_exit()
160 return 0; in handler_exit()