Lines Matching defs:buf
269 char buf[100];
282 snprintf(buf, sizeof(buf), "%zu bytes", (size_t)limit.rlim_cur);
284 snprintf(buf, sizeof(buf), "%.1f KiB", (double)limit.rlim_cur / 1024);
286 snprintf(buf, sizeof(buf), "%.1f MiB", (double)limit.rlim_cur / (1024*1024));
289 buf);
2006 char *buf, void *data)
2014 if (!str_has_pfx(buf, "CONFIG_"))
2017 sep = strchr(buf, '=');
2019 pr_warn("failed to parse '%s': no separator\n", buf);
2024 len = strlen(buf);
2025 if (buf[len - 1] == '\n')
2026 buf[len - 1] = '\0';
2031 pr_warn("failed to parse '%s': no value\n", buf);
2035 ext = find_extern_by_name(obj, buf);
2071 char buf[PATH_MAX];
2077 len = snprintf(buf, PATH_MAX, "/boot/config-%s", uts.release);
2084 file = gzopen(buf, "re");
2093 while (gzgets(file, buf, sizeof(buf))) {
2094 err = bpf_object__process_kconfig_line(obj, buf, data);
2097 buf, err);
2110 char buf[PATH_MAX];
2121 while (fgets(buf, sizeof(buf), file)) {
2122 err = bpf_object__process_kconfig_line(obj, buf, data);
2125 buf, err);
2261 static int pathname_concat(char *buf, size_t buf_sz, const char *path, const char *name)
2265 len = snprintf(buf, buf_sz, "%s/%s", path, name);
2276 char buf[PATH_MAX];
2282 err = pathname_concat(buf, sizeof(buf), path, bpf_map__name(map));
2286 return bpf_map__set_pin_path(map, buf);
7326 static void fixup_verifier_log(struct bpf_program *prog, char *buf, size_t buf_sz);
7468 * Be careful to not overflow u32, though. Kernel's log buf size limit
7496 static char *find_prev_line(char *buf, char *cur)
7500 if (cur == buf) /* end of a log buf */
7504 while (p - 1 >= buf && *(p - 1) != '\n')
7510 static void patch_log(char *buf, size_t buf_sz, size_t log_sz,
7514 size_t rem_sz = (buf + log_sz) - (orig + orig_sz);
7531 if (orig + patch_sz >= buf + buf_sz) {
7533 patch_sz -= (orig + patch_sz) - (buf + buf_sz) + 1;
7548 char *buf, size_t buf_sz, size_t log_sz,
7583 patch_log(buf, buf_sz, log_sz, line1, line3 - line1, patch);
7587 char *buf, size_t buf_sz, size_t log_sz,
7616 patch_log(buf, buf_sz, log_sz, line1, line3 - line1, patch);
7620 char *buf, size_t buf_sz, size_t log_sz,
7649 patch_log(buf, buf_sz, log_sz, line1, line3 - line1, patch);
7652 static void fixup_verifier_log(struct bpf_program *prog, char *buf, size_t buf_sz)
7660 if (!buf)
7663 log_sz = strlen(buf) + 1;
7664 next_line = buf + log_sz - 1;
7667 cur_line = find_prev_line(buf, next_line);
7672 prev_line = find_prev_line(buf, cur_line);
7677 fixup_log_failed_core_relo(prog, buf, buf_sz, log_sz,
7681 prev_line = find_prev_line(buf, cur_line);
7686 fixup_log_missing_map_load(prog, buf, buf_sz, log_sz,
7690 prev_line = find_prev_line(buf, cur_line);
7695 fixup_log_missing_kfunc_call(prog, buf, buf_sz, log_sz,
7833 path ? : "(mem buf)");
8690 char buf[PATH_MAX];
8696 err = pathname_concat(buf, sizeof(buf), path, bpf_map__name(map));
8699 sanitize_pin_path(buf);
8700 pin_path = buf;
8733 char buf[PATH_MAX];
8736 err = pathname_concat(buf, sizeof(buf), path, bpf_map__name(map));
8739 sanitize_pin_path(buf);
8740 pin_path = buf;
8756 char buf[PATH_MAX];
8768 err = pathname_concat(buf, sizeof(buf), path, prog->name);
8772 err = bpf_program__pin(prog, buf);
8781 if (pathname_concat(buf, sizeof(buf), path, prog->name))
8784 bpf_program__unpin(prog, buf);
8799 char buf[PATH_MAX];
8801 err = pathname_concat(buf, sizeof(buf), path, prog->name);
8805 err = bpf_program__unpin(prog, buf);
9472 char *buf;
9474 buf = malloc(len);
9475 if (!buf)
9478 buf[0] = '\0';
9479 /* Forge string buf with all available names */
9491 if (strlen(buf) + strlen(section_defs[i].sec) + 2 > len) {
9492 free(buf);
9495 strcat(buf, " ");
9496 strcat(buf, section_defs[i].sec);
9499 return buf;
10653 char buf[STRERR_BUFSIZE];
10661 libbpf_strerror_r(err, buf, sizeof(buf)));
10668 libbpf_strerror_r(err, buf, sizeof(buf)));
10758 char buf[1024];
10761 n = vsnprintf(buf, sizeof(buf), fmt, ap);
10764 if (n < 0 || n >= sizeof(buf))
10771 if (write(fd, buf, n) < 0)
10818 static void gen_kprobe_legacy_event_name(char *buf, size_t buf_sz,
10824 snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx_%d", getpid(), kfunc_name, offset,
10828 for (i = 0; buf[i]; i++) {
10829 if (!isalnum(buf[i]))
10830 buf[i] = '_';
11484 static void gen_uprobe_legacy_event_name(char *buf, size_t buf_sz,
11489 snprintf(buf, buf_sz, "libbpf_%u_%s_0x%zx", getpid(), binary_path, (size_t)offset);
11492 for (i = 0; buf[i]; i++) {
11493 if (!isalnum(buf[i]))
11494 buf[i] = '_';
12828 void *buf; /* for reconstructing segmented data */
12862 free(cpu_buf->buf);
13200 pb->page_size, &cpu_buf->buf,
13260 int perf_buffer__buffer(struct perf_buffer *pb, int buf_idx, void **buf, size_t *buf_size)
13271 *buf = cpu_buf->base;
13416 char buf[128];
13424 len = read(fd, buf, sizeof(buf));
13431 if (len >= sizeof(buf)) {
13435 buf[len] = '\0';
13437 return parse_cpu_mask_str(buf, mask, mask_sz);