1 /* For general debugging purposes */
16 bool dump_trace = false, quiet = false;
18 int eprintf(int level, const char *fmt, ...)
23 if (verbose >= level) {
26 ret = ui_helpline__show_help(fmt, args);
28 ret = vfprintf(stderr, fmt, args);
35 int dump_printf(const char *fmt, ...)
42 ret = vprintf(fmt, args);
49 #ifdef NO_NEWT_SUPPORT
50 int ui__warning(const char *format, ...)
54 va_start(args, format);
55 vfprintf(stderr, format, args);
61 int ui__error_paranoid(void)
63 return ui__error("Permission error - are you root?\n"
64 "Consider tweaking /proc/sys/kernel/perf_event_paranoid:\n"
65 " -1 - Not paranoid at all\n"
66 " 0 - Disallow raw tracepoint access for unpriv\n"
67 " 1 - Disallow cpu events for unpriv\n"
68 " 2 - Disallow kernel profiling for unpriv\n");
71 void trace_event(union perf_event *event)
73 unsigned char *raw_event = (void *)event;
74 const char *color = PERF_COLOR_BLUE;
81 color_fprintf(stdout, color, "\n. ... raw event: size %d bytes\n",
84 for (i = 0; i < event->header.size; i++) {
87 color_fprintf(stdout, color, " %04x: ", i);
90 color_fprintf(stdout, color, " %02x", raw_event[i]);
92 if (((i & 15) == 15) || i == event->header.size-1) {
93 color_fprintf(stdout, color, " ");
94 for (j = 0; j < 15-(i & 15); j++)
95 color_fprintf(stdout, color, " ");
96 for (j = i & ~15; j <= i; j++) {
97 color_fprintf(stdout, color, "%c",
98 isprint(raw_event[j]) ?
101 color_fprintf(stdout, color, "\n");