Home
last modified time | relevance | path

Searched refs:PRI_lx64 (Results 1 – 7 of 7) sorted by relevance

/linux-6.1.9/tools/perf/util/
Devent.c292 return fprintf(fp, " %d/%d: [%#" PRI_lx64 "(%#" PRI_lx64 ") @ %#" PRI_lx64 "]: %c %s\n", in perf_event__fprintf_mmap()
309 return fprintf(fp, " %d/%d: [%#" PRI_lx64 "(%#" PRI_lx64 ") @ %#" PRI_lx64 in perf_event__fprintf_mmap2()
319 return fprintf(fp, " %d/%d: [%#" PRI_lx64 "(%#" PRI_lx64 ") @ %#" PRI_lx64 in perf_event__fprintf_mmap2()
406 return fprintf(fp, " offset: %#"PRI_lx64" size: %#"PRI_lx64" flags: %#"PRI_lx64" [%s%s%s]\n", in perf_event__fprintf_aux()
422 return fprintf(fp, " hw_id: %#"PRI_lx64"\n", in perf_event__fprintf_aux_output_hw_id()
449 return fprintf(fp, " addr %" PRI_lx64 " len %u type %u flags 0x%x name %s\n", in perf_event__fprintf_ksymbol()
484 ret = fprintf(fp, " %" PRI_lx64 " ", tp->addr); in perf_event__fprintf_text_poke()
Devent.h29 #define PRI_lx64 "l" PRIx64 macro
33 #define PRI_lx64 PRIx64 macro
Dtsc.c133 ret += fprintf(fp, "... Time Mask %#" PRI_lx64 "\n", in perf_event__fprintf_time_conv()
Dpython.c214 if (asprintf(&s, "{ type: mmap, pid: %u, tid: %u, start: %#" PRI_lx64 ", " in pyrf_mmap_event__repr()
215 "length: %#" PRI_lx64 ", offset: %#" PRI_lx64 ", " in pyrf_mmap_event__repr()
347 if (asprintf(&s, "{ type: lost, id: %#" PRI_lx64 ", " in pyrf_lost_event__repr()
348 "lost: %#" PRI_lx64 " }", in pyrf_lost_event__repr()
Dauxtrace.c1346 …fprintf(stdout, " size: %#"PRI_lx64" offset: %#"PRI_lx64" ref: %#"PRI_lx64" idx: %u tid: %d c… in perf_event__process_auxtrace()
1700 ret += fprintf(fp, " cpu %d pid %d tid %d ip %#"PRI_lx64" code %u: %s\n", in perf_event__fprintf_auxtrace_error()
Dcs-etm.c2789 pr_debug3("CS ETM: Queue buffer size: %#"PRI_lx64" offset: %#"PRI_lx64 in cs_etm__queue_aux_fragment()
2859 pr_err("CS ETM: Couldn't find auxtrace buffer for aux_offset: %#"PRI_lx64 in cs_etm__queue_aux_records_cb()
Dmachine.c989 pr_debug("Failed to write kernel text poke at %#" PRI_lx64 "\n", in machine__process_text_poke()
992 pr_debug("Failed to find kernel text poke address map for %#" PRI_lx64 "\n", in machine__process_text_poke()