[net-next,12/13] rxrpc: Change rx_packet tracepoint to display securityIndex not type twice
Message ID | 20230131171227.3912130-13-dhowells@redhat.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp26139wrn; Tue, 31 Jan 2023 09:18:30 -0800 (PST) X-Google-Smtp-Source: AK7set8Gik2Q3y5ArSiJbk6OgMzxrlqgtQZzMup9PUNdSZyAnjqMCXCVd4bg8EnY7Ho0O0IRzABe X-Received: by 2002:a17:906:794e:b0:886:6f92:2bd2 with SMTP id l14-20020a170906794e00b008866f922bd2mr14856154ejo.21.1675185510089; Tue, 31 Jan 2023 09:18:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1675185510; cv=none; d=google.com; s=arc-20160816; b=0HhC6YJxGJOfkcStrefMeXMZlROsl/ei5207lD6opvGfRohRr/y0wSandQxbU/pIMi oHVIumQwgQB4T+GFGmielf9DAy8/z73+iDrQukbkoBXG4EUHqGT3yINSU34EMFuIJNQo E1zxvgpwmjJ3C8FryoHxjT4T7V5tRJhJIRhWt1F0Lsqz/syjpR1D5qTupJh9aO5OJ1l6 h7XB7T2zssu4WHGlAuXWm/AbDNgNEZBpTczwrDcbvnfAShyyvT80+R5NerByU5S25AgC 35azAx32d4VJSy8hMYOAiQoei42kq876di6O2CdDtYKtPx3f32IbET5+oVFZeeESiUes mZMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aWmNysdKy5XBLJKg1ZgGP/kmHqIJ71ALVgjTNQkhEyA=; b=T4fVxjwOpJyRrYfTKfWKi/c2g/NAJWZnz1q84XHyGmYiEY2UiYR5C9YnO4bDKDBpkE L7ZdPU/4h+h7zT5lnm6y8ROQL+/fqSuSiiADd57u6OjCDVGENUS9Fy9fmWenFXkd92j/ 5KLCm0PDmepyn0IeQhxuXXnLa92wNfkV3fBmATYF+P13xmQ0TzGgxM3K8y438MBF3Obf e6echFSqFa9YdxrF5GSuMbhFE84MH9bwvXIgIFWVnt8UcFzCJSvHmTbgWvVeeM8NsXFf RVTgP6Nl6/HQ0KOlXzLxqSRjd4nP+moaBQ8Zq9WmCAUMYmsZ/YqpR0PvcZhonwx92ltq JHlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Sk0HEKlA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 3-20020a170906028300b0084d34979413si16918689ejf.332.2023.01.31.09.18.06; Tue, 31 Jan 2023 09:18:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Sk0HEKlA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232177AbjAaROd (ORCPT <rfc822;maxin.john@gmail.com> + 99 others); Tue, 31 Jan 2023 12:14:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46486 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232022AbjAaROD (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 31 Jan 2023 12:14:03 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BADAD4206 for <linux-kernel@vger.kernel.org>; Tue, 31 Jan 2023 09:12:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1675185175; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=aWmNysdKy5XBLJKg1ZgGP/kmHqIJ71ALVgjTNQkhEyA=; b=Sk0HEKlAKvCJDcwQZ8kmOiq8gcu6dQDlBsZzLF2CegivBiJtFcYxN1ChzJKe2knAFZBAeL C0pAifg1NqeL8LAYCYRJ0tJhuCQ50+hOZ1MkzvJ4Hh0pbV/fzw47AaXXx+czp4yLl6xN3T +8mXzoGttVu5vHCK2UgOA9feuIxZoKY= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-592-VxkkmzVWMheOSBd-0_2EiQ-1; Tue, 31 Jan 2023 12:12:54 -0500 X-MC-Unique: VxkkmzVWMheOSBd-0_2EiQ-1 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 723443C1068D; Tue, 31 Jan 2023 17:12:53 +0000 (UTC) Received: from warthog.procyon.org.uk.com (unknown [10.33.36.97]) by smtp.corp.redhat.com (Postfix) with ESMTP id 57159140EBF4; Tue, 31 Jan 2023 17:12:52 +0000 (UTC) From: David Howells <dhowells@redhat.com> To: netdev@vger.kernel.org Cc: David Howells <dhowells@redhat.com>, "David S. Miller" <davem@davemloft.net>, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com>, Marc Dionne <marc.dionne@auristor.com>, linux-afs@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next 12/13] rxrpc: Change rx_packet tracepoint to display securityIndex not type twice Date: Tue, 31 Jan 2023 17:12:26 +0000 Message-Id: <20230131171227.3912130-13-dhowells@redhat.com> In-Reply-To: <20230131171227.3912130-1-dhowells@redhat.com> References: <20230131171227.3912130-1-dhowells@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.1 on 10.11.54.7 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1756559321432145977?= X-GMAIL-MSGID: =?utf-8?q?1756559321432145977?= |
Series |
rxrpc: Increasing SACK size and moving away from softirq, part 5
|
|
Commit Message
David Howells
Jan. 31, 2023, 5:12 p.m. UTC
Change the rx_packet tracepoint to display the securityIndex from the
packet header instead of displaying the type in numeric form. There's no
need for the latter, as the display of the type in symbolic form will fall
back automatically to displaying the hex value if no symbol is available.
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: linux-afs@lists.infradead.org
---
include/trace/events/rxrpc.h | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a/include/trace/events/rxrpc.h b/include/trace/events/rxrpc.h index b6adec9111e1..d7bb4acf4580 100644 --- a/include/trace/events/rxrpc.h +++ b/include/trace/events/rxrpc.h @@ -752,9 +752,8 @@ TRACE_EVENT(rxrpc_rx_packet, __entry->hdr.epoch, __entry->hdr.cid, __entry->hdr.callNumber, __entry->hdr.serviceId, __entry->hdr.serial, __entry->hdr.seq, - __entry->hdr.type, __entry->hdr.flags, - __entry->hdr.type <= 15 ? - __print_symbolic(__entry->hdr.type, rxrpc_pkts) : "?UNK") + __entry->hdr.securityIndex, __entry->hdr.flags, + __print_symbolic(__entry->hdr.type, rxrpc_pkts)) ); TRACE_EVENT(rxrpc_rx_done,