Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp530591iof; Mon, 6 Jun 2022 08:01:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzsKDuYDiqMSOWgXLtWaMN8Qsn+1SwcGe4Egtkx9FmMgIGWLRdcrtdcPv/CWhctCv1hG9ve X-Received: by 2002:a17:90a:5d03:b0:1e0:90f5:3799 with SMTP id s3-20020a17090a5d0300b001e090f53799mr62178412pji.227.1654527712463; Mon, 06 Jun 2022 08:01:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654527712; cv=none; d=google.com; s=arc-20160816; b=xye2YBPRPJm0TqivHAfeZ/il13CpFyc/YyH4f2Gn4KDQ67F6Im3YiS1b99fE+BkUSd aCFt4Q0J1gcMK3Rpm3fLEXTMCLD6TwPQcUro0ukn1nILFlA/D2QpJRTpE0WTSX+GWL9f VGzqyIyT5YLDMqMe5al8tH+GpqbX18e3vHUZfZNO2NdIAkJlQ++o5WdVFCtSF3EC6J6F Tv758vMPzFQXfL2/+GLzgCBFSjP9G1R0bvMM0aQUbny3H+aL1YFHkcQuh64cLQ+gJWUN oDlxhLquvNann+0nUcxQHHhjwJ5slnU1omeNCp4eDazL0lmWo+Z4wcIjNq4oBRKy9sRV pQoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject; bh=4Lk7q60ZQuKpgwLXeW5BaDkeifQuekSc7vHD5oEupR0=; b=Xdf1quASl66JtHZ9gp7zn0JoSrH4o2KwU/vbjkq1+J3wHB7Dg3Ewa049MKl3ndXibn oTKYjliO9UVzPGce1gHoZy7+KxqATlKZDsT6UZ8rytpU+b4BDHKkKy+j/0c6Pxqt9FS7 2yRM5kbJjXUfH3ZSA3tZnNYPvkuQQcs4Y7g8u514aVz1ZR6a3bmbQEUFKiqrcyoI5jGZ zxBD97FakIyztFtZw/gnlK9DuFcOCClYZ0+zXJP+NaK9UpWokXG2O0LMxPAQ4Sd0BUZD QthVHPmBuSnzNV4aYwIBTBjx7nn6Cs+6OJNvauEk17/43xllfxzfOdxlICVnzkF6EVB0 zI3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id x11-20020a62fb0b000000b0050e082dea07si18525750pfm.189.2022.06.06.08.01.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Jun 2022 08:01:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A777B16F93D; Mon, 6 Jun 2022 07:50:56 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240046AbiFFOuy (ORCPT + 99 others); Mon, 6 Jun 2022 10:50:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54400 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229602AbiFFOuy (ORCPT ); Mon, 6 Jun 2022 10:50:54 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 598C5166447 for ; Mon, 6 Jun 2022 07:50:51 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 95D0DB81A7C for ; Mon, 6 Jun 2022 14:50:50 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 232A7C3411C; Mon, 6 Jun 2022 14:50:49 +0000 (UTC) Subject: [PATCH v2 03/15] SUNRPC: Replace dprintk() call site in xs_data_ready From: Chuck Lever To: linux-nfs@vger.kernel.org Cc: trondmy@hammerspace.com Date: Mon, 06 Jun 2022 10:50:48 -0400 Message-ID: <165452704802.1496.15626296214203899256.stgit@oracle-102.nfsv4.dev> In-Reply-To: <165452664596.1496.16204212908726904739.stgit@oracle-102.nfsv4.dev> References: <165452664596.1496.16204212908726904739.stgit@oracle-102.nfsv4.dev> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org Signed-off-by: Chuck Lever --- include/trace/events/sunrpc.h | 20 ++++++++++++++++++++ net/sunrpc/xprtsock.c | 6 ++++-- 2 files changed, 24 insertions(+), 2 deletions(-) diff --git a/include/trace/events/sunrpc.h b/include/trace/events/sunrpc.h index 3995c58a1c51..a66aa1f59ed8 100644 --- a/include/trace/events/sunrpc.h +++ b/include/trace/events/sunrpc.h @@ -1266,6 +1266,26 @@ TRACE_EVENT(xprt_reserve, ) ); +TRACE_EVENT(xs_data_ready, + TP_PROTO( + const struct rpc_xprt *xprt + ), + + TP_ARGS(xprt), + + TP_STRUCT__entry( + __string(addr, xprt->address_strings[RPC_DISPLAY_ADDR]) + __string(port, xprt->address_strings[RPC_DISPLAY_PORT]) + ), + + TP_fast_assign( + __assign_str(addr, xprt->address_strings[RPC_DISPLAY_ADDR]); + __assign_str(port, xprt->address_strings[RPC_DISPLAY_PORT]); + ), + + TP_printk("peer=[%s]:%s", __get_str(addr), __get_str(port)) +); + TRACE_EVENT(xs_stream_read_data, TP_PROTO(struct rpc_xprt *xprt, ssize_t err, size_t total), diff --git a/net/sunrpc/xprtsock.c b/net/sunrpc/xprtsock.c index 650102a9c86a..73fab802996d 100644 --- a/net/sunrpc/xprtsock.c +++ b/net/sunrpc/xprtsock.c @@ -1378,7 +1378,7 @@ static void xs_udp_data_receive_workfn(struct work_struct *work) } /** - * xs_data_ready - "data ready" callback for UDP sockets + * xs_data_ready - "data ready" callback for sockets * @sk: socket with data to read * */ @@ -1386,11 +1386,13 @@ static void xs_data_ready(struct sock *sk) { struct rpc_xprt *xprt; - dprintk("RPC: xs_data_ready...\n"); xprt = xprt_from_sock(sk); if (xprt != NULL) { struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); + + trace_xs_data_ready(xprt); + transport->old_data_ready(sk); /* Any data means we had a useful conversation, so * then we don't need to delay the next reconnect