Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp364161ybh; Wed, 11 Mar 2020 02:34:44 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuxLjGC8RKAXRzZ+mZgYRkxOMR5hafscxFMEdKT9zmhKnlrYzY7n4OJ+KcRAwA+E9PMKD3E X-Received: by 2002:a05:6808:298:: with SMTP id z24mr1157128oic.67.1583919284203; Wed, 11 Mar 2020 02:34:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583919284; cv=none; d=google.com; s=arc-20160816; b=V+R1Hi4UcZdOhUcytUWVkASAoUumaOLn2MPVXYtfUBsMvPnCE/n++Z0t99tT+sCN3X Ur7XqtpO0NWyac9gdU1HYtsOtA59yTRZrCdelmhfzsm9hpOE9d2nLpDCPE0OZo9s3I7m jYjQG2bDArdyziIgQ4jryfDOJrjDMii98wf/ea85b+rVhUbEn9E279q9RYIRFQrytHqQ 781YdnHhk53ZqAJljWX6brAYcWaRcok0XFaG+wu9w9+zrugTSwBqzcxW+VYLKnr/IpyD exHeAlTQSjm0KxzpRPzeOn9MxxSsL7gCrUfOlXxpFxESLjNxSzoBvgGRZufAk25pW1cv wqXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=I9hoYIBTnevGh/wxgs0iTj7JH6u1nw64ezrvWN3dStI=; b=tFjdBVRwpqPHg5EAIbuHhGDA561gVrM56wR+6o05OllRevq4JwkPV9x30BE2LcPKoM CtwPXXVCdKDVAldY/xay74yKkN80+2TroTsJBUee85MBzvL3BfB2q0jSBYAEwOPRwW8c hdHmrDKnOC+t69pK3L6dY6jOIeeiVyu4TYABBUXqOa+yWeXSDvAYtVJfT0bGfipTkMxW K4wrTodoxL6hmD5cFt7Y9wHqahu2QytB1a7mwUt9AWkUGJ2c38DrEdREu8W2irF0pLOC IdP2l+eg+PKHr91bHZtz/kjeSltbDMCkmxCPKaycGpTQRxWCIKPVhttwUd5AK0ichmiN 7YBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3si795069oia.264.2020.03.11.02.34.33; Wed, 11 Mar 2020 02:34:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728668AbgCKJdk (ORCPT + 99 others); Wed, 11 Mar 2020 05:33:40 -0400 Received: from s3.sipsolutions.net ([144.76.43.62]:45608 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728349AbgCKJdk (ORCPT ); Wed, 11 Mar 2020 05:33:40 -0400 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.93) (envelope-from ) id 1jBxkA-000vje-Br; Wed, 11 Mar 2020 10:33:38 +0100 Message-ID: <3673cbf5c5779f5909bf677ceab89db08f2c0f25.camel@sipsolutions.net> Subject: Re: [PATCH] nl80211: fix tx_control_port trace point From: Johannes Berg To: Markus Theil Cc: linux-wireless@vger.kernel.org Date: Wed, 11 Mar 2020 10:33:37 +0100 In-Reply-To: <720231bf-8ae0-409d-039e-bc27f3d46fff@tu-ilmenau.de> References: <20200304114952.1827-1-markus.theil@tu-ilmenau.de> <5c542c4ce1b5373e8fe280913b74926f4d36e2d1.camel@sipsolutions.net> <1073945b-ec01-7303-0bfb-92456e1ca7a5@tu-ilmenau.de> <7e3d534a42bf119c92d9e81145940fb02dbc676e.camel@sipsolutions.net> <720231bf-8ae0-409d-039e-bc27f3d46fff@tu-ilmenau.de> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.2 (3.34.2-1.fc31) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Wed, 2020-03-04 at 17:17 +0100, Markus Theil wrote: > Should cfg80211_rx_control_port then also adopt this behavior? > It currently does the conversion in the way I changed > cfg80211_tx_control port to. [...] > TRACE_EVENT(cfg80211_rx_control_port, > ... > __entry->proto = be16_to_cpu(skb->protocol); > __entry->unencrypted = unencrypted; > ), > TP_printk(NETDEV_PR_FMT ", len=%d, " MAC_PR_FMT ", proto: 0x%x, > unencrypted: %s", > NETDEV_PR_ARG, __entry->len, MAC_PR_ARG(from), > __entry->proto, BOOL_TO_STR(__entry->unencrypted)) Great ... I dunno. I guess I don't like touching these so much, because it may be that somebody is relying on them for some kind of tooling? But I guess that's actually unlikely and we can just try, but then I'd rather change this one to BE than the other way around. > IMHO, as long as the trace events are just printed, it is cleaner to > do the endiannes conversion already in the kernel. But they aren't just printed, trace-cmd can record them in binary form, and you can have python plugin code to consume that, for example. johannes