From patchwork Mon May 17 20:29:44 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Wysochanski X-Patchwork-Id: 12263127 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 69FA7C433ED for ; Mon, 17 May 2021 20:29:52 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3E50660FD9 for ; Mon, 17 May 2021 20:29:52 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237482AbhEQUbH (ORCPT ); Mon, 17 May 2021 16:31:07 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:30867 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234249AbhEQUbG (ORCPT ); Mon, 17 May 2021 16:31:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1621283389; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc; bh=h+GTfhmeBgDj/UpoAJ2mhJrbp6L76sYhn23+JMEI2wY=; b=VTbRrxQVjsg5DV/HTxP3ttW/JFwAJyk0u1CQEY3TmwU5R8+qOytiysJ1NQurxLuFnT8wxu W9k4uFmY5nOWMV0C3pMskFXrEEJUfI3Rsijbek1P8dZX4iEzsY4xt58ANJu9RcUofJGCKz GcM0dNTTyK0plSJjzdb8lSxg8wt4wPQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-128-iKV66ooIMomviw9u-qPiyw-1; Mon, 17 May 2021 16:29:48 -0400 X-MC-Unique: iKV66ooIMomviw9u-qPiyw-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 65689803620; Mon, 17 May 2021 20:29:47 +0000 (UTC) Received: from dwysocha.rdu.csb (ovpn-119-128.rdu2.redhat.com [10.10.119.128]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 042735D6D7; Mon, 17 May 2021 20:29:46 +0000 (UTC) From: Dave Wysochanski To: Bruce Fields , Chuck Lever III Cc: linux-nfs@vger.kernel.org Subject: [PATCH v2 0/1] Add callback address and state to nfsd4 client info Date: Mon, 17 May 2021 16:29:44 -0400 Message-Id: <1621283385-24390-1-git-send-email-dwysocha@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org For troubleshooting, it is useful to show the callback address and state inside the nfsd4 client info. Note the callback address and state is also available via trace events, so use a common function and output. Changes since v1: - fix indents, run checkpatch (Chuck L) - create cb_state2str() inside fs/nfsd/trace.c (Bruce F) - rebase on Chuck v3 nfsd patches and test Dave Wysochanski (1): nfsd4: Expose the callback address and state of each NFS4 client fs/nfsd/nfs4state.c | 2 ++ fs/nfsd/trace.c | 15 +++++++++++++++ fs/nfsd/trace.h | 9 ++------- 3 files changed, 19 insertions(+), 7 deletions(-)