This was accidentally ommitted from the original commit c02cd0695011 (xenalyze: decode PV_HYPERCALL_SUBCALL events). Signed-off-by: David Vrabel <david.vrabel@citrix.com> --- diff -r 2080678babbf xenalyze.c --- a/xenalyze.c Thu Oct 04 07:40:10 2012 -0400 +++ b/xenalyze.c Mon Jul 22 17:19:11 2013 +0100 @@ -6682,11 +6682,11 @@ void pv_hypercall_v2_process(struct reco uint64_t args[6]; if(op < HYPERCALL_MAX) - printf(" %s hypercall %2x (%s)", - ri->dump_header, op, hypercall_name[op]); + printf(" %s%s hypercall %2x (%s)", + ri->dump_header, indent, op, hypercall_name[op]); else - printf(" %s hypercall %2x", - ri->dump_header, op); + printf(" %s%s hypercall %2x", + ri->dump_header, indent, op); switch(op) { case HYPERCALL_mmu_update:
George Dunlap
2013-Jul-24 19:04 UTC
Re: xenalyze: indent multicall subcalls in dump-all view
On 07/22/2013 05:25 PM, David Vrabel wrote:> This was accidentally ommitted from the original commit c02cd0695011 > (xenalyze: decode PV_HYPERCALL_SUBCALL events). > > Signed-off-by: David Vrabel <david.vrabel@citrix.com>Applied, thanks. -George> --- > diff -r 2080678babbf xenalyze.c > --- a/xenalyze.c Thu Oct 04 07:40:10 2012 -0400 > +++ b/xenalyze.c Mon Jul 22 17:19:11 2013 +0100 > @@ -6682,11 +6682,11 @@ void pv_hypercall_v2_process(struct reco > uint64_t args[6]; > > if(op < HYPERCALL_MAX) > - printf(" %s hypercall %2x (%s)", > - ri->dump_header, op, hypercall_name[op]); > + printf(" %s%s hypercall %2x (%s)", > + ri->dump_header, indent, op, hypercall_name[op]); > else > - printf(" %s hypercall %2x", > - ri->dump_header, op); > + printf(" %s%s hypercall %2x", > + ri->dump_header, indent, op); > > switch(op) { > case HYPERCALL_mmu_update: >