[Ocfs2-tools-devel] [PATCH 1/8] odump.py: clean up useless comments v2
Sunil Mushran
sunil.mushran at oracle.com
Wed Sep 2 12:51:38 PDT 2009
The entire patch series has been checked in.
Thanks
Jeff Liu wrote:
> Signed-off-by: Jeff Liu <jeff.liu at oracle.com>
> ---
> ADDONS/odump.py | 31 ++-----------------------------
> 1 files changed, 2 insertions(+), 29 deletions(-)
>
> diff --git a/ADDONS/odump.py b/ADDONS/odump.py
> index 563acaa..dc1e171 100755
> --- a/ADDONS/odump.py
> +++ b/ADDONS/odump.py
> @@ -1,6 +1,5 @@
> #!/usr/bin/env python
>
> -#import pdb
> import os
> import re
> import sys
> @@ -107,10 +106,7 @@ def getLVB(payload, fmtstr='<%s>'):
> lvbstr = lvbstr + 'size=' + size + ' '
>
> if payload.has_key('OVR2'):
> - #ovlist = string.split(payload['OVR2'], ', ')
> ovlist = ' '.join(string.split(payload['OVR2'], ','))
> - #for o in ovlist:
> - # k, v = o.split('=')
> lvbstr = lvbstr + ovlist
>
> return fmtstr % lvbstr
> @@ -127,7 +123,6 @@ def getEthHeader(msg, fmtstr=FRAME_FMT + TIME_FMT + IP_FMT):
> IP_REGEX = re.compile(r'Internet Protocol, Src: (\d+\.\d+\.\d+\.\d+) \(.*\),' \
> ' Dst: (\d+\.\d+\.\d+\.\d+) \(.*\)')
>
> - # FIXME!
> if not msg:
> return ''
>
> @@ -201,8 +196,8 @@ def getOCFS2Payload(plist, func):
>
> payload = [[i,p] for i,p in enumerate(plist) if p.strip().startswith('Payload')]
>
> - # return {} if no "Payload" entry found or its value is MISSING
> - if payload == []: # or payload[0][1].find('MISSING'):
> + # return {} if no "Payload" entry found
> + if payload == []:
> return {}
>
> # start from Payload line
> @@ -211,7 +206,6 @@ def getOCFS2Payload(plist, func):
> plist = plist[i:]
> for pl in plist:
> vlist = pl.split(':')
> - #assert len(vlist) > 0, "incorrect payload entry"
> if len(vlist) > 0:
> pdict[vlist[0].strip()] = vlist[1:]
> except KeyError, ValueError:
> @@ -296,25 +290,21 @@ def ConvertLockMsg(odict, \
> else:
> cookie = ' '
>
> - #Node Index: 1
> if odict.has_key('Node Index'):
> nodeidx = odict['Node Index'][0].strip()
> else:
> nodeidx = ' '
>
> - #Flags: 0x00000400: 0000 0000 0000 0000 0000 0100 0000 0000 = convert
> if odict.has_key('Flags'):
> flags = odict['Flags'][0].strip()
> else:
> flags = ' '
>
> - #Requested Type: EX: Exclusive (5)
> if odict.has_key('Requested Type'):
> reqtype = odict['Requested Type'][0].strip()
> else:
> reqtype = ' '
>
> - #Name: M0000000000000000000005de982fa4
> if odict.has_key('Name'):
> name = odict['Name'][0].strip()
> else:
> @@ -398,7 +388,6 @@ def ProxyASTMsg(odict, dumplvb, fmtstr=COOKIE_FMT + FLAGS_FMT + NODEIDX_FMT + BL
> else:
> cookie = ' '
>
> - #Flags: 0x40000000: 0100 0000 0000 0000 0000 0000 0000 0000 = get_lvb
> if odict.has_key('Flags'):
> flags = odict['Flags'][0].strip()
> else:
> @@ -409,14 +398,11 @@ def ProxyASTMsg(odict, dumplvb, fmtstr=COOKIE_FMT + FLAGS_FMT + NODEIDX_FMT + BL
> else:
> nodeidx = ' '
>
> - #Type: Proxy AST (505)
> - #Blocked Locktype: NL: No lock (0)
> if odict.has_key('Blocked Locktype'):
> blktype = odict['Blocked Locktype'][0].strip()
> else:
> blktype = ' '
>
> - #Name: M0000000000000000000005de982fa4
> if odict.has_key('Name'):
> name = odict['Name'][0].strip()
> else:
> @@ -445,8 +431,6 @@ def QueryJoinRequestMsg(odict, fmtstr=NODEIDX_FMT):
> def ExitDomainMsg(odict, fmtstr=NODEIDX_FMT):
> ''' returns node_idx '''
>
> - # Type: Exit Domain (513)
> -
> if odict.has_key('Node Index'):
> nodeidx = odict['Node Index'][0].strip()
> else:
> @@ -526,7 +510,6 @@ def AssertJoinMsg(odict, fmtstr=NODEIDX_FMT + DOMAIN_FMT):
> else:
> nodeidx = ' '
>
> - # FIXME, domain line format?
> if odict.has_key('Domain Name'):
> domain = odict['Domain Name'][0].strip()
> else:
> @@ -544,7 +527,6 @@ def CancelJoinMsg(odict, fmtstr=NODEIDX_FMT + DOMAIN_FMT):
> else:
> nodeidx = ' '
>
> - # FIXME, domain line format?
> if odict.has_key('Domain Name'):
> domain = odict['Domain Name'][0].strip()
> else:
> @@ -686,7 +668,6 @@ def main(srcfile, dstfile, o2type, dumplvb, verbose):
> packets.append(line)
> continue
>
> - #print packets
> i = 0
> is_valid = 0
> for p in packets:
> @@ -737,15 +718,7 @@ def main(srcfile, dstfile, o2type, dumplvb, verbose):
> o2msgstr = ''
> try:
> if func in LVBFUNC:
> - # o2msgstr = eval(funcstr, ocfs2payload, dumplvb)
> - # print 'dump lvb func: %s\n' % globals()[func]
> - # print 'dumplvb is %s\n' % dumplvb
> - # call_func = globals()[func]
> - # if 'ProxyASTMsg' in globals():
> - # print 'Yeah\n'
> o2msgstr = globals()[func](ocfs2payload, dumplvb)
> - # o2msgstr = call_func(ocfs2payload, dumplvb)
> - # print 'O2msgstr: %s\n' % o2msgstr
> else:
> o2msgstr = globals()[func](ocfs2payload)
> except KeyError: # DLM message do not support encountered
>
More information about the Ocfs2-tools-devel
mailing list