1
The following changes since commit 560009f2c8b57b7cdd31a5693ea86ab369382f49:
1
The following changes since commit 15ef89d2a1a7b93845a6b09c2ee8e1979f6eb30b:
2
2
3
Merge remote-tracking branch 'remotes/kevin/tags/for-upstream' into staging (2019-10-07 15:40:53 +0100)
3
Update version for v7.0.0-rc1 release (2022-03-22 22:58:44 +0000)
4
4
5
are available in the Git repository at:
5
are available in the Git repository at:
6
6
7
https://github.com/stefanha/qemu.git tags/block-pull-request
7
https://gitlab.com/stefanha/qemu.git tags/block-pull-request
8
8
9
for you to fetch changes up to 4d804b5305ffb4d5fa414c38d4f1bdfb987c8d0b:
9
for you to fetch changes up to 2539eade4f689eda7e9fe45486f18334bfbafaf0:
10
10
11
iotests/262: Switch source/dest VM launch order (2019-10-08 14:28:25 +0100)
11
hw: Fix misleading hexadecimal format (2022-03-24 10:38:42 +0000)
12
12
13
----------------------------------------------------------------
13
----------------------------------------------------------------
14
Pull request
14
Pull request
15
15
16
This pull request also contains the two commits from the previous pull request
16
Philippe found cases where the 0x%d format string was used, leading to
17
that was dropped due to a mingw compilation error. The compilation should now
17
misleading output. The patches look harmless and could save people time, so I
18
be fixed.
18
think it's worth including them in 7.0.
19
19
20
----------------------------------------------------------------
20
----------------------------------------------------------------
21
21
22
Max Reitz (2):
22
Philippe Mathieu-Daudé (2):
23
block: Skip COR for inactive nodes
23
block: Fix misleading hexadecimal format
24
iotests/262: Switch source/dest VM launch order
24
hw: Fix misleading hexadecimal format
25
25
26
Sergio Lopez (1):
26
block/parallels-ext.c | 2 +-
27
virtio-blk: schedule virtio_notify_config to run on main context
27
hw/i386/sgx.c | 2 +-
28
28
hw/i386/trace-events | 6 +++---
29
Vladimir Sementsov-Ogievskiy (1):
29
hw/misc/trace-events | 4 ++--
30
util/ioc.c: try to reassure Coverity about qemu_iovec_init_extended
30
hw/scsi/trace-events | 4 ++--
31
31
5 files changed, 9 insertions(+), 9 deletions(-)
32
block/io.c | 41 +++++++++++++++++++++++++-------------
33
hw/block/virtio-blk.c | 16 ++++++++++++++-
34
util/iov.c | 5 +++--
35
tests/qemu-iotests/262 | 12 +++++------
36
tests/qemu-iotests/262.out | 6 +++---
37
5 files changed, 54 insertions(+), 26 deletions(-)
38
32
39
--
33
--
40
2.21.0
34
2.35.1
41
35
42
diff view generated by jsdifflib
Deleted patch
1
From: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
2
1
3
Make it more obvious, that filling qiov corresponds to qiov allocation,
4
which in turn corresponds to total_niov calculation, based on mid_niov
5
(not mid_len). Still add an assertion to show that there should be no
6
difference.
7
8
[Added mingw "error: 'mid_iov' may be used uninitialized in this
9
function" compiler error fix suggested by Vladimir.
10
--Stefan]
11
12
Reported-by: Coverity (CID 1405302)
13
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
14
Message-id: 20190910090310.14032-1-vsementsov@virtuozzo.com
15
Suggested-by: Peter Maydell <peter.maydell@linaro.org>
16
Signed-off-by: Vladimir Sementsov-Ogievskiy <vsementsov@virtuozzo.com>
17
Message-Id: <20190910090310.14032-1-vsementsov@virtuozzo.com>
18
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
19
20
fixup! util/ioc.c: try to reassure Coverity about qemu_iovec_init_extended
21
---
22
util/iov.c | 5 +++--
23
1 file changed, 3 insertions(+), 2 deletions(-)
24
25
diff --git a/util/iov.c b/util/iov.c
26
index XXXXXXX..XXXXXXX 100644
27
--- a/util/iov.c
28
+++ b/util/iov.c
29
@@ -XXX,XX +XXX,XX @@ void qemu_iovec_init_extended(
30
{
31
size_t mid_head, mid_tail;
32
int total_niov, mid_niov = 0;
33
- struct iovec *p, *mid_iov;
34
+ struct iovec *p, *mid_iov = NULL;
35
36
if (mid_len) {
37
mid_iov = qiov_slice(mid_qiov, mid_offset, mid_len,
38
@@ -XXX,XX +XXX,XX @@ void qemu_iovec_init_extended(
39
p++;
40
}
41
42
- if (mid_len) {
43
+ assert(!mid_niov == !mid_len);
44
+ if (mid_niov) {
45
memcpy(p, mid_iov, mid_niov * sizeof(*p));
46
p[0].iov_base = (uint8_t *)p[0].iov_base + mid_head;
47
p[0].iov_len -= mid_head;
48
--
49
2.21.0
50
51
diff view generated by jsdifflib
Deleted patch
1
From: Sergio Lopez <slp@redhat.com>
2
1
3
virtio_notify_config() needs to acquire the global mutex, which isn't
4
allowed from an iothread, and may lead to a deadlock like this:
5
6
- main thead
7
* Has acquired: qemu_global_mutex.
8
* Is trying the acquire: iothread AioContext lock via
9
AIO_WAIT_WHILE (after aio_poll).
10
11
- iothread
12
* Has acquired: AioContext lock.
13
* Is trying to acquire: qemu_global_mutex (via
14
virtio_notify_config->prepare_mmio_access).
15
16
If virtio_blk_resize() is called from an iothread, schedule
17
virtio_notify_config() to be run in the main context BH.
18
19
[Removed unnecessary newline as suggested by Kevin Wolf
20
<kwolf@redhat.com>.
21
--Stefan]
22
23
Signed-off-by: Sergio Lopez <slp@redhat.com>
24
Reviewed-by: Kevin Wolf <kwolf@redhat.com>
25
Message-id: 20190916112411.21636-1-slp@redhat.com
26
Message-Id: <20190916112411.21636-1-slp@redhat.com>
27
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
28
---
29
hw/block/virtio-blk.c | 16 +++++++++++++++-
30
1 file changed, 15 insertions(+), 1 deletion(-)
31
32
diff --git a/hw/block/virtio-blk.c b/hw/block/virtio-blk.c
33
index XXXXXXX..XXXXXXX 100644
34
--- a/hw/block/virtio-blk.c
35
+++ b/hw/block/virtio-blk.c
36
@@ -XXX,XX +XXX,XX @@
37
#include "qemu/iov.h"
38
#include "qemu/module.h"
39
#include "qemu/error-report.h"
40
+#include "qemu/main-loop.h"
41
#include "trace.h"
42
#include "hw/block/block.h"
43
#include "hw/qdev-properties.h"
44
@@ -XXX,XX +XXX,XX @@ static int virtio_blk_load_device(VirtIODevice *vdev, QEMUFile *f,
45
return 0;
46
}
47
48
+static void virtio_resize_cb(void *opaque)
49
+{
50
+ VirtIODevice *vdev = opaque;
51
+
52
+ assert(qemu_get_current_aio_context() == qemu_get_aio_context());
53
+ virtio_notify_config(vdev);
54
+}
55
+
56
static void virtio_blk_resize(void *opaque)
57
{
58
VirtIODevice *vdev = VIRTIO_DEVICE(opaque);
59
60
- virtio_notify_config(vdev);
61
+ /*
62
+ * virtio_notify_config() needs to acquire the global mutex,
63
+ * so it can't be called from an iothread. Instead, schedule
64
+ * it to be run in the main context BH.
65
+ */
66
+ aio_bh_schedule_oneshot(qemu_get_aio_context(), virtio_resize_cb, vdev);
67
}
68
69
static const BlockDevOps virtio_block_ops = {
70
--
71
2.21.0
72
73
diff view generated by jsdifflib
1
From: Max Reitz <mreitz@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
Launching the destination VM before the source VM gives us a regression
3
"0x%u" format is very misleading, replace by "0x%x".
4
test for HEAD^:
5
4
6
The guest device causes a read from the disk image through
5
Found running:
7
guess_disk_lchs(). This will not work if the first sector (containing
8
the partition table) is yet unallocated, we use COR, and the node is
9
inactive.
10
6
11
By launching the source VM before the destination, however, the COR
7
$ git grep -E '0x%[0-9]*([lL]*|" ?PRI)[dDuU]' block/
12
filter on the source will allocate that area in the image shared between
13
both VMs, thus the problem will not become apparent.
14
8
15
Switching the launch order causes the sector to still be unallocated
9
Inspired-by: Richard Henderson <richard.henderson@linaro.org>
16
when guess_disk_lchs() runs on the inactive node in the destination VM,
10
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
17
and thus we get our test case.
11
Reviewed-by: Hanna Reitz <hreitz@redhat.com>
18
12
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
19
Signed-off-by: Max Reitz <mreitz@redhat.com>
13
Reviewed-by: Denis V. Lunev <den@openvz.org>
20
Reviewed-by: Eric Blake <eblake@redhat.com>
14
Message-id: 20220323114718.58714-2-philippe.mathieu.daude@gmail.com
21
Message-id: 20191001174827.11081-3-mreitz@redhat.com
22
Message-Id: <20191001174827.11081-3-mreitz@redhat.com>
23
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
15
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
24
---
16
---
25
tests/qemu-iotests/262 | 12 ++++++------
17
block/parallels-ext.c | 2 +-
26
tests/qemu-iotests/262.out | 6 +++---
18
1 file changed, 1 insertion(+), 1 deletion(-)
27
2 files changed, 9 insertions(+), 9 deletions(-)
28
19
29
diff --git a/tests/qemu-iotests/262 b/tests/qemu-iotests/262
20
diff --git a/block/parallels-ext.c b/block/parallels-ext.c
30
index XXXXXXX..XXXXXXX 100755
31
--- a/tests/qemu-iotests/262
32
+++ b/tests/qemu-iotests/262
33
@@ -XXX,XX +XXX,XX @@ with iotests.FilePath('img') as img_path, \
34
35
os.mkfifo(fifo)
36
37
- iotests.log('Launching source VM...')
38
- add_opts(vm_a)
39
- vm_a.launch()
40
-
41
- vm_a.enable_migration_events('A')
42
-
43
iotests.log('Launching destination VM...')
44
add_opts(vm_b)
45
vm_b.add_incoming("exec: cat '%s'" % (fifo))
46
@@ -XXX,XX +XXX,XX @@ with iotests.FilePath('img') as img_path, \
47
48
vm_b.enable_migration_events('B')
49
50
+ iotests.log('Launching source VM...')
51
+ add_opts(vm_a)
52
+ vm_a.launch()
53
+
54
+ vm_a.enable_migration_events('A')
55
+
56
iotests.log('Starting migration to B...')
57
iotests.log(vm_a.qmp('migrate', uri='exec:cat >%s' % (fifo)))
58
with iotests.Timeout(3, 'Migration does not complete'):
59
diff --git a/tests/qemu-iotests/262.out b/tests/qemu-iotests/262.out
60
index XXXXXXX..XXXXXXX 100644
21
index XXXXXXX..XXXXXXX 100644
61
--- a/tests/qemu-iotests/262.out
22
--- a/block/parallels-ext.c
62
+++ b/tests/qemu-iotests/262.out
23
+++ b/block/parallels-ext.c
63
@@ -XXX,XX +XXX,XX @@
24
@@ -XXX,XX +XXX,XX @@ static int parallels_parse_format_extension(BlockDriverState *bs,
64
-Launching source VM...
25
break;
65
-Enabling migration QMP events on A...
26
66
-{"return": {}}
27
default:
67
Launching destination VM...
28
- error_setg(errp, "Unknown feature: 0x%" PRIu64, fh.magic);
68
Enabling migration QMP events on B...
29
+ error_setg(errp, "Unknown feature: 0x%" PRIx64, fh.magic);
69
{"return": {}}
30
goto fail;
70
+Launching source VM...
31
}
71
+Enabling migration QMP events on A...
32
72
+{"return": {}}
73
Starting migration to B...
74
{"return": {}}
75
{"data": {"status": "setup"}, "event": "MIGRATION", "timestamp": {"microseconds": "USECS", "seconds": "SECS"}}
76
--
33
--
77
2.21.0
34
2.35.1
78
35
79
36
diff view generated by jsdifflib
1
From: Max Reitz <mreitz@redhat.com>
1
From: Philippe Mathieu-Daudé <f4bug@amsat.org>
2
2
3
We must not write data to inactive nodes, and a COR is certainly
3
"0x%u" format is very misleading, replace by "0x%x".
4
something we can simply not do without upsetting anyone. So skip COR
5
operations on inactive nodes.
6
4
7
Signed-off-by: Max Reitz <mreitz@redhat.com>
5
Found running:
8
Reviewed-by: Eric Blake <eblake@redhat.com>
6
9
Message-id: 20191001174827.11081-2-mreitz@redhat.com
7
$ git grep -E '0x%[0-9]*([lL]*|" ?PRI)[dDuU]' hw/
10
Message-Id: <20191001174827.11081-2-mreitz@redhat.com>
8
9
Inspired-by: Richard Henderson <richard.henderson@linaro.org>
10
Signed-off-by: Philippe Mathieu-Daudé <f4bug@amsat.org>
11
Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
12
Message-id: 20220323114718.58714-3-philippe.mathieu.daude@gmail.com
11
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
13
Signed-off-by: Stefan Hajnoczi <stefanha@redhat.com>
12
---
14
---
13
block/io.c | 41 +++++++++++++++++++++++++++--------------
15
hw/i386/sgx.c | 2 +-
14
1 file changed, 27 insertions(+), 14 deletions(-)
16
hw/i386/trace-events | 6 +++---
17
hw/misc/trace-events | 4 ++--
18
hw/scsi/trace-events | 4 ++--
19
4 files changed, 8 insertions(+), 8 deletions(-)
15
20
16
diff --git a/block/io.c b/block/io.c
21
diff --git a/hw/i386/sgx.c b/hw/i386/sgx.c
17
index XXXXXXX..XXXXXXX 100644
22
index XXXXXXX..XXXXXXX 100644
18
--- a/block/io.c
23
--- a/hw/i386/sgx.c
19
+++ b/block/io.c
24
+++ b/hw/i386/sgx.c
20
@@ -XXX,XX +XXX,XX @@ static int coroutine_fn bdrv_co_do_copy_on_readv(BdrvChild *child,
25
@@ -XXX,XX +XXX,XX @@ void pc_machine_init_sgx_epc(PCMachineState *pcms)
21
int max_transfer = MIN_NON_ZERO(bs->bl.max_transfer,
22
BDRV_REQUEST_MAX_BYTES);
23
unsigned int progress = 0;
24
+ bool skip_write;
25
26
if (!drv) {
27
return -ENOMEDIUM;
28
}
26
}
29
27
30
+ /*
28
if ((sgx_epc->base + sgx_epc->size) < sgx_epc->base) {
31
+ * Do not write anything when the BDS is inactive. That is not
29
- error_report("Size of all 'sgx-epc' =0x%"PRIu64" causes EPC to wrap",
32
+ * allowed, and it would not help.
30
+ error_report("Size of all 'sgx-epc' =0x%"PRIx64" causes EPC to wrap",
33
+ */
31
sgx_epc->size);
34
+ skip_write = (bs->open_flags & BDRV_O_INACTIVE);
32
exit(EXIT_FAILURE);
35
+
33
}
36
/* FIXME We cannot require callers to have write permissions when all they
34
diff --git a/hw/i386/trace-events b/hw/i386/trace-events
37
* are doing is a read request. If we did things right, write permissions
35
index XXXXXXX..XXXXXXX 100644
38
* would be obtained anyway, but internally by the copy-on-read code. As
36
--- a/hw/i386/trace-events
39
@@ -XXX,XX +XXX,XX @@ static int coroutine_fn bdrv_co_do_copy_on_readv(BdrvChild *child,
37
+++ b/hw/i386/trace-events
40
while (cluster_bytes) {
38
@@ -XXX,XX +XXX,XX @@ vtd_fault_disabled(void) "Fault processing disabled for context entry"
41
int64_t pnum;
39
vtd_replay_ce_valid(const char *mode, uint8_t bus, uint8_t dev, uint8_t fn, uint16_t domain, uint64_t hi, uint64_t lo) "%s: replay valid context device %02"PRIx8":%02"PRIx8".%02"PRIx8" domain 0x%"PRIx16" hi 0x%"PRIx64" lo 0x%"PRIx64
42
40
vtd_replay_ce_invalid(uint8_t bus, uint8_t dev, uint8_t fn) "replay invalid context device %02"PRIx8":%02"PRIx8".%02"PRIx8
43
- ret = bdrv_is_allocated(bs, cluster_offset,
41
vtd_page_walk_level(uint64_t addr, uint32_t level, uint64_t start, uint64_t end) "walk (base=0x%"PRIx64", level=%"PRIu32") iova range 0x%"PRIx64" - 0x%"PRIx64
44
- MIN(cluster_bytes, max_transfer), &pnum);
42
-vtd_page_walk_one(uint16_t domain, uint64_t iova, uint64_t gpa, uint64_t mask, int perm) "domain 0x%"PRIu16" iova 0x%"PRIx64" -> gpa 0x%"PRIx64" mask 0x%"PRIx64" perm %d"
45
- if (ret < 0) {
43
+vtd_page_walk_one(uint16_t domain, uint64_t iova, uint64_t gpa, uint64_t mask, int perm) "domain 0x%"PRIx16" iova 0x%"PRIx64" -> gpa 0x%"PRIx64" mask 0x%"PRIx64" perm %d"
46
- /* Safe to treat errors in querying allocation as if
44
vtd_page_walk_one_skip_map(uint64_t iova, uint64_t mask, uint64_t translated) "iova 0x%"PRIx64" mask 0x%"PRIx64" translated 0x%"PRIx64
47
- * unallocated; we'll probably fail again soon on the
45
vtd_page_walk_one_skip_unmap(uint64_t iova, uint64_t mask) "iova 0x%"PRIx64" mask 0x%"PRIx64
48
- * read, but at least that will set a decent errno.
46
vtd_page_walk_skip_read(uint64_t iova, uint64_t next) "Page walk skip iova 0x%"PRIx64" - 0x%"PRIx64" due to unable to read"
49
- */
47
vtd_page_walk_skip_reserve(uint64_t iova, uint64_t next) "Page walk skip iova 0x%"PRIx64" - 0x%"PRIx64" due to rsrv set"
50
+ if (skip_write) {
48
vtd_switch_address_space(uint8_t bus, uint8_t slot, uint8_t fn, bool on) "Device %02x:%02x.%x switching address space (iommu enabled=%d)"
51
+ ret = 1; /* "already allocated", so nothing will be copied */
49
vtd_as_unmap_whole(uint8_t bus, uint8_t slot, uint8_t fn, uint64_t iova, uint64_t size) "Device %02x:%02x.%x start 0x%"PRIx64" size 0x%"PRIx64
52
pnum = MIN(cluster_bytes, max_transfer);
50
-vtd_translate_pt(uint16_t sid, uint64_t addr) "source id 0x%"PRIu16", iova 0x%"PRIx64
53
- }
51
-vtd_pt_enable_fast_path(uint16_t sid, bool success) "sid 0x%"PRIu16" %d"
54
+ } else {
52
+vtd_translate_pt(uint16_t sid, uint64_t addr) "source id 0x%"PRIx16", iova 0x%"PRIx64
55
+ ret = bdrv_is_allocated(bs, cluster_offset,
53
+vtd_pt_enable_fast_path(uint16_t sid, bool success) "sid 0x%"PRIx16" %d"
56
+ MIN(cluster_bytes, max_transfer), &pnum);
54
vtd_irq_generate(uint64_t addr, uint64_t data) "addr 0x%"PRIx64" data 0x%"PRIx64
57
+ if (ret < 0) {
55
vtd_reg_read(uint64_t addr, uint64_t size) "addr 0x%"PRIx64" size 0x%"PRIx64
58
+ /*
56
vtd_reg_write(uint64_t addr, uint64_t size, uint64_t val) "addr 0x%"PRIx64" size 0x%"PRIx64" value 0x%"PRIx64
59
+ * Safe to treat errors in querying allocation as if
57
diff --git a/hw/misc/trace-events b/hw/misc/trace-events
60
+ * unallocated; we'll probably fail again soon on the
58
index XXXXXXX..XXXXXXX 100644
61
+ * read, but at least that will set a decent errno.
59
--- a/hw/misc/trace-events
62
+ */
60
+++ b/hw/misc/trace-events
63
+ pnum = MIN(cluster_bytes, max_transfer);
61
@@ -XXX,XX +XXX,XX @@
64
+ }
62
# See docs/devel/tracing.rst for syntax documentation.
65
63
66
- /* Stop at EOF if the image ends in the middle of the cluster */
64
# allwinner-cpucfg.c
67
- if (ret == 0 && pnum == 0) {
65
-allwinner_cpucfg_cpu_reset(uint8_t cpu_id, uint32_t reset_addr) "id %u, reset_addr 0x%" PRIu32
68
- assert(progress >= bytes);
66
+allwinner_cpucfg_cpu_reset(uint8_t cpu_id, uint32_t reset_addr) "id %u, reset_addr 0x%" PRIx32
69
- break;
67
allwinner_cpucfg_read(uint64_t offset, uint64_t data, unsigned size) "offset 0x%" PRIx64 " data 0x%" PRIx64 " size %" PRIu32
70
- }
68
allwinner_cpucfg_write(uint64_t offset, uint64_t data, unsigned size) "offset 0x%" PRIx64 " data 0x%" PRIx64 " size %" PRIu32
71
+ /* Stop at EOF if the image ends in the middle of the cluster */
69
72
+ if (ret == 0 && pnum == 0) {
70
@@ -XXX,XX +XXX,XX @@ imx7_gpr_write(uint64_t offset, uint64_t value) "addr 0x%08" PRIx64 "value 0x%08
73
+ assert(progress >= bytes);
71
74
+ break;
72
# mos6522.c
75
+ }
73
mos6522_set_counter(int index, unsigned int val) "T%d.counter=%d"
76
74
-mos6522_get_next_irq_time(uint16_t latch, int64_t d, int64_t delta) "latch=%d counter=0x%"PRId64 " delta_next=0x%"PRId64
77
- assert(skip_bytes < pnum);
75
+mos6522_get_next_irq_time(uint16_t latch, int64_t d, int64_t delta) "latch=%d counter=0x%"PRIx64 " delta_next=0x%"PRIx64
78
+ assert(skip_bytes < pnum);
76
mos6522_set_sr_int(void) "set sr_int"
79
+ }
77
mos6522_write(uint64_t addr, const char *name, uint64_t val) "reg=0x%"PRIx64 " [%s] val=0x%"PRIx64
80
78
mos6522_read(uint64_t addr, const char *name, unsigned val) "reg=0x%"PRIx64 " [%s] val=0x%x"
81
if (ret <= 0) {
79
diff --git a/hw/scsi/trace-events b/hw/scsi/trace-events
82
QEMUIOVector local_qiov;
80
index XXXXXXX..XXXXXXX 100644
81
--- a/hw/scsi/trace-events
82
+++ b/hw/scsi/trace-events
83
@@ -XXX,XX +XXX,XX @@ lsi_bad_phase_interrupt(void) "Phase mismatch interrupt"
84
lsi_bad_selection(uint32_t id) "Selected absent target %"PRIu32
85
lsi_do_dma_unavailable(void) "DMA no data available"
86
lsi_do_dma(uint64_t addr, int len) "DMA addr=0x%"PRIx64" len=%d"
87
-lsi_queue_command(uint32_t tag) "Queueing tag=0x%"PRId32
88
+lsi_queue_command(uint32_t tag) "Queueing tag=0x%"PRIx32
89
lsi_add_msg_byte_error(void) "MSG IN data too long"
90
lsi_add_msg_byte(uint8_t data) "MSG IN 0x%02x"
91
lsi_reselect(int id) "Reselected target %d"
92
@@ -XXX,XX +XXX,XX @@ lsi_do_msgout_noop(void) "MSG: No Operation"
93
lsi_do_msgout_extended(uint8_t msg, uint8_t len) "Extended message 0x%x (len %d)"
94
lsi_do_msgout_ignored(const char *msg) "%s (ignored)"
95
lsi_do_msgout_simplequeue(uint8_t select_tag) "SIMPLE queue tag=0x%x"
96
-lsi_do_msgout_abort(uint32_t tag) "MSG: ABORT TAG tag=0x%"PRId32
97
+lsi_do_msgout_abort(uint32_t tag) "MSG: ABORT TAG tag=0x%"PRIx32
98
lsi_do_msgout_clearqueue(uint32_t tag) "MSG: CLEAR QUEUE tag=0x%"PRIx32
99
lsi_do_msgout_busdevicereset(uint32_t tag) "MSG: BUS DEVICE RESET tag=0x%"PRIx32
100
lsi_do_msgout_select(int id) "Select LUN %d"
83
--
101
--
84
2.21.0
102
2.35.1
85
103
86
104
diff view generated by jsdifflib