From nobody Mon Feb 9 22:37:57 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@gnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) by mx.zohomail.com with SMTPS id 1506731848797474.7894584235934; Fri, 29 Sep 2017 17:37:28 -0700 (PDT) Received: from localhost ([::1]:37566 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dy5mW-0002Cx-Qu for importer@patchew.org; Fri, 29 Sep 2017 20:37:24 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:60303) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dy5Vg-0004Li-MC for qemu-devel@nongnu.org; Fri, 29 Sep 2017 20:20:03 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dy5Vd-0005PT-FR for qemu-devel@nongnu.org; Fri, 29 Sep 2017 20:20:00 -0400 Received: from mail-cys01nam02on0083.outbound.protection.outlook.com ([104.47.37.83]:5965 helo=NAM02-CY1-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1dy5Vd-0005Mh-4e for qemu-devel@nongnu.org; Fri, 29 Sep 2017 20:19:57 -0400 Received: from MWHPR02CA0060.namprd02.prod.outlook.com (10.164.133.49) by SN1PR0201MB1935.namprd02.prod.outlook.com (10.163.87.157) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.77.7; Sat, 30 Sep 2017 00:19:54 +0000 Received: from CY1NAM02FT035.eop-nam02.prod.protection.outlook.com (2a01:111:f400:7e45::204) by MWHPR02CA0060.outlook.office365.com (2603:10b6:301:60::49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.56.11 via Frontend Transport; Sat, 30 Sep 2017 00:19:47 +0000 Received: from xsj-pvapsmtpgw02 (149.199.60.100) by CY1NAM02FT035.mail.protection.outlook.com (10.152.75.186) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.56.11 via Frontend Transport; Sat, 30 Sep 2017 00:19:47 +0000 Received: from unknown-38-66.xilinx.com ([149.199.38.66]:41312 helo=xsj-pvapsmtp01) by xsj-pvapsmtpgw02 with esmtp (Exim 4.63) (envelope-from ) id 1dy5VS-0000EH-Am; Fri, 29 Sep 2017 17:19:46 -0700 Received: from [127.0.0.1] (helo=localhost) by xsj-pvapsmtp01 with smtp (Exim 4.63) (envelope-from ) id 1dy5VS-00079M-5c; Fri, 29 Sep 2017 17:19:46 -0700 Received: from xsj-pvapsmtp01 (mailhub.xilinx.com [149.199.38.66]) by xsj-smtp-dlp2.xlnx.xilinx.com (8.13.8/8.13.1) with ESMTP id v8U0Jg4f000651; Fri, 29 Sep 2017 17:19:42 -0700 Received: from [172.19.2.220] (helo=localhost.localdomain) by xsj-pvapsmtp01 with esmtp (Exim 4.63) (envelope-from ) id 1dy5VN-000783-V6; Fri, 29 Sep 2017 17:19:42 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=xilinx.onmicrosoft.com; s=selector1-xilinx-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=DSOYfBVJGodwer4c7Dg/8Bz8omPmaxIHpR+juaAmZ8I=; b=RaeVWanWzJzjZzta4w4WrbFjkPUaGjyQI0aBJNh7Nt7eRQyDy1ZBS07bpju9lWdFkitn34hiOwlPgVhuhFUJLWy+VNWPT9RnA024y7SB4UbLLN8Mo+xSZse5eHj4Clx0Ex1qUg4pH/dnVYa/bKhOMm2S9KihuAGct4jChltfUxs= Authentication-Results: spf=pass (sender IP is 149.199.60.100) smtp.mailfrom=xilinx.com; suse.de; dkim=none (message not signed) header.d=none;suse.de; dmarc=bestguesspass action=none header.from=xilinx.com; Received-SPF: pass (zoho.com: domain of gnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; envelope-from=qemu-devel-bounces+importer=patchew.org@gnu.org; helo=lists.gnu.org; Received-SPF: Pass (protection.outlook.com: domain of xilinx.com designates 149.199.60.100 as permitted sender) receiver=protection.outlook.com; client-ip=149.199.60.100; helo=xsj-pvapsmtpgw02; From: Alistair Francis To: Date: Fri, 29 Sep 2017 17:15:54 -0700 Message-ID: X-Mailer: git-send-email 2.11.0 In-Reply-To: References: X-RCIS-Action: ALLOW X-TM-AS-Product-Ver: IMSS-7.1.0.1224-8.1.0.1062-23358.005 X-TM-AS-User-Approved-Sender: Yes;Yes X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:149.199.60.100; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(346002)(39860400002)(376002)(2980300002)(438002)(199003)(189002)(50986999)(189998001)(48376002)(39060400002)(50466002)(4326008)(316002)(16586007)(54906003)(106002)(36756003)(47776003)(356003)(305945005)(5003940100001)(478600001)(118296001)(33646002)(6666003)(63266004)(77096006)(50226002)(76176999)(9786002)(5660300001)(81156014)(36386004)(2906002)(8936002)(8676002)(6916009)(81166006)(106466001)(2351001)(2950100002)(107986001)(5001870100001); DIR:OUT; SFP:1101; SCL:1; SRVR:SN1PR0201MB1935; H:xsj-pvapsmtpgw02; FPR:; SPF:Pass; PTR:unknown-60-100.xilinx.com,xapps1.xilinx.com; A:1; MX:1; LANG:en; X-Microsoft-Exchange-Diagnostics: 1; CY1NAM02FT035; 1:l5gVdZWWncS9rt/8rP0v7EXyRNkzyEcfwy+76jAUlYjKLY8wvbMfETtpqrRku5R8bK8v259zM7iJhUktJ8WwBa77DgDSJy1upO+2U6JXRu7VKuMCFl3qkxk9DD+ZlRJD MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 5e9dca11-78b9-4879-2875-08d50798f550 X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254152)(8251501002)(2017052603199)(201703131423075)(201703031133081)(201702281549075); SRVR:SN1PR0201MB1935; X-Microsoft-Exchange-Diagnostics: 1; SN1PR0201MB1935; 3:JnmF7CPhbegiH6fgEZS4pErBzQKDfQA4hD7dYMUh2gjdReZSRC02T/IHr41a/sHDUe1Et6O3c6oa6RZzT7LTm4Mz7UkG464TVE0ZNgYFv1TdIBB/U3Nc8w4EurQDmQ6ByT1YEH+3PUCKGXJwvbZ4qdN1LCQlY/MQ6DxO+yyR4OPKefe16VTOEfCy64B+WNbmw3QdKDJOX+KDyZ2VD77cVmvCafAkmpfPKcG+JYOtBeOw+kUDrv34rWf10TKPe4tN7SoiypKEWdSsEhCFmJ6v5L7scrUefkWuDQmEzHCWR3yA2Tsx3LAlf+IlZHA4tSUdfixnVZVdzDHHSMsbAsNxm///pkTVo9+vwQazAFYnri0=; 25:LXsZKeIDqmBAz2pagV6X9kK+xIEAlQ23jze6H7uHjSrL4bldFnnTfqABgtCIzrQ59g+oIJ3eENfEOahQSHxDp7dsiAkLeiNBOWp+tnDyckRkITNMcaT+3Q0YzW3YoLo/PWmNVZI5BBZILZhkwYTN6DWf42hi4cFqzk1YVMVImGZ630rF12jZldih0pnPIYK9wG9eYKB3GyKFQ7xTtEnxJJ0zHWgrVIFzL/CISPbDnzhLbwjFI4yM8AicwKVxGPnfN3LjK8WQg+OZTy79wP9hJO55V4C+lCu+jiwB2K+9YtosmKzVP4oidcge33guCihkxPJZcSSzUZMnl8GHblcB6A== X-MS-TrafficTypeDiagnostic: SN1PR0201MB1935: X-Microsoft-Exchange-Diagnostics: 1; SN1PR0201MB1935; 31:p2ZbJF83IDLiRIZwUbjxby0nCCGiBNbW6aYNzGLeVcQzFK74MD6Nd9tWihdCsQErHM1dWgkB2BZdMqcOf9H/rKghJa/QWqb65QeE2/euG08YVwcL5S6gQyXmzldzSFj8dtA3dC3GAt2KwKxxA41XZxsS8r9e7ICZS8mEmnpnwEG4NWX12pFoS6jVQO63sQmQmf8tAKDb2R3jLbtNuGyoULVPtH3kWxhS9PfS/b8DbIA=; 20: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 X-Exchange-Antispam-Report-Test: UriScan:(788757137089)(190383065149520)(192813158149592)(104084551191319); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93004095)(100000703101)(100105400095)(3002001)(6055026)(6041248)(20161123564025)(20161123558100)(20161123560025)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:SN1PR0201MB1935; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:SN1PR0201MB1935; X-Microsoft-Exchange-Diagnostics: 1; SN1PR0201MB1935; 4:mdwyf8KugFfz0PUdtfsef1o4CwQiMt+IhLrNEyFLEKJyjhkhOXsmqzDvPSsaIyGQuVeAljuSok+qLy5XibvmzjoPvYWRki9wb9JqDmOQ/q8l7ey7SUavWjJ66BJjpt8TPSMGLWVbZ9065Bwxnyzd53CIjfNCAN+KYSZgSi4Okn4LwXcfmpRqe55ZIISaczP4PHbjUkqu67QyjQUrkI5675WwKpxmZug9JBxibVuQ215m1mqpLrAVgPGKO0++CD2RGcbe0mRSQwiEdLqC0kI1pKYzPEfReMSkrPn1gKxnC2zSt4Yzhvw2Ca9xsfQDMlGxK3KOAg9h6DMSCHP4cVGvUgRR9WM0CQ/l3kdh1nhfyA8KLMbAPMEa/1OhRVwLej0WqKaY7OUYNNQkYsWIKgzC/w== X-Forefront-PRVS: 0446F0FCE1 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; SN1PR0201MB1935; 23:sai2sN6XZfDxcLgmCiIstnJPKwqWt3jOms2sE6f?= =?us-ascii?Q?gnwSe5ghgKMfFHgBvRrWv/xLmXIjg02xGC1JKdD4BTFwr/dnkKmvU30opmGU?= =?us-ascii?Q?YsnHCimruE9KwFiMNF4+09Kou8IHBO3QDWf0gfURbe+jaII9MTPegIBubLCz?= =?us-ascii?Q?kL5Ry90fTsZEQxUdybWn7jtPfXL1Azv4rI0Js1WhlvTnit58dFZjYLjyQEVr?= =?us-ascii?Q?CoLumN665H5F/LtLeXOyb3EZ4/Qgy4zrdUu2zK/vXtaFTJDSZ6MFYqDigtcQ?= =?us-ascii?Q?98CuYNyfQiT1EZZolbBEOgwJb+2UVZQ3WbcUXLjMpD2DnSkKNUer81pG2OG7?= =?us-ascii?Q?xnx4mt30CK3l4oZRniUyp13TL/vQJXjnKf17v0mjZqfxnoqHPwCLA6re2Sb+?= =?us-ascii?Q?Q+EPAGoaXtyw9FTyVwHbKj+VVEFpJFXHvTkBQ38VMo8V6MeI/OUhiP79zAVW?= =?us-ascii?Q?MJkj82QqFVqvrCn4nXHSqCaw9vepWXsK2YxwRQdjErrP8LF/Sqb6GvC6XVKJ?= =?us-ascii?Q?cZgO4sgGULMaG6ifl034/4jgOL/L1e5YS8/VKpn6bIZkWEoLSuOtekBPdZ50?= =?us-ascii?Q?XTQzw9TJyc0veOyk9unf+5IFQg0cVei/97GJtVMdIo+AxgmSl9JCRnj43uSm?= =?us-ascii?Q?ipxks8EIVzi49CvOzJmLSIfLfbo+qvpulR9wY3Ymd6Z9yk5lkdqbV4Z1HGQK?= =?us-ascii?Q?MyY9FJnFMBqdGPrCzr6iOSeNhWSQ7PAnh453J4Ew0FcttoNbS3jn7sfBjq5U?= =?us-ascii?Q?BURM4hoWy5ujU/11EYlJXcz79u5wsvHyPKzghDtzB9doPVlcdDNGWoQtjViW?= =?us-ascii?Q?ZuaCHizKPoYOsbmkjcOwil39JLnF4ZZr7ts9QvoPPZMBqGhhRU7dQOCMJalG?= =?us-ascii?Q?7G2qeuhdX1eC1KqFXWSwEyPC3qz1BXk9Iluv7KA6OJuT+0HYK4hixsiBiFW9?= =?us-ascii?Q?RQqMICzZhIOOQAB851U7SfgjlYyMihS1ZT10lmjHBEVNaM2KUpytIGys2F6J?= =?us-ascii?Q?100hwB/u5CS5KzXKeOGeh1hkrpe8KiqOj5mwQzBAi7lQImmQfHJod+LVPAp6?= =?us-ascii?Q?ujW5oMdGXUrCU7hIr6aXx9MYN8j8H?= X-Microsoft-Exchange-Diagnostics: 1; SN1PR0201MB1935; 6:/cIdQMgibMTBFiXtqZiMriUQbV6VVmzowhEX8R03iTfCcM580IlXNKPNfKiJrUojX+BZB/ygeqmVGK9NJ1GQq1X7tq6thqk8+u9l556zKcokVDZQpiIh4g0MmWWVMQxA80DxPjFBWLhRU4u5tQ5L8nrMx+NRTf3jGA0RHTyC3dSkjVMKlCL5jn/yNaAA731Bh/QfSHFpNC/rUYwzGPakPVkKMXe1OIFHzxKxJuVaLmgtnPOL/McU9iBGVYy1LLpWHg2fqJo2N19mTCUlSPtpODaZoKazLK175jiR/U9fwqyWVoj0S9gaDn+3E8rwYbucCYEwzX7e1FlqdGfMF839dg==; 5:/i9CnR6oygMTewuKU4yxotDbxIO1GULnVTn/Yo9KI1B50kuF/v/OjKqW5a0X78EZyWZ7v91hLacSl1l031TJSlDWA6zxsFEyN8bZu4j2ymnEPf8mrr3od/YLVXnQ3gGatUlV9e7dbUhGFZ21MO6796kMD3pmfARIBzmyfcSZ8Sk=; 24:j3Y+ngW7y55fjuFcwel5ZCRW//J/eCzAR8aYmzGFUUp/seAc8E4VcTPGl40VgG+dOgwsK+wLI3KHFz0ps9eSmOTpPL0jGQLTcqg5+eNXEg8=; 7:8C8KB556KaYRij4F8hOWTEvUX1SfkaalRB/MXW/B6dyZytJtoFXw2eAIf5AT7/LV+Fe7ln9dqHzfii6lGYzGZOSazGnsk4u3McodxsEw6EPM3aPcL5ZwSUH1Z2oKOKglZxum3JemG4NrataroLq8e53lr04PNg7e1oQwB8HqLRxMT2d+cATqdEU3XDJrSTvQWvkyVXYFPH/KM74XlGKdMOO4CgBRdzCrOn7MszonmsQ= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-OriginatorOrg: xilinx.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Sep 2017 00:19:47.0043 (UTC) X-MS-Exchange-CrossTenant-Id: 657af505-d5df-48d0-8300-c31994686c5c X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=657af505-d5df-48d0-8300-c31994686c5c; Ip=[149.199.60.100]; Helo=[xsj-pvapsmtpgw02] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN1PR0201MB1935 X-detected-operating-system: by eggs.gnu.org: Windows 7 or 8 [fuzzy] X-Received-From: 104.47.37.83 Subject: [Qemu-devel] [PATCH v2 18/47] hw/intc: Replace fprintf(stderr, "*\n" with error_report() X-BeenThere: qemu-devel@gnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Peter Maydell , Cornelia Huck , armbru@redhat.com, alistair.francis@xilinx.com, Christian Borntraeger , Alexander Graf , alistair23@gmail.com Errors-To: qemu-devel-bounces+importer=patchew.org@gnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) X-ZohoMail: RDKM_2 RSF_0 Z_629925259 SPT_0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Replace a large number of the fprintf(stderr, "*\n" calls with error_report(). The functions were renamed with these commands and then compiler issues where manually fixed. find ./* -type f -exec sed -i \ 'N;N;N;N;N;N;N;N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N;N;N;N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N;N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N;N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + find ./* -type f -exec sed -i \ 'N; {s|fprintf(stderr, "\(.*\)\\n"\(.*\));|error_report("\1"\2);|Ig}' \ {} + Some lines where then manually tweaked to pass checkpatch. Signed-off-by: Alistair Francis Cc: Peter Maydell Cc: Christian Borntraeger Cc: Cornelia Huck Cc: Alexander Graf Acked-by: Cornelia Huck --- V2: - Split hw patch into individual directories hw/intc/arm_gic_kvm.c | 12 ++++++------ hw/intc/omap_intc.c | 4 ++-- hw/intc/openpic.c | 7 ++++--- hw/intc/openpic_kvm.c | 8 ++++---- hw/intc/s390_flic_kvm.c | 4 ++-- 5 files changed, 18 insertions(+), 17 deletions(-) diff --git a/hw/intc/arm_gic_kvm.c b/hw/intc/arm_gic_kvm.c index ae095d08a3..a5478d3e20 100644 --- a/hw/intc/arm_gic_kvm.c +++ b/hw/intc/arm_gic_kvm.c @@ -316,12 +316,12 @@ static void kvm_arm_gic_put(GICState *s) num_cpu =3D ((reg & 0xe0) >> 5) + 1; =20 if (num_irq < s->num_irq) { - fprintf(stderr, "Restoring %u IRQs, but kernel supports max %d= \n", - s->num_irq, num_irq); + error_report("Restoring %u IRQs, but kernel supports max %d", + s->num_irq, num_irq); abort(); } else if (num_cpu !=3D s->num_cpu) { - fprintf(stderr, "Restoring %u CPU interfaces, kernel only has = %d\n", - s->num_cpu, num_cpu); + error_report("Restoring %u CPU interfaces, kernel only has %d", + s->num_cpu, num_cpu); /* Did we not create the VCPUs in the kernel yet? */ abort(); } @@ -411,8 +411,8 @@ static void kvm_arm_gic_get(GICState *s) s->num_cpu =3D ((reg & 0xe0) >> 5) + 1; =20 if (s->num_irq > GIC_MAXIRQ) { - fprintf(stderr, "Too many IRQs reported from the kernel: %d\n", - s->num_irq); + error_report("Too many IRQs reported from the kernel: %d", + s->num_irq); abort(); } =20 diff --git a/hw/intc/omap_intc.c b/hw/intc/omap_intc.c index 6844c1aa83..7fc239715a 100644 --- a/hw/intc/omap_intc.c +++ b/hw/intc/omap_intc.c @@ -539,8 +539,8 @@ static void omap2_inth_write(void *opaque, hwaddr addr, /* TODO: Make a bitmap (or sizeof(char)map) of access privileges * for every register, see Chapter 3 and 4 for privileged mode. */ if (value & 1) - fprintf(stderr, "%s: protection mode enable attempt\n", - __func__); + error_report("%s: protection mode enable attempt", + __func__); return; =20 case 0x50: /* INTC_IDLE */ diff --git a/hw/intc/openpic.c b/hw/intc/openpic.c index 10d6e871fb..7b1cafcc50 100644 --- a/hw/intc/openpic.c +++ b/hw/intc/openpic.c @@ -34,6 +34,7 @@ * */ #include "qemu/osdep.h" +#include "qemu/error-report.h" #include "hw/hw.h" #include "hw/ppc/mac.h" #include "hw/pci/pci.h" @@ -173,7 +174,7 @@ static int inttgt_to_output(int inttgt) } } =20 - fprintf(stderr, "%s: unsupported inttgt %d\n", __func__, inttgt); + error_report("%s: unsupported inttgt %d", __func__, inttgt); return OPENPIC_OUTPUT_INT; } =20 @@ -547,7 +548,7 @@ static void openpic_set_irq(void *opaque, int n_IRQ, in= t level) IRQSource *src; =20 if (n_IRQ >=3D OPENPIC_MAX_IRQ) { - fprintf(stderr, "%s: IRQ %d out of range\n", __func__, n_IRQ); + error_report("%s: IRQ %d out of range", __func__, n_IRQ); abort(); } =20 @@ -1221,7 +1222,7 @@ static uint32_t openpic_iack(OpenPICState *opp, IRQDe= st *dst, int cpu) src =3D &opp->src[irq]; if (!(src->ivpr & IVPR_ACTIVITY_MASK) || !(IVPR_PRIORITY(src->ivpr) > dst->ctpr)) { - fprintf(stderr, "%s: bad raised IRQ %d ctpr %d ivpr 0x%08x\n", + error_report("%s: bad raised IRQ %d ctpr %d ivpr 0x%08x", __func__, irq, dst->ctpr, src->ivpr); openpic_update_irq(opp, irq); retval =3D opp->spve; diff --git a/hw/intc/openpic_kvm.c b/hw/intc/openpic_kvm.c index fa83420254..60c784ae86 100644 --- a/hw/intc/openpic_kvm.c +++ b/hw/intc/openpic_kvm.c @@ -150,8 +150,8 @@ static void kvm_openpic_region_add(MemoryListener *list= ener, =20 ret =3D ioctl(opp->fd, KVM_SET_DEVICE_ATTR, &attr); if (ret < 0) { - fprintf(stderr, "%s: %s %" PRIx64 "\n", __func__, - strerror(errno), reg_base); + error_report("%s: %s %" PRIx64 "", __func__, + strerror(errno), reg_base); } } =20 @@ -184,8 +184,8 @@ static void kvm_openpic_region_del(MemoryListener *list= ener, =20 ret =3D ioctl(opp->fd, KVM_SET_DEVICE_ATTR, &attr); if (ret < 0) { - fprintf(stderr, "%s: %s %" PRIx64 "\n", __func__, - strerror(errno), reg_base); + error_report("%s: %s %" PRIx64 "", __func__, + strerror(errno), reg_base); } } =20 diff --git a/hw/intc/s390_flic_kvm.c b/hw/intc/s390_flic_kvm.c index d208cb81c4..e710bfdcda 100644 --- a/hw/intc/s390_flic_kvm.c +++ b/hw/intc/s390_flic_kvm.c @@ -83,7 +83,7 @@ static void flic_enable_pfault(KVMS390FLICState *flic) rc =3D ioctl(flic->fd, KVM_SET_DEVICE_ATTR, &attr); =20 if (rc) { - fprintf(stderr, "flic: couldn't enable pfault\n"); + error_report("flic: couldn't enable pfault"); } } =20 @@ -97,7 +97,7 @@ static void flic_disable_wait_pfault(KVMS390FLICState *fl= ic) rc =3D ioctl(flic->fd, KVM_SET_DEVICE_ATTR, &attr); =20 if (rc) { - fprintf(stderr, "flic: couldn't disable pfault\n"); + error_report("flic: couldn't disable pfault"); } } =20 --=20 2.11.0