Signed-off-by: Jiri Denemark <jdenemar(a)redhat.com>
---
src/qemu/qemu_domain.c | 188 +++++++++++++++++++----------------------
1 file changed, 85 insertions(+), 103 deletions(-)
diff --git a/src/qemu/qemu_domain.c b/src/qemu/qemu_domain.c
index 0feab09bee..e27b805bb0 100644
--- a/src/qemu/qemu_domain.c
+++ b/src/qemu/qemu_domain.c
@@ -446,7 +446,7 @@ qemuDomainObjFromDomain(virDomainPtr domain)
if (!vm) {
virUUIDFormat(domain->uuid, uuidstr);
virReportError(VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s' (%s)"),
+ _("no domain with matching uuid '%1$s'
(%2$s)"),
uuidstr, domain->name);
return NULL;
}
@@ -612,7 +612,7 @@ qemuDomainMasterKeyReadFile(qemuDomainObjPrivate *priv)
if (!virFileExists(path)) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("domain master key file doesn't exist in %s"),
+ _("domain master key file doesn't exist in %1$s"),
priv->libDir);
goto error;
}
@@ -633,7 +633,7 @@ qemuDomainMasterKeyReadFile(qemuDomainObjPrivate *priv)
if (masterKeyLen != QEMU_DOMAIN_MASTER_KEY_LEN) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("invalid master key read, size=%zd"), masterKeyLen);
+ _("invalid master key read, size=%1$zd"),
masterKeyLen);
goto error;
}
@@ -1378,7 +1378,7 @@ qemuDomainSecretInfoTLSNew(qemuDomainObjPrivate *priv,
if (virUUIDParse(secretUUID, seclookupdef.u.uuid) < 0) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("malformed TLS secret uuid '%s' provided"),
+ _("malformed TLS secret uuid '%1$s' provided"),
secretUUID);
return NULL;
}
@@ -2616,12 +2616,12 @@ qemuDomainObjPrivateXMLParseVcpu(xmlNodePtr node,
if (idstr &&
(virStrToLong_uip(idstr, NULL, 10, &idx) < 0)) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("cannot parse vcpu index '%s'"), idstr);
+ _("cannot parse vcpu index '%1$s'"), idstr);
return -1;
}
if (!(vcpu = virDomainDefGetVcpu(def, idx))) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("invalid vcpu index '%u'"), idx);
+ _("invalid vcpu index '%1$u'"), idx);
return -1;
}
@@ -3090,7 +3090,7 @@ qemuDomainObjPrivateXMLParseSlirpFeatures(xmlNodePtr featuresNode,
feature = qemuSlirpFeatureTypeFromString(str);
if (feature < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unknown slirp feature %s"), str);
+ _("Unknown slirp feature %1$s"), str);
return -1;
}
@@ -3143,7 +3143,7 @@ qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt,
default:
VIR_FREE(monitorpath);
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("unsupported monitor type '%s'"),
+ _("unsupported monitor type '%1$s'"),
virDomainChrTypeToString(priv->monConfig->type));
return -1;
}
@@ -3166,7 +3166,7 @@ qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt,
if (ns < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("malformed namespace name: %s"),
+ _("malformed namespace name: %1$s"),
next->name);
return -1;
}
@@ -3206,7 +3206,7 @@ qemuDomainObjPrivateXMLParse(xmlXPathContextPtr ctxt,
int flag = virQEMUCapsTypeFromString(str);
if (flag < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unknown qemu capabilities flag %s"),
str);
+ _("Unknown qemu capabilities flag %1$s"),
str);
return -1;
}
virQEMUCapsSet(qemuCaps, flag);
@@ -3600,7 +3600,7 @@
qemuDomainDefNamespaceParseOverrideProperties(qemuDomainXmlNsOverrideProperty *p
case QEMU_DOMAIN_XML_NS_OVERRIDE_SIGNED:
if (virStrToLong_ll(prop->value, NULL, 10, &ll) < 0) {
virReportError(VIR_ERR_XML_ERROR,
- _("invalid value '%s' of 'value'
attribute of 'qemu:property'"),
+ _("invalid value '%1$s' of 'value'
attribute of 'qemu:property'"),
prop->value);
return -1;
}
@@ -3610,7 +3610,7 @@
qemuDomainDefNamespaceParseOverrideProperties(qemuDomainXmlNsOverrideProperty *p
case QEMU_DOMAIN_XML_NS_OVERRIDE_UNSIGNED:
if (virStrToLong_ullp(prop->value, NULL, 10, &ull) < 0) {
virReportError(VIR_ERR_XML_ERROR,
- _("invalid value '%s' of 'value'
attribute of 'qemu:property'"),
+ _("invalid value '%1$s' of 'value'
attribute of 'qemu:property'"),
prop->value);
return -1;
}
@@ -3620,7 +3620,7 @@
qemuDomainDefNamespaceParseOverrideProperties(qemuDomainXmlNsOverrideProperty *p
case QEMU_DOMAIN_XML_NS_OVERRIDE_BOOL:
if (STRNEQ(prop->value, "true") &&
STRNEQ(prop->value, "false")) {
virReportError(VIR_ERR_XML_ERROR,
- _("invalid value '%s' of 'value'
attribute of 'qemu:property'"),
+ _("invalid value '%1$s' of 'value'
attribute of 'qemu:property'"),
prop->value);
return -1;
}
@@ -3921,7 +3921,7 @@ qemuDomainDefSuggestDefaultAudioBackend(virQEMUDriver *driver,
} else {
if (((*audioBackend) = qemuAudioDriverTypeFromString(audioenv)) < 0) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("unknown QEMU_AUDIO_DRV setting %s"),
audioenv);
+ _("unknown QEMU_AUDIO_DRV setting %1$s"),
audioenv);
return -1;
}
}
@@ -3933,7 +3933,7 @@ qemuDomainDefSuggestDefaultAudioBackend(virQEMUDriver *driver,
(((*audioSDLDriver) =
virDomainAudioSDLDriverTypeFromString(sdldriver)) <= 0)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("unknown SDL_AUDIODRIVER setting %s"),
sdldriver);
+ _("unknown SDL_AUDIODRIVER setting %1$s"),
sdldriver);
return -1;
}
}
@@ -4180,9 +4180,7 @@ qemuDomainDefAddDefaultDevices(virQEMUDriver *driver,
if (pciRoot >= 0) {
if (def->controllers[pciRoot]->model !=
VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT) {
virReportError(VIR_ERR_XML_ERROR,
- _("The PCI controller with index='0' must be
"
- "model='pci-root' for this machine type,
"
- "but model='%s' was found instead"),
+ _("The PCI controller with index='0' must be
model='pci-root' for this machine type, but model='%1$s' was found
instead"),
virDomainControllerModelPCITypeToString(def->controllers[pciRoot]->model));
return -1;
}
@@ -4203,9 +4201,7 @@ qemuDomainDefAddDefaultDevices(virQEMUDriver *driver,
if (pciRoot >= 0) {
if (def->controllers[pciRoot]->model !=
VIR_DOMAIN_CONTROLLER_MODEL_PCIE_ROOT) {
virReportError(VIR_ERR_XML_ERROR,
- _("The PCI controller with index='0' must be
"
- "model='pcie-root' for this machine type,
"
- "but model='%s' was found instead"),
+ _("The PCI controller with index='0' must be
model='pcie-root' for this machine type, but model='%1$s' was found
instead"),
virDomainControllerModelPCITypeToString(def->controllers[pciRoot]->model));
return -1;
}
@@ -4478,7 +4474,7 @@ qemuDomainDefMachinePostParse(virDomainDef *def,
def->virtType);
if (!machine) {
virReportError(VIR_ERR_INVALID_ARG,
- _("could not get preferred machine for %s
type=%s"),
+ _("could not get preferred machine for %1$s
type=%2$s"),
def->emulator,
virDomainVirtTypeToString(def->virtType));
return -1;
@@ -4809,7 +4805,7 @@ qemuDomainDefPostParseBasic(virDomainDef *def,
if (!(def->emulator = virQEMUCapsGetDefaultEmulator(
driver->hostarch, def->os.arch))) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("No emulator found for arch '%s'"),
+ _("No emulator found for arch '%1$s'"),
virArchToString(def->os.arch));
return 1;
}
@@ -4907,7 +4903,7 @@ qemuDomainValidateActualNetDef(const virDomainNetDef *net,
actualType == VIR_DOMAIN_NET_TYPE_VHOSTUSER ||
actualType == VIR_DOMAIN_NET_TYPE_VDPA)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("interface %s - multiqueue is not supported for network
interfaces of type %s"),
+ _("interface %1$s - multiqueue is not supported for
network interfaces of type %2$s"),
macstr, virDomainNetTypeToString(actualType));
return -1;
}
@@ -4925,14 +4921,14 @@ qemuDomainValidateActualNetDef(const virDomainNetDef *net,
actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
actualType == VIR_DOMAIN_NET_TYPE_ETHERNET)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("interface %s - filterref is not supported for network
interfaces of type %s"),
+ _("interface %1$s - filterref is not supported for
network interfaces of type %2$s"),
macstr, virDomainNetTypeToString(actualType));
return -1;
}
if (vport && vport->virtPortType != VIR_NETDEV_VPORT_PROFILE_NONE) {
/* currently none of the defined virtualport types support iptables */
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("interface %s - filterref is not supported for network
interfaces with virtualport type %s"),
+ _("interface %1$s - filterref is not supported for
network interfaces with virtualport type %2$s"),
macstr, virNetDevVPortTypeToString(vport->virtPortType));
return -1;
}
@@ -4943,7 +4939,7 @@ qemuDomainValidateActualNetDef(const virDomainNetDef *net,
actualType == VIR_DOMAIN_NET_TYPE_BRIDGE ||
actualType == VIR_DOMAIN_NET_TYPE_ETHERNET)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("interface %s - custom tap device path is not supported for
network interfaces of type %s"),
+ _("interface %1$s - custom tap device path is not supported
for network interfaces of type %2$s"),
macstr, virDomainNetTypeToString(actualType));
return -1;
}
@@ -4951,7 +4947,7 @@ qemuDomainValidateActualNetDef(const virDomainNetDef *net,
if (net->teaming && net->teaming->type ==
VIR_DOMAIN_NET_TEAMING_TYPE_TRANSIENT &&
actualType != VIR_DOMAIN_NET_TYPE_HOSTDEV) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("interface %s - teaming transient device must be
type='hostdev', not '%s'"),
+ _("interface %1$s - teaming transient device must be
type='hostdev', not '%2$s'"),
macstr, virDomainNetTypeToString(actualType));
return -1;
}
@@ -5315,30 +5311,27 @@ qemuDomainShmemDefPostParse(virDomainShmemDef *shm)
if (!shm->server.enabled) {
if (shm->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("shmem model '%s' is supported "
- "only with server option enabled"),
+ _("shmem model '%1$s' is supported only with
server option enabled"),
virDomainShmemModelTypeToString(shm->model));
return -1;
}
if (shm->msi.enabled) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("shmem model '%s' doesn't support "
- "msi"),
+ _("shmem model '%1$s' doesn't support
msi"),
virDomainShmemModelTypeToString(shm->model));
}
} else {
if (shm->model == VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("shmem model '%s' is supported "
- "only with server option disabled"),
+ _("shmem model '%1$s' is supported only with
server option disabled"),
virDomainShmemModelTypeToString(shm->model));
return -1;
}
if (shm->size) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("shmem model '%s' does not support size
setting"),
+ _("shmem model '%1$s' does not support size
setting"),
virDomainShmemModelTypeToString(shm->model));
return -1;
}
@@ -5418,8 +5411,7 @@ qemuDomainControllerDefPostParse(virDomainControllerDef *cont,
if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_QUSB1 ||
cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_QUSB2) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("USB controller model type 'qusb1' or
'qusb2' "
- "is not supported in %s"),
+ _("USB controller model type 'qusb1' or
'qusb2' is not supported in %1$s"),
virDomainVirtTypeToString(def->virtType));
return -1;
}
@@ -5427,7 +5419,7 @@ qemuDomainControllerDefPostParse(virDomainControllerDef *cont,
cont->model == VIR_DOMAIN_CONTROLLER_MODEL_USB_QEMU_XHCI) &&
cont->opts.usbopts.ports > QEMU_USB_XHCI_MAXPORTS) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("'%s' controller only supports up to
'%u' ports"),
+ _("'%1$s' controller only supports up to
'%2$u' ports"),
virDomainControllerModelUSBTypeToString(cont->model),
QEMU_USB_XHCI_MAXPORTS);
return -1;
@@ -5472,10 +5464,7 @@ qemuDomainControllerDefPostParse(virDomainControllerDef *cont,
cont->opts.pciopts.numaNode >=
(int)virDomainNumaGetNodeCount(def->numa)) {
virReportError(VIR_ERR_XML_ERROR,
- _("%s with index %d is "
- "configured for a NUMA node (%d) "
- "not present in the domain's "
- "<cpu><numa> array (%zu)"),
+ _("%1$s with index %2$d is configured for a NUMA node
(%3$d) not present in the domain's <cpu><numa> array (%4$zu)"),
virDomainControllerModelPCITypeToString(cont->model),
cont->idx, cont->opts.pciopts.numaNode,
virDomainNumaGetNodeCount(def->numa));
@@ -6348,7 +6337,7 @@ qemuDomainObjExitRemote(virDomainObj *obj,
if (checkActive && !virDomainObjIsActive(obj)) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("domain '%s' is not running"),
+ _("domain '%1$s' is not running"),
obj->def->name);
return -1;
}
@@ -6791,7 +6780,7 @@ qemuDomainObjCheckMachineTaint(virQEMUDriver *driver,
obj->def->virtType,
obj->def->os.machine)) {
qemuDomainObjTaintMsg(driver, obj, VIR_DOMAIN_TAINT_DEPRECATED_CONFIG, logCtxt,
- _("machine type '%s'"),
+ _("machine type '%1$s'"),
obj->def->os.machine);
}
}
@@ -6818,7 +6807,7 @@ qemuDomainObjCheckCPUTaint(virQEMUDriver *driver,
obj->def->virtType,
obj->def->cpu->model)) {
qemuDomainObjTaintMsg(driver, obj, VIR_DOMAIN_TAINT_DEPRECATED_CONFIG,
logCtxt,
- _("CPU model '%s'"),
+ _("CPU model '%1$s'"),
obj->def->cpu->model);
}
break;
@@ -6960,12 +6949,12 @@ qemuDomainLogContext *qemuDomainLogContextNew(virQEMUDriver
*driver,
goto error;
} else {
if ((ctxt->writefd = open(ctxt->path, O_WRONLY | O_CREAT | O_APPEND,
S_IRUSR | S_IWUSR)) < 0) {
- virReportSystemError(errno, _("failed to create logfile %s"),
+ virReportSystemError(errno, _("failed to create logfile %1$s"),
ctxt->path);
goto error;
}
if (virSetCloseExec(ctxt->writefd) < 0) {
- virReportSystemError(errno, _("failed to set close-on-exec flag on
%s"),
+ virReportSystemError(errno, _("failed to set close-on-exec flag on
%1$s"),
ctxt->path);
goto error;
}
@@ -6976,26 +6965,26 @@ qemuDomainLogContext *qemuDomainLogContextNew(virQEMUDriver
*driver,
if (mode == QEMU_DOMAIN_LOG_CONTEXT_MODE_START &&
!driver->privileged &&
ftruncate(ctxt->writefd, 0) < 0) {
- virReportSystemError(errno, _("failed to truncate %s"),
+ virReportSystemError(errno, _("failed to truncate %1$s"),
ctxt->path);
goto error;
}
if (mode == QEMU_DOMAIN_LOG_CONTEXT_MODE_START) {
if ((ctxt->readfd = open(ctxt->path, O_RDONLY)) < 0) {
- virReportSystemError(errno, _("failed to open logfile %s"),
+ virReportSystemError(errno, _("failed to open logfile %1$s"),
ctxt->path);
goto error;
}
if (virSetCloseExec(ctxt->readfd) < 0) {
- virReportSystemError(errno, _("failed to set close-on-exec flag on
%s"),
+ virReportSystemError(errno, _("failed to set close-on-exec flag on
%1$s"),
ctxt->path);
goto error;
}
}
if ((ctxt->pos = lseek(ctxt->writefd, 0, SEEK_END)) < 0) {
- virReportSystemError(errno, _("failed to seek in log file %s"),
+ virReportSystemError(errno, _("failed to seek in log file %1$s"),
ctxt->path);
goto error;
}
@@ -7127,7 +7116,7 @@ qemuDomainLogAppendMessage(virQEMUDriver *driver,
goto cleanup;
} else {
if ((writefd = open(path, O_WRONLY | O_CREAT | O_APPEND, S_IRUSR | S_IWUSR)) <
0) {
- virReportSystemError(errno, _("failed to create logfile %s"),
+ virReportSystemError(errno, _("failed to create logfile %1$s"),
path);
goto cleanup;
}
@@ -7206,7 +7195,7 @@ qemuDomainSnapshotWriteMetadata(virDomainObj *vm,
snapDir = g_strdup_printf("%s/%s", snapshotDir, vm->def->name);
if (g_mkdir_with_parents(snapDir, 0777) < 0) {
- virReportSystemError(errno, _("cannot create snapshot directory
'%s'"),
+ virReportSystemError(errno, _("cannot create snapshot directory
'%1$s'"),
snapDir);
return -1;
}
@@ -7250,7 +7239,7 @@ qemuDomainSnapshotForEachQcow2Raw(virQEMUDriver *driver,
if (!virStorageSourceIsLocalStorage(def->disks[i]->src)) {
virReportError(VIR_ERR_OPERATION_INVALID,
- _("can't manipulate inactive snapshots of disk
'%s'"),
+ _("can't manipulate inactive snapshots of disk
'%1$s'"),
def->disks[i]->dst);
return -1;
}
@@ -7271,7 +7260,7 @@ qemuDomainSnapshotForEachQcow2Raw(virQEMUDriver *driver,
"-d", false, i);
}
virReportError(VIR_ERR_OPERATION_INVALID,
- _("Disk device '%s' does not support
snapshotting"),
+ _("Disk device '%1$s' does not support
snapshotting"),
def->disks[i]->dst);
return -1;
}
@@ -7681,8 +7670,8 @@ qemuDomainStorageSourceValidateDepth(virStorageSource *src,
if (nlayers > QEMU_DOMAIN_STORAGE_SOURCE_CHAIN_MAX_DEPTH) {
if (diskdst)
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("backing chains more than 200 layers deep are not
"
- "supported for disk '%s'"), diskdst);
+ _("backing chains more than 200 layers deep are not
supported for disk '%1$s'"),
+ diskdst);
else
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, "%s",
_("backing chains more than 200 layers deep are not
"
@@ -8199,7 +8188,7 @@ qemuDomainDiskChangeSupported(virDomainDiskDef *disk,
break; \
if (disk->field != orig_disk->field) { \
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, \
- _("cannot modify field '%s' of the disk"),
\
+ _("cannot modify field '%1$s' of the disk"),
\
field_name); \
return false; \
} \
@@ -8211,7 +8200,7 @@ qemuDomainDiskChangeSupported(virDomainDiskDef *disk,
break; \
if (STRNEQ_NULLABLE(disk->field, orig_disk->field)) { \
virReportError(VIR_ERR_OPERATION_UNSUPPORTED, \
- _("cannot modify field '%s' of the disk"),
\
+ _("cannot modify field '%1$s' of the disk"),
\
field_name); \
return false; \
} \
@@ -8221,7 +8210,7 @@ qemuDomainDiskChangeSupported(virDomainDiskDef *disk,
CHECK_EQ(bus, "bus", false);
if (STRNEQ(disk->dst, orig_disk->dst)) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("cannot modify field '%s' of the disk"),
+ _("cannot modify field '%1$s' of the disk"),
"target");
return false;
}
@@ -8311,7 +8300,7 @@ qemuDomainDiskChangeSupported(virDomainDiskDef *disk,
if (disk->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE &&
!virDomainDeviceInfoAddressIsEqual(&disk->info, &orig_disk->info))
{
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("cannot modify field '%s' of the disk"),
+ _("cannot modify field '%1$s' of the disk"),
"address");
return false;
}
@@ -8336,7 +8325,7 @@ qemuDomainDiskChangeSupported(virDomainDiskDef *disk,
if (!virStoragePRDefIsEqual(disk->src->pr,
orig_disk->src->pr)) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("cannot modify field '%s' of the disk"),
+ _("cannot modify field '%1$s' of the disk"),
"reservations");
return false;
}
@@ -8355,7 +8344,7 @@ qemuDomainDiskBlockJobIsActive(virDomainDiskDef *disk)
if (disk->mirror) {
virReportError(VIR_ERR_BLOCK_COPY_ACTIVE,
- _("disk '%s' already in active block job"),
+ _("disk '%1$s' already in active block job"),
disk->dst);
return true;
@@ -8364,7 +8353,7 @@ qemuDomainDiskBlockJobIsActive(virDomainDiskDef *disk)
if (diskPriv->blockjob &&
qemuBlockJobIsRunning(diskPriv->blockjob)) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("disk '%s' already in active block job"),
+ _("disk '%1$s' already in active block job"),
disk->dst);
return true;
}
@@ -8488,8 +8477,7 @@ qemuDomainABIStabilityCheck(const virDomainDef *src,
if (src->mem.source != dst->mem.source) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Target memoryBacking source '%s' doesn't
"
- "match source memoryBacking source'%s'"),
+ _("Target memoryBacking source '%1$s' doesn't
match source memoryBacking source'%2$s'"),
virDomainMemorySourceTypeToString(dst->mem.source),
virDomainMemorySourceTypeToString(src->mem.source));
return false;
@@ -8501,8 +8489,7 @@ qemuDomainABIStabilityCheck(const virDomainDef *src,
if (STRNEQ_NULLABLE(srcAlias, dstAlias)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Target memory device alias '%s' doesn't
"
- "match source alias '%s'"),
+ _("Target memory device alias '%1$s' doesn't
match source alias '%2$s'"),
NULLSTR(srcAlias), NULLSTR(dstAlias));
return false;
}
@@ -8671,8 +8658,8 @@ qemuDomainAlignMemorySizes(virDomainDef *def)
if (mem > maxmemkb) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("memory size of NUMA node '%zu' overflowed
after "
- "alignment"), i);
+ _("memory size of NUMA node '%1$zu' overflowed
after alignment"),
+ i);
return -1;
}
virDomainNumaSetNodeMemorySize(def->numa, i, mem);
@@ -8711,8 +8698,8 @@ qemuDomainAlignMemorySizes(virDomainDef *def)
if (def->mems[i]->size > maxmemkb) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("size of memory module '%zu' overflowed after
"
- "alignment"), i);
+ _("size of memory module '%1$zu' overflowed after
alignment"),
+ i);
return -1;
}
}
@@ -9067,8 +9054,7 @@ qemuCheckMemoryDimmConflict(const virDomainDef *def,
if (mem->info.addr.dimm.slot == tmp->info.addr.dimm.slot) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("memory device slot '%u' is already being
"
- "used by another memory device"),
+ _("memory device slot '%1$u' is already being
used by another memory device"),
mem->info.addr.dimm.slot);
return true;
}
@@ -9076,8 +9062,7 @@ qemuCheckMemoryDimmConflict(const virDomainDef *def,
if (mem->info.addr.dimm.base != 0 &&
mem->info.addr.dimm.base == tmp->info.addr.dimm.base) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("memory device base '0x%llx' is already being
"
- "used by another memory device"),
+ _("memory device base '0x%1$llx' is already
being used by another memory device"),
mem->info.addr.dimm.base);
return true;
}
@@ -9116,8 +9101,7 @@ qemuDomainDefValidateMemoryHotplugDevice(const virDomainMemoryDef
*mem,
if (mem->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_DIMM) {
if (mem->info.addr.dimm.slot >= def->mem.memory_slots) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("memory device slot '%u' exceeds slots
"
- "count '%u'"),
+ _("memory device slot '%1$u' exceeds slots
count '%2$u'"),
mem->info.addr.dimm.slot, def->mem.memory_slots);
return -1;
}
@@ -9145,7 +9129,7 @@ qemuDomainDefValidateMemoryHotplugDevice(const virDomainMemoryDef
*mem,
if (mem->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI &&
mem->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("only 'pci' addresses are supported for the %s
device"),
+ _("only 'pci' addresses are supported for the
%1$s device"),
virDomainMemoryModelTypeToString(mem->model));
return -1;
}
@@ -9153,7 +9137,7 @@ qemuDomainDefValidateMemoryHotplugDevice(const virDomainMemoryDef
*mem,
case VIR_DOMAIN_MEMORY_MODEL_SGX_EPC:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("hotplug is not supported for the %s device"),
+ _("hotplug is not supported for the %1$s device"),
virDomainMemoryModelTypeToString(mem->model));
return -1;
@@ -9233,7 +9217,7 @@ qemuDomainDefValidateMemoryHotplug(const virDomainDef *def,
if (nmems > def->mem.memory_slots) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("memory device count '%u' exceeds slots count
'%u'"),
+ _("memory device count '%1$u' exceeds slots count
'%2$u'"),
nmems, def->mem.memory_slots);
return -1;
}
@@ -9749,13 +9733,13 @@ qemuDomainValidateVcpuInfo(virDomainObj *vm)
if (vcpu->online && vcpupriv->tid == 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("qemu didn't report thread id for vcpu
'%zu'"), i);
+ _("qemu didn't report thread id for vcpu
'%1$zu'"), i);
return -1;
}
if (!vcpu->online && vcpupriv->tid != 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("qemu reported thread id for inactive vcpu
'%zu'"),
+ _("qemu reported thread id for inactive vcpu
'%1$zu'"),
i);
return -1;
}
@@ -10026,7 +10010,7 @@ qemuDomainDiskByName(virDomainDef *def,
if (!(ret = virDomainDiskByName(def, name, true))) {
virReportError(VIR_ERR_INVALID_ARG,
- _("disk '%s' not found in domain"), name);
+ _("disk '%1$s' not found in domain"), name);
return NULL;
}
@@ -10284,7 +10268,7 @@ qemuDomainPrepareStorageSourceTLS(virStorageSource *src,
case VIR_STORAGE_NET_PROTOCOL_SSH:
if (src->haveTLS == VIR_TRISTATE_BOOL_YES) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("TLS transport is not supported for disk protocol
'%s'"),
+ _("TLS transport is not supported for disk protocol
'%1$s'"),
virStorageNetProtocolTypeToString(src->protocol));
return -1;
}
@@ -10619,13 +10603,13 @@ qemuDomainGetStorageSourceByDevstr(const char *devstr,
if (virStorageFileParseBackingStoreStr(devstr, &target, &idx) < 0) {
virReportError(VIR_ERR_INVALID_ARG,
- _("failed to parse block device '%s'"),
devstr);
+ _("failed to parse block device '%1$s'"),
devstr);
return NULL;
}
if (!(disk = virDomainDiskByTarget(def, target))) {
virReportError(VIR_ERR_INVALID_ARG,
- _("failed to find disk '%s'"), target);
+ _("failed to find disk '%1$s'"), target);
return NULL;
}
@@ -10661,7 +10645,7 @@ qemuDomainGetStorageSourceByDevstr(const char *devstr,
}
virReportError(VIR_ERR_INVALID_ARG,
- _("failed to find disk '%s'"), devstr);
+ _("failed to find disk '%1$s'"), devstr);
return NULL;
}
@@ -10990,7 +10974,7 @@ qemuDomainPrepareStorageSourceFDs(virStorageSource *src,
if (!(fdt = virHashLookup(priv->fds, src->fdgroup))) {
virReportError(VIR_ERR_INVALID_ARG,
- _("file descriptor group '%s' was not associated with
the domain"),
+ _("file descriptor group '%1$s' was not associated
with the domain"),
src->fdgroup);
return -1;
}
@@ -11013,7 +10997,7 @@ qemuDomainPrepareStorageSourceFDs(virStorageSource *src,
if (tmpfd < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to duplicate file descriptor for fd group
'%s'"),
+ _("failed to duplicate file descriptor for fd group
'%1$s'"),
src->fdgroup);
return -1;
}
@@ -11521,21 +11505,21 @@ qemuDomainDiskBlockJobIsSupported(virDomainDiskDef *disk)
{
if (qemuDiskBusIsSD(disk->bus)) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("block jobs are not supported on disk '%s' using
bus 'sd'"),
+ _("block jobs are not supported on disk '%1$s' using
bus 'sd'"),
disk->dst);
return false;
}
if (disk->transient) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("block jobs are not supported on transient disk
'%s'"),
+ _("block jobs are not supported on transient disk
'%1$s'"),
disk->dst);
return false;
}
if (virStorageSourceGetActualType(disk->src) == VIR_STORAGE_TYPE_VHOST_USER) {
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
- _("block jobs are not supported on vhostuser disk
'%s'"),
+ _("block jobs are not supported on vhostuser disk
'%1$s'"),
disk->dst);
return false;
}
@@ -11615,10 +11599,8 @@ virQEMUFileOpenAs(uid_t fallback_uid,
case -1:
virReportSystemError(-fd, oflags & O_CREAT
- ? _("Failed to create file "
- "'%s': couldn't determine
fs type")
- : _("Failed to open file "
- "'%s': couldn't determine
fs type"),
+ ? _("Failed to create file '%1$s':
couldn't determine fs type")
+ : _("Failed to open file '%1$s':
couldn't determine fs type"),
path);
goto cleanup;
@@ -11647,8 +11629,8 @@ virQEMUFileOpenAs(uid_t fallback_uid,
fallback_uid, fallback_gid,
vfoflags | VIR_FILE_OPEN_FORK)) < 0) {
virReportSystemError(-fd, oflags & O_CREAT
- ? _("Error from child process creating
'%s'")
- : _("Error from child process opening
'%s'"),
+ ? _("Error from child process creating
'%1$s'")
+ : _("Error from child process opening
'%1$s'"),
path);
goto cleanup;
}
@@ -11661,8 +11643,8 @@ virQEMUFileOpenAs(uid_t fallback_uid,
error:
virReportSystemError(-fd, oflags & O_CREAT
- ? _("Failed to create file '%s'")
- : _("Failed to open file '%s'"),
+ ? _("Failed to create file '%1$s'")
+ : _("Failed to open file '%1$s'"),
path);
goto cleanup;
}
@@ -11790,14 +11772,14 @@ qemuDomainNamePathsCleanup(virQEMUDriverConfig *cfg,
if (virFileExists(cfg_file) &&
unlink(cfg_file) < 0) {
- virReportSystemError(errno, _("Failed to unlink '%s'"),
cfg_file);
+ virReportSystemError(errno, _("Failed to unlink '%1$s'"),
cfg_file);
if (!bestEffort)
return -1;
}
if (virFileIsLink(autostart_link) == 1 &&
unlink(autostart_link) < 0) {
- virReportSystemError(errno, _("Failed to unlink '%s'"),
autostart_link);
+ virReportSystemError(errno, _("Failed to unlink '%1$s'"),
autostart_link);
if (!bestEffort)
return -1;
}
--
2.39.2