Signed-off-by: Jiri Denemark <jdenemar(a)redhat.com>
---
src/lxc/lxc_cgroup.c | 2 +-
src/lxc/lxc_container.c | 114 +++++++++++++++++++--------------------
src/lxc/lxc_controller.c | 78 +++++++++++++--------------
src/lxc/lxc_domain.c | 8 +--
src/lxc/lxc_driver.c | 104 +++++++++++++++++------------------
src/lxc/lxc_fuse.c | 4 +-
src/lxc/lxc_hostdev.c | 6 +--
src/lxc/lxc_native.c | 26 ++++-----
src/lxc/lxc_process.c | 38 ++++++-------
9 files changed, 190 insertions(+), 190 deletions(-)
diff --git a/src/lxc/lxc_cgroup.c b/src/lxc/lxc_cgroup.c
index ee14570470..1b516bba73 100644
--- a/src/lxc/lxc_cgroup.c
+++ b/src/lxc/lxc_cgroup.c
@@ -382,7 +382,7 @@ virCgroup *virLXCCgroupCreate(virDomainDef *def,
if (!g_path_is_absolute(def->resource->partition)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Resource partition '%s' must start with
'/'"),
+ _("Resource partition '%1$s' must start with
'/'"),
def->resource->partition);
return NULL;
}
diff --git a/src/lxc/lxc_container.c b/src/lxc/lxc_container.c
index a5401c2186..63cf283285 100644
--- a/src/lxc/lxc_container.c
+++ b/src/lxc/lxc_container.c
@@ -126,7 +126,7 @@ int lxcContainerHasReboot(void)
if (virStrToLong_i(buf, NULL, 10, &v) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Malformed ctrl-alt-del setting '%s'"), buf);
+ _("Malformed ctrl-alt-del setting '%1$s'"),
buf);
return -1;
}
cmd = v ? LINUX_REBOOT_CMD_CAD_ON : LINUX_REBOOT_CMD_CAD_OFF;
@@ -178,7 +178,7 @@ static virCommand *lxcContainerBuildInitCmd(virDomainDef *vmDef,
for (i = 1; i < nttyPaths; i++) {
if (!STRPREFIX(ttyPaths[i], "/dev/")) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Expected a /dev path for '%s'"),
+ _("Expected a /dev path for '%1$s'"),
ttyPaths[i]);
return NULL;
}
@@ -292,7 +292,7 @@ static int lxcContainerSetupFDs(int *ttyfd,
if (newfd < 0) {
virReportSystemError(errno,
- _("Cannot move fd %d out of the
way"),
+ _("Cannot move fd %1$d out of the
way"),
passFDs[j]);
goto cleanup;
}
@@ -310,7 +310,7 @@ static int lxcContainerSetupFDs(int *ttyfd,
/* Finally we can move into our desired FD number */
if (dup2(passFDs[i], wantfd) < 0) {
virReportSystemError(errno,
- _("Cannot duplicate fd %d onto fd %d"),
+ _("Cannot duplicate fd %1$d onto fd %2$d"),
passFDs[i], wantfd);
goto cleanup;
}
@@ -532,7 +532,7 @@ static int lxcContainerUnmountSubtree(const char *prefix,
/* This detaches the subtree */
if (umount2(mounts[nmounts-1], MNT_DETACH) < 0) {
virReportSystemError(saveErrno,
- _("Failed to unmount '%s' and could not
detach subtree '%s'"),
+ _("Failed to unmount '%1$s' and could not
detach subtree '%2$s'"),
failedUmount, mounts[nmounts-1]);
return -1;
}
@@ -540,7 +540,7 @@ static int lxcContainerUnmountSubtree(const char *prefix,
if (isOldRootFS &&
umount(mounts[nmounts-1]) < 0) {
virReportSystemError(saveErrno,
- _("Failed to unmount '%s' and could not
unmount old root '%s'"),
+ _("Failed to unmount '%1$s' and could not
unmount old root '%2$s'"),
failedUmount, mounts[nmounts-1]);
return -1;
}
@@ -563,7 +563,7 @@ static int lxcContainerResolveSymlinks(virDomainFSDef *fs, bool
gentle)
return 0;
} else {
virReportSystemError(errno,
- _("Failed to access '%s'"),
fs->src->path);
+ _("Failed to access '%1$s'"),
fs->src->path);
return -1;
}
}
@@ -575,7 +575,7 @@ static int lxcContainerResolveSymlinks(virDomainFSDef *fs, bool
gentle)
return 0;
} else {
virReportSystemError(errno,
- _("Failed to resolve symlink at %s"),
+ _("Failed to resolve symlink at %1$s"),
fs->src->path);
}
return -1;
@@ -612,7 +612,7 @@ static int lxcContainerPrepareRoot(virDomainDef *def,
if (root->type != VIR_DOMAIN_FS_TYPE_BLOCK) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported root filesystem type %s"),
+ _("Unsupported root filesystem type %1$s"),
virDomainFSTypeToString(root->type));
return -1;
}
@@ -656,7 +656,7 @@ static int lxcContainerPivotRoot(virDomainFSDef *root)
if (g_mkdir_with_parents(oldroot, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to create %s"),
+ _("Failed to create %1$s"),
oldroot);
return -1;
}
@@ -665,7 +665,7 @@ static int lxcContainerPivotRoot(virDomainFSDef *root)
* on separate filesystems */
if (mount("tmprootfs", oldroot, "tmpfs", 0, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to mount empty tmpfs at %s"),
+ _("Failed to mount empty tmpfs at %1$s"),
oldroot);
return -1;
}
@@ -675,7 +675,7 @@ static int lxcContainerPivotRoot(virDomainFSDef *root)
if (g_mkdir_with_parents(newroot, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to create %s"),
+ _("Failed to create %1$s"),
newroot);
return -1;
}
@@ -683,7 +683,7 @@ static int lxcContainerPivotRoot(virDomainFSDef *root)
/* ... and mount our root onto it */
if (mount(root->src->path, newroot, "none", MS_BIND|MS_REC, NULL)
< 0) {
virReportSystemError(errno,
- _("Failed to bind %s to new root %s"),
+ _("Failed to bind %1$s to new root %2$s"),
root->src->path, newroot);
return -1;
}
@@ -691,7 +691,7 @@ static int lxcContainerPivotRoot(virDomainFSDef *root)
if (root->readonly) {
if (mount(root->src->path, newroot, "none",
MS_BIND|MS_REC|MS_RDONLY|MS_REMOUNT, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to make new root %s readonly"),
+ _("Failed to make new root %1$s readonly"),
root->src->path);
return -1;
}
@@ -701,7 +701,7 @@ static int lxcContainerPivotRoot(virDomainFSDef *root)
* root->src bind-mounted onto '/new' */
if (chdir(newroot) < 0) {
virReportSystemError(errno,
- _("Failed to chdir into %s"), newroot);
+ _("Failed to chdir into %1$s"), newroot);
return -1;
}
@@ -800,7 +800,7 @@ static int lxcContainerSetReadOnly(void)
VIR_DEBUG("Bind readonly %s", mounts[i]);
if (mount(mounts[i], mounts[i], "none",
MS_BIND|MS_REC|MS_RDONLY|MS_REMOUNT, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to make mount %s readonly"),
+ _("Failed to make mount %1$s readonly"),
mounts[i]);
return -1;
}
@@ -874,7 +874,7 @@ static int lxcContainerMountBasicFS(bool userns_enabled,
if (g_mkdir_with_parents(mnt->dst, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to mkdir %s"),
+ _("Failed to mkdir %1$s"),
mnt->dst);
return -1;
}
@@ -892,7 +892,7 @@ static int lxcContainerMountBasicFS(bool userns_enabled,
mnt_src, mnt->dst, mnt->type, mnt_mflags & ~MS_RDONLY);
if (mount(mnt_src, mnt->dst, mnt->type, mnt_mflags & ~MS_RDONLY, NULL)
< 0) {
virReportSystemError(errno,
- _("Failed to mount %s on %s type %s
flags=0x%x"),
+ _("Failed to mount %1$s on %2$s type %3$s
flags=0x%4$x"),
mnt_src, mnt->dst, NULLSTR(mnt->type),
mnt_mflags & ~MS_RDONLY);
return -1;
@@ -902,7 +902,7 @@ static int lxcContainerMountBasicFS(bool userns_enabled,
mount(mnt_src, mnt->dst, "none",
MS_BIND|MS_REMOUNT|mnt_mflags|MS_RDONLY, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to re-mount %s on %s flags=0x%x"),
+ _("Failed to re-mount %1$s on %2$s
flags=0x%3$x"),
mnt_src, mnt->dst,
MS_BIND|MS_REMOUNT|MS_RDONLY);
return -1;
@@ -927,7 +927,7 @@ static int lxcContainerMountProcFuse(virDomainDef *def,
if (mount(meminfo_path, "/proc/meminfo",
NULL, MS_BIND, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to mount %s on /proc/meminfo"),
+ _("Failed to mount %1$s on /proc/meminfo"),
meminfo_path);
return -1;
}
@@ -963,7 +963,7 @@ static int lxcContainerMountFSDev(virDomainDef *def,
if (mount(path, "/dev", "none", flags, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to mount %s on /dev"),
+ _("Failed to mount %1$s on /dev"),
path);
return -1;
}
@@ -992,7 +992,7 @@ static int lxcContainerMountFSDevPTS(virDomainDef *def,
if (mount(path, "/dev/pts", "none", flags, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to mount %s on /dev/pts"),
+ _("Failed to mount %1$s on /dev/pts"),
path);
return -1;
}
@@ -1016,7 +1016,7 @@ static int lxcContainerSetupDevices(char **ttyPaths, size_t
nttyPaths)
for (i = 0; i < G_N_ELEMENTS(links); i++) {
if (symlink(links[i].src, links[i].dst) < 0) {
virReportSystemError(errno,
- _("Failed to symlink device %s to %s"),
+ _("Failed to symlink device %1$s to %2$s"),
links[i].dst, links[i].src);
return -1;
}
@@ -1052,20 +1052,20 @@ static int lxcContainerMountFSBind(virDomainFSDef *fs,
if (stat(fs->dst, &st) < 0) {
if (errno != ENOENT) {
- virReportSystemError(errno, _("Unable to stat bind target %s"),
+ virReportSystemError(errno, _("Unable to stat bind target %1$s"),
fs->dst);
return -1;
}
/* ENOENT => create the target dir or file */
if (stat(src, &st) < 0) {
- virReportSystemError(errno, _("Unable to stat bind source %s"),
+ virReportSystemError(errno, _("Unable to stat bind source %1$s"),
src);
return -1;
}
if (S_ISDIR(st.st_mode)) {
if (g_mkdir_with_parents(fs->dst, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to create %s"),
+ _("Failed to create %1$s"),
fs->dst);
return -1;
}
@@ -1075,14 +1075,14 @@ static int lxcContainerMountFSBind(virDomainFSDef *fs,
if (fd < 0) {
if (errno != EEXIST) {
virReportSystemError(errno,
- _("Failed to create bind target %s"),
+ _("Failed to create bind target
%1$s"),
fs->dst);
return -1;
}
}
if (VIR_CLOSE(fd) < 0) {
virReportSystemError(errno,
- _("Failed to close bind target %s"),
+ _("Failed to close bind target %1$s"),
fs->dst);
return -1;
}
@@ -1091,7 +1091,7 @@ static int lxcContainerMountFSBind(virDomainFSDef *fs,
if (mount(src, fs->dst, "none", MS_BIND, NULL) < 0) {
virReportSystemError(errno,
- _("Failed to bind mount directory %s to %s"),
+ _("Failed to bind mount directory %1$s to %2$s"),
src, fs->dst);
return -1;
}
@@ -1100,7 +1100,7 @@ static int lxcContainerMountFSBind(virDomainFSDef *fs,
VIR_DEBUG("Binding %s readonly", fs->dst);
if (mount(src, fs->dst, "none", MS_BIND|MS_REMOUNT|MS_RDONLY, NULL)
< 0) {
virReportSystemError(errno,
- _("Failed to make directory %s readonly"),
+ _("Failed to make directory %1$s readonly"),
fs->dst);
}
}
@@ -1123,7 +1123,7 @@ lxcContainerMountDetectFilesystem(const char *src, char **type)
if ((fd = open(src, O_RDONLY)) < 0) {
virReportSystemError(errno,
- _("Unable to open filesystem %s"), src);
+ _("Unable to open filesystem %1$s"), src);
return -1;
}
@@ -1134,7 +1134,7 @@ lxcContainerMountDetectFilesystem(const char *src, char **type)
}
if (blkid_probe_set_device(blkid, fd, 0, 0) < 0) {
virReportSystemError(EINVAL,
- _("Unable to associate device %s with blkid
library"),
+ _("Unable to associate device %1$s with blkid
library"),
src);
goto cleanup;
}
@@ -1150,11 +1150,11 @@ lxcContainerMountDetectFilesystem(const char *src, char **type)
if (rc == -2) {
virReportSystemError(EINVAL,
- _("Too many filesystems detected for %s"),
+ _("Too many filesystems detected for %1$s"),
src);
} else {
virReportSystemError(errno,
- _("Unable to detect filesystem for %s"),
+ _("Unable to detect filesystem for %1$s"),
src);
}
goto cleanup;
@@ -1162,7 +1162,7 @@ lxcContainerMountDetectFilesystem(const char *src, char **type)
if (blkid_probe_lookup_value(blkid, "TYPE", &data, NULL) < 0) {
virReportSystemError(ENOENT,
- _("Unable to find filesystem type for %s"),
+ _("Unable to find filesystem type for %1$s"),
src);
goto cleanup;
}
@@ -1229,7 +1229,7 @@ static int lxcContainerMountFSBlockAuto(virDomainFSDef *fs,
}
virReportSystemError(errno,
- _("Unable to read %s"),
+ _("Unable to read %1$s"),
fslist);
goto cleanup;
}
@@ -1259,7 +1259,7 @@ static int lxcContainerMountFSBlockAuto(virDomainFSDef *fs,
*/
if (gotStar && !tryProc) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("%s has unexpected '*' before last
line"),
+ _("%1$s has unexpected '*' before last
line"),
fslist);
goto cleanup;
}
@@ -1283,7 +1283,7 @@ static int lxcContainerMountFSBlockAuto(virDomainFSDef *fs,
continue;
virReportSystemError(errno,
- _("Failed to mount device %s to %s"),
+ _("Failed to mount device %1$s to %2$s"),
src, fs->dst);
goto cleanup;
}
@@ -1305,7 +1305,7 @@ static int lxcContainerMountFSBlockAuto(virDomainFSDef *fs,
if (ret != 0) {
virReportSystemError(ENODEV,
- _("Failed to mount device %s to %s, unable to detect
filesystem"),
+ _("Failed to mount device %1$s to %2$s, unable to
detect filesystem"),
src, fs->dst);
}
@@ -1334,7 +1334,7 @@ static int lxcContainerMountFSBlockHelper(virDomainFSDef *fs,
if (g_mkdir_with_parents(fs->dst, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to create %s"),
+ _("Failed to create %1$s"),
fs->dst);
return -1;
}
@@ -1347,7 +1347,7 @@ static int lxcContainerMountFSBlockHelper(virDomainFSDef *fs,
src, fs->dst, format, sec_mount_options);
if (mount(src, fs->dst, format, fsflags, sec_mount_options) < 0) {
virReportSystemError(errno,
- _("Failed to mount device %s to %s as %s"),
+ _("Failed to mount device %1$s to %2$s as
%3$s"),
src, fs->dst, format);
return -1;
}
@@ -1388,14 +1388,14 @@ static int lxcContainerMountFSTmpfs(virDomainFSDef *fs,
if (g_mkdir_with_parents(fs->dst, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to create %s"),
+ _("Failed to create %1$s"),
fs->dst);
return -1;
}
if (mount("tmpfs", fs->dst, "tmpfs", MS_NOSUID|MS_NODEV, data)
< 0) {
virReportSystemError(errno,
- _("Failed to mount directory %s as tmpfs"),
+ _("Failed to mount directory %1$s as tmpfs"),
fs->dst);
return -1;
}
@@ -1404,7 +1404,7 @@ static int lxcContainerMountFSTmpfs(virDomainFSDef *fs,
VIR_DEBUG("Binding %s readonly", fs->dst);
if (mount(fs->dst, fs->dst, "none", MS_BIND|MS_REMOUNT|MS_RDONLY,
NULL) < 0) {
virReportSystemError(errno,
- _("Failed to make directory %s readonly"),
+ _("Failed to make directory %1$s readonly"),
fs->dst);
return -1;
}
@@ -1439,7 +1439,7 @@ static int lxcContainerMountFS(virDomainFSDef *fs,
* should have associated the file with a loopback
* device and changed this to TYPE_BLOCK for us */
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unexpected filesystem type %s"),
+ _("Unexpected filesystem type %1$s"),
virDomainFSTypeToString(fs->type));
return -1;
case VIR_DOMAIN_FS_TYPE_TEMPLATE:
@@ -1447,7 +1447,7 @@ static int lxcContainerMountFS(virDomainFSDef *fs,
case VIR_DOMAIN_FS_TYPE_LAST:
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Cannot mount filesystem type %s"),
+ _("Cannot mount filesystem type %1$s"),
virDomainFSTypeToString(fs->type));
return -1;
}
@@ -1496,7 +1496,7 @@ int lxcContainerSetupHostdevCapsMakePath(const char *dev)
*tmp = '\0';
if (g_mkdir_with_parents(dir, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to create directory for '%s' dev
'%s'"),
+ _("Failed to create directory for '%1$s'
dev '%2$s'"),
dir, dev);
return -1;
}
@@ -1747,7 +1747,7 @@ static int lxcContainerDropCapabilities(virDomainDef *def,
CAPNG_INHERITABLE | CAPNG_BOUNDING_SET,
capsMapping[i])) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Failed to add capability %s: %d"),
+ _("Failed to add capability %1$s: %2$d"),
virDomainProcessCapsFeatureTypeToString(i), ret);
return -1;
}
@@ -1779,7 +1779,7 @@ static int lxcContainerDropCapabilities(virDomainDef *def,
CAPNG_INHERITABLE | CAPNG_BOUNDING_SET,
capsMapping[i])) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Failed to remove capability %s: %d"),
+ _("Failed to remove capability %1$s: %2$d"),
virDomainProcessCapsFeatureTypeToString(i), ret);
return -1;
}
@@ -1794,7 +1794,7 @@ static int lxcContainerDropCapabilities(virDomainDef *def,
if ((ret = capng_apply(CAPNG_SELECT_BOTH)) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Failed to apply capabilities: %d"), ret);
+ _("Failed to apply capabilities: %1$d"), ret);
return -1;
}
@@ -1850,7 +1850,7 @@ static int lxcContainerSetUserGroup(virCommand *cmd,
if (vmDef->os.inituser) {
if (virGetUserID(vmDef->os.inituser, &uid) < 0) {
- virReportError(VIR_ERR_INTERNAL_ERROR, _("User %s doesn't
exist"),
+ virReportError(VIR_ERR_INTERNAL_ERROR, _("User %1$s doesn't
exist"),
vmDef->os.inituser);
return -1;
}
@@ -1860,7 +1860,7 @@ static int lxcContainerSetUserGroup(virCommand *cmd,
* shells to have job control. */
if (chown(ttyPath, uid, -1) < 0) {
virReportSystemError(errno,
- _("Failed to change ownership of tty %s"),
+ _("Failed to change ownership of tty %1$s"),
ttyPath);
return -1;
}
@@ -1868,7 +1868,7 @@ static int lxcContainerSetUserGroup(virCommand *cmd,
if (vmDef->os.initgroup) {
if (virGetGroupID(vmDef->os.initgroup, &gid) < 0) {
- virReportError(VIR_ERR_INTERNAL_ERROR, _("Group %s doesn't
exist"),
+ virReportError(VIR_ERR_INTERNAL_ERROR, _("Group %1$s doesn't
exist"),
vmDef->os.initgroup);
return -1;
}
@@ -1982,7 +1982,7 @@ static int lxcContainerChild(void *data)
ttyfd = open(ttyPath, O_RDWR);
if (ttyfd < 0) {
virReportSystemError(errno,
- _("Failed to open tty %s"),
+ _("Failed to open tty %1$s"),
ttyPath);
goto cleanup;
}
@@ -1998,7 +1998,7 @@ static int lxcContainerChild(void *data)
if (!virFileExists(vmDef->os.init)) {
virReportSystemError(errno,
- _("cannot find init path '%s' relative to
container root"),
+ _("cannot find init path '%1$s' relative to
container root"),
vmDef->os.init);
goto cleanup;
}
@@ -2069,7 +2069,7 @@ static int lxcContainerChild(void *data)
if (ret != 0) {
VIR_DEBUG("Tearing down container");
fprintf(stderr,
- _("Failure in libvirt_lxc startup: %s\n"),
+ _("Failure in libvirt_lxc startup: %1$s\n"),
virGetLastErrorMessage());
}
@@ -2218,7 +2218,7 @@ int lxcContainerChown(virDomainDef *def, const char *path)
if (chown(path, uid, gid) < 0) {
virReportSystemError(errno,
- _("Failed to change owner of %s to %u:%u"),
+ _("Failed to change owner of %1$s to %2$u:%3$u"),
path, uid, gid);
return -1;
}
diff --git a/src/lxc/lxc_controller.c b/src/lxc/lxc_controller.c
index 9be79fa356..60b961dcb5 100644
--- a/src/lxc/lxc_controller.c
+++ b/src/lxc/lxc_controller.c
@@ -367,7 +367,7 @@ static int virLXCControllerValidateNICs(virLXCController *ctrl)
{
if (ctrl->def->nnets != ctrl->nveths) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("expecting %zu veths, but got %zu"),
+ _("expecting %1$zu veths, but got %2$zu"),
ctrl->def->nnets, ctrl->nveths);
return -1;
}
@@ -425,7 +425,7 @@ static int virLXCControllerGetNICIndexes(virLXCController *ctrl)
case VIR_DOMAIN_NET_TYPE_NULL:
case VIR_DOMAIN_NET_TYPE_VDS:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported net type %s"),
+ _("Unsupported net type %1$s"),
virDomainNetTypeToString(actualType));
return -1;
case VIR_DOMAIN_NET_TYPE_LAST:
@@ -443,7 +443,7 @@ static int virLXCControllerValidateConsoles(virLXCController *ctrl)
{
if (ctrl->def->nconsoles != ctrl->nconsoles) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("expecting %zu consoles, but got %zu tty file
handlers"),
+ _("expecting %1$zu consoles, but got %2$zu tty file
handlers"),
ctrl->def->nconsoles, ctrl->nconsoles);
return -1;
}
@@ -581,7 +581,7 @@ static int virLXCControllerAppendNBDPids(virLXCController *ctrl,
loops++;
} else {
virReportSystemError(errno,
- _("Cannot check NBD device %s pid"),
+ _("Cannot check NBD device %1$s pid"),
dev + 5);
return -1;
}
@@ -625,7 +625,7 @@ static int virLXCControllerSetupLoopDevices(virLXCController *ctrl)
if (fs->format != VIR_STORAGE_FILE_RAW &&
fs->format != VIR_STORAGE_FILE_NONE) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("fs format %s is not supported"),
+ _("fs format %1$s is not supported"),
virStorageFileFormatTypeToString(fs->format));
return -1;
}
@@ -648,7 +648,7 @@ static int virLXCControllerSetupLoopDevices(virLXCController *ctrl)
return -1;
} else {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("fs driver %s is not supported"),
+ _("fs driver %1$s is not supported"),
virDomainFSDriverTypeToString(fs->fsdriver));
return -1;
}
@@ -676,7 +676,7 @@ static int virLXCControllerSetupLoopDevices(virLXCController *ctrl)
if (format != VIR_STORAGE_FILE_RAW &&
format != VIR_STORAGE_FILE_NONE) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("disk format %s is not supported"),
+ _("disk format %1$s is not supported"),
virStorageFileFormatTypeToString(format));
return -1;
}
@@ -696,7 +696,7 @@ static int virLXCControllerSetupLoopDevices(virLXCController *ctrl)
if (disk->cachemode != VIR_DOMAIN_DISK_CACHE_DEFAULT &&
disk->cachemode != VIR_DOMAIN_DISK_CACHE_DISABLE) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Disk cache mode %s is not supported"),
+ _("Disk cache mode %1$s is not supported"),
virDomainDiskCacheTypeToString(disk->cachemode));
return -1;
}
@@ -710,7 +710,7 @@ static int virLXCControllerSetupLoopDevices(virLXCController *ctrl)
return -1;
} else {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("disk driver %s is not supported"),
+ _("disk driver %1$s is not supported"),
driver);
return -1;
}
@@ -981,7 +981,7 @@ static int lxcControllerClearCapabilities(void)
if ((ret = capng_apply(CAPNG_SELECT_BOTH)) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to apply capabilities: %d"), ret);
+ _("failed to apply capabilities: %1$d"), ret);
return -1;
}
#else
@@ -1366,7 +1366,7 @@ virLXCControllerSetupUsernsMap(virDomainIdMapEntry *map,
VIR_DEBUG("Set '%s' to '%s'", path,
virBufferCurrentContent(&map_value));
if (virFileWriteStr(path, virBufferCurrentContent(&map_value), 0) < 0) {
- virReportSystemError(errno, _("unable write to %s"), path);
+ virReportSystemError(errno, _("unable write to %1$s"), path);
return -1;
}
@@ -1470,7 +1470,7 @@ static int virLXCControllerPopulateDevices(virLXCController *ctrl)
if (mknod(path, S_IFCHR, dev) < 0 ||
chmod(path, devs[i].mode)) {
virReportSystemError(errno,
- _("Failed to make device %s"),
+ _("Failed to make device %1$s"),
path);
return -1;
}
@@ -1513,7 +1513,7 @@ virLXCControllerSetupTimers(virLXCController *ctrl)
case VIR_DOMAIN_TIMER_NAME_ARMVTIMER:
case VIR_DOMAIN_TIMER_NAME_LAST:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("unsupported timer type (name) '%s'"),
+ _("unsupported timer type (name) '%1$s'"),
virDomainTimerNameTypeToString(timer->name));
return -1;
case VIR_DOMAIN_TIMER_NAME_RTC:
@@ -1532,7 +1532,7 @@ virLXCControllerSetupTimers(virLXCController *ctrl)
continue;
if (stat(timer_dev, &sb) < 0) {
- virReportSystemError(errno, _("Unable to access %s"),
+ virReportSystemError(errno, _("Unable to access %1$s"),
timer_dev);
return -1;
}
@@ -1541,7 +1541,7 @@ virLXCControllerSetupTimers(virLXCController *ctrl)
if (mknod(path, S_IFCHR, dev) < 0 ||
chmod(path, sb.st_mode)) {
virReportSystemError(errno,
- _("Failed to make device %s"),
+ _("Failed to make device %1$s"),
path);
return -1;
}
@@ -1577,13 +1577,13 @@ virLXCControllerSetupHostdevSubsysUSB(virDomainDef *vmDef,
if (stat(src, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"), src);
+ _("Unable to access %1$s"), src);
return -1;
}
if (!S_ISCHR(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("USB source %s was not a character device"),
+ _("USB source %1$s was not a character device"),
src);
return -1;
}
@@ -1592,7 +1592,7 @@ virLXCControllerSetupHostdevSubsysUSB(virDomainDef *vmDef,
if (g_mkdir_with_parents(dstdir, 0777) < 0) {
virReportSystemError(errno,
- _("Unable to create %s"), dstdir);
+ _("Unable to create %1$s"), dstdir);
return -1;
}
@@ -1600,7 +1600,7 @@ virLXCControllerSetupHostdevSubsysUSB(virDomainDef *vmDef,
dstfile, major(sb.st_rdev), minor(sb.st_rdev));
if (mknod(dstfile, mode, sb.st_rdev) < 0) {
virReportSystemError(errno,
- _("Unable to create device %s"),
+ _("Unable to create device %1$s"),
dstfile);
return -1;
}
@@ -1645,21 +1645,21 @@ virLXCControllerSetupHostdevCapsStorage(virDomainDef *vmDef,
if (stat(dev, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"),
+ _("Unable to access %1$s"),
dev);
goto cleanup;
}
if (!S_ISBLK(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Storage source %s must be a block device"),
+ _("Storage source %1$s must be a block device"),
dev);
goto cleanup;
}
if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
virReportError(errno,
- _("Failed to create directory for device %s"),
+ _("Failed to create directory for device %1$s"),
dev);
goto cleanup;
}
@@ -1670,7 +1670,7 @@ virLXCControllerSetupHostdevCapsStorage(virDomainDef *vmDef,
major(sb.st_rdev), minor(sb.st_rdev));
if (mknod(dst, mode, sb.st_rdev) < 0) {
virReportSystemError(errno,
- _("Unable to create device %s"),
+ _("Unable to create device %1$s"),
dst);
goto cleanup;
}
@@ -1719,21 +1719,21 @@ virLXCControllerSetupHostdevCapsMisc(virDomainDef *vmDef,
if (stat(dev, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"),
+ _("Unable to access %1$s"),
dev);
goto cleanup;
}
if (!S_ISCHR(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Storage source %s must be a character device"),
+ _("Storage source %1$s must be a character device"),
dev);
goto cleanup;
}
if (lxcContainerSetupHostdevCapsMakePath(dst) < 0) {
virReportError(errno,
- _("Failed to create directory for device %s"),
+ _("Failed to create directory for device %1$s"),
dst);
goto cleanup;
}
@@ -1744,7 +1744,7 @@ virLXCControllerSetupHostdevCapsMisc(virDomainDef *vmDef,
major(sb.st_rdev), minor(sb.st_rdev));
if (mknod(dst, mode, sb.st_rdev) < 0) {
virReportSystemError(errno,
- _("Unable to create device %s"),
+ _("Unable to create device %1$s"),
dev);
goto cleanup;
}
@@ -1776,7 +1776,7 @@ virLXCControllerSetupHostdevSubsys(virDomainDef *vmDef,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device mode %s"),
+ _("Unsupported host device mode %1$s"),
virDomainHostdevSubsysTypeToString(def->source.subsys.type));
return -1;
}
@@ -1804,7 +1804,7 @@ virLXCControllerSetupHostdevCaps(virDomainDef *vmDef,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device mode %s"),
+ _("Unsupported host device mode %1$s"),
virDomainHostdevCapsTypeToString(def->source.subsys.type));
return -1;
}
@@ -1836,7 +1836,7 @@ virLXCControllerSetupAllHostdevs(virLXCController *ctrl)
break;
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device mode %s"),
+ _("Unsupported host device mode %1$s"),
virDomainHostdevModeTypeToString(def->mode));
return -1;
}
@@ -1873,13 +1873,13 @@ static int virLXCControllerSetupDisk(virLXCController *ctrl,
if (stat(def->src->path, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"), tmpsrc);
+ _("Unable to access %1$s"), tmpsrc);
goto cleanup;
}
if (!S_ISCHR(sb.st_mode) && !S_ISBLK(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Disk source %s must be a character/block device"),
+ _("Disk source %1$s must be a character/block device"),
tmpsrc);
goto cleanup;
}
@@ -1901,7 +1901,7 @@ static int virLXCControllerSetupDisk(virLXCController *ctrl,
dst, major(sb.st_rdev), minor(sb.st_rdev), tmpsrc);
if (mknod(dst, mode, sb.st_rdev) < 0) {
virReportSystemError(errno,
- _("Unable to create device %s"),
+ _("Unable to create device %1$s"),
dst);
goto cleanup;
}
@@ -2013,7 +2013,7 @@ static int lxcSetPersonality(virDomainDef *def)
VIR_DEBUG("Setting personality to %s",
virArchToString(altArch));
if (personality(PER_LINUX32) < 0) {
- virReportSystemError(errno, _("Unable to request personality for %s on
%s"),
+ virReportSystemError(errno, _("Unable to request personality for %1$s on
%2$s"),
virArchToString(altArch),
virArchToString(virArchFromHost()));
return -1;
@@ -2111,7 +2111,7 @@ virLXCControllerSetupDevPTS(virLXCController *ctrl)
if (g_mkdir_with_parents(devpts, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to make path %s"),
+ _("Failed to make path %1$s"),
devpts);
return -1;
}
@@ -2130,7 +2130,7 @@ virLXCControllerSetupDevPTS(virLXCController *ctrl)
devpts, MS_NOSUID, opts);
if (mount("devpts", devpts, "devpts", MS_NOSUID, opts) < 0) {
virReportSystemError(errno,
- _("Failed to mount devpts on %s"),
+ _("Failed to mount devpts on %1$s"),
devpts);
return -1;
}
@@ -2488,7 +2488,7 @@ int main(int argc, char *argv[])
if (virGettextInitialize() < 0 ||
virErrorInitialize() < 0) {
- fprintf(stderr, _("%s: initialization failed\n"), argv[0]);
+ fprintf(stderr, _("%1$s: initialization failed\n"), argv[0]);
exit(EXIT_FAILURE);
}
@@ -2673,7 +2673,7 @@ int main(int argc, char *argv[])
if (pid > 0) {
if ((rc = virPidFileWrite(LXC_STATE_DIR, name, pid)) < 0) {
virReportSystemError(-rc,
- _("Unable to write pid file
'%s/%s.pid'"),
+ _("Unable to write pid file
'%1$s/%2$s.pid'"),
LXC_STATE_DIR, name);
_exit(1);
}
@@ -2703,7 +2703,7 @@ int main(int argc, char *argv[])
cleanup:
if (rc < 0) {
fprintf(stderr,
- _("Failure in libvirt_lxc startup: %s\n"),
+ _("Failure in libvirt_lxc startup: %1$s\n"),
virGetLastErrorMessage());
}
diff --git a/src/lxc/lxc_domain.c b/src/lxc/lxc_domain.c
index 1a39129f82..e8c87423bf 100644
--- a/src/lxc/lxc_domain.c
+++ b/src/lxc/lxc_domain.c
@@ -112,7 +112,7 @@ lxcDomainDefNamespaceParse(xmlXPathContextPtr ctxt,
if ((feature = virLXCDomainNamespaceTypeFromString(
(const char *)nodes[i]->name)) < 0) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("unsupported Namespace feature: %s"),
+ _("unsupported Namespace feature: %1$s"),
nodes[i]->name);
goto cleanup;
}
@@ -127,7 +127,7 @@ lxcDomainDefNamespaceParse(xmlXPathContextPtr ctxt,
if ((lxcDef->ns_source[feature] =
virLXCDomainNamespaceSourceTypeFromString(tmp)) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unknown LXC namespace source '%s'"),
+ _("Unknown LXC namespace source '%1$s'"),
tmp);
goto cleanup;
}
@@ -313,7 +313,7 @@ lxcDomainInitctlCallback(pid_t pid G_GNUC_UNUSED,
if (errno == ENOENT)
continue;
- virReportSystemError(errno, _("Unable to stat %s"), fifo);
+ virReportSystemError(errno, _("Unable to stat %1$s"), fifo);
return -1;
}
@@ -361,7 +361,7 @@ virLXCDomainSetRunlevel(virDomainObj *vm,
if (errno == ENOENT)
continue;
- virReportSystemError(errno, _("Unable to stat %s"), fifo);
+ virReportSystemError(errno, _("Unable to stat %1$s"), fifo);
goto cleanup;
}
diff --git a/src/lxc/lxc_driver.c b/src/lxc/lxc_driver.c
index b1d53659d7..075b5eec94 100644
--- a/src/lxc/lxc_driver.c
+++ b/src/lxc/lxc_driver.c
@@ -104,7 +104,7 @@ lxcDomObjFromDomain(virDomainPtr domain)
if (!vm) {
virUUIDFormat(domain->uuid, uuidstr);
virReportError(VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s' (%s)"),
+ _("no domain with matching uuid '%1$s'
(%2$s)"),
uuidstr, domain->name);
return NULL;
}
@@ -137,7 +137,7 @@ static virDrvOpenStatus lxcConnectOpen(virConnectPtr conn,
STRNEQ(conn->uri->path, "/") &&
STRNEQ(conn->uri->path, "/system")) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unexpected LXC URI path '%s', try
lxc:///system"),
+ _("Unexpected LXC URI path '%1$s', try
lxc:///system"),
conn->uri->path);
return VIR_DRV_OPEN_ERROR;
}
@@ -216,7 +216,7 @@ static virDomainPtr lxcDomainLookupByID(virConnectPtr conn,
if (!vm) {
virReportError(VIR_ERR_NO_DOMAIN,
- _("No domain with matching id %d"), id);
+ _("No domain with matching id %1$d"), id);
goto cleanup;
}
@@ -243,7 +243,7 @@ static virDomainPtr lxcDomainLookupByUUID(virConnectPtr conn,
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(uuid, uuidstr);
virReportError(VIR_ERR_NO_DOMAIN,
- _("No domain with matching uuid '%s'"),
uuidstr);
+ _("No domain with matching uuid '%1$s'"),
uuidstr);
goto cleanup;
}
@@ -267,7 +267,7 @@ static virDomainPtr lxcDomainLookupByName(virConnectPtr conn,
vm = virDomainObjListFindByName(driver->domains, name);
if (!vm) {
virReportError(VIR_ERR_NO_DOMAIN,
- _("No domain with matching name '%s'"), name);
+ _("No domain with matching name '%1$s'"),
name);
goto cleanup;
}
@@ -932,7 +932,7 @@ static char *lxcConnectDomainXMLFromNative(virConnectPtr conn,
if (STRNEQ(nativeFormat, LXC_CONFIG_FORMAT)) {
virReportError(VIR_ERR_INVALID_ARG,
- _("unsupported config type %s"), nativeFormat);
+ _("unsupported config type %1$s"), nativeFormat);
return NULL;
}
@@ -1223,7 +1223,7 @@ static int lxcNodeGetSecurityModel(virConnectPtr conn,
if (virStrcpy(secmodel->model, caps->host.secModels[0].model,
VIR_SECURITY_MODEL_BUFLEN) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("security model string exceeds max %d bytes"),
+ _("security model string exceeds max %1$d bytes"),
VIR_SECURITY_MODEL_BUFLEN - 1);
return -1;
}
@@ -1231,7 +1231,7 @@ static int lxcNodeGetSecurityModel(virConnectPtr conn,
if (virStrcpy(secmodel->doi, caps->host.secModels[0].doi,
VIR_SECURITY_DOI_BUFLEN) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("security DOI string exceeds max %d bytes"),
+ _("security DOI string exceeds max %1$d bytes"),
VIR_SECURITY_DOI_BUFLEN-1);
return -1;
}
@@ -1499,7 +1499,7 @@ static int lxcStateInitialize(bool privileged,
if (g_mkdir_with_parents(cfg->stateDir, 0777) < 0) {
virReportSystemError(errno,
- _("Failed to mkdir %s"),
+ _("Failed to mkdir %1$s"),
cfg->stateDir);
goto cleanup;
}
@@ -1621,7 +1621,7 @@ lxcConnectSupportsFeature(virConnectPtr conn, int feature)
case VIR_DRV_FEATURE_NETWORK_UPDATE_HAS_CORRECT_ORDER:
case VIR_DRV_FEATURE_FD_PASSING:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Global feature %d should have already been
handled"),
+ _("Global feature %1$d should have already been
handled"),
feature);
return -1;
case VIR_DRV_FEATURE_MIGRATE_CHANGE_PROTECTION:
@@ -1649,7 +1649,7 @@ static int lxcConnectGetVersion(virConnectPtr conn, unsigned long
*version)
return -1;
if (virStringParseVersion(version, ver.release, true) < 0) {
- virReportError(VIR_ERR_INTERNAL_ERROR, _("Unknown release: %s"),
ver.release);
+ virReportError(VIR_ERR_INTERNAL_ERROR, _("Unknown release: %1$s"),
ver.release);
return -1;
}
@@ -1688,7 +1688,7 @@ lxcDomainInterfaceAddresses(virDomainPtr dom,
default:
virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
- _("Unknown IP address data source %d"),
+ _("Unknown IP address data source %1$d"),
source);
break;
}
@@ -2051,13 +2051,13 @@ lxcDomainBlockStats(virDomainPtr dom,
if (!(disk = virDomainDiskByName(vm->def, path, false))) {
virReportError(VIR_ERR_INVALID_ARG,
- _("invalid path: %s"), path);
+ _("invalid path: %1$s"), path);
goto endjob;
}
if (!disk->info.alias) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("missing disk device alias name for %s"),
disk->dst);
+ _("missing disk device alias name for %1$s"),
disk->dst);
goto endjob;
}
@@ -2135,13 +2135,13 @@ lxcDomainBlockStatsFlags(virDomainPtr dom,
} else {
if (!(disk = virDomainDiskByName(vm->def, path, false))) {
virReportError(VIR_ERR_INVALID_ARG,
- _("invalid path: %s"), path);
+ _("invalid path: %1$s"), path);
goto endjob;
}
if (!disk->info.alias) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("missing disk device alias name for %s"),
disk->dst);
+ _("missing disk device alias name for %1$s"),
disk->dst);
goto endjob;
}
@@ -2474,21 +2474,21 @@ static int lxcDomainSetAutostart(virDomainPtr dom,
if (autostart) {
if (g_mkdir_with_parents(cfg->autostartDir, 0777) < 0) {
virReportSystemError(errno,
- _("Cannot create autostart directory %s"),
+ _("Cannot create autostart directory %1$s"),
cfg->autostartDir);
goto endjob;
}
if (symlink(configFile, autostartLink) < 0) {
virReportSystemError(errno,
- _("Failed to create symlink '%s to
'%s'"),
+ _("Failed to create symlink '%1$s to
'%2$s'"),
autostartLink, configFile);
goto endjob;
}
} else {
if (unlink(autostartLink) < 0 && errno != ENOENT && errno !=
ENOTDIR) {
virReportSystemError(errno,
- _("Failed to delete symlink '%s'"),
+ _("Failed to delete symlink '%1$s'"),
autostartLink);
goto endjob;
}
@@ -2724,14 +2724,14 @@ lxcDomainOpenConsole(virDomainPtr dom,
if (!chr) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("cannot find console device '%s'"),
+ _("cannot find console device '%1$s'"),
dev_name ? dev_name : _("default"));
goto cleanup;
}
if (chr->source->type != VIR_DOMAIN_CHR_TYPE_PTY) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("character device %s is not using a PTY"),
+ _("character device %1$s is not using a PTY"),
dev_name ? dev_name : NULLSTR(chr->info.alias));
goto cleanup;
}
@@ -2762,7 +2762,7 @@ lxcDomainSendProcessSignal(virDomainPtr dom,
if (signum >= VIR_DOMAIN_PROCESS_SIGNAL_LAST) {
virReportError(VIR_ERR_INVALID_ARG,
- _("signum value %d is out of range"),
+ _("signum value %1$d is out of range"),
signum);
return -1;
}
@@ -2806,7 +2806,7 @@ lxcDomainSendProcessSignal(virDomainPtr dom,
*/
if (kill(victim, signum) < 0) {
virReportSystemError(errno,
- _("Unable to send %d signal to process %d"),
+ _("Unable to send %1$d signal to process %2$d"),
signum, victim);
goto endjob;
}
@@ -2891,7 +2891,7 @@ lxcDomainShutdownFlags(virDomainPtr dom,
if (kill(priv->initpid, SIGTERM) < 0 &&
errno != ESRCH) {
virReportSystemError(errno,
- _("Unable to send SIGTERM to init pid %llu"),
+ _("Unable to send SIGTERM to init pid
%1$llu"),
(long long)priv->initpid);
goto endjob;
}
@@ -2966,7 +2966,7 @@ lxcDomainReboot(virDomainPtr dom,
if (kill(priv->initpid, SIGHUP) < 0 &&
errno != ESRCH) {
virReportSystemError(errno,
- _("Unable to send SIGTERM to init pid %llu"),
+ _("Unable to send SIGTERM to init pid
%1$llu"),
(long long)priv->initpid);
goto endjob;
}
@@ -2997,7 +2997,7 @@ lxcDomainAttachDeviceConfig(virDomainDef *vmdef,
disk = dev->data.disk;
if (virDomainDiskIndexByName(vmdef, disk->dst, true) >= 0) {
virReportError(VIR_ERR_INVALID_ARG,
- _("target %s already exists."), disk->dst);
+ _("target %1$s already exists."), disk->dst);
return -1;
}
virDomainDiskInsert(vmdef, disk);
@@ -3144,7 +3144,7 @@ lxcDomainDetachDeviceConfig(virDomainDef *vmdef,
disk = dev->data.disk;
if (!(det_disk = virDomainDiskRemoveByName(vmdef, disk->dst))) {
virReportError(VIR_ERR_INVALID_ARG,
- _("no target device %s"), disk->dst);
+ _("no target device %1$s"), disk->dst);
return -1;
}
virDomainDiskDefFree(det_disk);
@@ -3228,7 +3228,7 @@ lxcDomainAttachDeviceMknodHelper(pid_t pid G_GNUC_UNUSED,
if (virFileMakeParentPath(data->file) < 0) {
virReportSystemError(errno,
- _("Unable to create %s"), data->file);
+ _("Unable to create %1$s"), data->file);
goto cleanup;
}
@@ -3243,7 +3243,7 @@ lxcDomainAttachDeviceMknodHelper(pid_t pid G_GNUC_UNUSED,
data->file, major(data->dev), minor(data->dev));
if (mknod(data->file, data->mode, data->dev) < 0) {
virReportSystemError(errno,
- _("Unable to create device %s"),
+ _("Unable to create device %1$s"),
data->file);
goto cleanup;
}
@@ -3301,7 +3301,7 @@ lxcDomainAttachDeviceMknodHelper(pid_t pid G_GNUC_UNUSED,
case VIR_DOMAIN_DEVICE_AUDIO:
case VIR_DOMAIN_DEVICE_CRYPTO:
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unexpected device type %d"),
+ _("Unexpected device type %1$d"),
data->def->type);
goto cleanup;
}
@@ -3359,7 +3359,7 @@ lxcDomainAttachDeviceUnlinkHelper(pid_t pid G_GNUC_UNUSED,
VIR_DEBUG("Unlinking %s", path);
if (unlink(path) < 0 && errno != ENOENT) {
virReportSystemError(errno,
- _("Unable to remove device %s"), path);
+ _("Unable to remove device %1$s"), path);
return -1;
}
@@ -3423,19 +3423,19 @@ lxcDomainAttachDeviceDiskLive(virLXCDriver *driver,
if (virDomainDiskIndexByName(vm->def, def->dst, true) >= 0) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("target %s already exists"), def->dst);
+ _("target %1$s already exists"), def->dst);
goto cleanup;
}
if (stat(src, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"), src);
+ _("Unable to access %1$s"), src);
goto cleanup;
}
if (!S_ISBLK(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Disk source %s must be a block device"),
+ _("Disk source %1$s must be a block device"),
src);
goto cleanup;
}
@@ -3648,13 +3648,13 @@ lxcDomainAttachDeviceHostdevSubsysUSBLive(virLXCDriver *driver,
if (stat(src, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"), src);
+ _("Unable to access %1$s"), src);
goto cleanup;
}
if (!S_ISCHR(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("USB source %s was not a character device"),
+ _("USB source %1$s was not a character device"),
src);
goto cleanup;
}
@@ -3717,14 +3717,14 @@ lxcDomainAttachDeviceHostdevStorageLive(virLXCDriver *driver,
if (stat(def->source.caps.u.storage.block, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"),
+ _("Unable to access %1$s"),
def->source.caps.u.storage.block);
goto cleanup;
}
if (!S_ISBLK(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Hostdev source %s must be a block device"),
+ _("Hostdev source %1$s must be a block device"),
def->source.caps.u.storage.block);
goto cleanup;
}
@@ -3790,14 +3790,14 @@ lxcDomainAttachDeviceHostdevMiscLive(virLXCDriver *driver,
if (stat(def->source.caps.u.misc.chardev, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to access %s"),
+ _("Unable to access %1$s"),
def->source.caps.u.misc.chardev);
goto cleanup;
}
if (!S_ISCHR(sb.st_mode)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Hostdev source %s must be a block device"),
+ _("Hostdev source %1$s must be a block device"),
def->source.caps.u.misc.chardev);
goto cleanup;
}
@@ -3850,7 +3850,7 @@ lxcDomainAttachDeviceHostdevSubsysLive(virLXCDriver *driver,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device type %s"),
+ _("Unsupported host device type %1$s"),
virDomainHostdevSubsysTypeToString(dev->data.hostdev->source.subsys.type));
return -1;
}
@@ -3871,7 +3871,7 @@ lxcDomainAttachDeviceHostdevCapsLive(virLXCDriver *driver,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device type %s"),
+ _("Unsupported host device type %1$s"),
virDomainHostdevCapsTypeToString(dev->data.hostdev->source.caps.type));
return -1;
}
@@ -3906,7 +3906,7 @@ lxcDomainAttachDeviceHostdevLive(virLXCDriver *driver,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device mode %s"),
+ _("Unsupported host device mode %1$s"),
virDomainHostdevModeTypeToString(dev->data.hostdev->mode));
return -1;
}
@@ -3966,7 +3966,7 @@ lxcDomainAttachDeviceLive(virLXCDriver *driver,
case VIR_DOMAIN_DEVICE_AUDIO:
case VIR_DOMAIN_DEVICE_CRYPTO:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("device type '%s' cannot be attached"),
+ _("device type '%1$s' cannot be attached"),
virDomainDeviceTypeToString(dev->type));
break;
}
@@ -3995,7 +3995,7 @@ lxcDomainDetachDeviceDiskLive(virDomainObj *vm,
dev->data.disk->dst,
false)) < 0) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("disk %s not found"), dev->data.disk->dst);
+ _("disk %1$s not found"), dev->data.disk->dst);
return -1;
}
@@ -4193,7 +4193,7 @@ lxcDomainDetachDeviceHostdevStorageLive(virDomainObj *vm,
dev->data.hostdev,
&def)) < 0) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("hostdev %s not found"),
+ _("hostdev %1$s not found"),
dev->data.hostdev->source.caps.u.storage.block);
return -1;
}
@@ -4240,7 +4240,7 @@ lxcDomainDetachDeviceHostdevMiscLive(virDomainObj *vm,
dev->data.hostdev,
&def)) < 0) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("hostdev %s not found"),
+ _("hostdev %1$s not found"),
dev->data.hostdev->source.caps.u.misc.chardev);
return -1;
}
@@ -4280,7 +4280,7 @@ lxcDomainDetachDeviceHostdevSubsysLive(virLXCDriver *driver,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device type %s"),
+ _("Unsupported host device type %1$s"),
virDomainHostdevSubsysTypeToString(dev->data.hostdev->source.subsys.type));
return -1;
}
@@ -4300,7 +4300,7 @@ lxcDomainDetachDeviceHostdevCapsLive(virDomainObj *vm,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device type %s"),
+ _("Unsupported host device type %1$s"),
virDomainHostdevCapsTypeToString(dev->data.hostdev->source.caps.type));
return -1;
}
@@ -4329,7 +4329,7 @@ lxcDomainDetachDeviceHostdevLive(virLXCDriver *driver,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported host device mode %s"),
+ _("Unsupported host device mode %1$s"),
virDomainHostdevModeTypeToString(dev->data.hostdev->mode));
return -1;
}
@@ -4382,7 +4382,7 @@ lxcDomainDetachDeviceLive(virLXCDriver *driver,
case VIR_DOMAIN_DEVICE_AUDIO:
case VIR_DOMAIN_DEVICE_CRYPTO:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("device type '%s' cannot be detached"),
+ _("device type '%1$s' cannot be detached"),
virDomainDeviceTypeToString(dev->type));
break;
}
@@ -5064,7 +5064,7 @@ lxcDomainGetHostname(virDomainPtr dom,
if (!hostname) {
virReportError(VIR_ERR_NO_HOSTNAME,
- _("no hostname found for domain %s"),
+ _("no hostname found for domain %1$s"),
vm->def->name);
goto endjob;
}
diff --git a/src/lxc/lxc_fuse.c b/src/lxc/lxc_fuse.c
index a99b44327f..a11cbbaff7 100644
--- a/src/lxc/lxc_fuse.c
+++ b/src/lxc/lxc_fuse.c
@@ -208,7 +208,7 @@ lxcProcReadMeminfo(char *hostpath,
fp = fopen(hostpath, "r");
if (fp == NULL) {
- virReportSystemError(errno, _("Cannot open %s"), hostpath);
+ virReportSystemError(errno, _("Cannot open %1$s"), hostpath);
return -errno;
}
@@ -373,7 +373,7 @@ lxcSetupFuse(struct virLXCFuse **f,
fuse->mountpoint = g_strdup_printf("%s/%s.fuse/", LXC_STATE_DIR,
def->name);
if (g_mkdir_with_parents(fuse->mountpoint, 0777) < 0) {
- virReportSystemError(errno, _("Cannot create %s"),
+ virReportSystemError(errno, _("Cannot create %1$s"),
fuse->mountpoint);
goto error;
}
diff --git a/src/lxc/lxc_hostdev.c b/src/lxc/lxc_hostdev.c
index ceb637955b..d18d61cb19 100644
--- a/src/lxc/lxc_hostdev.c
+++ b/src/lxc/lxc_hostdev.c
@@ -78,7 +78,7 @@ int virLXCPrepareHostDevices(virLXCDriver *driver,
break;
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported hostdev type %s"),
+ _("Unsupported hostdev type %1$s"),
virDomainHostdevSubsysTypeToString(dev->source.subsys.type));
return -1;
}
@@ -92,7 +92,7 @@ int virLXCPrepareHostDevices(virLXCDriver *driver,
break;
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported hostdev type %s"),
+ _("Unsupported hostdev type %1$s"),
virDomainHostdevSubsysTypeToString(dev->source.subsys.type));
return -1;
}
@@ -101,7 +101,7 @@ int virLXCPrepareHostDevices(virLXCDriver *driver,
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Unsupported hostdev mode %s"),
+ _("Unsupported hostdev mode %1$s"),
virDomainHostdevModeTypeToString(dev->mode));
return -1;
}
diff --git a/src/lxc/lxc_native.c b/src/lxc/lxc_native.c
index 3d0060e1b0..d311f5a5ad 100644
--- a/src/lxc/lxc_native.c
+++ b/src/lxc/lxc_native.c
@@ -221,7 +221,7 @@ lxcConvertSize(const char *size, unsigned long long *value)
if (STREQ(unit, "%")) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("can't convert relative size: '%s'"),
+ _("can't convert relative size: '%1$s'"),
size);
return -1;
} else {
@@ -233,7 +233,7 @@ lxcConvertSize(const char *size, unsigned long long *value)
error:
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to convert size: '%s'"),
+ _("failed to convert size: '%1$s'"),
size);
return -1;
}
@@ -543,7 +543,7 @@ lxcNetworkParseDataIPs(const char *name,
virStrToLong_ui(ipparts[1], NULL, 10, &ip->prefix) < 0) {
virReportError(VIR_ERR_INVALID_ARG,
- _("Invalid CIDR address: '%s'"),
value->str);
+ _("Invalid CIDR address: '%1$s'"),
value->str);
return -1;
}
@@ -772,7 +772,7 @@ lxcCreateConsoles(virDomainDef *def, virConf *properties)
}
if (virStrToLong_i(value, NULL, 10, &nbttys) < 0) {
- virReportError(VIR_ERR_INTERNAL_ERROR, _("failed to parse int:
'%s'"),
+ virReportError(VIR_ERR_INTERNAL_ERROR, _("failed to parse int:
'%1$s'"),
value);
return -1;
}
@@ -815,7 +815,7 @@ lxcIdmapWalkCallback(const char *name, virConfValue *value, void
*data)
if (sscanf(value->str, "%c %lu %lu %lu", &type,
&target, &start, &count) != 4) {
- virReportError(VIR_ERR_INTERNAL_ERROR, _("invalid %s: '%s'"),
+ virReportError(VIR_ERR_INTERNAL_ERROR, _("invalid %1$s:
'%2$s'"),
name, value->str);
return -1;
}
@@ -903,7 +903,7 @@ lxcSetCpuTune(virDomainDef *def, virConf *properties)
error:
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse integer: '%s'"), value);
+ _("failed to parse integer: '%1$s'"), value);
return -1;
}
@@ -955,7 +955,7 @@ lxcBlkioDeviceWalkCallback(const char *name, virConfValue *value, void
*data)
if (!parts[0] || !parts[1]) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("invalid %s value: '%s'"),
+ _("invalid %1$s value: '%2$s'"),
name, value->str);
return -1;
}
@@ -978,34 +978,34 @@ lxcBlkioDeviceWalkCallback(const char *name, virConfValue *value,
void *data)
if (STREQ(name, "lxc.cgroup.blkio.device_weight")) {
if (virStrToLong_ui(parts[1], NULL, 10, &device->weight) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse device weight: '%s'"),
parts[1]);
+ _("failed to parse device weight: '%1$s'"),
parts[1]);
return -1;
}
} else if (STREQ(name, "lxc.cgroup.blkio.throttle.read_bps_device")) {
if (virStrToLong_ull(parts[1], NULL, 10, &device->rbps) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse read_bps_device: '%s'"),
+ _("failed to parse read_bps_device:
'%1$s'"),
parts[1]);
return -1;
}
} else if (STREQ(name, "lxc.cgroup.blkio.throttle.write_bps_device")) {
if (virStrToLong_ull(parts[1], NULL, 10, &device->wbps) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse write_bps_device:
'%s'"),
+ _("failed to parse write_bps_device:
'%1$s'"),
parts[1]);
return -1;
}
} else if (STREQ(name, "lxc.cgroup.blkio.throttle.read_iops_device")) {
if (virStrToLong_ui(parts[1], NULL, 10, &device->riops) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse read_iops_device:
'%s'"),
+ _("failed to parse read_iops_device:
'%1$s'"),
parts[1]);
return -1;
}
} else if (STREQ(name, "lxc.cgroup.blkio.throttle.write_iops_device")) {
if (virStrToLong_ui(parts[1], NULL, 10, &device->wiops) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse write_iops_device:
'%s'"),
+ _("failed to parse write_iops_device:
'%1$s'"),
parts[1]);
return -1;
}
@@ -1025,7 +1025,7 @@ lxcSetBlkioTune(virDomainDef *def, virConf *properties)
&value) > 0) {
if (virStrToLong_ui(value, NULL, 10, &def->blkio.weight) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("failed to parse integer: '%s'"), value);
+ _("failed to parse integer: '%1$s'"),
value);
return -1;
}
}
diff --git a/src/lxc/lxc_process.c b/src/lxc/lxc_process.c
index 14fe60b074..d003742fa1 100644
--- a/src/lxc/lxc_process.c
+++ b/src/lxc/lxc_process.c
@@ -404,7 +404,7 @@ static int virLXCProcessSetupNamespaceName(virLXCDriver *driver,
vm = virDomainObjListFindByName(driver->domains, name);
if (!vm) {
virReportError(VIR_ERR_NO_DOMAIN,
- _("No domain with matching name '%s'"), name);
+ _("No domain with matching name '%1$s'"),
name);
return -1;
}
@@ -420,7 +420,7 @@ static int virLXCProcessSetupNamespaceName(virLXCDriver *driver,
if ((fd = open(path, O_RDONLY)) < 0) {
virReportSystemError(errno,
- _("failed to open ns %s"),
+ _("failed to open ns %1$s"),
virLXCDomainNamespaceTypeToString(ns_type));
goto cleanup;
}
@@ -438,7 +438,7 @@ static int virLXCProcessSetupNamespacePID(int ns_type, const char
*name)
int fd = open(path, O_RDONLY);
if (fd < 0) {
virReportSystemError(errno,
- _("failed to open ns %s"),
+ _("failed to open ns %1$s"),
virLXCDomainNamespaceTypeToString(ns_type));
return -1;
}
@@ -461,7 +461,7 @@ static int virLXCProcessSetupNamespaceNet(int ns_type, const char
*name)
fd = open(path, O_RDONLY);
if (fd < 0) {
virReportSystemError(errno,
- _("failed to open netns %s"), name);
+ _("failed to open netns %1$s"), name);
return -1;
}
return fd;
@@ -600,7 +600,7 @@ virLXCProcessSetupInterfaces(virLXCDriver *driver,
case VIR_DOMAIN_NET_TYPE_VDS:
case VIR_DOMAIN_NET_TYPE_LAST:
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Unsupported network type %s"),
+ _("Unsupported network type %1$s"),
virDomainNetTypeToString(type));
goto cleanup;
@@ -752,7 +752,7 @@ virLXCProcessGetNsInode(pid_t pid,
if (stat(path, &sb) < 0) {
virReportSystemError(errno,
- _("Unable to stat %s"), path);
+ _("Unable to stat %1$s"), path);
return -1;
}
@@ -883,7 +883,7 @@ int virLXCProcessStop(virLXCDriver *driver,
* libvirt_lxc process */
if (virProcessKillPainfully(vm->pid, true) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Processes %d refused to die"), (int)vm->pid);
+ _("Processes %1$d refused to die"),
(int)vm->pid);
return -1;
}
}
@@ -1049,7 +1049,7 @@ virLXCProcessReadLogOutputData(virDomainObj *vm,
if (got == buflen-1) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Out of space while reading log output: %s"),
+ _("Out of space while reading log output: %1$s"),
buf);
return -1;
}
@@ -1062,7 +1062,7 @@ virLXCProcessReadLogOutputData(virDomainObj *vm,
}
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Timed out while reading log output: %s"),
+ _("Timed out while reading log output: %1$s"),
buf);
return -1;
@@ -1080,14 +1080,14 @@ virLXCProcessReadLogOutput(virDomainObj *vm,
if ((fd = open(logfile, O_RDONLY)) < 0) {
virReportSystemError(errno,
- _("Unable to open log file %s"),
+ _("Unable to open log file %1$s"),
logfile);
return -1;
}
if (lseek(fd, pos, SEEK_SET) < 0) {
virReportSystemError(errno,
- _("Unable to seek log file %s to %llu"),
+ _("Unable to seek log file %1$s to %2$llu"),
logfile, (unsigned long long)pos);
return -1;
}
@@ -1127,7 +1127,7 @@ virLXCProcessReportStartupLogError(virDomainObj *vm,
return 0;
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("guest failed to start: %s"), errbuf);
+ _("guest failed to start: %1$s"), errbuf);
return -1;
}
@@ -1238,7 +1238,7 @@ int virLXCProcessStart(virLXCDriver * driver,
if (g_mkdir_with_parents(cfg->logDir, 0777) < 0) {
virReportSystemError(errno,
- _("Cannot create log directory '%s'"),
+ _("Cannot create log directory '%1$s'"),
cfg->logDir);
return -1;
}
@@ -1349,7 +1349,7 @@ int virLXCProcessStart(virLXCDriver * driver,
if ((logfd = open(logfile, O_WRONLY | O_APPEND | O_CREAT,
S_IRUSR|S_IWUSR)) < 0) {
virReportSystemError(errno,
- _("Failed to open '%s'"),
+ _("Failed to open '%1$s'"),
logfile);
goto cleanup;
}
@@ -1410,7 +1410,7 @@ int virLXCProcessStart(virLXCDriver * driver,
/* In case there isn't an error in the logs report one based on the exit
status */
if (WIFEXITED(status)) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("guest failed to start: unexpected exit status
%d"),
+ _("guest failed to start: unexpected exit status
%1$d"),
WEXITSTATUS(status));
} else {
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
@@ -1425,7 +1425,7 @@ int virLXCProcessStart(virLXCDriver * driver,
goto cleanup;
/* In case there isn't an error in the logs report that we failed to read the
pidfile */
- virReportSystemError(-r, _("Failed to read pid file %s"), pidfile);
+ virReportSystemError(-r, _("Failed to read pid file %1$s"), pidfile);
goto cleanup;
}
@@ -1477,7 +1477,7 @@ int virLXCProcessStart(virLXCDriver * driver,
if (!priv->cgroup) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("No valid cgroup for machine %s"),
+ _("No valid cgroup for machine %1$s"),
vm->def->name);
goto cleanup;
}
@@ -1568,7 +1568,7 @@ virLXCProcessAutostartDomain(virDomainObj *vm,
virDomainAuditStart(vm, "booted", rc >= 0);
if (rc < 0) {
- VIR_ERROR(_("Failed to autostart VM '%s': %s"),
+ VIR_ERROR(_("Failed to autostart VM '%1$s': %2$s"),
vm->def->name,
virGetLastErrorMessage());
return -1;
@@ -1668,7 +1668,7 @@ virLXCProcessReconnectDomain(virDomainObj *vm,
if (!priv->cgroup) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("No valid cgroup for machine %s"),
+ _("No valid cgroup for machine %1$s"),
vm->def->name);
goto error;
}
--
2.39.2