Signed-off-by: Jiri Denemark <jdenemar(a)redhat.com>
---
src/qemu/qemu_process.c | 116 +++++++++++++++++++---------------------
1 file changed, 54 insertions(+), 62 deletions(-)
diff --git a/src/qemu/qemu_process.c b/src/qemu/qemu_process.c
index deebd03717..8818eb4c8d 100644
--- a/src/qemu/qemu_process.c
+++ b/src/qemu/qemu_process.c
@@ -220,7 +220,7 @@ qemuConnectAgent(virQEMUDriver *driver, virDomainObj *vm)
}
if (qemuSecuritySetDaemonSocketLabel(driver->securityManager, vm->def) < 0)
{
- VIR_ERROR(_("Failed to set security context for agent for %s"),
+ VIR_ERROR(_("Failed to set security context for agent for %1$s"),
vm->def->name);
goto cleanup;
}
@@ -238,7 +238,7 @@ qemuConnectAgent(virQEMUDriver *driver, virDomainObj *vm)
}
if (qemuSecurityClearSocketLabel(driver->securityManager, vm->def) < 0) {
- VIR_ERROR(_("Failed to clear security context for agent for %s"),
+ VIR_ERROR(_("Failed to clear security context for agent for %1$s"),
vm->def->name);
qemuAgentClose(agent);
goto cleanup;
@@ -395,7 +395,7 @@ qemuProcessFindDomainDiskByAliasOrQOM(virDomainObj *vm,
}
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("no disk found with alias '%s' or id
'%s'"),
+ _("no disk found with alias '%1$s' or id
'%2$s'"),
NULLSTR(alias), NULLSTR(qomid));
return NULL;
}
@@ -1864,7 +1864,7 @@ qemuConnectMonitor(virQEMUDriver *driver,
qemuMonitor *mon = NULL;
if (qemuSecuritySetDaemonSocketLabel(driver->securityManager, vm->def) < 0)
{
- VIR_ERROR(_("Failed to set security context for monitor for %s"),
+ VIR_ERROR(_("Failed to set security context for monitor for %1$s"),
vm->def->name);
return -1;
}
@@ -1888,7 +1888,7 @@ qemuConnectMonitor(virQEMUDriver *driver,
priv->mon = mon;
if (qemuSecurityClearSocketLabel(driver->securityManager, vm->def) < 0) {
- VIR_ERROR(_("Failed to clear security context for monitor for %s"),
+ VIR_ERROR(_("Failed to clear security context for monitor for %1$s"),
vm->def->name);
return -1;
}
@@ -2026,7 +2026,7 @@ qemuProcessLookupPTYs(virDomainChrDef **devices,
* pty path for this chardev, report an error
*/
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("no assigned pty for device %s"), id);
+ _("no assigned pty for device %1$s"), id);
return -1;
} else {
/* 'info chardev' had no pty path for this chardev,
@@ -2155,7 +2155,7 @@ qemuProcessRefreshPRManagerState(virDomainObj *vm,
if (!(prManagerInfo = virHashLookup(info, managedAlias))) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("missing info on pr-manager %s"),
+ _("missing info on pr-manager %1$s"),
managedAlias);
return -1;
}
@@ -2360,8 +2360,7 @@ qemuProcessDetectIOThreadPIDs(virDomainObj *vm,
if (niothreads != vm->def->niothreadids) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("got wrong number of IOThread pids from QEMU monitor.
"
- "got %d, wanted %zu"),
+ _("got wrong number of IOThread pids from QEMU monitor. got
%1$d, wanted %2$zu"),
niothreads, vm->def->niothreadids);
goto cleanup;
}
@@ -2378,7 +2377,7 @@ qemuProcessDetectIOThreadPIDs(virDomainObj *vm,
if (!(iothrid = virDomainIOThreadIDFind(vm->def,
iothreads[i]->iothread_id))) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("iothread %d not found"),
+ _("iothread %1$d not found"),
iothreads[i]->iothread_id);
goto cleanup;
}
@@ -2518,7 +2517,7 @@ qemuProcessSetLinkStates(virDomainObj *vm,
VIR_DOMAIN_NET_INTERFACE_LINK_STATE_DOWN);
if (rv < 0) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("Couldn't set link state on interface:
%s"),
+ _("Couldn't set link state on interface:
%1$s"),
def->nets[i]->info.alias);
goto cleanup;
}
@@ -2839,7 +2838,7 @@ qemuProcessStartManagedPRDaemon(virDomainObj *vm)
cfg = virQEMUDriverGetConfig(driver);
if (!virFileIsExecutable(cfg->prHelperName)) {
- virReportSystemError(errno, _("'%s' is not a suitable pr
helper"),
+ virReportSystemError(errno, _("'%1$s' is not a suitable pr
helper"),
cfg->prHelperName);
goto cleanup;
}
@@ -2854,7 +2853,7 @@ qemuProcessStartManagedPRDaemon(virDomainObj *vm)
if (unlink(socketPath) < 0 &&
errno != ENOENT) {
virReportSystemError(errno,
- _("Unable to remove stale socket path: %s"),
+ _("Unable to remove stale socket path: %1$s"),
socketPath);
goto cleanup;
}
@@ -2886,7 +2885,7 @@ qemuProcessStartManagedPRDaemon(virDomainObj *vm)
if (virPidFileReadPath(pidfile, &cpid) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("pr helper %s didn't show up"),
+ _("pr helper %1$s didn't show up"),
cfg->prHelperName);
goto cleanup;
}
@@ -2904,11 +2903,11 @@ qemuProcessStartManagedPRDaemon(virDomainObj *vm)
if (saferead(errfd, errbuf, sizeof(errbuf) - 1) < 0) {
virReportSystemError(errno,
- _("pr helper %s died unexpectedly"),
+ _("pr helper %1$s died unexpectedly"),
cfg->prHelperName);
} else {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("pr helper died and reported: %s"), errbuf);
+ _("pr helper died and reported: %1$s"), errbuf);
}
goto cleanup;
}
@@ -4038,7 +4037,7 @@ qemuProcessBuildDestroyMemoryPathsImpl(virQEMUDriver *driver,
if (g_mkdir_with_parents(path, 0700) < 0) {
virReportSystemError(errno,
- _("Unable to create %s"),
+ _("Unable to create %1$s"),
path);
return -1;
}
@@ -4118,7 +4117,7 @@ qemuProcessDestroyMemoryBackingPath(virQEMUDriver *driver,
if (unlink(path) < 0 &&
errno != ENOENT) {
- virReportSystemError(errno, _("Unable to remove %s"), path);
+ virReportSystemError(errno, _("Unable to remove %1$s"), path);
return -1;
}
@@ -4279,7 +4278,7 @@ qemuProcessVerifyHypervFeatures(virDomainDef *def,
continue;
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("host doesn't support hyperv stimer
'%s' feature"),
+ _("host doesn't support hyperv stimer
'%1$s' feature"),
"direct");
return -1;
}
@@ -4305,7 +4304,7 @@ qemuProcessVerifyHypervFeatures(virDomainDef *def,
case VIR_DOMAIN_HYPERV_EVMCS:
case VIR_DOMAIN_HYPERV_AVIC:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("host doesn't support hyperv '%s'
feature"),
+ _("host doesn't support hyperv '%1$s'
feature"),
virDomainHypervTypeToString(i));
return -1;
@@ -4577,14 +4576,14 @@ qemuPrepareNVRAMHelper(int dstFD,
if ((r = saferead(data->srcFD, buf, sizeof(buf))) < 0) {
virReportSystemError(errno,
- _("Unable to read from file '%s'"),
+ _("Unable to read from file '%1$s'"),
data->srcPath);
return -2;
}
if (safewrite(dstFD, buf, r) < 0) {
virReportSystemError(errno,
- _("Unable to write to file '%s'"),
+ _("Unable to write to file '%1$s'"),
dstPath);
return -1;
}
@@ -4622,15 +4621,15 @@ qemuPrepareNVRAM(virQEMUDriver *driver,
if (!loader->nvramTemplate) {
virReportError(VIR_ERR_OPERATION_FAILED,
- _("unable to find any master var store for "
- "loader: %s"), loader->path);
+ _("unable to find any master var store for loader:
%1$s"),
+ loader->path);
return -1;
}
if ((srcFD = virFileOpenAs(loader->nvramTemplate, O_RDONLY,
0, -1, -1, 0)) < 0) {
virReportSystemError(-srcFD,
- _("Failed to open file '%s'"),
+ _("Failed to open file '%1$s'"),
loader->nvramTemplate);
return -1;
}
@@ -4924,7 +4923,7 @@ qemuProcessGetNetworkAddress(const char *netname,
ipdef = virNetworkDefGetIPByIndex(netdef, AF_UNSPEC, 0);
if (!ipdef) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("network '%s' doesn't have an IP
address"),
+ _("network '%1$s' doesn't have an IP
address"),
netdef->name);
return -1;
}
@@ -4948,7 +4947,7 @@ qemuProcessGetNetworkAddress(const char *netname,
if (!dev_name) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("network '%s' has no associated interface or
bridge"),
+ _("network '%1$s' has no associated interface or
bridge"),
netdef->name);
return -1;
}
@@ -5271,7 +5270,7 @@ qemuProcessMakeDir(virQEMUDriver *driver,
const char *path)
{
if (g_mkdir_with_parents(path, 0750) < 0) {
- virReportSystemError(errno, _("Cannot create directory '%s'"),
path);
+ virReportSystemError(errno, _("Cannot create directory
'%1$s'"), path);
return -1;
}
@@ -5375,7 +5374,7 @@ qemuProcessStartValidateShmem(virDomainObj *vm)
if (strchr(shmem->name, '/')) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("shmem name '%s' must not contain
'/'"),
+ _("shmem name '%1$s' must not contain
'/'"),
shmem->name);
return -1;
}
@@ -5488,9 +5487,7 @@ qemuProcessStartValidateTSC(virQEMUDriver *driver,
}
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Requested TSC frequency %llu Hz is outside tolerance "
- "range ([%llu, %llu] Hz) around host frequency %llu Hz "
- "and TSC scaling is not supported by the host CPU"),
+ _("Requested TSC frequency %1$llu Hz is outside tolerance range
([%2$llu, %3$llu] Hz) around host frequency %4$llu Hz and TSC scaling is not supported by
the host CPU"),
freq, minFreq, maxFreq, tsc->frequency);
return -1;
}
@@ -5562,8 +5559,7 @@ qemuProcessStartValidate(virQEMUDriver *driver,
str = g_strjoinv(", ", features);
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("Some features cannot be reliably used "
- "with this QEMU: %s"), str);
+ _("Some features cannot be reliably used with this
QEMU: %1$s"), str);
return -1;
}
}
@@ -5596,7 +5592,7 @@ qemuProcessStartUpdateCustomCaps(virDomainObj *vm)
for (next = cfg->capabilityfilters; *next; next++) {
if ((tmp = virQEMUCapsTypeFromString(*next)) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("invalid capability_filters capability
'%s'"),
+ _("invalid capability_filters capability
'%1$s'"),
*next);
return -1;
}
@@ -5609,7 +5605,7 @@ qemuProcessStartUpdateCustomCaps(virDomainObj *vm)
for (next = nsdef->capsadd; next && *next; next++) {
if ((tmp = virQEMUCapsTypeFromString(*next)) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("invalid qemu namespace capability
'%s'"),
+ _("invalid qemu namespace capability
'%1$s'"),
*next);
return -1;
}
@@ -5620,7 +5616,7 @@ qemuProcessStartUpdateCustomCaps(virDomainObj *vm)
for (next = nsdef->capsdel; next && *next; next++) {
if ((tmp = virQEMUCapsTypeFromString(*next)) < 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("invalid qemu namespace capability
'%s'"),
+ _("invalid qemu namespace capability
'%1$s'"),
*next);
return -1;
}
@@ -5814,9 +5810,7 @@ qemuProcessNetworkPrepareDevices(virQEMUDriver *driver,
if (virDomainHostdevFind(def, hostdev, NULL) >= 0) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("PCI device %04x:%02x:%02x.%x "
- "allocated from network %s is already "
- "in use by domain %s"),
+ _("PCI device %1$04x:%2$02x:%3$02x.%4$x allocated
from network %5$s is already in use by domain %6$s"),
pcisrc->addr.domain, pcisrc->addr.bus,
pcisrc->addr.slot, pcisrc->addr.function,
net->data.network.name, def->name);
@@ -5850,14 +5844,14 @@ qemuProcessSetupVcpuSchedCoreHelper(pid_t ppid G_GNUC_UNUSED,
if (virProcessSchedCoreShareFrom(data->dummypid) < 0) {
virReportSystemError(errno,
- _("unable to share scheduling cookie from %lld"),
+ _("unable to share scheduling cookie from
%1$lld"),
(long long) data->dummypid);
return -1;
}
if (virProcessSchedCoreShareTo(data->vcpupid) < 0) {
virReportSystemError(errno,
- _("unable to share scheduling cookie to %lld"),
+ _("unable to share scheduling cookie to %1$lld"),
(long long) data->vcpupid);
return -1;
}
@@ -5974,7 +5968,7 @@ qemuProcessSetupAllVcpusSchedCoreHelper(pid_t ppid G_GNUC_UNUSED,
if (vcpupid > 0 &&
virProcessSchedCoreShareTo(vcpupid) < 0) {
virReportSystemError(errno,
- _("unable to share scheduling cookie to
%lld"),
+ _("unable to share scheduling cookie to
%1$lld"),
(long long) vcpupid);
return -1;
}
@@ -6096,13 +6090,13 @@ qemuProcessValidateHotpluggableVcpus(virDomainDef *def)
if (vcpu->order != 0) {
if (virBitmapIsBitSet(ordermap, vcpu->order)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("duplicate vcpu order '%u'"),
vcpu->order);
+ _("duplicate vcpu order '%1$u'"),
vcpu->order);
return -1;
}
if (virBitmapSetBit(ordermap, vcpu->order)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("vcpu order '%u' exceeds vcpu
count"),
+ _("vcpu order '%1$u' exceeds vcpu
count"),
vcpu->order);
return -1;
}
@@ -6114,8 +6108,8 @@ qemuProcessValidateHotpluggableVcpus(virDomainDef *def)
subvcpu->online != vcpu->online ||
subvcpu->order != vcpu->order) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("vcpus '%zu' and '%zu' are in the
same hotplug "
- "group but differ in configuration"), i, j);
+ _("vcpus '%1$zu' and '%2$zu' are in
the same hotplug group but differ in configuration"),
+ i, j);
return -1;
}
}
@@ -6125,7 +6119,7 @@ qemuProcessValidateHotpluggableVcpus(virDomainDef *def)
vcpupriv->thread_id == -1 && vcpupriv->node_id == -1) ||
!vcpupriv->type) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("vcpu '%zu' is missing hotplug data"),
i);
+ _("vcpu '%1$zu' is missing hotplug
data"), i);
return -1;
}
}
@@ -6275,8 +6269,7 @@ qemuProcessUpdateGuestCPU(virDomainDef *def,
if (!virQEMUCapsIsCPUModeSupported(qemuCaps, hostarch, def->virtType,
def->cpu->mode, def->os.machine)) {
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("CPU mode '%s' for %s %s domain on %s host is not
"
- "supported by hypervisor"),
+ _("CPU mode '%1$s' for %2$s %3$s domain on %4$s host
is not supported by hypervisor"),
virCPUModeTypeToString(def->cpu->mode),
virArchToString(def->os.arch),
virDomainVirtTypeToString(def->virtType),
@@ -6815,7 +6808,7 @@ qemuProcessSEVCreateFile(virDomainObj *vm,
return -1;
if (virFileRewriteStr(configFile, S_IRUSR | S_IWUSR, data) < 0) {
- virReportSystemError(errno, _("failed to write data to config
'%s'"),
+ virReportSystemError(errno, _("failed to write data to config
'%1$s'"),
configFile);
return -1;
}
@@ -7089,7 +7082,7 @@ qemuProcessPrepareHostBackendChardevOne(virDomainDeviceDef *dev,
case VIR_DOMAIN_CHR_TYPE_LAST:
default:
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
- _("unsupported chardev '%s'"),
+ _("unsupported chardev '%1$s'"),
virDomainChrTypeToString(chardev->type));
return -1;
}
@@ -7247,7 +7240,7 @@ qemuProcessPrepareHost(virQEMUDriver *driver,
if (g_mkdir_with_parents(cfg->logDir, 0777) < 0) {
virReportSystemError(errno,
- _("cannot create log directory %s"),
+ _("cannot create log directory %1$s"),
cfg->logDir);
return -1;
}
@@ -7262,7 +7255,7 @@ qemuProcessPrepareHost(virQEMUDriver *driver,
if (unlink(priv->pidfile) < 0 &&
errno != ENOENT) {
virReportSystemError(errno,
- _("Cannot remove stale PID file %s"),
+ _("Cannot remove stale PID file %1$s"),
priv->pidfile);
return -1;
}
@@ -7766,7 +7759,7 @@ qemuProcessLaunch(virConnectPtr conn,
if (rv == 0) {
if ((rv = virPidFileReadPath(priv->pidfile, &vm->pid)) < 0) {
virReportSystemError(-rv,
- _("Domain %s didn't show up"),
+ _("Domain %1$s didn't show up"),
vm->def->name);
goto cleanup;
}
@@ -7847,7 +7840,7 @@ qemuProcessLaunch(virConnectPtr conn,
if (fstat(incoming->fd, &stdin_sb) < 0) {
virReportSystemError(errno,
- _("cannot stat fd %d"), incoming->fd);
+ _("cannot stat fd %1$d"), incoming->fd);
goto cleanup;
}
if (S_ISFIFO(stdin_sb.st_mode) &&
@@ -8988,7 +8981,7 @@ qemuProcessReconnect(void *opaque)
if (!priv->qemuCaps) {
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("domain '%s' has no capabilities recorded"),
+ _("domain '%1$s' has no capabilities
recorded"),
obj->def->name);
goto error;
}
@@ -9352,7 +9345,7 @@ qemuProcessQEMULabelUniqPath(qemuProcessQMP *proc)
/* We cannot use the security driver here, but we should not need to. */
if (chown(proc->uniqDir, proc->runUid, -1) < 0) {
virReportSystemError(errno,
- _("Cannot chown uniq path: %s"),
+ _("Cannot chown uniq path: %1$s"),
proc->uniqDir);
return -1;
}
@@ -9372,8 +9365,7 @@ qemuProcessQMPInit(qemuProcessQMP *proc)
if (!(proc->uniqDir = g_mkdtemp(template))) {
virReportSystemError(errno,
- _("Failed to create unique directory with "
- "template '%s' for probing QEMU"),
+ _("Failed to create unique directory with template
'%1$s' for probing QEMU"),
template);
return -1;
}
@@ -9461,14 +9453,14 @@ qemuProcessQMPLaunch(qemuProcessQMP *proc)
if (status != 0) {
VIR_DEBUG("QEMU %s exited with status %d", proc->binary, status);
virReportError(VIR_ERR_INTERNAL_ERROR,
- _("Failed to start QEMU binary %s for probing: %s"),
+ _("Failed to start QEMU binary %1$s for probing:
%2$s"),
proc->binary,
proc->stdErr ? proc->stdErr : _("unknown
error"));
return -1;
}
if ((rc = virPidFileReadPath(proc->pidfile, &proc->pid)) < 0) {
- virReportSystemError(-rc, _("Failed to read pidfile %s"),
proc->pidfile);
+ virReportSystemError(-rc, _("Failed to read pidfile %1$s"),
proc->pidfile);
return -1;
}
--
2.39.2