mirror of https://gitee.com/openkylin/libvirt.git
qemu: Update format strings in translated messages
Signed-off-by: Jiri Denemark <jdenemar@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
This commit is contained in:
parent
21833b5564
commit
71b19c4f08
|
@ -169,7 +169,7 @@ qemuAgentOpenUnix(const char *socketpath)
|
|||
addr.sun_family = AF_UNIX;
|
||||
if (virStrcpyStatic(addr.sun_path, socketpath) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Socket path %s too big for destination"), socketpath);
|
||||
_("Socket path %1$s too big for destination"), socketpath);
|
||||
goto error;
|
||||
}
|
||||
|
||||
|
@ -226,7 +226,7 @@ qemuAgentIOProcessLine(qemuAgent *agent,
|
|||
|
||||
if (virJSONValueGetType(obj) != VIR_JSON_TYPE_OBJECT) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Parsed JSON reply '%s' isn't an object"), line);
|
||||
_("Parsed JSON reply '%1$s' isn't an object"), line);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -264,7 +264,7 @@ qemuAgentIOProcessLine(qemuAgent *agent,
|
|||
}
|
||||
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown JSON reply '%s'"), line);
|
||||
_("Unknown JSON reply '%1$s'"), line);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -375,7 +375,7 @@ qemuAgentIORead(qemuAgent *agent)
|
|||
if (avail < 1024) {
|
||||
if (agent->bufferLength >= QEMU_AGENT_MAX_RESPONSE) {
|
||||
virReportSystemError(ERANGE,
|
||||
_("No complete agent response found in %d bytes"),
|
||||
_("No complete agent response found in %1$d bytes"),
|
||||
QEMU_AGENT_MAX_RESPONSE);
|
||||
return -1;
|
||||
}
|
||||
|
@ -616,7 +616,7 @@ qemuAgentOpen(virDomainObj *vm,
|
|||
|
||||
if (config->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to handle agent type: %s"),
|
||||
_("unable to handle agent type: %1$s"),
|
||||
virDomainChrTypeToString(config->type));
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -633,7 +633,7 @@ qemuAgentOpen(virDomainObj *vm,
|
|||
agent->socket = g_socket_new_from_fd(agent->fd, &gerr);
|
||||
if (!agent->socket) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to create socket object: %s"),
|
||||
_("Unable to create socket object: %1$s"),
|
||||
gerr->message);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -973,7 +973,7 @@ qemuAgentCheckError(virJSONValue *cmd,
|
|||
/* Only send the user the command name + friendly error */
|
||||
if (!error) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to execute QEMU agent command '%s'"),
|
||||
_("unable to execute QEMU agent command '%1$s'"),
|
||||
qemuAgentCommandName(cmd));
|
||||
return -1;
|
||||
}
|
||||
|
@ -987,7 +987,7 @@ qemuAgentCheckError(virJSONValue *cmd,
|
|||
}
|
||||
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to execute QEMU agent command '%s': %s"),
|
||||
_("unable to execute QEMU agent command '%1$s': %2$s"),
|
||||
qemuAgentCommandName(cmd),
|
||||
qemuAgentStringifyError(error));
|
||||
|
||||
|
@ -1000,7 +1000,7 @@ qemuAgentCheckError(virJSONValue *cmd,
|
|||
VIR_DEBUG("Neither 'return' nor 'error' is set in the JSON reply %s: %s",
|
||||
NULLSTR(cmdstr), NULLSTR(replystr));
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to execute QEMU agent command '%s'"),
|
||||
_("unable to execute QEMU agent command '%1$s'"),
|
||||
qemuAgentCommandName(cmd));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1283,8 +1283,7 @@ qemuAgentArbitraryCommand(qemuAgent *agent,
|
|||
*result = NULL;
|
||||
if (timeout < VIR_DOMAIN_QEMU_AGENT_COMMAND_MIN) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("guest agent timeout '%d' is "
|
||||
"less than the minimum '%d'"),
|
||||
_("guest agent timeout '%1$d' is less than the minimum '%2$d'"),
|
||||
timeout, VIR_DOMAIN_QEMU_AGENT_COMMAND_MIN);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1654,7 +1653,7 @@ qemuAgentSetTime(qemuAgent *agent,
|
|||
* not ULLONG_MAX. */
|
||||
if (seconds > LLONG_MAX / 1000000000LL) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("Time '%lld' is too big for guest agent"),
|
||||
_("Time '%1$lld' is too big for guest agent"),
|
||||
seconds);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1739,7 +1738,7 @@ qemuAgentGetDiskAddress(virJSONValue *json)
|
|||
do { \
|
||||
if (virJSONValueObjectGetNumberUint(jsonObject, name, var) < 0) { \
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR, \
|
||||
_("'%s' missing"), name); \
|
||||
_("'%1$s' missing"), name); \
|
||||
return NULL; \
|
||||
} \
|
||||
} while (0)
|
||||
|
@ -1796,8 +1795,7 @@ qemuAgentGetFSInfoFillDisks(virJSONValue *jsondisks,
|
|||
|
||||
if (!jsondisk) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("array element '%zd' of '%zd' missing in "
|
||||
"guest-get-fsinfo 'disk' data"),
|
||||
_("array element '%1$zd' of '%2$zd' missing in guest-get-fsinfo 'disk' data"),
|
||||
i, fsinfo->ndisks);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1859,8 +1857,7 @@ qemuAgentGetFSInfo(qemuAgent *agent,
|
|||
|
||||
if (!entry) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("array element '%zd' of '%zd' missing in "
|
||||
"guest-get-fsinfo return data"),
|
||||
_("array element '%1$zd' of '%2$zd' missing in guest-get-fsinfo return data"),
|
||||
i, ndata);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -1951,14 +1948,14 @@ qemuAgentGetInterfaceOneAddress(virDomainIPAddressPtr ip_addr,
|
|||
type = virJSONValueObjectGetString(ip_addr_obj, "ip-address-type");
|
||||
if (!type) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("qemu agent didn't provide 'ip-address-type'"
|
||||
" field for interface '%s'"), name);
|
||||
_("qemu agent didn't provide 'ip-address-type' field for interface '%1$s'"),
|
||||
name);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (STRNEQ(type, "ipv4") && STRNEQ(type, "ipv6")) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown ip address type '%s'"),
|
||||
_("unknown ip address type '%1$s'"),
|
||||
type);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1966,8 +1963,8 @@ qemuAgentGetInterfaceOneAddress(virDomainIPAddressPtr ip_addr,
|
|||
addr = virJSONValueObjectGetString(ip_addr_obj, "ip-address");
|
||||
if (!addr) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("qemu agent didn't provide 'ip-address'"
|
||||
" field for interface '%s'"), name);
|
||||
_("qemu agent didn't provide 'ip-address' field for interface '%1$s'"),
|
||||
name);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
|
|
@ -206,7 +206,7 @@ qemuBackupDiskPrepareOneBitmaps(struct qemuBackupDiskData *dd,
|
|||
dd->backupdisk->incremental,
|
||||
blockNamedNodeData)) {
|
||||
virReportError(VIR_ERR_CHECKPOINT_INCONSISTENT,
|
||||
_("missing or broken bitmap '%s' for disk '%s'"),
|
||||
_("missing or broken bitmap '%1$s' for disk '%2$s'"),
|
||||
dd->backupdisk->incremental, dd->domdisk->dst);
|
||||
return -1;
|
||||
}
|
||||
|
@ -256,7 +256,7 @@ qemuBackupDiskPrepareDataOne(virDomainObj *vm,
|
|||
|
||||
if (!(dd->domdisk = virDomainDiskByTarget(vm->def, dd->backupdisk->name))) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("no disk named '%s'"), dd->backupdisk->name);
|
||||
_("no disk named '%1$s'"), dd->backupdisk->name);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -268,7 +268,7 @@ qemuBackupDiskPrepareDataOne(virDomainObj *vm,
|
|||
} else if (dd->store->format != VIR_STORAGE_FILE_QCOW2) {
|
||||
if (pull) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("pull mode backup for disk '%s' requires qcow2 driver"),
|
||||
_("pull mode backup for disk '%1$s' requires qcow2 driver"),
|
||||
dd->backupdisk->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -298,7 +298,7 @@ qemuBackupDiskPrepareDataOne(virDomainObj *vm,
|
|||
* has corresponding bitmap. */
|
||||
if (!virDomainCheckpointFindByName(vm->checkpoints, dd->backupdisk->incremental)) {
|
||||
virReportError(VIR_ERR_NO_DOMAIN_CHECKPOINT,
|
||||
_("Checkpoint '%s' for incremental backup of disk '%s' not found"),
|
||||
_("Checkpoint '%1$s' for incremental backup of disk '%2$s' not found"),
|
||||
dd->backupdisk->incremental, dd->backupdisk->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -428,7 +428,7 @@ qemuBackupDiskPrepareOneStorage(virDomainObj *vm,
|
|||
|
||||
if (virFileExists(dd->store->path)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("store '%s' for backup of '%s' exists"),
|
||||
_("store '%1$s' for backup of '%2$s' exists"),
|
||||
dd->store->path, dd->domdisk->dst);
|
||||
return -1;
|
||||
}
|
||||
|
@ -440,7 +440,7 @@ qemuBackupDiskPrepareOneStorage(virDomainObj *vm,
|
|||
|
||||
if (virStorageSourceCreate(dd->store) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("failed to create image file '%s'"),
|
||||
_("failed to create image file '%1$s'"),
|
||||
NULLSTR(dd->store->path));
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -44,7 +44,7 @@ qemuBlockNodeNameValidate(const char *nn)
|
|||
|
||||
if (strlen(nn) >= qemuBlockNodeNameBufSize) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("node-name '%s' too long for qemu"), nn);
|
||||
_("node-name '%1$s' too long for qemu"), nn);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -80,7 +80,7 @@ qemuBlockStorageSourceGetURI(virStorageSource *src)
|
|||
|
||||
if (src->nhosts != 1) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("protocol '%s' accepts only one host"),
|
||||
_("protocol '%1$s' accepts only one host"),
|
||||
virStorageNetProtocolTypeToString(src->protocol));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -153,7 +153,7 @@ qemuBlockStorageSourceBuildJSONSocketAddress(virStorageNetHostDef *host)
|
|||
case VIR_STORAGE_NET_HOST_TRANS_RDMA:
|
||||
case VIR_STORAGE_NET_HOST_TRANS_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("transport protocol '%s' is not yet supported"),
|
||||
_("transport protocol '%1$s' is not yet supported"),
|
||||
virStorageNetHostTransportTypeToString(host->transport));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -469,7 +469,7 @@ qemuBlockStorageSourceGetISCSIProps(virStorageSource *src,
|
|||
*(lunStr++) = '\0';
|
||||
if (virStrToLong_ui(lunStr, NULL, 10, &lun) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("cannot parse target for lunStr '%s'"),
|
||||
_("cannot parse target for lunStr '%1$s'"),
|
||||
target);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -880,7 +880,7 @@ qemuBlockStorageSourceGetBackendProps(virStorageSource *src,
|
|||
|
||||
case VIR_STORAGE_TYPE_VOLUME:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("storage source pool '%s' volume '%s' is not translated"),
|
||||
_("storage source pool '%1$s' volume '%2$s' is not translated"),
|
||||
src->srcpool->pool, src->srcpool->volume);
|
||||
return NULL;
|
||||
|
||||
|
@ -1226,7 +1226,7 @@ qemuBlockStorageSourceGetBlockdevFormatProps(virStorageSource *src)
|
|||
case VIR_STORAGE_FILE_ISO:
|
||||
case VIR_STORAGE_FILE_DIR:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("mishandled storage format '%s'"),
|
||||
_("mishandled storage format '%1$s'"),
|
||||
virStorageFileFormatTypeToString(src->format));
|
||||
return NULL;
|
||||
|
||||
|
@ -1285,7 +1285,7 @@ qemuBlockStorageSourceGetBlockdevProps(virStorageSource *src,
|
|||
} else {
|
||||
if (virStorageSourceIsBacking(backingStore)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("storage format '%s' does not support backing store"),
|
||||
_("storage format '%1$s' does not support backing store"),
|
||||
virStorageFileFormatTypeToString(src->format));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -2231,7 +2231,7 @@ qemuBlockStorageSourceCreateGetFormatProps(virStorageSource *src,
|
|||
case VIR_STORAGE_FILE_AUTO:
|
||||
case VIR_STORAGE_FILE_NONE:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("mishandled storage format '%s'"),
|
||||
_("mishandled storage format '%1$s'"),
|
||||
virStorageFileFormatTypeToString(src->format));
|
||||
return -1;
|
||||
|
||||
|
@ -2385,7 +2385,7 @@ qemuBlockStorageSourceCreateGeneric(virDomainObj *vm,
|
|||
_("blockdev-create job was cancelled"));
|
||||
} else {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("failed to format image: '%s'"), NULLSTR(job->errmsg));
|
||||
_("failed to format image: '%1$s'"), NULLSTR(job->errmsg));
|
||||
}
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -2454,7 +2454,7 @@ qemuBlockStorageSourceCreateFormat(virDomainObj *vm,
|
|||
|
||||
if (!createformatprops) {
|
||||
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
||||
_("can't create storage format '%s'"),
|
||||
_("can't create storage format '%1$s'"),
|
||||
virStorageFileFormatTypeToString(src->format));
|
||||
return -1;
|
||||
}
|
||||
|
@ -2585,7 +2585,7 @@ qemuBlockStorageSourceCreateDetectSize(GHashTable *blockNamedNodeData,
|
|||
|
||||
if (!(entry = virHashLookup(blockNamedNodeData, templ->nodeformat))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("failed to update capacity data for block node '%s'"),
|
||||
_("failed to update capacity data for block node '%1$s'"),
|
||||
templ->nodeformat);
|
||||
return -1;
|
||||
}
|
||||
|
@ -3315,7 +3315,7 @@ qemuBlockCommit(virDomainObj *vm,
|
|||
|
||||
if (virStorageSourceIsEmpty(disk->src)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("disk %s has no source file to be committed"),
|
||||
_("disk %1$s has no source file to be committed"),
|
||||
disk->dst);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -3330,20 +3330,20 @@ qemuBlockCommit(virDomainObj *vm,
|
|||
/* XXX Should we auto-pivot when COMMIT_ACTIVE is not specified? */
|
||||
if (!(flags & VIR_DOMAIN_BLOCK_COMMIT_ACTIVE)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("commit of '%s' active layer requires active flag"),
|
||||
_("commit of '%1$s' active layer requires active flag"),
|
||||
disk->dst);
|
||||
return NULL;
|
||||
}
|
||||
} else if (flags & VIR_DOMAIN_BLOCK_COMMIT_ACTIVE) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("active commit requested but '%s' is not active"),
|
||||
_("active commit requested but '%1$s' is not active"),
|
||||
topSource->path);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (!virStorageSourceHasBacking(topSource)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("top '%s' in chain for '%s' has no backing file"),
|
||||
_("top '%1$s' in chain for '%2$s' has no backing file"),
|
||||
topSource->path, disk->src->path);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -3351,8 +3351,7 @@ qemuBlockCommit(virDomainObj *vm,
|
|||
if ((flags & VIR_DOMAIN_BLOCK_COMMIT_SHALLOW) &&
|
||||
baseSource != topSource->backingStore) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("base '%s' is not immediately below '%s' in chain "
|
||||
"for '%s'"),
|
||||
_("base '%1$s' is not immediately below '%2$s' in chain for '%3$s'"),
|
||||
baseSource->path, topSource->path, disk->src->path);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -3481,7 +3480,7 @@ qemuBlockPivot(virDomainObj *vm,
|
|||
|
||||
if (job->state != QEMU_BLOCKJOB_STATE_READY) {
|
||||
virReportError(VIR_ERR_BLOCK_COPY_ACTIVE,
|
||||
_("block job '%s' not ready for pivot yet"),
|
||||
_("block job '%1$s' not ready for pivot yet"),
|
||||
job->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -3490,7 +3489,7 @@ qemuBlockPivot(virDomainObj *vm,
|
|||
case QEMU_BLOCKJOB_TYPE_NONE:
|
||||
case QEMU_BLOCKJOB_TYPE_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("invalid job type '%d'"), job->type);
|
||||
_("invalid job type '%1$d'"), job->type);
|
||||
return -1;
|
||||
|
||||
case QEMU_BLOCKJOB_TYPE_PULL:
|
||||
|
@ -3500,7 +3499,7 @@ qemuBlockPivot(virDomainObj *vm,
|
|||
case QEMU_BLOCKJOB_TYPE_CREATE:
|
||||
case QEMU_BLOCKJOB_TYPE_BROKEN:
|
||||
virReportError(VIR_ERR_OPERATION_INVALID,
|
||||
_("job type '%s' does not support pivot"),
|
||||
_("job type '%1$s' does not support pivot"),
|
||||
qemuBlockjobTypeToString(job->type));
|
||||
return -1;
|
||||
|
||||
|
|
|
@ -175,7 +175,7 @@ qemuBlockJobRegister(qemuBlockJobData *job,
|
|||
|
||||
if (disk && QEMU_DOMAIN_DISK_PRIVATE(disk)->blockjob) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("disk '%s' has a blockjob assigned"), disk->dst);
|
||||
_("disk '%1$s' has a blockjob assigned"), disk->dst);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
|
|
@ -1811,7 +1811,7 @@ int virQEMUCapsGetDefaultVersion(virCaps *caps,
|
|||
VIR_DOMAIN_OSTYPE_HVM, hostarch, VIR_DOMAIN_VIRT_NONE,
|
||||
NULL, NULL))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Cannot find suitable emulator for %s"),
|
||||
_("Cannot find suitable emulator for %1$s"),
|
||||
virArchToString(hostarch));
|
||||
return -1;
|
||||
}
|
||||
|
@ -3669,8 +3669,7 @@ virQEMUCapsInitCPUModelS390(virQEMUCaps *qemuCaps,
|
|||
if (!modelInfo) {
|
||||
if (type == VIR_DOMAIN_VIRT_KVM) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing host CPU model info from QEMU "
|
||||
"capabilities for binary %s"),
|
||||
_("missing host CPU model info from QEMU capabilities for binary %1$s"),
|
||||
qemuCaps->binary);
|
||||
return -1;
|
||||
}
|
||||
|
@ -4038,8 +4037,7 @@ virQEMUCapsLoadHostCPUModelInfo(virQEMUCapsAccel *caps,
|
|||
prop->value.string = virXMLPropString(ctxt->node, "value");
|
||||
if (!prop->value.string) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("invalid string value for '%s' host CPU "
|
||||
"model property in QEMU capabilities cache"),
|
||||
_("invalid string value for '%1$s' host CPU model property in QEMU capabilities cache"),
|
||||
prop->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -4049,8 +4047,7 @@ virQEMUCapsLoadHostCPUModelInfo(virQEMUCapsAccel *caps,
|
|||
if (virXPathLongLong("string(./@value)", ctxt,
|
||||
&prop->value.number) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("invalid number value for '%s' host CPU "
|
||||
"model property in QEMU capabilities cache"),
|
||||
_("invalid number value for '%1$s' host CPU model property in QEMU capabilities cache"),
|
||||
prop->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -4109,7 +4106,7 @@ virQEMUCapsLoadCPUModels(virArch arch,
|
|||
if ((strUsable = virXMLPropString(nodes[i], "usable")) &&
|
||||
(usable = virDomainCapsCPUUsableTypeFromString(strUsable)) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown value '%s' in attribute 'usable'"),
|
||||
_("unknown value '%1$s' in attribute 'usable'"),
|
||||
strUsable);
|
||||
return -1;
|
||||
}
|
||||
|
@ -4461,7 +4458,7 @@ virQEMUCapsParseHypervCapabilities(virQEMUCaps *qemuCaps,
|
|||
|
||||
if ((val = virDomainHypervTypeFromString(name)) < 0) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("unsupported HyperV Enlightenment feature: %s"),
|
||||
_("unsupported HyperV Enlightenment feature: %1$s"),
|
||||
name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -4501,7 +4498,7 @@ virQEMUCapsParseFlags(virQEMUCaps *qemuCaps, xmlXPathContextPtr ctxt)
|
|||
flag = virQEMUCapsTypeFromString(str);
|
||||
if (flag < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown qemu capabilities flag %s"), str);
|
||||
_("Unknown qemu capabilities flag %1$s"), str);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -4601,7 +4598,7 @@ virQEMUCapsValidateEmulator(virQEMUCaps *qemuCaps, xmlXPathContextPtr ctxt)
|
|||
|
||||
if (STRNEQ(str, qemuCaps->binary)) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Expected caps for '%s' but saw '%s'"),
|
||||
_("Expected caps for '%1$s' but saw '%2$s'"),
|
||||
qemuCaps->binary, str);
|
||||
return -1;
|
||||
}
|
||||
|
@ -4622,7 +4619,7 @@ virQEMUCapsValidateArch(virQEMUCaps *qemuCaps, xmlXPathContextPtr ctxt)
|
|||
}
|
||||
if (!(qemuCaps->arch = virArchFromString(str))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown arch %s in QEMU capabilities cache"), str);
|
||||
_("unknown arch %1$s in QEMU capabilities cache"), str);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -5132,7 +5129,7 @@ virQEMUCapsSaveFile(void *data,
|
|||
|
||||
if (virFileWriteStr(filename, xml, 0600) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Failed to save '%s' for '%s'"),
|
||||
_("Failed to save '%1$s' for '%2$s'"),
|
||||
filename, qemuCaps->binary);
|
||||
return -1;
|
||||
}
|
||||
|
@ -5263,7 +5260,7 @@ virQEMUCapsKVMUsable(virQEMUCapsCachePriv *priv)
|
|||
if (stat(kvm_device, &sb) < 0) {
|
||||
if (errno != ENOENT) {
|
||||
virReportSystemError(errno,
|
||||
_("Failed to stat %s"), kvm_device);
|
||||
_("Failed to stat %1$s"), kvm_device);
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
@ -5460,7 +5457,7 @@ virQEMUCapsInitQMPArch(virQEMUCaps *qemuCaps,
|
|||
|
||||
if ((qemuCaps->arch = virQEMUCapsArchFromString(archstr)) == VIR_ARCH_NONE) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown QEMU arch %s"), archstr);
|
||||
_("Unknown QEMU arch %1$s"), archstr);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -5605,7 +5602,7 @@ virQEMUCapsInitQMPMonitor(virQEMUCaps *qemuCaps,
|
|||
if (major < QEMU_MIN_MAJOR ||
|
||||
(major == QEMU_MIN_MAJOR && minor < QEMU_MIN_MINOR)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("QEMU version >= %d.%d.%d is required, but %d.%d.%d found"),
|
||||
_("QEMU version >= %1$d.%2$d.%3$d is required, but %4$d.%5$d.%6$d found"),
|
||||
QEMU_MIN_MAJOR, QEMU_MIN_MINOR, QEMU_MIN_MICRO,
|
||||
major, minor, micro);
|
||||
return -1;
|
||||
|
@ -5706,7 +5703,7 @@ virQEMUCapsLogProbeFailure(const char *binary)
|
|||
VIR_LOG_WARN,
|
||||
__FILE__, __LINE__, __func__,
|
||||
meta,
|
||||
_("Failed to probe capabilities for %s: %s"),
|
||||
_("Failed to probe capabilities for %1$s: %2$s"),
|
||||
binary, virGetLastErrorMessage());
|
||||
}
|
||||
|
||||
|
@ -5781,7 +5778,7 @@ virQEMUCapsNewForBinaryInternal(virArch hostArch,
|
|||
/* We would also want to check faccessat if we cared about ACLs,
|
||||
* but we don't. */
|
||||
if (stat(binary, &sb) < 0) {
|
||||
virReportSystemError(errno, _("Cannot check QEMU binary %s"),
|
||||
virReportSystemError(errno, _("Cannot check QEMU binary %1$s"),
|
||||
binary);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -5792,14 +5789,14 @@ virQEMUCapsNewForBinaryInternal(virArch hostArch,
|
|||
* in a sub-process so it's hard to feed back a useful error.
|
||||
*/
|
||||
if (!virFileIsExecutable(binary)) {
|
||||
virReportSystemError(errno, _("QEMU binary %s is not executable"),
|
||||
virReportSystemError(errno, _("QEMU binary %1$s is not executable"),
|
||||
binary);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (virFileExists(QEMU_MODDIR)) {
|
||||
if (stat(QEMU_MODDIR, &sb) < 0) {
|
||||
virReportSystemError(errno, _("Cannot check QEMU module directory %s"),
|
||||
virReportSystemError(errno, _("Cannot check QEMU module directory %1$s"),
|
||||
QEMU_MODDIR);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -6040,14 +6037,14 @@ virQEMUCapsCacheLookupDefault(virFileCache *cache,
|
|||
if (virttypeStr &&
|
||||
(virttype = virDomainVirtTypeFromString(virttypeStr)) < 0) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("unknown virttype: %s"), virttypeStr);
|
||||
_("unknown virttype: %1$s"), virttypeStr);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (archStr &&
|
||||
(arch = virArchFromString(archStr)) == VIR_ARCH_NONE) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("unknown architecture: %s"), archStr);
|
||||
_("unknown architecture: %1$s"), archStr);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -6057,7 +6054,7 @@ virQEMUCapsCacheLookupDefault(virFileCache *cache,
|
|||
}
|
||||
if (!binary) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("unable to find any emulator to serve '%s' architecture"),
|
||||
_("unable to find any emulator to serve '%1$s' architecture"),
|
||||
archStr);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -6073,8 +6070,7 @@ virQEMUCapsCacheLookupDefault(virFileCache *cache,
|
|||
(ARCH_IS_ARM(arch) && ARCH_IS_ARM(arch_from_caps)) ||
|
||||
(ARCH_IS_S390(arch) && ARCH_IS_S390(arch_from_caps)))) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("architecture from emulator '%s' doesn't "
|
||||
"match given architecture '%s'"),
|
||||
_("architecture from emulator '%1$s' doesn't match given architecture '%2$s'"),
|
||||
virArchToString(arch_from_caps),
|
||||
virArchToString(arch));
|
||||
return NULL;
|
||||
|
@ -6087,7 +6083,7 @@ virQEMUCapsCacheLookupDefault(virFileCache *cache,
|
|||
|
||||
if (virQEMUCapsTypeIsAccelerated(virttype) && capsType == VIR_DOMAIN_VIRT_QEMU) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("the accel '%s' is not supported by '%s' on this host"),
|
||||
_("the accel '%1$s' is not supported by '%2$s' on this host"),
|
||||
virQEMUCapsAccelStr(virttype), binary);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -6098,7 +6094,7 @@ virQEMUCapsCacheLookupDefault(virFileCache *cache,
|
|||
|
||||
if (!virQEMUCapsIsMachineSupported(qemuCaps, virttype, machine)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("the machine '%s' is not supported by emulator '%s'"),
|
||||
_("the machine '%1$s' is not supported by emulator '%2$s'"),
|
||||
machine, binary);
|
||||
return NULL;
|
||||
}
|
||||
|
|
|
@ -171,7 +171,7 @@ qemuSetupImagePathCgroup(virDomainObj *vm,
|
|||
if (virDevMapperGetTargets(path, &targetPaths) < 0 &&
|
||||
errno != ENOSYS) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to get devmapper targets for %s"),
|
||||
_("Unable to get devmapper targets for %1$s"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -865,7 +865,7 @@ qemuSetupCgroupAppid(virDomainObj *vm)
|
|||
|
||||
if (virFileWriteStr(path, appid, 0) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to write '%s' to '%s'"), appid, path);
|
||||
_("Unable to write '%1$s' to '%2$s'"), appid, path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
|
|
@ -87,7 +87,7 @@ qemuCheckpointObjFromName(virDomainObj *vm,
|
|||
chk = virDomainCheckpointFindByName(vm->checkpoints, name);
|
||||
if (!chk)
|
||||
virReportError(VIR_ERR_NO_DOMAIN_CHECKPOINT,
|
||||
_("no domain checkpoint with matching name '%s'"),
|
||||
_("no domain checkpoint with matching name '%1$s'"),
|
||||
name);
|
||||
|
||||
return chk;
|
||||
|
@ -121,7 +121,7 @@ qemuCheckpointWriteMetadata(virDomainObj *vm,
|
|||
|
||||
chkDir = g_strdup_printf("%s/%s", checkpointDir, vm->def->name);
|
||||
if (g_mkdir_with_parents(chkDir, 0777) < 0) {
|
||||
virReportSystemError(errno, _("cannot create checkpoint directory '%s'"),
|
||||
virReportSystemError(errno, _("cannot create checkpoint directory '%1$s'"),
|
||||
chkDir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -164,7 +164,7 @@ qemuCheckpointDiscardDiskBitmaps(virStorageSource *src,
|
|||
|
||||
if (!found) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("bitmap '%s' not found in backing chain of '%s'"),
|
||||
_("bitmap '%1$s' not found in backing chain of '%2$s'"),
|
||||
delbitmap, diskdst);
|
||||
return -1;
|
||||
}
|
||||
|
@ -205,7 +205,7 @@ qemuCheckpointDiscardBitmaps(virDomainObj *vm,
|
|||
|
||||
if (!chkdisk->bitmap) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("missing bitmap name for disk '%s' of checkpoint '%s'"),
|
||||
_("missing bitmap name for disk '%1$s' of checkpoint '%2$s'"),
|
||||
chkdisk->name, chkdef->parent.name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -357,15 +357,14 @@ qemuCheckpointPrepare(virQEMUDriver *driver,
|
|||
|
||||
if (STRNEQ(disk->bitmap, def->parent.name)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("bitmap for disk '%s' must match checkpoint name '%s'"),
|
||||
_("bitmap for disk '%1$s' must match checkpoint name '%2$s'"),
|
||||
disk->name, def->parent.name);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (vm->def->disks[i]->src->format != VIR_STORAGE_FILE_QCOW2) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("checkpoint for disk %s unsupported "
|
||||
"for storage type %s"),
|
||||
_("checkpoint for disk %1$s unsupported for storage type %2$s"),
|
||||
disk->name,
|
||||
virStorageFileFormatTypeToString(
|
||||
vm->def->disks[i]->src->format));
|
||||
|
@ -431,7 +430,7 @@ qemuCheckpointRedefineValidateBitmaps(virDomainObj *vm,
|
|||
if (!qemuBlockBitmapChainIsValid(domdisk->src, chkdef->parent.name,
|
||||
blockNamedNodeData)) {
|
||||
virReportError(VIR_ERR_CHECKPOINT_INCONSISTENT,
|
||||
_("missing or broken bitmap '%s' for disk '%s'"),
|
||||
_("missing or broken bitmap '%1$s' for disk '%2$s'"),
|
||||
chkdef->parent.name, domdisk->dst);
|
||||
return -1;
|
||||
}
|
||||
|
@ -547,7 +546,7 @@ qemuCheckpointCreateFinalize(virQEMUDriver *driver,
|
|||
/* if writing of metadata fails, error out rather than trying
|
||||
* to silently carry on without completing the checkpoint */
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to save metadata for checkpoint %s"),
|
||||
_("unable to save metadata for checkpoint %1$s"),
|
||||
chk->def->name);
|
||||
qemuCheckpointRollbackMetadata(vm, chk);
|
||||
return -1;
|
||||
|
@ -889,7 +888,7 @@ qemuCheckpointDelete(virDomainObj *vm,
|
|||
driver->xmlopt,
|
||||
cfg->checkpointDir) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("failed to set checkpoint '%s' as current"),
|
||||
_("failed to set checkpoint '%1$s' as current"),
|
||||
chk->def->name);
|
||||
virDomainCheckpointSetCurrent(vm->checkpoints, NULL);
|
||||
goto endjob;
|
||||
|
|
|
@ -546,8 +546,7 @@ virQEMUDriverConfigLoadRemoteDisplayEntry(virQEMUDriverConfig *cfg,
|
|||
* to tell to vnc (usually subtract 5700, e.g. localhost:1
|
||||
* for port 5701) */
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: remote_websocket_port_min: port must be greater "
|
||||
"than or equal to %d"),
|
||||
_("%1$s: remote_websocket_port_min: port must be greater than or equal to %2$d"),
|
||||
filename, QEMU_WEBSOCKET_PORT_MIN);
|
||||
return -1;
|
||||
}
|
||||
|
@ -557,16 +556,15 @@ virQEMUDriverConfigLoadRemoteDisplayEntry(virQEMUDriverConfig *cfg,
|
|||
if (cfg->webSocketPortMax > QEMU_WEBSOCKET_PORT_MAX ||
|
||||
cfg->webSocketPortMax < cfg->webSocketPortMin) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: remote_websocket_port_max: port must be between "
|
||||
"the minimal port and %d"),
|
||||
_("%1$s: remote_websocket_port_max: port must be between the minimal port and %2$d"),
|
||||
filename, QEMU_WEBSOCKET_PORT_MAX);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (cfg->webSocketPortMin > cfg->webSocketPortMax) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: remote_websocket_port_min: min port must not be "
|
||||
"greater than max port"), filename);
|
||||
_("%1$s: remote_websocket_port_min: min port must not be greater than max port"),
|
||||
filename);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -577,8 +575,7 @@ virQEMUDriverConfigLoadRemoteDisplayEntry(virQEMUDriverConfig *cfg,
|
|||
* to tell to vnc (usually subtract 5900, e.g. localhost:1
|
||||
* for port 5901) */
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: remote_display_port_min: port must be greater "
|
||||
"than or equal to %d"),
|
||||
_("%1$s: remote_display_port_min: port must be greater than or equal to %2$d"),
|
||||
filename, QEMU_REMOTE_PORT_MIN);
|
||||
return -1;
|
||||
}
|
||||
|
@ -588,16 +585,15 @@ virQEMUDriverConfigLoadRemoteDisplayEntry(virQEMUDriverConfig *cfg,
|
|||
if (cfg->remotePortMax > QEMU_REMOTE_PORT_MAX ||
|
||||
cfg->remotePortMax < cfg->remotePortMin) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: remote_display_port_max: port must be between "
|
||||
"the minimal port and %d"),
|
||||
_("%1$s: remote_display_port_max: port must be between the minimal port and %2$d"),
|
||||
filename, QEMU_REMOTE_PORT_MAX);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (cfg->remotePortMin > cfg->remotePortMax) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: remote_display_port_min: min port must not be "
|
||||
"greater than max port"), filename);
|
||||
_("%1$s: remote_display_port_min: min port must not be greater than max port"),
|
||||
filename);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -686,7 +682,7 @@ virQEMUDriverConfigLoadProcessEntry(virQEMUDriverConfig *cfg,
|
|||
cfg->maxCore = ULLONG_MAX;
|
||||
} else {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unknown core size '%s'"),
|
||||
_("Unknown core size '%1$s'"),
|
||||
corestr);
|
||||
return -1;
|
||||
}
|
||||
|
@ -705,7 +701,7 @@ virQEMUDriverConfigLoadProcessEntry(virQEMUDriverConfig *cfg,
|
|||
cfg->stdioLogD = false;
|
||||
} else {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unknown stdio handler %s"),
|
||||
_("Unknown stdio handler %1$s"),
|
||||
stdioHandler);
|
||||
return -1;
|
||||
}
|
||||
|
@ -718,7 +714,7 @@ virQEMUDriverConfigLoadProcessEntry(virQEMUDriverConfig *cfg,
|
|||
|
||||
if (val < 0) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unknown sched_core value %s"),
|
||||
_("Unknown sched_core value %1$s"),
|
||||
schedCore);
|
||||
return -1;
|
||||
}
|
||||
|
@ -794,7 +790,7 @@ virQEMUDriverConfigLoadNetworkEntry(virQEMUDriverConfig *cfg,
|
|||
return -1;
|
||||
if (cfg->migrationPortMin <= 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: migration_port_min: port must be greater than 0"),
|
||||
_("%1$s: migration_port_min: port must be greater than 0"),
|
||||
filename);
|
||||
return -1;
|
||||
}
|
||||
|
@ -804,8 +800,7 @@ virQEMUDriverConfigLoadNetworkEntry(virQEMUDriverConfig *cfg,
|
|||
if (cfg->migrationPortMax > 65535 ||
|
||||
cfg->migrationPortMax < cfg->migrationPortMin) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("%s: migration_port_max: port must be between "
|
||||
"the minimal port %d and 65535"),
|
||||
_("%1$s: migration_port_max: port must be between the minimal port %2$d and 65535"),
|
||||
filename, cfg->migrationPortMin);
|
||||
return -1;
|
||||
}
|
||||
|
@ -817,8 +812,7 @@ virQEMUDriverConfigLoadNetworkEntry(virQEMUDriverConfig *cfg,
|
|||
(STRPREFIX(cfg->migrateHost, "localhost") ||
|
||||
virSocketAddrIsNumericLocalhost(cfg->migrateHost))) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("migration_host must not be the address of"
|
||||
" the local machine: %s"),
|
||||
_("migration_host must not be the address of the local machine: %1$s"),
|
||||
cfg->migrateHost);
|
||||
return -1;
|
||||
}
|
||||
|
@ -830,8 +824,7 @@ virQEMUDriverConfigLoadNetworkEntry(virQEMUDriverConfig *cfg,
|
|||
(STRPREFIX(cfg->migrationAddress, "localhost") ||
|
||||
virSocketAddrIsNumericLocalhost(cfg->migrationAddress))) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("migration_address must not be the address of"
|
||||
" the local machine: %s"),
|
||||
_("migration_address must not be the address of the local machine: %1$s"),
|
||||
cfg->migrationAddress);
|
||||
return -1;
|
||||
}
|
||||
|
@ -923,7 +916,7 @@ virQEMUDriverConfigLoadSecurityEntry(virQEMUDriverConfig *cfg,
|
|||
if (STREQ(cfg->securityDriverNames[i],
|
||||
cfg->securityDriverNames[j])) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("Duplicate security driver %s"),
|
||||
_("Duplicate security driver %1$s"),
|
||||
cfg->securityDriverNames[i]);
|
||||
return -1;
|
||||
}
|
||||
|
@ -961,7 +954,7 @@ virQEMUDriverConfigLoadSecurityEntry(virQEMUDriverConfig *cfg,
|
|||
int ctl;
|
||||
if ((ctl = virCgroupControllerTypeFromString(controllers[i])) < 0) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("Unknown cgroup controller '%s'"),
|
||||
_("Unknown cgroup controller '%1$s'"),
|
||||
controllers[i]);
|
||||
return -1;
|
||||
}
|
||||
|
@ -987,7 +980,7 @@ virQEMUDriverConfigLoadSecurityEntry(virQEMUDriverConfig *cfg,
|
|||
|
||||
if (ns < 0) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("Unknown namespace: %s"),
|
||||
_("Unknown namespace: %1$s"),
|
||||
namespaces[i]);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1000,14 +993,14 @@ virQEMUDriverConfigLoadSecurityEntry(virQEMUDriverConfig *cfg,
|
|||
|
||||
if (!qemuDomainNamespaceAvailable(ns)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("%s namespace is not available"),
|
||||
_("%1$s namespace is not available"),
|
||||
namespaces[i]);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (virBitmapSetBit(cfg->namespaces, ns) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to enable namespace: %s"),
|
||||
_("Unable to enable namespace: %1$s"),
|
||||
namespaces[i]);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1158,8 +1151,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->defaultTLSx509certdirPresent) {
|
||||
if (!virFileExists(cfg->defaultTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("default_tls_x509_cert_dir directory '%s' "
|
||||
"does not exist"),
|
||||
_("default_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->defaultTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1168,7 +1160,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->vncTLSx509certdir &&
|
||||
!virFileExists(cfg->vncTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("vnc_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("vnc_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->vncTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1176,7 +1168,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->spiceTLSx509certdir &&
|
||||
!virFileExists(cfg->spiceTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("spice_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("spice_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->spiceTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1184,7 +1176,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->chardevTLSx509certdir &&
|
||||
!virFileExists(cfg->chardevTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("chardev_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("chardev_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->chardevTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1192,7 +1184,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->migrateTLSx509certdir &&
|
||||
!virFileExists(cfg->migrateTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("migrate_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("migrate_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->migrateTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1200,7 +1192,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->backupTLSx509certdir &&
|
||||
!virFileExists(cfg->backupTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("backup_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("backup_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->backupTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1208,7 +1200,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->vxhsTLSx509certdir &&
|
||||
!virFileExists(cfg->vxhsTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("vxhs_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("vxhs_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->vxhsTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1216,7 +1208,7 @@ virQEMUDriverConfigValidate(virQEMUDriverConfig *cfg)
|
|||
if (cfg->nbdTLSx509certdir &&
|
||||
!virFileExists(cfg->nbdTLSx509certdir)) {
|
||||
virReportError(VIR_ERR_CONF_SYNTAX,
|
||||
_("nbd_tls_x509_cert_dir directory '%s' does not exist"),
|
||||
_("nbd_tls_x509_cert_dir directory '%1$s' does not exist"),
|
||||
cfg->nbdTLSx509certdir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1457,21 +1449,21 @@ virQEMUDriverGetDomainCapabilities(virQEMUDriver *driver,
|
|||
|
||||
if (!virQEMUCapsIsArchSupported(qemuCaps, arch)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("Emulator '%s' does not support arch '%s'"),
|
||||
_("Emulator '%1$s' does not support arch '%2$s'"),
|
||||
path, virArchToString(arch));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (!virQEMUCapsIsVirtTypeSupported(qemuCaps, virttype)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("Emulator '%s' does not support virt type '%s'"),
|
||||
_("Emulator '%1$s' does not support virt type '%2$s'"),
|
||||
path, virDomainVirtTypeToString(virttype));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
if (!virQEMUCapsIsMachineSupported(qemuCaps, virttype, machine)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Emulator '%s' does not support machine type '%s'"),
|
||||
_("Emulator '%1$s' does not support machine type '%2$s'"),
|
||||
path, NULLSTR(machine));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1567,8 +1559,7 @@ qemuGetDomainHupageMemPath(virQEMUDriver *driver,
|
|||
|
||||
if (i == cfg->nhugetlbfs) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to find any usable hugetlbfs "
|
||||
"mount for %llu KiB"),
|
||||
_("Unable to find any usable hugetlbfs mount for %1$llu KiB"),
|
||||
pagesize);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1652,7 +1643,7 @@ qemuHugepageMakeBasedir(virQEMUDriver *driver,
|
|||
|
||||
if (g_mkdir_with_parents(hugepagePath, 0777) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("unable to create hugepage path %s"),
|
||||
_("unable to create hugepage path %1$s"),
|
||||
hugepagePath);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -190,7 +190,7 @@ qemuDBusStart(virQEMUDriver *driver,
|
|||
|
||||
if (!virFileIsExecutable(cfg->dbusDaemonName)) {
|
||||
virReportSystemError(errno,
|
||||
_("'%s' is not a suitable dbus-daemon"),
|
||||
_("'%1$s' is not a suitable dbus-daemon"),
|
||||
cfg->dbusDaemonName);
|
||||
return -1;
|
||||
}
|
||||
|
@ -203,7 +203,7 @@ qemuDBusStart(virQEMUDriver *driver,
|
|||
sockpath = qemuDBusCreateSocketPath(cfg, shortName);
|
||||
|
||||
if (qemuDBusWriteConfig(configfile, sockpath) < 0) {
|
||||
virReportSystemError(errno, _("Failed to write '%s'"), configfile);
|
||||
virReportSystemError(errno, _("Failed to write '%1$s'"), configfile);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -222,7 +222,7 @@ qemuDBusStart(virQEMUDriver *driver,
|
|||
|
||||
if (virPidFileReadPath(pidfile, &cpid) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("dbus-daemon %s didn't show up"),
|
||||
_("dbus-daemon %1$s didn't show up"),
|
||||
cfg->dbusDaemonName);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -240,11 +240,11 @@ qemuDBusStart(virQEMUDriver *driver,
|
|||
|
||||
if (saferead(errfd, errbuf, sizeof(errbuf) - 1) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("dbus-daemon %s died unexpectedly"),
|
||||
_("dbus-daemon %1$s died unexpectedly"),
|
||||
cfg->dbusDaemonName);
|
||||
} else {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("dbus-daemon died and reported: %s"), errbuf);
|
||||
_("dbus-daemon died and reported: %1$s"), errbuf);
|
||||
}
|
||||
|
||||
goto cleanup;
|
||||
|
@ -252,7 +252,7 @@ qemuDBusStart(virQEMUDriver *driver,
|
|||
|
||||
if (!virFileExists(sockpath)) {
|
||||
virReportError(VIR_ERR_OPERATION_TIMEOUT,
|
||||
_("DBus daemon %s didn't show up"),
|
||||
_("DBus daemon %1$s didn't show up"),
|
||||
cfg->dbusDaemonName);
|
||||
goto cleanup;
|
||||
}
|
||||
|
|
|
@ -68,7 +68,7 @@ qemuDomainGetSCSIControllerModel(const virDomainDef *def,
|
|||
return VIR_DOMAIN_CONTROLLER_MODEL_SCSI_NCR53C90;
|
||||
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to determine model for SCSI controller idx=%d"),
|
||||
_("Unable to determine model for SCSI controller idx=%1$d"),
|
||||
cont->idx);
|
||||
return -1;
|
||||
}
|
||||
|
@ -116,7 +116,7 @@ qemuDomainFindSCSIControllerModel(const virDomainDef *def,
|
|||
|
||||
if (!(cont = virDomainDeviceFindSCSIController(def, &info->addr.drive))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to find a SCSI controller for idx=%d"),
|
||||
_("unable to find a SCSI controller for idx=%1$d"),
|
||||
info->addr.drive.controller);
|
||||
return -1;
|
||||
}
|
||||
|
@ -207,7 +207,7 @@ qemuDomainAssignSpaprVIOAddress(virDomainDef *def,
|
|||
while (ret != 0) {
|
||||
if (user_reg) {
|
||||
virReportError(VIR_ERR_XML_ERROR,
|
||||
_("spapr-vio address %#llx already in use"),
|
||||
_("spapr-vio address %1$#llx already in use"),
|
||||
info->addr.spaprvio.reg);
|
||||
return -EEXIST;
|
||||
}
|
||||
|
@ -1710,8 +1710,8 @@ qemuDomainPCIAddressSetCreate(virDomainDef *def,
|
|||
|
||||
if (idx >= addrs->nbuses) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Inappropriate new pci controller index %zu "
|
||||
"exceeds addrs array length"), idx);
|
||||
_("Inappropriate new pci controller index %1$zu exceeds addrs array length"),
|
||||
idx);
|
||||
goto error;
|
||||
}
|
||||
|
||||
|
@ -2306,7 +2306,7 @@ qemuDomainAssignDevicePCISlots(virDomainDef *def,
|
|||
|
||||
if (!virDeviceInfoPCIAddressIsWanted(&def->disks[i]->info)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("virtio disk cannot have an address of type '%s'"),
|
||||
_("virtio disk cannot have an address of type '%1$s'"),
|
||||
virDomainDeviceAddressTypeToString(def->disks[i]->info.type));
|
||||
return -1;
|
||||
}
|
||||
|
@ -2807,8 +2807,7 @@ qemuDomainAssignPCIAddresses(virDomainDef *def,
|
|||
if (contIndex < 0) {
|
||||
/* this should never happen - we just added it */
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Could not find auto-added %s controller "
|
||||
"with index %zu"),
|
||||
_("Could not find auto-added %1$s controller with index %2$zu"),
|
||||
virDomainControllerModelPCITypeToString(bus->model),
|
||||
i);
|
||||
goto cleanup;
|
||||
|
@ -2896,10 +2895,7 @@ qemuDomainAssignPCIAddresses(virDomainDef *def,
|
|||
options->busNr = qemuDomainAddressFindNewBusNr(def);
|
||||
if (options->busNr == -1) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("No free busNr lower than current "
|
||||
"lowest busNr is available to "
|
||||
"auto-assign to bus %d. Must be "
|
||||
"manually assigned"),
|
||||
_("No free busNr lower than current lowest busNr is available to auto-assign to bus %1$d. Must be manually assigned"),
|
||||
addr->bus);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -2923,7 +2919,7 @@ qemuDomainAssignPCIAddresses(virDomainDef *def,
|
|||
}
|
||||
if (options->targetIndex == -1) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("No usable target index found for %d"),
|
||||
_("No usable target index found for %1$d"),
|
||||
addr->bus);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -2943,9 +2939,7 @@ qemuDomainAssignPCIAddresses(virDomainDef *def,
|
|||
if (cont->model == VIR_DOMAIN_CONTROLLER_MODEL_PCI_BRIDGE &&
|
||||
idx <= addr->bus) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("PCI controller at index %d (0x%02x) has "
|
||||
"bus='0x%02x', but index must be "
|
||||
"larger than bus"),
|
||||
_("PCI controller at index %1$d (0x%2$02x) has bus='0x%3$02x', but index must be larger than bus"),
|
||||
idx, idx, addr->bus);
|
||||
goto cleanup;
|
||||
}
|
||||
|
|
|
@ -725,7 +725,7 @@ qemuDomainObjPrivateXMLParseJob(virDomainObj *vm,
|
|||
|
||||
if ((type = virDomainJobTypeFromString(tmp)) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown job type %s"), tmp);
|
||||
_("Unknown job type %1$s"), tmp);
|
||||
return -1;
|
||||
}
|
||||
VIR_FREE(tmp);
|
||||
|
@ -738,7 +738,7 @@ qemuDomainObjPrivateXMLParseJob(virDomainObj *vm,
|
|||
|
||||
if ((async = virDomainAsyncJobTypeFromString(tmp)) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown async job type %s"), tmp);
|
||||
_("Unknown async job type %1$s"), tmp);
|
||||
return -1;
|
||||
}
|
||||
VIR_FREE(tmp);
|
||||
|
@ -748,7 +748,7 @@ qemuDomainObjPrivateXMLParseJob(virDomainObj *vm,
|
|||
vm->job->phase = qemuDomainAsyncJobPhaseFromString(async, tmp);
|
||||
if (vm->job->phase < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown job phase %s"), tmp);
|
||||
_("Unknown job phase %1$s"), tmp);
|
||||
return -1;
|
||||
}
|
||||
VIR_FREE(tmp);
|
||||
|
|
|
@ -49,7 +49,7 @@ qemuExtDeviceLogCommand(virQEMUDriver *driver,
|
|||
return -1;
|
||||
|
||||
return qemuDomainLogAppendMessage(driver, vm,
|
||||
_("%s: Starting external device: %s\n%s\n"),
|
||||
_("%1$s: Starting external device: %2$s\n%3$s\n"),
|
||||
timestamp, info, cmds);
|
||||
}
|
||||
|
||||
|
|
|
@ -221,7 +221,7 @@ qemuFDPassTransferMonitor(qemuFDPass *fdpass,
|
|||
for (i = 0; i < fdsets->nfdsets; i++) {
|
||||
if (fdsets->fdsets[i].id == fdpass->fdSetID) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("fdset '%u' is already in use by qemu"),
|
||||
_("fdset '%1$u' is already in use by qemu"),
|
||||
fdpass->fdSetID);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -307,7 +307,7 @@ qemuFirmwareInterfaceParse(const char *path,
|
|||
|
||||
if (!(interfacesJSON = virJSONValueObjectGetArray(doc, "interface-types"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("failed to get interface-types from '%s'"),
|
||||
_("failed to get interface-types from '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -323,7 +323,7 @@ qemuFirmwareInterfaceParse(const char *path,
|
|||
|
||||
if ((tmp = qemuFirmwareOSInterfaceTypeFromString(tmpStr)) <= 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown interface type: '%s'"),
|
||||
_("unknown interface type: '%1$s'"),
|
||||
tmpStr);
|
||||
return -1;
|
||||
}
|
||||
|
@ -351,7 +351,7 @@ qemuFirmwareFlashFileParse(const char *path,
|
|||
|
||||
if (!(filename = virJSONValueObjectGetString(doc, "filename"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'filename' in '%s'"),
|
||||
_("missing 'filename' in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -360,7 +360,7 @@ qemuFirmwareFlashFileParse(const char *path,
|
|||
|
||||
if (!(format = virJSONValueObjectGetString(doc, "format"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'format' in '%s'"),
|
||||
_("missing 'format' in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -394,7 +394,7 @@ qemuFirmwareMappingFlashParse(const char *path,
|
|||
modeval = qemuFirmwareFlashModeTypeFromString(modestr);
|
||||
if (modeval < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Firmware flash mode value '%s' unexpected"),
|
||||
_("Firmware flash mode value '%1$s' unexpected"),
|
||||
modestr);
|
||||
return -1;
|
||||
}
|
||||
|
@ -403,7 +403,7 @@ qemuFirmwareMappingFlashParse(const char *path,
|
|||
|
||||
if (!(executable = virJSONValueObjectGet(doc, "executable"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'executable' in '%s'"),
|
||||
_("missing 'executable' in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -414,7 +414,7 @@ qemuFirmwareMappingFlashParse(const char *path,
|
|||
if (flash->mode == QEMU_FIRMWARE_FLASH_MODE_SPLIT) {
|
||||
if (!(nvram_template = virJSONValueObjectGet(doc, "nvram-template"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'nvram-template' in '%s'"),
|
||||
_("missing 'nvram-template' in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -436,7 +436,7 @@ qemuFirmwareMappingKernelParse(const char *path,
|
|||
|
||||
if (!(filename = virJSONValueObjectGetString(doc, "filename"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'filename' in '%s'"),
|
||||
_("missing 'filename' in '%1$s'"),
|
||||
path);
|
||||
}
|
||||
|
||||
|
@ -455,7 +455,7 @@ qemuFirmwareMappingMemoryParse(const char *path,
|
|||
|
||||
if (!(filename = virJSONValueObjectGetString(doc, "filename"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'filename' in '%s'"),
|
||||
_("missing 'filename' in '%1$s'"),
|
||||
path);
|
||||
}
|
||||
|
||||
|
@ -476,21 +476,21 @@ qemuFirmwareMappingParse(const char *path,
|
|||
|
||||
if (!(mapping = virJSONValueObjectGet(doc, "mapping"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing mapping in '%s'"),
|
||||
_("missing mapping in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (!(deviceStr = virJSONValueObjectGetString(mapping, "device"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing device type in '%s'"),
|
||||
_("missing device type in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if ((tmp = qemuFirmwareDeviceTypeFromString(deviceStr)) <= 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown device type in '%s'"),
|
||||
_("unknown device type in '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -533,7 +533,7 @@ qemuFirmwareTargetParse(const char *path,
|
|||
|
||||
if (!(targetsJSON = virJSONValueObjectGetArray(doc, "targets"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("failed to get targets from '%s'"),
|
||||
_("failed to get targets from '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -554,21 +554,21 @@ qemuFirmwareTargetParse(const char *path,
|
|||
|
||||
if (!(architectureStr = virJSONValueObjectGetString(item, "architecture"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'architecture' in '%s'"),
|
||||
_("missing 'architecture' in '%1$s'"),
|
||||
path);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if ((t->architecture = virQEMUCapsArchFromString(architectureStr)) == VIR_ARCH_NONE) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown architecture '%s'"),
|
||||
_("unknown architecture '%1$s'"),
|
||||
architectureStr);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (!(machines = virJSONValueObjectGetArray(item, "machines"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing 'machines' in '%s'"),
|
||||
_("missing 'machines' in '%1$s'"),
|
||||
path);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -615,7 +615,7 @@ qemuFirmwareFeatureParse(const char *path,
|
|||
|
||||
if (!(featuresJSON = virJSONValueObjectGetArray(doc, "features"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("failed to get features from '%s'"),
|
||||
_("failed to get features from '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -659,7 +659,7 @@ qemuFirmwareParse(const char *path)
|
|||
|
||||
if (!(doc = virJSONValueFromString(cont))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to parse json file '%s'"),
|
||||
_("unable to parse json file '%1$s'"),
|
||||
path);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1732,7 +1732,7 @@ qemuFirmwareFillDomain(virQEMUDriver *driver,
|
|||
loader->format != VIR_STORAGE_FILE_RAW &&
|
||||
loader->format != VIR_STORAGE_FILE_QCOW2) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unsupported loader format '%s'"),
|
||||
_("Unsupported loader format '%1$s'"),
|
||||
virStorageFileFormatTypeToString(loader->format));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1740,7 +1740,7 @@ qemuFirmwareFillDomain(virQEMUDriver *driver,
|
|||
nvram->format != VIR_STORAGE_FILE_RAW &&
|
||||
nvram->format != VIR_STORAGE_FILE_QCOW2) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("Unsupported nvram format '%s'"),
|
||||
_("Unsupported nvram format '%1$s'"),
|
||||
virStorageFileFormatTypeToString(nvram->format));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1771,7 +1771,7 @@ qemuFirmwareFillDomain(virQEMUDriver *driver,
|
|||
return -1;
|
||||
} else {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("Unable to find any firmware to satisfy '%s'"),
|
||||
_("Unable to find any firmware to satisfy '%1$s'"),
|
||||
virDomainOsDefFirmwareTypeToString(def->os.firmware));
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -339,7 +339,7 @@ qemuCreateInBridgePortWithHelper(virQEMUDriverConfig *cfg,
|
|||
}
|
||||
|
||||
if (!virFileIsExecutable(cfg->bridgeHelperName)) {
|
||||
virReportSystemError(errno, _("'%s' is not a suitable bridge helper"),
|
||||
virReportSystemError(errno, _("'%1$s' is not a suitable bridge helper"),
|
||||
cfg->bridgeHelperName);
|
||||
return -1;
|
||||
}
|
||||
|
@ -377,7 +377,7 @@ qemuCreateInBridgePortWithHelper(virQEMUDriverConfig *cfg,
|
|||
errstr = g_strdup_printf("stderr=%s", errbuf);
|
||||
|
||||
virReportSystemError(errno,
|
||||
_("%s: failed to communicate with bridge helper: %s"),
|
||||
_("%1$s: failed to communicate with bridge helper: %2$s"),
|
||||
cmdstr,
|
||||
NULLSTR_EMPTY(errstr));
|
||||
VIR_FREE(errstr);
|
||||
|
@ -650,7 +650,7 @@ qemuInterfaceVDPAConnect(virDomainNetDef *net)
|
|||
|
||||
if ((fd = open(net->data.vdpa.devicepath, O_RDWR)) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to open '%s' for vdpa device"),
|
||||
_("Unable to open '%1$s' for vdpa device"),
|
||||
net->data.vdpa.devicepath);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -58,7 +58,7 @@ qemuBuildFileList(GHashTable *files, const char *dir)
|
|||
path = g_strdup_printf("%s/%s", dir, filename);
|
||||
|
||||
if (stat(path, &sb) < 0) {
|
||||
virReportSystemError(errno, _("Unable to access %s"), path);
|
||||
virReportSystemError(errno, _("Unable to access %1$s"), path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -141,7 +141,7 @@ qemuInteropFetchConfigs(const char *name,
|
|||
|
||||
if ((len = virFileLength(path, -1)) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("unable to get size of '%s'"),
|
||||
_("unable to get size of '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -188,14 +188,14 @@ qemuDomainExtractTLSSubject(const char *certdir)
|
|||
|
||||
if (virFileReadAll(certfile, 8192, &pemdata) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to read server cert %s"), certfile);
|
||||
_("unable to read server cert %1$s"), certfile);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
rc = gnutls_x509_crt_init(&cert);
|
||||
if (rc < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("cannot initialize cert object: %s"),
|
||||
_("cannot initialize cert object: %1$s"),
|
||||
gnutls_strerror(rc));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -206,7 +206,7 @@ qemuDomainExtractTLSSubject(const char *certdir)
|
|||
rc = gnutls_x509_crt_import(cert, &pemdatum, GNUTLS_X509_FMT_PEM);
|
||||
if (rc < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("cannot load cert data from %s: %s"),
|
||||
_("cannot load cert data from %1$s: %2$s"),
|
||||
certfile, gnutls_strerror(rc));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -219,7 +219,7 @@ qemuDomainExtractTLSSubject(const char *certdir)
|
|||
}
|
||||
if (rc != 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("cannot get cert distinguished name: %s"),
|
||||
_("cannot get cert distinguished name: %1$s"),
|
||||
gnutls_strerror(rc));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -287,8 +287,8 @@ qemuMigrationCookieNetworkAlloc(virQEMUDriver *driver G_GNUC_UNUSED,
|
|||
if (virNetDevOpenvswitchGetMigrateData(&mig->net[i].portdata,
|
||||
netptr->ifname) != 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to run command to get OVS port data for "
|
||||
"interface %s"), netptr->ifname);
|
||||
_("Unable to run command to get OVS port data for interface %1$s"),
|
||||
netptr->ifname);
|
||||
return NULL;
|
||||
}
|
||||
break;
|
||||
|
@ -910,7 +910,7 @@ qemuMigrationCookieGraphicsXMLParse(xmlXPathContextPtr ctxt)
|
|||
}
|
||||
if ((grap->type = virDomainGraphicsTypeFromString(graphicstype)) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown graphics type %s"), graphicstype);
|
||||
_("unknown graphics type %1$s"), graphicstype);
|
||||
return NULL;
|
||||
}
|
||||
if (virXPathInt("string(./graphics/@port)", ctxt, &grap->port) < 0) {
|
||||
|
@ -987,7 +987,7 @@ qemuMigrationCookieNBDXMLParse(xmlXPathContextPtr ctxt)
|
|||
port = virXPathString("string(./nbd/@port)", ctxt);
|
||||
if (port && virStrToLong_i(port, NULL, 10, &ret->port) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Malformed nbd port '%s'"),
|
||||
_("Malformed nbd port '%1$s'"),
|
||||
port);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1015,7 +1015,7 @@ qemuMigrationCookieNBDXMLParse(xmlXPathContextPtr ctxt)
|
|||
virStrToLong_ull(capacity, NULL, 10,
|
||||
&ret->disks[i].capacity) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Malformed disk capacity: '%s'"),
|
||||
_("Malformed disk capacity: '%1$s'"),
|
||||
NULLSTR(capacity));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1180,13 +1180,13 @@ qemuMigrationCookieXMLParseMandatoryFeatures(xmlXPathContextPtr ctxt,
|
|||
|
||||
if ((val = qemuMigrationCookieFlagTypeFromString(str)) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unknown migration cookie feature %s"), str);
|
||||
_("Unknown migration cookie feature %1$s"), str);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if ((flags & (1 << val)) == 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unsupported migration cookie feature %s"), str);
|
||||
_("Unsupported migration cookie feature %1$s"), str);
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
@ -1279,7 +1279,7 @@ qemuMigrationCookieXMLParse(qemuMigrationCookie *mig,
|
|||
}
|
||||
if (STRNEQ(name, mig->name)) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Incoming cookie data had unexpected name %s vs %s"),
|
||||
_("Incoming cookie data had unexpected name %1$s vs %2$s"),
|
||||
name, mig->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1293,7 +1293,7 @@ qemuMigrationCookieXMLParse(qemuMigrationCookie *mig,
|
|||
virUUIDFormat(mig->uuid, localdomuuid);
|
||||
if (STRNEQ(uuid, localdomuuid)) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Incoming cookie data had unexpected UUID %s vs %s"),
|
||||
_("Incoming cookie data had unexpected UUID %1$s vs %2$s"),
|
||||
uuid, localdomuuid);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1321,7 +1321,7 @@ qemuMigrationCookieXMLParse(qemuMigrationCookie *mig,
|
|||
}
|
||||
if (memcmp(mig->remoteHostuuid, mig->localHostuuid, VIR_UUID_BUFLEN) == 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Attempt to migrate guest to the same host %s"),
|
||||
_("Attempt to migrate guest to the same host %1$s"),
|
||||
hostuuid);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1527,14 +1527,14 @@ qemuMigrationCookieParse(virQEMUDriver *driver,
|
|||
if (!mig->lockDriver) {
|
||||
if (virLockManagerPluginUsesState(driver->lockManager)) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Missing %s lock state for migration cookie"),
|
||||
_("Missing %1$s lock state for migration cookie"),
|
||||
virLockManagerPluginGetName(driver->lockManager));
|
||||
return NULL;
|
||||
}
|
||||
} else if (STRNEQ(mig->lockDriver,
|
||||
virLockManagerPluginGetName(driver->lockManager))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Source host lock driver %s different from target %s"),
|
||||
_("Source host lock driver %1$s different from target %2$s"),
|
||||
mig->lockDriver,
|
||||
virLockManagerPluginGetName(driver->lockManager));
|
||||
return NULL;
|
||||
|
@ -1567,7 +1567,7 @@ qemuMigrationCookieBlockDirtyBitmapsMatchDisks(virDomainDef *def,
|
|||
|
||||
if (!(disk->disk = virDomainDiskByTarget(def, disk->target))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Can't find disk '%s' in domain definition"),
|
||||
_("Can't find disk '%1$s' in domain definition"),
|
||||
disk->target);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -330,7 +330,7 @@ qemuMigrationParamsCheckType(qemuMigrationParam param,
|
|||
{
|
||||
if (qemuMigrationParamInfo[param].type != type) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Type mismatch for '%s' migration parameter"),
|
||||
_("Type mismatch for '%1$s' migration parameter"),
|
||||
qemuMigrationParamTypeToString(param));
|
||||
return -1;
|
||||
}
|
||||
|
@ -363,7 +363,7 @@ qemuMigrationParamsGetTPInt(qemuMigrationParams *migParams,
|
|||
unsigned int max = UINT_MAX / unit;
|
||||
if (migParams->params[param].value.i > max) {
|
||||
virReportError(VIR_ERR_OVERFLOW,
|
||||
_("migration parameter '%s' must be less than %u"),
|
||||
_("migration parameter '%1$s' must be less than %2$u"),
|
||||
name, max + 1);
|
||||
return -1;
|
||||
}
|
||||
|
@ -424,7 +424,7 @@ qemuMigrationParamsGetTPULL(qemuMigrationParams *migParams,
|
|||
unsigned long long max = ULLONG_MAX / unit;
|
||||
if (migParams->params[param].value.ull > max) {
|
||||
virReportError(VIR_ERR_OVERFLOW,
|
||||
_("migration parameter '%s' must be less than %llu"),
|
||||
_("migration parameter '%1$s' must be less than %2$llu"),
|
||||
name, max + 1);
|
||||
return -1;
|
||||
}
|
||||
|
@ -523,14 +523,14 @@ qemuMigrationParamsSetCompression(virTypedParameterPtr params,
|
|||
method = qemuMigrationCompressMethodTypeFromString(params[i].value.s);
|
||||
if (method < 0) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("Unsupported compression method '%s'"),
|
||||
_("Unsupported compression method '%1$s'"),
|
||||
params[i].value.s);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (migParams->compMethods & (1ULL << method)) {
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("Compression method '%s' is specified twice"),
|
||||
_("Compression method '%1$s' is specified twice"),
|
||||
params[i].value.s);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1229,7 +1229,7 @@ qemuMigrationParamsCheck(virDomainObj *vm,
|
|||
|
||||
if (state && !qemuMigrationCapsGet(vm, cap)) {
|
||||
virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
|
||||
_("Migration option '%s' is not supported by QEMU binary"),
|
||||
_("Migration option '%1$s' is not supported by QEMU binary"),
|
||||
qemuMigrationCapabilityTypeToString(cap));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1398,14 +1398,14 @@ qemuMigrationParamsParse(xmlXPathContextPtr ctxt,
|
|||
|
||||
if ((param = qemuMigrationParamTypeFromString(name)) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown migration parameter '%s'"), name);
|
||||
_("unknown migration parameter '%1$s'"), name);
|
||||
return -1;
|
||||
}
|
||||
pv = ¶ms->params[param];
|
||||
|
||||
if (!(value = virXMLPropString(nodes[i], "value"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing value for migration parameter '%s'"),
|
||||
_("missing value for migration parameter '%1$s'"),
|
||||
name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1431,7 +1431,7 @@ qemuMigrationParamsParse(xmlXPathContextPtr ctxt,
|
|||
|
||||
if (rc < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("invalid value '%s' for migration parameter '%s'"),
|
||||
_("invalid value '%1$s' for migration parameter '%2$s'"),
|
||||
value, name);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -241,7 +241,7 @@ qemuMonitorOpenUnix(const char *monitor)
|
|||
addr.sun_family = AF_UNIX;
|
||||
if (virStrcpyStatic(addr.sun_path, monitor) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Monitor path %s too big for destination"), monitor);
|
||||
_("Monitor path %1$s too big for destination"), monitor);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -401,7 +401,7 @@ qemuMonitorIORead(qemuMonitor *mon)
|
|||
if (avail < 1024) {
|
||||
if (mon->bufferLength >= QEMU_MONITOR_MAX_RESPONSE) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("QEMU monitor reply exceeds buffer size (%d bytes)"),
|
||||
_("QEMU monitor reply exceeds buffer size (%1$d bytes)"),
|
||||
QEMU_MONITOR_MAX_RESPONSE);
|
||||
return -1;
|
||||
}
|
||||
|
@ -506,7 +506,7 @@ qemuMonitorIO(GSocket *socket G_GNUC_UNUSED,
|
|||
if (!error && !mon->goteof &&
|
||||
cond & G_IO_ERR) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Invalid file descriptor while waiting for monitor (vm='%s')"), mon->domainName);
|
||||
_("Invalid file descriptor while waiting for monitor (vm='%1$s')"), mon->domainName);
|
||||
mon->goteof = true;
|
||||
}
|
||||
}
|
||||
|
@ -532,7 +532,7 @@ qemuMonitorIO(GSocket *socket G_GNUC_UNUSED,
|
|||
} else {
|
||||
if (virGetLastErrorCode() == VIR_ERR_OK && !mon->goteof)
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Error while processing monitor IO (vm='%s')"), mon->domainName);
|
||||
_("Error while processing monitor IO (vm='%1$s')"), mon->domainName);
|
||||
virCopyLastError(&mon->lastError);
|
||||
virResetLastError();
|
||||
}
|
||||
|
@ -636,7 +636,7 @@ qemuMonitorOpenInternal(virDomainObj *vm,
|
|||
mon->socket = g_socket_new_from_fd(fd, &gerr);
|
||||
if (!mon->socket) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to create socket object: %s"),
|
||||
_("Unable to create socket object: %1$s"),
|
||||
gerr->message);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -684,7 +684,7 @@ qemuMonitorOpen(virDomainObj *vm,
|
|||
|
||||
if (config->type != VIR_DOMAIN_CHR_TYPE_UNIX) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to handle monitor type: %s"),
|
||||
_("unable to handle monitor type: %1$s"),
|
||||
virDomainChrTypeToString(config->type));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -851,7 +851,7 @@ qemuMonitorSend(qemuMonitor *mon,
|
|||
}
|
||||
if (mon->goteof) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("End of file from qemu monitor (vm='%s')"), mon->domainName);
|
||||
_("End of file from qemu monitor (vm='%1$s')"), mon->domainName);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -865,7 +865,7 @@ qemuMonitorSend(qemuMonitor *mon,
|
|||
while (!mon->msg->finished) {
|
||||
if (virCondWait(&mon->notify, &mon->parent.lock) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to wait on monitor condition (vm='%s')"), mon->domainName);
|
||||
_("Unable to wait on monitor condition (vm='%1$s')"), mon->domainName);
|
||||
goto cleanup;
|
||||
}
|
||||
}
|
||||
|
@ -1010,8 +1010,8 @@ qemuMonitorUpdateVideoMemorySize(qemuMonitor *mon,
|
|||
if (rc < 0) {
|
||||
if (rc == -2)
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Failed to find QOM Object path for "
|
||||
"device '%s'"), videoName);
|
||||
_("Failed to find QOM Object path for device '%1$s'"),
|
||||
videoName);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -1040,8 +1040,8 @@ qemuMonitorUpdateVideoVram64Size(qemuMonitor *mon,
|
|||
if (rc < 0) {
|
||||
if (rc == -2)
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Failed to find QOM Object path for "
|
||||
"device '%s'"), videoName);
|
||||
_("Failed to find QOM Object path for device '%1$s'"),
|
||||
videoName);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -1897,7 +1897,7 @@ qemuMonitorBlockIOStatusToError(const char *status)
|
|||
|
||||
if (st < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown block IO status: %s"), status);
|
||||
_("unknown block IO status: %1$s"), status);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -2046,7 +2046,7 @@ qemuMonitorTypeToProtocol(int type)
|
|||
return "spice";
|
||||
default:
|
||||
virReportError(VIR_ERR_INVALID_ARG,
|
||||
_("unsupported protocol type %s"),
|
||||
_("unsupported protocol type %1$s"),
|
||||
virDomainGraphicsTypeToString(type));
|
||||
return NULL;
|
||||
}
|
||||
|
@ -2683,7 +2683,7 @@ qemuMonitorAddObject(qemuMonitor *mon,
|
|||
|
||||
if (!id || !type) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("missing alias or qom-type for qemu object '%s'"),
|
||||
_("missing alias or qom-type for qemu object '%1$s'"),
|
||||
NULLSTR(type));
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -49,7 +49,7 @@ qemuMonitorTextCreateSnapshot(qemuMonitor *mon,
|
|||
strstr(reply, "Error: ") ||
|
||||
(strstr(reply, "Error") && strstr(reply, "while writing VM"))) {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("Failed to take snapshot: %s"), reply);
|
||||
_("Failed to take snapshot: %1$s"), reply);
|
||||
return -1;
|
||||
} else if (strstr(reply, "No block device can accept snapshots")) {
|
||||
virReportError(VIR_ERR_OPERATION_INVALID, "%s",
|
||||
|
@ -80,7 +80,7 @@ int qemuMonitorTextDeleteSnapshot(qemuMonitor *mon, const char *name)
|
|||
(strstr(reply, "Error") &&
|
||||
strstr(reply, "while deleting snapshot"))) {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("Failed to delete snapshot: %s"), reply);
|
||||
_("Failed to delete snapshot: %1$s"), reply);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
|
|
@ -283,7 +283,7 @@ qemuDomainSetupDisk(virStorageSource *src,
|
|||
if (virDevMapperGetTargets(next->path, &targetPaths) < 0 &&
|
||||
errno != ENOSYS) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to get devmapper targets for %s"),
|
||||
_("Unable to get devmapper targets for %1$s"),
|
||||
next->path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -778,7 +778,7 @@ qemuDomainUnshareNamespace(virQEMUDriverConfig *cfg,
|
|||
|
||||
if (stat(devMountsPath[i], &sb) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to stat: %s"),
|
||||
_("Unable to stat: %1$s"),
|
||||
devMountsPath[i]);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -789,7 +789,7 @@ qemuDomainUnshareNamespace(virQEMUDriverConfig *cfg,
|
|||
if ((S_ISDIR(sb.st_mode) && g_mkdir_with_parents(devMountsSavePath[i], 0777) < 0) ||
|
||||
(!S_ISDIR(sb.st_mode) && virFileTouch(devMountsSavePath[i], sb.st_mode) < 0)) {
|
||||
virReportSystemError(errno,
|
||||
_("Failed to create %s"),
|
||||
_("Failed to create %1$s"),
|
||||
devMountsSavePath[i]);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -816,21 +816,21 @@ qemuDomainUnshareNamespace(virQEMUDriverConfig *cfg,
|
|||
|
||||
if (stat(devMountsSavePath[i], &sb) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to stat: %s"),
|
||||
_("Unable to stat: %1$s"),
|
||||
devMountsSavePath[i]);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (S_ISDIR(sb.st_mode)) {
|
||||
if (g_mkdir_with_parents(devMountsPath[i], 0777) < 0) {
|
||||
virReportSystemError(errno, _("Cannot create %s"),
|
||||
virReportSystemError(errno, _("Cannot create %1$s"),
|
||||
devMountsPath[i]);
|
||||
goto cleanup;
|
||||
}
|
||||
} else {
|
||||
if (virFileMakeParentPath(devMountsPath[i]) < 0 ||
|
||||
virFileTouch(devMountsPath[i], sb.st_mode) < 0) {
|
||||
virReportSystemError(errno, _("Cannot create %s"),
|
||||
virReportSystemError(errno, _("Cannot create %1$s"),
|
||||
devMountsPath[i]);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -878,7 +878,7 @@ qemuDomainEnableNamespace(virDomainObj *vm,
|
|||
|
||||
if (virBitmapSetBit(priv->namespaces, ns) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Unable to enable namespace: %s"),
|
||||
_("Unable to enable namespace: %1$s"),
|
||||
qemuDomainNamespaceTypeToString(ns));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1006,7 +1006,7 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
|
||||
if (virFileMakeParentPath(data->file) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to create %s"), data->file);
|
||||
_("Unable to create %1$s"), data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
|
@ -1026,14 +1026,14 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
if (unlink(data->file) < 0 &&
|
||||
errno != ENOENT) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to remove symlink %s"),
|
||||
_("Unable to remove symlink %1$s"),
|
||||
data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (symlink(data->target, data->file) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to create symlink %s (pointing to %s)"),
|
||||
_("Unable to create symlink %1$s (pointing to %2$s)"),
|
||||
data->file, data->target);
|
||||
goto cleanup;
|
||||
} else {
|
||||
|
@ -1053,7 +1053,7 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
unlink(data->file);
|
||||
if (mknod(data->file, data->sb.st_mode, data->sb.st_rdev) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to create device %s"),
|
||||
_("Unable to create device %1$s"),
|
||||
data->file);
|
||||
goto cleanup;
|
||||
} else {
|
||||
|
@ -1068,7 +1068,7 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
if (umount(data->file) < 0 &&
|
||||
errno != ENOENT && errno != EINVAL) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to umount %s"),
|
||||
_("Unable to umount %1$s"),
|
||||
data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -1080,14 +1080,14 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
* proper owner and mode. Move the mount only after that. */
|
||||
} else {
|
||||
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
||||
_("unsupported device type %s 0%o"),
|
||||
_("unsupported device type %1$s 0%2$o"),
|
||||
data->file, data->sb.st_mode);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (lchown(data->file, data->sb.st_uid, data->sb.st_gid) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Failed to chown device %s"),
|
||||
_("Failed to chown device %1$s"),
|
||||
data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -1096,7 +1096,7 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
if (!isLink &&
|
||||
chmod(data->file, data->sb.st_mode) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Failed to set permissions for device %s"),
|
||||
_("Failed to set permissions for device %1$s"),
|
||||
data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -1105,7 +1105,7 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
virFileSetACLs(data->file, data->acl) < 0 &&
|
||||
errno != ENOTSUP) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to set ACLs on %s"), data->file);
|
||||
_("Unable to set ACLs on %1$s"), data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
|
@ -1116,7 +1116,7 @@ qemuNamespaceMknodOne(qemuNamespaceMknodItem *data)
|
|||
if (errno != EOPNOTSUPP && errno != ENOTSUP) {
|
||||
VIR_WARNINGS_RESET
|
||||
virReportSystemError(errno,
|
||||
_("Unable to set SELinux label on %s"),
|
||||
_("Unable to set SELinux label on %1$s"),
|
||||
data->file);
|
||||
goto cleanup;
|
||||
}
|
||||
|
@ -1196,7 +1196,7 @@ qemuNamespaceMknodItemInit(qemuNamespaceMknodItem *item,
|
|||
return -2;
|
||||
|
||||
virReportSystemError(errno,
|
||||
_("Unable to access %s"), file);
|
||||
_("Unable to access %1$s"), file);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -1213,7 +1213,7 @@ qemuNamespaceMknodItemInit(qemuNamespaceMknodItem *item,
|
|||
|
||||
if (!(target = g_file_read_link(file, &gerr))) {
|
||||
virReportError(VIR_ERR_SYSTEM_ERROR,
|
||||
_("failed to resolve symlink %s: %s"), file, gerr->message);
|
||||
_("failed to resolve symlink %1$s: %2$s"), file, gerr->message);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -1238,7 +1238,7 @@ qemuNamespaceMknodItemInit(qemuNamespaceMknodItem *item,
|
|||
virFileGetACLs(file, &item->acl) < 0 &&
|
||||
errno != ENOTSUP) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to get ACLs on %s"), file);
|
||||
_("Unable to get ACLs on %1$s"), file);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -1246,7 +1246,7 @@ qemuNamespaceMknodItemInit(qemuNamespaceMknodItem *item,
|
|||
if (lgetfilecon_raw(file, &item->tcon) < 0 &&
|
||||
(errno != ENOTSUP && errno != ENODATA)) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to get SELinux label from %s"), file);
|
||||
_("Unable to get SELinux label from %1$s"), file);
|
||||
return -1;
|
||||
}
|
||||
# endif
|
||||
|
@ -1307,7 +1307,7 @@ qemuNamespacePrepareOneItem(qemuNamespaceMknodData *data,
|
|||
|
||||
if (ttl-- == 0) {
|
||||
virReportSystemError(ELOOP,
|
||||
_("Too many levels of symbolic links: %s"),
|
||||
_("Too many levels of symbolic links: %1$s"),
|
||||
next);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1413,7 +1413,7 @@ qemuNamespaceUnlinkHelper(pid_t pid G_GNUC_UNUSED,
|
|||
VIR_DEBUG("Unlinking %s", path);
|
||||
if (unlink(path) < 0 && errno != ENOENT) {
|
||||
virReportSystemError(errno,
|
||||
_("Unable to remove device %s"), path);
|
||||
_("Unable to remove device %1$s"), path);
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -229,7 +229,7 @@ qemuPasstStart(virDomainObj *vm,
|
|||
} else {
|
||||
/* validation guarantees this will never happen */
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Invalid portForward proto value %u"), pf->proto);
|
||||
_("Invalid portForward proto value %1$u"), pf->proto);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
|
|
@ -498,11 +498,11 @@ virQEMUQAPISchemaPathGet(const char *query,
|
|||
|
||||
if (rc == -2) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("malformed QAPI schema when querying '%s' of '%s'"),
|
||||
_("malformed QAPI schema when querying '%1$s' of '%2$s'"),
|
||||
NULLSTR(ctxt.prevquery), query);
|
||||
} else if (rc == -3) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("terminal QAPI query component '%s' of '%s' must not have followers"),
|
||||
_("terminal QAPI query component '%1$s' of '%2$s' must not have followers"),
|
||||
NULLSTR(ctxt.prevquery), query);
|
||||
}
|
||||
|
||||
|
|
|
@ -172,14 +172,14 @@ virQEMUSaveDataWrite(virQEMUSaveData *data,
|
|||
|
||||
if (safewrite(fd, header, sizeof(*header)) != sizeof(*header)) {
|
||||
virReportSystemError(errno,
|
||||
_("failed to write header to domain save file '%s'"),
|
||||
_("failed to write header to domain save file '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (safewrite(fd, data->xml, xml_len) != xml_len) {
|
||||
virReportSystemError(errno,
|
||||
_("failed to write domain xml to '%s'"),
|
||||
_("failed to write domain xml to '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -187,14 +187,14 @@ virQEMUSaveDataWrite(virQEMUSaveData *data,
|
|||
if (data->cookie &&
|
||||
safewrite(fd, data->cookie, cookie_len) != cookie_len) {
|
||||
virReportSystemError(errno,
|
||||
_("failed to write cookie to '%s'"),
|
||||
_("failed to write cookie to '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (safewrite(fd, zeros, zerosLen) != zerosLen) {
|
||||
virReportSystemError(errno,
|
||||
_("failed to write padding to '%s'"),
|
||||
_("failed to write padding to '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -215,7 +215,7 @@ virQEMUSaveDataFinish(virQEMUSaveData *data,
|
|||
if (safewrite(*fd, header, sizeof(*header)) != sizeof(*header) ||
|
||||
VIR_CLOSE(*fd) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("failed to write header to domain save file '%s'"),
|
||||
_("failed to write header to domain save file '%1$s'"),
|
||||
path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -232,7 +232,7 @@ qemuSaveImageGetCompressionCommand(virQEMUSaveFormat compression)
|
|||
|
||||
if (!prog) {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("Invalid compressed save format %d"),
|
||||
_("Invalid compressed save format %1$d"),
|
||||
compression);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -304,7 +304,7 @@ qemuSaveImageCreate(virQEMUDriver *driver,
|
|||
* trigger a single page of file system cache pollution, but
|
||||
* that's acceptable. */
|
||||
if (VIR_CLOSE(fd) < 0) {
|
||||
virReportSystemError(errno, _("unable to close %s"), path);
|
||||
virReportSystemError(errno, _("unable to close %1$s"), path);
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
|
@ -387,8 +387,7 @@ qemuSaveImageGetCompressionProgram(const char *imageFormat,
|
|||
styleFormat);
|
||||
else
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("Invalid %s image format specified "
|
||||
"in configuration file"),
|
||||
_("Invalid %1$s image format specified in configuration file"),
|
||||
styleFormat);
|
||||
} else {
|
||||
if (use_raw_on_fail)
|
||||
|
@ -397,8 +396,7 @@ qemuSaveImageGetCompressionProgram(const char *imageFormat,
|
|||
styleFormat);
|
||||
else
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("Compression program for %s image format "
|
||||
"in configuration file isn't available"),
|
||||
_("Compression program for %1$s image format in configuration file isn't available"),
|
||||
styleFormat);
|
||||
}
|
||||
|
||||
|
@ -473,7 +471,7 @@ qemuSaveImageOpen(virQEMUDriver *driver,
|
|||
if (unlink_corrupt) {
|
||||
if (unlink(path) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("cannot remove corrupt file: %s"),
|
||||
_("cannot remove corrupt file: %1$s"),
|
||||
path);
|
||||
return -1;
|
||||
} else {
|
||||
|
@ -491,7 +489,7 @@ qemuSaveImageOpen(virQEMUDriver *driver,
|
|||
if (unlink_corrupt) {
|
||||
if (unlink(path) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("cannot remove corrupt file: %s"),
|
||||
_("cannot remove corrupt file: %1$s"),
|
||||
path);
|
||||
return -1;
|
||||
} else {
|
||||
|
@ -516,14 +514,14 @@ qemuSaveImageOpen(virQEMUDriver *driver,
|
|||
|
||||
if (header->version > QEMU_SAVE_VERSION) {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("image version is not supported (%d > %d)"),
|
||||
_("image version is not supported (%1$d > %2$d)"),
|
||||
header->version, QEMU_SAVE_VERSION);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (header->data_len <= 0) {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("invalid header data length: %d"), header->data_len);
|
||||
_("invalid header data length: %1$d"), header->data_len);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -654,7 +652,7 @@ qemuSaveImageStartVM(virConnectPtr conn,
|
|||
virErrorRestore(&orig_err);
|
||||
}
|
||||
if (VIR_CLOSE(*fd) < 0) {
|
||||
virReportSystemError(errno, _("cannot close file: %s"), path);
|
||||
virReportSystemError(errno, _("cannot close file: %1$s"), path);
|
||||
rc = -1;
|
||||
}
|
||||
|
||||
|
|
|
@ -101,7 +101,7 @@ qemuSlirpNewForHelper(const char *helper)
|
|||
slirp = qemuSlirpNew();
|
||||
if (!slirp) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Failed to allocate slirp for '%s'"), helper);
|
||||
_("Failed to allocate slirp for '%1$s'"), helper);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -113,7 +113,7 @@ qemuSlirpNewForHelper(const char *helper)
|
|||
if (!(doc = virJSONValueFromString(output)) ||
|
||||
!(featuresJSON = virJSONValueObjectGetArray(doc, "features"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to parse json capabilities '%s'"),
|
||||
_("unable to parse json capabilities '%1$s'"),
|
||||
helper);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -331,7 +331,7 @@ qemuSlirpStart(virDomainObj *vm,
|
|||
rc = virPidFileReadPath(pidfile, &pid);
|
||||
if (rc < 0) {
|
||||
virReportSystemError(-rc,
|
||||
_("Unable to read slirp pidfile '%s'"),
|
||||
_("Unable to read slirp pidfile '%1$s'"),
|
||||
pidfile);
|
||||
goto error;
|
||||
}
|
||||
|
|
|
@ -84,7 +84,7 @@ qemuSnapObjFromName(virDomainObj *vm,
|
|||
snap = virDomainSnapshotFindByName(vm->snapshots, name);
|
||||
if (!snap)
|
||||
virReportError(VIR_ERR_NO_DOMAIN_SNAPSHOT,
|
||||
_("no domain snapshot with matching name '%s'"),
|
||||
_("no domain snapshot with matching name '%1$s'"),
|
||||
name);
|
||||
|
||||
return snap;
|
||||
|
@ -351,8 +351,8 @@ qemuSnapshotPrepareDiskShared(virDomainSnapshotDiskDef *snapdisk,
|
|||
|
||||
if (!qemuBlockStorageSourceSupportsConcurrentAccess(snapdisk->src)) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("shared access for disk '%s' requires use of "
|
||||
"supported storage format"), domdisk->dst);
|
||||
_("shared access for disk '%1$s' requires use of supported storage format"),
|
||||
domdisk->dst);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -390,8 +390,7 @@ qemuSnapshotPrepareDiskExternalInactive(virDomainSnapshotDiskDef *snapdisk,
|
|||
case VIR_STORAGE_NET_PROTOCOL_NFS:
|
||||
case VIR_STORAGE_NET_PROTOCOL_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("external inactive snapshots are not supported on "
|
||||
"'network' disks using '%s' protocol"),
|
||||
_("external inactive snapshots are not supported on 'network' disks using '%1$s' protocol"),
|
||||
virStorageNetProtocolTypeToString(domdisk->src->protocol));
|
||||
return -1;
|
||||
}
|
||||
|
@ -404,8 +403,8 @@ qemuSnapshotPrepareDiskExternalInactive(virDomainSnapshotDiskDef *snapdisk,
|
|||
case VIR_STORAGE_TYPE_NONE:
|
||||
case VIR_STORAGE_TYPE_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("external inactive snapshots are not supported on "
|
||||
"'%s' disks"), virStorageTypeToString(domDiskType));
|
||||
_("external inactive snapshots are not supported on '%1$s' disks"),
|
||||
virStorageTypeToString(domDiskType));
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -422,8 +421,8 @@ qemuSnapshotPrepareDiskExternalInactive(virDomainSnapshotDiskDef *snapdisk,
|
|||
case VIR_STORAGE_TYPE_NONE:
|
||||
case VIR_STORAGE_TYPE_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("external inactive snapshots are not supported on "
|
||||
"'%s' disks"), virStorageTypeToString(snapDiskType));
|
||||
_("external inactive snapshots are not supported on '%1$s' disks"),
|
||||
virStorageTypeToString(snapDiskType));
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -466,8 +465,8 @@ qemuSnapshotPrepareDiskExternalActive(virDomainSnapshotDiskDef *snapdisk,
|
|||
case VIR_STORAGE_TYPE_NONE:
|
||||
case VIR_STORAGE_TYPE_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("external active snapshots are not supported on "
|
||||
"'%s' disks"), virStorageTypeToString(actualType));
|
||||
_("external active snapshots are not supported on '%1$s' disks"),
|
||||
virStorageTypeToString(actualType));
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -514,21 +513,21 @@ qemuSnapshotPrepareDiskExternal(virDomainDiskDef *disk,
|
|||
if (rc < 0) {
|
||||
if (err != ENOENT) {
|
||||
virReportSystemError(err,
|
||||
_("unable to stat for disk %s: %s"),
|
||||
_("unable to stat for disk %1$s: %2$s"),
|
||||
snapdisk->name, snapdisk->src->path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (reuse) {
|
||||
virReportSystemError(err,
|
||||
_("missing existing file for disk %s: %s"),
|
||||
_("missing existing file for disk %1$s: %2$s"),
|
||||
snapdisk->name, snapdisk->src->path);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (snapdisk->src->type == VIR_STORAGE_TYPE_BLOCK) {
|
||||
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
||||
_("block device snapshot target '%s' doesn't exist"),
|
||||
_("block device snapshot target '%1$s' doesn't exist"),
|
||||
snapdisk->src->path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -537,7 +536,7 @@ qemuSnapshotPrepareDiskExternal(virDomainDiskDef *disk,
|
|||
if ((snapdisk->src->type == VIR_STORAGE_TYPE_BLOCK && !S_ISBLK(st.st_mode)) ||
|
||||
(snapdisk->src->type == VIR_STORAGE_TYPE_FILE && !S_ISREG(st.st_mode))) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("mismatch between configured type for snapshot disk '%s' and the type of existing file '%s'"),
|
||||
_("mismatch between configured type for snapshot disk '%1$s' and the type of existing file '%2$s'"),
|
||||
snapdisk->name, snapdisk->src->path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -546,7 +545,7 @@ qemuSnapshotPrepareDiskExternal(virDomainDiskDef *disk,
|
|||
snapdisk->src->type == VIR_STORAGE_TYPE_FILE &&
|
||||
st.st_size > 0) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("external snapshot file for disk %s already exists and is not a block device: %s"),
|
||||
_("external snapshot file for disk %1$s already exists and is not a block device: %2$s"),
|
||||
snapdisk->name, snapdisk->src->path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -595,8 +594,7 @@ qemuSnapshotPrepareDiskInternal(virDomainDiskDef *disk,
|
|||
case VIR_STORAGE_NET_PROTOCOL_NFS:
|
||||
case VIR_STORAGE_NET_PROTOCOL_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("internal inactive snapshots are not supported on "
|
||||
"'network' disks using '%s' protocol"),
|
||||
_("internal inactive snapshots are not supported on 'network' disks using '%1$s' protocol"),
|
||||
virStorageNetProtocolTypeToString(disk->src->protocol));
|
||||
return -1;
|
||||
}
|
||||
|
@ -609,8 +607,8 @@ qemuSnapshotPrepareDiskInternal(virDomainDiskDef *disk,
|
|||
case VIR_STORAGE_TYPE_NONE:
|
||||
case VIR_STORAGE_TYPE_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("internal inactive snapshots are not supported on "
|
||||
"'%s' disks"), virStorageTypeToString(actualType));
|
||||
_("internal inactive snapshots are not supported on '%1$s' disks"),
|
||||
virStorageTypeToString(actualType));
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -645,8 +643,7 @@ qemuSnapshotPrepare(virDomainObj *vm,
|
|||
|
||||
if (def->state == VIR_DOMAIN_SNAPSHOT_DISK_SNAPSHOT && active) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("active qemu domains require external disk "
|
||||
"snapshots; disk %s requested internal"),
|
||||
_("active qemu domains require external disk snapshots; disk %1$s requested internal"),
|
||||
disk->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -658,8 +655,7 @@ qemuSnapshotPrepare(virDomainObj *vm,
|
|||
if (dom_disk->src->format > 0 &&
|
||||
dom_disk->src->format != VIR_STORAGE_FILE_QCOW2) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("internal snapshot for disk %s unsupported "
|
||||
"for storage type %s"),
|
||||
_("internal snapshot for disk %1$s unsupported for storage type %2$s"),
|
||||
disk->name,
|
||||
virStorageFileFormatTypeToString(dom_disk->src->format));
|
||||
return -1;
|
||||
|
@ -672,8 +668,7 @@ qemuSnapshotPrepare(virDomainObj *vm,
|
|||
} else if (disk->src->format != VIR_STORAGE_FILE_QCOW2 &&
|
||||
disk->src->format != VIR_STORAGE_FILE_QED) {
|
||||
virReportError(VIR_ERR_CONFIG_UNSUPPORTED,
|
||||
_("external snapshot format for disk %s "
|
||||
"is unsupported: %s"),
|
||||
_("external snapshot format for disk %1$s is unsupported: %2$s"),
|
||||
disk->name,
|
||||
virStorageFileFormatTypeToString(disk->src->format));
|
||||
return -1;
|
||||
|
@ -1034,7 +1029,7 @@ qemuSnapshotDiskPrepareOne(qemuSnapshotDiskContext *snapctxt,
|
|||
/* pre-create the image file so that we can label it before handing it to qemu */
|
||||
if (dd->src->type != VIR_STORAGE_TYPE_BLOCK) {
|
||||
if (virStorageSourceCreate(dd->src) < 0) {
|
||||
virReportSystemError(errno, _("failed to create image file '%s'"),
|
||||
virReportSystemError(errno, _("failed to create image file '%1$s'"),
|
||||
NULLSTR(dd->src->path));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1116,7 +1111,7 @@ qemuSnapshotGetTransientDiskDef(virDomainDiskDef *domdisk,
|
|||
|
||||
if (virFileExists(snapdisk->src->path)) {
|
||||
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
||||
_("Overlay file '%s' for transient disk '%s' already exists"),
|
||||
_("Overlay file '%1$s' for transient disk '%2$s' already exists"),
|
||||
snapdisk->src->path, domdisk->dst);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -1469,16 +1464,14 @@ qemuSnapshotCreateXMLValidateDef(virDomainObj *vm,
|
|||
if (!(flags & VIR_DOMAIN_SNAPSHOT_CREATE_NO_METADATA)) {
|
||||
if (strchr(def->parent.name, '/')) {
|
||||
virReportError(VIR_ERR_XML_DETAIL,
|
||||
_("invalid snapshot name '%s': "
|
||||
"name can't contain '/'"),
|
||||
_("invalid snapshot name '%1$s': name can't contain '/'"),
|
||||
def->parent.name);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (def->parent.name[0] == '.') {
|
||||
virReportError(VIR_ERR_XML_DETAIL,
|
||||
_("invalid snapshot name '%s': "
|
||||
"name can't start with '.'"),
|
||||
_("invalid snapshot name '%1$s': name can't start with '.'"),
|
||||
def->parent.name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1507,7 +1500,7 @@ qemuSnapshotCreateXMLValidateDef(virDomainObj *vm,
|
|||
|
||||
case VIR_DOMAIN_SNAPSHOT_DISK_SNAPSHOT:
|
||||
if (!redefine) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR, _("Invalid domain state %s"),
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR, _("Invalid domain state %1$s"),
|
||||
virDomainSnapshotStateTypeToString(state));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1523,7 +1516,7 @@ qemuSnapshotCreateXMLValidateDef(virDomainObj *vm,
|
|||
case VIR_DOMAIN_SNAPSHOT_NOSTATE:
|
||||
case VIR_DOMAIN_SNAPSHOT_BLOCKED: /* invalid state, unused in qemu */
|
||||
case VIR_DOMAIN_SNAPSHOT_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR, _("Invalid domain state %s"),
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR, _("Invalid domain state %1$s"),
|
||||
virDomainSnapshotStateTypeToString(state));
|
||||
return -1;
|
||||
}
|
||||
|
@ -1603,7 +1596,7 @@ qemuSnapshotCreateWriteMetadata(virDomainObj *vm,
|
|||
driver->xmlopt,
|
||||
cfg->snapshotDir) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to save metadata for snapshot %s"),
|
||||
_("unable to save metadata for snapshot %1$s"),
|
||||
snap->def->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -1829,7 +1822,7 @@ qemuSnapshotRevertValidate(virDomainObj *vm,
|
|||
|
||||
if (!snap->def->dom) {
|
||||
virReportError(VIR_ERR_SNAPSHOT_REVERT_RISKY,
|
||||
_("snapshot '%s' lacks domain '%s' rollback info"),
|
||||
_("snapshot '%1$s' lacks domain '%2$s' rollback info"),
|
||||
snap->def->name, vm->def->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -2227,8 +2220,7 @@ qemuSnapshotRevert(virDomainObj *vm,
|
|||
case VIR_DOMAIN_SNAPSHOT_BLOCKED:
|
||||
case VIR_DOMAIN_SNAPSHOT_LAST:
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Invalid target domain state '%s'. Refusing "
|
||||
"snapshot reversion"),
|
||||
_("Invalid target domain state '%1$s'. Refusing snapshot reversion"),
|
||||
virDomainSnapshotStateTypeToString(snapdef->state));
|
||||
goto endjob;
|
||||
}
|
||||
|
@ -2327,7 +2319,7 @@ qemuSnapshotDeleteExternalPrepare(virDomainObj *vm,
|
|||
|
||||
if (snapDisk->snapshotDeleteInProgress) {
|
||||
virReportError(VIR_ERR_OPERATION_INVALID,
|
||||
_("snapshot disk '%s' was target of not completed snapshot delete"),
|
||||
_("snapshot disk '%1$s' was target of not completed snapshot delete"),
|
||||
snapDisk->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -2343,7 +2335,7 @@ qemuSnapshotDeleteExternalPrepare(virDomainObj *vm,
|
|||
data->snapDisk->name);
|
||||
if (!data->parentDomDisk) {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("failed to find disk '%s' in snapshot VM XML"),
|
||||
_("failed to find disk '%1$s' in snapshot VM XML"),
|
||||
snapDisk->name);
|
||||
return -1;
|
||||
}
|
||||
|
@ -2735,7 +2727,7 @@ qemuSnapshotDiscardExternal(virDomainObj *vm,
|
|||
|
||||
if (data->job->state == QEMU_BLOCKJOB_STATE_FAILED) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("block commit failed while deleting disk '%s' snapshot: '%s'"),
|
||||
_("block commit failed while deleting disk '%1$s' snapshot: '%2$s'"),
|
||||
data->snapDisk->name, data->job->errmsg);
|
||||
goto error;
|
||||
}
|
||||
|
@ -2757,7 +2749,7 @@ qemuSnapshotDiscardExternal(virDomainObj *vm,
|
|||
|
||||
if (data->job->state == QEMU_BLOCKJOB_STATE_FAILED) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("finishing block job failed while deleting disk '%s' snapshot: '%s'"),
|
||||
_("finishing block job failed while deleting disk '%1$s' snapshot: '%2$s'"),
|
||||
data->snapDisk->name, data->job->errmsg);
|
||||
goto error;
|
||||
}
|
||||
|
@ -3087,7 +3079,7 @@ qemuSnapshotDeleteValidate(virDomainObj *vm,
|
|||
|
||||
if (!virStorageSourceIsSameLocation(vmdisk->src, disk->src)) {
|
||||
virReportError(VIR_ERR_OPERATION_UNSUPPORTED,
|
||||
_("disk image '%s' for internal snapshot '%s' is not the same as disk image currently used by VM"),
|
||||
_("disk image '%1$s' for internal snapshot '%2$s' is not the same as disk image currently used by VM"),
|
||||
snapDisk->name, snap->def->name);
|
||||
return -1;
|
||||
}
|
||||
|
|
|
@ -179,7 +179,7 @@ qemuTPMEmulatorCreateStorage(virDomainTPMDef *tpm,
|
|||
/* allow others to cd into this dir */
|
||||
if (g_mkdir_with_parents(swtpmStorageDir, 0711) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Could not create TPM directory %s"),
|
||||
_("Could not create TPM directory %1$s"),
|
||||
swtpmStorageDir);
|
||||
return -1;
|
||||
}
|
||||
|
@ -192,7 +192,7 @@ qemuTPMEmulatorCreateStorage(virDomainTPMDef *tpm,
|
|||
if (virDirCreate(storagepath, 0700, swtpm_user, swtpm_group,
|
||||
VIR_DIR_CREATE_ALLOW_EXIST) < 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Could not create directory %s as %u:%d"),
|
||||
_("Could not create directory %1$s as %2$u:%3$d"),
|
||||
storagepath, swtpm_user, swtpm_group);
|
||||
return -1;
|
||||
}
|
||||
|
@ -294,8 +294,7 @@ qemuTPMCreateConfigFiles(const char *swtpm_setup)
|
|||
return -1;
|
||||
if (exitstatus != 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Could not run '%s' to create config files. "
|
||||
"exitstatus: %d;\nError: %s"),
|
||||
_("Could not run '%1$s' to create config files. exitstatus: %2$d;\nError: %3$s"),
|
||||
swtpm_setup, exitstatus, errbuf);
|
||||
return -1;
|
||||
}
|
||||
|
@ -323,8 +322,8 @@ qemuTPMVirCommandAddEncryption(virCommand *cmd,
|
|||
|
||||
if (!virTPMSwtpmSetupCapsGet(VIR_TPM_SWTPM_SETUP_FEATURE_CMDARG_PWDFILE_FD)) {
|
||||
virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
|
||||
_("%s does not support passing a passphrase using a file "
|
||||
"descriptor"), swtpm_setup);
|
||||
_("%1$s does not support passing a passphrase using a file descriptor"),
|
||||
swtpm_setup);
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
@ -436,8 +435,7 @@ qemuTPMEmulatorRunSetup(const char *storagepath,
|
|||
|
||||
if (virCommandRun(cmd, &exitstatus) < 0 || exitstatus != 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Could not run '%s'. exitstatus: %d; "
|
||||
"Check error log '%s' for details."),
|
||||
_("Could not run '%1$s'. exitstatus: %2$d; Check error log '%3$s' for details."),
|
||||
swtpm_setup, exitstatus, logfile);
|
||||
return -1;
|
||||
}
|
||||
|
@ -523,8 +521,7 @@ qemuTPMEmulatorReconfigure(const char *storagepath,
|
|||
|
||||
if (virCommandRun(cmd, &exitstatus) < 0 || exitstatus != 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("Could not run '%s --reconfigure'. exitstatus: %d; "
|
||||
"Check error log '%s' for details."),
|
||||
_("Could not run '%1$s --reconfigure'. exitstatus: %2$d; Check error log '%3$s' for details."),
|
||||
swtpm_setup, exitstatus, logfile);
|
||||
return -1;
|
||||
}
|
||||
|
@ -636,7 +633,7 @@ qemuTPMEmulatorBuildCommand(virDomainTPMDef *tpm,
|
|||
if (tpm->data.emulator.hassecretuuid) {
|
||||
if (!virTPMSwtpmCapsGet(VIR_TPM_SWTPM_FEATURE_CMDARG_PWD_FD)) {
|
||||
virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
|
||||
_("%s does not support passing passphrase via file descriptor"),
|
||||
_("%1$s does not support passing passphrase via file descriptor"),
|
||||
swtpm);
|
||||
goto error;
|
||||
}
|
||||
|
@ -674,7 +671,7 @@ qemuTPMEmulatorBuildCommand(virDomainTPMDef *tpm,
|
|||
*/
|
||||
if (incomingMigration && on_shared_storage) {
|
||||
virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED,
|
||||
_("%s (on destination side) does not support the --migration option needed for migration with shared storage"),
|
||||
_("%1$s (on destination side) does not support the --migration option needed for migration with shared storage"),
|
||||
swtpm);
|
||||
goto error;
|
||||
}
|
||||
|
@ -809,7 +806,7 @@ qemuTPMEmulatorPrepareHost(virDomainTPMDef *tpm,
|
|||
/* ... and make sure it can be accessed by swtpm_user */
|
||||
if (chown(tpm->data.emulator.logfile, swtpm_user, swtpm_group) < 0) {
|
||||
virReportSystemError(errno,
|
||||
_("Could not chown on swtpm logfile %s"),
|
||||
_("Could not chown on swtpm logfile %1$s"),
|
||||
tpm->data.emulator.logfile);
|
||||
return -1;
|
||||
}
|
||||
|
@ -989,7 +986,7 @@ qemuTPMEmulatorStart(virQEMUDriver *driver,
|
|||
_("swtpm died unexpectedly"));
|
||||
} else {
|
||||
virReportError(VIR_ERR_OPERATION_FAILED,
|
||||
_("swtpm died and reported: %s"), errbuf);
|
||||
_("swtpm died and reported: %1$s"), errbuf);
|
||||
}
|
||||
goto error;
|
||||
}
|
||||
|
|
|
@ -150,7 +150,7 @@ qemuVhostUserTypeParse(const char *path,
|
|||
|
||||
if ((tmp = qemuVhostUserTypeTypeFromString(type)) <= 0) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unknown vhost-user type: '%s'"),
|
||||
_("unknown vhost-user type: '%1$s'"),
|
||||
type);
|
||||
return -1;
|
||||
}
|
||||
|
@ -189,7 +189,7 @@ qemuVhostUserParse(const char *path)
|
|||
|
||||
if (!(doc = virJSONValueFromString(cont))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to parse json file '%s'"),
|
||||
_("unable to parse json file '%1$s'"),
|
||||
path);
|
||||
return NULL;
|
||||
}
|
||||
|
@ -285,7 +285,7 @@ qemuVhostUserGPUFillCapabilities(qemuVhostUser *vu,
|
|||
|
||||
if (!(featuresJSON = virJSONValueObjectGetArray(doc, "features"))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("failed to get features from '%s'"),
|
||||
_("failed to get features from '%1$s'"),
|
||||
vu->binary);
|
||||
return -1;
|
||||
}
|
||||
|
@ -359,7 +359,7 @@ qemuVhostUserFillDomainGPU(virQEMUDriver *driver,
|
|||
|
||||
if (!(doc = virJSONValueFromString(output))) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("unable to parse json capabilities '%s'"),
|
||||
_("unable to parse json capabilities '%1$s'"),
|
||||
vu->binary);
|
||||
continue;
|
||||
}
|
||||
|
|
|
@ -158,7 +158,7 @@ int qemuExtVhostUserGPUStart(virQEMUDriver *driver,
|
|||
rc = virPidFileReadPath(pidfile, &pid);
|
||||
if (rc < 0) {
|
||||
virReportSystemError(-rc,
|
||||
_("Unable to read vhost-user-gpu pidfile '%s'"),
|
||||
_("Unable to read vhost-user-gpu pidfile '%1$s'"),
|
||||
pidfile);
|
||||
goto cleanup;
|
||||
}
|
||||
|
|
|
@ -190,14 +190,14 @@ qemuVirtioFSStart(virQEMUDriver *driver,
|
|||
|
||||
if (!virFileIsExecutable(fs->binary)) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("virtiofsd binary '%s' is not executable"),
|
||||
_("virtiofsd binary '%1$s' is not executable"),
|
||||
fs->binary);
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (!virFileExists(fs->src->path)) {
|
||||
virReportError(VIR_ERR_INTERNAL_ERROR,
|
||||
_("the virtiofs export directory '%s' does not exist"),
|
||||
_("the virtiofs export directory '%1$s' does not exist"),
|
||||
fs->src->path);
|
||||
return -1;
|
||||
}
|
||||
|
@ -228,12 +228,12 @@ qemuVirtioFSStart(virQEMUDriver *driver,
|
|||
goto error;
|
||||
} else {
|
||||
if ((logfd = open(logpath, O_WRONLY | O_CREAT | O_APPEND, S_IRUSR | S_IWUSR)) < 0) {
|
||||
virReportSystemError(errno, _("failed to create logfile %s"),
|
||||
virReportSystemError(errno, _("failed to create logfile %1$s"),
|
||||
logpath);
|
||||
goto error;
|
||||
}
|
||||
if (virSetCloseExec(logfd) < 0) {
|
||||
virReportSystemError(errno, _("failed to set close-on-exec flag on %s"),
|
||||
virReportSystemError(errno, _("failed to set close-on-exec flag on %1$s"),
|
||||
logpath);
|
||||
goto error;
|
||||
}
|
||||
|
@ -276,7 +276,7 @@ qemuVirtioFSStart(virQEMUDriver *driver,
|
|||
rc = virPidFileReadPath(pidfile, &pid);
|
||||
if (rc < 0) {
|
||||
virReportSystemError(-rc,
|
||||
_("Unable to read virtiofsd pidfile '%s'"),
|
||||
_("Unable to read virtiofsd pidfile '%1$s'"),
|
||||
pidfile);
|
||||
goto error;
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue