diff --git a/src/conf/domain_validate.c b/src/conf/domain_validate.c index 7564f852f2..9265fef4f9 100644 --- a/src/conf/domain_validate.c +++ b/src/conf/domain_validate.c @@ -230,7 +230,7 @@ virDomainVideoDefValidate(const virDomainVideoDef *video, return -1; if (video->blob != VIR_TRISTATE_SWITCH_ABSENT) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("video type '%s' does not support blob resources"), + _("video type '%1$s' does not support blob resources"), virDomainVideoTypeToString(video->type)); return -1; } diff --git a/src/qemu/qemu_validate.c b/src/qemu/qemu_validate.c index b2624c9131..49ba3cd12c 100644 --- a/src/qemu/qemu_validate.c +++ b/src/qemu/qemu_validate.c @@ -45,8 +45,7 @@ qemuValidateDomainDefPSeriesFeature(const virDomainDef *def, if (def->features[feature] != VIR_TRISTATE_SWITCH_ABSENT && !qemuDomainIsPSeries(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' feature is not supported for " - "architecture '%s' or machine type '%s'"), + _("The '%1$s' feature is not supported for architecture '%2$s' or machine type '%3$s'"), virDomainFeatureTypeToString(feature), virArchToString(def->os.arch), def->os.machine); @@ -180,8 +179,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, if (def->features[i] != VIR_DOMAIN_IOAPIC_NONE) { if (!ARCH_IS_X86(def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' feature is not supported for " - "architecture '%s' or machine type '%s'"), + _("The '%1$s' feature is not supported for architecture '%2$s' or machine type '%3$s'"), featureName, virArchToString(def->os.arch), def->os.machine); @@ -205,8 +203,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, if (def->features[i] == VIR_TRISTATE_SWITCH_ON && !qemuDomainIsARMVirt(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' feature is not supported for " - "architecture '%s' or machine type '%s'"), + _("The '%1$s' feature is not supported for architecture '%2$s' or machine type '%3$s'"), featureName, virArchToString(def->os.arch), def->os.machine); @@ -241,9 +238,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, def->apic_eoi != VIR_TRISTATE_SWITCH_ABSENT && !ARCH_IS_X86(def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The 'eoi' attribute of the '%s' feature " - "is not supported for architecture '%s' or " - "machine type '%s'"), + _("The 'eoi' attribute of the '%1$s' feature is not supported for architecture '%2$s' or machine type '%3$s'"), featureName, virArchToString(def->os.arch), def->os.machine); @@ -255,8 +250,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, if (def->features[i] != VIR_TRISTATE_SWITCH_ABSENT && !ARCH_IS_X86(def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' feature is not supported for " - "architecture '%s' or machine type '%s'"), + _("The '%1$s' feature is not supported for architecture '%2$s' or machine type '%3$s'"), featureName, virArchToString(def->os.arch), def->os.machine); @@ -268,8 +262,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, if (def->features[i] != VIR_DOMAIN_HYPERV_MODE_NONE && !ARCH_IS_X86(def->os.arch) && !qemuDomainIsARMVirt(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Hyperv features are not supported for " - "architecture '%s' or machine type '%s'"), + _("Hyperv features are not supported for architecture '%1$s' or machine type '%2$s'"), virArchToString(def->os.arch), def->os.machine); return -1; @@ -280,7 +273,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, if (def->features[i] == VIR_TRISTATE_SWITCH_OFF && ARCH_IS_PPC64(def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("PMU is always enabled for architecture '%s'"), + _("PMU is always enabled for architecture '%1$s'"), virArchToString(def->os.arch)); return -1; } @@ -290,7 +283,7 @@ qemuValidateDomainDefFeatures(const virDomainDef *def, if (def->features[i] == VIR_TRISTATE_SWITCH_ON) { if (def->virtType != VIR_DOMAIN_VIRT_QEMU) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("TCG features are incompatible with domain type '%s'"), + _("TCG features are incompatible with domain type '%1$s'"), virDomainVirtTypeToString(def->virtType)); return -1; } @@ -337,7 +330,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, if (!ARCH_IS_X86(def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CPU maximum physical address bits specification is not supported for '%s' architecture"), + _("CPU maximum physical address bits specification is not supported for '%1$s' architecture"), virArchToString(def->os.arch)); return -1; } @@ -346,7 +339,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, case VIR_CPU_MAX_PHYS_ADDR_MODE_PASSTHROUGH: if (addr->bits != -1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CPU maximum physical address bits number specification cannot be used with mode='%s'"), + _("CPU maximum physical address bits number specification cannot be used with mode='%1$s'"), virCPUMaxPhysAddrModeTypeToString(VIR_CPU_MAX_PHYS_ADDR_MODE_PASSTHROUGH)); return -1; } @@ -355,7 +348,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, case VIR_CPU_MAX_PHYS_ADDR_MODE_EMULATE: if (addr->bits == -1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("if using CPU maximum physical address mode='%s', bits= must be specified too"), + _("if using CPU maximum physical address mode='%1$s', bits= must be specified too"), virCPUMaxPhysAddrModeTypeToString(VIR_CPU_MAX_PHYS_ADDR_MODE_EMULATE)); return -1; } @@ -379,7 +372,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, if (!ARCH_IS_X86(def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CPU cache specification is not supported for '%s' architecture"), + _("CPU cache specification is not supported for '%1$s' architecture"), virArchToString(def->os.arch)); return -1; } @@ -388,7 +381,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, case VIR_CPU_CACHE_MODE_EMULATE: if (cache->level != 3) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CPU cache mode '%s' can only be used with level='3'"), + _("CPU cache mode '%1$s' can only be used with level='3'"), virCPUCacheModeTypeToString(cache->mode)); return -1; } @@ -398,7 +391,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, if (def->cpu->mode != VIR_CPU_MODE_HOST_PASSTHROUGH && def->cpu->mode != VIR_CPU_MODE_MAXIMUM) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CPU cache mode '%s' can only be used with '%s' / '%s' CPUs"), + _("CPU cache mode '%1$s' can only be used with '%2$s' / '%3$s' CPUs"), virCPUCacheModeTypeToString(cache->mode), virCPUModeTypeToString(VIR_CPU_MODE_HOST_PASSTHROUGH), virCPUModeTypeToString(VIR_CPU_MODE_MAXIMUM)); @@ -407,7 +400,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, if (cache->level != -1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported CPU cache level for mode '%s'"), + _("unsupported CPU cache level for mode '%1$s'"), virCPUCacheModeTypeToString(cache->mode)); return -1; } @@ -416,7 +409,7 @@ qemuValidateDomainDefCpu(virQEMUDriver *driver, case VIR_CPU_CACHE_MODE_DISABLE: if (cache->level != -1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported CPU cache level for mode '%s'"), + _("unsupported CPU cache level for mode '%1$s'"), virCPUCacheModeTypeToString(cache->mode)); return -1; } @@ -511,7 +504,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, switch ((virDomainTimerNameType)timer->name) { case VIR_DOMAIN_TIMER_NAME_PLATFORM: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported timer type (name) '%s'"), + _("unsupported timer type (name) '%1$s'"), virDomainTimerNameTypeToString(timer->name)); return -1; @@ -520,8 +513,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, case VIR_DOMAIN_TIMER_NAME_HYPERVCLOCK: if (!ARCH_IS_X86(def->os.arch) && timer->present == VIR_TRISTATE_BOOL_YES) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Configuring the '%s' timer is not supported " - "for virtType=%s arch=%s machine=%s guests"), + _("Configuring the '%1$s' timer is not supported for virtType=%2$s arch=%3$s machine=%4$s guests"), virDomainTimerNameTypeToString(timer->name), virDomainVirtTypeToString(def->virtType), virArchToString(def->os.arch), @@ -542,7 +534,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, break; case VIR_DOMAIN_TIMER_TRACK_BOOT: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported rtc timer track '%s'"), + _("unsupported rtc timer track '%1$s'"), virDomainTimerTrackTypeToString(timer->track)); return -1; case VIR_DOMAIN_TIMER_TRACK_LAST: @@ -561,7 +553,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE: case VIR_DOMAIN_TIMER_TICKPOLICY_DISCARD: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported rtc timer tickpolicy '%s'"), + _("unsupported rtc timer tickpolicy '%1$s'"), virDomainTimerTickpolicyTypeToString( timer->tickpolicy)); return -1; @@ -580,7 +572,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_KVM_PIT_TICK_POLICY)) { /* can't catchup if we don't have kvm-pit */ virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported pit tickpolicy '%s'"), + _("unsupported pit tickpolicy '%1$s'"), virDomainTimerTickpolicyTypeToString( timer->tickpolicy)); return -1; @@ -589,7 +581,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE: /* no way to support this mode for pit in qemu */ virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported pit tickpolicy '%s'"), + _("unsupported pit tickpolicy '%1$s'"), virDomainTimerTickpolicyTypeToString( timer->tickpolicy)); return -1; @@ -613,8 +605,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, if (def->virtType != VIR_DOMAIN_VIRT_KVM || !qemuDomainIsARMVirt(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Configuring the '%s' timer is not supported " - "for virtType=%s arch=%s machine=%s guests"), + _("Configuring the '%1$s' timer is not supported for virtType=%2$s arch=%3$s machine=%4$s guests"), virDomainTimerNameTypeToString(timer->name), virDomainVirtTypeToString(def->virtType), virArchToString(def->os.arch), @@ -623,14 +614,13 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, } if (timer->present == VIR_TRISTATE_BOOL_NO) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' timer can't be disabled"), + _("The '%1$s' timer can't be disabled"), virDomainTimerNameTypeToString(timer->name)); return -1; } if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CPU_KVM_NO_ADJVTIME)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Configuring the '%s' timer is not supported " - "with this QEMU binary"), + _("Configuring the '%1$s' timer is not supported with this QEMU binary"), virDomainTimerNameTypeToString(timer->name)); return -1; } @@ -643,7 +633,7 @@ qemuValidateDomainDefClockTimers(const virDomainDef *def, case VIR_DOMAIN_TIMER_TICKPOLICY_CATCHUP: case VIR_DOMAIN_TIMER_TICKPOLICY_MERGE: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' timer does not support tickpolicy '%s'"), + _("The '%1$s' timer does not support tickpolicy '%2$s'"), virDomainTimerNameTypeToString(timer->name), virDomainTimerTickpolicyTypeToString(timer->tickpolicy)); return -1; @@ -727,7 +717,7 @@ qemuValidateDomainDefNvram(const virDomainDef *def, case VIR_STORAGE_TYPE_NVME: case VIR_STORAGE_TYPE_VHOST_USER: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported nvram disk type '%s'"), + _("unsupported nvram disk type '%1$s'"), virStorageTypeToString(src->type)); return -1; @@ -853,8 +843,8 @@ qemuValidateDomainVCpuTopology(const virDomainDef *def, virQEMUCaps *qemuCaps) if (maxCpus > 0 && virDomainDefGetVcpusMax(def) > maxCpus) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Maximum CPUs greater than specified machine " - "type limit %u"), maxCpus); + _("Maximum CPUs greater than specified machine type limit %1$u"), + maxCpus); return -1; } @@ -888,8 +878,7 @@ qemuValidateDomainVCpuTopology(const virDomainDef *def, virQEMUCaps *qemuCaps) granularity = qemuValidateDefGetVcpuHotplugGranularity(def); if ((virDomainDefGetVcpus(def) % granularity) != 0) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("vCPUs count must be a multiple of the vCPU " - "hotplug granularity (%u)"), + _("vCPUs count must be a multiple of the vCPU hotplug granularity (%1$u)"), granularity); return -1; } @@ -899,15 +888,13 @@ qemuValidateDomainVCpuTopology(const virDomainDef *def, virQEMUCaps *qemuCaps) virDomainDefGetVcpusMax(def) > QEMU_MAX_VCPUS_WITHOUT_EIM) { if (!qemuDomainIsQ35(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("more than %d vCPUs are only supported on " - "q35-based machine types"), + _("more than %1$d vCPUs are only supported on q35-based machine types"), QEMU_MAX_VCPUS_WITHOUT_EIM); return -1; } if (!def->iommu || def->iommu->eim != VIR_TRISTATE_SWITCH_ON) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("more than %d vCPUs require extended interrupt " - "mode enabled on the iommu device"), + _("more than %1$d vCPUs require extended interrupt mode enabled on the iommu device"), QEMU_MAX_VCPUS_WITHOUT_EIM); return -1; } @@ -966,8 +953,7 @@ qemuValidateDomainDefMemory(const virDomainDef *def, mem->access != VIR_DOMAIN_MEMORY_ACCESS_DEFAULT && mem->access != VIR_DOMAIN_MEMORY_ACCESS_PRIVATE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("memory access mode '%s' not supported " - "without guest numa node"), + _("memory access mode '%1$s' not supported without guest numa node"), virDomainMemoryAccessTypeToString(mem->access)); return -1; } @@ -1025,7 +1011,7 @@ qemuValidateDomainDefConsole(const virDomainDef *def, default: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported console target type %s"), + _("unsupported console target type %1$s"), NULLSTR(virDomainChrConsoleTargetTypeToString(console->targetType))); return -1; } @@ -1297,28 +1283,28 @@ qemuValidateDomainDef(const virDomainDef *def, if (def->os.type != VIR_DOMAIN_OSTYPE_HVM) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Emulator '%s' does not support os type '%s'"), + _("Emulator '%1$s' does not support os type '%2$s'"), def->emulator, virDomainOSTypeToString(def->os.type)); return -1; } if (!virQEMUCapsIsArchSupported(qemuCaps, def->os.arch)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Emulator '%s' does not support arch '%s'"), + _("Emulator '%1$s' does not support arch '%2$s'"), def->emulator, virArchToString(def->os.arch)); return -1; } if (!virQEMUCapsIsVirtTypeSupported(qemuCaps, def->virtType)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Emulator '%s' does not support virt type '%s'"), + _("Emulator '%1$s' does not support virt type '%2$s'"), def->emulator, virDomainVirtTypeToString(def->virtType)); return -1; } if (!virQEMUCapsIsMachineSupported(qemuCaps, def->virtType, def->os.machine)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Emulator '%s' does not support machine type '%s'"), + _("Emulator '%1$s' does not support machine type '%2$s'"), def->emulator, def->os.machine); return -1; } @@ -1326,7 +1312,7 @@ qemuValidateDomainDef(const virDomainDef *def, if (virQEMUCapsMachineSupportsACPI(qemuCaps, def->virtType, def->os.machine) == VIR_TRISTATE_BOOL_NO && def->features[VIR_DOMAIN_FEATURE_ACPI] == VIR_TRISTATE_SWITCH_ON) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("machine type '%s' does not support ACPI"), + _("machine type '%1$s' does not support ACPI"), def->os.machine); return -1; } @@ -1504,8 +1490,7 @@ qemuValidateDomainDeviceDefZPCIAddress(virDomainDeviceInfo *info, (zpci->uid.value > VIR_DOMAIN_DEVICE_ZPCI_MAX_UID || zpci->uid.value == 0)) { virReportError(VIR_ERR_XML_ERROR, - _("Invalid PCI address uid='0x%.4x', " - "must be > 0x0000 and <= 0x%.4x"), + _("Invalid PCI address uid='0x%1$.4x', must be > 0x0000 and <= 0x%2$.4x"), zpci->uid.value, VIR_DOMAIN_DEVICE_ZPCI_MAX_UID); return -1; @@ -1647,8 +1632,7 @@ qemuValidateDomainDeviceDefAddress(const virDomainDeviceDef *dev, if (addr->has_reg && addr->reg > 0xffffffff) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("spapr-vio reg='0x%llx' exceeds maximum " - "possible value (0xffffffff)"), + _("spapr-vio reg='0x%1$llx' exceeds maximum possible value (0xffffffff)"), addr->reg); return -1; } @@ -1664,7 +1648,7 @@ qemuValidateDomainDeviceDefAddress(const virDomainDeviceDef *dev, case VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW: if (!qemuDomainIsS390CCW(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("cannot use CCW address type for device '%s' using machine type '%s'"), + _("cannot use CCW address type for device '%1$s' using machine type '%2$s'"), NULLSTR(info->alias), def->os.machine); return -1; } @@ -1794,7 +1778,7 @@ qemuValidateDomainDefVhostUserRequireSharedMemory(const virDomainDef *def, if (numa_nodes == 0 && def->mem.access != VIR_DOMAIN_MEMORY_ACCESS_SHARED) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("'%s' requires shared memory"), name); + _("'%1$s' requires shared memory"), name); return -1; } @@ -1806,7 +1790,7 @@ qemuValidateDomainDefVhostUserRequireSharedMemory(const virDomainDef *def, case VIR_DOMAIN_MEMORY_ACCESS_DEFAULT: if (def->mem.access != VIR_DOMAIN_MEMORY_ACCESS_SHARED) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("'%s' requires shared memory"), name); + _("'%1$s' requires shared memory"), name); return -1; } break; @@ -1814,7 +1798,7 @@ qemuValidateDomainDefVhostUserRequireSharedMemory(const virDomainDef *def, break; case VIR_DOMAIN_MEMORY_ACCESS_PRIVATE: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("'%s' requires shared memory"), name); + _("'%1$s' requires shared memory"), name); return -1; case VIR_DOMAIN_MEMORY_ACCESS_LAST: @@ -1887,7 +1871,7 @@ qemuValidateDomainDeviceDefNetwork(const virDomainNetDef *net, if (ip->prefix && ip->prefix != 64) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported IPv6 address prefix='%u' - must be 64"), + _("unsupported IPv6 address prefix='%1$u' - must be 64"), ip->prefix); return -1; } @@ -1908,7 +1892,7 @@ qemuValidateDomainDeviceDefNetwork(const virDomainNetDef *net, if (net->model != VIR_DOMAIN_NET_MODEL_VIRTIO) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("invalid model for interface of type '%s': '%s'"), + _("invalid model for interface of type '%1$s': '%2$s'"), virDomainNetTypeToString(net->type), virDomainNetModelTypeToString(net->model)); return -1; @@ -1956,7 +1940,7 @@ qemuValidateDomainDeviceDefNetwork(const virDomainNetDef *net, if (net->mtu && !qemuDomainNetSupportsMTU(net->type, net->backend.type)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("setting MTU on interface type %s is not supported yet"), + _("setting MTU on interface type %1$s is not supported yet"), virDomainNetTypeToString(net->type)); return -1; } @@ -1965,7 +1949,7 @@ qemuValidateDomainDeviceDefNetwork(const virDomainNetDef *net, if (net->teaming->type == VIR_DOMAIN_NET_TEAMING_TYPE_PERSISTENT && !virDomainNetIsVirtioModel(net)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("virtio-net teaming persistent interface must be , not '%s'"), + _("virtio-net teaming persistent interface must be , not '%1$s'"), virDomainNetGetModelString(net)); return -1; } @@ -1973,7 +1957,7 @@ qemuValidateDomainDeviceDefNetwork(const virDomainNetDef *net, net->type != VIR_DOMAIN_NET_TYPE_HOSTDEV && net->type != VIR_DOMAIN_NET_TYPE_NETWORK) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("virtio-net teaming transient interface must be type='hostdev', not '%s'"), + _("virtio-net teaming transient interface must be type='hostdev', not '%1$s'"), virDomainNetTypeToString(net->type)); return -1; } @@ -1981,7 +1965,7 @@ qemuValidateDomainDeviceDefNetwork(const virDomainNetDef *net, if (net->coalesce && !qemuValidateNetSupportsCoalesce(net->type)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("coalesce settings on interface type %s are not supported"), + _("coalesce settings on interface type %1$s are not supported"), virDomainNetTypeToString(net->type)); return -1; } @@ -2078,7 +2062,7 @@ qemuValidateDomainChrTargetDef(const virDomainChrDef *chr) if (chr->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE && chr->info.type != expected) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Target type '%s' requires address type '%s'"), + _("Target type '%1$s' requires address type '%2$s'"), virDomainChrSerialTargetTypeToString(chr->targetType), virDomainDeviceAddressTypeToString(expected)); return -1; @@ -2089,8 +2073,7 @@ qemuValidateDomainChrTargetDef(const virDomainChrDef *chr) case VIR_DOMAIN_CHR_SERIAL_TARGET_TYPE_SCLP: if (chr->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Target type '%s' cannot have an " - "associated address"), + _("Target type '%1$s' cannot have an associated address"), virDomainChrSerialTargetTypeToString(chr->targetType)); return -1; } @@ -2117,7 +2100,7 @@ qemuValidateDomainChrTargetDef(const virDomainChrDef *chr) if (chr->targetType != expected) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Target model '%s' requires target type '%s'"), + _("Target model '%1$s' requires target type '%2$s'"), virDomainChrSerialTargetModelTypeToString(chr->targetModel), virDomainChrSerialTargetTypeToString(expected)); return -1; @@ -2161,7 +2144,7 @@ qemuValidateDomainChrSourceDef(const virDomainChrSourceDef *def, case VIR_DOMAIN_CHR_TYPE_QEMU_VDAGENT: if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_CHARDEV_QEMU_VDAGENT)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("chardev '%s' not supported in this QEMU binary"), + _("chardev '%1$s' not supported in this QEMU binary"), virDomainChrTypeToString(def->type)); return -1; } @@ -2171,7 +2154,7 @@ qemuValidateDomainChrSourceDef(const virDomainChrSourceDef *def, case VIR_DOMAIN_CHR_TYPE_SPICEPORT: if (!virDomainDefHasSpiceGraphics(vmdef)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("chardev '%s' not supported without spice graphics"), + _("chardev '%1$s' not supported without spice graphics"), virDomainChrTypeToString(def->type)); return -1; } @@ -2242,9 +2225,7 @@ qemuValidateDomainChrDef(const virDomainChrDef *dev, if (!isCompatible) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Serial device with target type '%s' and " - "target model '%s' not compatible with guest " - "architecture or machine type"), + _("Serial device with target type '%1$s' and target model '%2$s' not compatible with guest architecture or machine type"), virDomainChrSerialTargetTypeToString(dev->targetType), virDomainChrSerialTargetModelTypeToString(dev->targetModel)); return -1; @@ -2358,7 +2339,7 @@ qemuValidateDomainRNGDef(const virDomainRNGDef *def, if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(rngCaps.model, def->model)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("domain configuration does not support rng model '%s'"), + _("domain configuration does not support rng model '%1$s'"), virDomainRNGModelTypeToString(def->model)); return -1; } @@ -2377,7 +2358,7 @@ qemuValidateDomainRedirdevDef(const virDomainRedirdevDef *dev, if (dev->bus != VIR_DOMAIN_REDIRDEV_BUS_USB) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Redirection bus %s is not supported by QEMU"), + _("Redirection bus %1$s is not supported by QEMU"), virDomainRedirdevBusTypeToString(dev->bus)); return -1; } @@ -2410,7 +2391,7 @@ qemuValidateDomainWatchdogDef(const virDomainWatchdogDef *dev, if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE && dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s model of watchdog can go only on PCI bus"), + _("%1$s model of watchdog can go only on PCI bus"), virDomainWatchdogModelTypeToString(dev->model)); return -1; } @@ -2419,7 +2400,7 @@ qemuValidateDomainWatchdogDef(const virDomainWatchdogDef *dev, case VIR_DOMAIN_WATCHDOG_MODEL_IB700: if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s model of watchdog does not support configuring the address"), + _("%1$s model of watchdog does not support configuring the address"), virDomainWatchdogModelTypeToString(dev->model)); return -1; } @@ -2428,13 +2409,13 @@ qemuValidateDomainWatchdogDef(const virDomainWatchdogDef *dev, case VIR_DOMAIN_WATCHDOG_MODEL_DIAG288: if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s model of watchdog is virtual and cannot go on any bus."), + _("%1$s model of watchdog is virtual and cannot go on any bus."), virDomainWatchdogModelTypeToString(dev->model)); return -1; } if (!(ARCH_IS_S390(def->os.arch))) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s model of watchdog is allowed for s390 and s390x only"), + _("%1$s model of watchdog is allowed for s390 and s390x only"), virDomainWatchdogModelTypeToString(dev->model)); return -1; } @@ -2443,13 +2424,13 @@ qemuValidateDomainWatchdogDef(const virDomainWatchdogDef *dev, case VIR_DOMAIN_WATCHDOG_MODEL_ITCO: if (dev->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s model of watchdog is part of the machine and cannot have any address set."), + _("%1$s model of watchdog is part of the machine and cannot have any address set."), virDomainWatchdogModelTypeToString(dev->model)); return -1; } if (!qemuDomainIsQ35(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s model of watchdog is only part of q35 machine"), + _("%1$s model of watchdog is only part of q35 machine"), virDomainWatchdogModelTypeToString(dev->model)); return -1; } @@ -2606,8 +2587,7 @@ qemuValidateDomainDeviceDefHostdev(const virDomainHostdevDef *hostdev, /* forbid capabilities mode hostdev in this kind of hypervisor */ if (hostdev->mode == VIR_DOMAIN_HOSTDEV_MODE_CAPABILITIES) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("hostdev mode 'capabilities' is not " - "supported in %s"), + _("hostdev mode 'capabilities' is not supported in %1$s"), virDomainVirtTypeToString(def->virtType)); return -1; } @@ -2690,7 +2670,7 @@ qemuValidateDomainDeviceDefVideo(const virDomainVideoDef *video, if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(videoCaps.modelType, video->type)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("domain configuration does not support video model '%s'"), + _("domain configuration does not support video model '%1$s'"), virDomainVideoTypeToString(video->type)); return -1; } @@ -2699,14 +2679,14 @@ qemuValidateDomainDeviceDefVideo(const virDomainVideoDef *video, video->type != VIR_DOMAIN_VIDEO_TYPE_VIRTIO) { if (!video->primary) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("video type '%s' is only valid as primary video device"), + _("video type '%1$s' is only valid as primary video device"), virDomainVideoTypeToString(video->type)); return -1; } if (video->heads != 1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("video type '%s' doesn't support multiple 'heads'"), + _("video type '%1$s' doesn't support multiple 'heads'"), virDomainVideoTypeToString(video->type)); return -1; } @@ -2721,13 +2701,13 @@ qemuValidateDomainDeviceDefVideo(const virDomainVideoDef *video, if (video->type == VIR_DOMAIN_VIDEO_TYPE_QXL) { if (video->vram > (UINT_MAX / 1024)) { virReportError(VIR_ERR_OVERFLOW, - _("value for 'vram' must be less than '%u'"), + _("value for 'vram' must be less than '%1$u'"), UINT_MAX / 1024); return -1; } if (video->ram > (UINT_MAX / 1024)) { virReportError(VIR_ERR_OVERFLOW, - _("value for 'ram' must be less than '%u'"), + _("value for 'ram' must be less than '%1$u'"), UINT_MAX / 1024); return -1; } @@ -2822,7 +2802,7 @@ qemuValidateDomainDeviceDefDiskSerial(const char *value) { if (strspn(value, QEMU_SERIAL_PARAM_ACCEPTED_CHARS) != strlen(value)) { virReportError(VIR_ERR_INTERNAL_ERROR, - _("driver serial '%s' contains unsafe characters"), + _("driver serial '%1$s' contains unsafe characters"), value); return -1; } @@ -2850,7 +2830,7 @@ qemuValidateDomainDeviceDefDiskIOThreads(const virDomainDef *def, case VIR_DOMAIN_DISK_BUS_NONE: case VIR_DOMAIN_DISK_BUS_LAST: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOThreads not available for bus %s target %s"), + _("IOThreads not available for bus %1$s target %2$s"), virDomainDiskBusTypeToString(disk->bus), disk->dst); return false; } @@ -2858,7 +2838,7 @@ qemuValidateDomainDeviceDefDiskIOThreads(const virDomainDef *def, /* Can we find the disk iothread in the iothreadid list? */ if (!virDomainIOThreadIDFind(def, disk->iothread)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Disk iothread '%u' not defined in iothreadid"), + _("Disk iothread '%1$u' not defined in iothreadid"), disk->iothread); return false; } @@ -2878,7 +2858,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->bus == VIR_DOMAIN_DISK_BUS_USB || disk->bus == VIR_DOMAIN_DISK_BUS_SD) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CHS geometry can not be set for '%s' bus"), + _("CHS geometry can not be set for '%1$s' bus"), virDomainDiskBusTypeToString(disk->bus)); return -1; } @@ -2886,7 +2866,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->geometry.trans != VIR_DOMAIN_DISK_TRANS_DEFAULT && disk->bus != VIR_DOMAIN_DISK_BUS_IDE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("CHS translation mode can only be set for 'ide' bus not '%s'"), + _("CHS translation mode can only be set for 'ide' bus not '%1$s'"), virDomainDiskBusTypeToString(disk->bus)); return -1; } @@ -2894,7 +2874,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->serial && disk->bus == VIR_DOMAIN_DISK_BUS_SD) { virReportError(VIR_ERR_INTERNAL_ERROR, - _("Serial property not supported for drive bus '%s'"), + _("Serial property not supported for drive bus '%1$s'"), virDomainDiskBusTypeToString(disk->bus)); return -1; } @@ -2903,7 +2883,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, (disk->bus == VIR_DOMAIN_DISK_BUS_VIRTIO || disk->bus == VIR_DOMAIN_DISK_BUS_SD)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("disk type of '%s' does not support ejectable media"), + _("disk type of '%1$s' does not support ejectable media"), disk->dst); return -1; } @@ -2911,7 +2891,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->copy_on_read == VIR_TRISTATE_SWITCH_ON) { if (disk->src->readonly) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("copy_on_read is not compatible with read-only disk '%s'"), + _("copy_on_read is not compatible with read-only disk '%1$s'"), disk->dst); return -1; } @@ -2919,7 +2899,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->device == VIR_DOMAIN_DISK_DEVICE_CDROM || disk->device == VIR_DOMAIN_DISK_DEVICE_FLOPPY) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("copy_on_read is not supported with removable disk '%s'"), + _("copy_on_read is not supported with removable disk '%1$s'"), disk->dst); return -1; } @@ -2973,7 +2953,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->bus != VIR_DOMAIN_DISK_BUS_VIRTIO && disk->bus != VIR_DOMAIN_DISK_BUS_SCSI) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("disk device='lun' is not supported for bus='%s'"), + _("disk device='lun' is not supported for bus='%1$s'"), virDomainDiskBusTypeToString(disk->bus)); return -1; } @@ -2989,7 +2969,7 @@ qemuValidateDomainDeviceDefDiskFrontend(const virDomainDiskDef *disk, if (disk->copy_on_read == VIR_TRISTATE_SWITCH_ON) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("copy_on_read is not compatible with 'lun' disk '%s'"), + _("copy_on_read is not compatible with 'lun' disk '%1$s'"), disk->dst); return -1; } @@ -3198,7 +3178,7 @@ qemuValidateDomainDeviceDefDiskBlkdeviotune(const virDomainDiskDef *disk, if (!virDomainBlockIoTuneInfoEqual(&d->blkdeviotune, &disk->blkdeviotune)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("different iotunes for disks %s and %s"), + _("different iotunes for disks %1$s and %2$s"), disk->dst, d->dst); return -1; } @@ -3219,8 +3199,8 @@ qemuValidateDomainDeviceDefDiskBlkdeviotune(const virDomainDiskDef *disk, disk->blkdeviotune.write_iops_sec_max > QEMU_BLOCK_IOTUNE_MAX || disk->blkdeviotune.size_iops_sec > QEMU_BLOCK_IOTUNE_MAX) { virReportError(VIR_ERR_ARGUMENT_UNSUPPORTED, - _("block I/O throttle limit must " - "be no more than %llu using QEMU"), QEMU_BLOCK_IOTUNE_MAX); + _("block I/O throttle limit must be no more than %1$llu using QEMU"), + QEMU_BLOCK_IOTUNE_MAX); return -1; } @@ -3241,26 +3221,26 @@ qemuValidateDomainDeviceDefDiskTransient(const virDomainDiskDef *disk, if (virStorageSourceIsEmpty(disk->src)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("transient disk '%s' must not be empty"), disk->dst); + _("transient disk '%1$s' must not be empty"), disk->dst); return -1; } if (disk->src->readonly) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("transient disk '%s' must not be read-only"), disk->dst); + _("transient disk '%1$s' must not be read-only"), disk->dst); return -1; } if (actualType != VIR_STORAGE_TYPE_FILE) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("transient disk supported only with 'file' type (%s)"), + _("transient disk supported only with 'file' type (%1$s)"), disk->dst); return -1; } if (disk->device != VIR_DOMAIN_DISK_DEVICE_DISK) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("transient disk supported only with 'disk' device (%s)"), + _("transient disk supported only with 'disk' device (%1$s)"), disk->dst); return -1; } @@ -3290,7 +3270,7 @@ qemuValidateDomainDeviceDefDiskTransient(const virDomainDiskDef *disk, case VIR_DOMAIN_DISK_BUS_LAST: default: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("disk bus '%s' doesn't support transiend disk backing image sharing"), + _("disk bus '%1$s' doesn't support transiend disk backing image sharing"), virDomainDiskBusTypeToString(disk->bus)); return -1; } @@ -3322,27 +3302,27 @@ qemuValidateDomainDeviceDefDisk(const virDomainDiskDef *disk, if (disk->src->shared && !disk->src->readonly && !qemuBlockStorageSourceSupportsConcurrentAccess(disk->src)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("shared access for disk '%s' requires use of " - "supported storage format"), disk->dst); + _("shared access for disk '%1$s' requires use of supported storage format"), + disk->dst); return -1; } if (driverName && STRNEQ(driverName, "qemu")) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("unsupported driver name '%s' for disk '%s'"), + _("unsupported driver name '%1$s' for disk '%2$s'"), driverName, disk->dst); return -1; } if (virDiskNameParse(disk->dst, &idx, &partition) < 0) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("invalid disk target '%s'"), disk->dst); + _("invalid disk target '%1$s'"), disk->dst); return -1; } if (partition != 0) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("invalid disk target '%s', partitions can't appear in disk targets"), + _("invalid disk target '%1$s', partitions can't appear in disk targets"), disk->dst); return -1; } @@ -3355,7 +3335,7 @@ qemuValidateDomainDeviceDefDisk(const virDomainDiskDef *disk, if (disk->bus == VIR_DOMAIN_DISK_BUS_SD && disk->src && disk->src->encryption && disk->src->encryption->nsecrets > 1) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("sd card '%s' does not support multiple encryption secrets"), + _("sd card '%1$s' does not support multiple encryption secrets"), disk->dst); return -1; } @@ -3437,7 +3417,7 @@ qemuValidateCheckSCSIControllerModel(virQEMUCaps *qemuCaps, case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_AUTO: case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_BUSLOGIC: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Unsupported controller model: %s"), + _("Unsupported controller model: %1$s"), virDomainControllerModelSCSITypeToString(model)); return false; case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_NCR53C90: @@ -3464,7 +3444,7 @@ qemuValidateCheckSCSIControllerModel(virQEMUCaps *qemuCaps, case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_DEFAULT: case VIR_DOMAIN_CONTROLLER_MODEL_SCSI_LAST: virReportError(VIR_ERR_INTERNAL_ERROR, - _("Unexpected SCSI controller model %d"), + _("Unexpected SCSI controller model %1$d"), model); return false; } @@ -3547,7 +3527,7 @@ qemuValidateCheckSCSIControllerIOThreads(const virDomainControllerDef *controlle /* Can we find the controller iothread in the iothreadid list? */ if (!virDomainIOThreadIDFind(def, controller->iothread)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("controller iothread '%u' not defined in iothreadid"), + _("controller iothread '%1$u' not defined in iothreadid"), controller->iothread); return false; } @@ -3684,18 +3664,15 @@ qemuValidateDomainDeviceDefControllerAttributes(const virDomainControllerDef *co #define virReportControllerMissingOption(cont, model, modelName, option) \ virReportError(VIR_ERR_INTERNAL_ERROR, \ - _("Required option '%s' is not set for PCI controller " \ - "with index '%d', model '%s' and modelName '%s'"), \ + _("Required option '%1$s' is not set for PCI controller with index '%2$d', model '%3$s' and modelName '%4$s'"), \ (option), (cont->idx), (model), (modelName)); #define virReportControllerInvalidOption(cont, model, modelName, option) \ virReportError(VIR_ERR_CONFIG_UNSUPPORTED, \ - _("Option '%s' is not valid for PCI controller " \ - "with index '%d', model '%s' and modelName '%s'"), \ + _("Option '%1$s' is not valid for PCI controller with index '%2$d', model '%3$s' and modelName '%4$s'"), \ (option), (cont->idx), (model), (modelName)); #define virReportControllerInvalidValue(cont, model, modelName, option) \ virReportError(VIR_ERR_CONFIG_UNSUPPORTED, \ - _("Option '%s' has invalid value for PCI controller " \ - "with index '%d', model '%s' and modelName '%s'"), \ + _("Option '%1$s' has invalid value for PCI controller with index '%2$d', model '%3$s' and modelName '%4$s'"), \ (option), (cont->idx), (model), (modelName)); @@ -3859,7 +3836,7 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_TO_PCI_BRIDGE: if (cont->idx == 0) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Index for '%s' controllers must be > 0"), + _("Index for '%1$s' controllers must be > 0"), model); return -1; } @@ -3878,7 +3855,7 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, * the index must be zero */ if (cont->idx != 0) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Index for '%s' controllers must be 0"), + _("Index for '%1$s' controllers must be 0"), model); return -1; } @@ -3938,8 +3915,8 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, if (pciopts->pcihole64 || pciopts->pcihole64size != 0) { if (!qemuDomainIsI440FX(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Setting the 64-bit PCI hole size is not " - "supported for machine '%s'"), def->os.machine); + _("Setting the 64-bit PCI hole size is not supported for machine '%1$s'"), + def->os.machine); return -1; } } @@ -3949,8 +3926,8 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, if (pciopts->pcihole64 || pciopts->pcihole64size != 0) { if (!qemuDomainIsQ35(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Setting the 64-bit PCI hole size is not " - "supported for machine '%s'"), def->os.machine); + _("Setting the 64-bit PCI hole size is not supported for machine '%1$s'"), + def->os.machine); return -1; } } @@ -4129,7 +4106,7 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, case VIR_DOMAIN_CONTROLLER_MODEL_PCI_ROOT: if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_PIIX4_ACPI_ROOT_PCI_HOTPLUG)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("setting the '%s' property on a '%s' device is not supported by this QEMU binary"), + _("setting the '%1$s' property on a '%2$s' device is not supported by this QEMU binary"), "hotplug", "pci-root"); return -1; } @@ -4138,7 +4115,7 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, case VIR_DOMAIN_CONTROLLER_MODEL_PCIE_SWITCH_DOWNSTREAM_PORT: if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_PCIE_ROOT_PORT_HOTPLUG)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("setting the '%s' property on a '%s' device is not supported by this QEMU binary"), + _("setting the '%1$s' property on a '%2$s' device is not supported by this QEMU binary"), "hotplug", modelName); return -1; } @@ -4164,13 +4141,13 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, /* QEMU device availability */ if (cap < 0) { virReportError(VIR_ERR_INTERNAL_ERROR, - _("Unknown QEMU device for '%s' controller"), + _("Unknown QEMU device for '%1$s' controller"), modelName); return -1; } if (cap > 0 && !virQEMUCapsGet(qemuCaps, cap)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The '%s' device is not supported by this QEMU binary"), + _("The '%1$s' device is not supported by this QEMU binary"), modelName); return -1; } @@ -4182,7 +4159,7 @@ qemuValidateDomainDeviceDefControllerPCI(const virDomainControllerDef *cont, pciopts->numaNode != -1 && !virQEMUCapsGet(qemuCaps, QEMU_CAPS_SPAPR_PCI_HOST_BRIDGE_NUMA_NODE)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Option '%s' is not supported by '%s' device with this QEMU binary"), + _("Option '%1$s' is not supported by '%2$s' device with this QEMU binary"), "numaNode", modelName); return -1; } @@ -4310,7 +4287,7 @@ qemuValidateDomainDeviceDefVNCGraphics(const virDomainGraphicsDef *graphics, if (graphics->data.vnc.auth.passwd && strlen(graphics->data.vnc.auth.passwd) > 8) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("VNC password is %zu characters long, only 8 permitted"), + _("VNC password is %1$zu characters long, only 8 permitted"), strlen(graphics->data.vnc.auth.passwd)); return -1; } @@ -4351,7 +4328,7 @@ qemuValidateDomainDeviceDefGraphics(const virDomainGraphicsDef *graphics, if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(graphicsCaps.type, graphics->type)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s graphics are not supported with this QEMU"), + _("%1$s graphics are not supported with this QEMU"), virDomainGraphicsTypeToString(graphics->type)); return -1; } @@ -4616,21 +4593,21 @@ qemuValidateDomainDeviceDefCrypto(virDomainCryptoDef *crypto, if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(cryptoCaps.model, crypto->model)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("crypto model %s is not supported"), + _("crypto model %1$s is not supported"), virDomainCryptoModelTypeToString(crypto->model)); return -1; } if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(cryptoCaps.type, crypto->type)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("crypto type %s is not supported"), + _("crypto type %1$s is not supported"), virDomainCryptoTypeTypeToString(crypto->type)); return -1; } if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(cryptoCaps.backendModel, crypto->backend)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("crypto backend %s is not supported"), + _("crypto backend %1$s is not supported"), virDomainCryptoBackendTypeToString(crypto->backend)); return -1; } @@ -4688,7 +4665,7 @@ qemuValidateDomainDeviceDefSound(virDomainSoundDef *sound, case VIR_DOMAIN_SOUND_MODEL_ICH7: case VIR_DOMAIN_SOUND_MODEL_LAST: virReportError(VIR_ERR_INTERNAL_ERROR, - _("sound card model '%s' is not supported by qemu"), + _("sound card model '%1$s' is not supported by qemu"), virDomainSoundModelTypeToString(sound->model)); return -1; } @@ -4704,7 +4681,7 @@ qemuValidateDomainDeviceDefSound(virDomainSoundDef *sound, if (flags == -1 || !virQEMUCapsGet(qemuCaps, flags)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s not supported in this QEMU binary"), stype); + _("%1$s not supported in this QEMU binary"), stype); return -1; } } @@ -4742,7 +4719,7 @@ qemuValidateDomainDeviceDefTPM(virDomainTPMDef *tpm, if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(tpmCaps.backendVersion, version)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("TPM version '%s' is not supported"), + _("TPM version '%1$s' is not supported"), virDomainTPMVersionTypeToString(version)); return -1; } @@ -4752,7 +4729,7 @@ qemuValidateDomainDeviceDefTPM(virDomainTPMDef *tpm, /* TPM 1.2 + CRB do not work */ if (tpm->model == VIR_DOMAIN_TPM_MODEL_CRB) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Unsupported interface '%s' for TPM 1.2"), + _("Unsupported interface '%1$s' for TPM 1.2"), virDomainTPMModelTypeToString(tpm->model)); return -1; } @@ -4778,8 +4755,7 @@ qemuValidateDomainDeviceDefTPM(virDomainTPMDef *tpm, if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(tpmCaps.backendModel, tpm->type)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The QEMU executable %s does not support TPM " - "backend type %s"), + _("The QEMU executable %1$s does not support TPM backend type %2$s"), def->emulator, virDomainTPMBackendTypeToString(tpm->type)); return -1; @@ -4789,16 +4765,14 @@ qemuValidateDomainDeviceDefTPM(virDomainTPMDef *tpm, tpm->model == VIR_DOMAIN_TPM_MODEL_SPAPR_PROXY && tpm->type != VIR_DOMAIN_TPM_TYPE_PASSTHROUGH) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("TPM Proxy model %s requires " - "'Passthrough' backend"), + _("TPM Proxy model %1$s requires 'Passthrough' backend"), virDomainTPMModelTypeToString(tpm->model)); return -1; } if (!VIR_DOMAIN_CAPS_ENUM_IS_SET(tpmCaps.model, tpm->model)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("The QEMU executable %s does not support TPM " - "model %s"), + _("The QEMU executable %1$s does not support TPM model %2$s"), def->emulator, virDomainTPMModelTypeToString(tpm->model)); return -1; @@ -4820,7 +4794,7 @@ qemuValidateDomainDeviceDefInput(const virDomainInputDef *input, if (input->bus == VIR_DOMAIN_INPUT_BUS_PS2 && !ARCH_IS_X86(def->os.arch) && !virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_I8042)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s is not supported by this QEMU binary"), + _("%1$s is not supported by this QEMU binary"), virDomainInputBusTypeToString(input->bus)); return -1; } @@ -4842,8 +4816,7 @@ qemuValidateDomainDeviceDefInput(const virDomainInputDef *input, case VIR_DOMAIN_INPUT_MODEL_VIRTIO_TRANSITIONAL: case VIR_DOMAIN_INPUT_MODEL_VIRTIO_NON_TRANSITIONAL: virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("virtio (non-)transitional models are not " - "supported for input type=%s"), + _("virtio (non-)transitional models are not supported for input type=%1$s"), virDomainInputTypeToString(input->type)); return -1; case VIR_DOMAIN_INPUT_MODEL_VIRTIO: @@ -4893,7 +4866,7 @@ qemuValidateDomainDeviceDefInput(const virDomainInputDef *input, (input->info.type == VIR_DOMAIN_DEVICE_ADDRESS_TYPE_CCW && !virQEMUCapsGet(qemuCaps, ccwCap))) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("%s is not supported by this QEMU binary"), + _("%1$s is not supported by this QEMU binary"), baseName); return -1; } @@ -4915,7 +4888,7 @@ qemuValidateDomainDeviceDefMemballoon(const virDomainMemballoonDef *memballoon, memballoon->model != VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO_TRANSITIONAL && memballoon->model != VIR_DOMAIN_MEMBALLOON_MODEL_VIRTIO_NON_TRANSITIONAL) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("Memory balloon device type '%s' is not supported by this version of qemu"), + _("Memory balloon device type '%1$s' is not supported by this version of qemu"), virDomainMemballoonModelTypeToString(memballoon->model)); return -1; } @@ -4947,15 +4920,13 @@ qemuValidateDomainDeviceDefIOMMU(const virDomainIOMMUDef *iommu, case VIR_DOMAIN_IOMMU_MODEL_INTEL: if (!qemuDomainIsQ35(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' is only supported with " - "Q35 machines"), + _("IOMMU device: '%1$s' is only supported with Q35 machines"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_INTEL_IOMMU)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' is not supported with " - "this QEMU binary"), + _("IOMMU device: '%1$s' is not supported with this QEMU binary"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } @@ -4964,15 +4935,13 @@ qemuValidateDomainDeviceDefIOMMU(const virDomainIOMMUDef *iommu, case VIR_DOMAIN_IOMMU_MODEL_SMMUV3: if (!qemuDomainIsARMVirt(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' is only supported with " - "ARM Virt machines"), + _("IOMMU device: '%1$s' is only supported with ARM Virt machines"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_MACHINE_VIRT_IOMMU)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' is not supported with " - "this QEMU binary"), + _("IOMMU device: '%1$s' is not supported with this QEMU binary"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } @@ -4982,29 +4951,27 @@ qemuValidateDomainDeviceDefIOMMU(const virDomainIOMMUDef *iommu, if (!qemuDomainIsARMVirt(def) && !qemuDomainIsQ35(def)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' is only supported with " - "Q35 and ARM Virt machines"), + _("IOMMU device: '%1$s' is only supported with Q35 and ARM Virt machines"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_VIRTIO_IOMMU_PCI) || !virQEMUCapsGet(qemuCaps, QEMU_CAPS_VIRTIO_IOMMU_BOOT_BYPASS)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' is not supported with " - "this QEMU binary"), + _("IOMMU device: '%1$s' is not supported with this QEMU binary"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } if (def->features[VIR_DOMAIN_FEATURE_ACPI] != VIR_TRISTATE_SWITCH_ON) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' requires ACPI"), + _("IOMMU device: '%1$s' requires ACPI"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } if (iommu->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_NONE && iommu->info.type != VIR_DOMAIN_DEVICE_ADDRESS_TYPE_PCI) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("IOMMU device: '%s' needs a PCI address"), + _("IOMMU device: '%1$s' needs a PCI address"), virDomainIOMMUModelTypeToString(iommu->model)); return -1; } @@ -5100,7 +5067,7 @@ qemuValidateDomainDeviceDefHub(virDomainHubDef *hub, { if (hub->type != VIR_DOMAIN_HUB_TYPE_USB) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("hub type %s not supported"), + _("hub type %1$s not supported"), virDomainHubTypeToString(hub->type)); return -1; } @@ -5182,7 +5149,7 @@ qemuValidateDomainDeviceDefMemory(virDomainMemoryDef *mem, while ((node = virBitmapNextSetBit(mem->sourceNodes, node)) >= 0) { if (mem->size > sgxCaps->sgxSections[node].size) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("sgx epc size %lld on host node %zd is less than requested size %lld"), + _("sgx epc size %1$lld on host node %2$zd is less than requested size %3$lld"), sgxCaps->sgxSections[node].size, node, mem->size); return -1; } @@ -5192,7 +5159,7 @@ qemuValidateDomainDeviceDefMemory(virDomainMemoryDef *mem, * specify it. */ if (mem->size > sgxCaps->sgxSections[0].size) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("sgx epc size %lld on host node %d is less than requested size %lld"), + _("sgx epc size %1$lld on host node %2$d is less than requested size %3$lld"), sgxCaps->sgxSections[0].size, 0, mem->size); return -1; } @@ -5226,8 +5193,7 @@ qemuValidateDomainDeviceDefShmem(virDomainShmemDef *shmem, case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_PLAIN: if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM_PLAIN)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("shmem model '%s' is not supported " - "by this QEMU binary"), + _("shmem model '%1$s' is not supported by this QEMU binary"), virDomainShmemModelTypeToString(shmem->model)); return -1; } @@ -5236,8 +5202,7 @@ qemuValidateDomainDeviceDefShmem(virDomainShmemDef *shmem, case VIR_DOMAIN_SHMEM_MODEL_IVSHMEM_DOORBELL: if (!virQEMUCapsGet(qemuCaps, QEMU_CAPS_DEVICE_IVSHMEM_DOORBELL)) { virReportError(VIR_ERR_CONFIG_UNSUPPORTED, - _("shmem model '%s' is not supported " - "by this QEMU binary"), + _("shmem model '%1$s' is not supported by this QEMU binary"), virDomainShmemModelTypeToString(shmem->model)); return -1; }