writeCount = safewrite(control, &msg, sizeof(msg));
if (writeCount != sizeof(msg)) {
virReportSystemError(NULL, errno, "%s",
- _("unable to send container continue message"));
+ _("Unable to send container continue message"));
goto error_out;
}
/* root->parent must be private, so make / private. */
if (mount("", "/", NULL, MS_PRIVATE|MS_REC, NULL) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to make root private"));
+ _("Failed to make root private"));
goto err;
}
if ((rc = virFileMakePath(oldroot)) < 0) {
virReportSystemError(NULL, rc,
- _("failed to create %s"),
+ _("Failed to create %s"),
oldroot);
goto err;
}
* on separate filesystems */
if (mount("tmprootfs", oldroot, "tmpfs", 0, NULL) < 0) {
virReportSystemError(NULL, errno,
- _("failed to mount empty tmpfs at %s"),
+ _("Failed to mount empty tmpfs at %s"),
oldroot);
goto err;
}
if ((rc = virFileMakePath(newroot)) < 0) {
virReportSystemError(NULL, rc,
- _("failed to create %s"),
+ _("Failed to create %s"),
newroot);
goto err;
}
/* ... and mount our root onto it */
if (mount(root->src, newroot, NULL, MS_BIND|MS_REC, NULL) < 0) {
virReportSystemError(NULL, errno,
- _("failed to bind new root %s into tmpfs"),
+ _("Failed to bind new root %s into tmpfs"),
root->src);
goto err;
}
* root->src bind-mounted onto '/new' */
if (chdir(newroot) < 0) {
virReportSystemError(NULL, errno,
- _("failed to chroot into %s"), newroot);
+ _("Failed to chroot into %s"), newroot);
goto err;
}
* this and will soon be unmounted completely */
if (pivot_root(".", ".oldroot") < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to pivot root"));
+ _("Failed to pivot root"));
goto err;
}
for (i = 0 ; i < ARRAY_CARDINALITY(mnts) ; i++) {
if (virFileMakePath(mnts[i].dst) < 0) {
virReportSystemError(NULL, errno,
- _("failed to mkdir %s"),
+ _("Failed to mkdir %s"),
mnts[i].src);
goto cleanup;
}
if (mount(mnts[i].src, mnts[i].dst, mnts[i].type, 0, NULL) < 0) {
virReportSystemError(NULL, errno,
- _("failed to mount %s on %s"),
+ _("Failed to mount %s on %s"),
mnts[i].type, mnts[i].type);
goto cleanup;
}
if ((rc = virFileMakePath("/dev/pts") < 0)) {
virReportSystemError(NULL, rc, "%s",
- _("cannot create /dev/pts"));
+ _("Cannot create /dev/pts"));
goto cleanup;
}
VIR_DEBUG("Trying to move %s to %s", devpts, "/dev/pts");
if ((rc = mount(devpts, "/dev/pts", NULL, MS_MOVE, NULL)) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to mount /dev/pts in container"));
+ _("Failed to mount /dev/pts in container"));
goto cleanup;
}
if (mknod(devs[i].path, S_IFCHR, dev) < 0 ||
chmod(devs[i].path, devs[i].mode)) {
virReportSystemError(NULL, errno,
- _("failed to make device %s"),
+ _("Failed to make device %s"),
devs[i].path);
return -1;
}
if (access("/dev/pts/ptmx", W_OK) == 0) {
if (symlink("/dev/pts/ptmx", "/dev/ptmx") < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to create symlink /dev/ptmx to /dev/pts/ptmx"));
+ _("Failed to create symlink /dev/ptmx to /dev/pts/ptmx"));
return -1;
}
} else {
if (mknod("/dev/ptmx", S_IFCHR, dev) < 0 ||
chmod("/dev/ptmx", 0666)) {
virReportSystemError(NULL, errno, "%s",
- _("failed to make device /dev/ptmx"));
+ _("Failed to make device /dev/ptmx"));
return -1;
}
}
if (virFileMakePath(vmDef->fss[i]->dst) < 0) {
virReportSystemError(NULL, errno,
- _("failed to create %s"),
+ _("Failed to create %s"),
vmDef->fss[i]->dst);
VIR_FREE(src);
return -1;
}
if (mount(src, vmDef->fss[i]->dst, NULL, MS_BIND, NULL) < 0) {
- VIR_FREE(src);
virReportSystemError(NULL, errno,
- _("failed to mount %s at %s"),
- vmDef->fss[i]->src,
- vmDef->fss[i]->dst);
+ _("Failed to mount %s at %s"),
+ src, vmDef->fss[i]->dst);
+ VIR_FREE(src);
return -1;
}
VIR_FREE(src);
if (!(procmnt = setmntent("/proc/mounts", "r"))) {
virReportSystemError(NULL, errno, "%s",
- _("failed to read /proc/mounts"));
+ _("Failed to read /proc/mounts"));
return -1;
}
while (getmntent_r(procmnt, &mntent, mntbuf, sizeof(mntbuf)) != NULL) {
VIR_DEBUG("Umount %s", mounts[i]);
if (umount(mounts[i]) < 0) {
virReportSystemError(NULL, errno,
- _("failed to unmount '%s'"),
+ _("Failed to unmount '%s'"),
mounts[i]);
return -1;
}
if (mount("", "/", NULL, MS_SLAVE|MS_REC, NULL) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to make / slave"));
+ _("Failed to make / slave"));
return -1;
}
for (i = 0 ; i < vmDef->nfss ; i++) {
MS_BIND,
NULL) < 0) {
virReportSystemError(NULL, errno,
- _("failed to mount %s at %s"),
+ _("Failed to mount %s at %s"),
vmDef->fss[i]->src,
vmDef->fss[i]->dst);
return -1;
/* mount /proc */
if (mount("lxcproc", "/proc", "proc", 0, NULL) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to mount /proc"));
+ _("Failed to mount /proc"));
return -1;
}
CAP_MAC_ADMIN, /* No messing with LSM config */
-1 /* sentinal */)) < 0) {
lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
- _("failed to remove capabilities %d"), ret);
+ _("Failed to remove capabilities: %d"), ret);
return -1;
}
if ((ret = capng_apply(CAPNG_SELECT_BOTH)) < 0) {
lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
- _("failed to apply capabilities: %d"), ret);
+ _("Failed to apply capabilities: %d"), ret);
return -1;
}
/* Need to prevent them regaining any caps on exec */
if ((ret = capng_lock()) < 0) {
lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
- _("failed to lock capabilities: %d"), ret);
+ _("Failed to lock capabilities: %d"), ret);
return -1;
}
ttyfd = open(ttyPath, O_RDWR|O_NOCTTY);
if (ttyfd < 0) {
virReportSystemError(NULL, errno,
- _("failed to open tty %s"),
+ _("Failed to open tty %s"),
ttyPath);
return -1;
}
if (pid < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to run clone container"));
+ _("Failed to run clone container"));
return -1;
}
epollEvent.data.fd = monitor;
if (0 > epoll_ctl(epollFd, EPOLL_CTL_ADD, monitor, &epollEvent)) {
virReportSystemError(NULL, errno, "%s",
- _("epoll_ctl(contPty) failed"));
+ _("epoll_ctl(monitor) failed"));
goto cleanup;
}
epollEvent.data.fd = client;
if (0 > epoll_ctl(epollFd, EPOLL_CTL_ADD, client, &epollEvent)) {
virReportSystemError(NULL, errno, "%s",
- _("epoll_ctl(contPty) failed"));
+ _("epoll_ctl(client) failed"));
goto cleanup;
}
epollEvent.data.fd = client;
if (0 > epoll_ctl(epollFd, EPOLL_CTL_ADD, client, &epollEvent)) {
virReportSystemError(NULL, errno, "%s",
- _("epoll_ctl(contPty) failed"));
+ _("epoll_ctl(client) failed"));
goto cleanup;
}
} else if (client != -1 && epollEvent.data.fd == client) {
if (0 > epoll_ctl(epollFd, EPOLL_CTL_DEL, client, &epollEvent)) {
virReportSystemError(NULL, errno, "%s",
- _("epoll_ctl(contPty) failed"));
+ _("epoll_ctl(client) failed"));
goto cleanup;
}
close(client);
for (i = 0 ; i < nveths ; i++)
if (moveInterfaceToNetNs(veths[i], container) < 0) {
lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
- _("failed to move interface %s to ns %d"),
+ _("Failed to move interface %s to ns %d"),
veths[i], container);
return -1;
}
for (i = 0 ; i < nveths ; i++)
if (vethDelete(veths[i]) < 0)
lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
- _("failed to delete veth: %s"), veths[i]);
+ _("Failed to delete veth: %s"), veths[i]);
/* will continue to try to cleanup any other interfaces */
return 0;
VIR_DEBUG0("Setting up private /dev/pts");
if (unshare(CLONE_NEWNS) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("cannot unshare mount namespace"));
+ _("Cannot unshare mount namespace"));
goto cleanup;
}
if (mount("", "/", NULL, MS_SLAVE|MS_REC, NULL) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to switch root mount into slave mode"));
+ _("Failed to switch root mount into slave mode"));
goto cleanup;
}
if (virFileMakePath(devpts) < 0) {
virReportSystemError(NULL, errno,
- _("failed to make path %s"),
+ _("Failed to make path %s"),
devpts);
goto cleanup;
}
VIR_DEBUG("Mouting 'devpts' on %s", devpts);
if (mount("devpts", devpts, "devpts", 0, "newinstance,ptmxmode=0666") < 0) {
virReportSystemError(NULL, errno,
- _("failed to mount devpts on %s"),
+ _("Failed to mount devpts on %s"),
devpts);
goto cleanup;
}
if (access(devptmx, R_OK) < 0) {
- VIR_WARN0("kernel does not support private devpts, using shared devpts");
+ VIR_WARN0("Kernel does not support private devpts, using shared devpts");
VIR_FREE(devptmx);
}
}
&containerPtyPath,
0) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to allocate tty"));
+ _("Failed to allocate tty"));
goto cleanup;
}
} else {
&containerPtyPath,
0) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("failed to allocate tty"));
+ _("Failed to allocate tty"));
goto cleanup;
}
}
/* Accept initial client which is the libvirtd daemon */
if ((client = accept(monitor, NULL, 0)) < 0) {
virReportSystemError(NULL, errno, "%s",
- _("Failed connection from LXC driver"));
+ _("Failed to accept a connection from driver"));
goto cleanup;
}
/* If path isn't '/' then they typoed, tell them correct path */
if (STRNEQ(conn->uri->path, "/")) {
lxcError(conn, NULL, VIR_ERR_INTERNAL_ERROR,
- _("unexpected LXC URI path '%s', try lxc:///"),
+ _("Unexpected LXC URI path '%s', try lxc:///"),
conn->uri->path);
return VIR_DRV_OPEN_ERROR;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(vm->def->uuid, uuidstr);
lxcError(conn, NULL, VIR_ERR_OPERATION_FAILED,
- _("domain '%s' is already defined with uuid %s"),
+ _("Domain '%s' is already defined with uuid %s"),
vm->def->name, uuidstr);
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(vm->def->uuid, uuidstr);
lxcError(conn, NULL, VIR_ERR_OPERATION_FAILED,
- _("domain '%s' is already defined with uuid %s"),
+ _("Domain '%s' is already defined with uuid %s"),
def->name, uuidstr);
goto cleanup;
}
vm = virDomainFindByUUID(&driver->domains, dom->uuid);
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- "%s", _("no domain with matching uuid"));
+ "%s", _("No domain with matching uuid"));
goto cleanup;
}
if (virDomainObjIsActive(vm)) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_INVALID,
- "%s", _("cannot delete active domain"));
+ "%s", _("Cannot delete active domain"));
goto cleanup;
}
if (!vm->persistent) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_INVALID,
- "%s", _("cannot undefine transient domain"));
+ "%s", _("Cannot undefine transient domain"));
goto cleanup;
}
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- "%s", _("no domain with matching uuid"));
+ "%s", _("No domain with matching uuid"));
goto cleanup;
}
} else {
if (virCgroupForDomain(driver->cgroup, vm->def->name, &cgroup, 0) != 0) {
lxcError(dom->conn, dom, VIR_ERR_INTERNAL_ERROR,
- _("Unable to get cgroup for %s\n"), vm->def->name);
+ _("Unable to get cgroup for %s"), vm->def->name);
goto cleanup;
}
if (virCgroupGetCpuacctUsage(cgroup, &(info->cpuTime)) < 0) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_FAILED,
- "%s", _("cannot read cputime for domain"));
+ "%s", _("Cannot read cputime for domain"));
goto cleanup;
}
if (virCgroupGetMemoryUsage(cgroup, &(info->memory)) < 0) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_FAILED,
- "%s", _("cannot read memory usage for domain"));
+ "%s", _("Cannot read memory usage for domain"));
goto cleanup;
}
}
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- "%s", _("no domain with matching uuid"));
+ "%s", _("No domain with matching uuid"));
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
if (newmax < vm->def->memory) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_ARG,
- "%s", _("cannot set max memory lower than current memory"));
+ "%s", _("Cannot set max memory lower than current memory"));
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
if (newmem > vm->def->maxmem) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_ARG,
- "%s", _("cannot set memory higher than max memory"));
+ "%s", _("Cannot set memory higher than max memory"));
goto cleanup;
}
if (virCgroupSetMemory(cgroup, newmem) < 0) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_FAILED,
- "%s", _("cannot set memory for domain"));
+ "%s", _("Failed to set memory for domain"));
goto cleanup;
}
} else {
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- "%s", _("no domain with matching uuid"));
+ "%s", _("No domain with matching uuid"));
goto cleanup;
}
DEBUG("bridge: %s", bridge);
if (NULL == bridge) {
lxcError(conn, NULL, VIR_ERR_INTERNAL_ERROR,
- "%s", _("failed to get bridge for interface"));
+ "%s", _("Failed to get bridge for interface"));
goto error_exit;
}
DEBUG("parentVeth: %s, containerVeth: %s", parentVeth, containerVeth);
if (0 != (rc = vethCreate(parentVeth, PATH_MAX, containerVeth, PATH_MAX))) {
lxcError(conn, NULL, VIR_ERR_INTERNAL_ERROR,
- _("failed to create veth device pair: %d"), rc);
+ _("Failed to create veth device pair: %d"), rc);
goto error_exit;
}
if (NULL == def->nets[i]->ifname) {
if (NULL == def->nets[i]->ifname) {
lxcError(NULL, NULL, VIR_ERR_INTERNAL_ERROR,
- "%s", _("failed to allocate veth names"));
+ "%s", _("Failed to allocate veth names"));
goto error_exit;
}
virFormatMacAddr(def->nets[i]->mac, macaddr);
if (0 != (rc = setMacAddr(containerVeth, macaddr))) {
virReportSystemError(conn, rc,
- _("failed to set %s to %s"),
+ _("Failed to set %s to %s"),
macaddr, containerVeth);
goto error_exit;
}
if (0 != (rc = brAddInterface(brctl, bridge, parentVeth))) {
virReportSystemError(conn, rc,
- _("failed to add %s device to %s"),
+ _("Failed to add %s device to %s"),
parentVeth, bridge);
goto error_exit;
}
if (0 != (rc = vethInterfaceUpOrDown(parentVeth, 1))) {
- virReportSystemError(conn, rc, "%s",
- _("failed to enable parent ns veth device"));
+ virReportSystemError(conn, rc,
+ _("Failed to enable %s device"),
+ parentVeth);
goto error_exit;
}
if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0) {
virReportSystemError(conn, errno, "%s",
- _("failed to create client socket"));
+ _("Failed to create client socket"));
goto error;
}
if (connect(fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
virReportSystemError(conn, errno, "%s",
- _("failed to connect to client socket"));
+ _("Failed to connect to client socket"));
goto error;
}
if (vm->pid <= 0) {
lxcError(conn, NULL, VIR_ERR_INTERNAL_ERROR,
- _("invalid PID %d for container"), vm->pid);
+ _("Invalid PID %d for container"), vm->pid);
return -1;
}
if (kill(vm->pid, signum) < 0) {
if (errno != ESRCH) {
virReportSystemError(conn, errno,
- _("failed to kill pid %d"),
+ _("Failed to kill pid %d"),
vm->pid);
return -1;
}
while ((rc = waitpid(child, &status, 0) == -1) && errno == EINTR);
if (rc == -1) {
virReportSystemError(conn, errno,
- _("cannot wait for '%s'"),
+ _("Cannot wait for '%s'"),
largv[0]);
goto cleanup;
}
if (!(WIFEXITED(status) && WEXITSTATUS(status) == 0)) {
lxcError(conn, NULL, VIR_ERR_INTERNAL_ERROR,
- _("container '%s' unexpectedly shutdown during startup"),
+ _("Container '%s' unexpectedly shutdown during startup"),
largv[0]);
goto cleanup;
}
if ((r = virFileMakePath(driver->logDir)) < 0) {
virReportSystemError(conn, r,
- _("cannot create log directory '%s'"),
+ _("Cannot create log directory '%s'"),
driver->logDir);
return -1;
}
/* open parent tty */
if (virFileOpenTty(&parentTty, &parentTtyPath, 1) < 0) {
virReportSystemError(conn, errno, "%s",
- _("failed to allocate tty"));
+ _("Failed to allocate tty"));
goto cleanup;
}
if (vm->def->console &&
if ((logfd = open(logfile, O_WRONLY | O_APPEND | O_CREAT,
S_IRUSR|S_IWUSR)) < 0) {
virReportSystemError(conn, errno,
- _("failed to open '%s'"),
+ _("Failed to open '%s'"),
logfile);
goto cleanup;
}
vm = virDomainFindByName(&driver->domains, dom->name);
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- _("no domain named %s"), dom->name);
+ _("No domain named %s"), dom->name);
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(vm->def->uuid, uuidstr);
lxcError(conn, NULL, VIR_ERR_OPERATION_FAILED,
- _("domain '%s' is already defined with uuid %s"),
+ _("Domain '%s' is already defined with uuid %s"),
vm->def->name, uuidstr);
goto cleanup;
}
/* UUID & name match, but if VM is already active, refuse it */
if (virDomainObjIsActive(vm)) {
lxcError(conn, NULL, VIR_ERR_OPERATION_FAILED,
- _("domain is already active as '%s'"), vm->def->name);
+ _("Domain is already active as '%s'"), vm->def->name);
goto cleanup;
}
virDomainObjUnlock(vm);
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(vm->def->uuid, uuidstr);
lxcError(conn, NULL, VIR_ERR_OPERATION_FAILED,
- _("domain '%s' is already defined with uuid %s"),
+ _("Domain '%s' is already defined with uuid %s"),
def->name, uuidstr);
goto cleanup;
}
vm = virDomainFindByID(&driver->domains, dom->id);
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- _("no domain with id %d"), dom->id);
+ _("No domain with id %d"), dom->id);
goto cleanup;
}
vm = virDomainFindByID(&driver->domains, dom->id);
if (!vm) {
lxcError(dom->conn, dom, VIR_ERR_INVALID_DOMAIN,
- _("no domain with id %d"), dom->id);
+ _("No domain with id %d"), dom->id);
goto cleanup;
}
virSchedParameterPtr param = ¶ms[i];
if (param->type != VIR_DOMAIN_SCHED_FIELD_ULLONG) {
lxcError(NULL, domain, VIR_ERR_INVALID_ARG, "%s",
- _("invalid type for cpu_shares tunable, expected a 'ullong'"));
+ _("Invalid type for cpu_shares tunable, expected a 'ullong'"));
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
if (!vm->persistent) {
lxcError(dom->conn, dom, VIR_ERR_INTERNAL_ERROR,
- "%s", _("cannot set autostart for transient domain"));
+ "%s", _("Cannot set autostart for transient domain"));
goto cleanup;
}
if ((err = virFileMakePath(driver->autostartDir))) {
virReportSystemError(dom->conn, err,
- _("cannot create autostart directory %s"),
+ _("Cannot create autostart directory %s"),
driver->autostartDir);
goto cleanup;
}
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
if (!virDomainObjIsActive(vm)) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_INVALID,
- "%s", _("domain is not running"));
+ "%s", _("Domain is not running"));
goto cleanup;
}
if (vm->state != VIR_DOMAIN_PAUSED) {
if (lxcFreezeContainer(driver, vm) < 0) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_FAILED,
- "%s", _("suspend operation failed"));
+ "%s", _("Suspend operation failed"));
goto cleanup;
}
vm->state = VIR_DOMAIN_PAUSED;
char uuidstr[VIR_UUID_STRING_BUFLEN];
virUUIDFormat(dom->uuid, uuidstr);
lxcError(dom->conn, dom, VIR_ERR_NO_DOMAIN,
- _("no domain with matching uuid '%s'"), uuidstr);
+ _("No domain with matching uuid '%s'"), uuidstr);
goto cleanup;
}
if (!virDomainObjIsActive(vm)) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_INVALID,
- "%s", _("domain is not running"));
+ "%s", _("Domain is not running"));
goto cleanup;
}
if (vm->state == VIR_DOMAIN_PAUSED) {
if (lxcUnfreezeContainer(driver, vm) < 0) {
lxcError(dom->conn, dom, VIR_ERR_OPERATION_FAILED,
- "%s", _("resume operation failed"));
+ "%s", _("Resume operation failed"));
goto cleanup;
}
vm->state = VIR_DOMAIN_RUNNING;