In openvzReadFSConf, when barrier:limit are so long to overflow, pass EOVERFLOW to virReportSystemError, instead of VIR_ERR_OVERFLOW. Signed-off-by: Jincheng Miao <jmiao@xxxxxxxxxx> --- src/openvz/openvz_conf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/openvz/openvz_conf.c b/src/openvz/openvz_conf.c index 856c9f5..8fdd4e9 100644 --- a/src/openvz/openvz_conf.c +++ b/src/openvz/openvz_conf.c @@ -405,7 +405,7 @@ openvzReadFSConf(virDomainDefPtr def, /* Ensure that we can multiply by 1024 without overflowing. */ if (barrier > ULLONG_MAX / 1024 || limit > ULLONG_MAX / 1024) { - virReportSystemError(VIR_ERR_OVERFLOW, "%s", + virReportSystemError(EOVERFLOW, "%s", _("Unable to parse quota")); goto error; } -- 1.8.3.1 -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list