]> xenbits.xensource.com Git - people/liuw/libxenctrl-split/libvirt.git/commitdiff
build: use correct limit for unsigned long long
authorEric Blake <eblake@redhat.com>
Fri, 29 Jun 2012 21:09:57 +0000 (15:09 -0600)
committerEric Blake <eblake@redhat.com>
Fri, 29 Jun 2012 21:14:01 +0000 (15:14 -0600)
Reported by Jason Helfman as a build-breaker on FreeBSD.

* src/conf/domain_conf.c (virDomainFSDefParseXML): Use POSIX
spelling.
* src/openvz/openvz_conf.c (openvzReadFSConf): Likewise.

src/conf/domain_conf.c
src/openvz/openvz_conf.c

index 4086dac228d010027e8f0199d3fc9a82340c100e..3fb90db47b50c000c59be35e25af99592a69ac79 100644 (file)
@@ -4248,14 +4248,12 @@ virDomainFSDefParseXML(xmlNodePtr node,
 
     if (virDomainParseScaledValue("./space_hard_limit[1]", ctxt,
                                   &def->space_hard_limit, 1,
-                                  ULONG_LONG_MAX,
-                                  false) < 0)
+                                  ULLONG_MAX, false) < 0)
         goto error;
 
     if (virDomainParseScaledValue("./space_soft_limit[1]", ctxt,
                                   &def->space_soft_limit, 1,
-                                  ULONG_LONG_MAX,
-                                  false) < 0)
+                                  ULLONG_MAX, false) < 0)
         goto error;
 
     cur = node->children;
@@ -4335,7 +4333,7 @@ virDomainFSDefParseXML(xmlNodePtr node,
         }
         if (unit &&
             virScaleInteger(&def->usage, unit,
-                            1024, ULONG_LONG_MAX) < 0)
+                            1024, ULLONG_MAX) < 0)
             goto error;
     }
 
index bb61b1335fa2b271aa57b7bc0282c35697784d5f..ad27d37013a9acaf7064e92e2c6ae43007119b29 100644 (file)
@@ -455,8 +455,8 @@ openvzReadFSConf(virDomainDefPtr def,
             goto error;
         } else {
             /* Ensure that we can multiply by 1024 without overflowing. */
-            if (barrier > ULONG_LONG_MAX / 1024 ||
-                limit > ULONG_LONG_MAX / 1024 ) {
+            if (barrier > ULLONG_MAX / 1024 ||
+                limit > ULLONG_MAX / 1024 ) {
                 virReportSystemError(VIR_ERR_OVERFLOW,
                                      _("%s"),
                                      "Unable to parse quota");