Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP7:Update
qemu.14390
0026-string-input-visitor-Fix-uint64-par.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0026-string-input-visitor-Fix-uint64-par.patch of Package qemu.14390
From: =?UTF-8?q?Andreas=20F=C3=A4rber?= <afaerber@suse.de> Date: Thu, 24 Sep 2015 19:21:11 +0200 Subject: string-input-visitor: Fix uint64 parsing MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit All integers would get parsed by strtoll(), not handling the case of UINT64 properties with the most significient bit set. Implement a .type_uint64 visitor callback, reusing the existing parse_str() code through a new argument, using strtoull(). As this is a bug fix, it intentionally ignores checkpatch warnings to prefer the use of qemu_strto[u]ll() over strto[u]ll(). Cc: qemu-stable@nongnu.org Signed-off-by: Andreas Färber <afaerber@suse.de> [BR: define qemu_strtoll and qemu_strtoull and use to avoid checkpatch error. Grr} Signed-off-by: Bruce Rogers <brogers@suse.com> --- qapi/string-input-visitor.c | 65 +++++++++++++++++++++++++++++-------- 1 file changed, 52 insertions(+), 13 deletions(-) diff --git a/qapi/string-input-visitor.c b/qapi/string-input-visitor.c index b3fdd0827d..ac118d03c8 100644 --- a/qapi/string-input-visitor.c +++ b/qapi/string-input-visitor.c @@ -21,6 +21,8 @@ #include "qemu/queue.h" #include "qemu/range.h" +#define qemu_strtoll strtoll +#define qemu_strtoull strtoull struct StringInputVisitor { @@ -44,7 +46,8 @@ static void free_range(void *range, void *dummy) g_free(range); } -static int parse_str(StringInputVisitor *siv, const char *name, Error **errp) +static int parse_str(StringInputVisitor *siv, const char *name, bool u64, + Error **errp) { char *str = (char *) siv->string; long long start, end; @@ -61,7 +64,11 @@ static int parse_str(StringInputVisitor *siv, const char *name, Error **errp) do { errno = 0; - start = strtoll(str, &endptr, 0); + if (u64) { + start = qemu_strtoull(str, &endptr, 0); + } else { + start = qemu_strtoll(str, &endptr, 0); + } if (errno == 0 && endptr > str) { if (*endptr == '\0') { cur = g_malloc0(sizeof(*cur)); @@ -72,7 +79,11 @@ static int parse_str(StringInputVisitor *siv, const char *name, Error **errp) } else if (*endptr == '-') { str = endptr + 1; errno = 0; - end = strtoll(str, &endptr, 0); + if (u64) { + end = qemu_strtoull(str, &endptr, 0); + } else { + end = qemu_strtoll(str, &endptr, 0); + } if (errno == 0 && endptr > str && start <= end && (start > INT64_MAX - 65536 || end < start + 65536)) { @@ -128,7 +139,7 @@ start_list(Visitor *v, const char *name, GenericList **list, size_t size, assert(list); siv->list = list; - if (parse_str(siv, name, errp) < 0) { + if (parse_str(siv, name, false, errp) < 0) { *list = NULL; return; } @@ -216,7 +227,7 @@ static void parse_type_int64(Visitor *v, const char *name, int64_t *obj, { StringInputVisitor *siv = to_siv(v); - if (parse_str(siv, name, errp) < 0) { + if (parse_str(siv, name, false, errp) < 0) { return; } @@ -252,15 +263,43 @@ error: static void parse_type_uint64(Visitor *v, const char *name, uint64_t *obj, Error **errp) { - /* FIXME: parse_type_int64 mishandles values over INT64_MAX */ - int64_t i; - Error *err = NULL; - parse_type_int64(v, name, &i, &err); - if (err) { - error_propagate(errp, err); - } else { - *obj = i; + StringInputVisitor *siv = to_siv(v); + + if (!siv->string) { + error_setg(errp, QERR_INVALID_PARAMETER_TYPE, name ? name : "null", + "integer"); + return; + } + + parse_str(siv, name, true, errp); + + if (!siv->ranges) { + goto error; } + + if (!siv->cur_range) { + Range *r; + + siv->cur_range = g_list_first(siv->ranges); + if (!siv->cur_range) { + goto error; + } + + r = siv->cur_range->data; + if (!r) { + goto error; + } + + siv->cur = range_lob(r); + } + + *obj = siv->cur; + siv->cur++; + return; + +error: + error_setg(errp, QERR_INVALID_PARAMETER_VALUE, name, + "a uint64 value or range"); } static void parse_type_size(Visitor *v, const char *name, uint64_t *obj,
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor