|
|
0a122b |
From 889862b6101fb71fd19fdae0ffa18815446be0a5 Mon Sep 17 00:00:00 2001
|
|
|
0a122b |
Message-Id: <889862b6101fb71fd19fdae0ffa18815446be0a5.1387369730.git.minovotn@redhat.com>
|
|
|
0a122b |
In-Reply-To: <091eecc4fa42754760dfff393dabcc2b444e9693.1387369730.git.minovotn@redhat.com>
|
|
|
0a122b |
References: <091eecc4fa42754760dfff393dabcc2b444e9693.1387369730.git.minovotn@redhat.com>
|
|
|
0a122b |
From: Markus Armbruster <armbru@redhat.com>
|
|
|
0a122b |
Date: Tue, 10 Dec 2013 15:29:05 +0100
|
|
|
0a122b |
Subject: [PATCH 05/21] qapi: add QMP input test for large integers
|
|
|
0a122b |
|
|
|
0a122b |
RH-Author: Markus Armbruster <armbru@redhat.com>
|
|
|
0a122b |
Message-id: <1386689361-30281-3-git-send-email-armbru@redhat.com>
|
|
|
0a122b |
Patchwork-id: 56123
|
|
|
0a122b |
O-Subject: [PATCH 7.0 qemu-kvm 02/18] qapi: add QMP input test for large integers
|
|
|
0a122b |
Bugzilla: 997915
|
|
|
0a122b |
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
|
|
|
0a122b |
RH-Acked-by: Kevin Wolf <kwolf@redhat.com>
|
|
|
0a122b |
RH-Acked-by: Luiz Capitulino <lcapitulino@redhat.com>
|
|
|
0a122b |
|
|
|
0a122b |
From: Michael Roth <mdroth@linux.vnet.ibm.com>
|
|
|
0a122b |
|
|
|
0a122b |
Large integers previously got capped to LLONG_MAX/LLONG_MIN so we could
|
|
|
0a122b |
store them as int64_t. This could lead to silent errors occuring.
|
|
|
0a122b |
|
|
|
0a122b |
Now, we use a double to handle these cases.
|
|
|
0a122b |
|
|
|
0a122b |
Add a test to confirm that QMPInputVisitor handles this as expected if
|
|
|
0a122b |
we're expected an integer value: errors for out of range integer values
|
|
|
0a122b |
that got promoted to doubles in this fashion.
|
|
|
0a122b |
|
|
|
0a122b |
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
|
|
|
0a122b |
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
|
|
|
0a122b |
Reviewed-by: Amos Kong <akong@redhat.com>
|
|
|
0a122b |
Signed-off-by: Luiz Capitulino <lcapitulino@redhat.com>
|
|
|
0a122b |
(cherry picked from commit e92cfa0d90c618ff1f131c60ef1b27aa6fe69a0a)
|
|
|
0a122b |
Signed-off-by: Markus Armbruster <armbru@redhat.com>
|
|
|
0a122b |
---
|
|
|
0a122b |
tests/test-qmp-input-visitor.c | 20 ++++++++++++++++++++
|
|
|
0a122b |
1 file changed, 20 insertions(+)
|
|
|
0a122b |
|
|
|
0a122b |
Signed-off-by: Michal Novotny <minovotn@redhat.com>
|
|
|
0a122b |
---
|
|
|
0a122b |
tests/test-qmp-input-visitor.c | 20 ++++++++++++++++++++
|
|
|
0a122b |
1 file changed, 20 insertions(+)
|
|
|
0a122b |
|
|
|
0a122b |
diff --git a/tests/test-qmp-input-visitor.c b/tests/test-qmp-input-visitor.c
|
|
|
0a122b |
index 955a4c0..b308cf9 100644
|
|
|
0a122b |
--- a/tests/test-qmp-input-visitor.c
|
|
|
0a122b |
+++ b/tests/test-qmp-input-visitor.c
|
|
|
0a122b |
@@ -75,6 +75,24 @@ static void test_visitor_in_int(TestInputVisitorData *data,
|
|
|
0a122b |
g_assert_cmpint(res, ==, value);
|
|
|
0a122b |
}
|
|
|
0a122b |
|
|
|
0a122b |
+static void test_visitor_in_int_overflow(TestInputVisitorData *data,
|
|
|
0a122b |
+ const void *unused)
|
|
|
0a122b |
+{
|
|
|
0a122b |
+ int64_t res = 0;
|
|
|
0a122b |
+ Error *errp = NULL;
|
|
|
0a122b |
+ Visitor *v;
|
|
|
0a122b |
+
|
|
|
0a122b |
+ /* this will overflow a Qint/int64, so should be deserialized into
|
|
|
0a122b |
+ * a QFloat/double field instead, leading to an error if we pass it
|
|
|
0a122b |
+ * to visit_type_int. confirm this.
|
|
|
0a122b |
+ */
|
|
|
0a122b |
+ v = visitor_input_test_init(data, "%f", DBL_MAX);
|
|
|
0a122b |
+
|
|
|
0a122b |
+ visit_type_int(v, &res, NULL, &errp);
|
|
|
0a122b |
+ g_assert(error_is_set(&errp));
|
|
|
0a122b |
+ error_free(errp);
|
|
|
0a122b |
+}
|
|
|
0a122b |
+
|
|
|
0a122b |
static void test_visitor_in_bool(TestInputVisitorData *data,
|
|
|
0a122b |
const void *unused)
|
|
|
0a122b |
{
|
|
|
0a122b |
@@ -292,6 +310,8 @@ int main(int argc, char **argv)
|
|
|
0a122b |
|
|
|
0a122b |
input_visitor_test_add("/visitor/input/int",
|
|
|
0a122b |
&in_visitor_data, test_visitor_in_int);
|
|
|
0a122b |
+ input_visitor_test_add("/visitor/input/int_overflow",
|
|
|
0a122b |
+ &in_visitor_data, test_visitor_in_int_overflow);
|
|
|
0a122b |
input_visitor_test_add("/visitor/input/bool",
|
|
|
0a122b |
&in_visitor_data, test_visitor_in_bool);
|
|
|
0a122b |
input_visitor_test_add("/visitor/input/number",
|
|
|
0a122b |
--
|
|
|
0a122b |
1.7.11.7
|
|
|
0a122b |
|