0a122b
From 889862b6101fb71fd19fdae0ffa18815446be0a5 Mon Sep 17 00:00:00 2001
0a122b
Message-Id: <889862b6101fb71fd19fdae0ffa18815446be0a5.1387369730.git.minovotn@redhat.com>
0a122b
In-Reply-To: <091eecc4fa42754760dfff393dabcc2b444e9693.1387369730.git.minovotn@redhat.com>
0a122b
References: <091eecc4fa42754760dfff393dabcc2b444e9693.1387369730.git.minovotn@redhat.com>
0a122b
From: Markus Armbruster <armbru@redhat.com>
0a122b
Date: Tue, 10 Dec 2013 15:29:05 +0100
0a122b
Subject: [PATCH 05/21] qapi: add QMP input test for large integers
0a122b
0a122b
RH-Author: Markus Armbruster <armbru@redhat.com>
0a122b
Message-id: <1386689361-30281-3-git-send-email-armbru@redhat.com>
0a122b
Patchwork-id: 56123
0a122b
O-Subject: [PATCH 7.0 qemu-kvm 02/18] qapi: add QMP input test for large integers
0a122b
Bugzilla: 997915
0a122b
RH-Acked-by: Laszlo Ersek <lersek@redhat.com>
0a122b
RH-Acked-by: Kevin Wolf <kwolf@redhat.com>
0a122b
RH-Acked-by: Luiz Capitulino <lcapitulino@redhat.com>
0a122b
0a122b
From: Michael Roth <mdroth@linux.vnet.ibm.com>
0a122b
0a122b
Large integers previously got capped to LLONG_MAX/LLONG_MIN so we could
0a122b
store them as int64_t. This could lead to silent errors occuring.
0a122b
0a122b
Now, we use a double to handle these cases.
0a122b
0a122b
Add a test to confirm that QMPInputVisitor handles this as expected if
0a122b
we're expected an integer value: errors for out of range integer values
0a122b
that got promoted to doubles in this fashion.
0a122b
0a122b
Signed-off-by: Michael Roth <mdroth@linux.vnet.ibm.com>
0a122b
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
0a122b
Reviewed-by: Amos Kong <akong@redhat.com>
0a122b
Signed-off-by: Luiz Capitulino <lcapitulino@redhat.com>
0a122b
(cherry picked from commit e92cfa0d90c618ff1f131c60ef1b27aa6fe69a0a)
0a122b
Signed-off-by: Markus Armbruster <armbru@redhat.com>
0a122b
---
0a122b
 tests/test-qmp-input-visitor.c | 20 ++++++++++++++++++++
0a122b
 1 file changed, 20 insertions(+)
0a122b
0a122b
Signed-off-by: Michal Novotny <minovotn@redhat.com>
0a122b
---
0a122b
 tests/test-qmp-input-visitor.c | 20 ++++++++++++++++++++
0a122b
 1 file changed, 20 insertions(+)
0a122b
0a122b
diff --git a/tests/test-qmp-input-visitor.c b/tests/test-qmp-input-visitor.c
0a122b
index 955a4c0..b308cf9 100644
0a122b
--- a/tests/test-qmp-input-visitor.c
0a122b
+++ b/tests/test-qmp-input-visitor.c
0a122b
@@ -75,6 +75,24 @@ static void test_visitor_in_int(TestInputVisitorData *data,
0a122b
     g_assert_cmpint(res, ==, value);
0a122b
 }
0a122b
 
0a122b
+static void test_visitor_in_int_overflow(TestInputVisitorData *data,
0a122b
+                                         const void *unused)
0a122b
+{
0a122b
+    int64_t res = 0;
0a122b
+    Error *errp = NULL;
0a122b
+    Visitor *v;
0a122b
+
0a122b
+    /* this will overflow a Qint/int64, so should be deserialized into
0a122b
+     * a QFloat/double field instead, leading to an error if we pass it
0a122b
+     * to visit_type_int. confirm this.
0a122b
+     */
0a122b
+    v = visitor_input_test_init(data, "%f", DBL_MAX);
0a122b
+
0a122b
+    visit_type_int(v, &res, NULL, &errp);
0a122b
+    g_assert(error_is_set(&errp));
0a122b
+    error_free(errp);
0a122b
+}
0a122b
+
0a122b
 static void test_visitor_in_bool(TestInputVisitorData *data,
0a122b
                                  const void *unused)
0a122b
 {
0a122b
@@ -292,6 +310,8 @@ int main(int argc, char **argv)
0a122b
 
0a122b
     input_visitor_test_add("/visitor/input/int",
0a122b
                            &in_visitor_data, test_visitor_in_int);
0a122b
+    input_visitor_test_add("/visitor/input/int_overflow",
0a122b
+                           &in_visitor_data, test_visitor_in_int_overflow);
0a122b
     input_visitor_test_add("/visitor/input/bool",
0a122b
                            &in_visitor_data, test_visitor_in_bool);
0a122b
     input_visitor_test_add("/visitor/input/number",
0a122b
-- 
0a122b
1.7.11.7
0a122b