2012-11-30 15:21:02 +00:00
|
|
|
/*
|
2014-03-17 09:38:38 +00:00
|
|
|
* Copyright (C) 2012-2014 Red Hat, Inc.
|
2012-11-30 15:21:02 +00:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library. If not, see
|
|
|
|
* <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* Author: Daniel P. Berrange <berrange@redhat.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
|
|
|
#include "testutils.h"
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
#include "intprops.h"
|
|
|
|
#include "verify.h"
|
2012-12-13 18:21:53 +00:00
|
|
|
#include "virerror.h"
|
2012-12-12 18:06:53 +00:00
|
|
|
#include "viralloc.h"
|
2013-05-17 14:11:24 +00:00
|
|
|
#include "virfile.h"
|
2012-12-12 17:59:27 +00:00
|
|
|
#include "virlog.h"
|
2012-11-30 15:21:02 +00:00
|
|
|
#include "virstring.h"
|
|
|
|
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_NONE
|
|
|
|
|
2014-02-28 12:16:17 +00:00
|
|
|
VIR_LOG_INIT("tests.stringtest");
|
|
|
|
|
2012-11-30 15:21:02 +00:00
|
|
|
struct testSplitData {
|
|
|
|
const char *string;
|
|
|
|
const char *delim;
|
|
|
|
size_t max_tokens;
|
|
|
|
const char **tokens;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
struct testJoinData {
|
|
|
|
const char *string;
|
|
|
|
const char *delim;
|
|
|
|
const char **tokens;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int testSplit(const void *args)
|
|
|
|
{
|
|
|
|
const struct testSplitData *data = args;
|
|
|
|
char **got;
|
2014-05-12 07:46:37 +00:00
|
|
|
size_t ntokens;
|
|
|
|
size_t exptokens = 0;
|
2012-11-30 15:21:02 +00:00
|
|
|
char **tmp1;
|
|
|
|
const char **tmp2;
|
|
|
|
int ret = -1;
|
|
|
|
|
2014-05-12 07:46:37 +00:00
|
|
|
if (!(got = virStringSplitCount(data->string, data->delim,
|
|
|
|
data->max_tokens, &ntokens))) {
|
2012-11-30 15:21:02 +00:00
|
|
|
VIR_DEBUG("Got no tokens at all");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
tmp1 = got;
|
|
|
|
tmp2 = data->tokens;
|
|
|
|
while (*tmp1 && *tmp2) {
|
|
|
|
if (STRNEQ(*tmp1, *tmp2)) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "Mismatch '%s' vs '%s'\n", *tmp1, *tmp2);
|
2012-11-30 15:21:02 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
tmp1++;
|
|
|
|
tmp2++;
|
2014-05-12 07:46:37 +00:00
|
|
|
exptokens++;
|
2012-11-30 15:21:02 +00:00
|
|
|
}
|
|
|
|
if (*tmp1) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "Too many pieces returned\n");
|
2012-11-30 15:21:02 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
if (*tmp2) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "Too few pieces returned\n");
|
2012-11-30 15:21:02 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2014-05-12 07:46:37 +00:00
|
|
|
if (ntokens != exptokens) {
|
|
|
|
virFilePrintf(stderr,
|
|
|
|
"Returned token count (%zu) doesn't match "
|
|
|
|
"expected count (%zu)",
|
|
|
|
ntokens, exptokens);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
2012-11-30 15:21:02 +00:00
|
|
|
ret = 0;
|
2014-03-25 06:53:44 +00:00
|
|
|
cleanup:
|
2012-11-30 15:21:02 +00:00
|
|
|
virStringFreeList(got);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int testJoin(const void *args)
|
|
|
|
{
|
|
|
|
const struct testJoinData *data = args;
|
|
|
|
char *got;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
if (!(got = virStringJoin(data->tokens, data->delim))) {
|
|
|
|
VIR_DEBUG("Got no result");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (STRNEQ(got, data->string)) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "Mismatch '%s' vs '%s'\n", got, data->string);
|
2012-11-30 15:21:02 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
2014-03-25 06:53:44 +00:00
|
|
|
cleanup:
|
2012-11-30 15:21:02 +00:00
|
|
|
VIR_FREE(got);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-07 21:26:28 +00:00
|
|
|
static bool fail;
|
|
|
|
|
|
|
|
static const char *
|
|
|
|
testStrdupLookup1(size_t i)
|
|
|
|
{
|
|
|
|
switch (i) {
|
|
|
|
case 0:
|
|
|
|
return "hello";
|
|
|
|
case 1:
|
|
|
|
return NULL;
|
|
|
|
default:
|
|
|
|
fail = true;
|
|
|
|
return "oops";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t
|
|
|
|
testStrdupLookup2(size_t i)
|
|
|
|
{
|
|
|
|
if (i)
|
|
|
|
fail = true;
|
|
|
|
return 5;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
testStrdup(const void *data ATTRIBUTE_UNUSED)
|
|
|
|
{
|
|
|
|
char *array[] = { NULL, NULL };
|
|
|
|
size_t i = 0;
|
|
|
|
size_t j = 0;
|
|
|
|
size_t k = 0;
|
|
|
|
int ret = -1;
|
|
|
|
int value;
|
|
|
|
|
|
|
|
value = VIR_STRDUP(array[i++], testStrdupLookup1(j++));
|
|
|
|
if (value != 1) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected strdup result %d, expected 1\n", value);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-09-04 19:30:33 +00:00
|
|
|
/* coverity[dead_error_begin] */
|
2013-05-07 21:26:28 +00:00
|
|
|
if (i != 1) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected side effects i=%zu, expected 1\n", i);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-09-04 19:30:33 +00:00
|
|
|
/* coverity[dead_error_begin] */
|
2013-05-07 21:26:28 +00:00
|
|
|
if (j != 1) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected side effects j=%zu, expected 1\n", j);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
if (STRNEQ_NULLABLE(array[0], "hello") || array[1]) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "incorrect array contents '%s' '%s'\n",
|
|
|
|
NULLSTR(array[0]), NULLSTR(array[1]));
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
value = VIR_STRNDUP(array[i++], testStrdupLookup1(j++),
|
|
|
|
testStrdupLookup2(k++));
|
|
|
|
if (value != 0) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected strdup result %d, expected 0\n", value);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-09-04 19:30:33 +00:00
|
|
|
/* coverity[dead_error_begin] */
|
2013-05-07 21:26:28 +00:00
|
|
|
if (i != 2) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected side effects i=%zu, expected 2\n", i);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-09-04 19:30:33 +00:00
|
|
|
/* coverity[dead_error_begin] */
|
2013-05-07 21:26:28 +00:00
|
|
|
if (j != 2) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected side effects j=%zu, expected 2\n", j);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2014-09-04 19:30:33 +00:00
|
|
|
/* coverity[dead_error_begin] */
|
2013-05-07 21:26:28 +00:00
|
|
|
if (k != 1) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "unexpected side effects k=%zu, expected 1\n", k);
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
if (STRNEQ_NULLABLE(array[0], "hello") || array[1]) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "incorrect array contents '%s' '%s'\n",
|
|
|
|
NULLSTR(array[0]), NULLSTR(array[1]));
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fail) {
|
2013-05-17 14:11:24 +00:00
|
|
|
virFilePrintf(stderr, "side effects failed\n");
|
2013-05-07 21:26:28 +00:00
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
2014-03-25 06:53:44 +00:00
|
|
|
cleanup:
|
2013-05-07 21:26:28 +00:00
|
|
|
for (i = 0; i < ARRAY_CARDINALITY(array); i++)
|
|
|
|
VIR_FREE(array[i]);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-24 08:45:57 +00:00
|
|
|
static int
|
|
|
|
testStrndupNegative(const void *opaque ATTRIBUTE_UNUSED)
|
|
|
|
{
|
|
|
|
int ret = -1;
|
|
|
|
char *dst;
|
|
|
|
const char *src = "Hello world";
|
|
|
|
int value;
|
|
|
|
|
|
|
|
if ((value = VIR_STRNDUP(dst, src, 5)) != 1) {
|
|
|
|
fprintf(stderr, "unexpected virStrndup result %d, expected 1\n", value);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(dst, "Hello")) {
|
|
|
|
fprintf(stderr, "unexpected content '%s'", dst);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
VIR_FREE(dst);
|
|
|
|
if ((value = VIR_STRNDUP(dst, src, -1)) != 1) {
|
|
|
|
fprintf(stderr, "unexpected virStrndup result %d, expected 1\n", value);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(dst, src)) {
|
|
|
|
fprintf(stderr, "unexpected content '%s'", dst);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
2014-03-25 06:53:44 +00:00
|
|
|
cleanup:
|
2013-05-24 08:45:57 +00:00
|
|
|
VIR_FREE(dst);
|
|
|
|
return ret;
|
|
|
|
}
|
2012-11-30 15:21:02 +00:00
|
|
|
|
2013-11-28 11:14:59 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
testStringSortCompare(const void *opaque ATTRIBUTE_UNUSED)
|
|
|
|
{
|
|
|
|
const char *randlist[] = {
|
|
|
|
"tasty", "astro", "goat", "chicken", "turducken",
|
|
|
|
};
|
|
|
|
const char *randrlist[] = {
|
|
|
|
"tasty", "astro", "goat", "chicken", "turducken",
|
|
|
|
};
|
|
|
|
const char *sortlist[] = {
|
|
|
|
"astro", "chicken", "goat", "tasty", "turducken",
|
|
|
|
};
|
|
|
|
const char *sortrlist[] = {
|
|
|
|
"turducken", "tasty", "goat", "chicken", "astro",
|
|
|
|
};
|
|
|
|
int ret = -1;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
qsort(randlist, ARRAY_CARDINALITY(randlist), sizeof(randlist[0]),
|
|
|
|
virStringSortCompare);
|
|
|
|
qsort(randrlist, ARRAY_CARDINALITY(randrlist), sizeof(randrlist[0]),
|
|
|
|
virStringSortRevCompare);
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_CARDINALITY(randlist); i++) {
|
|
|
|
if (STRNEQ(randlist[i], sortlist[i])) {
|
|
|
|
fprintf(stderr, "sortlist[%zu] '%s' != randlist[%zu] '%s'\n",
|
|
|
|
i, sortlist[i], i, randlist[i]);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
if (STRNEQ(randrlist[i], sortrlist[i])) {
|
|
|
|
fprintf(stderr, "sortrlist[%zu] '%s' != randrlist[%zu] '%s'\n",
|
|
|
|
i, sortrlist[i], i, randrlist[i]);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-23 09:28:29 +00:00
|
|
|
struct stringSearchData {
|
|
|
|
const char *str;
|
|
|
|
const char *regexp;
|
|
|
|
size_t maxMatches;
|
|
|
|
size_t expectNMatches;
|
|
|
|
const char **expectMatches;
|
|
|
|
bool expectError;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
testStringSearch(const void *opaque)
|
2014-01-23 09:28:29 +00:00
|
|
|
{
|
|
|
|
const struct stringSearchData *data = opaque;
|
|
|
|
char **matches = NULL;
|
|
|
|
ssize_t nmatches;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
nmatches = virStringSearch(data->str, data->regexp,
|
|
|
|
data->maxMatches, &matches);
|
|
|
|
|
|
|
|
if (data->expectError) {
|
|
|
|
if (nmatches != -1) {
|
|
|
|
fprintf(stderr, "expected error on %s but got %zd matches\n",
|
|
|
|
data->str, nmatches);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (nmatches < 0) {
|
|
|
|
fprintf(stderr, "expected %zu matches on %s but got error\n",
|
|
|
|
data->expectNMatches, data->str);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nmatches != data->expectNMatches) {
|
|
|
|
fprintf(stderr, "expected %zu matches on %s but got %zd\n",
|
|
|
|
data->expectNMatches, data->str, nmatches);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (virStringListLength(matches) != nmatches) {
|
|
|
|
fprintf(stderr, "expected %zu matches on %s but got %zd matches\n",
|
|
|
|
data->expectNMatches, data->str,
|
|
|
|
virStringListLength(matches));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < nmatches; i++) {
|
|
|
|
if (STRNEQ(matches[i], data->expectMatches[i])) {
|
|
|
|
fprintf(stderr, "match %zu expected '%s' but got '%s'\n",
|
|
|
|
i, data->expectMatches[i], matches[i]);
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
virStringFreeList(matches);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-02-19 20:30:46 +00:00
|
|
|
|
|
|
|
struct stringReplaceData {
|
|
|
|
const char *haystack;
|
|
|
|
const char *oldneedle;
|
|
|
|
const char *newneedle;
|
|
|
|
const char *result;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int
|
|
|
|
testStringReplace(const void *opaque ATTRIBUTE_UNUSED)
|
|
|
|
{
|
|
|
|
const struct stringReplaceData *data = opaque;
|
|
|
|
char *result;
|
|
|
|
int ret = -1;
|
|
|
|
|
|
|
|
result = virStringReplace(data->haystack,
|
|
|
|
data->oldneedle,
|
|
|
|
data->newneedle);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(data->result, result)) {
|
|
|
|
fprintf(stderr, "Expected '%s' but got '%s'\n",
|
|
|
|
data->result, NULLSTR(result));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
VIR_FREE(result);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
struct stringToLongData {
|
|
|
|
const char *str;
|
|
|
|
const char *suffix;
|
|
|
|
int si; /* syntax-check doesn't like bare 'i' */
|
|
|
|
int si_ret;
|
|
|
|
unsigned int ui;
|
|
|
|
int ui_ret;
|
|
|
|
/* No expected results for long: on 32-bit platforms, it is the
|
|
|
|
* same as int, on 64-bit platforms it is the same as long long */
|
|
|
|
long long ll;
|
|
|
|
int ll_ret;
|
|
|
|
unsigned long long ull;
|
|
|
|
int ull_ret;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* This test makes assumptions about our compilation platform that are
|
|
|
|
* not guaranteed by POSIX. Good luck to you if you are crazy enough
|
|
|
|
* to try and port libvirt to a platform with 16-bit int. */
|
|
|
|
verify(sizeof(int) == 4);
|
|
|
|
verify(TYPE_TWOS_COMPLEMENT(int));
|
|
|
|
verify(sizeof(long) == sizeof(int) || sizeof(long) == sizeof(long long));
|
|
|
|
verify(TYPE_TWOS_COMPLEMENT(long));
|
|
|
|
verify(sizeof(long long) == 8);
|
|
|
|
verify(TYPE_TWOS_COMPLEMENT(long long));
|
|
|
|
|
|
|
|
static int
|
|
|
|
testStringToLong(const void *opaque)
|
|
|
|
{
|
|
|
|
const struct stringToLongData *data = opaque;
|
|
|
|
int ret = 0;
|
|
|
|
char *end;
|
|
|
|
long l;
|
|
|
|
unsigned long ul;
|
2014-05-01 02:11:09 +00:00
|
|
|
bool negative;
|
|
|
|
|
|
|
|
if (data->suffix)
|
|
|
|
negative = !!memchr(data->str, '-',
|
|
|
|
strlen(data->str) - strlen(data->suffix));
|
|
|
|
else
|
|
|
|
negative = !!strchr(data->str, '-');
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
|
|
|
|
#define TEST_ONE(Str, Suff, Type, Fn, Fmt, Exp, Exp_ret) \
|
|
|
|
do { \
|
|
|
|
Type value = 5; \
|
|
|
|
int result; \
|
|
|
|
end = (char *) "oops"; \
|
|
|
|
result = virStrToLong_ ## Fn(Str, Suff ? &end : NULL, \
|
|
|
|
0, &value); \
|
|
|
|
/* On failure, end is modified, value is unchanged */ \
|
|
|
|
if (result != (Exp_ret)) { \
|
|
|
|
fprintf(stderr, \
|
|
|
|
"type " #Fn " returned %d expected %d\n", \
|
|
|
|
result, Exp_ret); \
|
|
|
|
ret = -1; \
|
|
|
|
} \
|
|
|
|
if (value != ((Exp_ret) ? 5 : Exp)) { \
|
|
|
|
fprintf(stderr, \
|
|
|
|
"type " #Fn " value " Fmt " expected " Fmt "\n", \
|
|
|
|
value, ((Exp_ret) ? 5 : Exp)); \
|
|
|
|
ret = -1; \
|
|
|
|
} \
|
|
|
|
if (Suff && STRNEQ_NULLABLE(Suff, end)) { \
|
|
|
|
fprintf(stderr, \
|
|
|
|
"type " #Fn " end '%s' expected '%s'\n", \
|
|
|
|
NULLSTR(end), Suff); \
|
|
|
|
ret = -1; \
|
|
|
|
} \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
TEST_ONE(data->str, data->suffix, int, i, "%d",
|
|
|
|
data->si, data->si_ret);
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned int, ui, "%u",
|
|
|
|
data->ui, data->ui_ret);
|
2014-05-01 02:11:09 +00:00
|
|
|
if (negative)
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned int, uip, "%u", 0U, -1);
|
|
|
|
else
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned int, uip, "%u",
|
|
|
|
data->ui, data->ui_ret);
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
|
|
|
|
/* We hate adding new API with 'long', and prefer 'int' or 'long
|
|
|
|
* long' instead, since platform-specific results are evil */
|
|
|
|
l = (sizeof(int) == sizeof(long)) ? data->si : data->ll;
|
|
|
|
TEST_ONE(data->str, data->suffix, long, l, "%ld",
|
|
|
|
l, (sizeof(int) == sizeof(long)) ? data->si_ret : data->ll_ret);
|
|
|
|
ul = (sizeof(int) == sizeof(long)) ? data->ui : data->ull;
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned long, ul, "%lu",
|
|
|
|
ul, (sizeof(int) == sizeof(long)) ? data->ui_ret : data->ull_ret);
|
2014-05-01 02:11:09 +00:00
|
|
|
if (negative)
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned long, ulp, "%lu", 0UL, -1);
|
|
|
|
else
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned long, ulp, "%lu", ul,
|
|
|
|
(sizeof(int) == sizeof(long)) ? data->ui_ret : data->ull_ret);
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
|
|
|
|
TEST_ONE(data->str, data->suffix, long long, ll, "%lld",
|
|
|
|
data->ll, data->ll_ret);
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned long long, ull, "%llu",
|
|
|
|
data->ull, data->ull_ret);
|
2014-05-01 02:11:09 +00:00
|
|
|
if (negative)
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned long long, ullp, "%llu",
|
|
|
|
0ULL, -1);
|
|
|
|
else
|
|
|
|
TEST_ONE(data->str, data->suffix, unsigned long long, ullp, "%llu",
|
|
|
|
data->ull, data->ull_ret);
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
|
|
|
|
#undef TEST_ONE
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-19 12:20:09 +00:00
|
|
|
/* The point of this test is to check whether all members of the array are
|
|
|
|
* freed. The test has to be checked using valgrind. */
|
|
|
|
static int
|
|
|
|
testVirStringFreeListCount(const void *opaque ATTRIBUTE_UNUSED)
|
|
|
|
{
|
|
|
|
char **list;
|
|
|
|
|
|
|
|
if (VIR_ALLOC_N(list, 4) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ignore_value(VIR_STRDUP(list[0], "test1"));
|
|
|
|
ignore_value(VIR_STRDUP(list[2], "test2"));
|
|
|
|
ignore_value(VIR_STRDUP(list[3], "test3"));
|
|
|
|
|
|
|
|
virStringFreeListCount(list, 4);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-07 15:27:40 +00:00
|
|
|
struct testStripIPv6BracketsData {
|
|
|
|
const char *string;
|
|
|
|
const char *result;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int testStripIPv6Brackets(const void *args)
|
|
|
|
{
|
|
|
|
const struct testStripIPv6BracketsData *data = args;
|
|
|
|
int ret = -1;
|
|
|
|
char *res = NULL;
|
|
|
|
|
|
|
|
if (VIR_STRDUP(res, data->string) < 0)
|
|
|
|
goto cleanup;
|
|
|
|
|
|
|
|
virStringStripIPv6Brackets(res);
|
|
|
|
|
|
|
|
if (STRNEQ_NULLABLE(res, data->result)) {
|
|
|
|
fprintf(stderr, "Returned '%s', expected '%s'\n",
|
|
|
|
NULLSTR(res), NULLSTR(data->result));
|
|
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
|
|
|
|
|
|
|
cleanup:
|
|
|
|
VIR_FREE(res);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-11-30 15:21:02 +00:00
|
|
|
static int
|
|
|
|
mymain(void)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
#define TEST_SPLIT(str, del, max, toks) \
|
|
|
|
do { \
|
|
|
|
struct testSplitData splitData = { \
|
|
|
|
.string = str, \
|
|
|
|
.delim = del, \
|
|
|
|
.max_tokens = max, \
|
|
|
|
.tokens = toks, \
|
|
|
|
}; \
|
|
|
|
struct testJoinData joinData = { \
|
|
|
|
.string = str, \
|
|
|
|
.delim = del, \
|
|
|
|
.tokens = toks, \
|
|
|
|
}; \
|
2013-09-20 18:13:35 +00:00
|
|
|
if (virtTestRun("Split " #str, testSplit, &splitData) < 0) \
|
2012-11-30 15:21:02 +00:00
|
|
|
ret = -1; \
|
2013-09-20 18:13:35 +00:00
|
|
|
if (virtTestRun("Join " #str, testJoin, &joinData) < 0) \
|
2012-11-30 15:21:02 +00:00
|
|
|
ret = -1; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
const char *tokens1[] = { NULL };
|
|
|
|
TEST_SPLIT("", " ", 0, tokens1);
|
|
|
|
|
|
|
|
const char *tokens2[] = { "", "", NULL };
|
|
|
|
TEST_SPLIT(" ", " ", 0, tokens2);
|
|
|
|
|
|
|
|
const char *tokens3[] = { "", "", "", NULL };
|
|
|
|
TEST_SPLIT(" ", " ", 0, tokens3);
|
|
|
|
|
|
|
|
const char *tokens4[] = { "The", "quick", "brown", "fox", NULL };
|
|
|
|
TEST_SPLIT("The quick brown fox", " ", 0, tokens4);
|
|
|
|
|
|
|
|
const char *tokens5[] = { "The quick ", " fox", NULL };
|
|
|
|
TEST_SPLIT("The quick brown fox", "brown", 0, tokens5);
|
|
|
|
|
|
|
|
const char *tokens6[] = { "", "The", "quick", "brown", "fox", NULL };
|
|
|
|
TEST_SPLIT(" The quick brown fox", " ", 0, tokens6);
|
|
|
|
|
|
|
|
const char *tokens7[] = { "The", "quick", "brown", "fox", "", NULL };
|
|
|
|
TEST_SPLIT("The quick brown fox ", " ", 0, tokens7);
|
|
|
|
|
2014-10-29 10:01:48 +00:00
|
|
|
const char *tokens8[] = { "gluster", "rdma", NULL };
|
|
|
|
TEST_SPLIT("gluster+rdma", "+", 2, tokens8);
|
|
|
|
|
2013-09-20 18:13:35 +00:00
|
|
|
if (virtTestRun("strdup", testStrdup, NULL) < 0)
|
2013-05-07 21:26:28 +00:00
|
|
|
ret = -1;
|
2012-11-30 15:21:02 +00:00
|
|
|
|
2013-09-20 18:13:35 +00:00
|
|
|
if (virtTestRun("strdup", testStrndupNegative, NULL) < 0)
|
2013-05-24 08:45:57 +00:00
|
|
|
ret = -1;
|
|
|
|
|
2013-11-28 11:14:59 +00:00
|
|
|
if (virtTestRun("virStringSortCompare", testStringSortCompare, NULL) < 0)
|
|
|
|
ret = -1;
|
|
|
|
|
2014-01-23 09:28:29 +00:00
|
|
|
#define TEST_SEARCH(s, r, x, n, m, e) \
|
|
|
|
do { \
|
|
|
|
struct stringSearchData data = { \
|
|
|
|
.str = s, \
|
|
|
|
.maxMatches = x, \
|
|
|
|
.regexp = r, \
|
|
|
|
.expectNMatches = n, \
|
|
|
|
.expectMatches = m, \
|
|
|
|
.expectError = e, \
|
|
|
|
}; \
|
|
|
|
if (virtTestRun("virStringSearch " s, testStringSearch, &data) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
/* error due to missing () in regexp */
|
|
|
|
TEST_SEARCH("foo", "bar", 10, 0, NULL, true);
|
|
|
|
|
|
|
|
/* error due to too many () in regexp */
|
|
|
|
TEST_SEARCH("foo", "(b)(a)(r)", 10, 0, NULL, true);
|
|
|
|
|
|
|
|
/* None matching */
|
|
|
|
TEST_SEARCH("foo", "(bar)", 10, 0, NULL, false);
|
|
|
|
|
|
|
|
/* Full match */
|
|
|
|
const char *matches1[] = { "foo" };
|
|
|
|
TEST_SEARCH("foo", "(foo)", 10, 1, matches1, false);
|
|
|
|
|
|
|
|
/* Multi matches */
|
|
|
|
const char *matches2[] = { "foo", "bar", "eek" };
|
|
|
|
TEST_SEARCH("1foo2bar3eek", "([a-z]+)", 10, 3, matches2, false);
|
|
|
|
|
|
|
|
/* Multi matches, limited returns */
|
|
|
|
const char *matches3[] = { "foo", "bar" };
|
|
|
|
TEST_SEARCH("1foo2bar3eek", "([a-z]+)", 2, 2, matches3, false);
|
|
|
|
|
2014-02-19 20:30:46 +00:00
|
|
|
#define TEST_REPLACE(h, o, n, r) \
|
|
|
|
do { \
|
|
|
|
struct stringReplaceData data = { \
|
|
|
|
.haystack = h, \
|
|
|
|
.oldneedle = o, \
|
|
|
|
.newneedle = n, \
|
|
|
|
.result = r \
|
|
|
|
}; \
|
|
|
|
if (virtTestRun("virStringReplace " h, testStringReplace, &data) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
/* no matches */
|
|
|
|
TEST_REPLACE("foo", "bar", "eek", "foo");
|
|
|
|
|
|
|
|
/* complete match */
|
|
|
|
TEST_REPLACE("foo", "foo", "bar", "bar");
|
|
|
|
|
|
|
|
/* middle match */
|
|
|
|
TEST_REPLACE("foobarwizz", "bar", "eek", "fooeekwizz");
|
|
|
|
|
|
|
|
/* many matches */
|
|
|
|
TEST_REPLACE("foofoofoofoo", "foo", "bar", "barbarbarbar");
|
|
|
|
|
|
|
|
/* many matches */
|
|
|
|
TEST_REPLACE("fooooofoooo", "foo", "bar", "barooobaroo");
|
|
|
|
|
|
|
|
/* different length old/new needles */
|
|
|
|
TEST_REPLACE("fooooofoooo", "foo", "barwizzeek", "barwizzeekooobarwizzeekoo");
|
|
|
|
TEST_REPLACE("fooooofoooo", "foooo", "foo", "fooofoo");
|
|
|
|
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
#define TEST_STRTOL(str, suff, i, i_ret, u, u_ret, \
|
|
|
|
ll, ll_ret, ull, ull_ret) \
|
|
|
|
do { \
|
|
|
|
struct stringToLongData data = { \
|
|
|
|
str, suff, i, i_ret, u, u_ret, ll, ll_ret, ull, ull_ret, \
|
|
|
|
}; \
|
|
|
|
if (virtTestRun("virStringToLong '" str "'", testStringToLong, \
|
|
|
|
&data) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
/* Start simple */
|
|
|
|
TEST_STRTOL("0", NULL, 0, 0, 0U, 0, 0LL, 0, 0ULL, 0);
|
|
|
|
|
|
|
|
/* All your base are belong to us */
|
|
|
|
TEST_STRTOL("0x0", NULL, 0, 0, 0U, 0, 0LL, 0, 0ULL, 0);
|
|
|
|
TEST_STRTOL("0XaB", NULL, 171, 0, 171U, 0, 171LL, 0, 171ULL, 0);
|
|
|
|
TEST_STRTOL("010", NULL, 8, 0, 8U, 0, 8LL, 0, 8ULL, 0);
|
|
|
|
|
|
|
|
/* Suffix handling */
|
|
|
|
TEST_STRTOL("42", NULL, 42, 0, 42U, 0, 42LL, 0, 42ULL, 0);
|
|
|
|
TEST_STRTOL("42", "", 42, 0, 42U, 0, 42LL, 0, 42ULL, 0);
|
|
|
|
TEST_STRTOL("42.", NULL, 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL("42.", ".", 42, 0, 42U, 0, 42LL, 0, 42ULL, 0);
|
|
|
|
|
|
|
|
/* Blatant invalid input */
|
|
|
|
TEST_STRTOL("", "", 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL("", NULL, 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL(" ", " ", 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL(" ", NULL, 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL(" -", " -", 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL(" -", NULL, 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL("a", "a", 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL("a", NULL, 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
|
|
|
|
/* Not a hex number, but valid when suffix expected */
|
|
|
|
TEST_STRTOL(" 0x", NULL, 0, -1, 0U, -1, 0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL(" 0x", "x", 0, 0, 0U, 0, 0LL, 0, 0ULL, 0);
|
|
|
|
|
|
|
|
/* Upper bounds */
|
|
|
|
TEST_STRTOL("2147483647", NULL, 2147483647, 0, 2147483647U, 0,
|
|
|
|
2147483647LL, 0, 2147483647ULL, 0);
|
|
|
|
TEST_STRTOL("2147483648", NULL, 0, -1, 2147483648U, 0,
|
|
|
|
2147483648LL, 0, 2147483648ULL, 0);
|
|
|
|
TEST_STRTOL("4294967295", NULL, 0, -1, 4294967295U, 0,
|
|
|
|
4294967295LL, 0, 4294967295ULL, 0);
|
|
|
|
TEST_STRTOL("4294967296", NULL, 0, -1, 0U, -1,
|
|
|
|
4294967296LL, 0, 4294967296ULL, 0);
|
|
|
|
TEST_STRTOL("9223372036854775807", NULL, 0, -1, 0U, -1,
|
|
|
|
9223372036854775807LL, 0, 9223372036854775807ULL, 0);
|
|
|
|
TEST_STRTOL("9223372036854775808", NULL, 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 9223372036854775808ULL, 0);
|
|
|
|
TEST_STRTOL("18446744073709551615", NULL, 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 18446744073709551615ULL, 0);
|
|
|
|
TEST_STRTOL("18446744073709551616", NULL, 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 0ULL, -1);
|
|
|
|
TEST_STRTOL("18446744073709551616", "", 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 0ULL, -1);
|
|
|
|
|
|
|
|
/* Negative bounds */
|
|
|
|
TEST_STRTOL("-0", NULL, 0, 0, 0U, 0, 0LL, 0, 0ULL, 0);
|
|
|
|
TEST_STRTOL("-1", "", -1, 0, 4294967295U, 0,
|
|
|
|
-1LL, 0, 18446744073709551615ULL, 0);
|
|
|
|
TEST_STRTOL("-2147483647", NULL, -2147483647, 0, 2147483649U, 0,
|
|
|
|
-2147483647LL, 0, 18446744071562067969ULL, 0);
|
2014-05-30 22:30:07 +00:00
|
|
|
TEST_STRTOL("-2147483648", NULL, INT32_MIN, 0, 2147483648U, 0,
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
-2147483648LL, 0, 18446744071562067968ULL, 0);
|
|
|
|
TEST_STRTOL("-2147483649", NULL, 0, -1, 2147483647U, 0,
|
|
|
|
-2147483649LL, 0, 18446744071562067967ULL, 0);
|
|
|
|
TEST_STRTOL("-4294967295", NULL, 0, -1, 1U, 0,
|
|
|
|
-4294967295LL, 0, 18446744069414584321ULL, 0);
|
|
|
|
TEST_STRTOL("-4294967296", NULL, 0, -1, 0U, -1,
|
|
|
|
-4294967296LL, 0, 18446744069414584320ULL, 0);
|
|
|
|
TEST_STRTOL("-9223372036854775807", NULL, 0, -1, 0U, -1,
|
|
|
|
-9223372036854775807LL, 0, 9223372036854775809ULL, 0);
|
|
|
|
TEST_STRTOL("-9223372036854775808", NULL, 0, -1, 0U, -1,
|
2014-05-30 22:30:07 +00:00
|
|
|
INT64_MIN, 0, 9223372036854775808ULL, 0);
|
util: fix uint parsing on 64-bit platforms
Commit f22b7899 called to light a long-standing latent bug: the
behavior of virStrToLong_ui was different on 32-bit platforms
than on 64-bit platforms. Curse you, C type promotion and
narrowing rules, and strtoul specification. POSIX says that for
a 32-bit long, strtol handles only 2^32 values [LONG_MIN to
LONG_MAX] while strtoul handles 2^33 - 1 values [-ULONG_MAX to
ULONG_MAX] with twos-complement wraparound for negatives. Thus,
parsing -1 as unsigned long produces ULONG_MAX, rather than a
range error. We WANT[1] this same shortcut for turning -1 into
UINT_MAX when parsing to int; and get it for free with 32-bit
long. But with 64-bit long, ULONG_MAX is outside the range
of int and we were rejecting it as invalid; meanwhile, we were
silently treating -18446744073709551615 as 1 even though it
textually exceeds INT_MIN. Too bad there's not a strtoui() in
libc that does guaranteed parsing to int, regardless of the size
of long.
The bug has been latent since 2007, introduced by Jim Meyering
in commit 5d25419 in the attempt to eradicate unsafe use of
strto[u]l when parsing ints and longs. How embarrassing that we
are only discovering it now - so I'm adding a testsuite to ensure
that it covers all the corner cases we care about.
[1] Ideally, we really want the caller to be able to choose whether
to allow negative numbers to wrap around to their 2s-complement
counterpart, as in strtoul, or to force a stricter input range
of [0 to UINT_MAX] by rejecting negative signs; this will be added
in a later patch for all three int types.
This patch is tested on both 32- and 64-bit; the enhanced
virstringtest passes on both platforms, while virstoragetest now
reliably fails on both platforms instead of just 32-bit platforms.
That test will be fixed later.
* src/util/virstring.c (virStrToLong_ui): Ensure same behavior
regardless of platform long size.
* tests/virstringtest.c (testStringToLong): New function.
(mymain): Comprehensively test string to long parsing.
Signed-off-by: Eric Blake <eblake@redhat.com>
2014-04-30 20:46:18 +00:00
|
|
|
TEST_STRTOL("-9223372036854775809", NULL, 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 9223372036854775807ULL, 0);
|
|
|
|
TEST_STRTOL("-18446744073709551615", NULL, 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 1ULL, 0);
|
|
|
|
TEST_STRTOL("-18446744073709551616", NULL, 0, -1, 0U, -1,
|
|
|
|
0LL, -1, 0ULL, -1);
|
|
|
|
|
2014-05-19 12:20:09 +00:00
|
|
|
/* test virStringFreeListCount */
|
|
|
|
if (virtTestRun("virStringFreeListCount", testVirStringFreeListCount,
|
|
|
|
NULL) < 0)
|
|
|
|
ret = -1;
|
|
|
|
|
2014-10-07 15:27:40 +00:00
|
|
|
#define TEST_STRIP_IPV6_BRACKETS(str, res) \
|
|
|
|
do { \
|
|
|
|
struct testStripIPv6BracketsData stripData = { \
|
|
|
|
.string = str, \
|
|
|
|
.result = res, \
|
|
|
|
}; \
|
|
|
|
if (virtTestRun("Strip brackets from IPv6 " #str, \
|
|
|
|
testStripIPv6Brackets, &stripData) < 0) \
|
|
|
|
ret = -1; \
|
|
|
|
} while (0)
|
|
|
|
|
|
|
|
TEST_STRIP_IPV6_BRACKETS(NULL, NULL);
|
|
|
|
TEST_STRIP_IPV6_BRACKETS("[]", "[]");
|
|
|
|
TEST_STRIP_IPV6_BRACKETS("[:]", ":");
|
|
|
|
TEST_STRIP_IPV6_BRACKETS("[::1]", "::1");
|
|
|
|
TEST_STRIP_IPV6_BRACKETS("[hello:", "[hello:");
|
|
|
|
TEST_STRIP_IPV6_BRACKETS(":hello]", ":hello]");
|
|
|
|
TEST_STRIP_IPV6_BRACKETS(":[]:", ":[]:");
|
|
|
|
|
2014-03-17 09:38:38 +00:00
|
|
|
return ret == 0 ? EXIT_SUCCESS : EXIT_FAILURE;
|
2012-11-30 15:21:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
VIRT_TEST_MAIN(mymain)
|