2007-01-07 23:04:40 +01:00
|
|
|
/*
|
|
|
|
* Simple C functions to supplement the C library
|
2007-09-16 23:08:06 +02:00
|
|
|
*
|
2007-01-07 23:04:40 +01:00
|
|
|
* Copyright (c) 2006 Fabrice Bellard
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
|
|
* of this software and associated documentation files (the "Software"), to deal
|
|
|
|
* in the Software without restriction, including without limitation the rights
|
|
|
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
|
|
* copies of the Software, and to permit persons to whom the Software is
|
|
|
|
* furnished to do so, subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in
|
|
|
|
* all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
|
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
|
|
* THE SOFTWARE.
|
|
|
|
*/
|
2019-05-23 16:35:06 +02:00
|
|
|
|
2016-01-29 18:49:55 +01:00
|
|
|
#include "qemu/osdep.h"
|
2012-12-17 18:20:00 +01:00
|
|
|
#include "qemu/host-utils.h"
|
2010-10-21 17:15:46 +02:00
|
|
|
#include <math.h>
|
2007-01-07 23:04:40 +01:00
|
|
|
|
2019-05-23 16:35:08 +02:00
|
|
|
#include "qemu-common.h"
|
2012-12-17 18:20:00 +01:00
|
|
|
#include "qemu/sockets.h"
|
|
|
|
#include "qemu/iov.h"
|
2014-03-11 00:42:26 +01:00
|
|
|
#include "net/net.h"
|
2019-05-23 16:35:06 +02:00
|
|
|
#include "qemu/ctype.h"
|
2016-03-20 18:16:19 +01:00
|
|
|
#include "qemu/cutils.h"
|
2017-08-18 20:47:35 +02:00
|
|
|
#include "qemu/error-report.h"
|
2011-09-08 13:46:25 +02:00
|
|
|
|
2012-07-09 08:50:43 +02:00
|
|
|
void strpadcpy(char *buf, int buf_size, const char *str, char pad)
|
|
|
|
{
|
|
|
|
int len = qemu_strnlen(str, buf_size);
|
|
|
|
memcpy(buf, str, len);
|
|
|
|
memset(buf + len, pad, buf_size - len);
|
|
|
|
}
|
|
|
|
|
2007-01-07 23:04:40 +01:00
|
|
|
void pstrcpy(char *buf, int buf_size, const char *str)
|
|
|
|
{
|
|
|
|
int c;
|
|
|
|
char *q = buf;
|
|
|
|
|
|
|
|
if (buf_size <= 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for(;;) {
|
|
|
|
c = *str++;
|
|
|
|
if (c == 0 || q >= buf + buf_size - 1)
|
|
|
|
break;
|
|
|
|
*q++ = c;
|
|
|
|
}
|
|
|
|
*q = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
/* strcat and truncate. */
|
|
|
|
char *pstrcat(char *buf, int buf_size, const char *s)
|
|
|
|
{
|
|
|
|
int len;
|
|
|
|
len = strlen(buf);
|
2007-09-16 23:08:06 +02:00
|
|
|
if (len < buf_size)
|
2007-01-07 23:04:40 +01:00
|
|
|
pstrcpy(buf + len, buf_size - len, s);
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
int strstart(const char *str, const char *val, const char **ptr)
|
|
|
|
{
|
|
|
|
const char *p, *q;
|
|
|
|
p = str;
|
|
|
|
q = val;
|
|
|
|
while (*q != '\0') {
|
|
|
|
if (*p != *q)
|
|
|
|
return 0;
|
|
|
|
p++;
|
|
|
|
q++;
|
|
|
|
}
|
|
|
|
if (ptr)
|
|
|
|
*ptr = p;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int stristart(const char *str, const char *val, const char **ptr)
|
|
|
|
{
|
|
|
|
const char *p, *q;
|
|
|
|
p = str;
|
|
|
|
q = val;
|
|
|
|
while (*q != '\0') {
|
2008-11-16 14:53:32 +01:00
|
|
|
if (qemu_toupper(*p) != qemu_toupper(*q))
|
2007-01-07 23:04:40 +01:00
|
|
|
return 0;
|
|
|
|
p++;
|
|
|
|
q++;
|
|
|
|
}
|
|
|
|
if (ptr)
|
|
|
|
*ptr = p;
|
|
|
|
return 1;
|
|
|
|
}
|
2007-11-10 20:36:39 +01:00
|
|
|
|
2009-07-01 20:24:44 +02:00
|
|
|
/* XXX: use host strnlen if available ? */
|
|
|
|
int qemu_strnlen(const char *s, int max_len)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for(i = 0; i < max_len; i++) {
|
|
|
|
if (s[i] == '\0') {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
2013-06-05 14:19:35 +02:00
|
|
|
char *qemu_strsep(char **input, const char *delim)
|
|
|
|
{
|
|
|
|
char *result = *input;
|
|
|
|
if (result != NULL) {
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
for (p = result; *p != '\0'; p++) {
|
|
|
|
if (strchr(delim, *p)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (*p == '\0') {
|
|
|
|
*input = NULL;
|
|
|
|
} else {
|
|
|
|
*p = '\0';
|
|
|
|
*input = p + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2007-11-10 20:36:39 +01:00
|
|
|
time_t mktimegm(struct tm *tm)
|
|
|
|
{
|
|
|
|
time_t t;
|
|
|
|
int y = tm->tm_year + 1900, m = tm->tm_mon + 1, d = tm->tm_mday;
|
|
|
|
if (m < 3) {
|
|
|
|
m += 12;
|
|
|
|
y--;
|
|
|
|
}
|
2012-10-01 14:22:06 +02:00
|
|
|
t = 86400ULL * (d + (153 * m - 457) / 5 + 365 * y + y / 4 - y / 100 +
|
2007-11-10 20:36:39 +01:00
|
|
|
y / 400 - 719469);
|
|
|
|
t += 3600 * tm->tm_hour + 60 * tm->tm_min + tm->tm_sec;
|
|
|
|
return t;
|
|
|
|
}
|
2008-12-04 20:19:45 +01:00
|
|
|
|
2009-09-04 19:01:32 +02:00
|
|
|
/*
|
|
|
|
* Make sure data goes on disk, but if possible do not bother to
|
|
|
|
* write out the inode just for timestamp updates.
|
|
|
|
*
|
|
|
|
* Unfortunately even in 2009 many operating systems do not support
|
|
|
|
* fdatasync and have to fall back to fsync.
|
|
|
|
*/
|
|
|
|
int qemu_fdatasync(int fd)
|
|
|
|
{
|
2009-09-20 08:56:26 +02:00
|
|
|
#ifdef CONFIG_FDATASYNC
|
2009-09-04 19:01:32 +02:00
|
|
|
return fdatasync(fd);
|
|
|
|
#else
|
|
|
|
return fsync(fd);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2019-11-21 01:08:41 +01:00
|
|
|
/**
|
|
|
|
* Sync changes made to the memory mapped file back to the backing
|
|
|
|
* storage. For POSIX compliant systems this will fallback
|
|
|
|
* to regular msync call. Otherwise it will trigger whole file sync
|
|
|
|
* (including the metadata case there is no support to skip that otherwise)
|
|
|
|
*
|
|
|
|
* @addr - start of the memory area to be synced
|
|
|
|
* @length - length of the are to be synced
|
|
|
|
* @fd - file descriptor for the file to be synced
|
|
|
|
* (mandatory only for POSIX non-compliant systems)
|
|
|
|
*/
|
|
|
|
int qemu_msync(void *addr, size_t length, int fd)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_POSIX
|
|
|
|
size_t align_mask = ~(qemu_real_host_page_size - 1);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* There are no strict reqs as per the length of mapping
|
|
|
|
* to be synced. Still the length needs to follow the address
|
|
|
|
* alignment changes. Additionally - round the size to the multiple
|
|
|
|
* of PAGE_SIZE
|
|
|
|
*/
|
|
|
|
length += ((uintptr_t)addr & (qemu_real_host_page_size - 1));
|
|
|
|
length = (length + ~align_mask) & align_mask;
|
|
|
|
|
|
|
|
addr = (void *)((uintptr_t)addr & align_mask);
|
|
|
|
|
|
|
|
return msync(addr, length, MS_SYNC);
|
|
|
|
#else /* CONFIG_POSIX */
|
|
|
|
/**
|
|
|
|
* Perform the sync based on the file descriptor
|
|
|
|
* The sync range will most probably be wider than the one
|
|
|
|
* requested - but it will still get the job done
|
|
|
|
*/
|
|
|
|
return qemu_fdatasync(fd);
|
|
|
|
#endif /* CONFIG_POSIX */
|
|
|
|
}
|
|
|
|
|
2010-03-10 11:38:55 +01:00
|
|
|
#ifndef _WIN32
|
|
|
|
/* Sets a specific flag */
|
|
|
|
int fcntl_setfl(int fd, int flag)
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
|
|
|
|
flags = fcntl(fd, F_GETFL);
|
|
|
|
if (flags == -1)
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
if (fcntl(fd, F_SETFL, flags | flag) == -1)
|
|
|
|
return -errno;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
static int64_t suffix_mul(char suffix, int64_t unit)
|
|
|
|
{
|
|
|
|
switch (qemu_toupper(suffix)) {
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'B':
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
return 1;
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'K':
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
return unit;
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'M':
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
return unit * unit;
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'G':
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
return unit * unit * unit;
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'T':
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
return unit * unit * unit * unit;
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'P':
|
2013-06-05 14:19:27 +02:00
|
|
|
return unit * unit * unit * unit * unit;
|
2017-02-21 21:14:01 +01:00
|
|
|
case 'E':
|
2013-06-05 14:19:27 +02:00
|
|
|
return unit * unit * unit * unit * unit * unit;
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-10-21 17:15:46 +02:00
|
|
|
/*
|
|
|
|
* Convert string to bytes, allowing either B/b for bytes, K/k for KB,
|
2011-11-22 09:46:01 +01:00
|
|
|
* M/m for MB, G/g for GB or T/t for TB. End pointer will be returned
|
2018-11-21 17:44:14 +01:00
|
|
|
* in *end, if not NULL. Return -ERANGE on overflow, and -EINVAL on
|
2012-12-17 02:49:22 +01:00
|
|
|
* other error.
|
2010-10-21 17:15:46 +02:00
|
|
|
*/
|
2018-11-21 17:44:14 +01:00
|
|
|
static int do_strtosz(const char *nptr, const char **end,
|
2017-02-21 21:14:06 +01:00
|
|
|
const char default_suffix, int64_t unit,
|
2017-02-21 21:14:07 +01:00
|
|
|
uint64_t *result)
|
2010-10-21 17:15:46 +02:00
|
|
|
{
|
2017-02-21 21:14:06 +01:00
|
|
|
int retval;
|
2018-11-21 17:44:14 +01:00
|
|
|
const char *endptr;
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
unsigned char c;
|
2010-10-21 17:15:46 +02:00
|
|
|
int mul_required = 0;
|
|
|
|
double val, mul, integral, fraction;
|
|
|
|
|
2018-11-21 17:44:14 +01:00
|
|
|
retval = qemu_strtod_finite(nptr, &endptr, &val);
|
|
|
|
if (retval) {
|
2017-02-21 21:14:05 +01:00
|
|
|
goto out;
|
2010-10-21 17:15:46 +02:00
|
|
|
}
|
2011-01-24 16:33:30 +01:00
|
|
|
fraction = modf(val, &integral);
|
|
|
|
if (fraction != 0) {
|
2010-10-21 17:15:46 +02:00
|
|
|
mul_required = 1;
|
|
|
|
}
|
|
|
|
c = *endptr;
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
mul = suffix_mul(c, unit);
|
|
|
|
if (mul >= 0) {
|
|
|
|
endptr++;
|
|
|
|
} else {
|
|
|
|
mul = suffix_mul(default_suffix, unit);
|
|
|
|
assert(mul >= 0);
|
2010-10-21 17:15:46 +02:00
|
|
|
}
|
cutils: Make strtosz & friends leave follow set to callers
strtosz() & friends require the size to be at the end of the string,
or be followed by whitespace or ','. I find this surprising, because
the name suggests it works like strtol().
The check simplifies callers that accept exactly that follow set
slightly. No such callers exist.
The check is redundant for callers that accept a smaller follow set,
and thus need to check themselves anyway. Right now, this is the case
for all but one caller. All of them neglected to check, or checked
incorrectly, but the previous few commits fixed them up.
Finally, the check is problematic for callers that accept a larger
follow set. This is the case in monitor_parse_command().
Fortunately, the problems there are relatively harmless.
monitor_parse_command() uses strtosz() for argument type 'o'. When
the last argument is of type 'o', a trailing ',' is diagnosed
differently than other trailing junk:
(qemu) migrate_set_speed 1x
invalid size
(qemu) migrate_set_speed 1,
migrate_set_speed: extraneous characters at the end of line
A related inconsistency exists with non-last arguments. No such
command exists, but let's use memsave to explore the inconsistency.
The monitor permits, but does not require whitespace between
arguments. For instance, "memsave (1-1)1024foo" is parsed as command
memsave with three arguments 0, 1024 and "foo". Yes, this is daft,
but at least it's consistently daft.
If I change memsave's second argument from 'i' to 'o', then "memsave
(1-1)1foo" is rejected, because the size is followed by an 'f'. But
"memsave (1-1)1," is still accepted, and duly saves to file ",".
We don't have any users of strtosz that profit from the check. In the
users we have, it appears to encourage sloppy error checking, or gets
in the way. Drop the bothersome check.
Signed-off-by: Markus Armbruster <armbru@redhat.com>
Signed-off-by: Anthony Liguori <aliguori@us.ibm.com>
2011-11-22 09:46:06 +01:00
|
|
|
if (mul == 1 && mul_required) {
|
2017-02-21 21:14:05 +01:00
|
|
|
retval = -EINVAL;
|
|
|
|
goto out;
|
2010-10-21 17:15:46 +02:00
|
|
|
}
|
2017-02-21 21:14:07 +01:00
|
|
|
/*
|
2019-11-22 09:00:39 +01:00
|
|
|
* Values near UINT64_MAX overflow to 2**64 when converting to double
|
|
|
|
* precision. Compare against the maximum representable double precision
|
|
|
|
* value below 2**64, computed as "the next value after 2**64 (0x1p64) in
|
|
|
|
* the direction of 0".
|
2017-02-21 21:14:07 +01:00
|
|
|
*/
|
2019-11-22 09:00:39 +01:00
|
|
|
if ((val * mul > nextafter(0x1p64, 0)) || val < 0) {
|
2012-12-17 02:49:22 +01:00
|
|
|
retval = -ERANGE;
|
2017-02-21 21:14:05 +01:00
|
|
|
goto out;
|
2010-10-21 17:15:46 +02:00
|
|
|
}
|
2017-02-21 21:14:06 +01:00
|
|
|
*result = val * mul;
|
|
|
|
retval = 0;
|
2010-10-21 17:15:46 +02:00
|
|
|
|
2017-02-21 21:14:05 +01:00
|
|
|
out:
|
2010-10-21 17:15:46 +02:00
|
|
|
if (end) {
|
|
|
|
*end = endptr;
|
2017-02-21 21:14:05 +01:00
|
|
|
} else if (*endptr) {
|
|
|
|
retval = -EINVAL;
|
2010-10-21 17:15:46 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
2010-12-09 14:17:24 +01:00
|
|
|
|
2018-11-21 17:44:14 +01:00
|
|
|
int qemu_strtosz(const char *nptr, const char **end, uint64_t *result)
|
2011-07-07 16:13:11 +02:00
|
|
|
{
|
2017-02-21 21:14:06 +01:00
|
|
|
return do_strtosz(nptr, end, 'B', 1024, result);
|
2011-07-07 16:13:11 +02:00
|
|
|
}
|
|
|
|
|
2018-11-21 17:44:14 +01:00
|
|
|
int qemu_strtosz_MiB(const char *nptr, const char **end, uint64_t *result)
|
2010-12-09 14:17:24 +01:00
|
|
|
{
|
2017-02-21 21:14:06 +01:00
|
|
|
return do_strtosz(nptr, end, 'M', 1024, result);
|
2010-12-09 14:17:24 +01:00
|
|
|
}
|
2011-09-28 12:41:32 +02:00
|
|
|
|
2018-11-21 17:44:14 +01:00
|
|
|
int qemu_strtosz_metric(const char *nptr, const char **end, uint64_t *result)
|
2017-02-21 21:13:58 +01:00
|
|
|
{
|
2017-02-21 21:14:06 +01:00
|
|
|
return do_strtosz(nptr, end, 'B', 1000, result);
|
2017-02-21 21:13:58 +01:00
|
|
|
}
|
|
|
|
|
2015-07-20 01:02:17 +02:00
|
|
|
/**
|
2017-02-21 21:13:51 +01:00
|
|
|
* Helper function for error checking after strtol() and the like
|
2015-07-20 01:02:17 +02:00
|
|
|
*/
|
2017-02-21 21:13:51 +01:00
|
|
|
static int check_strtox_error(const char *nptr, char *ep,
|
|
|
|
const char **endptr, int libc_errno)
|
2015-07-20 01:02:17 +02:00
|
|
|
{
|
2018-12-06 16:18:56 +01:00
|
|
|
assert(ep >= nptr);
|
2017-02-21 21:13:52 +01:00
|
|
|
if (endptr) {
|
|
|
|
*endptr = ep;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Turn "no conversion" into an error */
|
2017-02-21 21:13:51 +01:00
|
|
|
if (libc_errno == 0 && ep == nptr) {
|
2017-02-21 21:13:52 +01:00
|
|
|
return -EINVAL;
|
2015-09-10 10:02:00 +02:00
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
|
|
|
|
/* Fail when we're expected to consume the string, but didn't */
|
2017-02-21 21:13:51 +01:00
|
|
|
if (!endptr && *ep) {
|
2015-07-20 01:02:17 +02:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
|
2017-02-21 21:13:51 +01:00
|
|
|
return -libc_errno;
|
2015-07-20 01:02:17 +02:00
|
|
|
}
|
|
|
|
|
2017-12-22 13:46:23 +01:00
|
|
|
/**
|
|
|
|
* Convert string @nptr to an integer, and store it in @result.
|
|
|
|
*
|
|
|
|
* This is a wrapper around strtol() that is harder to misuse.
|
|
|
|
* Semantics of @nptr, @endptr, @base match strtol() with differences
|
|
|
|
* noted below.
|
|
|
|
*
|
|
|
|
* @nptr may be null, and no conversion is performed then.
|
|
|
|
*
|
|
|
|
* If no conversion is performed, store @nptr in *@endptr and return
|
|
|
|
* -EINVAL.
|
|
|
|
*
|
|
|
|
* If @endptr is null, and the string isn't fully converted, return
|
|
|
|
* -EINVAL. This is the case when the pointer that would be stored in
|
|
|
|
* a non-null @endptr points to a character other than '\0'.
|
|
|
|
*
|
|
|
|
* If the conversion overflows @result, store INT_MAX in @result,
|
|
|
|
* and return -ERANGE.
|
|
|
|
*
|
|
|
|
* If the conversion underflows @result, store INT_MIN in @result,
|
|
|
|
* and return -ERANGE.
|
|
|
|
*
|
|
|
|
* Else store the converted value in @result, and return zero.
|
|
|
|
*/
|
|
|
|
int qemu_strtoi(const char *nptr, const char **endptr, int base,
|
|
|
|
int *result)
|
|
|
|
{
|
|
|
|
char *ep;
|
|
|
|
long long lresult;
|
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2017-12-22 13:46:23 +01:00
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
lresult = strtoll(nptr, &ep, base);
|
|
|
|
if (lresult < INT_MIN) {
|
|
|
|
*result = INT_MIN;
|
|
|
|
errno = ERANGE;
|
|
|
|
} else if (lresult > INT_MAX) {
|
|
|
|
*result = INT_MAX;
|
|
|
|
errno = ERANGE;
|
|
|
|
} else {
|
|
|
|
*result = lresult;
|
|
|
|
}
|
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Convert string @nptr to an unsigned integer, and store it in @result.
|
|
|
|
*
|
|
|
|
* This is a wrapper around strtoul() that is harder to misuse.
|
|
|
|
* Semantics of @nptr, @endptr, @base match strtoul() with differences
|
|
|
|
* noted below.
|
|
|
|
*
|
|
|
|
* @nptr may be null, and no conversion is performed then.
|
|
|
|
*
|
|
|
|
* If no conversion is performed, store @nptr in *@endptr and return
|
|
|
|
* -EINVAL.
|
|
|
|
*
|
|
|
|
* If @endptr is null, and the string isn't fully converted, return
|
|
|
|
* -EINVAL. This is the case when the pointer that would be stored in
|
|
|
|
* a non-null @endptr points to a character other than '\0'.
|
|
|
|
*
|
|
|
|
* If the conversion overflows @result, store UINT_MAX in @result,
|
|
|
|
* and return -ERANGE.
|
|
|
|
*
|
|
|
|
* Else store the converted value in @result, and return zero.
|
|
|
|
*
|
|
|
|
* Note that a number with a leading minus sign gets converted without
|
|
|
|
* the minus sign, checked for overflow (see above), then negated (in
|
|
|
|
* @result's type). This is exactly how strtoul() works.
|
|
|
|
*/
|
|
|
|
int qemu_strtoui(const char *nptr, const char **endptr, int base,
|
|
|
|
unsigned int *result)
|
|
|
|
{
|
|
|
|
char *ep;
|
|
|
|
long long lresult;
|
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2017-12-22 13:46:23 +01:00
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
lresult = strtoull(nptr, &ep, base);
|
|
|
|
|
|
|
|
/* Windows returns 1 for negative out-of-range values. */
|
|
|
|
if (errno == ERANGE) {
|
|
|
|
*result = -1;
|
|
|
|
} else {
|
|
|
|
if (lresult > UINT_MAX) {
|
|
|
|
*result = UINT_MAX;
|
|
|
|
errno = ERANGE;
|
|
|
|
} else if (lresult < INT_MIN) {
|
|
|
|
*result = UINT_MAX;
|
|
|
|
errno = ERANGE;
|
|
|
|
} else {
|
|
|
|
*result = lresult;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
|
|
|
}
|
|
|
|
|
2015-07-20 01:02:17 +02:00
|
|
|
/**
|
2017-02-21 21:13:49 +01:00
|
|
|
* Convert string @nptr to a long integer, and store it in @result.
|
2015-07-20 01:02:17 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* This is a wrapper around strtol() that is harder to misuse.
|
|
|
|
* Semantics of @nptr, @endptr, @base match strtol() with differences
|
|
|
|
* noted below.
|
2015-07-20 01:02:17 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* @nptr may be null, and no conversion is performed then.
|
2015-07-20 01:02:17 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* If no conversion is performed, store @nptr in *@endptr and return
|
|
|
|
* -EINVAL.
|
2015-07-20 01:02:17 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* If @endptr is null, and the string isn't fully converted, return
|
|
|
|
* -EINVAL. This is the case when the pointer that would be stored in
|
|
|
|
* a non-null @endptr points to a character other than '\0'.
|
|
|
|
*
|
|
|
|
* If the conversion overflows @result, store LONG_MAX in @result,
|
|
|
|
* and return -ERANGE.
|
|
|
|
*
|
|
|
|
* If the conversion underflows @result, store LONG_MIN in @result,
|
|
|
|
* and return -ERANGE.
|
|
|
|
*
|
|
|
|
* Else store the converted value in @result, and return zero.
|
2015-07-20 01:02:17 +02:00
|
|
|
*/
|
|
|
|
int qemu_strtol(const char *nptr, const char **endptr, int base,
|
|
|
|
long *result)
|
|
|
|
{
|
2017-02-21 21:13:51 +01:00
|
|
|
char *ep;
|
2017-02-21 21:13:52 +01:00
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2015-07-20 01:02:17 +02:00
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
return -EINVAL;
|
2015-07-20 01:02:17 +02:00
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
*result = strtol(nptr, &ep, base);
|
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
2015-07-20 01:02:17 +02:00
|
|
|
}
|
2015-07-20 01:02:18 +02:00
|
|
|
|
|
|
|
/**
|
2017-02-21 21:13:49 +01:00
|
|
|
* Convert string @nptr to an unsigned long, and store it in @result.
|
|
|
|
*
|
|
|
|
* This is a wrapper around strtoul() that is harder to misuse.
|
|
|
|
* Semantics of @nptr, @endptr, @base match strtoul() with differences
|
|
|
|
* noted below.
|
|
|
|
*
|
|
|
|
* @nptr may be null, and no conversion is performed then.
|
|
|
|
*
|
|
|
|
* If no conversion is performed, store @nptr in *@endptr and return
|
|
|
|
* -EINVAL.
|
|
|
|
*
|
|
|
|
* If @endptr is null, and the string isn't fully converted, return
|
|
|
|
* -EINVAL. This is the case when the pointer that would be stored in
|
|
|
|
* a non-null @endptr points to a character other than '\0'.
|
2015-07-20 01:02:18 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* If the conversion overflows @result, store ULONG_MAX in @result,
|
|
|
|
* and return -ERANGE.
|
2015-07-20 01:02:18 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* Else store the converted value in @result, and return zero.
|
2015-07-20 01:02:18 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* Note that a number with a leading minus sign gets converted without
|
|
|
|
* the minus sign, checked for overflow (see above), then negated (in
|
|
|
|
* @result's type). This is exactly how strtoul() works.
|
2015-07-20 01:02:18 +02:00
|
|
|
*/
|
|
|
|
int qemu_strtoul(const char *nptr, const char **endptr, int base,
|
|
|
|
unsigned long *result)
|
|
|
|
{
|
2017-02-21 21:13:51 +01:00
|
|
|
char *ep;
|
2017-02-21 21:13:52 +01:00
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2015-07-20 01:02:18 +02:00
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
*result = strtoul(nptr, &ep, base);
|
|
|
|
/* Windows returns 1 for negative out-of-range values. */
|
|
|
|
if (errno == ERANGE) {
|
|
|
|
*result = -1;
|
2015-07-20 01:02:18 +02:00
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
2015-07-20 01:02:18 +02:00
|
|
|
}
|
|
|
|
|
2015-07-20 01:02:19 +02:00
|
|
|
/**
|
2017-02-21 21:13:49 +01:00
|
|
|
* Convert string @nptr to an int64_t.
|
2015-07-20 01:02:19 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* Works like qemu_strtol(), except it stores INT64_MAX on overflow,
|
2019-11-25 14:38:45 +01:00
|
|
|
* and INT64_MIN on underflow.
|
2015-07-20 01:02:19 +02:00
|
|
|
*/
|
2017-02-21 21:13:50 +01:00
|
|
|
int qemu_strtoi64(const char *nptr, const char **endptr, int base,
|
2015-07-20 01:02:19 +02:00
|
|
|
int64_t *result)
|
|
|
|
{
|
2017-02-21 21:13:51 +01:00
|
|
|
char *ep;
|
2017-02-21 21:13:52 +01:00
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2015-07-20 01:02:19 +02:00
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
return -EINVAL;
|
2015-07-20 01:02:19 +02:00
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
|
2019-11-25 14:38:45 +01:00
|
|
|
/* This assumes int64_t is long long TODO relax */
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(int64_t) != sizeof(long long));
|
2017-02-21 21:13:52 +01:00
|
|
|
errno = 0;
|
|
|
|
*result = strtoll(nptr, &ep, base);
|
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
2015-07-20 01:02:19 +02:00
|
|
|
}
|
|
|
|
|
2015-07-20 01:02:20 +02:00
|
|
|
/**
|
2017-02-21 21:13:49 +01:00
|
|
|
* Convert string @nptr to an uint64_t.
|
2015-07-20 01:02:20 +02:00
|
|
|
*
|
2017-02-21 21:13:49 +01:00
|
|
|
* Works like qemu_strtoul(), except it stores UINT64_MAX on overflow.
|
2015-07-20 01:02:20 +02:00
|
|
|
*/
|
2017-02-21 21:13:50 +01:00
|
|
|
int qemu_strtou64(const char *nptr, const char **endptr, int base,
|
2015-07-20 01:02:20 +02:00
|
|
|
uint64_t *result)
|
|
|
|
{
|
2017-02-21 21:13:51 +01:00
|
|
|
char *ep;
|
2017-02-21 21:13:52 +01:00
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2015-07-20 01:02:20 +02:00
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2019-11-25 14:38:45 +01:00
|
|
|
/* This assumes uint64_t is unsigned long long TODO relax */
|
|
|
|
QEMU_BUILD_BUG_ON(sizeof(uint64_t) != sizeof(unsigned long long));
|
2017-02-21 21:13:52 +01:00
|
|
|
errno = 0;
|
|
|
|
*result = strtoull(nptr, &ep, base);
|
|
|
|
/* Windows returns 1 for negative out-of-range values. */
|
|
|
|
if (errno == ERANGE) {
|
|
|
|
*result = -1;
|
2015-07-20 01:02:20 +02:00
|
|
|
}
|
2017-02-21 21:13:52 +01:00
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
2015-07-20 01:02:20 +02:00
|
|
|
}
|
|
|
|
|
2018-11-21 17:44:13 +01:00
|
|
|
/**
|
|
|
|
* Convert string @nptr to a double.
|
|
|
|
*
|
|
|
|
* This is a wrapper around strtod() that is harder to misuse.
|
|
|
|
* Semantics of @nptr and @endptr match strtod() with differences
|
|
|
|
* noted below.
|
|
|
|
*
|
|
|
|
* @nptr may be null, and no conversion is performed then.
|
|
|
|
*
|
|
|
|
* If no conversion is performed, store @nptr in *@endptr and return
|
|
|
|
* -EINVAL.
|
|
|
|
*
|
|
|
|
* If @endptr is null, and the string isn't fully converted, return
|
|
|
|
* -EINVAL. This is the case when the pointer that would be stored in
|
|
|
|
* a non-null @endptr points to a character other than '\0'.
|
|
|
|
*
|
|
|
|
* If the conversion overflows, store +/-HUGE_VAL in @result, depending
|
|
|
|
* on the sign, and return -ERANGE.
|
|
|
|
*
|
|
|
|
* If the conversion underflows, store +/-0.0 in @result, depending on the
|
|
|
|
* sign, and return -ERANGE.
|
|
|
|
*
|
|
|
|
* Else store the converted value in @result, and return zero.
|
|
|
|
*/
|
|
|
|
int qemu_strtod(const char *nptr, const char **endptr, double *result)
|
|
|
|
{
|
|
|
|
char *ep;
|
|
|
|
|
|
|
|
if (!nptr) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
*result = strtod(nptr, &ep);
|
|
|
|
return check_strtox_error(nptr, ep, endptr, errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Convert string @nptr to a finite double.
|
|
|
|
*
|
|
|
|
* Works like qemu_strtod(), except that "NaN" and "inf" are rejected
|
|
|
|
* with -EINVAL and no conversion is performed.
|
|
|
|
*/
|
|
|
|
int qemu_strtod_finite(const char *nptr, const char **endptr, double *result)
|
|
|
|
{
|
|
|
|
double tmp;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = qemu_strtod(nptr, endptr, &tmp);
|
|
|
|
if (!ret && !isfinite(tmp)) {
|
|
|
|
if (endptr) {
|
|
|
|
*endptr = nptr;
|
|
|
|
}
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret != -EINVAL) {
|
|
|
|
*result = tmp;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-06-29 12:32:10 +02:00
|
|
|
/**
|
|
|
|
* Searches for the first occurrence of 'c' in 's', and returns a pointer
|
|
|
|
* to the trailing null byte if none was found.
|
|
|
|
*/
|
|
|
|
#ifndef HAVE_STRCHRNUL
|
|
|
|
const char *qemu_strchrnul(const char *s, int c)
|
|
|
|
{
|
|
|
|
const char *e = strchr(s, c);
|
|
|
|
if (!e) {
|
|
|
|
e = s + strlen(s);
|
|
|
|
}
|
|
|
|
return e;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-02-04 19:27:45 +01:00
|
|
|
/**
|
|
|
|
* parse_uint:
|
|
|
|
*
|
|
|
|
* @s: String to parse
|
|
|
|
* @value: Destination for parsed integer value
|
|
|
|
* @endptr: Destination for pointer to first character not consumed
|
|
|
|
* @base: integer base, between 2 and 36 inclusive, or 0
|
|
|
|
*
|
|
|
|
* Parse unsigned integer
|
|
|
|
*
|
|
|
|
* Parsed syntax is like strtoull()'s: arbitrary whitespace, a single optional
|
|
|
|
* '+' or '-', an optional "0x" if @base is 0 or 16, one or more digits.
|
|
|
|
*
|
|
|
|
* If @s is null, or @base is invalid, or @s doesn't start with an
|
|
|
|
* integer in the syntax above, set *@value to 0, *@endptr to @s, and
|
|
|
|
* return -EINVAL.
|
|
|
|
*
|
|
|
|
* Set *@endptr to point right beyond the parsed integer (even if the integer
|
|
|
|
* overflows or is negative, all digits will be parsed and *@endptr will
|
|
|
|
* point right beyond them).
|
|
|
|
*
|
|
|
|
* If the integer is negative, set *@value to 0, and return -ERANGE.
|
|
|
|
*
|
|
|
|
* If the integer overflows unsigned long long, set *@value to
|
|
|
|
* ULLONG_MAX, and return -ERANGE.
|
|
|
|
*
|
|
|
|
* Else, set *@value to the parsed integer, and return 0.
|
|
|
|
*/
|
|
|
|
int parse_uint(const char *s, unsigned long long *value, char **endptr,
|
|
|
|
int base)
|
|
|
|
{
|
|
|
|
int r = 0;
|
|
|
|
char *endp = (char *)s;
|
|
|
|
unsigned long long val = 0;
|
|
|
|
|
2018-12-06 16:18:56 +01:00
|
|
|
assert((unsigned) base <= 36 && base != 1);
|
2013-02-04 19:27:45 +01:00
|
|
|
if (!s) {
|
|
|
|
r = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
val = strtoull(s, &endp, base);
|
|
|
|
if (errno) {
|
|
|
|
r = -errno;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (endp == s) {
|
|
|
|
r = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* make sure we reject negative numbers: */
|
2019-05-14 20:03:11 +02:00
|
|
|
while (qemu_isspace(*s)) {
|
2013-02-04 19:27:45 +01:00
|
|
|
s++;
|
|
|
|
}
|
|
|
|
if (*s == '-') {
|
|
|
|
val = 0;
|
|
|
|
r = -ERANGE;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
*value = val;
|
|
|
|
*endptr = endp;
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* parse_uint_full:
|
|
|
|
*
|
|
|
|
* @s: String to parse
|
|
|
|
* @value: Destination for parsed integer value
|
|
|
|
* @base: integer base, between 2 and 36 inclusive, or 0
|
|
|
|
*
|
|
|
|
* Parse unsigned integer from entire string
|
|
|
|
*
|
|
|
|
* Have the same behavior of parse_uint(), but with an additional check
|
|
|
|
* for additional data after the parsed number. If extra characters are present
|
|
|
|
* after the parsed number, the function will return -EINVAL, and *@v will
|
|
|
|
* be set to 0.
|
|
|
|
*/
|
|
|
|
int parse_uint_full(const char *s, unsigned long long *value, int base)
|
|
|
|
{
|
|
|
|
char *endp;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
r = parse_uint(s, value, &endp, base);
|
|
|
|
if (r < 0) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
if (*endp) {
|
|
|
|
*value = 0;
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-09-28 12:41:32 +02:00
|
|
|
int qemu_parse_fd(const char *param)
|
|
|
|
{
|
2014-04-10 10:24:30 +02:00
|
|
|
long fd;
|
|
|
|
char *endptr;
|
2011-09-28 12:41:32 +02:00
|
|
|
|
2014-04-10 10:24:30 +02:00
|
|
|
errno = 0;
|
2011-09-28 12:41:32 +02:00
|
|
|
fd = strtol(param, &endptr, 10);
|
2014-04-10 10:24:30 +02:00
|
|
|
if (param == endptr /* no conversion performed */ ||
|
|
|
|
errno != 0 /* not representable as long; possibly others */ ||
|
|
|
|
*endptr != '\0' /* final string not empty */ ||
|
|
|
|
fd < 0 /* invalid as file descriptor */ ||
|
|
|
|
fd > INT_MAX /* not representable as int */) {
|
2011-09-28 12:41:32 +02:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return fd;
|
|
|
|
}
|
2012-08-06 20:42:50 +02:00
|
|
|
|
2012-08-06 20:42:51 +02:00
|
|
|
/*
|
|
|
|
* Implementation of ULEB128 (http://en.wikipedia.org/wiki/LEB128)
|
|
|
|
* Input is limited to 14-bit numbers
|
|
|
|
*/
|
|
|
|
int uleb128_encode_small(uint8_t *out, uint32_t n)
|
|
|
|
{
|
|
|
|
g_assert(n <= 0x3fff);
|
|
|
|
if (n < 0x80) {
|
2019-06-10 05:08:51 +02:00
|
|
|
*out = n;
|
2012-08-06 20:42:51 +02:00
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
*out++ = (n & 0x7f) | 0x80;
|
2019-06-10 05:08:51 +02:00
|
|
|
*out = n >> 7;
|
2012-08-06 20:42:51 +02:00
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int uleb128_decode_small(const uint8_t *in, uint32_t *n)
|
|
|
|
{
|
|
|
|
if (!(*in & 0x80)) {
|
2019-06-10 05:08:51 +02:00
|
|
|
*n = *in;
|
2012-08-06 20:42:51 +02:00
|
|
|
return 1;
|
|
|
|
} else {
|
|
|
|
*n = *in++ & 0x7f;
|
|
|
|
/* we exceed 14 bit number */
|
|
|
|
if (*in & 0x80) {
|
|
|
|
return -1;
|
|
|
|
}
|
2019-06-10 05:08:51 +02:00
|
|
|
*n |= *in << 7;
|
2012-08-06 20:42:51 +02:00
|
|
|
return 2;
|
|
|
|
}
|
|
|
|
}
|
2013-03-04 17:41:28 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* helper to parse debug environment variables
|
|
|
|
*/
|
|
|
|
int parse_debug_env(const char *name, int max, int initial)
|
|
|
|
{
|
|
|
|
char *debug_env = getenv(name);
|
|
|
|
char *inv = NULL;
|
2015-02-11 12:30:43 +01:00
|
|
|
long debug;
|
2013-03-04 17:41:28 +01:00
|
|
|
|
|
|
|
if (!debug_env) {
|
|
|
|
return initial;
|
|
|
|
}
|
2015-02-11 12:30:43 +01:00
|
|
|
errno = 0;
|
2013-03-04 17:41:28 +01:00
|
|
|
debug = strtol(debug_env, &inv, 10);
|
|
|
|
if (inv == debug_env) {
|
|
|
|
return initial;
|
|
|
|
}
|
2015-02-11 12:30:43 +01:00
|
|
|
if (debug < 0 || debug > max || errno != 0) {
|
2017-08-18 20:47:35 +02:00
|
|
|
warn_report("%s not in [0, %d]", name, max);
|
2013-03-04 17:41:28 +01:00
|
|
|
return initial;
|
|
|
|
}
|
|
|
|
return debug;
|
|
|
|
}
|
2014-03-11 00:42:26 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Helper to print ethernet mac address
|
|
|
|
*/
|
|
|
|
const char *qemu_ether_ntoa(const MACAddr *mac)
|
|
|
|
{
|
|
|
|
static char ret[18];
|
|
|
|
|
|
|
|
snprintf(ret, sizeof(ret), "%02x:%02x:%02x:%02x:%02x:%02x",
|
|
|
|
mac->a[0], mac->a[1], mac->a[2], mac->a[3], mac->a[4], mac->a[5]);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2017-05-12 06:17:40 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Return human readable string for size @val.
|
|
|
|
* @val can be anything that uint64_t allows (no more than "16 EiB").
|
|
|
|
* Use IEC binary units like KiB, MiB, and so forth.
|
|
|
|
* Caller is responsible for passing it to g_free().
|
|
|
|
*/
|
|
|
|
char *size_to_str(uint64_t val)
|
|
|
|
{
|
|
|
|
static const char *suffixes[] = { "", "Ki", "Mi", "Gi", "Ti", "Pi", "Ei" };
|
2019-04-17 19:11:00 +02:00
|
|
|
uint64_t div;
|
2017-05-12 06:17:40 +02:00
|
|
|
int i;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The exponent (returned in i) minus one gives us
|
|
|
|
* floor(log2(val * 1024 / 1000). The correction makes us
|
|
|
|
* switch to the higher power when the integer part is >= 1000.
|
|
|
|
* (see e41b509d68afb1f for more info)
|
|
|
|
*/
|
|
|
|
frexp(val / (1000.0 / 1024.0), &i);
|
|
|
|
i = (i - 1) / 10;
|
|
|
|
div = 1ULL << (i * 10);
|
|
|
|
|
|
|
|
return g_strdup_printf("%0.3g %sB", (double)val / div, suffixes[i]);
|
|
|
|
}
|
2018-09-07 08:44:33 +02:00
|
|
|
|
|
|
|
int qemu_pstrcmp0(const char **str1, const char **str2)
|
|
|
|
{
|
|
|
|
return g_strcmp0(*str1, *str2);
|
|
|
|
}
|