-------- Original Message --------
Subject: Re: [PATCH v2] btrfs-progs: Improve the parse_size() error message.
From: David Sterba <dste...@suse.cz>
To: Qu Wenruo <quwen...@cn.fujitsu.com>
Date: 2014年06月12日 18:15
On Thu, May 29, 2014 at 09:42:11AM +0800, Qu Wenruo wrote:
When using parse_size(), even non-numeric value is passed, it will only
give error message "ERROR: size value is empty", which is quite
confusing for end users.

This patch will introduce more meaningful error message for the
following new cases
1) Invalid size string (non-numeric string)
2) Minus size value (like "-1K")

Also this patch will take full use of endptr returned by strtoll() to
reduce unneeded loop.

Signed-off-by: Qu Wenruo <quwen...@cn.fujitsu.com>
---
  utils.c | 56 +++++++++++++++++++++++++++++++++++++++-----------------
  1 file changed, 39 insertions(+), 17 deletions(-)

diff --git a/utils.c b/utils.c
index 392c5cf..499f08f 100644
--- a/utils.c
+++ b/utils.c
@@ -1612,18 +1612,45 @@ scan_again:
u64 parse_size(char *s)
  {
-       int i;
        char c;
+       char *endptr;
        u64 mult = 1;
+       long long int signed_ret;
+       u64 ret;
- for (i = 0; s && s[i] && isdigit(s[i]); i++) ;
-       if (!i) {
-               fprintf(stderr, "ERROR: size value is empty\n");
-               exit(50);
+       if (!s) {
+               fprintf(stderr, "ERROR: Size value is empty\n");
+               exit(1);
We never pass a NULL pointer to parse_size so this check will be always
false. Previously it verified that there are at least some digits.
Command like 'mkfs.btrfs -b /dev/sda' *WILL* pass NULL pointer to parse_size(), so the check is needed.


        }
-
-       if (s[i]) {
-               c = tolower(s[i]);
+       signed_ret = strtoll(s, &endptr, 10);
+       if (endptr == s) {
+               fprintf(stderr, "ERROR: Size value '%s' is invalid\n", s);
+               exit(1);
+       }
+       if (endptr[0] && endptr[1]) {
+               fprintf(stderr, "ERROR: Illegal suffix contains character '%c' in 
wrong position\n",
+                       endptr[1]);
+               exit(1);
+       }
+       if (signed_ret <= 0) {
+               fprintf(stderr,
+                       "ERROR: Size value '%s' is less equal than 0\n", s);
+               exit(1);
+       }
+       /* strtoll returns LLONG_MAX when overflow, if this happens,
+        * need to call strtoull to get the real size */
+       if (errno == ERANGE && signed_ret == LLONG_MAX) {
+               ret = strtoull(s, NULL, 10);
Why do you parse the number twice? Negative sizes are currently not used
so you can reject them.
I will change the patch to judgement leading '-' and reject the value.

+               if (errno == ERANGE && ret == ULLONG_MAX) {
+                       fprintf(stderr,
+                               "ERROR: Size value '%s' is too large for u64\n",
+                               s);
+                       exit(1);
+               }
+       } else
+               ret = signed_ret;
+       if (endptr[0]) {
+               c = tolower(endptr[0]);
                switch (c) {
                case 'e':
                        mult *= 1024;
@@ -1646,18 +1673,13 @@ u64 parse_size(char *s)
                case 'b':
                        break;
                default:
-                       fprintf(stderr, "ERROR: Unknown size descriptor "
-                               "'%c'\n", c);
+                       fprintf(stderr, "ERROR: Unknown size descriptor 
'%c'\n", c);
                        exit(1);
                }
        }
-       if (s[i] && s[i+1]) {
-               fprintf(stderr, "ERROR: Illegal suffix contains "
-                       "character '%c' in wrong position\n",
-                       s[i+1]);
-               exit(51);
-       }
-       return strtoull(s, NULL, 10) * mult;
+
+       ret *= mult;
Although there was no overflow check before, I think it should be here.
Eg. 12345678P is a valid size string but the result does not fit u64.
Right, I will check the overflow here.

Thanks,
Qu

+       return ret;
  }

--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to