xref: /aosp_15_r20/external/cronet/base/strings/safe_sprintf.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker // Copyright 2013 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker 
5*6777b538SAndroid Build Coastguard Worker #include "base/strings/safe_sprintf.h"
6*6777b538SAndroid Build Coastguard Worker 
7*6777b538SAndroid Build Coastguard Worker #include <errno.h>
8*6777b538SAndroid Build Coastguard Worker #include <string.h>
9*6777b538SAndroid Build Coastguard Worker 
10*6777b538SAndroid Build Coastguard Worker #include <algorithm>
11*6777b538SAndroid Build Coastguard Worker #include <limits>
12*6777b538SAndroid Build Coastguard Worker 
13*6777b538SAndroid Build Coastguard Worker #include "base/memory/raw_ptr.h"
14*6777b538SAndroid Build Coastguard Worker #include "build/build_config.h"
15*6777b538SAndroid Build Coastguard Worker 
16*6777b538SAndroid Build Coastguard Worker #if !defined(NDEBUG)
17*6777b538SAndroid Build Coastguard Worker // In debug builds, we use RAW_CHECK() to print useful error messages, if
18*6777b538SAndroid Build Coastguard Worker // SafeSPrintf() is called with broken arguments.
19*6777b538SAndroid Build Coastguard Worker // As our contract promises that SafeSPrintf() can be called from any
20*6777b538SAndroid Build Coastguard Worker // restricted run-time context, it is not actually safe to call logging
21*6777b538SAndroid Build Coastguard Worker // functions from it; and we only ever do so for debug builds and hope for the
22*6777b538SAndroid Build Coastguard Worker // best. We should _never_ call any logging function other than RAW_CHECK(),
23*6777b538SAndroid Build Coastguard Worker // and we should _never_ include any logging code that is active in production
24*6777b538SAndroid Build Coastguard Worker // builds. Most notably, we should not include these logging functions in
25*6777b538SAndroid Build Coastguard Worker // unofficial release builds, even though those builds would otherwise have
26*6777b538SAndroid Build Coastguard Worker // DCHECKS() enabled.
27*6777b538SAndroid Build Coastguard Worker // In other words; please do not remove the #ifdef around this #include.
28*6777b538SAndroid Build Coastguard Worker // Instead, in production builds we opt for returning a degraded result,
29*6777b538SAndroid Build Coastguard Worker // whenever an error is encountered.
30*6777b538SAndroid Build Coastguard Worker // E.g. The broken function call
31*6777b538SAndroid Build Coastguard Worker //        SafeSPrintf("errno = %d (%x)", errno, strerror(errno))
32*6777b538SAndroid Build Coastguard Worker //      will print something like
33*6777b538SAndroid Build Coastguard Worker //        errno = 13, (%x)
34*6777b538SAndroid Build Coastguard Worker //      instead of
35*6777b538SAndroid Build Coastguard Worker //        errno = 13 (Access denied)
36*6777b538SAndroid Build Coastguard Worker //      In most of the anticipated use cases, that's probably the preferred
37*6777b538SAndroid Build Coastguard Worker //      behavior.
38*6777b538SAndroid Build Coastguard Worker #include "base/check.h"
39*6777b538SAndroid Build Coastguard Worker #define DEBUG_CHECK RAW_CHECK
40*6777b538SAndroid Build Coastguard Worker #else
41*6777b538SAndroid Build Coastguard Worker #define DEBUG_CHECK(x) do { if (x) { } } while (0)
42*6777b538SAndroid Build Coastguard Worker #endif
43*6777b538SAndroid Build Coastguard Worker 
44*6777b538SAndroid Build Coastguard Worker namespace base {
45*6777b538SAndroid Build Coastguard Worker namespace strings {
46*6777b538SAndroid Build Coastguard Worker 
47*6777b538SAndroid Build Coastguard Worker // The code in this file is extremely careful to be async-signal-safe.
48*6777b538SAndroid Build Coastguard Worker //
49*6777b538SAndroid Build Coastguard Worker // Most obviously, we avoid calling any code that could dynamically allocate
50*6777b538SAndroid Build Coastguard Worker // memory. Doing so would almost certainly result in bugs and dead-locks.
51*6777b538SAndroid Build Coastguard Worker // We also avoid calling any other STL functions that could have unintended
52*6777b538SAndroid Build Coastguard Worker // side-effects involving memory allocation or access to other shared
53*6777b538SAndroid Build Coastguard Worker // resources.
54*6777b538SAndroid Build Coastguard Worker //
55*6777b538SAndroid Build Coastguard Worker // But on top of that, we also avoid calling other library functions, as many
56*6777b538SAndroid Build Coastguard Worker // of them have the side-effect of calling getenv() (in order to deal with
57*6777b538SAndroid Build Coastguard Worker // localization) or accessing errno. The latter sounds benign, but there are
58*6777b538SAndroid Build Coastguard Worker // several execution contexts where it isn't even possible to safely read let
59*6777b538SAndroid Build Coastguard Worker // alone write errno.
60*6777b538SAndroid Build Coastguard Worker //
61*6777b538SAndroid Build Coastguard Worker // The stated design goal of the SafeSPrintf() function is that it can be
62*6777b538SAndroid Build Coastguard Worker // called from any context that can safely call C or C++ code (i.e. anything
63*6777b538SAndroid Build Coastguard Worker // that doesn't require assembly code).
64*6777b538SAndroid Build Coastguard Worker //
65*6777b538SAndroid Build Coastguard Worker // For a brief overview of some but not all of the issues with async-signal-
66*6777b538SAndroid Build Coastguard Worker // safety, refer to:
67*6777b538SAndroid Build Coastguard Worker // http://pubs.opengroup.org/onlinepubs/009695399/functions/xsh_chap02_04.html
68*6777b538SAndroid Build Coastguard Worker 
69*6777b538SAndroid Build Coastguard Worker namespace {
70*6777b538SAndroid Build Coastguard Worker const size_t kSSizeMaxConst = ((size_t)(ssize_t)-1) >> 1;
71*6777b538SAndroid Build Coastguard Worker 
72*6777b538SAndroid Build Coastguard Worker const char kUpCaseHexDigits[]   = "0123456789ABCDEF";
73*6777b538SAndroid Build Coastguard Worker const char kDownCaseHexDigits[] = "0123456789abcdef";
74*6777b538SAndroid Build Coastguard Worker }
75*6777b538SAndroid Build Coastguard Worker 
76*6777b538SAndroid Build Coastguard Worker #if defined(NDEBUG)
77*6777b538SAndroid Build Coastguard Worker // We would like to define kSSizeMax as std::numeric_limits<ssize_t>::max(),
78*6777b538SAndroid Build Coastguard Worker // but C++ doesn't allow us to do that for constants. Instead, we have to
79*6777b538SAndroid Build Coastguard Worker // use careful casting and shifting. We later use a static_assert to
80*6777b538SAndroid Build Coastguard Worker // verify that this worked correctly.
81*6777b538SAndroid Build Coastguard Worker namespace {
82*6777b538SAndroid Build Coastguard Worker const size_t kSSizeMax = kSSizeMaxConst;
83*6777b538SAndroid Build Coastguard Worker }
84*6777b538SAndroid Build Coastguard Worker #else  // defined(NDEBUG)
85*6777b538SAndroid Build Coastguard Worker // For efficiency, we really need kSSizeMax to be a constant. But for unit
86*6777b538SAndroid Build Coastguard Worker // tests, it should be adjustable. This allows us to verify edge cases without
87*6777b538SAndroid Build Coastguard Worker // having to fill the entire available address space. As a compromise, we make
88*6777b538SAndroid Build Coastguard Worker // kSSizeMax adjustable in debug builds, and then only compile that particular
89*6777b538SAndroid Build Coastguard Worker // part of the unit test in debug builds.
90*6777b538SAndroid Build Coastguard Worker namespace {
91*6777b538SAndroid Build Coastguard Worker static size_t kSSizeMax = kSSizeMaxConst;
92*6777b538SAndroid Build Coastguard Worker }
93*6777b538SAndroid Build Coastguard Worker 
94*6777b538SAndroid Build Coastguard Worker namespace internal {
SetSafeSPrintfSSizeMaxForTest(size_t max)95*6777b538SAndroid Build Coastguard Worker void SetSafeSPrintfSSizeMaxForTest(size_t max) {
96*6777b538SAndroid Build Coastguard Worker   kSSizeMax = max;
97*6777b538SAndroid Build Coastguard Worker }
98*6777b538SAndroid Build Coastguard Worker 
GetSafeSPrintfSSizeMaxForTest()99*6777b538SAndroid Build Coastguard Worker size_t GetSafeSPrintfSSizeMaxForTest() {
100*6777b538SAndroid Build Coastguard Worker   return kSSizeMax;
101*6777b538SAndroid Build Coastguard Worker }
102*6777b538SAndroid Build Coastguard Worker }
103*6777b538SAndroid Build Coastguard Worker #endif  // defined(NDEBUG)
104*6777b538SAndroid Build Coastguard Worker 
105*6777b538SAndroid Build Coastguard Worker namespace {
106*6777b538SAndroid Build Coastguard Worker class Buffer {
107*6777b538SAndroid Build Coastguard Worker  public:
108*6777b538SAndroid Build Coastguard Worker   // |buffer| is caller-allocated storage that SafeSPrintf() writes to. It
109*6777b538SAndroid Build Coastguard Worker   // has |size| bytes of writable storage. It is the caller's responsibility
110*6777b538SAndroid Build Coastguard Worker   // to ensure that the buffer is at least one byte in size, so that it fits
111*6777b538SAndroid Build Coastguard Worker   // the trailing NUL that will be added by the destructor. The buffer also
112*6777b538SAndroid Build Coastguard Worker   // must be smaller or equal to kSSizeMax in size.
Buffer(char * buffer,size_t size)113*6777b538SAndroid Build Coastguard Worker   Buffer(char* buffer, size_t size)
114*6777b538SAndroid Build Coastguard Worker       : buffer_(buffer),
115*6777b538SAndroid Build Coastguard Worker         size_(size - 1),  // Account for trailing NUL byte
116*6777b538SAndroid Build Coastguard Worker         count_(0) {
117*6777b538SAndroid Build Coastguard Worker // MSVS2013's standard library doesn't mark max() as constexpr yet. cl.exe
118*6777b538SAndroid Build Coastguard Worker // supports static_cast but doesn't really implement constexpr yet so it doesn't
119*6777b538SAndroid Build Coastguard Worker // complain, but clang does.
120*6777b538SAndroid Build Coastguard Worker #if __cplusplus >= 201103 && !(defined(__clang__) && BUILDFLAG(IS_WIN))
121*6777b538SAndroid Build Coastguard Worker     static_assert(kSSizeMaxConst ==
122*6777b538SAndroid Build Coastguard Worker                       static_cast<size_t>(std::numeric_limits<ssize_t>::max()),
123*6777b538SAndroid Build Coastguard Worker                   "kSSizeMaxConst should be the max value of an ssize_t");
124*6777b538SAndroid Build Coastguard Worker #endif
125*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(size > 0);
126*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(size <= kSSizeMax);
127*6777b538SAndroid Build Coastguard Worker   }
128*6777b538SAndroid Build Coastguard Worker 
129*6777b538SAndroid Build Coastguard Worker   Buffer(const Buffer&) = delete;
130*6777b538SAndroid Build Coastguard Worker   Buffer& operator=(const Buffer&) = delete;
131*6777b538SAndroid Build Coastguard Worker 
~Buffer()132*6777b538SAndroid Build Coastguard Worker   ~Buffer() {
133*6777b538SAndroid Build Coastguard Worker     // The code calling the constructor guaranteed that there was enough space
134*6777b538SAndroid Build Coastguard Worker     // to store a trailing NUL -- and in debug builds, we are actually
135*6777b538SAndroid Build Coastguard Worker     // verifying this with DEBUG_CHECK()s in the constructor. So, we can
136*6777b538SAndroid Build Coastguard Worker     // always unconditionally write the NUL byte in the destructor.  We do not
137*6777b538SAndroid Build Coastguard Worker     // need to adjust the count_, as SafeSPrintf() copies snprintf() in not
138*6777b538SAndroid Build Coastguard Worker     // including the NUL byte in its return code.
139*6777b538SAndroid Build Coastguard Worker     *GetInsertionPoint() = '\000';
140*6777b538SAndroid Build Coastguard Worker   }
141*6777b538SAndroid Build Coastguard Worker 
142*6777b538SAndroid Build Coastguard Worker   // Returns true, iff the buffer is filled all the way to |kSSizeMax-1|. The
143*6777b538SAndroid Build Coastguard Worker   // caller can now stop adding more data, as GetCount() has reached its
144*6777b538SAndroid Build Coastguard Worker   // maximum possible value.
OutOfAddressableSpace() const145*6777b538SAndroid Build Coastguard Worker   inline bool OutOfAddressableSpace() const {
146*6777b538SAndroid Build Coastguard Worker     return count_ == static_cast<size_t>(kSSizeMax - 1);
147*6777b538SAndroid Build Coastguard Worker   }
148*6777b538SAndroid Build Coastguard Worker 
149*6777b538SAndroid Build Coastguard Worker   // Returns the number of bytes that would have been emitted to |buffer_|
150*6777b538SAndroid Build Coastguard Worker   // if it was sized sufficiently large. This number can be larger than
151*6777b538SAndroid Build Coastguard Worker   // |size_|, if the caller provided an insufficiently large output buffer.
152*6777b538SAndroid Build Coastguard Worker   // But it will never be bigger than |kSSizeMax-1|.
GetCount() const153*6777b538SAndroid Build Coastguard Worker   inline ssize_t GetCount() const {
154*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(count_ < kSSizeMax);
155*6777b538SAndroid Build Coastguard Worker     return static_cast<ssize_t>(count_);
156*6777b538SAndroid Build Coastguard Worker   }
157*6777b538SAndroid Build Coastguard Worker 
158*6777b538SAndroid Build Coastguard Worker   // Emits one |ch| character into the |buffer_| and updates the |count_| of
159*6777b538SAndroid Build Coastguard Worker   // characters that are currently supposed to be in the buffer.
160*6777b538SAndroid Build Coastguard Worker   // Returns "false", iff the buffer was already full.
161*6777b538SAndroid Build Coastguard Worker   // N.B. |count_| increases even if no characters have been written. This is
162*6777b538SAndroid Build Coastguard Worker   // needed so that GetCount() can return the number of bytes that should
163*6777b538SAndroid Build Coastguard Worker   // have been allocated for the |buffer_|.
Out(char ch)164*6777b538SAndroid Build Coastguard Worker   inline bool Out(char ch) {
165*6777b538SAndroid Build Coastguard Worker     if (size_ >= 1 && count_ < size_) {
166*6777b538SAndroid Build Coastguard Worker       buffer_[count_] = ch;
167*6777b538SAndroid Build Coastguard Worker       return IncrementCountByOne();
168*6777b538SAndroid Build Coastguard Worker     }
169*6777b538SAndroid Build Coastguard Worker     // |count_| still needs to be updated, even if the buffer has been
170*6777b538SAndroid Build Coastguard Worker     // filled completely. This allows SafeSPrintf() to return the number of
171*6777b538SAndroid Build Coastguard Worker     // bytes that should have been emitted.
172*6777b538SAndroid Build Coastguard Worker     IncrementCountByOne();
173*6777b538SAndroid Build Coastguard Worker     return false;
174*6777b538SAndroid Build Coastguard Worker   }
175*6777b538SAndroid Build Coastguard Worker 
176*6777b538SAndroid Build Coastguard Worker   // Inserts |padding|-|len| bytes worth of padding into the |buffer_|.
177*6777b538SAndroid Build Coastguard Worker   // |count_| will also be incremented by the number of bytes that were meant
178*6777b538SAndroid Build Coastguard Worker   // to be emitted. The |pad| character is typically either a ' ' space
179*6777b538SAndroid Build Coastguard Worker   // or a '0' zero, but other non-NUL values are legal.
180*6777b538SAndroid Build Coastguard Worker   // Returns "false", iff the |buffer_| filled up (i.e. |count_|
181*6777b538SAndroid Build Coastguard Worker   // overflowed |size_|) at any time during padding.
Pad(char pad,size_t padding,size_t len)182*6777b538SAndroid Build Coastguard Worker   inline bool Pad(char pad, size_t padding, size_t len) {
183*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(pad);
184*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(padding <= kSSizeMax);
185*6777b538SAndroid Build Coastguard Worker     for (; padding > len; --padding) {
186*6777b538SAndroid Build Coastguard Worker       if (!Out(pad)) {
187*6777b538SAndroid Build Coastguard Worker         if (--padding) {
188*6777b538SAndroid Build Coastguard Worker           IncrementCount(padding-len);
189*6777b538SAndroid Build Coastguard Worker         }
190*6777b538SAndroid Build Coastguard Worker         return false;
191*6777b538SAndroid Build Coastguard Worker       }
192*6777b538SAndroid Build Coastguard Worker     }
193*6777b538SAndroid Build Coastguard Worker     return true;
194*6777b538SAndroid Build Coastguard Worker   }
195*6777b538SAndroid Build Coastguard Worker 
196*6777b538SAndroid Build Coastguard Worker   // POSIX doesn't define any async-signal-safe function for converting
197*6777b538SAndroid Build Coastguard Worker   // an integer to ASCII. Define our own version.
198*6777b538SAndroid Build Coastguard Worker   //
199*6777b538SAndroid Build Coastguard Worker   // This also gives us the ability to make the function a little more
200*6777b538SAndroid Build Coastguard Worker   // powerful and have it deal with |padding|, with truncation, and with
201*6777b538SAndroid Build Coastguard Worker   // predicting the length of the untruncated output.
202*6777b538SAndroid Build Coastguard Worker   //
203*6777b538SAndroid Build Coastguard Worker   // IToASCII() converts an integer |i| to ASCII.
204*6777b538SAndroid Build Coastguard Worker   //
205*6777b538SAndroid Build Coastguard Worker   // Unlike similar functions in the standard C library, it never appends a
206*6777b538SAndroid Build Coastguard Worker   // NUL character. This is left for the caller to do.
207*6777b538SAndroid Build Coastguard Worker   //
208*6777b538SAndroid Build Coastguard Worker   // While the function signature takes a signed int64_t, the code decides at
209*6777b538SAndroid Build Coastguard Worker   // run-time whether to treat the argument as signed (int64_t) or as unsigned
210*6777b538SAndroid Build Coastguard Worker   // (uint64_t) based on the value of |sign|.
211*6777b538SAndroid Build Coastguard Worker   //
212*6777b538SAndroid Build Coastguard Worker   // It supports |base|s 2 through 16. Only a |base| of 10 is allowed to have
213*6777b538SAndroid Build Coastguard Worker   // a |sign|. Otherwise, |i| is treated as unsigned.
214*6777b538SAndroid Build Coastguard Worker   //
215*6777b538SAndroid Build Coastguard Worker   // For bases larger than 10, |upcase| decides whether lower-case or upper-
216*6777b538SAndroid Build Coastguard Worker   // case letters should be used to designate digits greater than 10.
217*6777b538SAndroid Build Coastguard Worker   //
218*6777b538SAndroid Build Coastguard Worker   // Padding can be done with either '0' zeros or ' ' spaces. Padding has to
219*6777b538SAndroid Build Coastguard Worker   // be positive and will always be applied to the left of the output.
220*6777b538SAndroid Build Coastguard Worker   //
221*6777b538SAndroid Build Coastguard Worker   // Prepends a |prefix| to the number (e.g. "0x"). This prefix goes to
222*6777b538SAndroid Build Coastguard Worker   // the left of |padding|, if |pad| is '0'; and to the right of |padding|
223*6777b538SAndroid Build Coastguard Worker   // if |pad| is ' '.
224*6777b538SAndroid Build Coastguard Worker   //
225*6777b538SAndroid Build Coastguard Worker   // Returns "false", if the |buffer_| overflowed at any time.
226*6777b538SAndroid Build Coastguard Worker   bool IToASCII(bool sign,
227*6777b538SAndroid Build Coastguard Worker                 bool upcase,
228*6777b538SAndroid Build Coastguard Worker                 int64_t i,
229*6777b538SAndroid Build Coastguard Worker                 size_t base,
230*6777b538SAndroid Build Coastguard Worker                 char pad,
231*6777b538SAndroid Build Coastguard Worker                 size_t padding,
232*6777b538SAndroid Build Coastguard Worker                 const char* prefix);
233*6777b538SAndroid Build Coastguard Worker 
234*6777b538SAndroid Build Coastguard Worker  private:
235*6777b538SAndroid Build Coastguard Worker   // Increments |count_| by |inc| unless this would cause |count_| to
236*6777b538SAndroid Build Coastguard Worker   // overflow |kSSizeMax-1|. Returns "false", iff an overflow was detected;
237*6777b538SAndroid Build Coastguard Worker   // it then clamps |count_| to |kSSizeMax-1|.
IncrementCount(size_t inc)238*6777b538SAndroid Build Coastguard Worker   inline bool IncrementCount(size_t inc) {
239*6777b538SAndroid Build Coastguard Worker     // "inc" is either 1 or a "padding" value. Padding is clamped at
240*6777b538SAndroid Build Coastguard Worker     // run-time to at most kSSizeMax-1. So, we know that "inc" is always in
241*6777b538SAndroid Build Coastguard Worker     // the range 1..kSSizeMax-1.
242*6777b538SAndroid Build Coastguard Worker     // This allows us to compute "kSSizeMax - 1 - inc" without incurring any
243*6777b538SAndroid Build Coastguard Worker     // integer overflows.
244*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(inc <= kSSizeMax - 1);
245*6777b538SAndroid Build Coastguard Worker     if (count_ > kSSizeMax - 1 - inc) {
246*6777b538SAndroid Build Coastguard Worker       count_ = kSSizeMax - 1;
247*6777b538SAndroid Build Coastguard Worker       return false;
248*6777b538SAndroid Build Coastguard Worker     }
249*6777b538SAndroid Build Coastguard Worker     count_ += inc;
250*6777b538SAndroid Build Coastguard Worker     return true;
251*6777b538SAndroid Build Coastguard Worker   }
252*6777b538SAndroid Build Coastguard Worker 
253*6777b538SAndroid Build Coastguard Worker   // Convenience method for the common case of incrementing |count_| by one.
IncrementCountByOne()254*6777b538SAndroid Build Coastguard Worker   inline bool IncrementCountByOne() {
255*6777b538SAndroid Build Coastguard Worker     return IncrementCount(1);
256*6777b538SAndroid Build Coastguard Worker   }
257*6777b538SAndroid Build Coastguard Worker 
258*6777b538SAndroid Build Coastguard Worker   // Return the current insertion point into the buffer. This is typically
259*6777b538SAndroid Build Coastguard Worker   // at |buffer_| + |count_|, but could be before that if truncation
260*6777b538SAndroid Build Coastguard Worker   // happened. It always points to one byte past the last byte that was
261*6777b538SAndroid Build Coastguard Worker   // successfully placed into the |buffer_|.
GetInsertionPoint() const262*6777b538SAndroid Build Coastguard Worker   inline char* GetInsertionPoint() const {
263*6777b538SAndroid Build Coastguard Worker     size_t idx = count_;
264*6777b538SAndroid Build Coastguard Worker     if (idx > size_) {
265*6777b538SAndroid Build Coastguard Worker       idx = size_;
266*6777b538SAndroid Build Coastguard Worker     }
267*6777b538SAndroid Build Coastguard Worker     return buffer_ + idx;
268*6777b538SAndroid Build Coastguard Worker   }
269*6777b538SAndroid Build Coastguard Worker 
270*6777b538SAndroid Build Coastguard Worker   // User-provided buffer that will receive the fully formatted output string.
271*6777b538SAndroid Build Coastguard Worker   raw_ptr<char, AllowPtrArithmetic> buffer_;
272*6777b538SAndroid Build Coastguard Worker 
273*6777b538SAndroid Build Coastguard Worker   // Number of bytes that are available in the buffer excluding the trailing
274*6777b538SAndroid Build Coastguard Worker   // NUL byte that will be added by the destructor.
275*6777b538SAndroid Build Coastguard Worker   const size_t size_;
276*6777b538SAndroid Build Coastguard Worker 
277*6777b538SAndroid Build Coastguard Worker   // Number of bytes that would have been emitted to the buffer, if the buffer
278*6777b538SAndroid Build Coastguard Worker   // was sufficiently big. This number always excludes the trailing NUL byte
279*6777b538SAndroid Build Coastguard Worker   // and it is guaranteed to never grow bigger than kSSizeMax-1.
280*6777b538SAndroid Build Coastguard Worker   size_t count_;
281*6777b538SAndroid Build Coastguard Worker };
282*6777b538SAndroid Build Coastguard Worker 
IToASCII(bool sign,bool upcase,int64_t i,size_t base,char pad,size_t padding,const char * prefix)283*6777b538SAndroid Build Coastguard Worker bool Buffer::IToASCII(bool sign,
284*6777b538SAndroid Build Coastguard Worker                       bool upcase,
285*6777b538SAndroid Build Coastguard Worker                       int64_t i,
286*6777b538SAndroid Build Coastguard Worker                       size_t base,
287*6777b538SAndroid Build Coastguard Worker                       char pad,
288*6777b538SAndroid Build Coastguard Worker                       size_t padding,
289*6777b538SAndroid Build Coastguard Worker                       const char* prefix) {
290*6777b538SAndroid Build Coastguard Worker   // Sanity check for parameters. None of these should ever fail, but see
291*6777b538SAndroid Build Coastguard Worker   // above for the rationale why we can't call CHECK().
292*6777b538SAndroid Build Coastguard Worker   DEBUG_CHECK(base >= 2);
293*6777b538SAndroid Build Coastguard Worker   DEBUG_CHECK(base <= 16);
294*6777b538SAndroid Build Coastguard Worker   DEBUG_CHECK(!sign || base == 10);
295*6777b538SAndroid Build Coastguard Worker   DEBUG_CHECK(pad == '0' || pad == ' ');
296*6777b538SAndroid Build Coastguard Worker   DEBUG_CHECK(padding <= kSSizeMax);
297*6777b538SAndroid Build Coastguard Worker   DEBUG_CHECK(!(sign && prefix && *prefix));
298*6777b538SAndroid Build Coastguard Worker 
299*6777b538SAndroid Build Coastguard Worker   // Handle negative numbers, if the caller indicated that |i| should be
300*6777b538SAndroid Build Coastguard Worker   // treated as a signed number; otherwise treat |i| as unsigned (even if the
301*6777b538SAndroid Build Coastguard Worker   // MSB is set!)
302*6777b538SAndroid Build Coastguard Worker   // Details are tricky, because of limited data-types, but equivalent pseudo-
303*6777b538SAndroid Build Coastguard Worker   // code would look like:
304*6777b538SAndroid Build Coastguard Worker   //   if (sign && i < 0)
305*6777b538SAndroid Build Coastguard Worker   //     prefix = "-";
306*6777b538SAndroid Build Coastguard Worker   //   num = abs(i);
307*6777b538SAndroid Build Coastguard Worker   size_t minint = 0;
308*6777b538SAndroid Build Coastguard Worker   uint64_t num;
309*6777b538SAndroid Build Coastguard Worker   if (sign && i < 0) {
310*6777b538SAndroid Build Coastguard Worker     prefix = "-";
311*6777b538SAndroid Build Coastguard Worker 
312*6777b538SAndroid Build Coastguard Worker     // Turn our number positive.
313*6777b538SAndroid Build Coastguard Worker     if (i == std::numeric_limits<int64_t>::min()) {
314*6777b538SAndroid Build Coastguard Worker       // The most negative integer needs special treatment.
315*6777b538SAndroid Build Coastguard Worker       minint = 1;
316*6777b538SAndroid Build Coastguard Worker       num = static_cast<uint64_t>(-(i + 1));
317*6777b538SAndroid Build Coastguard Worker     } else {
318*6777b538SAndroid Build Coastguard Worker       // "Normal" negative numbers are easy.
319*6777b538SAndroid Build Coastguard Worker       num = static_cast<uint64_t>(-i);
320*6777b538SAndroid Build Coastguard Worker     }
321*6777b538SAndroid Build Coastguard Worker   } else {
322*6777b538SAndroid Build Coastguard Worker     num = static_cast<uint64_t>(i);
323*6777b538SAndroid Build Coastguard Worker   }
324*6777b538SAndroid Build Coastguard Worker 
325*6777b538SAndroid Build Coastguard Worker   // If padding with '0' zero, emit the prefix or '-' character now. Otherwise,
326*6777b538SAndroid Build Coastguard Worker   // make the prefix accessible in reverse order, so that we can later output
327*6777b538SAndroid Build Coastguard Worker   // it right between padding and the number.
328*6777b538SAndroid Build Coastguard Worker   // We cannot choose the easier approach of just reversing the number, as that
329*6777b538SAndroid Build Coastguard Worker   // fails in situations where we need to truncate numbers that have padding
330*6777b538SAndroid Build Coastguard Worker   // and/or prefixes.
331*6777b538SAndroid Build Coastguard Worker   const char* reverse_prefix = nullptr;
332*6777b538SAndroid Build Coastguard Worker   if (prefix && *prefix) {
333*6777b538SAndroid Build Coastguard Worker     if (pad == '0') {
334*6777b538SAndroid Build Coastguard Worker       while (*prefix) {
335*6777b538SAndroid Build Coastguard Worker         if (padding) {
336*6777b538SAndroid Build Coastguard Worker           --padding;
337*6777b538SAndroid Build Coastguard Worker         }
338*6777b538SAndroid Build Coastguard Worker         Out(*prefix++);
339*6777b538SAndroid Build Coastguard Worker       }
340*6777b538SAndroid Build Coastguard Worker       prefix = nullptr;
341*6777b538SAndroid Build Coastguard Worker     } else {
342*6777b538SAndroid Build Coastguard Worker       for (reverse_prefix = prefix; *reverse_prefix; ++reverse_prefix) {
343*6777b538SAndroid Build Coastguard Worker       }
344*6777b538SAndroid Build Coastguard Worker     }
345*6777b538SAndroid Build Coastguard Worker   } else
346*6777b538SAndroid Build Coastguard Worker     prefix = nullptr;
347*6777b538SAndroid Build Coastguard Worker   const size_t prefix_length = static_cast<size_t>(reverse_prefix - prefix);
348*6777b538SAndroid Build Coastguard Worker 
349*6777b538SAndroid Build Coastguard Worker   // Loop until we have converted the entire number. Output at least one
350*6777b538SAndroid Build Coastguard Worker   // character (i.e. '0').
351*6777b538SAndroid Build Coastguard Worker   size_t start = count_;
352*6777b538SAndroid Build Coastguard Worker   size_t discarded = 0;
353*6777b538SAndroid Build Coastguard Worker   bool started = false;
354*6777b538SAndroid Build Coastguard Worker   do {
355*6777b538SAndroid Build Coastguard Worker     // Make sure there is still enough space left in our output buffer.
356*6777b538SAndroid Build Coastguard Worker     if (count_ >= size_) {
357*6777b538SAndroid Build Coastguard Worker       if (start < size_) {
358*6777b538SAndroid Build Coastguard Worker         // It is rare that we need to output a partial number. But if asked
359*6777b538SAndroid Build Coastguard Worker         // to do so, we will still make sure we output the correct number of
360*6777b538SAndroid Build Coastguard Worker         // leading digits.
361*6777b538SAndroid Build Coastguard Worker         // Since we are generating the digits in reverse order, we actually
362*6777b538SAndroid Build Coastguard Worker         // have to discard digits in the order that we have already emitted
363*6777b538SAndroid Build Coastguard Worker         // them. This is essentially equivalent to:
364*6777b538SAndroid Build Coastguard Worker         //   memmove(buffer_ + start, buffer_ + start + 1, size_ - start - 1)
365*6777b538SAndroid Build Coastguard Worker         for (char* move = buffer_ + start, *end = buffer_ + size_ - 1;
366*6777b538SAndroid Build Coastguard Worker              move < end;
367*6777b538SAndroid Build Coastguard Worker              ++move) {
368*6777b538SAndroid Build Coastguard Worker           *move = move[1];
369*6777b538SAndroid Build Coastguard Worker         }
370*6777b538SAndroid Build Coastguard Worker         ++discarded;
371*6777b538SAndroid Build Coastguard Worker         --count_;
372*6777b538SAndroid Build Coastguard Worker       } else if (count_ - size_ > 1) {
373*6777b538SAndroid Build Coastguard Worker         // Need to increment either |count_| or |discarded| to make progress.
374*6777b538SAndroid Build Coastguard Worker         // The latter is more efficient, as it eventually triggers fast
375*6777b538SAndroid Build Coastguard Worker         // handling of padding. But we have to ensure we don't accidentally
376*6777b538SAndroid Build Coastguard Worker         // change the overall state (i.e. switch the state-machine from
377*6777b538SAndroid Build Coastguard Worker         // discarding to non-discarding). |count_| needs to always stay
378*6777b538SAndroid Build Coastguard Worker         // bigger than |size_|.
379*6777b538SAndroid Build Coastguard Worker         --count_;
380*6777b538SAndroid Build Coastguard Worker         ++discarded;
381*6777b538SAndroid Build Coastguard Worker       }
382*6777b538SAndroid Build Coastguard Worker     }
383*6777b538SAndroid Build Coastguard Worker 
384*6777b538SAndroid Build Coastguard Worker     // Output the next digit and (if necessary) compensate for the most
385*6777b538SAndroid Build Coastguard Worker     // negative integer needing special treatment. This works because,
386*6777b538SAndroid Build Coastguard Worker     // no matter the bit width of the integer, the lowest-most decimal
387*6777b538SAndroid Build Coastguard Worker     // integer always ends in 2, 4, 6, or 8.
388*6777b538SAndroid Build Coastguard Worker     if (!num && started) {
389*6777b538SAndroid Build Coastguard Worker       if (reverse_prefix > prefix) {
390*6777b538SAndroid Build Coastguard Worker         Out(*--reverse_prefix);
391*6777b538SAndroid Build Coastguard Worker       } else {
392*6777b538SAndroid Build Coastguard Worker         Out(pad);
393*6777b538SAndroid Build Coastguard Worker       }
394*6777b538SAndroid Build Coastguard Worker     } else {
395*6777b538SAndroid Build Coastguard Worker       started = true;
396*6777b538SAndroid Build Coastguard Worker       Out((upcase ? kUpCaseHexDigits
397*6777b538SAndroid Build Coastguard Worker                   : kDownCaseHexDigits)[num % base + minint]);
398*6777b538SAndroid Build Coastguard Worker     }
399*6777b538SAndroid Build Coastguard Worker 
400*6777b538SAndroid Build Coastguard Worker     minint = 0;
401*6777b538SAndroid Build Coastguard Worker     num /= base;
402*6777b538SAndroid Build Coastguard Worker 
403*6777b538SAndroid Build Coastguard Worker     // Add padding, if requested.
404*6777b538SAndroid Build Coastguard Worker     if (padding > 0) {
405*6777b538SAndroid Build Coastguard Worker       --padding;
406*6777b538SAndroid Build Coastguard Worker 
407*6777b538SAndroid Build Coastguard Worker       // Performance optimization for when we are asked to output excessive
408*6777b538SAndroid Build Coastguard Worker       // padding, but our output buffer is limited in size.  Even if we output
409*6777b538SAndroid Build Coastguard Worker       // a 64bit number in binary, we would never write more than 64 plus
410*6777b538SAndroid Build Coastguard Worker       // prefix non-padding characters. So, once this limit has been passed,
411*6777b538SAndroid Build Coastguard Worker       // any further state change can be computed arithmetically; we know that
412*6777b538SAndroid Build Coastguard Worker       // by this time, our entire final output consists of padding characters
413*6777b538SAndroid Build Coastguard Worker       // that have all already been output.
414*6777b538SAndroid Build Coastguard Worker       if (discarded > 8*sizeof(num) + prefix_length) {
415*6777b538SAndroid Build Coastguard Worker         IncrementCount(padding);
416*6777b538SAndroid Build Coastguard Worker         padding = 0;
417*6777b538SAndroid Build Coastguard Worker       }
418*6777b538SAndroid Build Coastguard Worker     }
419*6777b538SAndroid Build Coastguard Worker   } while (num || padding || (reverse_prefix > prefix));
420*6777b538SAndroid Build Coastguard Worker 
421*6777b538SAndroid Build Coastguard Worker   if (start < size_) {
422*6777b538SAndroid Build Coastguard Worker     // Conversion to ASCII actually resulted in the digits being in reverse
423*6777b538SAndroid Build Coastguard Worker     // order. We can't easily generate them in forward order, as we can't tell
424*6777b538SAndroid Build Coastguard Worker     // the number of characters needed until we are done converting.
425*6777b538SAndroid Build Coastguard Worker     // So, now, we reverse the string (except for the possible '-' sign).
426*6777b538SAndroid Build Coastguard Worker     char* front = buffer_ + start;
427*6777b538SAndroid Build Coastguard Worker     char* back = GetInsertionPoint();
428*6777b538SAndroid Build Coastguard Worker     while (--back > front) {
429*6777b538SAndroid Build Coastguard Worker       char ch = *back;
430*6777b538SAndroid Build Coastguard Worker       *back = *front;
431*6777b538SAndroid Build Coastguard Worker       *front++ = ch;
432*6777b538SAndroid Build Coastguard Worker     }
433*6777b538SAndroid Build Coastguard Worker   }
434*6777b538SAndroid Build Coastguard Worker   IncrementCount(discarded);
435*6777b538SAndroid Build Coastguard Worker   return !discarded;
436*6777b538SAndroid Build Coastguard Worker }
437*6777b538SAndroid Build Coastguard Worker 
438*6777b538SAndroid Build Coastguard Worker }  // anonymous namespace
439*6777b538SAndroid Build Coastguard Worker 
440*6777b538SAndroid Build Coastguard Worker namespace internal {
441*6777b538SAndroid Build Coastguard Worker 
SafeSNPrintf(char * buf,size_t sz,const char * fmt,const Arg * args,const size_t max_args)442*6777b538SAndroid Build Coastguard Worker ssize_t SafeSNPrintf(char* buf, size_t sz, const char* fmt, const Arg* args,
443*6777b538SAndroid Build Coastguard Worker                      const size_t max_args) {
444*6777b538SAndroid Build Coastguard Worker   // Make sure that at least one NUL byte can be written, and that the buffer
445*6777b538SAndroid Build Coastguard Worker   // never overflows kSSizeMax. Not only does that use up most or all of the
446*6777b538SAndroid Build Coastguard Worker   // address space, it also would result in a return code that cannot be
447*6777b538SAndroid Build Coastguard Worker   // represented.
448*6777b538SAndroid Build Coastguard Worker   if (static_cast<ssize_t>(sz) < 1)
449*6777b538SAndroid Build Coastguard Worker     return -1;
450*6777b538SAndroid Build Coastguard Worker   sz = std::min(sz, kSSizeMax);
451*6777b538SAndroid Build Coastguard Worker 
452*6777b538SAndroid Build Coastguard Worker   // Iterate over format string and interpret '%' arguments as they are
453*6777b538SAndroid Build Coastguard Worker   // encountered.
454*6777b538SAndroid Build Coastguard Worker   Buffer buffer(buf, sz);
455*6777b538SAndroid Build Coastguard Worker   size_t padding;
456*6777b538SAndroid Build Coastguard Worker   char pad;
457*6777b538SAndroid Build Coastguard Worker   for (unsigned int cur_arg = 0; *fmt && !buffer.OutOfAddressableSpace(); ) {
458*6777b538SAndroid Build Coastguard Worker     if (*fmt++ == '%') {
459*6777b538SAndroid Build Coastguard Worker       padding = 0;
460*6777b538SAndroid Build Coastguard Worker       pad = ' ';
461*6777b538SAndroid Build Coastguard Worker       char ch = *fmt++;
462*6777b538SAndroid Build Coastguard Worker     format_character_found:
463*6777b538SAndroid Build Coastguard Worker       switch (ch) {
464*6777b538SAndroid Build Coastguard Worker       case '0': case '1': case '2': case '3': case '4':
465*6777b538SAndroid Build Coastguard Worker       case '5': case '6': case '7': case '8': case '9':
466*6777b538SAndroid Build Coastguard Worker         // Found a width parameter. Convert to an integer value and store in
467*6777b538SAndroid Build Coastguard Worker         // "padding". If the leading digit is a zero, change the padding
468*6777b538SAndroid Build Coastguard Worker         // character from a space ' ' to a zero '0'.
469*6777b538SAndroid Build Coastguard Worker         pad = ch == '0' ? '0' : ' ';
470*6777b538SAndroid Build Coastguard Worker         for (;;) {
471*6777b538SAndroid Build Coastguard Worker           const size_t digit = static_cast<size_t>(ch - '0');
472*6777b538SAndroid Build Coastguard Worker           // The maximum allowed padding fills all the available address
473*6777b538SAndroid Build Coastguard Worker           // space and leaves just enough space to insert the trailing NUL.
474*6777b538SAndroid Build Coastguard Worker           const size_t max_padding = kSSizeMax - 1;
475*6777b538SAndroid Build Coastguard Worker           if (padding > max_padding / 10 ||
476*6777b538SAndroid Build Coastguard Worker               10 * padding > max_padding - digit) {
477*6777b538SAndroid Build Coastguard Worker             DEBUG_CHECK(padding <= max_padding / 10 &&
478*6777b538SAndroid Build Coastguard Worker                         10 * padding <= max_padding - digit);
479*6777b538SAndroid Build Coastguard Worker             // Integer overflow detected. Skip the rest of the width until
480*6777b538SAndroid Build Coastguard Worker             // we find the format character, then do the normal error handling.
481*6777b538SAndroid Build Coastguard Worker           padding_overflow:
482*6777b538SAndroid Build Coastguard Worker             padding = max_padding;
483*6777b538SAndroid Build Coastguard Worker             while ((ch = *fmt++) >= '0' && ch <= '9') {
484*6777b538SAndroid Build Coastguard Worker             }
485*6777b538SAndroid Build Coastguard Worker             if (cur_arg < max_args) {
486*6777b538SAndroid Build Coastguard Worker               ++cur_arg;
487*6777b538SAndroid Build Coastguard Worker             }
488*6777b538SAndroid Build Coastguard Worker             goto fail_to_expand;
489*6777b538SAndroid Build Coastguard Worker           }
490*6777b538SAndroid Build Coastguard Worker           padding = 10 * padding + digit;
491*6777b538SAndroid Build Coastguard Worker           if (padding > max_padding) {
492*6777b538SAndroid Build Coastguard Worker             // This doesn't happen for "sane" values of kSSizeMax. But once
493*6777b538SAndroid Build Coastguard Worker             // kSSizeMax gets smaller than about 10, our earlier range checks
494*6777b538SAndroid Build Coastguard Worker             // are incomplete. Unittests do trigger this artificial corner
495*6777b538SAndroid Build Coastguard Worker             // case.
496*6777b538SAndroid Build Coastguard Worker             DEBUG_CHECK(padding <= max_padding);
497*6777b538SAndroid Build Coastguard Worker             goto padding_overflow;
498*6777b538SAndroid Build Coastguard Worker           }
499*6777b538SAndroid Build Coastguard Worker           ch = *fmt++;
500*6777b538SAndroid Build Coastguard Worker           if (ch < '0' || ch > '9') {
501*6777b538SAndroid Build Coastguard Worker             // Reached the end of the width parameter. This is where the format
502*6777b538SAndroid Build Coastguard Worker             // character is found.
503*6777b538SAndroid Build Coastguard Worker             goto format_character_found;
504*6777b538SAndroid Build Coastguard Worker           }
505*6777b538SAndroid Build Coastguard Worker         }
506*6777b538SAndroid Build Coastguard Worker       case 'c': {  // Output an ASCII character.
507*6777b538SAndroid Build Coastguard Worker         // Check that there are arguments left to be inserted.
508*6777b538SAndroid Build Coastguard Worker         if (cur_arg >= max_args) {
509*6777b538SAndroid Build Coastguard Worker           DEBUG_CHECK(cur_arg < max_args);
510*6777b538SAndroid Build Coastguard Worker           goto fail_to_expand;
511*6777b538SAndroid Build Coastguard Worker         }
512*6777b538SAndroid Build Coastguard Worker 
513*6777b538SAndroid Build Coastguard Worker         // Check that the argument has the expected type.
514*6777b538SAndroid Build Coastguard Worker         const Arg& arg = args[cur_arg++];
515*6777b538SAndroid Build Coastguard Worker         if (arg.type != Arg::INT && arg.type != Arg::UINT) {
516*6777b538SAndroid Build Coastguard Worker           DEBUG_CHECK(arg.type == Arg::INT || arg.type == Arg::UINT);
517*6777b538SAndroid Build Coastguard Worker           goto fail_to_expand;
518*6777b538SAndroid Build Coastguard Worker         }
519*6777b538SAndroid Build Coastguard Worker 
520*6777b538SAndroid Build Coastguard Worker         // Apply padding, if needed.
521*6777b538SAndroid Build Coastguard Worker         buffer.Pad(' ', padding, 1);
522*6777b538SAndroid Build Coastguard Worker 
523*6777b538SAndroid Build Coastguard Worker         // Convert the argument to an ASCII character and output it.
524*6777b538SAndroid Build Coastguard Worker         char as_char = static_cast<char>(arg.integer.i);
525*6777b538SAndroid Build Coastguard Worker         if (!as_char) {
526*6777b538SAndroid Build Coastguard Worker           goto end_of_output_buffer;
527*6777b538SAndroid Build Coastguard Worker         }
528*6777b538SAndroid Build Coastguard Worker         buffer.Out(as_char);
529*6777b538SAndroid Build Coastguard Worker         break; }
530*6777b538SAndroid Build Coastguard Worker       case 'd':    // Output a possibly signed decimal value.
531*6777b538SAndroid Build Coastguard Worker       case 'o':    // Output an unsigned octal value.
532*6777b538SAndroid Build Coastguard Worker       case 'x':    // Output an unsigned hexadecimal value.
533*6777b538SAndroid Build Coastguard Worker       case 'X':
534*6777b538SAndroid Build Coastguard Worker       case 'p': {  // Output a pointer value.
535*6777b538SAndroid Build Coastguard Worker         // Check that there are arguments left to be inserted.
536*6777b538SAndroid Build Coastguard Worker         if (cur_arg >= max_args) {
537*6777b538SAndroid Build Coastguard Worker           DEBUG_CHECK(cur_arg < max_args);
538*6777b538SAndroid Build Coastguard Worker           goto fail_to_expand;
539*6777b538SAndroid Build Coastguard Worker         }
540*6777b538SAndroid Build Coastguard Worker 
541*6777b538SAndroid Build Coastguard Worker         const Arg& arg = args[cur_arg++];
542*6777b538SAndroid Build Coastguard Worker         int64_t i;
543*6777b538SAndroid Build Coastguard Worker         const char* prefix = nullptr;
544*6777b538SAndroid Build Coastguard Worker         if (ch != 'p') {
545*6777b538SAndroid Build Coastguard Worker           // Check that the argument has the expected type.
546*6777b538SAndroid Build Coastguard Worker           if (arg.type != Arg::INT && arg.type != Arg::UINT) {
547*6777b538SAndroid Build Coastguard Worker             DEBUG_CHECK(arg.type == Arg::INT || arg.type == Arg::UINT);
548*6777b538SAndroid Build Coastguard Worker             goto fail_to_expand;
549*6777b538SAndroid Build Coastguard Worker           }
550*6777b538SAndroid Build Coastguard Worker           i = arg.integer.i;
551*6777b538SAndroid Build Coastguard Worker 
552*6777b538SAndroid Build Coastguard Worker           if (ch != 'd') {
553*6777b538SAndroid Build Coastguard Worker             // The Arg() constructor automatically performed sign expansion on
554*6777b538SAndroid Build Coastguard Worker             // signed parameters. This is great when outputting a %d decimal
555*6777b538SAndroid Build Coastguard Worker             // number, but can result in unexpected leading 0xFF bytes when
556*6777b538SAndroid Build Coastguard Worker             // outputting a %x hexadecimal number. Mask bits, if necessary.
557*6777b538SAndroid Build Coastguard Worker             // We have to do this here, instead of in the Arg() constructor, as
558*6777b538SAndroid Build Coastguard Worker             // the Arg() constructor cannot tell whether we will output a %d
559*6777b538SAndroid Build Coastguard Worker             // or a %x. Only the latter should experience masking.
560*6777b538SAndroid Build Coastguard Worker             if (arg.integer.width < sizeof(int64_t)) {
561*6777b538SAndroid Build Coastguard Worker               i &= (1LL << (8*arg.integer.width)) - 1;
562*6777b538SAndroid Build Coastguard Worker             }
563*6777b538SAndroid Build Coastguard Worker           }
564*6777b538SAndroid Build Coastguard Worker         } else {
565*6777b538SAndroid Build Coastguard Worker           // Pointer values require an actual pointer or a string.
566*6777b538SAndroid Build Coastguard Worker           if (arg.type == Arg::POINTER) {
567*6777b538SAndroid Build Coastguard Worker             i = static_cast<int64_t>(reinterpret_cast<uintptr_t>(arg.ptr));
568*6777b538SAndroid Build Coastguard Worker           } else if (arg.type == Arg::STRING) {
569*6777b538SAndroid Build Coastguard Worker             i = static_cast<int64_t>(reinterpret_cast<uintptr_t>(arg.str));
570*6777b538SAndroid Build Coastguard Worker           } else if (arg.type == Arg::INT &&
571*6777b538SAndroid Build Coastguard Worker                      arg.integer.width == sizeof(NULL) &&
572*6777b538SAndroid Build Coastguard Worker                      arg.integer.i == 0) {  // Allow C++'s version of NULL
573*6777b538SAndroid Build Coastguard Worker             i = 0;
574*6777b538SAndroid Build Coastguard Worker           } else {
575*6777b538SAndroid Build Coastguard Worker             DEBUG_CHECK(arg.type == Arg::POINTER || arg.type == Arg::STRING);
576*6777b538SAndroid Build Coastguard Worker             goto fail_to_expand;
577*6777b538SAndroid Build Coastguard Worker           }
578*6777b538SAndroid Build Coastguard Worker 
579*6777b538SAndroid Build Coastguard Worker           // Pointers always include the "0x" prefix.
580*6777b538SAndroid Build Coastguard Worker           prefix = "0x";
581*6777b538SAndroid Build Coastguard Worker         }
582*6777b538SAndroid Build Coastguard Worker 
583*6777b538SAndroid Build Coastguard Worker         // Use IToASCII() to convert to ASCII representation. For decimal
584*6777b538SAndroid Build Coastguard Worker         // numbers, optionally print a sign. For hexadecimal numbers,
585*6777b538SAndroid Build Coastguard Worker         // distinguish between upper and lower case. %p addresses are always
586*6777b538SAndroid Build Coastguard Worker         // printed as upcase. Supports base 8, 10, and 16. Prints padding
587*6777b538SAndroid Build Coastguard Worker         // and/or prefixes, if so requested.
588*6777b538SAndroid Build Coastguard Worker         buffer.IToASCII(ch == 'd' && arg.type == Arg::INT,
589*6777b538SAndroid Build Coastguard Worker                         ch != 'x', i,
590*6777b538SAndroid Build Coastguard Worker                         ch == 'o' ? 8 : ch == 'd' ? 10 : 16,
591*6777b538SAndroid Build Coastguard Worker                         pad, padding, prefix);
592*6777b538SAndroid Build Coastguard Worker         break; }
593*6777b538SAndroid Build Coastguard Worker       case 's': {
594*6777b538SAndroid Build Coastguard Worker         // Check that there are arguments left to be inserted.
595*6777b538SAndroid Build Coastguard Worker         if (cur_arg >= max_args) {
596*6777b538SAndroid Build Coastguard Worker           DEBUG_CHECK(cur_arg < max_args);
597*6777b538SAndroid Build Coastguard Worker           goto fail_to_expand;
598*6777b538SAndroid Build Coastguard Worker         }
599*6777b538SAndroid Build Coastguard Worker 
600*6777b538SAndroid Build Coastguard Worker         // Check that the argument has the expected type.
601*6777b538SAndroid Build Coastguard Worker         const Arg& arg = args[cur_arg++];
602*6777b538SAndroid Build Coastguard Worker         const char *s;
603*6777b538SAndroid Build Coastguard Worker         if (arg.type == Arg::STRING) {
604*6777b538SAndroid Build Coastguard Worker           s = arg.str ? arg.str : "<NULL>";
605*6777b538SAndroid Build Coastguard Worker         } else if (arg.type == Arg::INT && arg.integer.width == sizeof(NULL) &&
606*6777b538SAndroid Build Coastguard Worker                    arg.integer.i == 0) {  // Allow C++'s version of NULL
607*6777b538SAndroid Build Coastguard Worker           s = "<NULL>";
608*6777b538SAndroid Build Coastguard Worker         } else {
609*6777b538SAndroid Build Coastguard Worker           DEBUG_CHECK(arg.type == Arg::STRING);
610*6777b538SAndroid Build Coastguard Worker           goto fail_to_expand;
611*6777b538SAndroid Build Coastguard Worker         }
612*6777b538SAndroid Build Coastguard Worker 
613*6777b538SAndroid Build Coastguard Worker         // Apply padding, if needed. This requires us to first check the
614*6777b538SAndroid Build Coastguard Worker         // length of the string that we are outputting.
615*6777b538SAndroid Build Coastguard Worker         if (padding) {
616*6777b538SAndroid Build Coastguard Worker           size_t len = 0;
617*6777b538SAndroid Build Coastguard Worker           for (const char* src = s; *src++; ) {
618*6777b538SAndroid Build Coastguard Worker             ++len;
619*6777b538SAndroid Build Coastguard Worker           }
620*6777b538SAndroid Build Coastguard Worker           buffer.Pad(' ', padding, len);
621*6777b538SAndroid Build Coastguard Worker         }
622*6777b538SAndroid Build Coastguard Worker 
623*6777b538SAndroid Build Coastguard Worker         // Printing a string involves nothing more than copying it into the
624*6777b538SAndroid Build Coastguard Worker         // output buffer and making sure we don't output more bytes than
625*6777b538SAndroid Build Coastguard Worker         // available space; Out() takes care of doing that.
626*6777b538SAndroid Build Coastguard Worker         for (const char* src = s; *src; ) {
627*6777b538SAndroid Build Coastguard Worker           buffer.Out(*src++);
628*6777b538SAndroid Build Coastguard Worker         }
629*6777b538SAndroid Build Coastguard Worker         break; }
630*6777b538SAndroid Build Coastguard Worker       case '%':
631*6777b538SAndroid Build Coastguard Worker         // Quoted percent '%' character.
632*6777b538SAndroid Build Coastguard Worker         goto copy_verbatim;
633*6777b538SAndroid Build Coastguard Worker       fail_to_expand:
634*6777b538SAndroid Build Coastguard Worker         // C++ gives us tools to do type checking -- something that snprintf()
635*6777b538SAndroid Build Coastguard Worker         // could never really do. So, whenever we see arguments that don't
636*6777b538SAndroid Build Coastguard Worker         // match up with the format string, we refuse to output them. But
637*6777b538SAndroid Build Coastguard Worker         // since we have to be extremely conservative about being async-
638*6777b538SAndroid Build Coastguard Worker         // signal-safe, we are limited in the type of error handling that we
639*6777b538SAndroid Build Coastguard Worker         // can do in production builds (in debug builds we can use
640*6777b538SAndroid Build Coastguard Worker         // DEBUG_CHECK() and hope for the best). So, all we do is pass the
641*6777b538SAndroid Build Coastguard Worker         // format string unchanged. That should eventually get the user's
642*6777b538SAndroid Build Coastguard Worker         // attention; and in the meantime, it hopefully doesn't lose too much
643*6777b538SAndroid Build Coastguard Worker         // data.
644*6777b538SAndroid Build Coastguard Worker       default:
645*6777b538SAndroid Build Coastguard Worker         // Unknown or unsupported format character. Just copy verbatim to
646*6777b538SAndroid Build Coastguard Worker         // output.
647*6777b538SAndroid Build Coastguard Worker         buffer.Out('%');
648*6777b538SAndroid Build Coastguard Worker         DEBUG_CHECK(ch);
649*6777b538SAndroid Build Coastguard Worker         if (!ch) {
650*6777b538SAndroid Build Coastguard Worker           goto end_of_format_string;
651*6777b538SAndroid Build Coastguard Worker         }
652*6777b538SAndroid Build Coastguard Worker         buffer.Out(ch);
653*6777b538SAndroid Build Coastguard Worker         break;
654*6777b538SAndroid Build Coastguard Worker       }
655*6777b538SAndroid Build Coastguard Worker     } else {
656*6777b538SAndroid Build Coastguard Worker   copy_verbatim:
657*6777b538SAndroid Build Coastguard Worker     buffer.Out(fmt[-1]);
658*6777b538SAndroid Build Coastguard Worker     }
659*6777b538SAndroid Build Coastguard Worker   }
660*6777b538SAndroid Build Coastguard Worker  end_of_format_string:
661*6777b538SAndroid Build Coastguard Worker  end_of_output_buffer:
662*6777b538SAndroid Build Coastguard Worker   return buffer.GetCount();
663*6777b538SAndroid Build Coastguard Worker }
664*6777b538SAndroid Build Coastguard Worker 
665*6777b538SAndroid Build Coastguard Worker }  // namespace internal
666*6777b538SAndroid Build Coastguard Worker 
SafeSNPrintf(char * buf,size_t sz,const char * fmt)667*6777b538SAndroid Build Coastguard Worker ssize_t SafeSNPrintf(char* buf, size_t sz, const char* fmt) {
668*6777b538SAndroid Build Coastguard Worker   // Make sure that at least one NUL byte can be written, and that the buffer
669*6777b538SAndroid Build Coastguard Worker   // never overflows kSSizeMax. Not only does that use up most or all of the
670*6777b538SAndroid Build Coastguard Worker   // address space, it also would result in a return code that cannot be
671*6777b538SAndroid Build Coastguard Worker   // represented.
672*6777b538SAndroid Build Coastguard Worker   if (static_cast<ssize_t>(sz) < 1)
673*6777b538SAndroid Build Coastguard Worker     return -1;
674*6777b538SAndroid Build Coastguard Worker   sz = std::min(sz, kSSizeMax);
675*6777b538SAndroid Build Coastguard Worker 
676*6777b538SAndroid Build Coastguard Worker   Buffer buffer(buf, sz);
677*6777b538SAndroid Build Coastguard Worker 
678*6777b538SAndroid Build Coastguard Worker   // In the slow-path, we deal with errors by copying the contents of
679*6777b538SAndroid Build Coastguard Worker   // "fmt" unexpanded. This means, if there are no arguments passed, the
680*6777b538SAndroid Build Coastguard Worker   // SafeSPrintf() function always degenerates to a version of strncpy() that
681*6777b538SAndroid Build Coastguard Worker   // de-duplicates '%' characters.
682*6777b538SAndroid Build Coastguard Worker   const char* src = fmt;
683*6777b538SAndroid Build Coastguard Worker   for (; *src; ++src) {
684*6777b538SAndroid Build Coastguard Worker     buffer.Out(*src);
685*6777b538SAndroid Build Coastguard Worker     DEBUG_CHECK(src[0] != '%' || src[1] == '%');
686*6777b538SAndroid Build Coastguard Worker     if (src[0] == '%' && src[1] == '%') {
687*6777b538SAndroid Build Coastguard Worker       ++src;
688*6777b538SAndroid Build Coastguard Worker     }
689*6777b538SAndroid Build Coastguard Worker   }
690*6777b538SAndroid Build Coastguard Worker   return buffer.GetCount();
691*6777b538SAndroid Build Coastguard Worker }
692*6777b538SAndroid Build Coastguard Worker 
693*6777b538SAndroid Build Coastguard Worker }  // namespace strings
694*6777b538SAndroid Build Coastguard Worker }  // namespace base
695