safe_sprintf.h (9326B)
1 // Copyright 2013 The Chromium Authors 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #ifndef BASE_STRINGS_SAFE_SPRINTF_H_ 6 #define BASE_STRINGS_SAFE_SPRINTF_H_ 7 8 #include <stddef.h> 9 #include <stdint.h> 10 #include <stdlib.h> 11 12 #include "base/memory/raw_ptr_exclusion.h" 13 #include "build/build_config.h" 14 15 #if BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA) 16 // For ssize_t 17 #include <unistd.h> 18 #endif 19 20 #include "base/base_export.h" 21 22 namespace base { 23 namespace strings { 24 25 #if defined(COMPILER_MSVC) 26 // Define ssize_t inside of our namespace. 27 #if defined(_WIN64) 28 typedef __int64 ssize_t; 29 #else 30 typedef long ssize_t; 31 #endif 32 #endif 33 34 // SafeSPrintf() is a type-safe and completely self-contained version of 35 // snprintf(). 36 // 37 // SafeSNPrintf() is an alternative function signature that can be used when 38 // not dealing with fixed-sized buffers. When possible, SafeSPrintf() should 39 // always be used instead of SafeSNPrintf() 40 // 41 // These functions allow for formatting complicated messages from contexts that 42 // require strict async-signal-safety. In fact, it is safe to call them from 43 // any low-level execution context, as they are guaranteed to make no library 44 // or system calls. It deliberately never touches "errno", either. 45 // 46 // The only exception to this rule is that in debug builds the code calls 47 // RAW_CHECK() to help diagnose problems when the format string does not 48 // match the rest of the arguments. In release builds, no CHECK()s are used, 49 // and SafeSPrintf() instead returns an output string that expands only 50 // those arguments that match their format characters. Mismatched arguments 51 // are ignored. 52 // 53 // The code currently only supports a subset of format characters: 54 // %c, %o, %d, %x, %X, %p, and %s. 55 // 56 // SafeSPrintf() aims to be as liberal as reasonably possible. Integer-like 57 // values of arbitrary width can be passed to all of the format characters 58 // that expect integers. Thus, it is explicitly legal to pass an "int" to 59 // "%c", and output will automatically look at the LSB only. It is also 60 // explicitly legal to pass either signed or unsigned values, and the format 61 // characters will automatically interpret the arguments accordingly. 62 // 63 // It is still not legal to mix-and-match integer-like values with pointer 64 // values. For instance, you cannot pass a pointer to %x, nor can you pass an 65 // integer to %p. 66 // 67 // The one exception is "0" zero being accepted by "%p". This works-around 68 // the problem of C++ defining NULL as an integer-like value. 69 // 70 // All format characters take an optional width parameter. This must be a 71 // positive integer. For %d, %o, %x, %X and %p, if the width starts with 72 // a leading '0', padding is done with '0' instead of ' ' characters. 73 // 74 // There are a few features of snprintf()-style format strings, that 75 // SafeSPrintf() does not support at this time. 76 // 77 // If an actual user showed up, there is no particularly strong reason they 78 // couldn't be added. But that assumes that the trade-offs between complexity 79 // and utility are favorable. 80 // 81 // For example, adding support for negative padding widths, and for %n are all 82 // likely to be viewed positively. They are all clearly useful, low-risk, easy 83 // to test, don't jeopardize the async-signal-safety of the code, and overall 84 // have little impact on other parts of SafeSPrintf() function. 85 // 86 // On the other hands, adding support for alternate forms, positional 87 // arguments, grouping, wide characters, localization or floating point numbers 88 // are all unlikely to ever be added. 89 // 90 // SafeSPrintf() and SafeSNPrintf() mimic the behavior of snprintf() and they 91 // return the number of bytes needed to store the untruncated output. This 92 // does *not* include the terminating NUL byte. 93 // 94 // They return -1, iff a fatal error happened. This typically can only happen, 95 // if the buffer size is a) negative, or b) zero (i.e. not even the NUL byte 96 // can be written). The return value can never be larger than SSIZE_MAX-1. 97 // This ensures that the caller can always add one to the signed return code 98 // in order to determine the amount of storage that needs to be allocated. 99 // 100 // While the code supports type checking and while it is generally very careful 101 // to avoid printing incorrect values, it tends to be conservative in printing 102 // as much as possible, even when given incorrect parameters. Typically, in 103 // case of an error, the format string will not be expanded. (i.e. something 104 // like SafeSPrintf(buf, "%p %d", 1, 2) results in "%p 2"). See above for 105 // the use of RAW_CHECK() in debug builds, though. 106 // 107 // Basic example: 108 // char buf[20]; 109 // base::strings::SafeSPrintf(buf, "The answer: %2d", 42); 110 // 111 // Example with dynamically sized buffer (async-signal-safe). This code won't 112 // work on Visual studio, as it requires dynamically allocating arrays on the 113 // stack. Consider picking a smaller value for |kMaxSize| if stack size is 114 // limited and known. On the other hand, if the parameters to SafeSNPrintf() 115 // are trusted and not controllable by the user, you can consider eliminating 116 // the check for |kMaxSize| altogether. The current value of SSIZE_MAX is 117 // essentially a no-op that just illustrates how to implement an upper bound: 118 // const size_t kInitialSize = 128; 119 // const size_t kMaxSize = std::numeric_limits<ssize_t>::max(); 120 // size_t size = kInitialSize; 121 // for (;;) { 122 // char buf[size]; 123 // size = SafeSNPrintf(buf, size, "Error message \"%s\"\n", err) + 1; 124 // if (sizeof(buf) < kMaxSize && size > kMaxSize) { 125 // size = kMaxSize; 126 // continue; 127 // } else if (size > sizeof(buf)) 128 // continue; 129 // write(2, buf, size-1); 130 // break; 131 // } 132 133 namespace internal { 134 // Helpers that use C++ overloading, templates, and specializations to deduce 135 // and record type information from function arguments. This allows us to 136 // later write a type-safe version of snprintf(). 137 138 struct Arg { 139 enum Type { INT, UINT, STRING, POINTER }; 140 141 // Any integer-like value. 142 Arg(signed char c) : type(INT) { 143 integer.i = c; 144 integer.width = sizeof(char); 145 } 146 Arg(unsigned char c) : type(UINT) { 147 integer.i = c; 148 integer.width = sizeof(char); 149 } 150 Arg(signed short j) : type(INT) { 151 integer.i = j; 152 integer.width = sizeof(short); 153 } 154 Arg(unsigned short j) : type(UINT) { 155 integer.i = j; 156 integer.width = sizeof(short); 157 } 158 Arg(signed int j) : type(INT) { 159 integer.i = j; 160 integer.width = sizeof(int); 161 } 162 Arg(unsigned int j) : type(UINT) { 163 integer.i = j; 164 integer.width = sizeof(int); 165 } 166 Arg(signed long j) : type(INT) { 167 integer.i = j; 168 integer.width = sizeof(long); 169 } 170 Arg(unsigned long j) : type(UINT) { 171 integer.i = static_cast<int64_t>(j); 172 integer.width = sizeof(long); 173 } 174 Arg(signed long long j) : type(INT) { 175 integer.i = j; 176 integer.width = sizeof(long long); 177 } 178 Arg(unsigned long long j) : type(UINT) { 179 integer.i = static_cast<int64_t>(j); 180 integer.width = sizeof(long long); 181 } 182 183 // A C-style text string. 184 Arg(const char* s) : str(s), type(STRING) { } 185 Arg(char* s) : str(s), type(STRING) { } 186 187 // Any pointer value that can be cast to a "void*". 188 template<class T> Arg(T* p) : ptr((void*)p), type(POINTER) { } 189 190 union { 191 // An integer-like value. 192 struct { 193 int64_t i; 194 unsigned char width; 195 } integer; 196 197 // A C-style text string. 198 const char* str; 199 200 // A pointer to an arbitrary object. 201 // This field is not a raw_ptr<> because it was filtered by the rewriter 202 // for: #union 203 RAW_PTR_EXCLUSION const void* ptr; 204 }; 205 const enum Type type; 206 }; 207 208 // This is the internal function that performs the actual formatting of 209 // an snprintf()-style format string. 210 BASE_EXPORT ssize_t SafeSNPrintf(char* buf, size_t sz, const char* fmt, 211 const Arg* args, size_t max_args); 212 213 #if !defined(NDEBUG) 214 // In debug builds, allow unit tests to artificially lower the kSSizeMax 215 // constant that is used as a hard upper-bound for all buffers. In normal 216 // use, this constant should always be std::numeric_limits<ssize_t>::max(). 217 BASE_EXPORT void SetSafeSPrintfSSizeMaxForTest(size_t max); 218 BASE_EXPORT size_t GetSafeSPrintfSSizeMaxForTest(); 219 #endif 220 221 } // namespace internal 222 223 template<typename... Args> 224 ssize_t SafeSNPrintf(char* buf, size_t N, const char* fmt, Args... args) { 225 // Use Arg() object to record type information and then copy arguments to an 226 // array to make it easier to iterate over them. 227 const internal::Arg arg_array[] = { args... }; 228 return internal::SafeSNPrintf(buf, N, fmt, arg_array, sizeof...(args)); 229 } 230 231 template<size_t N, typename... Args> 232 ssize_t SafeSPrintf(char (&buf)[N], const char* fmt, Args... args) { 233 // Use Arg() object to record type information and then copy arguments to an 234 // array to make it easier to iterate over them. 235 const internal::Arg arg_array[] = { args... }; 236 return internal::SafeSNPrintf(buf, N, fmt, arg_array, sizeof...(args)); 237 } 238 239 // Fast-path when we don't actually need to substitute any arguments. 240 BASE_EXPORT ssize_t SafeSNPrintf(char* buf, size_t N, const char* fmt); 241 template<size_t N> 242 inline ssize_t SafeSPrintf(char (&buf)[N], const char* fmt) { 243 return SafeSNPrintf(buf, N, fmt); 244 } 245 246 } // namespace strings 247 } // namespace base 248 249 #endif // BASE_STRINGS_SAFE_SPRINTF_H_