67 lines
2.4 KiB
C++
67 lines
2.4 KiB
C++
// Copyright 2022 The Pigweed Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
// use this file except in compliance with the License. You may obtain a copy of
|
|
// the License at
|
|
//
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
// License for the specific language governing permissions and limitations under
|
|
// the License.
|
|
|
|
#include <cstdint>
|
|
#include <cstring>
|
|
#include <memory>
|
|
#include <span>
|
|
|
|
#include "pw_assert/config.h"
|
|
#include "pw_assert_tokenized/handler.h"
|
|
#include "pw_base64/base64.h"
|
|
#include "pw_log/log.h"
|
|
#include "pw_log_tokenized/log_tokenized.h"
|
|
|
|
extern "C" void pw_assert_tokenized_HandleAssertFailure(
|
|
uint32_t tokenized_file_name, int line_number) {
|
|
// Buffer size for binary->base64 conversion with a null terminator.
|
|
constexpr size_t kBufferSize =
|
|
pw::base64::EncodedSize(sizeof(tokenized_file_name)) + 1;
|
|
std::byte* hash_buffer = reinterpret_cast<std::byte*>(&tokenized_file_name);
|
|
char base64_buffer[kBufferSize];
|
|
|
|
size_t len =
|
|
pw::base64::Encode(std::span(hash_buffer, sizeof(tokenized_file_name)),
|
|
std::span(base64_buffer));
|
|
base64_buffer[len] = '\0';
|
|
#if PW_ASSERT_ENABLE_DEBUG
|
|
PW_LOG(PW_LOG_LEVEL_FATAL,
|
|
PW_LOG_FLAGS,
|
|
"PW_ASSERT() or PW_DASSERT() failure at $%s:%d",
|
|
base64_buffer,
|
|
line_number);
|
|
#else
|
|
PW_LOG(PW_LOG_LEVEL_FATAL,
|
|
PW_LOG_FLAGS,
|
|
"PW_ASSERT() failure. Note: PW_DASSERT disabled $%s:%d",
|
|
base64_buffer,
|
|
line_number);
|
|
#endif // PW_ASSERT_ENABLE_DEBUG
|
|
PW_UNREACHABLE;
|
|
}
|
|
|
|
extern "C" void pw_assert_tokenized_HandleCheckFailure(
|
|
uint32_t tokenized_message, int line_number) {
|
|
// TODO(amontanez): There should be a less-hacky way to assemble this.
|
|
const uint32_t payload = _PW_LOG_TOKENIZED_LEVEL(PW_LOG_LEVEL_FATAL) |
|
|
_PW_LOG_TOKENIZED_FLAGS(PW_LOG_FLAGS) |
|
|
_PW_LOG_TOKENIZED_LINE(line_number);
|
|
uint8_t token_buffer[sizeof(tokenized_message)];
|
|
memcpy(token_buffer, &tokenized_message, sizeof(tokenized_message));
|
|
|
|
pw_tokenizer_HandleEncodedMessageWithPayload(
|
|
payload, token_buffer, sizeof(token_buffer));
|
|
PW_UNREACHABLE;
|
|
}
|