blob: 1d5dee23f879e30653dc71a8884dba6f816ae5a2 [file] [log] [blame]
Elliott Hughes2faa5f12012-01-30 14:42:07 -08001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro6c21dc12011-06-20 15:20:52 -070016
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_BASE_MACROS_H_
18#define ART_RUNTIME_BASE_MACROS_H_
Carl Shapiro6c21dc12011-06-20 15:20:52 -070019
Carl Shapiro12eb78e2011-06-24 14:51:06 -070020#include <stddef.h> // for size_t
Mark Salyzyn47a4cc72014-05-22 16:27:06 -070021#include <unistd.h> // for TEMP_FAILURE_RETRY
22
23// bionic and glibc both have TEMP_FAILURE_RETRY, but eg Mac OS' libc doesn't.
24#ifndef TEMP_FAILURE_RETRY
25#define TEMP_FAILURE_RETRY(exp) ({ \
26 decltype(exp) _rc; \
27 do { \
28 _rc = (exp); \
29 } while (_rc == -1 && errno == EINTR); \
30 _rc; })
31#endif
Carl Shapiro12eb78e2011-06-24 14:51:06 -070032
Brian Carlstrom7a00a3c2012-01-25 18:38:03 -080033#define GCC_VERSION (__GNUC__ * 10000 + __GNUC_MINOR__ * 100 + __GNUC_PATCHLEVEL__)
Shih-wei Liao24782c62012-01-08 12:46:11 -080034
Ian Rogers6fac4472014-02-25 17:01:10 -080035// C++11 final and override keywords that were introduced in GCC version 4.7.
Ian Rogers9758f792014-03-13 09:02:55 -070036#if defined(__clang__) || GCC_VERSION >= 40700
Ian Rogers6fac4472014-02-25 17:01:10 -080037#define OVERRIDE override
38#define FINAL final
39#else
40#define OVERRIDE
41#define FINAL
42#endif
43
Ian Rogers6f3dbba2014-10-14 17:41:57 -070044// Declare a friend relationship in a class with a test. Used rather that FRIEND_TEST to avoid
45// globally importing gtest/gtest.h into the main ART header files.
46#define ART_FRIEND_TEST(test_set_name, individual_test)\
47friend class test_set_name##_##individual_test##_Test
48
Zheng Xuad4450e2015-04-17 18:48:56 +080049// Declare a friend relationship in a class with a typed test.
50#define ART_FRIEND_TYPED_TEST(test_set_name, individual_test)\
51template<typename T> ART_FRIEND_TEST(test_set_name, individual_test)
52
Ian Rogerscf7f1912014-10-22 22:06:39 -070053// DISALLOW_COPY_AND_ASSIGN disallows the copy and operator= functions. It goes in the private:
54// declarations in a class.
Ian Rogers3eaa8522014-11-04 13:20:30 -080055#if !defined(DISALLOW_COPY_AND_ASSIGN)
Carl Shapiro6c21dc12011-06-20 15:20:52 -070056#define DISALLOW_COPY_AND_ASSIGN(TypeName) \
Ian Rogerscf7f1912014-10-22 22:06:39 -070057 TypeName(const TypeName&) = delete; \
58 void operator=(const TypeName&) = delete
Ian Rogers3eaa8522014-11-04 13:20:30 -080059#endif
Carl Shapiro6c21dc12011-06-20 15:20:52 -070060
Ian Rogerscf7f1912014-10-22 22:06:39 -070061// A macro to disallow all the implicit constructors, namely the default constructor, copy
62// constructor and operator= functions.
Carl Shapiro6c21dc12011-06-20 15:20:52 -070063//
Ian Rogerscf7f1912014-10-22 22:06:39 -070064// This should be used in the private: declarations for a class that wants to prevent anyone from
65// instantiating it. This is especially useful for classes containing only static methods.
Carl Shapiro6c21dc12011-06-20 15:20:52 -070066#define DISALLOW_IMPLICIT_CONSTRUCTORS(TypeName) \
Ian Rogerscf7f1912014-10-22 22:06:39 -070067 TypeName() = delete; \
Carl Shapiro6c21dc12011-06-20 15:20:52 -070068 DISALLOW_COPY_AND_ASSIGN(TypeName)
69
Ian Rogerscf7f1912014-10-22 22:06:39 -070070// A macro to disallow new and delete operators for a class. It goes in the private: declarations.
71#define DISALLOW_ALLOCATION() \
72 public: \
Andreas Gampe65b798e2015-04-06 09:35:22 -070073 NO_RETURN ALWAYS_INLINE void operator delete(void*, size_t) { UNREACHABLE(); } \
Ian Rogerscf7f1912014-10-22 22:06:39 -070074 private: \
75 void* operator new(size_t) = delete
76
Carl Shapiroa2e18e12011-06-21 18:57:55 -070077// The arraysize(arr) macro returns the # of elements in an array arr.
78// The expression is a compile-time constant, and therefore can be
79// used in defining new arrays, for example. If you use arraysize on
80// a pointer by mistake, you will get a compile-time error.
81//
82// One caveat is that arraysize() doesn't accept any array of an
83// anonymous type or a type defined inside a function. In these rare
Carl Shapirod2bdb572011-06-22 11:45:37 -070084// cases, you have to use the unsafe ARRAYSIZE_UNSAFE() macro below. This is
Carl Shapiroa2e18e12011-06-21 18:57:55 -070085// due to a limitation in C++'s template system. The limitation might
86// eventually be removed, but it hasn't happened yet.
87
88// This template function declaration is used in defining arraysize.
89// Note that the function doesn't need an implementation, as we only
90// use its type.
91template <typename T, size_t N>
92char (&ArraySizeHelper(T (&array)[N]))[N];
93
94#define arraysize(array) (sizeof(ArraySizeHelper(array)))
95
Carl Shapirod2bdb572011-06-22 11:45:37 -070096// ARRAYSIZE_UNSAFE performs essentially the same calculation as arraysize,
97// but can be used on anonymous types or types defined inside
98// functions. It's less safe than arraysize as it accepts some
99// (although not all) pointers. Therefore, you should use arraysize
100// whenever possible.
101//
102// The expression ARRAYSIZE_UNSAFE(a) is a compile-time constant of type
103// size_t.
104//
105// ARRAYSIZE_UNSAFE catches a few type errors. If you see a compiler error
106//
107// "warning: division by zero in ..."
108//
109// when using ARRAYSIZE_UNSAFE, you are (wrongfully) giving it a pointer.
110// You should only use ARRAYSIZE_UNSAFE on statically allocated arrays.
111//
112// The following comments are on the implementation details, and can
113// be ignored by the users.
114//
115// ARRAYSIZE_UNSAFE(arr) works by inspecting sizeof(arr) (the # of bytes in
116// the array) and sizeof(*(arr)) (the # of bytes in one array
117// element). If the former is divisible by the latter, perhaps arr is
118// indeed an array, in which case the division result is the # of
119// elements in the array. Otherwise, arr cannot possibly be an array,
120// and we generate a compiler error to prevent the code from
121// compiling.
122//
123// Since the size of bool is implementation-defined, we need to cast
124// !(sizeof(a) & sizeof(*(a))) to size_t in order to ensure the final
125// result has type size_t.
126//
127// This macro is not perfect as it wrongfully accepts certain
128// pointers, namely where the pointer size is divisible by the pointee
129// size. Since all our code has to go through a 32-bit compiler,
130// where a pointer is 4 bytes, this means all pointers to a type whose
131// size is 3 or greater than 4 will be (righteously) rejected.
132#define ARRAYSIZE_UNSAFE(a) \
Elliott Hughes362f9bc2011-10-17 18:56:41 -0700133 ((sizeof(a) / sizeof(*(a))) / static_cast<size_t>(!(sizeof(a) % sizeof(*(a)))))
Carl Shapirod2bdb572011-06-22 11:45:37 -0700134
Elliott Hughesff17f1f2012-01-24 18:12:29 -0800135#define SIZEOF_MEMBER(t, f) sizeof((reinterpret_cast<t*>(4096))->f)
Carl Shapiro59e85cd2011-06-21 10:16:23 -0700136
Elliott Hughes362f9bc2011-10-17 18:56:41 -0700137#define OFFSETOF_MEMBER(t, f) \
Ian Rogers8a01a3a2013-05-06 13:25:44 -0700138 (reinterpret_cast<const char*>(&reinterpret_cast<t*>(16)->f) - reinterpret_cast<const char*>(16)) // NOLINT
Carl Shapiro59e85cd2011-06-21 10:16:23 -0700139
Elliott Hughes93e74e82011-09-13 11:07:03 -0700140#define OFFSETOF_VOLATILE_MEMBER(t, f) \
Elliott Hughes398f64b2012-03-26 18:05:48 -0700141 (reinterpret_cast<volatile char*>(&reinterpret_cast<t*>(16)->f) - reinterpret_cast<volatile char*>(16)) // NOLINT
Elliott Hughes93e74e82011-09-13 11:07:03 -0700142
Brian Carlstromb1eba212013-07-17 18:07:19 -0700143#define PACKED(x) __attribute__ ((__aligned__(x), __packed__))
Elliott Hughes85d15452011-09-16 17:33:01 -0700144
Elliott Hughesff17f1f2012-01-24 18:12:29 -0800145#define LIKELY(x) __builtin_expect((x), true)
146#define UNLIKELY(x) __builtin_expect((x), false)
Ian Rogerscaab8c42011-10-12 12:11:18 -0700147
Dave Allison70202782013-10-22 17:52:19 -0700148// Stringify the argument.
149#define QUOTE(x) #x
150#define STRINGIFY(x) QUOTE(x)
151
Ian Rogerse8ae0dc2013-02-07 10:20:45 -0800152#ifndef NDEBUG
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800153#define ALWAYS_INLINE
154#else
Ian Rogerse8ae0dc2013-02-07 10:20:45 -0800155#define ALWAYS_INLINE __attribute__ ((always_inline))
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800156#endif
157
Bernhard Rosenkränzer46053622013-12-12 02:15:52 +0100158#ifdef __clang__
159/* clang doesn't like attributes on lambda functions */
160#define ALWAYS_INLINE_LAMBDA
161#else
162#define ALWAYS_INLINE_LAMBDA ALWAYS_INLINE
163#endif
164
Andreas Gampe86830382014-12-12 21:41:29 -0800165#define NO_INLINE __attribute__ ((noinline))
166
Anwar Ghuloum63937db2013-05-24 09:08:32 -0700167#if defined (__APPLE__)
Anwar Ghuloum1d9314c2013-05-24 10:44:48 -0700168#define HOT_ATTR
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700169#define COLD_ATTR
Anwar Ghuloum63937db2013-05-24 09:08:32 -0700170#else
Anwar Ghuloum1d9314c2013-05-24 10:44:48 -0700171#define HOT_ATTR __attribute__ ((hot))
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700172#define COLD_ATTR __attribute__ ((cold))
Anwar Ghuloum63937db2013-05-24 09:08:32 -0700173#endif
174
Ian Rogers96faf5b2013-08-09 22:05:32 -0700175#define PURE __attribute__ ((__pure__))
Mathieu Chartier4c13a3f2014-07-14 14:57:16 -0700176#define WARN_UNUSED __attribute__((warn_unused_result))
Ian Rogers96faf5b2013-08-09 22:05:32 -0700177
Ian Rogers6a3c1fc2014-10-31 00:33:20 -0700178// A deprecated function to call to create a false use of the parameter, for example:
179// int foo(int x) { UNUSED(x); return 10; }
180// to avoid compiler warnings. Going forward we prefer ATTRIBUTE_UNUSED.
181template<typename... T> void UNUSED(const T&...) {}
182
183// An attribute to place on a parameter to a function, for example:
184// int foo(int x ATTRIBUTE_UNUSED) { return 10; }
185// to avoid compiler warnings.
186#define ATTRIBUTE_UNUSED __attribute__((__unused__))
187
188// Define that a position within code is unreachable, for example:
189// int foo () { LOG(FATAL) << "Don't call me"; UNREACHABLE(); }
190// without the UNREACHABLE a return statement would be necessary.
Ian Rogers07140832014-09-30 15:43:59 -0700191#define UNREACHABLE __builtin_unreachable
Elliott Hughesc151f902012-06-21 20:33:21 -0700192
Andreas Gampe794ad762015-02-23 08:12:24 -0800193// Add the C++11 noreturn attribute.
194#define NO_RETURN [[ noreturn ]] // NOLINT[whitespace/braces] [5]
195
Ian Rogersfc787ec2014-10-09 21:56:44 -0700196// The FALLTHROUGH_INTENDED macro can be used to annotate implicit fall-through
197// between switch labels:
198// switch (x) {
199// case 40:
200// case 41:
201// if (truth_is_out_there) {
202// ++x;
203// FALLTHROUGH_INTENDED; // Use instead of/along with annotations in
204// // comments.
205// } else {
206// return x;
207// }
208// case 42:
209// ...
210//
211// As shown in the example above, the FALLTHROUGH_INTENDED macro should be
212// followed by a semicolon. It is designed to mimic control-flow statements
213// like 'break;', so it can be placed in most places where 'break;' can, but
214// only if there are no statements on the execution path between it and the
215// next switch label.
216//
217// When compiled with clang in C++11 mode, the FALLTHROUGH_INTENDED macro is
218// expanded to [[clang::fallthrough]] attribute, which is analysed when
219// performing switch labels fall-through diagnostic ('-Wimplicit-fallthrough').
220// See clang documentation on language extensions for details:
221// http://clang.llvm.org/docs/LanguageExtensions.html#clang__fallthrough
222//
223// When used with unsupported compilers, the FALLTHROUGH_INTENDED macro has no
224// effect on diagnostics.
225//
226// In either case this macro has no effect on runtime behavior and performance
227// of code.
228#if defined(__clang__) && __cplusplus >= 201103L && defined(__has_warning)
229#if __has_feature(cxx_attributes) && __has_warning("-Wimplicit-fallthrough")
230#define FALLTHROUGH_INTENDED [[clang::fallthrough]] // NOLINT
231#endif
232#endif
233
234#ifndef FALLTHROUGH_INTENDED
235#define FALLTHROUGH_INTENDED do { } while (0)
236#endif
237
Ian Rogers719d1a32014-03-06 12:13:39 -0800238// Annotalysis thread-safety analysis support.
239#if defined(__SUPPORT_TS_ANNOTATION__) || defined(__clang__)
240#define THREAD_ANNOTATION_ATTRIBUTE__(x) __attribute__((x))
Elliott Hughesf8349362012-06-18 15:00:06 -0700241#else
Ian Rogers719d1a32014-03-06 12:13:39 -0800242#define THREAD_ANNOTATION_ATTRIBUTE__(x) // no-op
243#endif
Elliott Hughesf8349362012-06-18 15:00:06 -0700244
Ian Rogers719d1a32014-03-06 12:13:39 -0800245#define ACQUIRED_AFTER(...) THREAD_ANNOTATION_ATTRIBUTE__(acquired_after(__VA_ARGS__))
246#define ACQUIRED_BEFORE(...) THREAD_ANNOTATION_ATTRIBUTE__(acquired_before(__VA_ARGS__))
Ian Rogers719d1a32014-03-06 12:13:39 -0800247#define GUARDED_BY(x) THREAD_ANNOTATION_ATTRIBUTE__(guarded_by(x))
248#define GUARDED_VAR THREAD_ANNOTATION_ATTRIBUTE__(guarded)
Ian Rogers719d1a32014-03-06 12:13:39 -0800249#define LOCK_RETURNED(x) THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
Ian Rogers719d1a32014-03-06 12:13:39 -0800250#define NO_THREAD_SAFETY_ANALYSIS THREAD_ANNOTATION_ATTRIBUTE__(no_thread_safety_analysis)
Elliott Hughesf8349362012-06-18 15:00:06 -0700251#define PT_GUARDED_BY(x)
Ian Rogers719d1a32014-03-06 12:13:39 -0800252// THREAD_ANNOTATION_ATTRIBUTE__(point_to_guarded_by(x))
253#define PT_GUARDED_VAR THREAD_ANNOTATION_ATTRIBUTE__(point_to_guarded)
254#define SCOPED_LOCKABLE THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
Elliott Hughesf8349362012-06-18 15:00:06 -0700255
Ian Rogers719d1a32014-03-06 12:13:39 -0800256#if defined(__clang__)
257#define EXCLUSIVE_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock_function(__VA_ARGS__))
258#define EXCLUSIVE_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock_function(__VA_ARGS__))
259#define SHARED_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_lock_function(__VA_ARGS__))
260#define SHARED_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock_function(__VA_ARGS__))
261#define UNLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(unlock_function(__VA_ARGS__))
Mathieu Chartier90443472015-07-16 20:32:27 -0700262#define REQUIRES(...) THREAD_ANNOTATION_ATTRIBUTE__(requires_capability(__VA_ARGS__))
263#define SHARED_REQUIRES(...) THREAD_ANNOTATION_ATTRIBUTE__(requires_shared_capability(__VA_ARGS__))
264#define CAPABILITY(...) THREAD_ANNOTATION_ATTRIBUTE__(capability(__VA_ARGS__))
265#define SHARED_CAPABILITY(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_capability(__VA_ARGS__))
266#define ASSERT_CAPABILITY(...) THREAD_ANNOTATION_ATTRIBUTE__(assert_capability(__VA_ARGS__))
267#define ASSERT_SHARED_CAPABILITY(...) THREAD_ANNOTATION_ATTRIBUTE__(assert_shared_capability(__VA_ARGS__))
268#define RETURN_CAPABILITY(...) THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(__VA_ARGS__))
269#define TRY_ACQUIRE(...) THREAD_ANNOTATION_ATTRIBUTE__(try_acquire_capability(__VA_ARGS__))
270#define TRY_ACQUIRE_SHARED(...) THREAD_ANNOTATION_ATTRIBUTE__(try_acquire_shared_capability(__VA_ARGS__))
271#define ACQUIRE(...) THREAD_ANNOTATION_ATTRIBUTE__(acquire_capability(__VA_ARGS__))
272#define ACQUIRE_SHARED(...) THREAD_ANNOTATION_ATTRIBUTE__(acquire_shared_capability(__VA_ARGS__))
273#define RELEASE(...) THREAD_ANNOTATION_ATTRIBUTE__(release_capability(__VA_ARGS__))
274#define RELEASE_SHARED(...) THREAD_ANNOTATION_ATTRIBUTE__(release_shared_capability(__VA_ARGS__))
275#define SCOPED_CAPABILITY THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
Ian Rogers719d1a32014-03-06 12:13:39 -0800276#else
277#define EXCLUSIVE_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock(__VA_ARGS__))
278#define EXCLUSIVE_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock(__VA_ARGS__))
279#define SHARED_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_lock(__VA_ARGS__))
280#define SHARED_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock(__VA_ARGS__))
281#define UNLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(unlock(__VA_ARGS__))
Mathieu Chartier90443472015-07-16 20:32:27 -0700282#define REQUIRES(...)
283#define SHARED_REQUIRES(...)
284#define CAPABILITY(...)
285#define SHARED_CAPABILITY(...)
286#define ASSERT_CAPABILITY(...)
287#define ASSERT_SHARED_CAPABILITY(...)
288#define RETURN_CAPABILITY(...)
289#define TRY_ACQUIRE(...)
290#define TRY_ACQUIRE_SHARED(...)
291#define ACQUIRE(...)
292#define ACQUIRE_SHARED(...)
293#define RELEASE(...)
294#define RELEASE_SHARED(...)
295#define SCOPED_CAPABILITY
Ian Rogers719d1a32014-03-06 12:13:39 -0800296#endif
Elliott Hughesf8349362012-06-18 15:00:06 -0700297
Mathieu Chartier90443472015-07-16 20:32:27 -0700298#define LOCKABLE CAPABILITY("mutex")
299#define SHARED_LOCKABLE SHARED_CAPABILITY("mutex")
300
Brian Carlstromfc0e3212013-07-17 14:40:12 -0700301#endif // ART_RUNTIME_BASE_MACROS_H_