blob: 6c33232b5f1f4b60ab794432971f4f2af96ea37d [file] [log] [blame]
Elliott Hughes2faa5f12012-01-30 14:42:07 -08001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro6c21dc12011-06-20 15:20:52 -070016
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_BASE_MACROS_H_
18#define ART_RUNTIME_BASE_MACROS_H_
Carl Shapiro6c21dc12011-06-20 15:20:52 -070019
Carl Shapiro12eb78e2011-06-24 14:51:06 -070020#include <stddef.h> // for size_t
Mark Salyzyn47a4cc72014-05-22 16:27:06 -070021#include <unistd.h> // for TEMP_FAILURE_RETRY
22
23// bionic and glibc both have TEMP_FAILURE_RETRY, but eg Mac OS' libc doesn't.
24#ifndef TEMP_FAILURE_RETRY
25#define TEMP_FAILURE_RETRY(exp) ({ \
26 decltype(exp) _rc; \
27 do { \
28 _rc = (exp); \
29 } while (_rc == -1 && errno == EINTR); \
30 _rc; })
31#endif
Carl Shapiro12eb78e2011-06-24 14:51:06 -070032
Brian Carlstrom7a00a3c2012-01-25 18:38:03 -080033#define GCC_VERSION (__GNUC__ * 10000 + __GNUC_MINOR__ * 100 + __GNUC_PATCHLEVEL__)
Shih-wei Liao24782c62012-01-08 12:46:11 -080034
Ian Rogers6fac4472014-02-25 17:01:10 -080035// C++11 final and override keywords that were introduced in GCC version 4.7.
Ian Rogers9758f792014-03-13 09:02:55 -070036#if defined(__clang__) || GCC_VERSION >= 40700
Ian Rogers6fac4472014-02-25 17:01:10 -080037#define OVERRIDE override
38#define FINAL final
39#else
40#define OVERRIDE
41#define FINAL
42#endif
43
Ian Rogers6f3dbba2014-10-14 17:41:57 -070044// Declare a friend relationship in a class with a test. Used rather that FRIEND_TEST to avoid
45// globally importing gtest/gtest.h into the main ART header files.
46#define ART_FRIEND_TEST(test_set_name, individual_test)\
47friend class test_set_name##_##individual_test##_Test
48
Ian Rogerscf7f1912014-10-22 22:06:39 -070049// DISALLOW_COPY_AND_ASSIGN disallows the copy and operator= functions. It goes in the private:
50// declarations in a class.
Ian Rogers3eaa8522014-11-04 13:20:30 -080051#if !defined(DISALLOW_COPY_AND_ASSIGN)
Carl Shapiro6c21dc12011-06-20 15:20:52 -070052#define DISALLOW_COPY_AND_ASSIGN(TypeName) \
Ian Rogerscf7f1912014-10-22 22:06:39 -070053 TypeName(const TypeName&) = delete; \
54 void operator=(const TypeName&) = delete
Ian Rogers3eaa8522014-11-04 13:20:30 -080055#endif
Carl Shapiro6c21dc12011-06-20 15:20:52 -070056
Ian Rogerscf7f1912014-10-22 22:06:39 -070057// A macro to disallow all the implicit constructors, namely the default constructor, copy
58// constructor and operator= functions.
Carl Shapiro6c21dc12011-06-20 15:20:52 -070059//
Ian Rogerscf7f1912014-10-22 22:06:39 -070060// This should be used in the private: declarations for a class that wants to prevent anyone from
61// instantiating it. This is especially useful for classes containing only static methods.
Carl Shapiro6c21dc12011-06-20 15:20:52 -070062#define DISALLOW_IMPLICIT_CONSTRUCTORS(TypeName) \
Ian Rogerscf7f1912014-10-22 22:06:39 -070063 TypeName() = delete; \
Carl Shapiro6c21dc12011-06-20 15:20:52 -070064 DISALLOW_COPY_AND_ASSIGN(TypeName)
65
Ian Rogerscf7f1912014-10-22 22:06:39 -070066// A macro to disallow new and delete operators for a class. It goes in the private: declarations.
67#define DISALLOW_ALLOCATION() \
68 public: \
Andreas Gampe65b798e2015-04-06 09:35:22 -070069 NO_RETURN ALWAYS_INLINE void operator delete(void*, size_t) { UNREACHABLE(); } \
Ian Rogerscf7f1912014-10-22 22:06:39 -070070 private: \
71 void* operator new(size_t) = delete
72
Carl Shapiroa2e18e12011-06-21 18:57:55 -070073// The arraysize(arr) macro returns the # of elements in an array arr.
74// The expression is a compile-time constant, and therefore can be
75// used in defining new arrays, for example. If you use arraysize on
76// a pointer by mistake, you will get a compile-time error.
77//
78// One caveat is that arraysize() doesn't accept any array of an
79// anonymous type or a type defined inside a function. In these rare
Carl Shapirod2bdb572011-06-22 11:45:37 -070080// cases, you have to use the unsafe ARRAYSIZE_UNSAFE() macro below. This is
Carl Shapiroa2e18e12011-06-21 18:57:55 -070081// due to a limitation in C++'s template system. The limitation might
82// eventually be removed, but it hasn't happened yet.
83
84// This template function declaration is used in defining arraysize.
85// Note that the function doesn't need an implementation, as we only
86// use its type.
87template <typename T, size_t N>
88char (&ArraySizeHelper(T (&array)[N]))[N];
89
90#define arraysize(array) (sizeof(ArraySizeHelper(array)))
91
Carl Shapirod2bdb572011-06-22 11:45:37 -070092// ARRAYSIZE_UNSAFE performs essentially the same calculation as arraysize,
93// but can be used on anonymous types or types defined inside
94// functions. It's less safe than arraysize as it accepts some
95// (although not all) pointers. Therefore, you should use arraysize
96// whenever possible.
97//
98// The expression ARRAYSIZE_UNSAFE(a) is a compile-time constant of type
99// size_t.
100//
101// ARRAYSIZE_UNSAFE catches a few type errors. If you see a compiler error
102//
103// "warning: division by zero in ..."
104//
105// when using ARRAYSIZE_UNSAFE, you are (wrongfully) giving it a pointer.
106// You should only use ARRAYSIZE_UNSAFE on statically allocated arrays.
107//
108// The following comments are on the implementation details, and can
109// be ignored by the users.
110//
111// ARRAYSIZE_UNSAFE(arr) works by inspecting sizeof(arr) (the # of bytes in
112// the array) and sizeof(*(arr)) (the # of bytes in one array
113// element). If the former is divisible by the latter, perhaps arr is
114// indeed an array, in which case the division result is the # of
115// elements in the array. Otherwise, arr cannot possibly be an array,
116// and we generate a compiler error to prevent the code from
117// compiling.
118//
119// Since the size of bool is implementation-defined, we need to cast
120// !(sizeof(a) & sizeof(*(a))) to size_t in order to ensure the final
121// result has type size_t.
122//
123// This macro is not perfect as it wrongfully accepts certain
124// pointers, namely where the pointer size is divisible by the pointee
125// size. Since all our code has to go through a 32-bit compiler,
126// where a pointer is 4 bytes, this means all pointers to a type whose
127// size is 3 or greater than 4 will be (righteously) rejected.
128#define ARRAYSIZE_UNSAFE(a) \
Elliott Hughes362f9bc2011-10-17 18:56:41 -0700129 ((sizeof(a) / sizeof(*(a))) / static_cast<size_t>(!(sizeof(a) % sizeof(*(a)))))
Carl Shapirod2bdb572011-06-22 11:45:37 -0700130
Elliott Hughesff17f1f2012-01-24 18:12:29 -0800131#define SIZEOF_MEMBER(t, f) sizeof((reinterpret_cast<t*>(4096))->f)
Carl Shapiro59e85cd2011-06-21 10:16:23 -0700132
Elliott Hughes362f9bc2011-10-17 18:56:41 -0700133#define OFFSETOF_MEMBER(t, f) \
Ian Rogers8a01a3a2013-05-06 13:25:44 -0700134 (reinterpret_cast<const char*>(&reinterpret_cast<t*>(16)->f) - reinterpret_cast<const char*>(16)) // NOLINT
Carl Shapiro59e85cd2011-06-21 10:16:23 -0700135
Elliott Hughes93e74e82011-09-13 11:07:03 -0700136#define OFFSETOF_VOLATILE_MEMBER(t, f) \
Elliott Hughes398f64b2012-03-26 18:05:48 -0700137 (reinterpret_cast<volatile char*>(&reinterpret_cast<t*>(16)->f) - reinterpret_cast<volatile char*>(16)) // NOLINT
Elliott Hughes93e74e82011-09-13 11:07:03 -0700138
Brian Carlstromb1eba212013-07-17 18:07:19 -0700139#define PACKED(x) __attribute__ ((__aligned__(x), __packed__))
Elliott Hughes85d15452011-09-16 17:33:01 -0700140
Elliott Hughesff17f1f2012-01-24 18:12:29 -0800141#define LIKELY(x) __builtin_expect((x), true)
142#define UNLIKELY(x) __builtin_expect((x), false)
Ian Rogerscaab8c42011-10-12 12:11:18 -0700143
Dave Allison70202782013-10-22 17:52:19 -0700144// Stringify the argument.
145#define QUOTE(x) #x
146#define STRINGIFY(x) QUOTE(x)
147
Ian Rogerse8ae0dc2013-02-07 10:20:45 -0800148#ifndef NDEBUG
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800149#define ALWAYS_INLINE
150#else
Ian Rogerse8ae0dc2013-02-07 10:20:45 -0800151#define ALWAYS_INLINE __attribute__ ((always_inline))
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800152#endif
153
Bernhard Rosenkränzer46053622013-12-12 02:15:52 +0100154#ifdef __clang__
155/* clang doesn't like attributes on lambda functions */
156#define ALWAYS_INLINE_LAMBDA
157#else
158#define ALWAYS_INLINE_LAMBDA ALWAYS_INLINE
159#endif
160
Andreas Gampe86830382014-12-12 21:41:29 -0800161#define NO_INLINE __attribute__ ((noinline))
162
Anwar Ghuloum63937db2013-05-24 09:08:32 -0700163#if defined (__APPLE__)
Anwar Ghuloum1d9314c2013-05-24 10:44:48 -0700164#define HOT_ATTR
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700165#define COLD_ATTR
Anwar Ghuloum63937db2013-05-24 09:08:32 -0700166#else
Anwar Ghuloum1d9314c2013-05-24 10:44:48 -0700167#define HOT_ATTR __attribute__ ((hot))
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700168#define COLD_ATTR __attribute__ ((cold))
Anwar Ghuloum63937db2013-05-24 09:08:32 -0700169#endif
170
Ian Rogers96faf5b2013-08-09 22:05:32 -0700171#define PURE __attribute__ ((__pure__))
Mathieu Chartier4c13a3f2014-07-14 14:57:16 -0700172#define WARN_UNUSED __attribute__((warn_unused_result))
Ian Rogers96faf5b2013-08-09 22:05:32 -0700173
Ian Rogers6a3c1fc2014-10-31 00:33:20 -0700174// A deprecated function to call to create a false use of the parameter, for example:
175// int foo(int x) { UNUSED(x); return 10; }
176// to avoid compiler warnings. Going forward we prefer ATTRIBUTE_UNUSED.
177template<typename... T> void UNUSED(const T&...) {}
178
179// An attribute to place on a parameter to a function, for example:
180// int foo(int x ATTRIBUTE_UNUSED) { return 10; }
181// to avoid compiler warnings.
182#define ATTRIBUTE_UNUSED __attribute__((__unused__))
183
184// Define that a position within code is unreachable, for example:
185// int foo () { LOG(FATAL) << "Don't call me"; UNREACHABLE(); }
186// without the UNREACHABLE a return statement would be necessary.
Ian Rogers07140832014-09-30 15:43:59 -0700187#define UNREACHABLE __builtin_unreachable
Elliott Hughesc151f902012-06-21 20:33:21 -0700188
Andreas Gampe794ad762015-02-23 08:12:24 -0800189// Add the C++11 noreturn attribute.
190#define NO_RETURN [[ noreturn ]] // NOLINT[whitespace/braces] [5]
191
Ian Rogersfc787ec2014-10-09 21:56:44 -0700192// The FALLTHROUGH_INTENDED macro can be used to annotate implicit fall-through
193// between switch labels:
194// switch (x) {
195// case 40:
196// case 41:
197// if (truth_is_out_there) {
198// ++x;
199// FALLTHROUGH_INTENDED; // Use instead of/along with annotations in
200// // comments.
201// } else {
202// return x;
203// }
204// case 42:
205// ...
206//
207// As shown in the example above, the FALLTHROUGH_INTENDED macro should be
208// followed by a semicolon. It is designed to mimic control-flow statements
209// like 'break;', so it can be placed in most places where 'break;' can, but
210// only if there are no statements on the execution path between it and the
211// next switch label.
212//
213// When compiled with clang in C++11 mode, the FALLTHROUGH_INTENDED macro is
214// expanded to [[clang::fallthrough]] attribute, which is analysed when
215// performing switch labels fall-through diagnostic ('-Wimplicit-fallthrough').
216// See clang documentation on language extensions for details:
217// http://clang.llvm.org/docs/LanguageExtensions.html#clang__fallthrough
218//
219// When used with unsupported compilers, the FALLTHROUGH_INTENDED macro has no
220// effect on diagnostics.
221//
222// In either case this macro has no effect on runtime behavior and performance
223// of code.
224#if defined(__clang__) && __cplusplus >= 201103L && defined(__has_warning)
225#if __has_feature(cxx_attributes) && __has_warning("-Wimplicit-fallthrough")
226#define FALLTHROUGH_INTENDED [[clang::fallthrough]] // NOLINT
227#endif
228#endif
229
230#ifndef FALLTHROUGH_INTENDED
231#define FALLTHROUGH_INTENDED do { } while (0)
232#endif
233
Ian Rogers719d1a32014-03-06 12:13:39 -0800234// Annotalysis thread-safety analysis support.
235#if defined(__SUPPORT_TS_ANNOTATION__) || defined(__clang__)
236#define THREAD_ANNOTATION_ATTRIBUTE__(x) __attribute__((x))
Elliott Hughesf8349362012-06-18 15:00:06 -0700237#else
Ian Rogers719d1a32014-03-06 12:13:39 -0800238#define THREAD_ANNOTATION_ATTRIBUTE__(x) // no-op
239#endif
Elliott Hughesf8349362012-06-18 15:00:06 -0700240
Ian Rogers719d1a32014-03-06 12:13:39 -0800241#define ACQUIRED_AFTER(...) THREAD_ANNOTATION_ATTRIBUTE__(acquired_after(__VA_ARGS__))
242#define ACQUIRED_BEFORE(...) THREAD_ANNOTATION_ATTRIBUTE__(acquired_before(__VA_ARGS__))
243#define EXCLUSIVE_LOCKS_REQUIRED(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_locks_required(__VA_ARGS__))
244#define GUARDED_BY(x) THREAD_ANNOTATION_ATTRIBUTE__(guarded_by(x))
245#define GUARDED_VAR THREAD_ANNOTATION_ATTRIBUTE__(guarded)
246#define LOCKABLE THREAD_ANNOTATION_ATTRIBUTE__(lockable)
247#define LOCK_RETURNED(x) THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
248#define LOCKS_EXCLUDED(...) THREAD_ANNOTATION_ATTRIBUTE__(locks_excluded(__VA_ARGS__))
249#define NO_THREAD_SAFETY_ANALYSIS THREAD_ANNOTATION_ATTRIBUTE__(no_thread_safety_analysis)
Elliott Hughesf8349362012-06-18 15:00:06 -0700250#define PT_GUARDED_BY(x)
Ian Rogers719d1a32014-03-06 12:13:39 -0800251// THREAD_ANNOTATION_ATTRIBUTE__(point_to_guarded_by(x))
252#define PT_GUARDED_VAR THREAD_ANNOTATION_ATTRIBUTE__(point_to_guarded)
253#define SCOPED_LOCKABLE THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
254#define SHARED_LOCKS_REQUIRED(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_locks_required(__VA_ARGS__))
Elliott Hughesf8349362012-06-18 15:00:06 -0700255
Ian Rogers719d1a32014-03-06 12:13:39 -0800256#if defined(__clang__)
257#define EXCLUSIVE_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock_function(__VA_ARGS__))
258#define EXCLUSIVE_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock_function(__VA_ARGS__))
259#define SHARED_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_lock_function(__VA_ARGS__))
260#define SHARED_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock_function(__VA_ARGS__))
261#define UNLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(unlock_function(__VA_ARGS__))
262#else
263#define EXCLUSIVE_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock(__VA_ARGS__))
264#define EXCLUSIVE_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock(__VA_ARGS__))
265#define SHARED_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_lock(__VA_ARGS__))
266#define SHARED_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock(__VA_ARGS__))
267#define UNLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(unlock(__VA_ARGS__))
268#endif
Elliott Hughesf8349362012-06-18 15:00:06 -0700269
Brian Carlstromfc0e3212013-07-17 14:40:12 -0700270#endif // ART_RUNTIME_BASE_MACROS_H_