macros.h revision f85c2fb317399ab540854cd7551ac47690366543
1/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ART_RUNTIME_BASE_MACROS_H_
18#define ART_RUNTIME_BASE_MACROS_H_
19
20#include <stddef.h>  // for size_t
21#include <unistd.h>  // for TEMP_FAILURE_RETRY
22
23// bionic and glibc both have TEMP_FAILURE_RETRY, but eg Mac OS' libc doesn't.
24#ifndef TEMP_FAILURE_RETRY
25#define TEMP_FAILURE_RETRY(exp) ({ \
26  decltype(exp) _rc; \
27  do { \
28    _rc = (exp); \
29  } while (_rc == -1 && errno == EINTR); \
30  _rc; })
31#endif
32
33#define GCC_VERSION (__GNUC__ * 10000 + __GNUC_MINOR__ * 100 + __GNUC_PATCHLEVEL__)
34
35// C++11 final and override keywords that were introduced in GCC version 4.7.
36#if defined(__clang__) || GCC_VERSION >= 40700
37#define OVERRIDE override
38#define FINAL final
39#else
40#define OVERRIDE
41#define FINAL
42#endif
43
44// The COMPILE_ASSERT macro can be used to verify that a compile time
45// expression is true. For example, you could use it to verify the
46// size of a static array:
47//
48//   COMPILE_ASSERT(ARRAYSIZE(content_type_names) == CONTENT_NUM_TYPES,
49//                  content_type_names_incorrect_size);
50//
51// or to make sure a struct is smaller than a certain size:
52//
53//   COMPILE_ASSERT(sizeof(foo) < 128, foo_too_large);
54//
55// The second argument to the macro is the name of the variable. If
56// the expression is false, most compilers will issue a warning/error
57// containing the name of the variable.
58
59template <bool>
60struct CompileAssert {
61};
62
63#define COMPILE_ASSERT(expr, msg) \
64  typedef CompileAssert<(bool(expr))> msg[bool(expr) ? 1 : -1] // NOLINT
65
66// DISALLOW_COPY_AND_ASSIGN disallows the copy and operator= functions.
67// It goes in the private: declarations in a class.
68#define DISALLOW_COPY_AND_ASSIGN(TypeName) \
69  TypeName(const TypeName&);               \
70  void operator=(const TypeName&)
71
72// A macro to disallow all the implicit constructors, namely the
73// default constructor, copy constructor and operator= functions.
74//
75// This should be used in the private: declarations for a class
76// that wants to prevent anyone from instantiating it. This is
77// especially useful for classes containing only static methods.
78#define DISALLOW_IMPLICIT_CONSTRUCTORS(TypeName) \
79  TypeName();                                    \
80  DISALLOW_COPY_AND_ASSIGN(TypeName)
81
82// The arraysize(arr) macro returns the # of elements in an array arr.
83// The expression is a compile-time constant, and therefore can be
84// used in defining new arrays, for example.  If you use arraysize on
85// a pointer by mistake, you will get a compile-time error.
86//
87// One caveat is that arraysize() doesn't accept any array of an
88// anonymous type or a type defined inside a function.  In these rare
89// cases, you have to use the unsafe ARRAYSIZE_UNSAFE() macro below.  This is
90// due to a limitation in C++'s template system.  The limitation might
91// eventually be removed, but it hasn't happened yet.
92
93// This template function declaration is used in defining arraysize.
94// Note that the function doesn't need an implementation, as we only
95// use its type.
96template <typename T, size_t N>
97char (&ArraySizeHelper(T (&array)[N]))[N];
98
99#define arraysize(array) (sizeof(ArraySizeHelper(array)))
100
101// ARRAYSIZE_UNSAFE performs essentially the same calculation as arraysize,
102// but can be used on anonymous types or types defined inside
103// functions.  It's less safe than arraysize as it accepts some
104// (although not all) pointers.  Therefore, you should use arraysize
105// whenever possible.
106//
107// The expression ARRAYSIZE_UNSAFE(a) is a compile-time constant of type
108// size_t.
109//
110// ARRAYSIZE_UNSAFE catches a few type errors.  If you see a compiler error
111//
112//   "warning: division by zero in ..."
113//
114// when using ARRAYSIZE_UNSAFE, you are (wrongfully) giving it a pointer.
115// You should only use ARRAYSIZE_UNSAFE on statically allocated arrays.
116//
117// The following comments are on the implementation details, and can
118// be ignored by the users.
119//
120// ARRAYSIZE_UNSAFE(arr) works by inspecting sizeof(arr) (the # of bytes in
121// the array) and sizeof(*(arr)) (the # of bytes in one array
122// element).  If the former is divisible by the latter, perhaps arr is
123// indeed an array, in which case the division result is the # of
124// elements in the array.  Otherwise, arr cannot possibly be an array,
125// and we generate a compiler error to prevent the code from
126// compiling.
127//
128// Since the size of bool is implementation-defined, we need to cast
129// !(sizeof(a) & sizeof(*(a))) to size_t in order to ensure the final
130// result has type size_t.
131//
132// This macro is not perfect as it wrongfully accepts certain
133// pointers, namely where the pointer size is divisible by the pointee
134// size.  Since all our code has to go through a 32-bit compiler,
135// where a pointer is 4 bytes, this means all pointers to a type whose
136// size is 3 or greater than 4 will be (righteously) rejected.
137#define ARRAYSIZE_UNSAFE(a) \
138  ((sizeof(a) / sizeof(*(a))) / static_cast<size_t>(!(sizeof(a) % sizeof(*(a)))))
139
140#define SIZEOF_MEMBER(t, f) sizeof((reinterpret_cast<t*>(4096))->f)
141
142#define OFFSETOF_MEMBER(t, f) \
143  (reinterpret_cast<const char*>(&reinterpret_cast<t*>(16)->f) - reinterpret_cast<const char*>(16)) // NOLINT
144
145#define OFFSETOF_VOLATILE_MEMBER(t, f) \
146  (reinterpret_cast<volatile char*>(&reinterpret_cast<t*>(16)->f) - reinterpret_cast<volatile char*>(16)) // NOLINT
147
148#define PACKED(x) __attribute__ ((__aligned__(x), __packed__))
149
150#define LIKELY(x)       __builtin_expect((x), true)
151#define UNLIKELY(x)     __builtin_expect((x), false)
152
153// Stringify the argument.
154#define QUOTE(x) #x
155#define STRINGIFY(x) QUOTE(x)
156
157#ifndef NDEBUG
158#define ALWAYS_INLINE
159#else
160#define ALWAYS_INLINE  __attribute__ ((always_inline))
161#endif
162
163#ifdef __clang__
164/* clang doesn't like attributes on lambda functions */
165#define ALWAYS_INLINE_LAMBDA
166#else
167#define ALWAYS_INLINE_LAMBDA ALWAYS_INLINE
168#endif
169
170#if defined (__APPLE__)
171#define HOT_ATTR
172#define COLD_ATTR
173#else
174#define HOT_ATTR __attribute__ ((hot))
175#define COLD_ATTR __attribute__ ((cold))
176#endif
177
178#define PURE __attribute__ ((__pure__))
179
180template<typename T> void UNUSED(const T&) {}
181
182// Annotalysis thread-safety analysis support.
183#if defined(__SUPPORT_TS_ANNOTATION__) || defined(__clang__)
184#define THREAD_ANNOTATION_ATTRIBUTE__(x)   __attribute__((x))
185#else
186#define THREAD_ANNOTATION_ATTRIBUTE__(x)   // no-op
187#endif
188
189#define ACQUIRED_AFTER(...) THREAD_ANNOTATION_ATTRIBUTE__(acquired_after(__VA_ARGS__))
190#define ACQUIRED_BEFORE(...) THREAD_ANNOTATION_ATTRIBUTE__(acquired_before(__VA_ARGS__))
191#define EXCLUSIVE_LOCKS_REQUIRED(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_locks_required(__VA_ARGS__))
192#define GUARDED_BY(x) THREAD_ANNOTATION_ATTRIBUTE__(guarded_by(x))
193#define GUARDED_VAR THREAD_ANNOTATION_ATTRIBUTE__(guarded)
194#define LOCKABLE THREAD_ANNOTATION_ATTRIBUTE__(lockable)
195#define LOCK_RETURNED(x) THREAD_ANNOTATION_ATTRIBUTE__(lock_returned(x))
196#define LOCKS_EXCLUDED(...) THREAD_ANNOTATION_ATTRIBUTE__(locks_excluded(__VA_ARGS__))
197#define NO_THREAD_SAFETY_ANALYSIS THREAD_ANNOTATION_ATTRIBUTE__(no_thread_safety_analysis)
198#define PT_GUARDED_BY(x)
199// THREAD_ANNOTATION_ATTRIBUTE__(point_to_guarded_by(x))
200#define PT_GUARDED_VAR THREAD_ANNOTATION_ATTRIBUTE__(point_to_guarded)
201#define SCOPED_LOCKABLE THREAD_ANNOTATION_ATTRIBUTE__(scoped_lockable)
202#define SHARED_LOCKS_REQUIRED(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_locks_required(__VA_ARGS__))
203
204#if defined(__clang__)
205#define EXCLUSIVE_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock_function(__VA_ARGS__))
206#define EXCLUSIVE_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock_function(__VA_ARGS__))
207#define SHARED_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_lock_function(__VA_ARGS__))
208#define SHARED_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock_function(__VA_ARGS__))
209#define UNLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(unlock_function(__VA_ARGS__))
210#else
211#define EXCLUSIVE_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_lock(__VA_ARGS__))
212#define EXCLUSIVE_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(exclusive_trylock(__VA_ARGS__))
213#define SHARED_LOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_lock(__VA_ARGS__))
214#define SHARED_TRYLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(shared_trylock(__VA_ARGS__))
215#define UNLOCK_FUNCTION(...) THREAD_ANNOTATION_ATTRIBUTE__(unlock(__VA_ARGS__))
216#endif
217
218#endif  // ART_RUNTIME_BASE_MACROS_H_
219