blob: 351507e25b34c737b171f74b77096974ba282780 [file] [log] [blame]
/*
* Copyright (C) 2008 Apple Inc. All Rights Reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. ``AS IS'' AND ANY
* EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
* EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
* PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
* OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#ifndef WTF_StdLibExtras_h
#define WTF_StdLibExtras_h
#include "base/numerics/safe_conversions.h"
#include "wtf/Assertions.h"
#include "wtf/CPU.h"
#include "wtf/LeakAnnotations.h"
#include "wtf/TypeTraits.h"
#include <cstddef>
#if ENABLE(ASSERT)
#include "wtf/Noncopyable.h"
#include "wtf/Threading.h"
class WTF_EXPORT StaticLocalVerifier {
WTF_MAKE_NONCOPYABLE(StaticLocalVerifier);
public:
StaticLocalVerifier()
: m_safelyInitialized(WTF::isBeforeThreadCreated())
, m_thread(WTF::currentThread())
{
}
bool isNotRacy()
{
// Make sure that this 1) is safely initialized, 2) keeps being called
// on the same thread, or 3) is called within
// AtomicallyInitializedStatic (i.e. with a lock held).
return m_safelyInitialized || m_thread == WTF::currentThread() || WTF::isAtomicallyInitializedStaticMutexLockHeld();
}
private:
bool m_safelyInitialized;
ThreadIdentifier m_thread;
};
#endif
namespace blink {
template<typename T>class Persistent;
};
template<typename T, bool = WTF::IsGarbageCollectedType<T>::value && !WTF::IsPersistentReferenceType<T>::value>
class StaticLocalWrapper {
public:
using WrapType = T;
static T& unwrap(T* singleton)
{
return *singleton;
}
};
template<typename T>
class StaticLocalWrapper<T, true> {
public:
using WrapType = blink::Persistent<T>;
static T& unwrap(blink::Persistent<T>* singleton)
{
ASSERT(singleton);
// If this assert triggers, you're supplying an empty ("()") 'Arguments' argument
// to DEFINE_STATIC_LOCAL() - it must be the heap object you wish to create
// as a static singleton and wrapped up with a Persistent reference.
ASSERT(*singleton);
return **singleton;
}
};
#if ENABLE(ASSERT)
#define DEFINE_STATIC_LOCAL_CHECK_THREADSAFE_ACCESS(Name) \
static StaticLocalVerifier Name##StaticLocalVerifier; \
ASSERT(Name##StaticLocalVerifier.isNotRacy())
#else
#define DEFINE_STATIC_LOCAL_CHECK_THREADSAFE_ACCESS(Name)
#endif
// Use DEFINE_STATIC_LOCAL() to declare and define a static local variable
// (static T;) so that it is leaked and its destructors are not called at exit.
// T may also be a Blink garbage collected object, in which case it is
// wrapped up by an off-heap Persistent<T> reference to the object, keeping
// it alive across GCs.
//
// To cooperate with leak detection(LSan) for Blink garbage collected objects,
// the objects owned by persistent local statics will in some cases have to be
// finalized prior to leak checking. This only applies to static references to
// Blink heap objects and what they transitively hold on to. Hence the
// LEAK_SANITIZER_REGISTER_STATIC_LOCAL() use, it taking care of the grungy
// details.
//
#define DEFINE_STATIC_LOCAL(Type, Name, Arguments) \
DEFINE_STATIC_LOCAL_CHECK_THREADSAFE_ACCESS(Name); \
using WrappedTypeFor##Name = StaticLocalWrapper<Type>::WrapType; \
static WrappedTypeFor##Name* WrappedInstanceFor##Name = LEAK_SANITIZER_REGISTER_STATIC_LOCAL(WrappedTypeFor##Name, new WrappedTypeFor##Name Arguments); \
Type& Name = StaticLocalWrapper<Type>::unwrap(WrappedInstanceFor##Name);
// Use this to declare and define a static local pointer to a ref-counted object so that
// it is leaked so that the object's destructors are not called at exit.
// This macro should be used with ref-counted objects rather than DEFINE_STATIC_LOCAL macro,
// as this macro does not lead to an extra memory allocation.
#define DEFINE_STATIC_REF(type, name, arguments) \
static type* name = PassRefPtr<type>(arguments).leakRef();
/*
* The reinterpret_cast<Type1*>([pointer to Type2]) expressions - where
* sizeof(Type1) > sizeof(Type2) - cause the following warning on ARM with GCC:
* increases required alignment of target type.
*
* An implicit or an extra static_cast<void*> bypasses the warning.
* For more info see the following bugzilla entries:
* - https://bugs.webkit.org/show_bug.cgi?id=38045
* - http://gcc.gnu.org/bugzilla/show_bug.cgi?id=43976
*/
#if CPU(ARM) && COMPILER(GCC)
template<typename Type>
bool isPointerTypeAlignmentOkay(Type* ptr)
{
return !(reinterpret_cast<intptr_t>(ptr) % __alignof__(Type));
}
template<typename TypePtr>
TypePtr reinterpret_cast_ptr(void* ptr)
{
ASSERT(isPointerTypeAlignmentOkay(reinterpret_cast<TypePtr>(ptr)));
return reinterpret_cast<TypePtr>(ptr);
}
template<typename TypePtr>
TypePtr reinterpret_cast_ptr(const void* ptr)
{
ASSERT(isPointerTypeAlignmentOkay(reinterpret_cast<TypePtr>(ptr)));
return reinterpret_cast<TypePtr>(ptr);
}
#else
template<typename Type>
bool isPointerTypeAlignmentOkay(Type*)
{
return true;
}
#define reinterpret_cast_ptr reinterpret_cast
#endif
namespace WTF {
/*
* C++'s idea of a reinterpret_cast lacks sufficient cojones.
*/
template<typename TO, typename FROM>
inline TO bitwiseCast(FROM from)
{
static_assert(sizeof(TO) == sizeof(FROM), "WTF::bitwiseCast sizeof casted types should be equal");
union {
FROM from;
TO to;
} u;
u.from = from;
return u.to;
}
template<typename To, typename From>
inline To safeCast(From value)
{
return base::checked_cast<To>(value);
}
// Use the following macros to prevent errors caused by accidental
// implicit casting of function arguments. For example, this can
// be used to prevent overflows from non-promoting conversions.
//
// Example:
//
// HAS_STRICTLY_TYPED_ARG
// void sendData(void* data, STRICTLY_TYPED_ARG(size))
// {
// ALLOW_NUMERIC_ARG_TYPES_PROMOTABLE_TO(size_t);
// ...
// }
//
// The previous example will prevent callers from passing, for example, an
// 'int'. On a 32-bit build, it will prevent use of an 'unsigned long long'.
#define HAS_STRICTLY_TYPED_ARG template<typename ActualArgType>
#define STRICTLY_TYPED_ARG(argName) ActualArgType argName
#define STRICT_ARG_TYPE(ExpectedArgType) \
static_assert(std::is_same<ActualArgType, ExpectedArgType>::value, \
"Strictly typed argument must be of type '" #ExpectedArgType "'." )
#define ALLOW_NUMERIC_ARG_TYPES_PROMOTABLE_TO(ExpectedArgType) \
static_assert(std::numeric_limits<ExpectedArgType>::is_integer == std::numeric_limits<ActualArgType>::is_integer, \
"Conversion between integer and non-integer types not allowed."); \
static_assert(sizeof(ExpectedArgType) >= sizeof(ActualArgType), \
"Truncating conversions not allowed."); \
static_assert(!std::numeric_limits<ActualArgType>::is_signed || std::numeric_limits<ExpectedArgType>::is_signed, \
"Signed to unsigned conversion not allowed."); \
static_assert((sizeof(ExpectedArgType) != sizeof(ActualArgType)) || (std::numeric_limits<ActualArgType>::is_signed == std::numeric_limits<ExpectedArgType>::is_signed), \
"Unsigned to signed conversion not allowed for types with identical size (could overflow).");
// Macro that returns a compile time constant with the length of an array, but gives an error if passed a non-array.
template<typename T, size_t Size> char (&ArrayLengthHelperFunction(T (&)[Size]))[Size];
// GCC needs some help to deduce a 0 length array.
#if COMPILER(GCC)
template<typename T> char (&ArrayLengthHelperFunction(T (&)[0]))[0];
#endif
#define WTF_ARRAY_LENGTH(array) sizeof(::WTF::ArrayLengthHelperFunction(array))
} // namespace WTF
// This version of placement new omits a 0 check.
enum NotNullTag { NotNull };
inline void* operator new(size_t, NotNullTag, void* location)
{
ASSERT(location);
return location;
}
using WTF::bitwiseCast;
using WTF::safeCast;
#endif // WTF_StdLibExtras_h