mirror of
				https://bitbucket.org/chromiumembedded/cef
				synced 2025-06-05 21:39:12 +02:00 
			
		
		
		
	
		
			
				
	
	
		
			383 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			383 lines
		
	
	
		
			14 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| // Copyright (c) 2021 Marshall A. Greenblatt. Portions copyright (c) 2012
 | |
| // Google Inc. All rights reserved.
 | |
| //
 | |
| // Redistribution and use in source and binary forms, with or without
 | |
| // modification, are permitted provided that the following conditions are
 | |
| // met:
 | |
| //
 | |
| //    * Redistributions of source code must retain the above copyright
 | |
| // notice, this list of conditions and the following disclaimer.
 | |
| //    * Redistributions in binary form must reproduce the above
 | |
| // copyright notice, this list of conditions and the following disclaimer
 | |
| // in the documentation and/or other materials provided with the
 | |
| // distribution.
 | |
| //    * Neither the name of Google Inc. nor the name Chromium Embedded
 | |
| // Framework nor the names of its contributors may be used to endorse
 | |
| // or promote products derived from this software without specific prior
 | |
| // written permission.
 | |
| //
 | |
| // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 | |
| // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 | |
| // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 | |
| // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 | |
| // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | |
| // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 | |
| // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 | |
| // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 | |
| // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 | |
| // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 | |
| // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 | |
| 
 | |
| #ifndef CEF_INCLUDE_BASE_CEF_COMPILER_SPECIFIC_H_
 | |
| #define CEF_INCLUDE_BASE_CEF_COMPILER_SPECIFIC_H_
 | |
| #pragma once
 | |
| 
 | |
| #if defined(USING_CHROMIUM_INCLUDES)
 | |
| // When building CEF include the Chromium header directly.
 | |
| #include "base/compiler_specific.h"
 | |
| #else  // !USING_CHROMIUM_INCLUDES
 | |
| // The following is substantially similar to the Chromium implementation.
 | |
| // If the Chromium implementation diverges the below implementation should be
 | |
| // updated to match.
 | |
| 
 | |
| #include "include/base/cef_build.h"
 | |
| 
 | |
| // This is a wrapper around `__has_cpp_attribute`, which can be used to test for
 | |
| // the presence of an attribute. In case the compiler does not support this
 | |
| // macro it will simply evaluate to 0.
 | |
| //
 | |
| // References:
 | |
| // https://wg21.link/sd6#testing-for-the-presence-of-an-attribute-__has_cpp_attribute
 | |
| // https://wg21.link/cpp.cond#:__has_cpp_attribute
 | |
| #if defined(__has_cpp_attribute)
 | |
| #define HAS_CPP_ATTRIBUTE(x) __has_cpp_attribute(x)
 | |
| #else
 | |
| #define HAS_CPP_ATTRIBUTE(x) 0
 | |
| #endif
 | |
| 
 | |
| // A wrapper around `__has_builtin`, similar to HAS_CPP_ATTRIBUTE.
 | |
| #if defined(__has_builtin)
 | |
| #define HAS_BUILTIN(x) __has_builtin(x)
 | |
| #else
 | |
| #define HAS_BUILTIN(x) 0
 | |
| #endif
 | |
| 
 | |
| // __has_feature and __has_attribute don't exist for MSVC.
 | |
| #if !defined(__has_feature)
 | |
| #define __has_feature(x) 0
 | |
| #endif  // !defined(__has_feature)
 | |
| 
 | |
| #if !defined(__has_attribute)
 | |
| #define __has_attribute(x) 0
 | |
| #endif  // !defined(__has_attribute)
 | |
| 
 | |
| // Annotate a function indicating it should not be inlined.
 | |
| // Use like:
 | |
| //   NOINLINE void DoStuff() { ... }
 | |
| #if defined(COMPILER_GCC)
 | |
| #define NOINLINE __attribute__((noinline))
 | |
| #elif defined(COMPILER_MSVC)
 | |
| #define NOINLINE __declspec(noinline)
 | |
| #else
 | |
| #define NOINLINE
 | |
| #endif
 | |
| 
 | |
| #if defined(COMPILER_GCC) && defined(NDEBUG)
 | |
| #define ALWAYS_INLINE inline __attribute__((__always_inline__))
 | |
| #elif defined(COMPILER_MSVC) && defined(NDEBUG)
 | |
| #define ALWAYS_INLINE __forceinline
 | |
| #else
 | |
| #define ALWAYS_INLINE inline
 | |
| #endif
 | |
| 
 | |
| // Annotate a function indicating it should never be tail called. Useful to make
 | |
| // sure callers of the annotated function are never omitted from call-stacks.
 | |
| // To provide the complementary behavior (prevent the annotated function from
 | |
| // being omitted) look at NOINLINE. Also note that this doesn't prevent code
 | |
| // folding of multiple identical caller functions into a single signature. To
 | |
| // prevent code folding, see NO_CODE_FOLDING() in base/debug/alias.h.
 | |
| // Use like:
 | |
| //   void NOT_TAIL_CALLED FooBar();
 | |
| #if defined(__clang__) && __has_attribute(not_tail_called)
 | |
| #define NOT_TAIL_CALLED __attribute__((not_tail_called))
 | |
| #else
 | |
| #define NOT_TAIL_CALLED
 | |
| #endif
 | |
| 
 | |
| // Specify memory alignment for structs, classes, etc.
 | |
| // Use like:
 | |
| //   class ALIGNAS(16) MyClass { ... }
 | |
| //   ALIGNAS(16) int array[4];
 | |
| //
 | |
| // In most places you can use the C++11 keyword "alignas", which is preferred.
 | |
| //
 | |
| // But compilers have trouble mixing __attribute__((...)) syntax with
 | |
| // alignas(...) syntax.
 | |
| //
 | |
| // Doesn't work in clang or gcc:
 | |
| //   struct alignas(16) __attribute__((packed)) S { char c; };
 | |
| // Works in clang but not gcc:
 | |
| //   struct __attribute__((packed)) alignas(16) S2 { char c; };
 | |
| // Works in clang and gcc:
 | |
| //   struct alignas(16) S3 { char c; } __attribute__((packed));
 | |
| //
 | |
| // There are also some attributes that must be specified *before* a class
 | |
| // definition: visibility (used for exporting functions/classes) is one of
 | |
| // these attributes. This means that it is not possible to use alignas() with a
 | |
| // class that is marked as exported.
 | |
| #if defined(COMPILER_MSVC)
 | |
| #define ALIGNAS(byte_alignment) __declspec(align(byte_alignment))
 | |
| #elif defined(COMPILER_GCC)
 | |
| #define ALIGNAS(byte_alignment) __attribute__((aligned(byte_alignment)))
 | |
| #endif
 | |
| 
 | |
| // In case the compiler supports it NO_UNIQUE_ADDRESS evaluates to the C++20
 | |
| // attribute [[no_unique_address]]. This allows annotating data members so that
 | |
| // they need not have an address distinct from all other non-static data members
 | |
| // of its class.
 | |
| //
 | |
| // References:
 | |
| // * https://en.cppreference.com/w/cpp/language/attributes/no_unique_address
 | |
| // * https://wg21.link/dcl.attr.nouniqueaddr
 | |
| #if HAS_CPP_ATTRIBUTE(no_unique_address)
 | |
| #define NO_UNIQUE_ADDRESS [[no_unique_address]]
 | |
| #else
 | |
| #define NO_UNIQUE_ADDRESS
 | |
| #endif
 | |
| 
 | |
| // Tell the compiler a function is using a printf-style format string.
 | |
| // |format_param| is the one-based index of the format string parameter;
 | |
| // |dots_param| is the one-based index of the "..." parameter.
 | |
| // For v*printf functions (which take a va_list), pass 0 for dots_param.
 | |
| // (This is undocumented but matches what the system C headers do.)
 | |
| // For member functions, the implicit this parameter counts as index 1.
 | |
| #if defined(COMPILER_GCC) || defined(__clang__)
 | |
| #define PRINTF_FORMAT(format_param, dots_param) \
 | |
|   __attribute__((format(printf, format_param, dots_param)))
 | |
| #else
 | |
| #define PRINTF_FORMAT(format_param, dots_param)
 | |
| #endif
 | |
| 
 | |
| // WPRINTF_FORMAT is the same, but for wide format strings.
 | |
| // This doesn't appear to yet be implemented in any compiler.
 | |
| // See http://gcc.gnu.org/bugzilla/show_bug.cgi?id=38308 .
 | |
| #define WPRINTF_FORMAT(format_param, dots_param)
 | |
| // If available, it would look like:
 | |
| //   __attribute__((format(wprintf, format_param, dots_param)))
 | |
| 
 | |
| // Sanitizers annotations.
 | |
| #if defined(__has_attribute)
 | |
| #if __has_attribute(no_sanitize)
 | |
| #define NO_SANITIZE(what) __attribute__((no_sanitize(what)))
 | |
| #endif
 | |
| #endif
 | |
| #if !defined(NO_SANITIZE)
 | |
| #define NO_SANITIZE(what)
 | |
| #endif
 | |
| 
 | |
| // MemorySanitizer annotations.
 | |
| #if defined(MEMORY_SANITIZER) && !defined(OS_NACL)
 | |
| #include <sanitizer/msan_interface.h>
 | |
| 
 | |
| // Mark a memory region fully initialized.
 | |
| // Use this to annotate code that deliberately reads uninitialized data, for
 | |
| // example a GC scavenging root set pointers from the stack.
 | |
| #define MSAN_UNPOISON(p, size) __msan_unpoison(p, size)
 | |
| 
 | |
| // Check a memory region for initializedness, as if it was being used here.
 | |
| // If any bits are uninitialized, crash with an MSan report.
 | |
| // Use this to sanitize data which MSan won't be able to track, e.g. before
 | |
| // passing data to another process via shared memory.
 | |
| #define MSAN_CHECK_MEM_IS_INITIALIZED(p, size) \
 | |
|   __msan_check_mem_is_initialized(p, size)
 | |
| #else  // MEMORY_SANITIZER
 | |
| #define MSAN_UNPOISON(p, size)
 | |
| #define MSAN_CHECK_MEM_IS_INITIALIZED(p, size)
 | |
| #endif  // MEMORY_SANITIZER
 | |
| 
 | |
| // DISABLE_CFI_PERF -- Disable Control Flow Integrity for perf reasons.
 | |
| #if !defined(DISABLE_CFI_PERF)
 | |
| #if defined(__clang__) && defined(OFFICIAL_BUILD)
 | |
| #define DISABLE_CFI_PERF __attribute__((no_sanitize("cfi")))
 | |
| #else
 | |
| #define DISABLE_CFI_PERF
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
| // DISABLE_CFI_ICALL -- Disable Control Flow Integrity indirect call checks.
 | |
| #if !defined(DISABLE_CFI_ICALL)
 | |
| #if defined(OS_WIN)
 | |
| // Windows also needs __declspec(guard(nocf)).
 | |
| #define DISABLE_CFI_ICALL NO_SANITIZE("cfi-icall") __declspec(guard(nocf))
 | |
| #else
 | |
| #define DISABLE_CFI_ICALL NO_SANITIZE("cfi-icall")
 | |
| #endif
 | |
| #endif
 | |
| #if !defined(DISABLE_CFI_ICALL)
 | |
| #define DISABLE_CFI_ICALL
 | |
| #endif
 | |
| 
 | |
| // Macro useful for writing cross-platform function pointers.
 | |
| #if !defined(CDECL)
 | |
| #if defined(OS_WIN)
 | |
| #define CDECL __cdecl
 | |
| #else  // defined(OS_WIN)
 | |
| #define CDECL
 | |
| #endif  // defined(OS_WIN)
 | |
| #endif  // !defined(CDECL)
 | |
| 
 | |
| // Macro for hinting that an expression is likely to be false.
 | |
| #if !defined(UNLIKELY)
 | |
| #if defined(COMPILER_GCC) || defined(__clang__)
 | |
| #define UNLIKELY(x) __builtin_expect(!!(x), 0)
 | |
| #else
 | |
| #define UNLIKELY(x) (x)
 | |
| #endif  // defined(COMPILER_GCC)
 | |
| #endif  // !defined(UNLIKELY)
 | |
| 
 | |
| #if !defined(LIKELY)
 | |
| #if defined(COMPILER_GCC) || defined(__clang__)
 | |
| #define LIKELY(x) __builtin_expect(!!(x), 1)
 | |
| #else
 | |
| #define LIKELY(x) (x)
 | |
| #endif  // defined(COMPILER_GCC)
 | |
| #endif  // !defined(LIKELY)
 | |
| 
 | |
| // Compiler feature-detection.
 | |
| // clang.llvm.org/docs/LanguageExtensions.html#has-feature-and-has-extension
 | |
| #if defined(__has_feature)
 | |
| #define HAS_FEATURE(FEATURE) __has_feature(FEATURE)
 | |
| #else
 | |
| #define HAS_FEATURE(FEATURE) 0
 | |
| #endif
 | |
| 
 | |
| #if defined(COMPILER_GCC)
 | |
| #define PRETTY_FUNCTION __PRETTY_FUNCTION__
 | |
| #elif defined(COMPILER_MSVC)
 | |
| #define PRETTY_FUNCTION __FUNCSIG__
 | |
| #else
 | |
| // See https://en.cppreference.com/w/c/language/function_definition#func
 | |
| #define PRETTY_FUNCTION __func__
 | |
| #endif
 | |
| 
 | |
| #if !defined(CPU_ARM_NEON)
 | |
| #if defined(__arm__)
 | |
| #if !defined(__ARMEB__) && !defined(__ARM_EABI__) && !defined(__EABI__) && \
 | |
|     !defined(__VFP_FP__) && !defined(_WIN32_WCE) && !defined(ANDROID)
 | |
| #error Chromium does not support middle endian architecture
 | |
| #endif
 | |
| #if defined(__ARM_NEON__)
 | |
| #define CPU_ARM_NEON 1
 | |
| #endif
 | |
| #endif  // defined(__arm__)
 | |
| #endif  // !defined(CPU_ARM_NEON)
 | |
| 
 | |
| #if !defined(HAVE_MIPS_MSA_INTRINSICS)
 | |
| #if defined(__mips_msa) && defined(__mips_isa_rev) && (__mips_isa_rev >= 5)
 | |
| #define HAVE_MIPS_MSA_INTRINSICS 1
 | |
| #endif
 | |
| #endif
 | |
| 
 | |
| #if defined(__clang__) && __has_attribute(uninitialized)
 | |
| // Attribute "uninitialized" disables -ftrivial-auto-var-init=pattern for
 | |
| // the specified variable.
 | |
| // Library-wide alternative is
 | |
| // 'configs -= [ "//build/config/compiler:default_init_stack_vars" ]' in .gn
 | |
| // file.
 | |
| //
 | |
| // See "init_stack_vars" in build/config/compiler/BUILD.gn and
 | |
| // http://crbug.com/977230
 | |
| // "init_stack_vars" is enabled for non-official builds and we hope to enable it
 | |
| // in official build in 2020 as well. The flag writes fixed pattern into
 | |
| // uninitialized parts of all local variables. In rare cases such initialization
 | |
| // is undesirable and attribute can be used:
 | |
| //   1. Degraded performance
 | |
| // In most cases compiler is able to remove additional stores. E.g. if memory is
 | |
| // never accessed or properly initialized later. Preserved stores mostly will
 | |
| // not affect program performance. However if compiler failed on some
 | |
| // performance critical code we can get a visible regression in a benchmark.
 | |
| //   2. memset, memcpy calls
 | |
| // Compiler may replaces some memory writes with memset or memcpy calls. This is
 | |
| // not -ftrivial-auto-var-init specific, but it can happen more likely with the
 | |
| // flag. It can be a problem if code is not linked with C run-time library.
 | |
| //
 | |
| // Note: The flag is security risk mitigation feature. So in future the
 | |
| // attribute uses should be avoided when possible. However to enable this
 | |
| // mitigation on the most of the code we need to be less strict now and minimize
 | |
| // number of exceptions later. So if in doubt feel free to use attribute, but
 | |
| // please document the problem for someone who is going to cleanup it later.
 | |
| // E.g. platform, bot, benchmark or test name in patch description or next to
 | |
| // the attribute.
 | |
| #define STACK_UNINITIALIZED __attribute__((uninitialized))
 | |
| #else
 | |
| #define STACK_UNINITIALIZED
 | |
| #endif
 | |
| 
 | |
| // The ANALYZER_ASSUME_TRUE(bool arg) macro adds compiler-specific hints
 | |
| // to Clang which control what code paths are statically analyzed,
 | |
| // and is meant to be used in conjunction with assert & assert-like functions.
 | |
| // The expression is passed straight through if analysis isn't enabled.
 | |
| //
 | |
| // ANALYZER_SKIP_THIS_PATH() suppresses static analysis for the current
 | |
| // codepath and any other branching codepaths that might follow.
 | |
| #if defined(__clang_analyzer__)
 | |
| 
 | |
| inline constexpr bool AnalyzerNoReturn() __attribute__((analyzer_noreturn)) {
 | |
|   return false;
 | |
| }
 | |
| 
 | |
| inline constexpr bool AnalyzerAssumeTrue(bool arg) {
 | |
|   // AnalyzerNoReturn() is invoked and analysis is terminated if |arg| is
 | |
|   // false.
 | |
|   return arg || AnalyzerNoReturn();
 | |
| }
 | |
| 
 | |
| #define ANALYZER_ASSUME_TRUE(arg) ::AnalyzerAssumeTrue(!!(arg))
 | |
| #define ANALYZER_SKIP_THIS_PATH() static_cast<void>(::AnalyzerNoReturn())
 | |
| #define ANALYZER_ALLOW_UNUSED(var) static_cast<void>(var);
 | |
| 
 | |
| #else  // !defined(__clang_analyzer__)
 | |
| 
 | |
| #define ANALYZER_ASSUME_TRUE(arg) (arg)
 | |
| #define ANALYZER_SKIP_THIS_PATH()
 | |
| #define ANALYZER_ALLOW_UNUSED(var) static_cast<void>(var);
 | |
| 
 | |
| #endif  // defined(__clang_analyzer__)
 | |
| 
 | |
| // Use nomerge attribute to disable optimization of merging multiple same calls.
 | |
| #if defined(__clang__) && __has_attribute(nomerge)
 | |
| #define NOMERGE [[clang::nomerge]]
 | |
| #else
 | |
| #define NOMERGE
 | |
| #endif
 | |
| 
 | |
| // Marks a type as being eligible for the "trivial" ABI despite having a
 | |
| // non-trivial destructor or copy/move constructor. Such types can be relocated
 | |
| // after construction by simply copying their memory, which makes them eligible
 | |
| // to be passed in registers. The canonical example is std::unique_ptr.
 | |
| //
 | |
| // Use with caution; this has some subtle effects on constructor/destructor
 | |
| // ordering and will be very incorrect if the type relies on its address
 | |
| // remaining constant. When used as a function argument (by value), the value
 | |
| // may be constructed in the caller's stack frame, passed in a register, and
 | |
| // then used and destructed in the callee's stack frame. A similar thing can
 | |
| // occur when values are returned.
 | |
| //
 | |
| // TRIVIAL_ABI is not needed for types which have a trivial destructor and
 | |
| // copy/move constructors, such as base::TimeTicks and other POD.
 | |
| //
 | |
| // It is also not likely to be effective on types too large to be passed in one
 | |
| // or two registers on typical target ABIs.
 | |
| //
 | |
| // See also:
 | |
| //   https://clang.llvm.org/docs/AttributeReference.html#trivial-abi
 | |
| //   https://libcxx.llvm.org/docs/DesignDocs/UniquePtrTrivialAbi.html
 | |
| #if defined(__clang__) && __has_attribute(trivial_abi)
 | |
| #define TRIVIAL_ABI [[clang::trivial_abi]]
 | |
| #else
 | |
| #define TRIVIAL_ABI
 | |
| #endif
 | |
| 
 | |
| #endif  // !USING_CHROMIUM_INCLUDES
 | |
| #endif  // CEF_INCLUDE_BASE_CEF_COMPILER_SPECIFIC_H_
 |