| Index: third_party/WebKit/Source/wtf/Assertions.h
|
| diff --git a/third_party/WebKit/Source/wtf/Assertions.h b/third_party/WebKit/Source/wtf/Assertions.h
|
| index e9988799b3d19aaa213d11d649fd029ac223164e..60242919bd32d6b5348ea423a2774e93d9efd45d 100644
|
| --- a/third_party/WebKit/Source/wtf/Assertions.h
|
| +++ b/third_party/WebKit/Source/wtf/Assertions.h
|
| @@ -1,258 +1,9 @@
|
| -/*
|
| - * Copyright (C) 2003, 2006, 2007 Apple Inc. All rights reserved.
|
| - * Copyright (C) 2013 Google Inc. All rights reserved.
|
| - *
|
| - * Redistribution and use in source and binary forms, with or without
|
| - * modification, are permitted provided that the following conditions
|
| - * are met:
|
| - * 1. Redistributions of source code must retain the above copyright
|
| - * notice, this list of conditions and the following disclaimer.
|
| - * 2. Redistributions in binary form must reproduce the above copyright
|
| - * notice, this list of conditions and the following disclaimer in the
|
| - * documentation and/or other materials provided with the distribution.
|
| - *
|
| - * THIS SOFTWARE IS PROVIDED BY APPLE COMPUTER, INC. ``AS IS'' AND ANY
|
| - * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
| - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
| - * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE COMPUTER, INC. OR
|
| - * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
|
| - * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
| - * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
|
| - * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
| - * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
| - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
| - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
| - */
|
| +// Copyright 2017 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
|
|
| -#ifndef WTF_Assertions_h
|
| -#define WTF_Assertions_h
|
| +#include "platform/wtf/Assertions.h"
|
|
|
| -// This file uses some GCC extensions, but it should be compatible with C++ and
|
| -// Objective C++.
|
| -//
|
| -// For non-debug builds, everything is disabled by default, except for the
|
| -// RELEASE_ASSERT family of macros.
|
| -
|
| -#include <stdarg.h>
|
| -#include "base/allocator/partition_allocator/oom.h"
|
| -#include "base/gtest_prod_util.h"
|
| -#include "base/logging.h"
|
| -#include "wtf/Compiler.h"
|
| -#include "wtf/Noncopyable.h"
|
| -#include "wtf/WTFExport.h"
|
| -#include "wtf/build_config.h"
|
| -
|
| -#if OS(WIN)
|
| -#include <windows.h>
|
| -#endif
|
| -
|
| -#ifndef LOG_DISABLED
|
| -#define LOG_DISABLED !DCHECK_IS_ON()
|
| -#endif
|
| -
|
| -// WTFLogAlways() is deprecated. crbug.com/638849
|
| -WTF_EXPORT PRINTF_FORMAT(1, 2) void WTFLogAlways(const char* format, ...);
|
| -
|
| -namespace WTF {
|
| -
|
| -#if LOG_DISABLED
|
| -
|
| -#define WTF_CREATE_SCOPED_LOGGER(...) ((void)0)
|
| -#define WTF_CREATE_SCOPED_LOGGER_IF(...) ((void)0)
|
| -#define WTF_APPEND_SCOPED_LOGGER(...) ((void)0)
|
| -
|
| -#else
|
| -
|
| -// ScopedLogger wraps log messages in parentheses, with indentation proportional
|
| -// to the number of instances. This makes it easy to see the flow of control in
|
| -// the output, particularly when instrumenting recursive functions.
|
| -//
|
| -// NOTE: This class is a debugging tool, not intended for use by checked-in
|
| -// code. Please do not remove it.
|
| -//
|
| -class WTF_EXPORT ScopedLogger {
|
| - WTF_MAKE_NONCOPYABLE(ScopedLogger);
|
| -
|
| - public:
|
| - // The first message is passed to the constructor. Additional messages for
|
| - // the same scope can be added with log(). If condition is false, produce no
|
| - // output and do not create a scope.
|
| - PRINTF_FORMAT(3, 4) ScopedLogger(bool condition, const char* format, ...);
|
| - ~ScopedLogger();
|
| - PRINTF_FORMAT(2, 3) void log(const char* format, ...);
|
| -
|
| - private:
|
| - FRIEND_TEST_ALL_PREFIXES(AssertionsTest, ScopedLogger);
|
| - using PrintFunctionPtr = void (*)(const char* format, va_list args);
|
| - static void setPrintFuncForTests(PrintFunctionPtr p) {
|
| - m_printFunc = p;
|
| - } // Note: not thread safe.
|
| -
|
| - void init(const char* format, va_list args);
|
| - void writeNewlineIfNeeded();
|
| - void indent();
|
| - void print(const char* format, ...);
|
| - void printIndent();
|
| - static ScopedLogger*& current();
|
| -
|
| - ScopedLogger* const m_parent;
|
| - bool m_multiline; // The ')' will go on the same line if there is only one
|
| - // entry.
|
| - static PrintFunctionPtr m_printFunc;
|
| -};
|
| -
|
| -#define WTF_CREATE_SCOPED_LOGGER(name, ...) \
|
| - WTF::ScopedLogger name(true, __VA_ARGS__)
|
| -#define WTF_CREATE_SCOPED_LOGGER_IF(name, condition, ...) \
|
| - WTF::ScopedLogger name(condition, __VA_ARGS__)
|
| -#define WTF_APPEND_SCOPED_LOGGER(name, ...) (name.log(__VA_ARGS__))
|
| -
|
| -#endif // LOG_DISABLED
|
| -
|
| -} // namespace WTF
|
| -
|
| -// CRASH() - Raises a fatal error resulting in program termination and
|
| -// triggering either the debugger or the crash reporter.
|
| -//
|
| -// Use CRASH() in response to known, unrecoverable errors like out-of-memory.
|
| -// Macro is enabled in both debug and release mode.
|
| -// To test for unknown errors and verify assumptions, use ASSERT instead, to
|
| -// avoid impacting performance in release builds.
|
| -#ifndef CRASH
|
| -#define CRASH() IMMEDIATE_CRASH()
|
| -#endif
|
| -
|
| -// ASSERT and ASSERT_NOT_REACHED
|
| -// These macros are compiled out of release builds.
|
| -// Expressions inside them are evaluated in debug builds only.
|
| -// They are deprecated. We should use:
|
| -// - DCHECK() for ASSERT()
|
| -// - NOTREACHED() for ASSERT_NOT_REACHED()
|
| -#if OS(WIN)
|
| -// FIXME: Change to use something other than ASSERT to avoid this conflict with
|
| -// the underlying platform.
|
| -#undef ASSERT
|
| -#endif
|
| -
|
| -#define DCHECK_AT(assertion, file, line) \
|
| - LAZY_STREAM(logging::LogMessage(file, line, #assertion).stream(), \
|
| - DCHECK_IS_ON() ? !(assertion) : false)
|
| -
|
| -#if DCHECK_IS_ON()
|
| -#define ASSERT(assertion) DCHECK(assertion)
|
| -#define ASSERT_NOT_REACHED() NOTREACHED()
|
| -#else
|
| -#define ASSERT(assertion) ((void)0)
|
| -#define ASSERT_NOT_REACHED() ((void)0)
|
| -#endif
|
| -
|
| -// Users must test "#if ENABLE(SECURITY_ASSERT)", which helps ensure
|
| -// that code testing this macro has included this header.
|
| -#if defined(ADDRESS_SANITIZER) || DCHECK_IS_ON()
|
| -#define ENABLE_SECURITY_ASSERT 1
|
| -#else
|
| -#define ENABLE_SECURITY_ASSERT 0
|
| -#endif
|
| -
|
| -// SECURITY_DCHECK and SECURITY_CHECK
|
| -// Use in places where failure of the assertion indicates a possible security
|
| -// vulnerability. Classes of these vulnerabilities include bad casts, out of
|
| -// bounds accesses, use-after-frees, etc. Please be sure to file bugs for these
|
| -// failures using the security template:
|
| -// https://bugs.chromium.org/p/chromium/issues/entry?template=Security%20Bug
|
| -#if ENABLE_SECURITY_ASSERT
|
| -#define SECURITY_DCHECK(condition) \
|
| - LOG_IF(FATAL, !(condition)) << "Security DCHECK failed: " #condition ". "
|
| -// A SECURITY_CHECK failure is actually not vulnerable.
|
| -#define SECURITY_CHECK(condition) \
|
| - LOG_IF(FATAL, !(condition)) << "Security CHECK failed: " #condition ". "
|
| -#else
|
| -#define SECURITY_DCHECK(condition) ((void)0)
|
| -#define SECURITY_CHECK(condition) CHECK(condition)
|
| -#endif
|
| -
|
| -// RELEASE_ASSERT
|
| -// Use in places where failure of an assertion indicates a definite security
|
| -// vulnerability from which execution must not continue even in a release build.
|
| -// Please sure to file bugs for these failures using the security template:
|
| -// http://code.google.com/p/chromium/issues/entry?template=Security%20Bug
|
| -#if defined(ADDRESS_SANITIZER)
|
| -#define RELEASE_ASSERT(condition) SECURITY_CHECK(condition)
|
| -#else
|
| -#define RELEASE_ASSERT(condition) CHECK(condition)
|
| -#endif
|
| -
|
| -// DEFINE_COMPARISON_OPERATORS_WITH_REFERENCES
|
| -// Allow equality comparisons of Objects by reference or pointer,
|
| -// interchangeably. This can be only used on types whose equality makes no
|
| -// other sense than pointer equality.
|
| -#define DEFINE_COMPARISON_OPERATORS_WITH_REFERENCES(thisType) \
|
| - inline bool operator==(const thisType& a, const thisType& b) { \
|
| - return &a == &b; \
|
| - } \
|
| - inline bool operator==(const thisType& a, const thisType* b) { \
|
| - return &a == b; \
|
| - } \
|
| - inline bool operator==(const thisType* a, const thisType& b) { \
|
| - return a == &b; \
|
| - } \
|
| - inline bool operator!=(const thisType& a, const thisType& b) { \
|
| - return !(a == b); \
|
| - } \
|
| - inline bool operator!=(const thisType& a, const thisType* b) { \
|
| - return !(a == b); \
|
| - } \
|
| - inline bool operator!=(const thisType* a, const thisType& b) { \
|
| - return !(a == b); \
|
| - }
|
| -
|
| -// DEFINE_TYPE_CASTS
|
| -//
|
| -// toType() functions are static_cast<> wrappers with SECURITY_DCHECK. It's
|
| -// helpful to find bad casts.
|
| -//
|
| -// toTypeOrDie() has a runtime type check, and it crashes if the specified
|
| -// object is not an instance of the destination type. It is used if
|
| -// * it's hard to prevent from passing unexpected objects,
|
| -// * proceeding with the following code doesn't make sense, and
|
| -// * cost of runtime type check is acceptable.
|
| -#define DEFINE_TYPE_CASTS(thisType, argumentType, argument, pointerPredicate, \
|
| - referencePredicate) \
|
| - inline thisType* to##thisType(argumentType* argument) { \
|
| - SECURITY_DCHECK(!argument || (pointerPredicate)); \
|
| - return static_cast<thisType*>(argument); \
|
| - } \
|
| - inline const thisType* to##thisType(const argumentType* argument) { \
|
| - SECURITY_DCHECK(!argument || (pointerPredicate)); \
|
| - return static_cast<const thisType*>(argument); \
|
| - } \
|
| - inline thisType& to##thisType(argumentType& argument) { \
|
| - SECURITY_DCHECK(referencePredicate); \
|
| - return static_cast<thisType&>(argument); \
|
| - } \
|
| - inline const thisType& to##thisType(const argumentType& argument) { \
|
| - SECURITY_DCHECK(referencePredicate); \
|
| - return static_cast<const thisType&>(argument); \
|
| - } \
|
| - void to##thisType(const thisType*); \
|
| - void to##thisType(const thisType&); \
|
| - inline thisType* to##thisType##OrDie(argumentType* argument) { \
|
| - CHECK(!argument || (pointerPredicate)); \
|
| - return static_cast<thisType*>(argument); \
|
| - } \
|
| - inline const thisType* to##thisType##OrDie(const argumentType* argument) { \
|
| - CHECK(!argument || (pointerPredicate)); \
|
| - return static_cast<const thisType*>(argument); \
|
| - } \
|
| - inline thisType& to##thisType##OrDie(argumentType& argument) { \
|
| - CHECK(referencePredicate); \
|
| - return static_cast<thisType&>(argument); \
|
| - } \
|
| - inline const thisType& to##thisType##OrDie(const argumentType& argument) { \
|
| - CHECK(referencePredicate); \
|
| - return static_cast<const thisType&>(argument); \
|
| - } \
|
| - void to##thisType##OrDie(const thisType*); \
|
| - void to##thisType##OrDie(const thisType&)
|
| -
|
| -#endif // WTF_Assertions_h
|
| +// The contents of this header was moved to platform/wtf as part of
|
| +// WTF migration project. See the following post for details:
|
| +// https://groups.google.com/a/chromium.org/d/msg/blink-dev/tLdAZCTlcAA/bYXVT8gYCAAJ
|
|
|