Bug Summary

File:out/../src/node_options-inl.h
Warning:line 193, column 1
Potential leak of memory pointed to by field '_M_pi'

Annotated Source Code

Press '?' to see keyboard shortcuts

clang -cc1 -cc1 -triple x86_64-unknown-linux-gnu -analyze -disable-free -clear-ast-before-backend -disable-llvm-verifier -discard-value-names -main-file-name node_options.cc -analyzer-checker=core -analyzer-checker=apiModeling -analyzer-checker=unix -analyzer-checker=deadcode -analyzer-checker=cplusplus -analyzer-checker=security.insecureAPI.UncheckedReturn -analyzer-checker=security.insecureAPI.getpw -analyzer-checker=security.insecureAPI.gets -analyzer-checker=security.insecureAPI.mktemp -analyzer-checker=security.insecureAPI.mkstemp -analyzer-checker=security.insecureAPI.vfork -analyzer-checker=nullability.NullPassedToNonnull -analyzer-checker=nullability.NullReturnedFromNonnull -analyzer-output plist -w -setup-static-analyzer -mrelocation-model pic -pic-level 2 -pic-is-pie -mframe-pointer=all -fmath-errno -ffp-contract=on -fno-rounding-math -mconstructor-aliases -funwind-tables=2 -target-cpu x86-64 -tune-cpu generic -debugger-tuning=gdb -fcoverage-compilation-dir=/home/maurizio/node-v18.6.0/out -resource-dir /usr/local/lib/clang/16.0.0 -D V8_DEPRECATION_WARNINGS -D V8_IMMINENT_DEPRECATION_WARNINGS -D _GLIBCXX_USE_CXX11_ABI=1 -D NODE_OPENSSL_CONF_NAME=nodejs_conf -D NODE_OPENSSL_HAS_QUIC -D __STDC_FORMAT_MACROS -D OPENSSL_NO_PINSHARED -D OPENSSL_THREADS -D NODE_ARCH="x64" -D NODE_PLATFORM="linux" -D NODE_WANT_INTERNALS=1 -D V8_DEPRECATION_WARNINGS=1 -D NODE_OPENSSL_SYSTEM_CERT_PATH="" -D NODE_USE_NODE_CODE_CACHE=1 -D HAVE_INSPECTOR=1 -D NODE_ENABLE_LARGE_CODE_PAGES=1 -D __POSIX__ -D NODE_USE_V8_PLATFORM=1 -D NODE_HAVE_I18N_SUPPORT=1 -D HAVE_OPENSSL=1 -D OPENSSL_API_COMPAT=0x10100000L -D UCONFIG_NO_SERVICE=1 -D U_ENABLE_DYLOAD=0 -D U_STATIC_IMPLEMENTATION=1 -D U_HAVE_STD_STRING=1 -D UCONFIG_NO_BREAK_ITERATION=0 -D _LARGEFILE_SOURCE -D _FILE_OFFSET_BITS=64 -D _POSIX_C_SOURCE=200112 -D NGHTTP2_STATICLIB -D NDEBUG -D OPENSSL_USE_NODELETE -D L_ENDIAN -D OPENSSL_BUILDING_OPENSSL -D AES_ASM -D BSAES_ASM -D CMLL_ASM -D ECP_NISTZ256_ASM -D GHASH_ASM -D KECCAK1600_ASM -D MD5_ASM -D OPENSSL_BN_ASM_GF2m -D OPENSSL_BN_ASM_MONT -D OPENSSL_BN_ASM_MONT5 -D OPENSSL_CPUID_OBJ -D OPENSSL_IA32_SSE2 -D PADLOCK_ASM -D POLY1305_ASM -D SHA1_ASM -D SHA256_ASM -D SHA512_ASM -D VPAES_ASM -D WHIRLPOOL_ASM -D X25519_ASM -D OPENSSL_PIC -D NGTCP2_STATICLIB -D NGHTTP3_STATICLIB -I ../src -I /home/maurizio/node-v18.6.0/out/Release/obj/gen -I /home/maurizio/node-v18.6.0/out/Release/obj/gen/include -I /home/maurizio/node-v18.6.0/out/Release/obj/gen/src -I ../deps/googletest/include -I ../deps/histogram/src -I ../deps/uvwasi/include -I ../deps/v8/include -I ../deps/icu-small/source/i18n -I ../deps/icu-small/source/common -I ../deps/zlib -I ../deps/llhttp/include -I ../deps/cares/include -I ../deps/uv/include -I ../deps/nghttp2/lib/includes -I ../deps/brotli/c/include -I ../deps/openssl/openssl/include -I ../deps/openssl/openssl/crypto/include -I ../deps/openssl/config/archs/linux-x86_64/asm/include -I ../deps/openssl/config/archs/linux-x86_64/asm -I ../deps/ngtcp2 -I ../deps/ngtcp2/ngtcp2/lib/includes -I ../deps/ngtcp2/ngtcp2/crypto/includes -I ../deps/ngtcp2/nghttp3/lib/includes -internal-isystem /usr/lib/gcc/x86_64-redhat-linux/8/../../../../include/c++/8 -internal-isystem /usr/lib/gcc/x86_64-redhat-linux/8/../../../../include/c++/8/x86_64-redhat-linux -internal-isystem /usr/lib/gcc/x86_64-redhat-linux/8/../../../../include/c++/8/backward -internal-isystem /usr/local/lib/clang/16.0.0/include -internal-isystem /usr/local/include -internal-isystem /usr/lib/gcc/x86_64-redhat-linux/8/../../../../x86_64-redhat-linux/include -internal-externc-isystem /include -internal-externc-isystem /usr/include -O3 -Wno-unused-parameter -Wno-unused-parameter -std=gnu++17 -fdeprecated-macro -fdebug-compilation-dir=/home/maurizio/node-v18.6.0/out -ferror-limit 19 -fno-rtti -fgnuc-version=4.2.1 -vectorize-loops -vectorize-slp -analyzer-output=html -faddrsig -D__GCC_HAVE_DWARF2_CFI_ASM=1 -o /tmp/scan-build-2022-08-22-142216-507842-1 -x c++ ../src/node_options.cc

../src/node_options.cc

1#include "node_options.h" // NOLINT(build/include_inline)
2#include "node_options-inl.h"
3
4#include "env-inl.h"
5#include "node_binding.h"
6#include "node_external_reference.h"
7#include "node_internals.h"
8#if HAVE_OPENSSL1
9#include "openssl/opensslv.h"
10#endif
11
12#include <errno(*__errno_location ()).h>
13#include <sstream>
14#include <limits>
15#include <algorithm>
16#include <cstdlib> // strtoul, errno
17
18using v8::Boolean;
19using v8::Context;
20using v8::FunctionCallbackInfo;
21using v8::Integer;
22using v8::Isolate;
23using v8::Local;
24using v8::Map;
25using v8::Number;
26using v8::Object;
27using v8::Undefined;
28using v8::Value;
29
30namespace node {
31
32namespace per_process {
33Mutex cli_options_mutex;
34std::shared_ptr<PerProcessOptions> cli_options{new PerProcessOptions()};
35} // namespace per_process
36
37void DebugOptions::CheckOptions(std::vector<std::string>* errors) {
38#if !NODE_USE_V8_PLATFORM1 && !HAVE_INSPECTOR1
39 if (inspector_enabled) {
40 errors->push_back("Inspector is not available when Node is compiled "
41 "--without-v8-platform and --without-inspector.");
42 }
43#endif
44
45 if (deprecated_debug) {
46 errors->push_back("[DEP0062]: `node --debug` and `node --debug-brk` "
47 "are invalid. Please use `node --inspect` and "
48 "`node --inspect-brk` instead.");
49 }
50
51 std::vector<std::string> destinations =
52 SplitString(inspect_publish_uid_string, ',');
53 inspect_publish_uid.console = false;
54 inspect_publish_uid.http = false;
55 for (const std::string& destination : destinations) {
56 if (destination == "stderr") {
57 inspect_publish_uid.console = true;
58 } else if (destination == "http") {
59 inspect_publish_uid.http = true;
60 } else {
61 errors->push_back("--inspect-publish-uid destination can be "
62 "stderr or http");
63 }
64 }
65}
66
67void PerProcessOptions::CheckOptions(std::vector<std::string>* errors) {
68#if HAVE_OPENSSL1
69 if (use_openssl_ca && use_bundled_ca) {
70 errors->push_back("either --use-openssl-ca or --use-bundled-ca can be "
71 "used, not both");
72 }
73
74 // Any value less than 2 disables use of the secure heap.
75 if (secure_heap >= 2) {
76 if ((secure_heap & (secure_heap - 1)) != 0)
77 errors->push_back("--secure-heap must be a power of 2");
78 secure_heap_min =
79 std::min({
80 secure_heap,
81 secure_heap_min,
82 static_cast<int64_t>(std::numeric_limits<int>::max())});
83 secure_heap_min = std::max(static_cast<int64_t>(2), secure_heap_min);
84 if ((secure_heap_min & (secure_heap_min - 1)) != 0)
85 errors->push_back("--secure-heap-min must be a power of 2");
86 }
87#endif // HAVE_OPENSSL
88
89 if (use_largepages != "off" &&
90 use_largepages != "on" &&
91 use_largepages != "silent") {
92 errors->push_back("invalid value for --use-largepages");
93 }
94 per_isolate->CheckOptions(errors);
95}
96
97void PerIsolateOptions::CheckOptions(std::vector<std::string>* errors) {
98 per_env->CheckOptions(errors);
99}
100
101void EnvironmentOptions::CheckOptions(std::vector<std::string>* errors) {
102 if (has_policy_integrity_string && experimental_policy.empty()) {
103 errors->push_back("--policy-integrity requires "
104 "--experimental-policy be enabled");
105 }
106 if (has_policy_integrity_string && experimental_policy_integrity.empty()) {
107 errors->push_back("--policy-integrity cannot be empty");
108 }
109
110 if (!module_type.empty()) {
111 if (module_type != "commonjs" && module_type != "module") {
112 errors->push_back("--input-type must be \"module\" or \"commonjs\"");
113 }
114 }
115
116 if (!experimental_specifier_resolution.empty()) {
117 if (experimental_specifier_resolution != "node" &&
118 experimental_specifier_resolution != "explicit") {
119 errors->push_back(
120 "invalid value for --experimental-specifier-resolution");
121 }
122 }
123
124 if (syntax_check_only && has_eval_string) {
125 errors->push_back("either --check or --eval can be used, not both");
126 }
127
128 if (!unhandled_rejections.empty() &&
129 unhandled_rejections != "warn-with-error-code" &&
130 unhandled_rejections != "throw" &&
131 unhandled_rejections != "strict" &&
132 unhandled_rejections != "warn" &&
133 unhandled_rejections != "none") {
134 errors->push_back("invalid value for --unhandled-rejections");
135 }
136
137 if (tls_min_v1_3 && tls_max_v1_2) {
138 errors->push_back("either --tls-min-v1.3 or --tls-max-v1.2 can be "
139 "used, not both");
140 }
141
142 if (heap_snapshot_near_heap_limit < 0) {
143 errors->push_back("--heap-snapshot-near-heap-limit must not be negative");
144 }
145
146 if (test_runner) {
147 if (syntax_check_only) {
148 errors->push_back("either --test or --check can be used, not both");
149 }
150
151 if (has_eval_string) {
152 errors->push_back("either --test or --eval can be used, not both");
153 }
154
155 if (force_repl) {
156 errors->push_back("either --test or --interactive can be used, not both");
157 }
158
159 if (debug_options_.inspector_enabled) {
160 errors->push_back("the inspector cannot be used with --test");
161 }
162 }
163
164#if HAVE_INSPECTOR1
165 if (!cpu_prof) {
166 if (!cpu_prof_name.empty()) {
167 errors->push_back("--cpu-prof-name must be used with --cpu-prof");
168 }
169 if (!cpu_prof_dir.empty()) {
170 errors->push_back("--cpu-prof-dir must be used with --cpu-prof");
171 }
172 // We can't catch the case where the value passed is the default value,
173 // then the option just becomes a noop which is fine.
174 if (cpu_prof_interval != kDefaultCpuProfInterval) {
175 errors->push_back("--cpu-prof-interval must be used with --cpu-prof");
176 }
177 }
178
179 if (cpu_prof && cpu_prof_dir.empty() && !diagnostic_dir.empty()) {
180 cpu_prof_dir = diagnostic_dir;
181 }
182
183 if (!heap_prof) {
184 if (!heap_prof_name.empty()) {
185 errors->push_back("--heap-prof-name must be used with --heap-prof");
186 }
187 if (!heap_prof_dir.empty()) {
188 errors->push_back("--heap-prof-dir must be used with --heap-prof");
189 }
190 // We can't catch the case where the value passed is the default value,
191 // then the option just becomes a noop which is fine.
192 if (heap_prof_interval != kDefaultHeapProfInterval) {
193 errors->push_back("--heap-prof-interval must be used with --heap-prof");
194 }
195 }
196
197 if (heap_prof && heap_prof_dir.empty() && !diagnostic_dir.empty()) {
198 heap_prof_dir = diagnostic_dir;
199 }
200
201 debug_options_.CheckOptions(errors);
202#endif // HAVE_INSPECTOR
203}
204
205namespace options_parser {
206
207class DebugOptionsParser : public OptionsParser<DebugOptions> {
208 public:
209 DebugOptionsParser();
210};
211
212class EnvironmentOptionsParser : public OptionsParser<EnvironmentOptions> {
213 public:
214 EnvironmentOptionsParser();
215 explicit EnvironmentOptionsParser(const DebugOptionsParser& dop)
216 : EnvironmentOptionsParser() {
217 Insert(dop, &EnvironmentOptions::get_debug_options);
218 }
219};
220
221class PerIsolateOptionsParser : public OptionsParser<PerIsolateOptions> {
222 public:
223 PerIsolateOptionsParser() = delete;
224 explicit PerIsolateOptionsParser(const EnvironmentOptionsParser& eop);
225};
226
227class PerProcessOptionsParser : public OptionsParser<PerProcessOptions> {
228 public:
229 PerProcessOptionsParser() = delete;
230 explicit PerProcessOptionsParser(const PerIsolateOptionsParser& iop);
231};
232
233#if HAVE_INSPECTOR1
234const DebugOptionsParser _dop_instance{};
235const EnvironmentOptionsParser _eop_instance{_dop_instance};
236
237// This Parse is not dead code. It is used by embedders (e.g., Electron).
238template <>
239void Parse(
240 StringVector* const args, StringVector* const exec_args,
241 StringVector* const v8_args,
242 DebugOptions* const options,
243 OptionEnvvarSettings required_env_settings, StringVector* const errors) {
244 _dop_instance.Parse(
245 args, exec_args, v8_args, options, required_env_settings, errors);
246}
247#else
248const EnvironmentOptionsParser _eop_instance{};
249#endif // HAVE_INSPECTOR
250const PerIsolateOptionsParser _piop_instance{_eop_instance};
251const PerProcessOptionsParser _ppop_instance{_piop_instance};
252
253template <>
254void Parse(
255 StringVector* const args, StringVector* const exec_args,
256 StringVector* const v8_args,
257 PerIsolateOptions* const options,
258 OptionEnvvarSettings required_env_settings, StringVector* const errors) {
259 _piop_instance.Parse(
260 args, exec_args, v8_args, options, required_env_settings, errors);
261}
262
263template <>
264void Parse(
265 StringVector* const args, StringVector* const exec_args,
266 StringVector* const v8_args,
267 PerProcessOptions* const options,
268 OptionEnvvarSettings required_env_settings, StringVector* const errors) {
269 _ppop_instance.Parse(
270 args, exec_args, v8_args, options, required_env_settings, errors);
271}
272
273// XXX: If you add an option here, please also add it to doc/node.1 and
274// doc/api/cli.md
275// TODO(addaleax): Make that unnecessary.
276
277DebugOptionsParser::DebugOptionsParser() {
278 AddOption("--inspect-port",
279 "set host:port for inspector",
280 &DebugOptions::host_port,
281 kAllowedInEnvironment);
282 AddAlias("--debug-port", "--inspect-port");
283
284 AddOption("--inspect",
285 "activate inspector on host:port (default: 127.0.0.1:9229)",
286 &DebugOptions::inspector_enabled,
287 kAllowedInEnvironment);
288 AddAlias("--inspect=", { "--inspect-port", "--inspect" });
289
290 AddOption("--debug", "", &DebugOptions::deprecated_debug);
291 AddAlias("--debug=", "--debug");
292 AddOption("--debug-brk", "", &DebugOptions::deprecated_debug);
293 AddAlias("--debug-brk=", "--debug-brk");
294
295 AddOption("--inspect-brk",
296 "activate inspector on host:port and break at start of user script",
297 &DebugOptions::break_first_line,
298 kAllowedInEnvironment);
299 Implies("--inspect-brk", "--inspect");
300 AddAlias("--inspect-brk=", { "--inspect-port", "--inspect-brk" });
301
302 AddOption("--inspect-brk-node", "", &DebugOptions::break_node_first_line);
303 Implies("--inspect-brk-node", "--inspect");
304 AddAlias("--inspect-brk-node=", { "--inspect-port", "--inspect-brk-node" });
305
306 AddOption("--inspect-publish-uid",
307 "comma separated list of destinations for inspector uid"
308 "(default: stderr,http)",
309 &DebugOptions::inspect_publish_uid_string,
310 kAllowedInEnvironment);
311}
312
313EnvironmentOptionsParser::EnvironmentOptionsParser() {
314 AddOption("--conditions",
315 "additional user conditions for conditional exports and imports",
316 &EnvironmentOptions::conditions,
317 kAllowedInEnvironment);
318 AddAlias("-C", "--conditions");
319 AddOption("--diagnostic-dir",
320 "set dir for all output files"
321 " (default: current working directory)",
322 &EnvironmentOptions::diagnostic_dir,
323 kAllowedInEnvironment);
324 AddOption("--dns-result-order",
325 "set default value of verbatim in dns.lookup. Options are "
326 "'ipv4first' (IPv4 addresses are placed before IPv6 addresses) "
327 "'verbatim' (addresses are in the order the DNS resolver "
328 "returned)",
329 &EnvironmentOptions::dns_result_order,
330 kAllowedInEnvironment);
331 AddOption("--enable-source-maps",
332 "Source Map V3 support for stack traces",
333 &EnvironmentOptions::enable_source_maps,
334 kAllowedInEnvironment);
335 AddOption("--experimental-abortcontroller", "",
336 NoOp{}, kAllowedInEnvironment);
337 AddOption("--experimental-fetch",
338 "experimental Fetch API",
339 &EnvironmentOptions::experimental_fetch,
340 kAllowedInEnvironment,
341 true);
342 AddOption("--experimental-global-webcrypto",
343 "expose experimental Web Crypto API on the global scope",
344 &EnvironmentOptions::experimental_global_web_crypto,
345 kAllowedInEnvironment);
346 AddOption("--experimental-json-modules", "", NoOp{}, kAllowedInEnvironment);
347 AddOption("--experimental-loader",
348 "use the specified module as a custom loader",
349 &EnvironmentOptions::userland_loaders,
350 kAllowedInEnvironment);
351 AddAlias("--loader", "--experimental-loader");
352 AddOption("--experimental-modules", "", NoOp{}, kAllowedInEnvironment);
353 AddOption("--experimental-network-imports",
354 "experimental https: support for the ES Module loader",
355 &EnvironmentOptions::experimental_https_modules,
356 kAllowedInEnvironment);
357 AddOption("--experimental-wasm-modules",
358 "experimental ES Module support for webassembly modules",
359 &EnvironmentOptions::experimental_wasm_modules,
360 kAllowedInEnvironment);
361 AddOption("--experimental-import-meta-resolve",
362 "experimental ES Module import.meta.resolve() support",
363 &EnvironmentOptions::experimental_import_meta_resolve,
364 kAllowedInEnvironment);
365 AddOption("--experimental-policy",
366 "use the specified file as a "
367 "security policy",
368 &EnvironmentOptions::experimental_policy,
369 kAllowedInEnvironment);
370 AddOption("[has_policy_integrity_string]",
371 "",
372 &EnvironmentOptions::has_policy_integrity_string);
373 AddOption("--policy-integrity",
374 "ensure the security policy contents match "
375 "the specified integrity",
376 &EnvironmentOptions::experimental_policy_integrity,
377 kAllowedInEnvironment);
378 Implies("--policy-integrity", "[has_policy_integrity_string]");
379 AddOption("--experimental-repl-await",
380 "experimental await keyword support in REPL",
381 &EnvironmentOptions::experimental_repl_await,
382 kAllowedInEnvironment,
383 true);
384 AddOption("--experimental-vm-modules",
385 "experimental ES Module support in vm module",
386 &EnvironmentOptions::experimental_vm_modules,
387 kAllowedInEnvironment);
388 AddOption("--experimental-worker", "", NoOp{}, kAllowedInEnvironment);
389 AddOption("--experimental-report", "", NoOp{}, kAllowedInEnvironment);
390 AddOption("--experimental-wasi-unstable-preview1",
391 "experimental WASI support",
392 &EnvironmentOptions::experimental_wasi,
393 kAllowedInEnvironment);
394 AddOption("--expose-internals", "", &EnvironmentOptions::expose_internals);
395 AddOption("--frozen-intrinsics",
396 "experimental frozen intrinsics support",
397 &EnvironmentOptions::frozen_intrinsics,
398 kAllowedInEnvironment);
399 AddOption("--heapsnapshot-signal",
400 "Generate heap snapshot on specified signal",
401 &EnvironmentOptions::heap_snapshot_signal,
402 kAllowedInEnvironment);
403 AddOption("--heapsnapshot-near-heap-limit",
404 "Generate heap snapshots whenever V8 is approaching "
405 "the heap limit. No more than the specified number of "
406 "heap snapshots will be generated.",
407 &EnvironmentOptions::heap_snapshot_near_heap_limit,
408 kAllowedInEnvironment);
409 AddOption("--http-parser", "", NoOp{}, kAllowedInEnvironment);
410 AddOption("--insecure-http-parser",
411 "use an insecure HTTP parser that accepts invalid HTTP headers",
412 &EnvironmentOptions::insecure_http_parser,
413 kAllowedInEnvironment);
414 AddOption("--input-type",
415 "set module type for string input",
416 &EnvironmentOptions::module_type,
417 kAllowedInEnvironment);
418 AddOption("--experimental-specifier-resolution",
419 "Select extension resolution algorithm for es modules; "
420 "either 'explicit' (default) or 'node'",
421 &EnvironmentOptions::experimental_specifier_resolution,
422 kAllowedInEnvironment);
423 AddAlias("--es-module-specifier-resolution",
424 "--experimental-specifier-resolution");
425 AddOption("--deprecation",
426 "silence deprecation warnings",
427 &EnvironmentOptions::deprecation,
428 kAllowedInEnvironment,
429 true);
430 AddOption("--force-async-hooks-checks",
431 "disable checks for async_hooks",
432 &EnvironmentOptions::force_async_hooks_checks,
433 kAllowedInEnvironment,
434 true);
435 AddOption(
436 "--force-node-api-uncaught-exceptions-policy",
437 "enforces 'uncaughtException' event on Node API asynchronous callbacks",
438 &EnvironmentOptions::force_node_api_uncaught_exceptions_policy,
439 kAllowedInEnvironment,
440 false);
441 AddOption("--addons",
442 "disable loading native addons",
443 &EnvironmentOptions::allow_native_addons,
444 kAllowedInEnvironment,
445 true);
446 AddOption("--global-search-paths",
447 "disable global module search paths",
448 &EnvironmentOptions::global_search_paths,
449 kAllowedInEnvironment,
450 true);
451 AddOption("--warnings",
452 "silence all process warnings",
453 &EnvironmentOptions::warnings,
454 kAllowedInEnvironment,
455 true);
456 AddOption("--force-context-aware",
457 "disable loading non-context-aware addons",
458 &EnvironmentOptions::force_context_aware,
459 kAllowedInEnvironment);
460 AddOption("--pending-deprecation",
461 "emit pending deprecation warnings",
462 &EnvironmentOptions::pending_deprecation,
463 kAllowedInEnvironment);
464 AddOption("--preserve-symlinks",
465 "preserve symbolic links when resolving",
466 &EnvironmentOptions::preserve_symlinks,
467 kAllowedInEnvironment);
468 AddOption("--preserve-symlinks-main",
469 "preserve symbolic links when resolving the main module",
470 &EnvironmentOptions::preserve_symlinks_main,
471 kAllowedInEnvironment);
472 AddOption("--prof",
473 "Generate V8 profiler output.",
474 V8Option{});
475 AddOption("--prof-process",
476 "process V8 profiler output generated using --prof",
477 &EnvironmentOptions::prof_process);
478 // Options after --prof-process are passed through to the prof processor.
479 AddAlias("--prof-process", { "--prof-process", "--" });
480#if HAVE_INSPECTOR1
481 AddOption("--cpu-prof",
482 "Start the V8 CPU profiler on start up, and write the CPU profile "
483 "to disk before exit. If --cpu-prof-dir is not specified, write "
484 "the profile to the current working directory.",
485 &EnvironmentOptions::cpu_prof);
486 AddOption("--cpu-prof-name",
487 "specified file name of the V8 CPU profile generated with "
488 "--cpu-prof",
489 &EnvironmentOptions::cpu_prof_name);
490 AddOption("--cpu-prof-interval",
491 "specified sampling interval in microseconds for the V8 CPU "
492 "profile generated with --cpu-prof. (default: 1000)",
493 &EnvironmentOptions::cpu_prof_interval);
494 AddOption("--cpu-prof-dir",
495 "Directory where the V8 profiles generated by --cpu-prof will be "
496 "placed. Does not affect --prof.",
497 &EnvironmentOptions::cpu_prof_dir);
498 AddOption(
499 "--heap-prof",
500 "Start the V8 heap profiler on start up, and write the heap profile "
501 "to disk before exit. If --heap-prof-dir is not specified, write "
502 "the profile to the current working directory.",
503 &EnvironmentOptions::heap_prof);
504 AddOption("--heap-prof-name",
505 "specified file name of the V8 heap profile generated with "
506 "--heap-prof",
507 &EnvironmentOptions::heap_prof_name);
508 AddOption("--heap-prof-dir",
509 "Directory where the V8 heap profiles generated by --heap-prof "
510 "will be placed.",
511 &EnvironmentOptions::heap_prof_dir);
512 AddOption("--heap-prof-interval",
513 "specified sampling interval in bytes for the V8 heap "
514 "profile generated with --heap-prof. (default: 512 * 1024)",
515 &EnvironmentOptions::heap_prof_interval);
516#endif // HAVE_INSPECTOR
517 AddOption("--max-http-header-size",
518 "set the maximum size of HTTP headers (default: 16384 (16KB))",
519 &EnvironmentOptions::max_http_header_size,
520 kAllowedInEnvironment);
521 AddOption("--redirect-warnings",
522 "write warnings to file instead of stderr",
523 &EnvironmentOptions::redirect_warnings,
524 kAllowedInEnvironment);
525 AddOption("--test",
526 "launch test runner on startup",
527 &EnvironmentOptions::test_runner);
528 AddOption("--test-only",
529 "run tests with 'only' option set",
530 &EnvironmentOptions::test_only,
531 kAllowedInEnvironment);
532 AddOption("--test-udp-no-try-send", "", // For testing only.
533 &EnvironmentOptions::test_udp_no_try_send);
534 AddOption("--throw-deprecation",
535 "throw an exception on deprecations",
536 &EnvironmentOptions::throw_deprecation,
537 kAllowedInEnvironment);
538 AddOption("--trace-atomics-wait",
539 "trace Atomics.wait() operations",
540 &EnvironmentOptions::trace_atomics_wait,
541 kAllowedInEnvironment);
542 AddOption("--trace-deprecation",
543 "show stack traces on deprecations",
544 &EnvironmentOptions::trace_deprecation,
545 kAllowedInEnvironment);
546 AddOption("--trace-exit",
547 "show stack trace when an environment exits",
548 &EnvironmentOptions::trace_exit,
549 kAllowedInEnvironment);
550 AddOption("--trace-sync-io",
551 "show stack trace when use of sync IO is detected after the "
552 "first tick",
553 &EnvironmentOptions::trace_sync_io,
554 kAllowedInEnvironment);
555 AddOption("--trace-tls",
556 "prints TLS packet trace information to stderr",
557 &EnvironmentOptions::trace_tls,
558 kAllowedInEnvironment);
559 AddOption("--trace-uncaught",
560 "show stack traces for the `throw` behind uncaught exceptions",
561 &EnvironmentOptions::trace_uncaught,
562 kAllowedInEnvironment);
563 AddOption("--trace-warnings",
564 "show stack traces on process warnings",
565 &EnvironmentOptions::trace_warnings,
566 kAllowedInEnvironment);
567 AddOption("--extra-info-on-fatal-exception",
568 "hide extra information on fatal exception that causes exit",
569 &EnvironmentOptions::extra_info_on_fatal_exception,
570 kAllowedInEnvironment,
571 true);
572 AddOption("--unhandled-rejections",
573 "define unhandled rejections behavior. Options are 'strict' "
574 "(always raise an error), 'throw' (raise an error unless "
575 "'unhandledRejection' hook is set), 'warn' (log a warning), 'none' "
576 "(silence warnings), 'warn-with-error-code' (log a warning and set "
577 "exit code 1 unless 'unhandledRejection' hook is set). (default: "
578 "throw)",
579 &EnvironmentOptions::unhandled_rejections,
580 kAllowedInEnvironment);
581 AddOption("--verify-base-objects",
582 "", /* undocumented, only for debugging */
583 &EnvironmentOptions::verify_base_objects,
584 kAllowedInEnvironment);
585
586 AddOption("--check",
587 "syntax check script without executing",
588 &EnvironmentOptions::syntax_check_only);
589 AddAlias("-c", "--check");
590 // This option is only so that we can tell --eval with an empty string from
591 // no eval at all. Having it not start with a dash makes it inaccessible
592 // from the parser itself, but available for using Implies().
593 // TODO(addaleax): When moving --help over to something generated from the
594 // programmatic descriptions, this will need some special care.
595 // (See also [ssl_openssl_cert_store] below.)
596 AddOption("[has_eval_string]", "", &EnvironmentOptions::has_eval_string);
597 AddOption("--eval", "evaluate script", &EnvironmentOptions::eval_string);
598 Implies("--eval", "[has_eval_string]");
599 AddOption("--print",
600 "evaluate script and print result",
601 &EnvironmentOptions::print_eval);
602 AddAlias("-e", "--eval");
603 AddAlias("--print <arg>", "-pe");
604 AddAlias("-pe", { "--print", "--eval" });
605 AddAlias("-p", "--print");
606 AddOption("--require",
607 "module to preload (option can be repeated)",
608 &EnvironmentOptions::preload_modules,
609 kAllowedInEnvironment);
610 AddAlias("-r", "--require");
611 AddOption("--interactive",
612 "always enter the REPL even if stdin does not appear "
613 "to be a terminal",
614 &EnvironmentOptions::force_repl);
615 AddAlias("-i", "--interactive");
616
617 AddOption("--napi-modules", "", NoOp{}, kAllowedInEnvironment);
618
619 AddOption("--tls-keylog",
620 "log TLS decryption keys to named file for traffic analysis",
621 &EnvironmentOptions::tls_keylog, kAllowedInEnvironment);
622
623 AddOption("--tls-min-v1.0",
624 "set default TLS minimum to TLSv1.0 (default: TLSv1.2)",
625 &EnvironmentOptions::tls_min_v1_0,
626 kAllowedInEnvironment);
627 AddOption("--tls-min-v1.1",
628 "set default TLS minimum to TLSv1.1 (default: TLSv1.2)",
629 &EnvironmentOptions::tls_min_v1_1,
630 kAllowedInEnvironment);
631 AddOption("--tls-min-v1.2",
632 "set default TLS minimum to TLSv1.2 (default: TLSv1.2)",
633 &EnvironmentOptions::tls_min_v1_2,
634 kAllowedInEnvironment);
635 AddOption("--tls-min-v1.3",
636 "set default TLS minimum to TLSv1.3 (default: TLSv1.2)",
637 &EnvironmentOptions::tls_min_v1_3,
638 kAllowedInEnvironment);
639 AddOption("--tls-max-v1.2",
640 "set default TLS maximum to TLSv1.2 (default: TLSv1.3)",
641 &EnvironmentOptions::tls_max_v1_2,
642 kAllowedInEnvironment);
643 // Current plan is:
644 // - 11.x and below: TLS1.3 is opt-in with --tls-max-v1.3
645 // - 12.x: TLS1.3 is opt-out with --tls-max-v1.2
646 // In either case, support both options they are uniformly available.
647 AddOption("--tls-max-v1.3",
648 "set default TLS maximum to TLSv1.3 (default: TLSv1.3)",
649 &EnvironmentOptions::tls_max_v1_3,
650 kAllowedInEnvironment);
651}
652
653PerIsolateOptionsParser::PerIsolateOptionsParser(
654 const EnvironmentOptionsParser& eop) {
655 AddOption("--track-heap-objects",
656 "track heap object allocations for heap snapshots",
657 &PerIsolateOptions::track_heap_objects,
658 kAllowedInEnvironment);
659
660 // Explicitly add some V8 flags to mark them as allowed in NODE_OPTIONS.
661 AddOption("--abort-on-uncaught-exception",
662 "aborting instead of exiting causes a core file to be generated "
663 "for analysis",
664 V8Option{},
665 kAllowedInEnvironment);
666 AddOption("--interpreted-frames-native-stack",
667 "help system profilers to translate JavaScript interpreted frames",
668 V8Option{}, kAllowedInEnvironment);
669 AddOption("--max-old-space-size", "", V8Option{}, kAllowedInEnvironment);
670 AddOption("--perf-basic-prof", "", V8Option{}, kAllowedInEnvironment);
671 AddOption("--perf-basic-prof-only-functions",
672 "",
673 V8Option{},
674 kAllowedInEnvironment);
675 AddOption("--perf-prof", "", V8Option{}, kAllowedInEnvironment);
676 AddOption("--perf-prof-unwinding-info",
677 "",
678 V8Option{},
679 kAllowedInEnvironment);
680 AddOption("--stack-trace-limit", "", V8Option{}, kAllowedInEnvironment);
681 AddOption("--disallow-code-generation-from-strings",
682 "disallow eval and friends",
683 V8Option{},
684 kAllowedInEnvironment);
685 AddOption("--huge-max-old-generation-size",
686 "increase default maximum heap size on machines with 16GB memory "
687 "or more",
688 V8Option{},
689 kAllowedInEnvironment);
690 AddOption("--jitless",
691 "disable runtime allocation of executable memory",
692 V8Option{},
693 kAllowedInEnvironment);
694 AddOption("--report-uncaught-exception",
695 "generate diagnostic report on uncaught exceptions",
696 &PerIsolateOptions::report_uncaught_exception,
697 kAllowedInEnvironment);
698 AddOption("--report-on-signal",
699 "generate diagnostic report upon receiving signals",
700 &PerIsolateOptions::report_on_signal,
701 kAllowedInEnvironment);
702 AddOption("--report-signal",
703 "causes diagnostic report to be produced on provided signal,"
704 " unsupported in Windows. (default: SIGUSR2)",
705 &PerIsolateOptions::report_signal,
706 kAllowedInEnvironment);
707 Implies("--report-signal", "--report-on-signal");
708
709 AddOption(
710 "--experimental-top-level-await", "", NoOp{}, kAllowedInEnvironment);
711
712 Insert(eop, &PerIsolateOptions::get_per_env_options);
1
Calling 'OptionsParser::Insert'
713}
714
715PerProcessOptionsParser::PerProcessOptionsParser(
716 const PerIsolateOptionsParser& iop) {
717 AddOption("--title",
718 "the process title to use on startup",
719 &PerProcessOptions::title,
720 kAllowedInEnvironment);
721 AddOption("--trace-event-categories",
722 "comma separated list of trace event categories to record",
723 &PerProcessOptions::trace_event_categories,
724 kAllowedInEnvironment);
725 AddOption("--trace-event-file-pattern",
726 "Template string specifying the filepath for the trace-events "
727 "data, it supports ${rotation} and ${pid}.",
728 &PerProcessOptions::trace_event_file_pattern,
729 kAllowedInEnvironment);
730 AddAlias("--trace-events-enabled", {
731 "--trace-event-categories", "v8,node,node.async_hooks" });
732 AddOption("--v8-pool-size",
733 "set V8's thread pool size",
734 &PerProcessOptions::v8_thread_pool_size,
735 kAllowedInEnvironment);
736 AddOption("--zero-fill-buffers",
737 "automatically zero-fill all newly allocated Buffer and "
738 "SlowBuffer instances",
739 &PerProcessOptions::zero_fill_all_buffers,
740 kAllowedInEnvironment);
741 AddOption("--debug-arraybuffer-allocations",
742 "", /* undocumented, only for debugging */
743 &PerProcessOptions::debug_arraybuffer_allocations,
744 kAllowedInEnvironment);
745 AddOption("--disable-proto",
746 "disable Object.prototype.__proto__",
747 &PerProcessOptions::disable_proto,
748 kAllowedInEnvironment);
749 AddOption("--build-snapshot",
750 "Generate a snapshot blob when the process exits."
751 "Currently only supported in the node_mksnapshot binary.",
752 &PerProcessOptions::build_snapshot,
753 kDisallowedInEnvironment);
754 AddOption("--node-snapshot",
755 "", // It's a debug-only option.
756 &PerProcessOptions::node_snapshot,
757 kAllowedInEnvironment);
758 // 12.x renamed this inadvertently, so alias it for consistency within the
759 // release line, while using the original name for consistency with older
760 // release lines.
761 AddOption("--security-revert", "", &PerProcessOptions::security_reverts);
762 AddAlias("--security-reverts", "--security-revert");
763 AddOption("--completion-bash",
764 "print source-able bash completion script",
765 &PerProcessOptions::print_bash_completion);
766 AddOption("--help",
767 "print node command line options",
768 &PerProcessOptions::print_help);
769 AddAlias("-h", "--help");
770 AddOption(
771 "--version", "print Node.js version", &PerProcessOptions::print_version);
772 AddAlias("-v", "--version");
773 AddOption("--v8-options",
774 "print V8 command line options",
775 &PerProcessOptions::print_v8_help);
776 AddOption("--report-compact",
777 "output compact single-line JSON",
778 &PerProcessOptions::report_compact,
779 kAllowedInEnvironment);
780 AddOption("--report-dir",
781 "define custom report pathname."
782 " (default: current working directory)",
783 &PerProcessOptions::report_directory,
784 kAllowedInEnvironment);
785 AddAlias("--report-directory", "--report-dir");
786 AddOption("--report-filename",
787 "define custom report file name."
788 " (default: YYYYMMDD.HHMMSS.PID.SEQUENCE#.txt)",
789 &PerProcessOptions::report_filename,
790 kAllowedInEnvironment);
791 AddOption("--report-on-fatalerror",
792 "generate diagnostic report on fatal (internal) errors",
793 &PerProcessOptions::report_on_fatalerror,
794 kAllowedInEnvironment);
795
796#ifdef NODE_HAVE_I18N_SUPPORT1
797 AddOption("--icu-data-dir",
798 "set ICU data load path to dir (overrides NODE_ICU_DATA)"
799#ifndef NODE_HAVE_SMALL_ICU
800 " (note: linked-in ICU data is present)"
801#endif
802 ,
803 &PerProcessOptions::icu_data_dir,
804 kAllowedInEnvironment);
805#endif
806
807#if HAVE_OPENSSL1
808 AddOption("--openssl-config",
809 "load OpenSSL configuration from the specified file "
810 "(overrides OPENSSL_CONF)",
811 &PerProcessOptions::openssl_config,
812 kAllowedInEnvironment);
813 AddOption("--tls-cipher-list",
814 "use an alternative default TLS cipher list",
815 &PerProcessOptions::tls_cipher_list,
816 kAllowedInEnvironment);
817 AddOption("--use-openssl-ca",
818 "use OpenSSL's default CA store"
819#if defined(NODE_OPENSSL_CERT_STORE)
820 " (default)"
821#endif
822 ,
823 &PerProcessOptions::use_openssl_ca,
824 kAllowedInEnvironment);
825 AddOption("--use-bundled-ca",
826 "use bundled CA store"
827#if !defined(NODE_OPENSSL_CERT_STORE)
828 " (default)"
829#endif
830 ,
831 &PerProcessOptions::use_bundled_ca,
832 kAllowedInEnvironment);
833 // Similar to [has_eval_string] above, except that the separation between
834 // this and use_openssl_ca only exists for option validation after parsing.
835 // This is not ideal.
836 AddOption("[ssl_openssl_cert_store]",
837 "",
838 &PerProcessOptions::ssl_openssl_cert_store);
839 Implies("--use-openssl-ca", "[ssl_openssl_cert_store]");
840 ImpliesNot("--use-bundled-ca", "[ssl_openssl_cert_store]");
841 AddOption("--enable-fips",
842 "enable FIPS crypto at startup",
843 &PerProcessOptions::enable_fips_crypto,
844 kAllowedInEnvironment);
845 AddOption("--force-fips",
846 "force FIPS crypto (cannot be disabled)",
847 &PerProcessOptions::force_fips_crypto,
848 kAllowedInEnvironment);
849 AddOption("--secure-heap",
850 "total size of the OpenSSL secure heap",
851 &PerProcessOptions::secure_heap,
852 kAllowedInEnvironment);
853 AddOption("--secure-heap-min",
854 "minimum allocation size from the OpenSSL secure heap",
855 &PerProcessOptions::secure_heap_min,
856 kAllowedInEnvironment);
857#endif // HAVE_OPENSSL
858#if OPENSSL_VERSION_MAJOR3 >= 3
859 AddOption("--openssl-legacy-provider",
860 "enable OpenSSL 3.0 legacy provider",
861 &PerProcessOptions::openssl_legacy_provider,
862 kAllowedInEnvironment);
863 AddOption("--openssl-shared-config",
864 "enable OpenSSL shared configuration",
865 &PerProcessOptions::openssl_shared_config,
866 kAllowedInEnvironment);
867
868#endif // OPENSSL_VERSION_MAJOR
869 AddOption("--use-largepages",
870 "Map the Node.js static code to large pages. Options are "
871 "'off' (the default value, meaning do not map), "
872 "'on' (map and ignore failure, reporting it to stderr), "
873 "or 'silent' (map and silently ignore failure)",
874 &PerProcessOptions::use_largepages,
875 kAllowedInEnvironment);
876
877 AddOption("--trace-sigint",
878 "enable printing JavaScript stacktrace on SIGINT",
879 &PerProcessOptions::trace_sigint,
880 kAllowedInEnvironment);
881
882 Insert(iop, &PerProcessOptions::get_per_isolate_options);
883
884 AddOption("--node-memory-debug",
885 "Run with extra debug checks for memory leaks in Node.js itself",
886 NoOp{}, kAllowedInEnvironment);
887 Implies("--node-memory-debug", "--debug-arraybuffer-allocations");
888 Implies("--node-memory-debug", "--verify-base-objects");
889}
890
891inline std::string RemoveBrackets(const std::string& host) {
892 if (!host.empty() && host.front() == '[' && host.back() == ']')
893 return host.substr(1, host.size() - 2);
894 else
895 return host;
896}
897
898inline int ParseAndValidatePort(const std::string& port,
899 std::vector<std::string>* errors) {
900 char* endptr;
901 errno(*__errno_location ()) = 0;
902 const unsigned long result = // NOLINT(runtime/int)
903 strtoul(port.c_str(), &endptr, 10);
904 if (errno(*__errno_location ()) != 0 || *endptr != '\0'||
905 (result != 0 && result < 1024) || result > 65535) {
906 errors->push_back(" must be 0 or in range 1024 to 65535.");
907 }
908 return static_cast<int>(result);
909}
910
911HostPort SplitHostPort(const std::string& arg,
912 std::vector<std::string>* errors) {
913 // remove_brackets only works if no port is specified
914 // so if it has an effect only an IPv6 address was specified.
915 std::string host = RemoveBrackets(arg);
916 if (host.length() < arg.length())
917 return HostPort{host, DebugOptions::kDefaultInspectorPort};
918
919 size_t colon = arg.rfind(':');
920 if (colon == std::string::npos) {
921 // Either a port number or a host name. Assume that
922 // if it's not all decimal digits, it's a host name.
923 for (char c : arg) {
924 if (c < '0' || c > '9') {
925 return HostPort{arg, DebugOptions::kDefaultInspectorPort};
926 }
927 }
928 return HostPort { "", ParseAndValidatePort(arg, errors) };
929 }
930 // Host and port found:
931 return HostPort { RemoveBrackets(arg.substr(0, colon)),
932 ParseAndValidatePort(arg.substr(colon + 1), errors) };
933}
934
935std::string GetBashCompletion() {
936 Mutex::ScopedLock lock(per_process::cli_options_mutex);
937 const auto& parser = _ppop_instance;
938
939 std::ostringstream out;
940
941 out << "_node_complete() {\n"
942 " local cur_word options\n"
943 " cur_word=\"${COMP_WORDS[COMP_CWORD]}\"\n"
944 " if [[ \"${cur_word}\" == -* ]] ; then\n"
945 " COMPREPLY=( $(compgen -W '";
946
947 for (const auto& item : parser.options_) {
948 if (item.first[0] != '[') {
949 out << item.first << " ";
950 }
951 }
952 for (const auto& item : parser.aliases_) {
953 if (item.first[0] != '[') {
954 out << item.first << " ";
955 }
956 }
957 if (parser.aliases_.size() > 0) {
958 out.seekp(-1, out.cur); // Strip the trailing space
959 }
960
961 out << "' -- \"${cur_word}\") )\n"
962 " return 0\n"
963 " else\n"
964 " COMPREPLY=( $(compgen -f \"${cur_word}\") )\n"
965 " return 0\n"
966 " fi\n"
967 "}\n"
968 "complete -o filenames -o nospace -o bashdefault "
969 "-F _node_complete node node_g";
970 return out.str();
971}
972
973// Return a map containing all the options and their metadata as well
974// as the aliases
975void GetCLIOptions(const FunctionCallbackInfo<Value>& args) {
976 Mutex::ScopedLock lock(per_process::cli_options_mutex);
977 Environment* env = Environment::GetCurrent(args);
978 if (!env->has_run_bootstrapping_code()) {
979 // No code because this is an assertion.
980 return env->ThrowError(
981 "Should not query options before bootstrapping is done");
982 }
983 env->set_has_serialized_options(true);
984
985 Isolate* isolate = env->isolate();
986 Local<Context> context = env->context();
987
988 // Temporarily act as if the current Environment's/IsolateData's options were
989 // the default options, i.e. like they are the ones we'd access for global
990 // options parsing, so that all options are available from the main parser.
991 auto original_per_isolate = per_process::cli_options->per_isolate;
992 per_process::cli_options->per_isolate = env->isolate_data()->options();
993 auto original_per_env = per_process::cli_options->per_isolate->per_env;
994 per_process::cli_options->per_isolate->per_env = env->options();
995 auto on_scope_leave = OnScopeLeave([&]() {
996 per_process::cli_options->per_isolate->per_env = original_per_env;
997 per_process::cli_options->per_isolate = original_per_isolate;
998 });
999
1000 Local<Map> options = Map::New(isolate);
1001 if (options
1002 ->SetPrototype(context, env->primordials_safe_map_prototype_object())
1003 .IsNothing()) {
1004 return;
1005 }
1006
1007 for (const auto& item : _ppop_instance.options_) {
1008 Local<Value> value;
1009 const auto& option_info = item.second;
1010 auto field = option_info.field;
1011 PerProcessOptions* opts = per_process::cli_options.get();
1012 switch (option_info.type) {
1013 case kNoOp:
1014 case kV8Option:
1015 // Special case for --abort-on-uncaught-exception which is also
1016 // respected by Node.js internals
1017 if (item.first == "--abort-on-uncaught-exception") {
1018 value = Boolean::New(
1019 isolate, original_per_env->abort_on_uncaught_exception);
1020 } else {
1021 value = Undefined(isolate);
1022 }
1023 break;
1024 case kBoolean:
1025 value = Boolean::New(isolate,
1026 *_ppop_instance.Lookup<bool>(field, opts));
1027 break;
1028 case kInteger:
1029 value = Number::New(
1030 isolate,
1031 static_cast<double>(*_ppop_instance.Lookup<int64_t>(field, opts)));
1032 break;
1033 case kUInteger:
1034 value = Number::New(
1035 isolate,
1036 static_cast<double>(*_ppop_instance.Lookup<uint64_t>(field, opts)));
1037 break;
1038 case kString:
1039 if (!ToV8Value(context,
1040 *_ppop_instance.Lookup<std::string>(field, opts))
1041 .ToLocal(&value)) {
1042 return;
1043 }
1044 break;
1045 case kStringList:
1046 if (!ToV8Value(context,
1047 *_ppop_instance.Lookup<StringVector>(field, opts))
1048 .ToLocal(&value)) {
1049 return;
1050 }
1051 break;
1052 case kHostPort: {
1053 const HostPort& host_port =
1054 *_ppop_instance.Lookup<HostPort>(field, opts);
1055 Local<Object> obj = Object::New(isolate);
1056 Local<Value> host;
1057 if (!ToV8Value(context, host_port.host()).ToLocal(&host) ||
1058 obj->Set(context, env->host_string(), host).IsNothing() ||
1059 obj->Set(context,
1060 env->port_string(),
1061 Integer::New(isolate, host_port.port()))
1062 .IsNothing()) {
1063 return;
1064 }
1065 value = obj;
1066 break;
1067 }
1068 default:
1069 UNREACHABLE()do { static const node::AssertionInfo args = { "../src/node_options.cc"
":" "1069", "\"Unreachable code reached\"", __PRETTY_FUNCTION__
}; node::Assert(args); } while (0)
;
1070 }
1071 CHECK(!value.IsEmpty())do { if (__builtin_expect(!!(!(!value.IsEmpty())), 0)) { do {
static const node::AssertionInfo args = { "../src/node_options.cc"
":" "1071", "!value.IsEmpty()", __PRETTY_FUNCTION__ }; node::
Assert(args); } while (0); } } while (0)
;
1072
1073 Local<Value> name = ToV8Value(context, item.first).ToLocalChecked();
1074 Local<Object> info = Object::New(isolate);
1075 Local<Value> help_text;
1076 if (!ToV8Value(context, option_info.help_text).ToLocal(&help_text) ||
1077 !info->Set(context, env->help_text_string(), help_text)
1078 .FromMaybe(false) ||
1079 !info->Set(context,
1080 env->env_var_settings_string(),
1081 Integer::New(isolate,
1082 static_cast<int>(option_info.env_setting)))
1083 .FromMaybe(false) ||
1084 !info->Set(context,
1085 env->type_string(),
1086 Integer::New(isolate, static_cast<int>(option_info.type)))
1087 .FromMaybe(false) ||
1088 !info->Set(context,
1089 env->default_is_true_string(),
1090 Boolean::New(isolate, option_info.default_is_true))
1091 .FromMaybe(false) ||
1092 info->Set(context, env->value_string(), value).IsNothing() ||
1093 options->Set(context, name, info).IsEmpty()) {
1094 return;
1095 }
1096 }
1097
1098 Local<Value> aliases;
1099 if (!ToV8Value(context, _ppop_instance.aliases_).ToLocal(&aliases)) return;
1100
1101 if (aliases.As<Object>()
1102 ->SetPrototype(context, env->primordials_safe_map_prototype_object())
1103 .IsNothing()) {
1104 return;
1105 }
1106
1107 Local<Object> ret = Object::New(isolate);
1108 if (ret->Set(context, env->options_string(), options).IsNothing() ||
1109 ret->Set(context, env->aliases_string(), aliases).IsNothing()) {
1110 return;
1111 }
1112
1113 args.GetReturnValue().Set(ret);
1114}
1115
1116void GetEmbedderOptions(const FunctionCallbackInfo<Value>& args) {
1117 Environment* env = Environment::GetCurrent(args);
1118 if (!env->has_run_bootstrapping_code()) {
1119 // No code because this is an assertion.
1120 return env->ThrowError(
1121 "Should not query options before bootstrapping is done");
1122 }
1123 Isolate* isolate = args.GetIsolate();
1124 Local<Context> context = env->context();
1125 Local<Object> ret = Object::New(isolate);
1126
1127 if (ret->Set(context,
1128 FIXED_ONE_BYTE_STRING(env->isolate(), "shouldNotRegisterESMLoader"),
1129 Boolean::New(isolate, env->should_not_register_esm_loader()))
1130 .IsNothing()) return;
1131
1132 if (ret->Set(context,
1133 FIXED_ONE_BYTE_STRING(env->isolate(), "noGlobalSearchPaths"),
1134 Boolean::New(isolate, env->no_global_search_paths()))
1135 .IsNothing()) return;
1136
1137 args.GetReturnValue().Set(ret);
1138}
1139
1140void Initialize(Local<Object> target,
1141 Local<Value> unused,
1142 Local<Context> context,
1143 void* priv) {
1144 Environment* env = Environment::GetCurrent(context);
1145 Isolate* isolate = env->isolate();
1146 env->SetMethodNoSideEffect(target, "getCLIOptions", GetCLIOptions);
1147 env->SetMethodNoSideEffect(target, "getEmbedderOptions", GetEmbedderOptions);
1148
1149 Local<Object> env_settings = Object::New(isolate);
1150 NODE_DEFINE_CONSTANT(env_settings, kAllowedInEnvironment)do { v8::Isolate* isolate = env_settings->GetIsolate(); v8
::Local<v8::Context> context = isolate->GetCurrentContext
(); v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kAllowedInEnvironment", v8::NewStringType::kInternalized
).ToLocalChecked(); v8::Local<v8::Number> constant_value
= v8::Number::New(isolate, static_cast<double>(kAllowedInEnvironment
)); v8::PropertyAttribute constant_attributes = static_cast<
v8::PropertyAttribute>(v8::ReadOnly | v8::DontDelete); (env_settings
)->DefineOwnProperty(context, constant_name, constant_value
, constant_attributes).Check(); } while (0)
;
1151 NODE_DEFINE_CONSTANT(env_settings, kDisallowedInEnvironment)do { v8::Isolate* isolate = env_settings->GetIsolate(); v8
::Local<v8::Context> context = isolate->GetCurrentContext
(); v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kDisallowedInEnvironment", v8::NewStringType::kInternalized
).ToLocalChecked(); v8::Local<v8::Number> constant_value
= v8::Number::New(isolate, static_cast<double>(kDisallowedInEnvironment
)); v8::PropertyAttribute constant_attributes = static_cast<
v8::PropertyAttribute>(v8::ReadOnly | v8::DontDelete); (env_settings
)->DefineOwnProperty(context, constant_name, constant_value
, constant_attributes).Check(); } while (0)
;
1152 target
1153 ->Set(
1154 context, FIXED_ONE_BYTE_STRING(isolate, "envSettings"), env_settings)
1155 .Check();
1156
1157 Local<Object> types = Object::New(isolate);
1158 NODE_DEFINE_CONSTANT(types, kNoOp)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kNoOp", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kNoOp)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1159 NODE_DEFINE_CONSTANT(types, kV8Option)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kV8Option", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kV8Option)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1160 NODE_DEFINE_CONSTANT(types, kBoolean)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kBoolean", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kBoolean)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1161 NODE_DEFINE_CONSTANT(types, kInteger)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kInteger", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kInteger)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1162 NODE_DEFINE_CONSTANT(types, kUInteger)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kUInteger", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kUInteger)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1163 NODE_DEFINE_CONSTANT(types, kString)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kString", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kString)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1164 NODE_DEFINE_CONSTANT(types, kHostPort)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kHostPort", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kHostPort)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1165 NODE_DEFINE_CONSTANT(types, kStringList)do { v8::Isolate* isolate = types->GetIsolate(); v8::Local
<v8::Context> context = isolate->GetCurrentContext()
; v8::Local<v8::String> constant_name = v8::String::NewFromUtf8
(isolate, "kStringList", v8::NewStringType::kInternalized).ToLocalChecked
(); v8::Local<v8::Number> constant_value = v8::Number::
New(isolate, static_cast<double>(kStringList)); v8::PropertyAttribute
constant_attributes = static_cast<v8::PropertyAttribute>
(v8::ReadOnly | v8::DontDelete); (types)->DefineOwnProperty
(context, constant_name, constant_value, constant_attributes)
.Check(); } while (0)
;
1166 target->Set(context, FIXED_ONE_BYTE_STRING(isolate, "types"), types)
1167 .Check();
1168}
1169
1170void RegisterExternalReferences(ExternalReferenceRegistry* registry) {
1171 registry->Register(GetCLIOptions);
1172 registry->Register(GetEmbedderOptions);
1173}
1174} // namespace options_parser
1175
1176void HandleEnvOptions(std::shared_ptr<EnvironmentOptions> env_options) {
1177 HandleEnvOptions(env_options, [](const char* name) {
1178 std::string text;
1179 return credentials::SafeGetenv(name, &text) ? text : "";
1180 });
1181}
1182
1183void HandleEnvOptions(std::shared_ptr<EnvironmentOptions> env_options,
1184 std::function<std::string(const char*)> opt_getter) {
1185 env_options->pending_deprecation =
1186 opt_getter("NODE_PENDING_DEPRECATION") == "1";
1187
1188 env_options->preserve_symlinks = opt_getter("NODE_PRESERVE_SYMLINKS") == "1";
1189
1190 env_options->preserve_symlinks_main =
1191 opt_getter("NODE_PRESERVE_SYMLINKS_MAIN") == "1";
1192
1193 if (env_options->redirect_warnings.empty())
1194 env_options->redirect_warnings = opt_getter("NODE_REDIRECT_WARNINGS");
1195}
1196
1197std::vector<std::string> ParseNodeOptionsEnvVar(
1198 const std::string& node_options, std::vector<std::string>* errors) {
1199 std::vector<std::string> env_argv;
1200
1201 bool is_in_string = false;
1202 bool will_start_new_arg = true;
1203 for (std::string::size_type index = 0; index < node_options.size(); ++index) {
1204 char c = node_options.at(index);
1205
1206 // Backslashes escape the following character
1207 if (c == '\\' && is_in_string) {
1208 if (index + 1 == node_options.size()) {
1209 errors->push_back("invalid value for NODE_OPTIONS "
1210 "(invalid escape)\n");
1211 return env_argv;
1212 } else {
1213 c = node_options.at(++index);
1214 }
1215 } else if (c == ' ' && !is_in_string) {
1216 will_start_new_arg = true;
1217 continue;
1218 } else if (c == '"') {
1219 is_in_string = !is_in_string;
1220 continue;
1221 }
1222
1223 if (will_start_new_arg) {
1224 env_argv.emplace_back(std::string(1, c));
1225 will_start_new_arg = false;
1226 } else {
1227 env_argv.back() += c;
1228 }
1229 }
1230
1231 if (is_in_string) {
1232 errors->push_back("invalid value for NODE_OPTIONS "
1233 "(unterminated string)\n");
1234 }
1235 return env_argv;
1236}
1237} // namespace node
1238
1239NODE_MODULE_CONTEXT_AWARE_INTERNAL(options, node::options_parser::Initialize)static node::node_module _module = { 108, NM_F_INTERNAL, nullptr
, "../src/node_options.cc", nullptr, (node::addon_context_register_func
)(node::options_parser::Initialize), "options", nullptr, nullptr
}; void _register_options() { node_module_register(&_module
); }
1240NODE_MODULE_EXTERNAL_REFERENCE(options,void _register_external_reference_options( node::ExternalReferenceRegistry
* registry) { node::options_parser::RegisterExternalReferences
(registry); }
1241 node::options_parser::RegisterExternalReferences)void _register_external_reference_options( node::ExternalReferenceRegistry
* registry) { node::options_parser::RegisterExternalReferences
(registry); }

../src/node_options-inl.h

1#ifndef SRC_NODE_OPTIONS_INL_H_
2#define SRC_NODE_OPTIONS_INL_H_
3
4#if defined(NODE_WANT_INTERNALS1) && NODE_WANT_INTERNALS1
5
6#include <cstdlib>
7#include "node_options.h"
8#include "util.h"
9
10namespace node {
11
12PerIsolateOptions* PerProcessOptions::get_per_isolate_options() {
13 return per_isolate.get();
14}
15
16EnvironmentOptions* PerIsolateOptions::get_per_env_options() {
17 return per_env.get();
18}
19
20namespace options_parser {
21
22template <typename Options>
23void OptionsParser<Options>::AddOption(const char* name,
24 const char* help_text,
25 bool Options::* field,
26 OptionEnvvarSettings env_setting,
27 bool default_is_true) {
28 options_.emplace(name,
29 OptionInfo{kBoolean,
30 std::make_shared<SimpleOptionField<bool>>(field),
31 env_setting,
32 help_text,
33 default_is_true});
34}
35
36template <typename Options>
37void OptionsParser<Options>::AddOption(const char* name,
38 const char* help_text,
39 uint64_t Options::* field,
40 OptionEnvvarSettings env_setting) {
41 options_.emplace(
42 name,
43 OptionInfo{kUInteger,
44 std::make_shared<SimpleOptionField<uint64_t>>(field),
45 env_setting,
46 help_text});
47}
48
49template <typename Options>
50void OptionsParser<Options>::AddOption(const char* name,
51 const char* help_text,
52 int64_t Options::* field,
53 OptionEnvvarSettings env_setting) {
54 options_.emplace(
55 name,
56 OptionInfo{kInteger,
57 std::make_shared<SimpleOptionField<int64_t>>(field),
58 env_setting,
59 help_text});
60}
61
62template <typename Options>
63void OptionsParser<Options>::AddOption(const char* name,
64 const char* help_text,
65 std::string Options::* field,
66 OptionEnvvarSettings env_setting) {
67 options_.emplace(
68 name,
69 OptionInfo{kString,
70 std::make_shared<SimpleOptionField<std::string>>(field),
71 env_setting,
72 help_text});
73}
74
75template <typename Options>
76void OptionsParser<Options>::AddOption(
77 const char* name,
78 const char* help_text,
79 std::vector<std::string> Options::* field,
80 OptionEnvvarSettings env_setting) {
81 options_.emplace(name, OptionInfo {
82 kStringList,
83 std::make_shared<SimpleOptionField<std::vector<std::string>>>(field),
84 env_setting,
85 help_text
86 });
87}
88
89template <typename Options>
90void OptionsParser<Options>::AddOption(const char* name,
91 const char* help_text,
92 HostPort Options::* field,
93 OptionEnvvarSettings env_setting) {
94 options_.emplace(
95 name,
96 OptionInfo{kHostPort,
97 std::make_shared<SimpleOptionField<HostPort>>(field),
98 env_setting,
99 help_text});
100}
101
102template <typename Options>
103void OptionsParser<Options>::AddOption(const char* name,
104 const char* help_text,
105 NoOp no_op_tag,
106 OptionEnvvarSettings env_setting) {
107 options_.emplace(name, OptionInfo{kNoOp, nullptr, env_setting, help_text});
108}
109
110template <typename Options>
111void OptionsParser<Options>::AddOption(const char* name,
112 const char* help_text,
113 V8Option v8_option_tag,
114 OptionEnvvarSettings env_setting) {
115 options_.emplace(name,
116 OptionInfo{kV8Option, nullptr, env_setting, help_text});
117}
118
119template <typename Options>
120void OptionsParser<Options>::AddAlias(const char* from,
121 const char* to) {
122 aliases_[from] = { to };
123}
124
125template <typename Options>
126void OptionsParser<Options>::AddAlias(const char* from,
127 const std::vector<std::string>& to) {
128 aliases_[from] = to;
129}
130
131template <typename Options>
132void OptionsParser<Options>::AddAlias(
133 const char* from,
134 const std::initializer_list<std::string>& to) {
135 AddAlias(from, std::vector<std::string>(to));
136}
137
138template <typename Options>
139void OptionsParser<Options>::Implies(const char* from,
140 const char* to) {
141 auto it = options_.find(to);
142 CHECK_NE(it, options_.end())do { if (__builtin_expect(!!(!((it) != (options_.end()))), 0)
) { do { static const node::AssertionInfo args = { "../src/node_options-inl.h"
":" "142", "(it) != (options_.end())", __PRETTY_FUNCTION__ }
; node::Assert(args); } while (0); } } while (0)
;
143 CHECK(it->second.type == kBoolean || it->second.type == kV8Option)do { if (__builtin_expect(!!(!(it->second.type == kBoolean
|| it->second.type == kV8Option)), 0)) { do { static const
node::AssertionInfo args = { "../src/node_options-inl.h" ":"
"143", "it->second.type == kBoolean || it->second.type == kV8Option"
, __PRETTY_FUNCTION__ }; node::Assert(args); } while (0); } }
while (0)
;
144 implications_.emplace(
145 from, Implication{it->second.type, to, it->second.field, true});
146}
147
148template <typename Options>
149void OptionsParser<Options>::ImpliesNot(const char* from,
150 const char* to) {
151 auto it = options_.find(to);
152 CHECK_NE(it, options_.end())do { if (__builtin_expect(!!(!((it) != (options_.end()))), 0)
) { do { static const node::AssertionInfo args = { "../src/node_options-inl.h"
":" "152", "(it) != (options_.end())", __PRETTY_FUNCTION__ }
; node::Assert(args); } while (0); } } while (0)
;
153 CHECK_EQ(it->second.type, kBoolean)do { if (__builtin_expect(!!(!((it->second.type) == (kBoolean
))), 0)) { do { static const node::AssertionInfo args = { "../src/node_options-inl.h"
":" "153", "(it->second.type) == (kBoolean)", __PRETTY_FUNCTION__
}; node::Assert(args); } while (0); } } while (0)
;
154 implications_.emplace(
155 from, Implication{it->second.type, to, it->second.field, false});
156}
157
158template <typename Options>
159template <typename OriginalField, typename ChildOptions>
160auto OptionsParser<Options>::Convert(
161 std::shared_ptr<OriginalField> original,
162 ChildOptions* (Options::* get_child)()) {
163 // If we have a field on ChildOptions, and we want to access it from an
164 // Options instance, we call get_child() on the original Options and then
165 // access it, i.e. this class implements a kind of function chaining.
166 struct AdaptedField : BaseOptionField {
167 void* LookupImpl(Options* options) const override {
168 return original->LookupImpl((options->*get_child)());
169 }
170
171 AdaptedField(
172 std::shared_ptr<OriginalField> original,
173 ChildOptions* (Options::* get_child)())
174 : original(original), get_child(get_child) {}
175
176 std::shared_ptr<OriginalField> original;
177 ChildOptions* (Options::* get_child)();
178 };
179
180 return std::shared_ptr<BaseOptionField>(
4
Calling constructor for 'shared_ptr<node::options_parser::OptionsParser<node::PerIsolateOptions>::BaseOptionField>'
14
Returning from constructor for 'shared_ptr<node::options_parser::OptionsParser<node::PerIsolateOptions>::BaseOptionField>'
181 new AdaptedField(original, get_child));
182}
183template <typename Options>
184template <typename ChildOptions>
185auto OptionsParser<Options>::Convert(
186 typename OptionsParser<ChildOptions>::OptionInfo original,
187 ChildOptions* (Options::* get_child)()) {
188 return OptionInfo{original.type,
189 Convert(original.field, get_child),
3
Calling 'OptionsParser::Convert'
15
Returned allocated memory
190 original.env_setting,
191 original.help_text,
192 original.default_is_true};
193}
16
Potential leak of memory pointed to by field '_M_pi'
194
195template <typename Options>
196template <typename ChildOptions>
197auto OptionsParser<Options>::Convert(
198 typename OptionsParser<ChildOptions>::Implication original,
199 ChildOptions* (Options::* get_child)()) {
200 return Implication{
201 original.type,
202 original.name,
203 Convert(original.target_field, get_child),
204 original.target_value,
205 };
206}
207
208template <typename Options>
209template <typename ChildOptions>
210void OptionsParser<Options>::Insert(
211 const OptionsParser<ChildOptions>& child_options_parser,
212 ChildOptions* (Options::* get_child)()) {
213 aliases_.insert(std::begin(child_options_parser.aliases_),
214 std::end(child_options_parser.aliases_));
215
216 for (const auto& pair : child_options_parser.options_)
217 options_.emplace(pair.first, Convert(pair.second, get_child));
2
Calling 'OptionsParser::Convert'
218
219 for (const auto& pair : child_options_parser.implications_)
220 implications_.emplace(pair.first, Convert(pair.second, get_child));
221}
222
223inline std::string NotAllowedInEnvErr(const std::string& arg) {
224 return arg + " is not allowed in NODE_OPTIONS";
225}
226
227inline std::string RequiresArgumentErr(const std::string& arg) {
228 return arg + " requires an argument";
229}
230
231inline std::string NegationImpliesBooleanError(const std::string& arg) {
232 return arg + " is an invalid negation because it is not a boolean option";
233}
234
235// We store some of the basic information around a single Parse call inside
236// this struct, to separate storage of command line arguments and their
237// handling. In particular, this makes it easier to introduce 'synthetic'
238// arguments that get inserted by expanding option aliases.
239struct ArgsInfo {
240 // Generally, the idea here is that the first entry in `*underlying` stores
241 // the "0th" argument (the program name), then `synthetic_args` are inserted,
242 // followed by the remainder of `*underlying`.
243 std::vector<std::string>* underlying;
244 std::vector<std::string> synthetic_args;
245
246 std::vector<std::string>* exec_args;
247
248 ArgsInfo(std::vector<std::string>* args,
249 std::vector<std::string>* exec_args)
250 : underlying(args), exec_args(exec_args) {}
251
252 size_t remaining() const {
253 // -1 to account for the program name.
254 return underlying->size() - 1 + synthetic_args.size();
255 }
256
257 bool empty() const { return remaining() == 0; }
258 const std::string& program_name() const { return underlying->at(0); }
259
260 std::string& first() {
261 return synthetic_args.empty() ? underlying->at(1) : synthetic_args.front();
262 }
263
264 std::string pop_first() {
265 std::string ret = std::move(first());
266 if (synthetic_args.empty()) {
267 // Only push arguments to `exec_args` that were also originally passed
268 // on the command line (i.e. not generated through alias expansion).
269 // '--' is a special case here since its purpose is to end `exec_argv`,
270 // which is why we do not include it.
271 if (exec_args != nullptr && ret != "--")
272 exec_args->push_back(ret);
273 underlying->erase(underlying->begin() + 1);
274 } else {
275 synthetic_args.erase(synthetic_args.begin());
276 }
277 return ret;
278 }
279};
280
281template <typename Options>
282void OptionsParser<Options>::Parse(
283 std::vector<std::string>* const orig_args,
284 std::vector<std::string>* const exec_args,
285 std::vector<std::string>* const v8_args,
286 Options* const options,
287 OptionEnvvarSettings required_env_settings,
288 std::vector<std::string>* const errors) const {
289 ArgsInfo args(orig_args, exec_args);
290
291 // The first entry is the process name. Make sure it ends up in the V8 argv,
292 // since V8::SetFlagsFromCommandLine() expects that to hold true for that
293 // array as well.
294 if (v8_args->empty())
295 v8_args->push_back(args.program_name());
296
297 while (!args.empty() && errors->empty()) {
298 if (args.first().size() <= 1 || args.first()[0] != '-') break;
299
300 // We know that we're either going to consume this
301 // argument or fail completely.
302 const std::string arg = args.pop_first();
303
304 if (arg == "--") {
305 if (required_env_settings == kAllowedInEnvironment)
306 errors->push_back(NotAllowedInEnvErr("--"));
307 break;
308 }
309
310 // Only allow --foo=bar notation for options starting with double dashes.
311 // (E.g. -e=a is not allowed as shorthand for --eval=a, which would
312 // otherwise be the result of alias expansion.)
313 const std::string::size_type equals_index =
314 arg[0] == '-' && arg[1] == '-' ? arg.find('=') : std::string::npos;
315 std::string name =
316 equals_index == std::string::npos ? arg : arg.substr(0, equals_index);
317
318 // Store the 'original name' of the argument. This name differs from
319 // 'name' in that it contains a possible '=' sign and is not affected
320 // by alias expansion.
321 std::string original_name = name;
322 if (equals_index != std::string::npos)
323 original_name += '=';
324
325 auto missing_argument = [&]() {
326 errors->push_back(RequiresArgumentErr(original_name));
327 };
328
329 // Normalize by replacing `_` with `-` in options.
330 for (std::string::size_type i = 2; i < name.size(); ++i) {
331 if (name[i] == '_')
332 name[i] = '-';
333 }
334
335 // Convert --no-foo to --foo and keep in mind that we're negating.
336 bool is_negation = false;
337 if (name.find("--no-") == 0) {
338 name.erase(2, 3); // remove no-
339 is_negation = true;
340 }
341
342 {
343 auto it = aliases_.end();
344 // Expand aliases:
345 // - If `name` can be found in `aliases_`.
346 // - If `name` + '=' can be found in `aliases_`.
347 // - If `name` + " <arg>" can be found in `aliases_`, and we have
348 // a subsequent argument that does not start with '-' itself.
349 while ((it = aliases_.find(name)) != aliases_.end() ||
350 (equals_index != std::string::npos &&
351 (it = aliases_.find(name + '=')) != aliases_.end()) ||
352 (!args.empty() &&
353 !args.first().empty() &&
354 args.first()[0] != '-' &&
355 (it = aliases_.find(name + " <arg>")) != aliases_.end())) {
356 const std::string prev_name = std::move(name);
357 const std::vector<std::string>& expansion = it->second;
358
359 // Use the first entry in the expansion as the new 'name'.
360 name = expansion.front();
361
362 if (expansion.size() > 1) {
363 // The other arguments, if any, are going to be handled later.
364 args.synthetic_args.insert(
365 args.synthetic_args.begin(),
366 expansion.begin() + 1,
367 expansion.end());
368 }
369
370 if (name == prev_name) break;
371 }
372 }
373
374 auto it = options_.find(name);
375
376 if ((it == options_.end() ||
377 it->second.env_setting == kDisallowedInEnvironment) &&
378 required_env_settings == kAllowedInEnvironment) {
379 errors->push_back(NotAllowedInEnvErr(original_name));
380 break;
381 }
382
383 {
384 std::string implied_name = name;
385 if (is_negation) {
386 // Implications for negated options are defined with "--no-".
387 implied_name.insert(2, "no-");
388 }
389 auto implications = implications_.equal_range(implied_name);
390 for (auto it = implications.first; it != implications.second; ++it) {
391 if (it->second.type == kV8Option) {
392 v8_args->push_back(it->second.name);
393 } else {
394 *it->second.target_field->template Lookup<bool>(options) =
395 it->second.target_value;
396 }
397 }
398 }
399
400 if (it == options_.end()) {
401 v8_args->push_back(arg);
402 continue;
403 }
404
405 const OptionInfo& info = it->second;
406
407 // Some V8 options can be negated and they are validated by V8 later.
408 if (is_negation && info.type != kBoolean && info.type != kV8Option) {
409 errors->push_back(NegationImpliesBooleanError(arg));
410 break;
411 }
412
413 std::string value;
414 if (info.type != kBoolean && info.type != kNoOp && info.type != kV8Option) {
415 if (equals_index != std::string::npos) {
416 value = arg.substr(equals_index + 1);
417 if (value.empty()) {
418 missing_argument();
419 break;
420 }
421 } else {
422 if (args.empty()) {
423 missing_argument();
424 break;
425 }
426
427 value = args.pop_first();
428
429 if (!value.empty() && value[0] == '-') {
430 missing_argument();
431 break;
432 } else {
433 if (!value.empty() && value[0] == '\\' && value[1] == '-')
434 value = value.substr(1); // Treat \- as escaping an -.
435 }
436 }
437 }
438
439 switch (info.type) {
440 case kBoolean:
441 *Lookup<bool>(info.field, options) = !is_negation;
442 break;
443 case kInteger:
444 *Lookup<int64_t>(info.field, options) = std::atoll(value.c_str());
445 break;
446 case kUInteger:
447 *Lookup<uint64_t>(info.field, options) = std::stoull(value);
448 break;
449 case kString:
450 *Lookup<std::string>(info.field, options) = value;
451 break;
452 case kStringList:
453 Lookup<std::vector<std::string>>(info.field, options)
454 ->emplace_back(std::move(value));
455 break;
456 case kHostPort:
457 Lookup<HostPort>(info.field, options)
458 ->Update(SplitHostPort(value, errors));
459 break;
460 case kNoOp:
461 break;
462 case kV8Option:
463 v8_args->push_back(arg);
464 break;
465 default:
466 UNREACHABLE()do { static const node::AssertionInfo args = { "../src/node_options-inl.h"
":" "466", "\"Unreachable code reached\"", __PRETTY_FUNCTION__
}; node::Assert(args); } while (0)
;
467 }
468 }
469 options->CheckOptions(errors);
470}
471
472} // namespace options_parser
473} // namespace node
474
475#endif // defined(NODE_WANT_INTERNALS) && NODE_WANT_INTERNALS
476
477#endif // SRC_NODE_OPTIONS_INL_H_

/usr/lib/gcc/x86_64-redhat-linux/8/../../../../include/c++/8/bits/shared_ptr.h

1// shared_ptr and weak_ptr implementation -*- C++ -*-
2
3// Copyright (C) 2007-2018 Free Software Foundation, Inc.
4//
5// This file is part of the GNU ISO C++ Library. This library is free
6// software; you can redistribute it and/or modify it under the
7// terms of the GNU General Public License as published by the
8// Free Software Foundation; either version 3, or (at your option)
9// any later version.
10
11// This library is distributed in the hope that it will be useful,
12// but WITHOUT ANY WARRANTY; without even the implied warranty of
13// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14// GNU General Public License for more details.
15
16// Under Section 7 of GPL version 3, you are granted additional
17// permissions described in the GCC Runtime Library Exception, version
18// 3.1, as published by the Free Software Foundation.
19
20// You should have received a copy of the GNU General Public License and
21// a copy of the GCC Runtime Library Exception along with this program;
22// see the files COPYING3 and COPYING.RUNTIME respectively. If not, see
23// <http://www.gnu.org/licenses/>.
24
25// GCC Note: Based on files from version 1.32.0 of the Boost library.
26
27// shared_count.hpp
28// Copyright (c) 2001, 2002, 2003 Peter Dimov and Multi Media Ltd.
29
30// shared_ptr.hpp
31// Copyright (C) 1998, 1999 Greg Colvin and Beman Dawes.
32// Copyright (C) 2001, 2002, 2003 Peter Dimov
33
34// weak_ptr.hpp
35// Copyright (C) 2001, 2002, 2003 Peter Dimov
36
37// enable_shared_from_this.hpp
38// Copyright (C) 2002 Peter Dimov
39
40// Distributed under the Boost Software License, Version 1.0. (See
41// accompanying file LICENSE_1_0.txt or copy at
42// http://www.boost.org/LICENSE_1_0.txt)
43
44/** @file
45 * This is an internal header file, included by other library headers.
46 * Do not attempt to use it directly. @headername{memory}
47 */
48
49#ifndef _SHARED_PTR_H1
50#define _SHARED_PTR_H1 1
51
52#include <bits/shared_ptr_base.h>
53
54namespace std _GLIBCXX_VISIBILITY(default)__attribute__ ((__visibility__ ("default")))
55{
56_GLIBCXX_BEGIN_NAMESPACE_VERSION
57
58 /**
59 * @addtogroup pointer_abstractions
60 * @{
61 */
62
63 /// 20.7.2.2.11 shared_ptr I/O
64 template<typename _Ch, typename _Tr, typename _Tp, _Lock_policy _Lp>
65 inline std::basic_ostream<_Ch, _Tr>&
66 operator<<(std::basic_ostream<_Ch, _Tr>& __os,
67 const __shared_ptr<_Tp, _Lp>& __p)
68 {
69 __os << __p.get();
70 return __os;
71 }
72
73 template<typename _Del, typename _Tp, _Lock_policy _Lp>
74 inline _Del*
75 get_deleter(const __shared_ptr<_Tp, _Lp>& __p) noexcept
76 {
77#if __cpp_rtti
78 return static_cast<_Del*>(__p._M_get_deleter(typeid(_Del)));
79#else
80 return 0;
81#endif
82 }
83
84 /// 20.7.2.2.10 shared_ptr get_deleter
85 template<typename _Del, typename _Tp>
86 inline _Del*
87 get_deleter(const shared_ptr<_Tp>& __p) noexcept
88 {
89#if __cpp_rtti
90 return static_cast<_Del*>(__p._M_get_deleter(typeid(_Del)));
91#else
92 return 0;
93#endif
94 }
95
96 /**
97 * @brief A smart pointer with reference-counted copy semantics.
98 *
99 * The object pointed to is deleted when the last shared_ptr pointing to
100 * it is destroyed or reset.
101 */
102 template<typename _Tp>
103 class shared_ptr : public __shared_ptr<_Tp>
104 {
105 template<typename... _Args>
106 using _Constructible = typename enable_if<
107 is_constructible<__shared_ptr<_Tp>, _Args...>::value
108 >::type;
109
110 template<typename _Arg>
111 using _Assignable = typename enable_if<
112 is_assignable<__shared_ptr<_Tp>&, _Arg>::value, shared_ptr&
113 >::type;
114
115 public:
116
117 using element_type = typename __shared_ptr<_Tp>::element_type;
118
119#if __cplusplus201703L > 201402L
120# define __cpp_lib_shared_ptr_weak_type201606 201606
121 using weak_type = weak_ptr<_Tp>;
122#endif
123 /**
124 * @brief Construct an empty %shared_ptr.
125 * @post use_count()==0 && get()==0
126 */
127 constexpr shared_ptr() noexcept : __shared_ptr<_Tp>() { }
128
129 shared_ptr(const shared_ptr&) noexcept = default;
130
131 /**
132 * @brief Construct a %shared_ptr that owns the pointer @a __p.
133 * @param __p A pointer that is convertible to element_type*.
134 * @post use_count() == 1 && get() == __p
135 * @throw std::bad_alloc, in which case @c delete @a __p is called.
136 */
137 template<typename _Yp, typename = _Constructible<_Yp*>>
138 explicit
139 shared_ptr(_Yp* __p) : __shared_ptr<_Tp>(__p) { }
5
Calling constructor for '__shared_ptr<node::options_parser::OptionsParser<node::PerIsolateOptions>::BaseOptionField, __gnu_cxx::_S_atomic>'
13
Returning from constructor for '__shared_ptr<node::options_parser::OptionsParser<node::PerIsolateOptions>::BaseOptionField, __gnu_cxx::_S_atomic>'
140
141 /**
142 * @brief Construct a %shared_ptr that owns the pointer @a __p
143 * and the deleter @a __d.
144 * @param __p A pointer.
145 * @param __d A deleter.
146 * @post use_count() == 1 && get() == __p
147 * @throw std::bad_alloc, in which case @a __d(__p) is called.
148 *
149 * Requirements: _Deleter's copy constructor and destructor must
150 * not throw
151 *
152 * __shared_ptr will release __p by calling __d(__p)
153 */
154 template<typename _Yp, typename _Deleter,
155 typename = _Constructible<_Yp*, _Deleter>>
156 shared_ptr(_Yp* __p, _Deleter __d)
157 : __shared_ptr<_Tp>(__p, std::move(__d)) { }
158
159 /**
160 * @brief Construct a %shared_ptr that owns a null pointer
161 * and the deleter @a __d.
162 * @param __p A null pointer constant.
163 * @param __d A deleter.
164 * @post use_count() == 1 && get() == __p
165 * @throw std::bad_alloc, in which case @a __d(__p) is called.
166 *
167 * Requirements: _Deleter's copy constructor and destructor must
168 * not throw
169 *
170 * The last owner will call __d(__p)
171 */
172 template<typename _Deleter>
173 shared_ptr(nullptr_t __p, _Deleter __d)
174 : __shared_ptr<_Tp>(__p, std::move(__d)) { }
175
176 /**
177 * @brief Construct a %shared_ptr that owns the pointer @a __p
178 * and the deleter @a __d.
179 * @param __p A pointer.
180 * @param __d A deleter.
181 * @param __a An allocator.
182 * @post use_count() == 1 && get() == __p
183 * @throw std::bad_alloc, in which case @a __d(__p) is called.
184 *
185 * Requirements: _Deleter's copy constructor and destructor must
186 * not throw _Alloc's copy constructor and destructor must not
187 * throw.
188 *
189 * __shared_ptr will release __p by calling __d(__p)
190 */
191 template<typename _Yp, typename _Deleter, typename _Alloc,
192 typename = _Constructible<_Yp*, _Deleter, _Alloc>>
193 shared_ptr(_Yp* __p, _Deleter __d, _Alloc __a)
194 : __shared_ptr<_Tp>(__p, std::move(__d), std::move(__a)) { }
195
196 /**
197 * @brief Construct a %shared_ptr that owns a null pointer
198 * and the deleter @a __d.
199 * @param __p A null pointer constant.
200 * @param __d A deleter.
201 * @param __a An allocator.
202 * @post use_count() == 1 && get() == __p
203 * @throw std::bad_alloc, in which case @a __d(__p) is called.
204 *
205 * Requirements: _Deleter's copy constructor and destructor must
206 * not throw _Alloc's copy constructor and destructor must not
207 * throw.
208 *
209 * The last owner will call __d(__p)
210 */
211 template<typename _Deleter, typename _Alloc>
212 shared_ptr(nullptr_t __p, _Deleter __d, _Alloc __a)
213 : __shared_ptr<_Tp>(__p, std::move(__d), std::move(__a)) { }
214
215 // Aliasing constructor
216
217 /**
218 * @brief Constructs a %shared_ptr instance that stores @a __p
219 * and shares ownership with @a __r.
220 * @param __r A %shared_ptr.
221 * @param __p A pointer that will remain valid while @a *__r is valid.
222 * @post get() == __p && use_count() == __r.use_count()
223 *
224 * This can be used to construct a @c shared_ptr to a sub-object
225 * of an object managed by an existing @c shared_ptr.
226 *
227 * @code
228 * shared_ptr< pair<int,int> > pii(new pair<int,int>());
229 * shared_ptr<int> pi(pii, &pii->first);
230 * assert(pii.use_count() == 2);
231 * @endcode
232 */
233 template<typename _Yp>
234 shared_ptr(const shared_ptr<_Yp>& __r, element_type* __p) noexcept
235 : __shared_ptr<_Tp>(__r, __p) { }
236
237 /**
238 * @brief If @a __r is empty, constructs an empty %shared_ptr;
239 * otherwise construct a %shared_ptr that shares ownership
240 * with @a __r.
241 * @param __r A %shared_ptr.
242 * @post get() == __r.get() && use_count() == __r.use_count()
243 */
244 template<typename _Yp,
245 typename = _Constructible<const shared_ptr<_Yp>&>>
246 shared_ptr(const shared_ptr<_Yp>& __r) noexcept
247 : __shared_ptr<_Tp>(__r) { }
248
249 /**
250 * @brief Move-constructs a %shared_ptr instance from @a __r.
251 * @param __r A %shared_ptr rvalue.
252 * @post *this contains the old value of @a __r, @a __r is empty.
253 */
254 shared_ptr(shared_ptr&& __r) noexcept
255 : __shared_ptr<_Tp>(std::move(__r)) { }
256
257 /**
258 * @brief Move-constructs a %shared_ptr instance from @a __r.
259 * @param __r A %shared_ptr rvalue.
260 * @post *this contains the old value of @a __r, @a __r is empty.
261 */
262 template<typename _Yp, typename = _Constructible<shared_ptr<_Yp>>>
263 shared_ptr(shared_ptr<_Yp>&& __r) noexcept
264 : __shared_ptr<_Tp>(std::move(__r)) { }
265
266 /**
267 * @brief Constructs a %shared_ptr that shares ownership with @a __r
268 * and stores a copy of the pointer stored in @a __r.
269 * @param __r A weak_ptr.
270 * @post use_count() == __r.use_count()
271 * @throw bad_weak_ptr when __r.expired(),
272 * in which case the constructor has no effect.
273 */
274 template<typename _Yp, typename = _Constructible<const weak_ptr<_Yp>&>>
275 explicit shared_ptr(const weak_ptr<_Yp>& __r)
276 : __shared_ptr<_Tp>(__r) { }
277
278#if _GLIBCXX_USE_DEPRECATED1
279#pragma GCC diagnostic push
280#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
281 template<typename _Yp, typename = _Constructible<auto_ptr<_Yp>>>
282 shared_ptr(auto_ptr<_Yp>&& __r);
283#pragma GCC diagnostic pop
284#endif
285
286 // _GLIBCXX_RESOLVE_LIB_DEFECTS
287 // 2399. shared_ptr's constructor from unique_ptr should be constrained
288 template<typename _Yp, typename _Del,
289 typename = _Constructible<unique_ptr<_Yp, _Del>>>
290 shared_ptr(unique_ptr<_Yp, _Del>&& __r)
291 : __shared_ptr<_Tp>(std::move(__r)) { }
292
293#if __cplusplus201703L <= 201402L && _GLIBCXX_USE_DEPRECATED1
294 // This non-standard constructor exists to support conversions that
295 // were possible in C++11 and C++14 but are ill-formed in C++17.
296 // If an exception is thrown this constructor has no effect.
297 template<typename _Yp, typename _Del,
298 _Constructible<unique_ptr<_Yp, _Del>, __sp_array_delete>* = 0>
299 shared_ptr(unique_ptr<_Yp, _Del>&& __r)
300 : __shared_ptr<_Tp>(std::move(__r), __sp_array_delete()) { }
301#endif
302
303 /**
304 * @brief Construct an empty %shared_ptr.
305 * @post use_count() == 0 && get() == nullptr
306 */
307 constexpr shared_ptr(nullptr_t) noexcept : shared_ptr() { }
308
309 shared_ptr& operator=(const shared_ptr&) noexcept = default;
310
311 template<typename _Yp>
312 _Assignable<const shared_ptr<_Yp>&>
313 operator=(const shared_ptr<_Yp>& __r) noexcept
314 {
315 this->__shared_ptr<_Tp>::operator=(__r);
316 return *this;
317 }
318
319#if _GLIBCXX_USE_DEPRECATED1
320#pragma GCC diagnostic push
321#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
322 template<typename _Yp>
323 _Assignable<auto_ptr<_Yp>>
324 operator=(auto_ptr<_Yp>&& __r)
325 {
326 this->__shared_ptr<_Tp>::operator=(std::move(__r));
327 return *this;
328 }
329#pragma GCC diagnostic pop
330#endif
331
332 shared_ptr&
333 operator=(shared_ptr&& __r) noexcept
334 {
335 this->__shared_ptr<_Tp>::operator=(std::move(__r));
336 return *this;
337 }
338
339 template<class _Yp>
340 _Assignable<shared_ptr<_Yp>>
341 operator=(shared_ptr<_Yp>&& __r) noexcept
342 {
343 this->__shared_ptr<_Tp>::operator=(std::move(__r));
344 return *this;
345 }
346
347 template<typename _Yp, typename _Del>
348 _Assignable<unique_ptr<_Yp, _Del>>
349 operator=(unique_ptr<_Yp, _Del>&& __r)
350 {
351 this->__shared_ptr<_Tp>::operator=(std::move(__r));
352 return *this;
353 }
354
355 private:
356 // This constructor is non-standard, it is used by allocate_shared.
357 template<typename _Alloc, typename... _Args>
358 shared_ptr(_Sp_alloc_shared_tag<_Alloc> __tag, _Args&&... __args)
359 : __shared_ptr<_Tp>(__tag, std::forward<_Args>(__args)...)
360 { }
361
362 template<typename _Yp, typename _Alloc, typename... _Args>
363 friend shared_ptr<_Yp>
364 allocate_shared(const _Alloc& __a, _Args&&... __args);
365
366 // This constructor is non-standard, it is used by weak_ptr::lock().
367 shared_ptr(const weak_ptr<_Tp>& __r, std::nothrow_t)
368 : __shared_ptr<_Tp>(__r, std::nothrow) { }
369
370 friend class weak_ptr<_Tp>;
371 };
372
373#if __cpp_deduction_guides201703L >= 201606
374 template<typename _Tp>
375 shared_ptr(weak_ptr<_Tp>) -> shared_ptr<_Tp>;
376 template<typename _Tp, typename _Del>
377 shared_ptr(unique_ptr<_Tp, _Del>) -> shared_ptr<_Tp>;
378#endif
379
380 // 20.7.2.2.7 shared_ptr comparisons
381 template<typename _Tp, typename _Up>
382 inline bool
383 operator==(const shared_ptr<_Tp>& __a, const shared_ptr<_Up>& __b) noexcept
384 { return __a.get() == __b.get(); }
385
386 template<typename _Tp>
387 inline bool
388 operator==(const shared_ptr<_Tp>& __a, nullptr_t) noexcept
389 { return !__a; }
390
391 template<typename _Tp>
392 inline bool
393 operator==(nullptr_t, const shared_ptr<_Tp>& __a) noexcept
394 { return !__a; }
395
396 template<typename _Tp, typename _Up>
397 inline bool
398 operator!=(const shared_ptr<_Tp>& __a, const shared_ptr<_Up>& __b) noexcept
399 { return __a.get() != __b.get(); }
400
401 template<typename _Tp>
402 inline bool
403 operator!=(const shared_ptr<_Tp>& __a, nullptr_t) noexcept
404 { return (bool)__a; }
405
406 template<typename _Tp>
407 inline bool
408 operator!=(nullptr_t, const shared_ptr<_Tp>& __a) noexcept
409 { return (bool)__a; }
410
411 template<typename _Tp, typename _Up>
412 inline bool
413 operator<(const shared_ptr<_Tp>& __a, const shared_ptr<_Up>& __b) noexcept
414 {
415 using _Tp_elt = typename shared_ptr<_Tp>::element_type;
416 using _Up_elt = typename shared_ptr<_Up>::element_type;
417 using _Vp = typename common_type<_Tp_elt*, _Up_elt*>::type;
418 return less<_Vp>()(__a.get(), __b.get());
419 }
420
421 template<typename _Tp>
422 inline bool
423 operator<(const shared_ptr<_Tp>& __a, nullptr_t) noexcept
424 {
425 using _Tp_elt = typename shared_ptr<_Tp>::element_type;
426 return less<_Tp_elt*>()(__a.get(), nullptr);
427 }
428
429 template<typename _Tp>
430 inline bool
431 operator<(nullptr_t, const shared_ptr<_Tp>& __a) noexcept
432 {
433 using _Tp_elt = typename shared_ptr<_Tp>::element_type;
434 return less<_Tp_elt*>()(nullptr, __a.get());
435 }
436
437 template<typename _Tp, typename _Up>
438 inline bool
439 operator<=(const shared_ptr<_Tp>& __a, const shared_ptr<_Up>& __b) noexcept
440 { return !(__b < __a); }
441
442 template<typename _Tp>
443 inline bool
444 operator<=(const shared_ptr<_Tp>& __a, nullptr_t) noexcept
445 { return !(nullptr < __a); }
446
447 template<typename _Tp>
448 inline bool
449 operator<=(nullptr_t, const shared_ptr<_Tp>& __a) noexcept
450 { return !(__a < nullptr); }
451
452 template<typename _Tp, typename _Up>
453 inline bool
454 operator>(const shared_ptr<_Tp>& __a, const shared_ptr<_Up>& __b) noexcept
455 { return (__b < __a); }
456
457 template<typename _Tp>
458 inline bool
459 operator>(const shared_ptr<_Tp>& __a, nullptr_t) noexcept
460 { return nullptr < __a; }
461
462 template<typename _Tp>
463 inline bool
464 operator>(nullptr_t, const shared_ptr<_Tp>& __a) noexcept
465 { return __a < nullptr; }
466
467 template<typename _Tp, typename _Up>
468 inline bool
469 operator>=(const shared_ptr<_Tp>& __a, const shared_ptr<_Up>& __b) noexcept
470 { return !(__a < __b); }
471
472 template<typename _Tp>
473 inline bool
474 operator>=(const shared_ptr<_Tp>& __a, nullptr_t) noexcept
475 { return !(__a < nullptr); }
476
477 template<typename _Tp>
478 inline bool
479 operator>=(nullptr_t, const shared_ptr<_Tp>& __a) noexcept
480 { return !(nullptr < __a); }
481
482 template<typename _Tp>
483 struct less<shared_ptr<_Tp>> : public _Sp_less<shared_ptr<_Tp>>
484 { };
485
486 // 20.7.2.2.8 shared_ptr specialized algorithms.
487 template<typename _Tp>
488 inline void
489 swap(shared_ptr<_Tp>& __a, shared_ptr<_Tp>& __b) noexcept
490 { __a.swap(__b); }
491
492 // 20.7.2.2.9 shared_ptr casts.
493 template<typename _Tp, typename _Up>
494 inline shared_ptr<_Tp>
495 static_pointer_cast(const shared_ptr<_Up>& __r) noexcept
496 {
497 using _Sp = shared_ptr<_Tp>;
498 return _Sp(__r, static_cast<typename _Sp::element_type*>(__r.get()));
499 }
500
501 template<typename _Tp, typename _Up>
502 inline shared_ptr<_Tp>
503 const_pointer_cast(const shared_ptr<_Up>& __r) noexcept
504 {
505 using _Sp = shared_ptr<_Tp>;
506 return _Sp(__r, const_cast<typename _Sp::element_type*>(__r.get()));
507 }
508
509 template<typename _Tp, typename _Up>
510 inline shared_ptr<_Tp>
511 dynamic_pointer_cast(const shared_ptr<_Up>& __r) noexcept
512 {
513 using _Sp = shared_ptr<_Tp>;
514 if (auto* __p = dynamic_cast<typename _Sp::element_type*>(__r.get()))
515 return _Sp(__r, __p);
516 return _Sp();
517 }
518
519#if __cplusplus201703L > 201402L
520 template<typename _Tp, typename _Up>
521 inline shared_ptr<_Tp>
522 reinterpret_pointer_cast(const shared_ptr<_Up>& __r) noexcept
523 {
524 using _Sp = shared_ptr<_Tp>;
525 return _Sp(__r, reinterpret_cast<typename _Sp::element_type*>(__r.get()));
526 }
527#endif
528
529 /**
530 * @brief A smart pointer with weak semantics.
531 *
532 * With forwarding constructors and assignment operators.
533 */
534 template<typename _Tp>
535 class weak_ptr : public __weak_ptr<_Tp>
536 {
537 template<typename _Arg>
538 using _Constructible = typename enable_if<
539 is_constructible<__weak_ptr<_Tp>, _Arg>::value
540 >::type;
541
542 template<typename _Arg>
543 using _Assignable = typename enable_if<
544 is_assignable<__weak_ptr<_Tp>&, _Arg>::value, weak_ptr&
545 >::type;
546
547 public:
548 constexpr weak_ptr() noexcept = default;
549
550 template<typename _Yp,
551 typename = _Constructible<const shared_ptr<_Yp>&>>
552 weak_ptr(const shared_ptr<_Yp>& __r) noexcept
553 : __weak_ptr<_Tp>(__r) { }
554
555 weak_ptr(const weak_ptr&) noexcept = default;
556
557 template<typename _Yp, typename = _Constructible<const weak_ptr<_Yp>&>>
558 weak_ptr(const weak_ptr<_Yp>& __r) noexcept
559 : __weak_ptr<_Tp>(__r) { }
560
561 weak_ptr(weak_ptr&&) noexcept = default;
562
563 template<typename _Yp, typename = _Constructible<weak_ptr<_Yp>>>
564 weak_ptr(weak_ptr<_Yp>&& __r) noexcept
565 : __weak_ptr<_Tp>(std::move(__r)) { }
566
567 weak_ptr&
568 operator=(const weak_ptr& __r) noexcept = default;
569
570 template<typename _Yp>
571 _Assignable<const weak_ptr<_Yp>&>
572 operator=(const weak_ptr<_Yp>& __r) noexcept
573 {
574 this->__weak_ptr<_Tp>::operator=(__r);
575 return *this;
576 }
577
578 template<typename _Yp>
579 _Assignable<const shared_ptr<_Yp>&>
580 operator=(const shared_ptr<_Yp>& __r) noexcept
581 {
582 this->__weak_ptr<_Tp>::operator=(__r);
583 return *this;
584 }
585
586 weak_ptr&
587 operator=(weak_ptr&& __r) noexcept = default;
588
589 template<typename _Yp>
590 _Assignable<weak_ptr<_Yp>>
591 operator=(weak_ptr<_Yp>&& __r) noexcept
592 {
593 this->__weak_ptr<_Tp>::operator=(std::move(__r));
594 return *this;
595 }
596
597 shared_ptr<_Tp>
598 lock() const noexcept
599 { return shared_ptr<_Tp>(*this, std::nothrow); }
600 };
601
602#if __cpp_deduction_guides201703L >= 201606
603 template<typename _Tp>
604 weak_ptr(shared_ptr<_Tp>) -> weak_ptr<_Tp>;
605#endif
606
607 // 20.7.2.3.6 weak_ptr specialized algorithms.
608 template<typename _Tp>
609 inline void
610 swap(weak_ptr<_Tp>& __a, weak_ptr<_Tp>& __b) noexcept
611 { __a.swap(__b); }
612
613
614 /// Primary template owner_less
615 template<typename _Tp = void>
616 struct owner_less;
617
618 /// Void specialization of owner_less
619 template<>
620 struct owner_less<void> : _Sp_owner_less<void, void>
621 { };
622
623 /// Partial specialization of owner_less for shared_ptr.
624 template<typename _Tp>
625 struct owner_less<shared_ptr<_Tp>>
626 : public _Sp_owner_less<shared_ptr<_Tp>, weak_ptr<_Tp>>
627 { };
628
629 /// Partial specialization of owner_less for weak_ptr.
630 template<typename _Tp>
631 struct owner_less<weak_ptr<_Tp>>
632 : public _Sp_owner_less<weak_ptr<_Tp>, shared_ptr<_Tp>>
633 { };
634
635 /**
636 * @brief Base class allowing use of member function shared_from_this.
637 */
638 template<typename _Tp>
639 class enable_shared_from_this
640 {
641 protected:
642 constexpr enable_shared_from_this() noexcept { }
643
644 enable_shared_from_this(const enable_shared_from_this&) noexcept { }
645
646 enable_shared_from_this&
647 operator=(const enable_shared_from_this&) noexcept
648 { return *this; }
649
650 ~enable_shared_from_this() { }
651
652 public:
653 shared_ptr<_Tp>
654 shared_from_this()
655 { return shared_ptr<_Tp>(this->_M_weak_this); }
656
657 shared_ptr<const _Tp>
658 shared_from_this() const
659 { return shared_ptr<const _Tp>(this->_M_weak_this); }
660
661#if __cplusplus201703L > 201402L || !defined(__STRICT_ANSI__) // c++1z or gnu++11
662#define __cpp_lib_enable_shared_from_this201603 201603
663 weak_ptr<_Tp>
664 weak_from_this() noexcept
665 { return this->_M_weak_this; }
666
667 weak_ptr<const _Tp>
668 weak_from_this() const noexcept
669 { return this->_M_weak_this; }
670#endif
671
672 private:
673 template<typename _Tp1>
674 void
675 _M_weak_assign(_Tp1* __p, const __shared_count<>& __n) const noexcept
676 { _M_weak_this._M_assign(__p, __n); }
677
678 // Found by ADL when this is an associated class.
679 friend const enable_shared_from_this*
680 __enable_shared_from_this_base(const __shared_count<>&,
681 const enable_shared_from_this* __p)
682 { return __p; }
683
684 template<typename, _Lock_policy>
685 friend class __shared_ptr;
686
687 mutable weak_ptr<_Tp> _M_weak_this;
688 };
689
690 /**
691 * @brief Create an object that is owned by a shared_ptr.
692 * @param __a An allocator.
693 * @param __args Arguments for the @a _Tp object's constructor.
694 * @return A shared_ptr that owns the newly created object.
695 * @throw An exception thrown from @a _Alloc::allocate or from the
696 * constructor of @a _Tp.
697 *
698 * A copy of @a __a will be used to allocate memory for the shared_ptr
699 * and the new object.
700 */
701 template<typename _Tp, typename _Alloc, typename... _Args>
702 inline shared_ptr<_Tp>
703 allocate_shared(const _Alloc& __a, _Args&&... __args)
704 {
705 return shared_ptr<_Tp>(_Sp_alloc_shared_tag<_Alloc>{__a},
706 std::forward<_Args>(__args)...);
707 }
708
709 /**
710 * @brief Create an object that is owned by a shared_ptr.
711 * @param __args Arguments for the @a _Tp object's constructor.
712 * @return A shared_ptr that owns the newly created object.
713 * @throw std::bad_alloc, or an exception thrown from the
714 * constructor of @a _Tp.
715 */
716 template<typename _Tp, typename... _Args>
717 inline shared_ptr<_Tp>
718 make_shared(_Args&&... __args)
719 {
720 typedef typename std::remove_cv<_Tp>::type _Tp_nc;
721 return std::allocate_shared<_Tp>(std::allocator<_Tp_nc>(),
722 std::forward<_Args>(__args)...);
723 }
724
725 /// std::hash specialization for shared_ptr.
726 template<typename _Tp>
727 struct hash<shared_ptr<_Tp>>
728 : public __hash_base<size_t, shared_ptr<_Tp>>
729 {
730 size_t
731 operator()(const shared_ptr<_Tp>& __s) const noexcept
732 {
733 return std::hash<typename shared_ptr<_Tp>::element_type*>()(__s.get());
734 }
735 };
736
737 // @} group pointer_abstractions
738
739_GLIBCXX_END_NAMESPACE_VERSION
740} // namespace
741
742#endif // _SHARED_PTR_H

/usr/lib/gcc/x86_64-redhat-linux/8/../../../../include/c++/8/bits/shared_ptr_base.h

1// shared_ptr and weak_ptr implementation details -*- C++ -*-
2
3// Copyright (C) 2007-2018 Free Software Foundation, Inc.
4//
5// This file is part of the GNU ISO C++ Library. This library is free
6// software; you can redistribute it and/or modify it under the
7// terms of the GNU General Public License as published by the
8// Free Software Foundation; either version 3, or (at your option)
9// any later version.
10
11// This library is distributed in the hope that it will be useful,
12// but WITHOUT ANY WARRANTY; without even the implied warranty of
13// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14// GNU General Public License for more details.
15
16// Under Section 7 of GPL version 3, you are granted additional
17// permissions described in the GCC Runtime Library Exception, version
18// 3.1, as published by the Free Software Foundation.
19
20// You should have received a copy of the GNU General Public License and
21// a copy of the GCC Runtime Library Exception along with this program;
22// see the files COPYING3 and COPYING.RUNTIME respectively. If not, see
23// <http://www.gnu.org/licenses/>.
24
25// GCC Note: Based on files from version 1.32.0 of the Boost library.
26
27// shared_count.hpp
28// Copyright (c) 2001, 2002, 2003 Peter Dimov and Multi Media Ltd.
29
30// shared_ptr.hpp
31// Copyright (C) 1998, 1999 Greg Colvin and Beman Dawes.
32// Copyright (C) 2001, 2002, 2003 Peter Dimov
33
34// weak_ptr.hpp
35// Copyright (C) 2001, 2002, 2003 Peter Dimov
36
37// enable_shared_from_this.hpp
38// Copyright (C) 2002 Peter Dimov
39
40// Distributed under the Boost Software License, Version 1.0. (See
41// accompanying file LICENSE_1_0.txt or copy at
42// http://www.boost.org/LICENSE_1_0.txt)
43
44/** @file bits/shared_ptr_base.h
45 * This is an internal header file, included by other library headers.
46 * Do not attempt to use it directly. @headername{memory}
47 */
48
49#ifndef _SHARED_PTR_BASE_H1
50#define _SHARED_PTR_BASE_H1 1
51
52#include <typeinfo>
53#include <bits/allocated_ptr.h>
54#include <bits/refwrap.h>
55#include <bits/stl_function.h>
56#include <ext/aligned_buffer.h>
57
58namespace std _GLIBCXX_VISIBILITY(default)__attribute__ ((__visibility__ ("default")))
59{
60_GLIBCXX_BEGIN_NAMESPACE_VERSION
61
62#if _GLIBCXX_USE_DEPRECATED1
63#pragma GCC diagnostic push
64#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
65 template<typename> class auto_ptr;
66#pragma GCC diagnostic pop
67#endif
68
69 /**
70 * @brief Exception possibly thrown by @c shared_ptr.
71 * @ingroup exceptions
72 */
73 class bad_weak_ptr : public std::exception
74 {
75 public:
76 virtual char const* what() const noexcept;
77
78 virtual ~bad_weak_ptr() noexcept;
79 };
80
81 // Substitute for bad_weak_ptr object in the case of -fno-exceptions.
82 inline void
83 __throw_bad_weak_ptr()
84 { _GLIBCXX_THROW_OR_ABORT(bad_weak_ptr())(__builtin_abort()); }
85
86 using __gnu_cxx::_Lock_policy;
87 using __gnu_cxx::__default_lock_policy;
88 using __gnu_cxx::_S_single;
89 using __gnu_cxx::_S_mutex;
90 using __gnu_cxx::_S_atomic;
91
92 // Empty helper class except when the template argument is _S_mutex.
93 template<_Lock_policy _Lp>
94 class _Mutex_base
95 {
96 protected:
97 // The atomic policy uses fully-fenced builtins, single doesn't care.
98 enum { _S_need_barriers = 0 };
99 };
100
101 template<>
102 class _Mutex_base<_S_mutex>
103 : public __gnu_cxx::__mutex
104 {
105 protected:
106 // This policy is used when atomic builtins are not available.
107 // The replacement atomic operations might not have the necessary
108 // memory barriers.
109 enum { _S_need_barriers = 1 };
110 };
111
112 template<_Lock_policy _Lp = __default_lock_policy>
113 class _Sp_counted_base
114 : public _Mutex_base<_Lp>
115 {
116 public:
117 _Sp_counted_base() noexcept
118 : _M_use_count(1), _M_weak_count(1) { }
119
120 virtual
121 ~_Sp_counted_base() noexcept
122 { }
123
124 // Called when _M_use_count drops to zero, to release the resources
125 // managed by *this.
126 virtual void
127 _M_dispose() noexcept = 0;
128
129 // Called when _M_weak_count drops to zero.
130 virtual void
131 _M_destroy() noexcept
132 { delete this; }
133
134 virtual void*
135 _M_get_deleter(const std::type_info&) noexcept = 0;
136
137 void
138 _M_add_ref_copy()
139 { __gnu_cxx::__atomic_add_dispatch(&_M_use_count, 1); }
140
141 void
142 _M_add_ref_lock();
143
144 bool
145 _M_add_ref_lock_nothrow();
146
147 void
148 _M_release() noexcept
149 {
150 // Be race-detector-friendly. For more info see bits/c++config.
151 _GLIBCXX_SYNCHRONIZATION_HAPPENS_BEFORE(&_M_use_count);
152 if (__gnu_cxx::__exchange_and_add_dispatch(&_M_use_count, -1) == 1)
153 {
154 _GLIBCXX_SYNCHRONIZATION_HAPPENS_AFTER(&_M_use_count);
155 _M_dispose();
156 // There must be a memory barrier between dispose() and destroy()
157 // to ensure that the effects of dispose() are observed in the
158 // thread that runs destroy().
159 // See http://gcc.gnu.org/ml/libstdc++/2005-11/msg00136.html
160 if (_Mutex_base<_Lp>::_S_need_barriers)
161 {
162 __atomic_thread_fence (__ATOMIC_ACQ_REL4);
163 }
164
165 // Be race-detector-friendly. For more info see bits/c++config.
166 _GLIBCXX_SYNCHRONIZATION_HAPPENS_BEFORE(&_M_weak_count);
167 if (__gnu_cxx::__exchange_and_add_dispatch(&_M_weak_count,
168 -1) == 1)
169 {
170 _GLIBCXX_SYNCHRONIZATION_HAPPENS_AFTER(&_M_weak_count);
171 _M_destroy();
172 }
173 }
174 }
175
176 void
177 _M_weak_add_ref() noexcept
178 { __gnu_cxx::__atomic_add_dispatch(&_M_weak_count, 1); }
179
180 void
181 _M_weak_release() noexcept
182 {
183 // Be race-detector-friendly. For more info see bits/c++config.
184 _GLIBCXX_SYNCHRONIZATION_HAPPENS_BEFORE(&_M_weak_count);
185 if (__gnu_cxx::__exchange_and_add_dispatch(&_M_weak_count, -1) == 1)
186 {
187 _GLIBCXX_SYNCHRONIZATION_HAPPENS_AFTER(&_M_weak_count);
188 if (_Mutex_base<_Lp>::_S_need_barriers)
189 {
190 // See _M_release(),
191 // destroy() must observe results of dispose()
192 __atomic_thread_fence (__ATOMIC_ACQ_REL4);
193 }
194 _M_destroy();
195 }
196 }
197
198 long
199 _M_get_use_count() const noexcept
200 {
201 // No memory barrier is used here so there is no synchronization
202 // with other threads.
203 return __atomic_load_n(&_M_use_count, __ATOMIC_RELAXED0);
204 }
205
206 private:
207 _Sp_counted_base(_Sp_counted_base const&) = delete;
208 _Sp_counted_base& operator=(_Sp_counted_base const&) = delete;
209
210 _Atomic_word _M_use_count; // #shared
211 _Atomic_word _M_weak_count; // #weak + (#shared != 0)
212 };
213
214 template<>
215 inline void
216 _Sp_counted_base<_S_single>::
217 _M_add_ref_lock()
218 {
219 if (_M_use_count == 0)
220 __throw_bad_weak_ptr();
221 ++_M_use_count;
222 }
223
224 template<>
225 inline void
226 _Sp_counted_base<_S_mutex>::
227 _M_add_ref_lock()
228 {
229 __gnu_cxx::__scoped_lock sentry(*this);
230 if (__gnu_cxx::__exchange_and_add_dispatch(&_M_use_count, 1) == 0)
231 {
232 _M_use_count = 0;
233 __throw_bad_weak_ptr();
234 }
235 }
236
237 template<>
238 inline void
239 _Sp_counted_base<_S_atomic>::
240 _M_add_ref_lock()
241 {
242 // Perform lock-free add-if-not-zero operation.
243 _Atomic_word __count = _M_get_use_count();
244 do
245 {
246 if (__count == 0)
247 __throw_bad_weak_ptr();
248 // Replace the current counter value with the old value + 1, as
249 // long as it's not changed meanwhile.
250 }
251 while (!__atomic_compare_exchange_n(&_M_use_count, &__count, __count + 1,
252 true, __ATOMIC_ACQ_REL4,
253 __ATOMIC_RELAXED0));
254 }
255
256 template<>
257 inline bool
258 _Sp_counted_base<_S_single>::
259 _M_add_ref_lock_nothrow()
260 {
261 if (_M_use_count == 0)
262 return false;
263 ++_M_use_count;
264 return true;
265 }
266
267 template<>
268 inline bool
269 _Sp_counted_base<_S_mutex>::
270 _M_add_ref_lock_nothrow()
271 {
272 __gnu_cxx::__scoped_lock sentry(*this);
273 if (__gnu_cxx::__exchange_and_add_dispatch(&_M_use_count, 1) == 0)
274 {
275 _M_use_count = 0;
276 return false;
277 }
278 return true;
279 }
280
281 template<>
282 inline bool
283 _Sp_counted_base<_S_atomic>::
284 _M_add_ref_lock_nothrow()
285 {
286 // Perform lock-free add-if-not-zero operation.
287 _Atomic_word __count = _M_get_use_count();
288 do
289 {
290 if (__count == 0)
291 return false;
292 // Replace the current counter value with the old value + 1, as
293 // long as it's not changed meanwhile.
294 }
295 while (!__atomic_compare_exchange_n(&_M_use_count, &__count, __count + 1,
296 true, __ATOMIC_ACQ_REL4,
297 __ATOMIC_RELAXED0));
298 return true;
299 }
300
301 template<>
302 inline void
303 _Sp_counted_base<_S_single>::_M_add_ref_copy()
304 { ++_M_use_count; }
305
306 template<>
307 inline void
308 _Sp_counted_base<_S_single>::_M_release() noexcept
309 {
310 if (--_M_use_count == 0)
311 {
312 _M_dispose();
313 if (--_M_weak_count == 0)
314 _M_destroy();
315 }
316 }
317
318 template<>
319 inline void
320 _Sp_counted_base<_S_single>::_M_weak_add_ref() noexcept
321 { ++_M_weak_count; }
322
323 template<>
324 inline void
325 _Sp_counted_base<_S_single>::_M_weak_release() noexcept
326 {
327 if (--_M_weak_count == 0)
328 _M_destroy();
329 }
330
331 template<>
332 inline long
333 _Sp_counted_base<_S_single>::_M_get_use_count() const noexcept
334 { return _M_use_count; }
335
336
337 // Forward declarations.
338 template<typename _Tp, _Lock_policy _Lp = __default_lock_policy>
339 class __shared_ptr;
340
341 template<typename _Tp, _Lock_policy _Lp = __default_lock_policy>
342 class __weak_ptr;
343
344 template<typename _Tp, _Lock_policy _Lp = __default_lock_policy>
345 class __enable_shared_from_this;
346
347 template<typename _Tp>
348 class shared_ptr;
349
350 template<typename _Tp>
351 class weak_ptr;
352
353 template<typename _Tp>
354 struct owner_less;
355
356 template<typename _Tp>
357 class enable_shared_from_this;
358
359 template<_Lock_policy _Lp = __default_lock_policy>
360 class __weak_count;
361
362 template<_Lock_policy _Lp = __default_lock_policy>
363 class __shared_count;
364
365
366 // Counted ptr with no deleter or allocator support
367 template<typename _Ptr, _Lock_policy _Lp>
368 class _Sp_counted_ptr final : public _Sp_counted_base<_Lp>
369 {
370 public:
371 explicit
372 _Sp_counted_ptr(_Ptr __p) noexcept
373 : _M_ptr(__p) { }
374
375 virtual void
376 _M_dispose() noexcept
377 { delete _M_ptr; }
378
379 virtual void
380 _M_destroy() noexcept
381 { delete this; }
382
383 virtual void*
384 _M_get_deleter(const std::type_info&) noexcept
385 { return nullptr; }
386
387 _Sp_counted_ptr(const _Sp_counted_ptr&) = delete;
388 _Sp_counted_ptr& operator=(const _Sp_counted_ptr&) = delete;
389
390 private:
391 _Ptr _M_ptr;
392 };
393
394 template<>
395 inline void
396 _Sp_counted_ptr<nullptr_t, _S_single>::_M_dispose() noexcept { }
397
398 template<>
399 inline void
400 _Sp_counted_ptr<nullptr_t, _S_mutex>::_M_dispose() noexcept { }
401
402 template<>
403 inline void
404 _Sp_counted_ptr<nullptr_t, _S_atomic>::_M_dispose() noexcept { }
405
406 template<int _Nm, typename _Tp,
407 bool __use_ebo = !__is_final(_Tp) && __is_empty(_Tp)>
408 struct _Sp_ebo_helper;
409
410 /// Specialization using EBO.
411 template<int _Nm, typename _Tp>
412 struct _Sp_ebo_helper<_Nm, _Tp, true> : private _Tp
413 {
414 explicit _Sp_ebo_helper(const _Tp& __tp) : _Tp(__tp) { }
415 explicit _Sp_ebo_helper(_Tp&& __tp) : _Tp(std::move(__tp)) { }
416
417 static _Tp&
418 _S_get(_Sp_ebo_helper& __eboh) { return static_cast<_Tp&>(__eboh); }
419 };
420
421 /// Specialization not using EBO.
422 template<int _Nm, typename _Tp>
423 struct _Sp_ebo_helper<_Nm, _Tp, false>
424 {
425 explicit _Sp_ebo_helper(const _Tp& __tp) : _M_tp(__tp) { }
426 explicit _Sp_ebo_helper(_Tp&& __tp) : _M_tp(std::move(__tp)) { }
427
428 static _Tp&
429 _S_get(_Sp_ebo_helper& __eboh)
430 { return __eboh._M_tp; }
431
432 private:
433 _Tp _M_tp;
434 };
435
436 // Support for custom deleter and/or allocator
437 template<typename _Ptr, typename _Deleter, typename _Alloc, _Lock_policy _Lp>
438 class _Sp_counted_deleter final : public _Sp_counted_base<_Lp>
439 {
440 class _Impl : _Sp_ebo_helper<0, _Deleter>, _Sp_ebo_helper<1, _Alloc>
441 {
442 typedef _Sp_ebo_helper<0, _Deleter> _Del_base;
443 typedef _Sp_ebo_helper<1, _Alloc> _Alloc_base;
444
445 public:
446 _Impl(_Ptr __p, _Deleter __d, const _Alloc& __a) noexcept
447 : _M_ptr(__p), _Del_base(std::move(__d)), _Alloc_base(__a)
448 { }
449
450 _Deleter& _M_del() noexcept { return _Del_base::_S_get(*this); }
451 _Alloc& _M_alloc() noexcept { return _Alloc_base::_S_get(*this); }
452
453 _Ptr _M_ptr;
454 };
455
456 public:
457 using __allocator_type = __alloc_rebind<_Alloc, _Sp_counted_deleter>;
458
459 // __d(__p) must not throw.
460 _Sp_counted_deleter(_Ptr __p, _Deleter __d) noexcept
461 : _M_impl(__p, std::move(__d), _Alloc()) { }
462
463 // __d(__p) must not throw.
464 _Sp_counted_deleter(_Ptr __p, _Deleter __d, const _Alloc& __a) noexcept
465 : _M_impl(__p, std::move(__d), __a) { }
466
467 ~_Sp_counted_deleter() noexcept { }
468
469 virtual void
470 _M_dispose() noexcept
471 { _M_impl._M_del()(_M_impl._M_ptr); }
472
473 virtual void
474 _M_destroy() noexcept
475 {
476 __allocator_type __a(_M_impl._M_alloc());
477 __allocated_ptr<__allocator_type> __guard_ptr{ __a, this };
478 this->~_Sp_counted_deleter();
479 }
480
481 virtual void*
482 _M_get_deleter(const std::type_info& __ti) noexcept
483 {
484#if __cpp_rtti
485 // _GLIBCXX_RESOLVE_LIB_DEFECTS
486 // 2400. shared_ptr's get_deleter() should use addressof()
487 return __ti == typeid(_Deleter)
488 ? std::__addressof(_M_impl._M_del())
489 : nullptr;
490#else
491 return nullptr;
492#endif
493 }
494
495 private:
496 _Impl _M_impl;
497 };
498
499 // helpers for make_shared / allocate_shared
500
501 struct _Sp_make_shared_tag
502 {
503 private:
504 template<typename _Tp, typename _Alloc, _Lock_policy _Lp>
505 friend class _Sp_counted_ptr_inplace;
506
507 static const type_info&
508 _S_ti() noexcept _GLIBCXX_VISIBILITY(default)__attribute__ ((__visibility__ ("default")))
509 {
510 alignas(type_info) static constexpr char __tag[sizeof(type_info)] = { };
511 return reinterpret_cast<const type_info&>(__tag);
512 }
513 };
514
515 template<typename _Alloc>
516 struct _Sp_alloc_shared_tag
517 {
518 const _Alloc& _M_a;
519 };
520
521 template<typename _Tp, typename _Alloc, _Lock_policy _Lp>
522 class _Sp_counted_ptr_inplace final : public _Sp_counted_base<_Lp>
523 {
524 class _Impl : _Sp_ebo_helper<0, _Alloc>
525 {
526 typedef _Sp_ebo_helper<0, _Alloc> _A_base;
527
528 public:
529 explicit _Impl(_Alloc __a) noexcept : _A_base(__a) { }
530
531 _Alloc& _M_alloc() noexcept { return _A_base::_S_get(*this); }
532
533 __gnu_cxx::__aligned_buffer<_Tp> _M_storage;
534 };
535
536 public:
537 using __allocator_type = __alloc_rebind<_Alloc, _Sp_counted_ptr_inplace>;
538
539 template<typename... _Args>
540 _Sp_counted_ptr_inplace(_Alloc __a, _Args&&... __args)
541 : _M_impl(__a)
542 {
543 // _GLIBCXX_RESOLVE_LIB_DEFECTS
544 // 2070. allocate_shared should use allocator_traits<A>::construct
545 allocator_traits<_Alloc>::construct(__a, _M_ptr(),
546 std::forward<_Args>(__args)...); // might throw
547 }
548
549 ~_Sp_counted_ptr_inplace() noexcept { }
550
551 virtual void
552 _M_dispose() noexcept
553 {
554 allocator_traits<_Alloc>::destroy(_M_impl._M_alloc(), _M_ptr());
555 }
556
557 // Override because the allocator needs to know the dynamic type
558 virtual void
559 _M_destroy() noexcept
560 {
561 __allocator_type __a(_M_impl._M_alloc());
562 __allocated_ptr<__allocator_type> __guard_ptr{ __a, this };
563 this->~_Sp_counted_ptr_inplace();
564 }
565
566 private:
567 friend class __shared_count<_Lp>; // To be able to call _M_ptr().
568
569 // No longer used, but code compiled against old libstdc++ headers
570 // might still call it from __shared_ptr ctor to get the pointer out.
571 virtual void*
572 _M_get_deleter(const std::type_info& __ti) noexcept override
573 {
574 // Check for the fake type_info first, so we don't try to access it
575 // as a real type_info object.
576 if (&__ti == &_Sp_make_shared_tag::_S_ti())
577 return const_cast<typename remove_cv<_Tp>::type*>(_M_ptr());
578#if __cpp_rtti
579 // Callers compiled with old libstdc++ headers and RTTI enabled
580 // might pass this instead:
581 else if (__ti == typeid(_Sp_make_shared_tag))
582 return const_cast<typename remove_cv<_Tp>::type*>(_M_ptr());
583#else
584 // Cannot detect a real type_info object. If the linker keeps a
585 // definition of this function compiled with -fno-rtti then callers
586 // that have RTTI enabled and pass a real type_info object will get
587 // a null pointer returned.
588#endif
589 return nullptr;
590 }
591
592 _Tp* _M_ptr() noexcept { return _M_impl._M_storage._M_ptr(); }
593
594 _Impl _M_impl;
595 };
596
597 // The default deleter for shared_ptr<T[]> and shared_ptr<T[N]>.
598 struct __sp_array_delete
599 {
600 template<typename _Yp>
601 void operator()(_Yp* __p) const { delete[] __p; }
602 };
603
604 template<_Lock_policy _Lp>
605 class __shared_count
606 {
607 template<typename _Tp>
608 struct __not_alloc_shared_tag { using type = void; };
609
610 template<typename _Tp>
611 struct __not_alloc_shared_tag<_Sp_alloc_shared_tag<_Tp>> { };
612
613 public:
614 constexpr __shared_count() noexcept : _M_pi(0)
615 { }
616
617 template<typename _Ptr>
618 explicit
619 __shared_count(_Ptr __p) : _M_pi(0)
620 {
621 __tryif (true)
8
Taking true branch
622 {
623 _M_pi = new _Sp_counted_ptr<_Ptr, _Lp>(__p);
9
Memory is allocated
624 }
625 __catch(...)if (false)
10
Taking false branch
626 {
627 delete __p;
628 __throw_exception_again;
629 }
630 }
631
632 template<typename _Ptr>
633 __shared_count(_Ptr __p, /* is_array = */ false_type)
634 : __shared_count(__p)
7
Calling constructor for '__shared_count<__gnu_cxx::_S_atomic>'
11
Returning from constructor for '__shared_count<__gnu_cxx::_S_atomic>'
635 { }
636
637 template<typename _Ptr>
638 __shared_count(_Ptr __p, /* is_array = */ true_type)
639 : __shared_count(__p, __sp_array_delete{}, allocator<void>())
640 { }
641
642 template<typename _Ptr, typename _Deleter,
643 typename = typename __not_alloc_shared_tag<_Deleter>::type>
644 __shared_count(_Ptr __p, _Deleter __d)
645 : __shared_count(__p, std::move(__d), allocator<void>())
646 { }
647
648 template<typename _Ptr, typename _Deleter, typename _Alloc,
649 typename = typename __not_alloc_shared_tag<_Deleter>::type>
650 __shared_count(_Ptr __p, _Deleter __d, _Alloc __a) : _M_pi(0)
651 {
652 typedef _Sp_counted_deleter<_Ptr, _Deleter, _Alloc, _Lp> _Sp_cd_type;
653 __tryif (true)
654 {
655 typename _Sp_cd_type::__allocator_type __a2(__a);
656 auto __guard = std::__allocate_guarded(__a2);
657 _Sp_cd_type* __mem = __guard.get();
658 ::new (__mem) _Sp_cd_type(__p, std::move(__d), std::move(__a));
659 _M_pi = __mem;
660 __guard = nullptr;
661 }
662 __catch(...)if (false)
663 {
664 __d(__p); // Call _Deleter on __p.
665 __throw_exception_again;
666 }
667 }
668
669 template<typename _Tp, typename _Alloc, typename... _Args>
670 __shared_count(_Tp*& __p, _Sp_alloc_shared_tag<_Alloc> __a,
671 _Args&&... __args)
672 {
673 typedef _Sp_counted_ptr_inplace<_Tp, _Alloc, _Lp> _Sp_cp_type;
674 typename _Sp_cp_type::__allocator_type __a2(__a._M_a);
675 auto __guard = std::__allocate_guarded(__a2);
676 _Sp_cp_type* __mem = __guard.get();
677 auto __pi = ::new (__mem)
678 _Sp_cp_type(__a._M_a, std::forward<_Args>(__args)...);
679 __guard = nullptr;
680 _M_pi = __pi;
681 __p = __pi->_M_ptr();
682 }
683
684#if _GLIBCXX_USE_DEPRECATED1
685#pragma GCC diagnostic push
686#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
687 // Special case for auto_ptr<_Tp> to provide the strong guarantee.
688 template<typename _Tp>
689 explicit
690 __shared_count(std::auto_ptr<_Tp>&& __r);
691#pragma GCC diagnostic pop
692#endif
693
694 // Special case for unique_ptr<_Tp,_Del> to provide the strong guarantee.
695 template<typename _Tp, typename _Del>
696 explicit
697 __shared_count(std::unique_ptr<_Tp, _Del>&& __r) : _M_pi(0)
698 {
699 // _GLIBCXX_RESOLVE_LIB_DEFECTS
700 // 2415. Inconsistency between unique_ptr and shared_ptr
701 if (__r.get() == nullptr)
702 return;
703
704 using _Ptr = typename unique_ptr<_Tp, _Del>::pointer;
705 using _Del2 = typename conditional<is_reference<_Del>::value,
706 reference_wrapper<typename remove_reference<_Del>::type>,
707 _Del>::type;
708 using _Sp_cd_type
709 = _Sp_counted_deleter<_Ptr, _Del2, allocator<void>, _Lp>;
710 using _Alloc = allocator<_Sp_cd_type>;
711 using _Alloc_traits = allocator_traits<_Alloc>;
712 _Alloc __a;
713 _Sp_cd_type* __mem = _Alloc_traits::allocate(__a, 1);
714 _Alloc_traits::construct(__a, __mem, __r.release(),
715 __r.get_deleter()); // non-throwing
716 _M_pi = __mem;
717 }
718
719 // Throw bad_weak_ptr when __r._M_get_use_count() == 0.
720 explicit __shared_count(const __weak_count<_Lp>& __r);
721
722 // Does not throw if __r._M_get_use_count() == 0, caller must check.
723 explicit __shared_count(const __weak_count<_Lp>& __r, std::nothrow_t);
724
725 ~__shared_count() noexcept
726 {
727 if (_M_pi != nullptr)
728 _M_pi->_M_release();
729 }
730
731 __shared_count(const __shared_count& __r) noexcept
732 : _M_pi(__r._M_pi)
733 {
734 if (_M_pi != 0)
735 _M_pi->_M_add_ref_copy();
736 }
737
738 __shared_count&
739 operator=(const __shared_count& __r) noexcept
740 {
741 _Sp_counted_base<_Lp>* __tmp = __r._M_pi;
742 if (__tmp != _M_pi)
743 {
744 if (__tmp != 0)
745 __tmp->_M_add_ref_copy();
746 if (_M_pi != 0)
747 _M_pi->_M_release();
748 _M_pi = __tmp;
749 }
750 return *this;
751 }
752
753 void
754 _M_swap(__shared_count& __r) noexcept
755 {
756 _Sp_counted_base<_Lp>* __tmp = __r._M_pi;
757 __r._M_pi = _M_pi;
758 _M_pi = __tmp;
759 }
760
761 long
762 _M_get_use_count() const noexcept
763 { return _M_pi != 0 ? _M_pi->_M_get_use_count() : 0; }
764
765 bool
766 _M_unique() const noexcept
767 { return this->_M_get_use_count() == 1; }
768
769 void*
770 _M_get_deleter(const std::type_info& __ti) const noexcept
771 { return _M_pi ? _M_pi->_M_get_deleter(__ti) : nullptr; }
772
773 bool
774 _M_less(const __shared_count& __rhs) const noexcept
775 { return std::less<_Sp_counted_base<_Lp>*>()(this->_M_pi, __rhs._M_pi); }
776
777 bool
778 _M_less(const __weak_count<_Lp>& __rhs) const noexcept
779 { return std::less<_Sp_counted_base<_Lp>*>()(this->_M_pi, __rhs._M_pi); }
780
781 // Friend function injected into enclosing namespace and found by ADL
782 friend inline bool
783 operator==(const __shared_count& __a, const __shared_count& __b) noexcept
784 { return __a._M_pi == __b._M_pi; }
785
786 private:
787 friend class __weak_count<_Lp>;
788
789 _Sp_counted_base<_Lp>* _M_pi;
790 };
791
792
793 template<_Lock_policy _Lp>
794 class __weak_count
795 {
796 public:
797 constexpr __weak_count() noexcept : _M_pi(nullptr)
798 { }
799
800 __weak_count(const __shared_count<_Lp>& __r) noexcept
801 : _M_pi(__r._M_pi)
802 {
803 if (_M_pi != nullptr)
804 _M_pi->_M_weak_add_ref();
805 }
806
807 __weak_count(const __weak_count& __r) noexcept
808 : _M_pi(__r._M_pi)
809 {
810 if (_M_pi != nullptr)
811 _M_pi->_M_weak_add_ref();
812 }
813
814 __weak_count(__weak_count&& __r) noexcept
815 : _M_pi(__r._M_pi)
816 { __r._M_pi = nullptr; }
817
818 ~__weak_count() noexcept
819 {
820 if (_M_pi != nullptr)
821 _M_pi->_M_weak_release();
822 }
823
824 __weak_count&
825 operator=(const __shared_count<_Lp>& __r) noexcept
826 {
827 _Sp_counted_base<_Lp>* __tmp = __r._M_pi;
828 if (__tmp != nullptr)
829 __tmp->_M_weak_add_ref();
830 if (_M_pi != nullptr)
831 _M_pi->_M_weak_release();
832 _M_pi = __tmp;
833 return *this;
834 }
835
836 __weak_count&
837 operator=(const __weak_count& __r) noexcept
838 {
839 _Sp_counted_base<_Lp>* __tmp = __r._M_pi;
840 if (__tmp != nullptr)
841 __tmp->_M_weak_add_ref();
842 if (_M_pi != nullptr)
843 _M_pi->_M_weak_release();
844 _M_pi = __tmp;
845 return *this;
846 }
847
848 __weak_count&
849 operator=(__weak_count&& __r) noexcept
850 {
851 if (_M_pi != nullptr)
852 _M_pi->_M_weak_release();
853 _M_pi = __r._M_pi;
854 __r._M_pi = nullptr;
855 return *this;
856 }
857
858 void
859 _M_swap(__weak_count& __r) noexcept
860 {
861 _Sp_counted_base<_Lp>* __tmp = __r._M_pi;
862 __r._M_pi = _M_pi;
863 _M_pi = __tmp;
864 }
865
866 long
867 _M_get_use_count() const noexcept
868 { return _M_pi != nullptr ? _M_pi->_M_get_use_count() : 0; }
869
870 bool
871 _M_less(const __weak_count& __rhs) const noexcept
872 { return std::less<_Sp_counted_base<_Lp>*>()(this->_M_pi, __rhs._M_pi); }
873
874 bool
875 _M_less(const __shared_count<_Lp>& __rhs) const noexcept
876 { return std::less<_Sp_counted_base<_Lp>*>()(this->_M_pi, __rhs._M_pi); }
877
878 // Friend function injected into enclosing namespace and found by ADL
879 friend inline bool
880 operator==(const __weak_count& __a, const __weak_count& __b) noexcept
881 { return __a._M_pi == __b._M_pi; }
882
883 private:
884 friend class __shared_count<_Lp>;
885
886 _Sp_counted_base<_Lp>* _M_pi;
887 };
888
889 // Now that __weak_count is defined we can define this constructor:
890 template<_Lock_policy _Lp>
891 inline
892 __shared_count<_Lp>::__shared_count(const __weak_count<_Lp>& __r)
893 : _M_pi(__r._M_pi)
894 {
895 if (_M_pi != nullptr)
896 _M_pi->_M_add_ref_lock();
897 else
898 __throw_bad_weak_ptr();
899 }
900
901 // Now that __weak_count is defined we can define this constructor:
902 template<_Lock_policy _Lp>
903 inline
904 __shared_count<_Lp>::
905 __shared_count(const __weak_count<_Lp>& __r, std::nothrow_t)
906 : _M_pi(__r._M_pi)
907 {
908 if (_M_pi != nullptr)
909 if (!_M_pi->_M_add_ref_lock_nothrow())
910 _M_pi = nullptr;
911 }
912
913#define __cpp_lib_shared_ptr_arrays201603 201603
914
915 // Helper traits for shared_ptr of array:
916
917 // A pointer type Y* is said to be compatible with a pointer type T* when
918 // either Y* is convertible to T* or Y is U[N] and T is U cv [].
919 template<typename _Yp_ptr, typename _Tp_ptr>
920 struct __sp_compatible_with
921 : false_type
922 { };
923
924 template<typename _Yp, typename _Tp>
925 struct __sp_compatible_with<_Yp*, _Tp*>
926 : is_convertible<_Yp*, _Tp*>::type
927 { };
928
929 template<typename _Up, size_t _Nm>
930 struct __sp_compatible_with<_Up(*)[_Nm], _Up(*)[]>
931 : true_type
932 { };
933
934 template<typename _Up, size_t _Nm>
935 struct __sp_compatible_with<_Up(*)[_Nm], const _Up(*)[]>
936 : true_type
937 { };
938
939 template<typename _Up, size_t _Nm>
940 struct __sp_compatible_with<_Up(*)[_Nm], volatile _Up(*)[]>
941 : true_type
942 { };
943
944 template<typename _Up, size_t _Nm>
945 struct __sp_compatible_with<_Up(*)[_Nm], const volatile _Up(*)[]>
946 : true_type
947 { };
948
949 // Test conversion from Y(*)[N] to U(*)[N] without forming invalid type Y[N].
950 template<typename _Up, size_t _Nm, typename _Yp, typename = void>
951 struct __sp_is_constructible_arrN
952 : false_type
953 { };
954
955 template<typename _Up, size_t _Nm, typename _Yp>
956 struct __sp_is_constructible_arrN<_Up, _Nm, _Yp, __void_t<_Yp[_Nm]>>
957 : is_convertible<_Yp(*)[_Nm], _Up(*)[_Nm]>::type
958 { };
959
960 // Test conversion from Y(*)[] to U(*)[] without forming invalid type Y[].
961 template<typename _Up, typename _Yp, typename = void>
962 struct __sp_is_constructible_arr
963 : false_type
964 { };
965
966 template<typename _Up, typename _Yp>
967 struct __sp_is_constructible_arr<_Up, _Yp, __void_t<_Yp[]>>
968 : is_convertible<_Yp(*)[], _Up(*)[]>::type
969 { };
970
971 // Trait to check if shared_ptr<T> can be constructed from Y*.
972 template<typename _Tp, typename _Yp>
973 struct __sp_is_constructible;
974
975 // When T is U[N], Y(*)[N] shall be convertible to T*;
976 template<typename _Up, size_t _Nm, typename _Yp>
977 struct __sp_is_constructible<_Up[_Nm], _Yp>
978 : __sp_is_constructible_arrN<_Up, _Nm, _Yp>::type
979 { };
980
981 // when T is U[], Y(*)[] shall be convertible to T*;
982 template<typename _Up, typename _Yp>
983 struct __sp_is_constructible<_Up[], _Yp>
984 : __sp_is_constructible_arr<_Up, _Yp>::type
985 { };
986
987 // otherwise, Y* shall be convertible to T*.
988 template<typename _Tp, typename _Yp>
989 struct __sp_is_constructible
990 : is_convertible<_Yp*, _Tp*>::type
991 { };
992
993
994 // Define operator* and operator-> for shared_ptr<T>.
995 template<typename _Tp, _Lock_policy _Lp,
996 bool = is_array<_Tp>::value, bool = is_void<_Tp>::value>
997 class __shared_ptr_access
998 {
999 public:
1000 using element_type = _Tp;
1001
1002 element_type&
1003 operator*() const noexcept
1004 {
1005 __glibcxx_assert(_M_get() != nullptr);
1006 return *_M_get();
1007 }
1008
1009 element_type*
1010 operator->() const noexcept
1011 {
1012 _GLIBCXX_DEBUG_PEDASSERT(_M_get() != nullptr);
1013 return _M_get();
1014 }
1015
1016 private:
1017 element_type*
1018 _M_get() const noexcept
1019 { return static_cast<const __shared_ptr<_Tp, _Lp>*>(this)->get(); }
1020 };
1021
1022 // Define operator-> for shared_ptr<cv void>.
1023 template<typename _Tp, _Lock_policy _Lp>
1024 class __shared_ptr_access<_Tp, _Lp, false, true>
1025 {
1026 public:
1027 using element_type = _Tp;
1028
1029 element_type*
1030 operator->() const noexcept
1031 {
1032 auto __ptr = static_cast<const __shared_ptr<_Tp, _Lp>*>(this)->get();
1033 _GLIBCXX_DEBUG_PEDASSERT(__ptr != nullptr);
1034 return __ptr;
1035 }
1036 };
1037
1038 // Define operator[] for shared_ptr<T[]> and shared_ptr<T[N]>.
1039 template<typename _Tp, _Lock_policy _Lp>
1040 class __shared_ptr_access<_Tp, _Lp, true, false>
1041 {
1042 public:
1043 using element_type = typename remove_extent<_Tp>::type;
1044
1045#if __cplusplus201703L <= 201402L
1046 [[__deprecated__("shared_ptr<T[]>::operator* is absent from C++17")]]
1047 element_type&
1048 operator*() const noexcept
1049 {
1050 __glibcxx_assert(_M_get() != nullptr);
1051 return *_M_get();
1052 }
1053
1054 [[__deprecated__("shared_ptr<T[]>::operator-> is absent from C++17")]]
1055 element_type*
1056 operator->() const noexcept
1057 {
1058 _GLIBCXX_DEBUG_PEDASSERT(_M_get() != nullptr);
1059 return _M_get();
1060 }
1061#endif
1062
1063 element_type&
1064 operator[](ptrdiff_t __i) const
1065 {
1066 __glibcxx_assert(_M_get() != nullptr);
1067 __glibcxx_assert(!extent<_Tp>::value || __i < extent<_Tp>::value);
1068 return _M_get()[__i];
1069 }
1070
1071 private:
1072 element_type*
1073 _M_get() const noexcept
1074 { return static_cast<const __shared_ptr<_Tp, _Lp>*>(this)->get(); }
1075 };
1076
1077 template<typename _Tp, _Lock_policy _Lp>
1078 class __shared_ptr
1079 : public __shared_ptr_access<_Tp, _Lp>
1080 {
1081 public:
1082 using element_type = typename remove_extent<_Tp>::type;
1083
1084 private:
1085 // Constraint for taking ownership of a pointer of type _Yp*:
1086 template<typename _Yp>
1087 using _SafeConv
1088 = typename enable_if<__sp_is_constructible<_Tp, _Yp>::value>::type;
1089
1090 // Constraint for construction from shared_ptr and weak_ptr:
1091 template<typename _Yp, typename _Res = void>
1092 using _Compatible = typename
1093 enable_if<__sp_compatible_with<_Yp*, _Tp*>::value, _Res>::type;
1094
1095 // Constraint for assignment from shared_ptr and weak_ptr:
1096 template<typename _Yp>
1097 using _Assignable = _Compatible<_Yp, __shared_ptr&>;
1098
1099 // Constraint for construction from unique_ptr:
1100 template<typename _Yp, typename _Del, typename _Res = void,
1101 typename _Ptr = typename unique_ptr<_Yp, _Del>::pointer>
1102 using _UniqCompatible = typename enable_if<__and_<
1103 __sp_compatible_with<_Yp*, _Tp*>, is_convertible<_Ptr, element_type*>
1104 >::value, _Res>::type;
1105
1106 // Constraint for assignment from unique_ptr:
1107 template<typename _Yp, typename _Del>
1108 using _UniqAssignable = _UniqCompatible<_Yp, _Del, __shared_ptr&>;
1109
1110 public:
1111
1112#if __cplusplus201703L > 201402L
1113 using weak_type = __weak_ptr<_Tp, _Lp>;
1114#endif
1115
1116 constexpr __shared_ptr() noexcept
1117 : _M_ptr(0), _M_refcount()
1118 { }
1119
1120 template<typename _Yp, typename = _SafeConv<_Yp>>
1121 explicit
1122 __shared_ptr(_Yp* __p)
1123 : _M_ptr(__p), _M_refcount(__p, typename is_array<_Tp>::type())
6
Calling constructor for '__shared_count<__gnu_cxx::_S_atomic>'
12
Returning from constructor for '__shared_count<__gnu_cxx::_S_atomic>'
1124 {
1125 static_assert( !is_void<_Yp>::value, "incomplete type" );
1126 static_assert( sizeof(_Yp) > 0, "incomplete type" );
1127 _M_enable_shared_from_this_with(__p);
1128 }
1129
1130 template<typename _Yp, typename _Deleter, typename = _SafeConv<_Yp>>
1131 __shared_ptr(_Yp* __p, _Deleter __d)
1132 : _M_ptr(__p), _M_refcount(__p, std::move(__d))
1133 {
1134 static_assert(__is_invocable<_Deleter&, _Yp*&>::value,
1135 "deleter expression d(p) is well-formed");
1136 _M_enable_shared_from_this_with(__p);
1137 }
1138
1139 template<typename _Yp, typename _Deleter, typename _Alloc,
1140 typename = _SafeConv<_Yp>>
1141 __shared_ptr(_Yp* __p, _Deleter __d, _Alloc __a)
1142 : _M_ptr(__p), _M_refcount(__p, std::move(__d), std::move(__a))
1143 {
1144 static_assert(__is_invocable<_Deleter&, _Yp*&>::value,
1145 "deleter expression d(p) is well-formed");
1146 _M_enable_shared_from_this_with(__p);
1147 }
1148
1149 template<typename _Deleter>
1150 __shared_ptr(nullptr_t __p, _Deleter __d)
1151 : _M_ptr(0), _M_refcount(__p, std::move(__d))
1152 { }
1153
1154 template<typename _Deleter, typename _Alloc>
1155 __shared_ptr(nullptr_t __p, _Deleter __d, _Alloc __a)
1156 : _M_ptr(0), _M_refcount(__p, std::move(__d), std::move(__a))
1157 { }
1158
1159 template<typename _Yp>
1160 __shared_ptr(const __shared_ptr<_Yp, _Lp>& __r,
1161 element_type* __p) noexcept
1162 : _M_ptr(__p), _M_refcount(__r._M_refcount) // never throws
1163 { }
1164
1165 __shared_ptr(const __shared_ptr&) noexcept = default;
1166 __shared_ptr& operator=(const __shared_ptr&) noexcept = default;
1167 ~__shared_ptr() = default;
1168
1169 template<typename _Yp, typename = _Compatible<_Yp>>
1170 __shared_ptr(const __shared_ptr<_Yp, _Lp>& __r) noexcept
1171 : _M_ptr(__r._M_ptr), _M_refcount(__r._M_refcount)
1172 { }
1173
1174 __shared_ptr(__shared_ptr&& __r) noexcept
1175 : _M_ptr(__r._M_ptr), _M_refcount()
1176 {
1177 _M_refcount._M_swap(__r._M_refcount);
1178 __r._M_ptr = 0;
1179 }
1180
1181 template<typename _Yp, typename = _Compatible<_Yp>>
1182 __shared_ptr(__shared_ptr<_Yp, _Lp>&& __r) noexcept
1183 : _M_ptr(__r._M_ptr), _M_refcount()
1184 {
1185 _M_refcount._M_swap(__r._M_refcount);
1186 __r._M_ptr = 0;
1187 }
1188
1189 template<typename _Yp, typename = _Compatible<_Yp>>
1190 explicit __shared_ptr(const __weak_ptr<_Yp, _Lp>& __r)
1191 : _M_refcount(__r._M_refcount) // may throw
1192 {
1193 // It is now safe to copy __r._M_ptr, as
1194 // _M_refcount(__r._M_refcount) did not throw.
1195 _M_ptr = __r._M_ptr;
1196 }
1197
1198 // If an exception is thrown this constructor has no effect.
1199 template<typename _Yp, typename _Del,
1200 typename = _UniqCompatible<_Yp, _Del>>
1201 __shared_ptr(unique_ptr<_Yp, _Del>&& __r)
1202 : _M_ptr(__r.get()), _M_refcount()
1203 {
1204 auto __raw = __to_address(__r.get());
1205 _M_refcount = __shared_count<_Lp>(std::move(__r));
1206 _M_enable_shared_from_this_with(__raw);
1207 }
1208
1209#if __cplusplus201703L <= 201402L && _GLIBCXX_USE_DEPRECATED1
1210 protected:
1211 // If an exception is thrown this constructor has no effect.
1212 template<typename _Tp1, typename _Del,
1213 typename enable_if<__and_<
1214 __not_<is_array<_Tp>>, is_array<_Tp1>,
1215 is_convertible<typename unique_ptr<_Tp1, _Del>::pointer, _Tp*>
1216 >::value, bool>::type = true>
1217 __shared_ptr(unique_ptr<_Tp1, _Del>&& __r, __sp_array_delete)
1218 : _M_ptr(__r.get()), _M_refcount()
1219 {
1220 auto __raw = __to_address(__r.get());
1221 _M_refcount = __shared_count<_Lp>(std::move(__r));
1222 _M_enable_shared_from_this_with(__raw);
1223 }
1224 public:
1225#endif
1226
1227#if _GLIBCXX_USE_DEPRECATED1
1228#pragma GCC diagnostic push
1229#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
1230 // Postcondition: use_count() == 1 and __r.get() == 0
1231 template<typename _Yp, typename = _Compatible<_Yp>>
1232 __shared_ptr(auto_ptr<_Yp>&& __r);
1233#pragma GCC diagnostic pop
1234#endif
1235
1236 constexpr __shared_ptr(nullptr_t) noexcept : __shared_ptr() { }
1237
1238 template<typename _Yp>
1239 _Assignable<_Yp>
1240 operator=(const __shared_ptr<_Yp, _Lp>& __r) noexcept
1241 {
1242 _M_ptr = __r._M_ptr;
1243 _M_refcount = __r._M_refcount; // __shared_count::op= doesn't throw
1244 return *this;
1245 }
1246
1247#if _GLIBCXX_USE_DEPRECATED1
1248#pragma GCC diagnostic push
1249#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
1250 template<typename _Yp>
1251 _Assignable<_Yp>
1252 operator=(auto_ptr<_Yp>&& __r)
1253 {
1254 __shared_ptr(std::move(__r)).swap(*this);
1255 return *this;
1256 }
1257#pragma GCC diagnostic pop
1258#endif
1259
1260 __shared_ptr&
1261 operator=(__shared_ptr&& __r) noexcept
1262 {
1263 __shared_ptr(std::move(__r)).swap(*this);
1264 return *this;
1265 }
1266
1267 template<class _Yp>
1268 _Assignable<_Yp>
1269 operator=(__shared_ptr<_Yp, _Lp>&& __r) noexcept
1270 {
1271 __shared_ptr(std::move(__r)).swap(*this);
1272 return *this;
1273 }
1274
1275 template<typename _Yp, typename _Del>
1276 _UniqAssignable<_Yp, _Del>
1277 operator=(unique_ptr<_Yp, _Del>&& __r)
1278 {
1279 __shared_ptr(std::move(__r)).swap(*this);
1280 return *this;
1281 }
1282
1283 void
1284 reset() noexcept
1285 { __shared_ptr().swap(*this); }
1286
1287 template<typename _Yp>
1288 _SafeConv<_Yp>
1289 reset(_Yp* __p) // _Yp must be complete.
1290 {
1291 // Catch self-reset errors.
1292 __glibcxx_assert(__p == 0 || __p != _M_ptr);
1293 __shared_ptr(__p).swap(*this);
1294 }
1295
1296 template<typename _Yp, typename _Deleter>
1297 _SafeConv<_Yp>
1298 reset(_Yp* __p, _Deleter __d)
1299 { __shared_ptr(__p, std::move(__d)).swap(*this); }
1300
1301 template<typename _Yp, typename _Deleter, typename _Alloc>
1302 _SafeConv<_Yp>
1303 reset(_Yp* __p, _Deleter __d, _Alloc __a)
1304 { __shared_ptr(__p, std::move(__d), std::move(__a)).swap(*this); }
1305
1306 element_type*
1307 get() const noexcept
1308 { return _M_ptr; }
1309
1310 explicit operator bool() const // never throws
1311 { return _M_ptr == 0 ? false : true; }
1312
1313 bool
1314 unique() const noexcept
1315 { return _M_refcount._M_unique(); }
1316
1317 long
1318 use_count() const noexcept
1319 { return _M_refcount._M_get_use_count(); }
1320
1321 void
1322 swap(__shared_ptr<_Tp, _Lp>& __other) noexcept
1323 {
1324 std::swap(_M_ptr, __other._M_ptr);
1325 _M_refcount._M_swap(__other._M_refcount);
1326 }
1327
1328 template<typename _Tp1>
1329 bool
1330 owner_before(__shared_ptr<_Tp1, _Lp> const& __rhs) const noexcept
1331 { return _M_refcount._M_less(__rhs._M_refcount); }
1332
1333 template<typename _Tp1>
1334 bool
1335 owner_before(__weak_ptr<_Tp1, _Lp> const& __rhs) const noexcept
1336 { return _M_refcount._M_less(__rhs._M_refcount); }
1337
1338 protected:
1339 // This constructor is non-standard, it is used by allocate_shared.
1340 template<typename _Alloc, typename... _Args>
1341 __shared_ptr(_Sp_alloc_shared_tag<_Alloc> __tag, _Args&&... __args)
1342 : _M_ptr(), _M_refcount(_M_ptr, __tag, std::forward<_Args>(__args)...)
1343 { _M_enable_shared_from_this_with(_M_ptr); }
1344
1345 template<typename _Tp1, _Lock_policy _Lp1, typename _Alloc,
1346 typename... _Args>
1347 friend __shared_ptr<_Tp1, _Lp1>
1348 __allocate_shared(const _Alloc& __a, _Args&&... __args);
1349
1350 // This constructor is used by __weak_ptr::lock() and
1351 // shared_ptr::shared_ptr(const weak_ptr&, std::nothrow_t).
1352 __shared_ptr(const __weak_ptr<_Tp, _Lp>& __r, std::nothrow_t)
1353 : _M_refcount(__r._M_refcount, std::nothrow)
1354 {
1355 _M_ptr = _M_refcount._M_get_use_count() ? __r._M_ptr : nullptr;
1356 }
1357
1358 friend class __weak_ptr<_Tp, _Lp>;
1359
1360 private:
1361
1362 template<typename _Yp>
1363 using __esft_base_t = decltype(__enable_shared_from_this_base(
1364 std::declval<const __shared_count<_Lp>&>(),
1365 std::declval<_Yp*>()));
1366
1367 // Detect an accessible and unambiguous enable_shared_from_this base.
1368 template<typename _Yp, typename = void>
1369 struct __has_esft_base
1370 : false_type { };
1371
1372 template<typename _Yp>
1373 struct __has_esft_base<_Yp, __void_t<__esft_base_t<_Yp>>>
1374 : __not_<is_array<_Tp>> { }; // No enable shared_from_this for arrays
1375
1376 template<typename _Yp, typename _Yp2 = typename remove_cv<_Yp>::type>
1377 typename enable_if<__has_esft_base<_Yp2>::value>::type
1378 _M_enable_shared_from_this_with(_Yp* __p) noexcept
1379 {
1380 if (auto __base = __enable_shared_from_this_base(_M_refcount, __p))
1381 __base->_M_weak_assign(const_cast<_Yp2*>(__p), _M_refcount);
1382 }
1383
1384 template<typename _Yp, typename _Yp2 = typename remove_cv<_Yp>::type>
1385 typename enable_if<!__has_esft_base<_Yp2>::value>::type
1386 _M_enable_shared_from_this_with(_Yp*) noexcept
1387 { }
1388
1389 void*
1390 _M_get_deleter(const std::type_info& __ti) const noexcept
1391 { return _M_refcount._M_get_deleter(__ti); }
1392
1393 template<typename _Tp1, _Lock_policy _Lp1> friend class __shared_ptr;
1394 template<typename _Tp1, _Lock_policy _Lp1> friend class __weak_ptr;
1395
1396 template<typename _Del, typename _Tp1, _Lock_policy _Lp1>
1397 friend _Del* get_deleter(const __shared_ptr<_Tp1, _Lp1>&) noexcept;
1398
1399 template<typename _Del, typename _Tp1>
1400 friend _Del* get_deleter(const shared_ptr<_Tp1>&) noexcept;
1401
1402 element_type* _M_ptr; // Contained pointer.
1403 __shared_count<_Lp> _M_refcount; // Reference counter.
1404 };
1405
1406
1407 // 20.7.2.2.7 shared_ptr comparisons
1408 template<typename _Tp1, typename _Tp2, _Lock_policy _Lp>
1409 inline bool
1410 operator==(const __shared_ptr<_Tp1, _Lp>& __a,
1411 const __shared_ptr<_Tp2, _Lp>& __b) noexcept
1412 { return __a.get() == __b.get(); }
1413
1414 template<typename _Tp, _Lock_policy _Lp>
1415 inline bool
1416 operator==(const __shared_ptr<_Tp, _Lp>& __a, nullptr_t) noexcept
1417 { return !__a; }
1418
1419 template<typename _Tp, _Lock_policy _Lp>
1420 inline bool
1421 operator==(nullptr_t, const __shared_ptr<_Tp, _Lp>& __a) noexcept
1422 { return !__a; }
1423
1424 template<typename _Tp1, typename _Tp2, _Lock_policy _Lp>
1425 inline bool
1426 operator!=(const __shared_ptr<_Tp1, _Lp>& __a,
1427 const __shared_ptr<_Tp2, _Lp>& __b) noexcept
1428 { return __a.get() != __b.get(); }
1429
1430 template<typename _Tp, _Lock_policy _Lp>
1431 inline bool
1432 operator!=(const __shared_ptr<_Tp, _Lp>& __a, nullptr_t) noexcept
1433 { return (bool)__a; }
1434
1435 template<typename _Tp, _Lock_policy _Lp>
1436 inline bool
1437 operator!=(nullptr_t, const __shared_ptr<_Tp, _Lp>& __a) noexcept
1438 { return (bool)__a; }
1439
1440 template<typename _Tp, typename _Up, _Lock_policy _Lp>
1441 inline bool
1442 operator<(const __shared_ptr<_Tp, _Lp>& __a,
1443 const __shared_ptr<_Up, _Lp>& __b) noexcept
1444 {
1445 using _Tp_elt = typename __shared_ptr<_Tp, _Lp>::element_type;
1446 using _Up_elt = typename __shared_ptr<_Up, _Lp>::element_type;
1447 using _Vp = typename common_type<_Tp_elt*, _Up_elt*>::type;
1448 return less<_Vp>()(__a.get(), __b.get());
1449 }
1450
1451 template<typename _Tp, _Lock_policy _Lp>
1452 inline bool
1453 operator<(const __shared_ptr<_Tp, _Lp>& __a, nullptr_t) noexcept
1454 {
1455 using _Tp_elt = typename __shared_ptr<_Tp, _Lp>::element_type;
1456 return less<_Tp_elt*>()(__a.get(), nullptr);
1457 }
1458
1459 template<typename _Tp, _Lock_policy _Lp>
1460 inline bool
1461 operator<(nullptr_t, const __shared_ptr<_Tp, _Lp>& __a) noexcept
1462 {
1463 using _Tp_elt = typename __shared_ptr<_Tp, _Lp>::element_type;
1464 return less<_Tp_elt*>()(nullptr, __a.get());
1465 }
1466
1467 template<typename _Tp1, typename _Tp2, _Lock_policy _Lp>
1468 inline bool
1469 operator<=(const __shared_ptr<_Tp1, _Lp>& __a,
1470 const __shared_ptr<_Tp2, _Lp>& __b) noexcept
1471 { return !(__b < __a); }
1472
1473 template<typename _Tp, _Lock_policy _Lp>
1474 inline bool
1475 operator<=(const __shared_ptr<_Tp, _Lp>& __a, nullptr_t) noexcept
1476 { return !(nullptr < __a); }
1477
1478 template<typename _Tp, _Lock_policy _Lp>
1479 inline bool
1480 operator<=(nullptr_t, const __shared_ptr<_Tp, _Lp>& __a) noexcept
1481 { return !(__a < nullptr); }
1482
1483 template<typename _Tp1, typename _Tp2, _Lock_policy _Lp>
1484 inline bool
1485 operator>(const __shared_ptr<_Tp1, _Lp>& __a,
1486 const __shared_ptr<_Tp2, _Lp>& __b) noexcept
1487 { return (__b < __a); }
1488
1489 template<typename _Tp, _Lock_policy _Lp>
1490 inline bool
1491 operator>(const __shared_ptr<_Tp, _Lp>& __a, nullptr_t) noexcept
1492 { return nullptr < __a; }
1493
1494 template<typename _Tp, _Lock_policy _Lp>
1495 inline bool
1496 operator>(nullptr_t, const __shared_ptr<_Tp, _Lp>& __a) noexcept
1497 { return __a < nullptr; }
1498
1499 template<typename _Tp1, typename _Tp2, _Lock_policy _Lp>
1500 inline bool
1501 operator>=(const __shared_ptr<_Tp1, _Lp>& __a,
1502 const __shared_ptr<_Tp2, _Lp>& __b) noexcept
1503 { return !(__a < __b); }
1504
1505 template<typename _Tp, _Lock_policy _Lp>
1506 inline bool
1507 operator>=(const __shared_ptr<_Tp, _Lp>& __a, nullptr_t) noexcept
1508 { return !(__a < nullptr); }
1509
1510 template<typename _Tp, _Lock_policy _Lp>
1511 inline bool
1512 operator>=(nullptr_t, const __shared_ptr<_Tp, _Lp>& __a) noexcept
1513 { return !(nullptr < __a); }
1514
1515 template<typename _Sp>
1516 struct _Sp_less : public binary_function<_Sp, _Sp, bool>
1517 {
1518 bool
1519 operator()(const _Sp& __lhs, const _Sp& __rhs) const noexcept
1520 {
1521 typedef typename _Sp::element_type element_type;
1522 return std::less<element_type*>()(__lhs.get(), __rhs.get());
1523 }
1524 };
1525
1526 template<typename _Tp, _Lock_policy _Lp>
1527 struct less<__shared_ptr<_Tp, _Lp>>
1528 : public _Sp_less<__shared_ptr<_Tp, _Lp>>
1529 { };
1530
1531 // 20.7.2.2.8 shared_ptr specialized algorithms.
1532 template<typename _Tp, _Lock_policy _Lp>
1533 inline void
1534 swap(__shared_ptr<_Tp, _Lp>& __a, __shared_ptr<_Tp, _Lp>& __b) noexcept
1535 { __a.swap(__b); }
1536
1537 // 20.7.2.2.9 shared_ptr casts
1538
1539 // The seemingly equivalent code:
1540 // shared_ptr<_Tp, _Lp>(static_cast<_Tp*>(__r.get()))
1541 // will eventually result in undefined behaviour, attempting to
1542 // delete the same object twice.
1543 /// static_pointer_cast
1544 template<typename _Tp, typename _Tp1, _Lock_policy _Lp>
1545 inline __shared_ptr<_Tp, _Lp>
1546 static_pointer_cast(const __shared_ptr<_Tp1, _Lp>& __r) noexcept
1547 {
1548 using _Sp = __shared_ptr<_Tp, _Lp>;
1549 return _Sp(__r, static_cast<typename _Sp::element_type*>(__r.get()));
1550 }
1551
1552 // The seemingly equivalent code:
1553 // shared_ptr<_Tp, _Lp>(const_cast<_Tp*>(__r.get()))
1554 // will eventually result in undefined behaviour, attempting to
1555 // delete the same object twice.
1556 /// const_pointer_cast
1557 template<typename _Tp, typename _Tp1, _Lock_policy _Lp>
1558 inline __shared_ptr<_Tp, _Lp>
1559 const_pointer_cast(const __shared_ptr<_Tp1, _Lp>& __r) noexcept
1560 {
1561 using _Sp = __shared_ptr<_Tp, _Lp>;
1562 return _Sp(__r, const_cast<typename _Sp::element_type*>(__r.get()));
1563 }
1564
1565 // The seemingly equivalent code:
1566 // shared_ptr<_Tp, _Lp>(dynamic_cast<_Tp*>(__r.get()))
1567 // will eventually result in undefined behaviour, attempting to
1568 // delete the same object twice.
1569 /// dynamic_pointer_cast
1570 template<typename _Tp, typename _Tp1, _Lock_policy _Lp>
1571 inline __shared_ptr<_Tp, _Lp>
1572 dynamic_pointer_cast(const __shared_ptr<_Tp1, _Lp>& __r) noexcept
1573 {
1574 using _Sp = __shared_ptr<_Tp, _Lp>;
1575 if (auto* __p = dynamic_cast<typename _Sp::element_type*>(__r.get()))
1576 return _Sp(__r, __p);
1577 return _Sp();
1578 }
1579
1580#if __cplusplus201703L > 201402L
1581 template<typename _Tp, typename _Tp1, _Lock_policy _Lp>
1582 inline __shared_ptr<_Tp, _Lp>
1583 reinterpret_pointer_cast(const __shared_ptr<_Tp1, _Lp>& __r) noexcept
1584 {
1585 using _Sp = __shared_ptr<_Tp, _Lp>;
1586 return _Sp(__r, reinterpret_cast<typename _Sp::element_type*>(__r.get()));
1587 }
1588#endif
1589
1590 template<typename _Tp, _Lock_policy _Lp>
1591 class __weak_ptr
1592 {
1593 template<typename _Yp, typename _Res = void>
1594 using _Compatible = typename
1595 enable_if<__sp_compatible_with<_Yp*, _Tp*>::value, _Res>::type;
1596
1597 // Constraint for assignment from shared_ptr and weak_ptr:
1598 template<typename _Yp>
1599 using _Assignable = _Compatible<_Yp, __weak_ptr&>;
1600
1601 public:
1602 using element_type = typename remove_extent<_Tp>::type;
1603
1604 constexpr __weak_ptr() noexcept
1605 : _M_ptr(nullptr), _M_refcount()
1606 { }
1607
1608 __weak_ptr(const __weak_ptr&) noexcept = default;
1609
1610 ~__weak_ptr() = default;
1611
1612 // The "obvious" converting constructor implementation:
1613 //
1614 // template<typename _Tp1>
1615 // __weak_ptr(const __weak_ptr<_Tp1, _Lp>& __r)
1616 // : _M_ptr(__r._M_ptr), _M_refcount(__r._M_refcount) // never throws
1617 // { }
1618 //
1619 // has a serious problem.
1620 //
1621 // __r._M_ptr may already have been invalidated. The _M_ptr(__r._M_ptr)
1622 // conversion may require access to *__r._M_ptr (virtual inheritance).
1623 //
1624 // It is not possible to avoid spurious access violations since
1625 // in multithreaded programs __r._M_ptr may be invalidated at any point.
1626 template<typename _Yp, typename = _Compatible<_Yp>>
1627 __weak_ptr(const __weak_ptr<_Yp, _Lp>& __r) noexcept
1628 : _M_refcount(__r._M_refcount)
1629 { _M_ptr = __r.lock().get(); }
1630
1631 template<typename _Yp, typename = _Compatible<_Yp>>
1632 __weak_ptr(const __shared_ptr<_Yp, _Lp>& __r) noexcept
1633 : _M_ptr(__r._M_ptr), _M_refcount(__r._M_refcount)
1634 { }
1635
1636 __weak_ptr(__weak_ptr&& __r) noexcept
1637 : _M_ptr(__r._M_ptr), _M_refcount(std::move(__r._M_refcount))
1638 { __r._M_ptr = nullptr; }
1639
1640 template<typename _Yp, typename = _Compatible<_Yp>>
1641 __weak_ptr(__weak_ptr<_Yp, _Lp>&& __r) noexcept
1642 : _M_ptr(__r.lock().get()), _M_refcount(std::move(__r._M_refcount))
1643 { __r._M_ptr = nullptr; }
1644
1645 __weak_ptr&
1646 operator=(const __weak_ptr& __r) noexcept = default;
1647
1648 template<typename _Yp>
1649 _Assignable<_Yp>
1650 operator=(const __weak_ptr<_Yp, _Lp>& __r) noexcept
1651 {
1652 _M_ptr = __r.lock().get();
1653 _M_refcount = __r._M_refcount;
1654 return *this;
1655 }
1656
1657 template<typename _Yp>
1658 _Assignable<_Yp>
1659 operator=(const __shared_ptr<_Yp, _Lp>& __r) noexcept
1660 {
1661 _M_ptr = __r._M_ptr;
1662 _M_refcount = __r._M_refcount;
1663 return *this;
1664 }
1665
1666 __weak_ptr&
1667 operator=(__weak_ptr&& __r) noexcept
1668 {
1669 _M_ptr = __r._M_ptr;
1670 _M_refcount = std::move(__r._M_refcount);
1671 __r._M_ptr = nullptr;
1672 return *this;
1673 }
1674
1675 template<typename _Yp>
1676 _Assignable<_Yp>
1677 operator=(__weak_ptr<_Yp, _Lp>&& __r) noexcept
1678 {
1679 _M_ptr = __r.lock().get();
1680 _M_refcount = std::move(__r._M_refcount);
1681 __r._M_ptr = nullptr;
1682 return *this;
1683 }
1684
1685 __shared_ptr<_Tp, _Lp>
1686 lock() const noexcept
1687 { return __shared_ptr<element_type, _Lp>(*this, std::nothrow); }
1688
1689 long
1690 use_count() const noexcept
1691 { return _M_refcount._M_get_use_count(); }
1692
1693 bool
1694 expired() const noexcept
1695 { return _M_refcount._M_get_use_count() == 0; }
1696
1697 template<typename _Tp1>
1698 bool
1699 owner_before(const __shared_ptr<_Tp1, _Lp>& __rhs) const noexcept
1700 { return _M_refcount._M_less(__rhs._M_refcount); }
1701
1702 template<typename _Tp1>
1703 bool
1704 owner_before(const __weak_ptr<_Tp1, _Lp>& __rhs) const noexcept
1705 { return _M_refcount._M_less(__rhs._M_refcount); }
1706
1707 void
1708 reset() noexcept
1709 { __weak_ptr().swap(*this); }
1710
1711 void
1712 swap(__weak_ptr& __s) noexcept
1713 {
1714 std::swap(_M_ptr, __s._M_ptr);
1715 _M_refcount._M_swap(__s._M_refcount);
1716 }
1717
1718 private:
1719 // Used by __enable_shared_from_this.
1720 void
1721 _M_assign(_Tp* __ptr, const __shared_count<_Lp>& __refcount) noexcept
1722 {
1723 if (use_count() == 0)
1724 {
1725 _M_ptr = __ptr;
1726 _M_refcount = __refcount;
1727 }
1728 }
1729
1730 template<typename _Tp1, _Lock_policy _Lp1> friend class __shared_ptr;
1731 template<typename _Tp1, _Lock_policy _Lp1> friend class __weak_ptr;
1732 friend class __enable_shared_from_this<_Tp, _Lp>;
1733 friend class enable_shared_from_this<_Tp>;
1734
1735 element_type* _M_ptr; // Contained pointer.
1736 __weak_count<_Lp> _M_refcount; // Reference counter.
1737 };
1738
1739 // 20.7.2.3.6 weak_ptr specialized algorithms.
1740 template<typename _Tp, _Lock_policy _Lp>
1741 inline void
1742 swap(__weak_ptr<_Tp, _Lp>& __a, __weak_ptr<_Tp, _Lp>& __b) noexcept
1743 { __a.swap(__b); }
1744
1745 template<typename _Tp, typename _Tp1>
1746 struct _Sp_owner_less : public binary_function<_Tp, _Tp, bool>
1747 {
1748 bool
1749 operator()(const _Tp& __lhs, const _Tp& __rhs) const noexcept
1750 { return __lhs.owner_before(__rhs); }
1751
1752 bool
1753 operator()(const _Tp& __lhs, const _Tp1& __rhs) const noexcept
1754 { return __lhs.owner_before(__rhs); }
1755
1756 bool
1757 operator()(const _Tp1& __lhs, const _Tp& __rhs) const noexcept
1758 { return __lhs.owner_before(__rhs); }
1759 };
1760
1761 template<>
1762 struct _Sp_owner_less<void, void>
1763 {
1764 template<typename _Tp, typename _Up>
1765 auto
1766 operator()(const _Tp& __lhs, const _Up& __rhs) const noexcept
1767 -> decltype(__lhs.owner_before(__rhs))
1768 { return __lhs.owner_before(__rhs); }
1769
1770 using is_transparent = void;
1771 };
1772
1773 template<typename _Tp, _Lock_policy _Lp>
1774 struct owner_less<__shared_ptr<_Tp, _Lp>>
1775 : public _Sp_owner_less<__shared_ptr<_Tp, _Lp>, __weak_ptr<_Tp, _Lp>>
1776 { };
1777
1778 template<typename _Tp, _Lock_policy _Lp>
1779 struct owner_less<__weak_ptr<_Tp, _Lp>>
1780 : public _Sp_owner_less<__weak_ptr<_Tp, _Lp>, __shared_ptr<_Tp, _Lp>>
1781 { };
1782
1783
1784 template<typename _Tp, _Lock_policy _Lp>
1785 class __enable_shared_from_this
1786 {
1787 protected:
1788 constexpr __enable_shared_from_this() noexcept { }
1789
1790 __enable_shared_from_this(const __enable_shared_from_this&) noexcept { }
1791
1792 __enable_shared_from_this&
1793 operator=(const __enable_shared_from_this&) noexcept
1794 { return *this; }
1795
1796 ~__enable_shared_from_this() { }
1797
1798 public:
1799 __shared_ptr<_Tp, _Lp>
1800 shared_from_this()
1801 { return __shared_ptr<_Tp, _Lp>(this->_M_weak_this); }
1802
1803 __shared_ptr<const _Tp, _Lp>
1804 shared_from_this() const
1805 { return __shared_ptr<const _Tp, _Lp>(this->_M_weak_this); }
1806
1807#if __cplusplus201703L > 201402L || !defined(__STRICT_ANSI__) // c++1z or gnu++11
1808 __weak_ptr<_Tp, _Lp>
1809 weak_from_this() noexcept
1810 { return this->_M_weak_this; }
1811
1812 __weak_ptr<const _Tp, _Lp>
1813 weak_from_this() const noexcept
1814 { return this->_M_weak_this; }
1815#endif
1816
1817 private:
1818 template<typename _Tp1>
1819 void
1820 _M_weak_assign(_Tp1* __p, const __shared_count<_Lp>& __n) const noexcept
1821 { _M_weak_this._M_assign(__p, __n); }
1822
1823 friend const __enable_shared_from_this*
1824 __enable_shared_from_this_base(const __shared_count<_Lp>&,
1825 const __enable_shared_from_this* __p)
1826 { return __p; }
1827
1828 template<typename, _Lock_policy>
1829 friend class __shared_ptr;
1830
1831 mutable __weak_ptr<_Tp, _Lp> _M_weak_this;
1832 };
1833
1834 template<typename _Tp, _Lock_policy _Lp, typename _Alloc, typename... _Args>
1835 inline __shared_ptr<_Tp, _Lp>
1836 __allocate_shared(const _Alloc& __a, _Args&&... __args)
1837 {
1838 return __shared_ptr<_Tp, _Lp>(_Sp_alloc_shared_tag<_Alloc>{__a},
1839 std::forward<_Args>(__args)...);
1840 }
1841
1842 template<typename _Tp, _Lock_policy _Lp, typename... _Args>
1843 inline __shared_ptr<_Tp, _Lp>
1844 __make_shared(_Args&&... __args)
1845 {
1846 typedef typename std::remove_const<_Tp>::type _Tp_nc;
1847 return std::__allocate_shared<_Tp, _Lp>(std::allocator<_Tp_nc>(),
1848 std::forward<_Args>(__args)...);
1849 }
1850
1851 /// std::hash specialization for __shared_ptr.
1852 template<typename _Tp, _Lock_policy _Lp>
1853 struct hash<__shared_ptr<_Tp, _Lp>>
1854 : public __hash_base<size_t, __shared_ptr<_Tp, _Lp>>
1855 {
1856 size_t
1857 operator()(const __shared_ptr<_Tp, _Lp>& __s) const noexcept
1858 {
1859 return hash<typename __shared_ptr<_Tp, _Lp>::element_type*>()(
1860 __s.get());
1861 }
1862 };
1863
1864_GLIBCXX_END_NAMESPACE_VERSION
1865} // namespace
1866
1867#endif // _SHARED_PTR_BASE_H