1 | // Licensed to the .NET Foundation under one or more agreements. |
2 | // The .NET Foundation licenses this file to you under the MIT license. |
3 | // See the LICENSE file in the project root for more information. |
4 | // --------------------------------------------------------------------------- |
5 | // StaticContract.h |
6 | // --------------------------------------------------------------------------- |
7 | |
8 | |
9 | #ifndef __STATIC_CONTRACT_H_ |
10 | #define __STATIC_CONTRACT_H_ |
11 | |
12 | // Make sure we have the WCHAR defines available. |
13 | #include "palclr.h" |
14 | |
15 | #define SCAN_WIDEN2(x) L ## x |
16 | #define SCAN_WIDEN(x) SCAN_WIDEN2(x) |
17 | |
18 | // |
19 | // PDB annotations for the static contract analysis tool. These are seperated |
20 | // from Contract.h to allow their inclusion in any part of the system. |
21 | // |
22 | |
23 | #if defined(_DEBUG) && defined(_TARGET_X86_) |
24 | #define METHOD_CANNOT_BE_FOLDED_DEBUG \ |
25 | static int _noFold = 0; \ |
26 | _noFold++; |
27 | #else |
28 | #define METHOD_CANNOT_BE_FOLDED_DEBUG |
29 | #endif |
30 | |
31 | #ifdef _TARGET_X86_ |
32 | |
33 | // |
34 | // currently, only x86 has a static contract analysis tool, so let's not |
35 | // bloat the PDBs of all the other architectures too.. |
36 | // |
37 | #define ANNOTATION_TRY_BEGIN __annotation(W("TRY_BEGIN")) |
38 | #define ANNOTATION_TRY_END __annotation(W("TRY_END")) |
39 | #define ANNOTATION_HANDLER_BEGIN __annotation(W("HANDLER_BEGIN")) |
40 | #define ANNOTATION_HANDLER_END __annotation(W("HANDLER_END")) |
41 | #define ANNOTATION_NOTHROW __annotation(W("NOTHROW")) |
42 | #define ANNOTATION_CANNOT_TAKE_LOCK __annotation(W("CANNOT_TAKE_LOCK")) |
43 | #define ANNOTATION_WRAPPER __annotation(W("WRAPPER")) |
44 | #define ANNOTATION_FAULT __annotation(W("FAULT")) |
45 | #define ANNOTATION_FORBID_FAULT __annotation(W("FORBID_FAULT")) |
46 | #define ANNOTATION_COOPERATIVE __annotation(W("MODE_COOPERATIVE")) |
47 | #define ANNOTATION_MODE_COOPERATIVE __annotation(W("MODE_PREEMPTIVE")) |
48 | #define ANNOTATION_MODE_ANY __annotation(W("MODE_ANY")) |
49 | #define ANNOTATION_GC_TRIGGERS __annotation(W("GC_TRIGGERS")) |
50 | #define ANNOTATION_IGNORE_THROW __annotation(W("THROWS"), W("NOTHROW"), W("CONDITIONAL_EXEMPT")) |
51 | #define ANNOTATION_IGNORE_LOCK __annotation(W("CAN_TAKE_LOCK"), W("CANNOT_TAKE_LOCK"), W("CONDITIONAL_EXEMPT")) |
52 | #define ANNOTATION_IGNORE_FAULT __annotation(W("FAULT"), W("FORBID_FAULT"), W("CONDITIONAL_EXEMPT")) |
53 | #define ANNOTATION_IGNORE_TRIGGER __annotation(W("GC_TRIGGERS"), W("GC_NOTRIGGER"), W("CONDITIONAL_EXEMPT")) |
54 | #define ANNOTATION_IGNORE_SO __annotation(W("SO_TOLERANT"), W("SO_INTOLERANT"), W("CONDITIONAL_EXEMPT")) |
55 | #define ANNOTATION_VIOLATION(violationmask) __annotation(W("VIOLATION(") L#violationmask W(")")) |
56 | #define ANNOTATION_UNCHECKED(thecheck) __annotation(W("UNCHECKED(") L#thecheck W(")")) |
57 | |
58 | #define ANNOTATION_MARK_BLOCK_ANNOTATION __annotation(W("MARK")) |
59 | #define ANNOTATION_USE_BLOCK_ANNOTATION __annotation(W("USE")) |
60 | #define ANNOTATION_END_USE_BLOCK_ANNOTATION __annotation(W("END_USE")) |
61 | |
62 | // here is the plan: |
63 | // |
64 | // a special holder which implements a violation |
65 | // |
66 | |
67 | #define ANNOTATION_FN_SPECIAL_HOLDER_BEGIN __annotation(W("SPECIAL_HOLDER_BEGIN ") SCAN_WIDEN(__FUNCTION__)) |
68 | #define ANNOTATION_SPECIAL_HOLDER_END __annotation(W("SPECIAL_HOLDER_END")) |
69 | #define ANNOTATION_SPECIAL_HOLDER_CALLER_NEEDS_DYNAMIC_CONTRACT __annotation(W("SPECIAL_HOLDER_DYNAMIC")) |
70 | |
71 | #define ANNOTATION_SO_PROBE_BEGIN(probeAmount) __annotation(W("SO_PROBE_BEGIN(") L#probeAmount W(")")) |
72 | #define ANNOTATION_SO_PROBE_END __annotation(W("SO_PROBE_END")) |
73 | |
74 | // |
75 | // these annotations are all function-name qualified |
76 | // |
77 | #define ANNOTATION_FN_LEAF __annotation(W("LEAF ") SCAN_WIDEN(__FUNCTION__)) |
78 | #define ANNOTATION_FN_WRAPPER __annotation(W("WRAPPER ") SCAN_WIDEN(__FUNCTION__)) |
79 | #define ANNOTATION_FN_THROWS __annotation(W("THROWS ") SCAN_WIDEN(__FUNCTION__)) |
80 | #define ANNOTATION_FN_NOTHROW __annotation(W("NOTHROW ") SCAN_WIDEN(__FUNCTION__)) |
81 | #define ANNOTATION_FN_CAN_TAKE_LOCK __annotation(W("CAN_TAKE_LOCK ") SCAN_WIDEN(__FUNCTION__)) |
82 | #define ANNOTATION_FN_CANNOT_TAKE_LOCK __annotation(W("CANNOT_TAKE_LOCK ") SCAN_WIDEN(__FUNCTION__)) |
83 | #define ANNOTATION_FN_FAULT __annotation(W("FAULT ") SCAN_WIDEN(__FUNCTION__)) |
84 | #define ANNOTATION_FN_FORBID_FAULT __annotation(W("FORBID_FAULT ") SCAN_WIDEN(__FUNCTION__)) |
85 | #define ANNOTATION_FN_GC_TRIGGERS __annotation(W("GC_TRIGGERS ") SCAN_WIDEN(__FUNCTION__)) |
86 | #define ANNOTATION_FN_GC_NOTRIGGER __annotation(W("GC_NOTRIGGER ") SCAN_WIDEN(__FUNCTION__)) |
87 | #define ANNOTATION_FN_SO_TOLERANT __annotation(W("SO_TOLERANT ") SCAN_WIDEN(__FUNCTION__)) |
88 | #define ANNOTATION_FN_SO_INTOLERANT __annotation(W("SO_INTOLERANT ") SCAN_WIDEN(__FUNCTION__)) |
89 | #define ANNOTATION_FN_SO_NOT_MAINLINE __annotation(W("SO_NOT_MAINLINE ") SCAN_WIDEN(__FUNCTION__)) |
90 | #define ANNOTATION_FN_MODE_COOPERATIVE __annotation(W("MODE_COOPERATIVE ") SCAN_WIDEN(__FUNCTION__)) |
91 | #define ANNOTATION_FN_MODE_PREEMPTIVE __annotation(W("MODE_PREEMPTIVE ") SCAN_WIDEN(__FUNCTION__)) |
92 | #define ANNOTATION_FN_MODE_ANY __annotation(W("MODE_ANY ") SCAN_WIDEN(__FUNCTION__)) |
93 | #define ANNOTATION_FN_HOST_NOCALLS __annotation(W("HOST_NOCALLS ") SCAN_WIDEN(__FUNCTION__)) |
94 | #define ANNOTATION_FN_HOST_CALLS __annotation(W("HOST_CALLS ") SCAN_WIDEN(__FUNCTION__)) |
95 | |
96 | #define ANNOTATION_ENTRY_POINT __annotation(W("SO_EP ") SCAN_WIDEN(__FUNCTION__)) |
97 | |
98 | |
99 | // for DacCop |
100 | #define ANNOTATION_SUPPORTS_DAC __annotation(W("SUPPORTS_DAC")) |
101 | #define ANNOTATION_SUPPORTS_DAC_HOST_ONLY __annotation(W("SUPPORTS_DAC_HOST_ONLY")) |
102 | |
103 | #ifdef _DEBUG |
104 | // @todo : put correct annotation in and fixup the static analysis tool |
105 | // This is used to flag debug-only functions that we want to ignore in our static analysis |
106 | #define ANNOTATION_DEBUG_ONLY __annotation(W("DBG_ONLY")) |
107 | |
108 | #endif |
109 | |
110 | #else // _TARGET_X86_ |
111 | |
112 | #define ANNOTATION_TRY_BEGIN { } |
113 | #define ANNOTATION_TRY_END { } |
114 | #define ANNOTATION_HANDLER_BEGIN { } |
115 | #define ANNOTATION_HANDLER_END { } |
116 | #define ANNOTATION_NOTHROW { } |
117 | #define ANNOTATION_CANNOT_TAKE_LOCK { } |
118 | #define ANNOTATION_WRAPPER { } |
119 | #define ANNOTATION_FAULT { } |
120 | #define ANNOTATION_FORBID_FAULT { } |
121 | #define ANNOTATION_COOPERATIVE { } |
122 | #define ANNOTATION_MODE_COOPERATIVE { } |
123 | #define ANNOTATION_MODE_ANY { } |
124 | #define ANNOTATION_GC_TRIGGERS { } |
125 | #define ANNOTATION_IGNORE_THROW { } |
126 | #define ANNOTATION_IGNORE_LOCK { } |
127 | #define ANNOTATION_IGNORE_FAULT { } |
128 | #define ANNOTATION_IGNORE_TRIGGER { } |
129 | #define ANNOTATION_IGNORE_SO { } |
130 | #define ANNOTATION_VIOLATION(violationmask) { } |
131 | #define ANNOTATION_UNCHECKED(thecheck) { } |
132 | |
133 | #define ANNOTATION_TRY_MARKER { } |
134 | #define ANNOTATION_CATCH_MARKER { } |
135 | |
136 | #define ANNOTATION_FN_HOST_NOCALLS { } |
137 | #define ANNOTATION_FN_HOST_CALLS { } |
138 | |
139 | #define ANNOTATION_FN_SPECIAL_HOLDER_BEGIN { } |
140 | #define ANNOTATION_SPECIAL_HOLDER_END { } |
141 | #define ANNOTATION_SPECIAL_HOLDER_CALLER_NEEDS_DYNAMIC_CONTRACT { } |
142 | |
143 | #define ANNOTATION_FN_LEAF { } |
144 | #define ANNOTATION_FN_WRAPPER { } |
145 | #define ANNOTATION_FN_THROWS { } |
146 | #define ANNOTATION_FN_NOTHROW { } |
147 | #define ANNOTATION_FN_CAN_TAKE_LOCK { } |
148 | #define ANNOTATION_FN_CANNOT_TAKE_LOCK { } |
149 | #define ANNOTATION_FN_FAULT { } |
150 | #define ANNOTATION_FN_FORBID_FAULT { } |
151 | #define ANNOTATION_FN_GC_TRIGGERS { } |
152 | #define ANNOTATION_FN_GC_NOTRIGGER { } |
153 | #define ANNOTATION_FN_SO_TOLERANT { } |
154 | #define ANNOTATION_FN_SO_INTOLERANT { } |
155 | #define ANNOTATION_FN_SO_NOT_MAINLINE { } |
156 | #define ANNOTATION_FN_MODE_COOPERATIVE { } |
157 | #define ANNOTATION_FN_MODE_PREEMPTIVE { } |
158 | #define ANNOTATION_FN_MODE_ANY { } |
159 | #define ANNOTATION_FN_HOST_NOCALLS { } |
160 | #define ANNOTATION_FN_HOST_CALLS { } |
161 | |
162 | #define ANNOTATION_SUPPORTS_DAC { } |
163 | #define ANNOTATION_SUPPORTS_DAC_HOST_ONLY { } |
164 | |
165 | #define ANNOTATION_SO_PROBE_BEGIN(probeAmount) { } |
166 | #define ANNOTATION_SO_PROBE_END { } |
167 | |
168 | #define ANNOTATION_SO_TOLERANT { } |
169 | #define ANNOTATION_SO_INTOLERANT { } |
170 | #define ANNOTATION_SO_NOT_MAINLINE { } |
171 | #define ANNOTATION_SO_NOT_MAINLINE_BEGIN { } |
172 | #define ANNOTATION_SO_NOT_MAINLINE_END { } |
173 | #define ANNOTATION_ENTRY_POINT { } |
174 | #ifdef _DEBUG |
175 | #define ANNOTATION_DEBUG_ONLY { } |
176 | #endif |
177 | |
178 | #endif // _TARGET_X86_ |
179 | |
180 | #define STATIC_CONTRACT_THROWS ANNOTATION_FN_THROWS |
181 | #define STATIC_CONTRACT_NOTHROW ANNOTATION_FN_NOTHROW |
182 | #define STATIC_CONTRACT_CAN_TAKE_LOCK ANNOTATION_FN_CAN_TAKE_LOCK |
183 | #define STATIC_CONTRACT_CANNOT_TAKE_LOCK ANNOTATION_FN_CANNOT_TAKE_LOCK |
184 | #define STATIC_CONTRACT_FAULT ANNOTATION_FN_FAULT |
185 | #define STATIC_CONTRACT_FORBID_FAULT ANNOTATION_FN_FORBID_FAULT |
186 | #define STATIC_CONTRACT_GC_TRIGGERS ANNOTATION_FN_GC_TRIGGERS |
187 | #define STATIC_CONTRACT_GC_NOTRIGGER ANNOTATION_FN_GC_NOTRIGGER |
188 | #define STATIC_CONTRACT_HOST_NOCALLS ANNOTATION_FN_HOST_NOCALLS |
189 | #define STATIC_CONTRACT_HOST_CALLS ANNOTATION_FN_HOST_CALLS |
190 | |
191 | #define STATIC_CONTRACT_SUPPORTS_DAC ANNOTATION_SUPPORTS_DAC |
192 | #define STATIC_CONTRACT_SUPPORTS_DAC_HOST_ONLY ANNOTATION_SUPPORTS_DAC_HOST_ONLY |
193 | |
194 | #define STATIC_CONTRACT_MODE_COOPERATIVE ANNOTATION_FN_MODE_COOPERATIVE |
195 | #define STATIC_CONTRACT_MODE_PREEMPTIVE ANNOTATION_FN_MODE_PREEMPTIVE |
196 | #define STATIC_CONTRACT_MODE_ANY ANNOTATION_FN_MODE_ANY |
197 | #define STATIC_CONTRACT_LEAF ANNOTATION_FN_LEAF |
198 | #define STATIC_CONTRACT_LIMITED_METHOD ANNOTATION_FN_LEAF |
199 | #define STATIC_CONTRACT_WRAPPER ANNOTATION_FN_WRAPPER |
200 | |
201 | #ifdef FEATURE_STACK_PROBE // Static SO contracts only required when SO Infrastructure code is present |
202 | #define STATIC_CONTRACT_SO_INTOLERANT ANNOTATION_FN_SO_INTOLERANT |
203 | #define STATIC_CONTRACT_SO_TOLERANT ANNOTATION_FN_SO_TOLERANT |
204 | #define STATIC_CONTRACT_SO_NOT_MAINLINE ANNOTATION_FN_SO_NOT_MAINLINE |
205 | |
206 | #define STATIC_CONTRACT_ENTRY_POINT ANNOTATION_ENTRY_POINT; ANNOTATION_FN_SO_TOLERANT |
207 | #else // FEATURE_STACK_PROBE |
208 | #define STATIC_CONTRACT_SO_INTOLERANT |
209 | #define STATIC_CONTRACT_SO_TOLERANT |
210 | #define STATIC_CONTRACT_SO_NOT_MAINLINE |
211 | #define STATIC_CONTRACT_ENTRY_POINT |
212 | #endif // FEATURE_STACK_PROBE |
213 | |
214 | #ifdef _DEBUG |
215 | #define STATIC_CONTRACT_DEBUG_ONLY \ |
216 | ANNOTATION_DEBUG_ONLY; \ |
217 | STATIC_CONTRACT_CANNOT_TAKE_LOCK; \ |
218 | ANNOTATION_VIOLATION(TakesLockViolation); \ |
219 | ANNOTATION_FN_SO_NOT_MAINLINE; |
220 | #else |
221 | #define STATIC_CONTRACT_DEBUG_ONLY |
222 | #endif |
223 | |
224 | #define STATIC_CONTRACT_VIOLATION(mask) \ |
225 | ANNOTATION_VIOLATION(mask) |
226 | |
227 | #define SCAN_SCOPE_BEGIN \ |
228 | METHOD_CANNOT_BE_FOLDED_DEBUG; \ |
229 | ANNOTATION_FN_SPECIAL_HOLDER_BEGIN; |
230 | |
231 | #define SCAN_SCOPE_END \ |
232 | METHOD_CANNOT_BE_FOLDED_DEBUG; \ |
233 | ANNOTATION_SPECIAL_HOLDER_END; |
234 | |
235 | namespace StaticContract |
236 | { |
237 | struct ScanThrowMarkerStandard |
238 | { |
239 | __declspec(noinline) ScanThrowMarkerStandard() |
240 | { |
241 | METHOD_CANNOT_BE_FOLDED_DEBUG; |
242 | STATIC_CONTRACT_THROWS; |
243 | STATIC_CONTRACT_GC_NOTRIGGER; |
244 | STATIC_CONTRACT_SO_TOLERANT; |
245 | } |
246 | |
247 | static void used() |
248 | { |
249 | } |
250 | }; |
251 | |
252 | struct ScanThrowMarkerTerminal |
253 | { |
254 | __declspec(noinline) ScanThrowMarkerTerminal() |
255 | { |
256 | METHOD_CANNOT_BE_FOLDED_DEBUG; |
257 | } |
258 | |
259 | static void used() |
260 | { |
261 | } |
262 | }; |
263 | |
264 | struct ScanThrowMarkerIgnore |
265 | { |
266 | __declspec(noinline) ScanThrowMarkerIgnore() |
267 | { |
268 | METHOD_CANNOT_BE_FOLDED_DEBUG; |
269 | } |
270 | |
271 | static void used() |
272 | { |
273 | } |
274 | }; |
275 | } |
276 | typedef StaticContract::ScanThrowMarkerStandard ScanThrowMarker; |
277 | |
278 | // This is used to annotate code as throwing a terminal exception, and should |
279 | // be used immediately before the throw so that infer that it can be inferred |
280 | // that the block in which this annotation appears throws unconditionally. |
281 | #define SCAN_THROW_MARKER do { ScanThrowMarker __throw_marker; } while (0) |
282 | |
283 | #define SCAN_IGNORE_THROW_MARKER \ |
284 | typedef StaticContract::ScanThrowMarkerIgnore ScanThrowMarker; if (0) ScanThrowMarker::used(); |
285 | |
286 | // Terminal exceptions are asynchronous and cannot be included in THROWS contract |
287 | // analysis. As such, this uses typedef to reassign the ScanThrowMarker to a |
288 | // non-annotating struct so that SCAN does not see the block as throwing. |
289 | #define STATIC_CONTRACT_THROWS_TERMINAL \ |
290 | typedef StaticContract::ScanThrowMarkerTerminal ScanThrowMarker; if (0) ScanThrowMarker::used(); |
291 | |
292 | #if defined(_DEBUG) && !defined(DACCESS_COMPILE) && defined(FEATURE_STACK_PROBE) && !defined(_TARGET_ARM_) // @ARMTODO |
293 | extern void EnsureSOIntolerantOK(const char *szFunction, const char *szFile, int lineNum); |
294 | |
295 | extern BOOL (*g_fpShouldValidateSOToleranceOnThisThread)(); |
296 | |
297 | // @todo Is there any checks we can do here? |
298 | #define ENSURE_SHOULD_NOT_PROBE_FOR_SO |
299 | |
300 | #define CHECK_IF_SO_INTOLERANT_OK \ |
301 | EnsureSOIntolerantOK(__FUNCTION__, __FILE__, __LINE__); |
302 | |
303 | // Even if we can't have a full-blown contract, we can at least check |
304 | // if its ok to run an SO-Intolerant function. |
305 | #undef STATIC_CONTRACT_SO_INTOLERANT |
306 | #define STATIC_CONTRACT_SO_INTOLERANT \ |
307 | ANNOTATION_FN_SO_INTOLERANT; \ |
308 | CHECK_IF_SO_INTOLERANT_OK; |
309 | |
310 | #undef STATIC_CONTRACT_SO_NOT_MAINLINE |
311 | #define STATIC_CONTRACT_SO_NOT_MAINLINE \ |
312 | ENSURE_SHOULD_NOT_PROBE_FOR_SO \ |
313 | ANNOTATION_FN_SO_NOT_MAINLINE |
314 | |
315 | #else |
316 | #define EnsureSOIntolerantOK(x,y,z) |
317 | |
318 | #endif |
319 | |
320 | |
321 | #ifdef _MSC_VER |
322 | #define SCAN_IGNORE_THROW typedef StaticContract::ScanThrowMarkerIgnore ScanThrowMarker; ANNOTATION_IGNORE_THROW |
323 | #define SCAN_IGNORE_LOCK ANNOTATION_IGNORE_LOCK |
324 | #define SCAN_IGNORE_FAULT ANNOTATION_IGNORE_FAULT |
325 | #define SCAN_IGNORE_TRIGGER ANNOTATION_IGNORE_TRIGGER |
326 | #define SCAN_IGNORE_SO ANNOTATION_IGNORE_SO |
327 | #else |
328 | #define SCAN_IGNORE_THROW |
329 | #define SCAN_IGNORE_LOCK |
330 | #define SCAN_IGNORE_FAULT |
331 | #define SCAN_IGNORE_TRIGGER |
332 | #define SCAN_IGNORE_SO |
333 | #endif |
334 | |
335 | |
336 | // we use BlockMarker's only for SCAN |
337 | #if defined(_DEBUG) && defined(_TARGET_X86_) && !defined(DACCESS_COMPILE) |
338 | |
339 | template <UINT COUNT> |
340 | class BlockMarker |
341 | { |
342 | public: |
343 | __declspec(noinline) void MarkBlock() |
344 | { |
345 | ANNOTATION_MARK_BLOCK_ANNOTATION; |
346 | METHOD_CANNOT_BE_FOLDED_DEBUG; |
347 | return; |
348 | } |
349 | |
350 | __declspec(noinline) void UseMarkedBlockAnnotation() |
351 | { |
352 | ANNOTATION_USE_BLOCK_ANNOTATION; |
353 | METHOD_CANNOT_BE_FOLDED_DEBUG; |
354 | return; |
355 | } |
356 | |
357 | __declspec(noinline) void EndUseMarkedBlockAnnotation() |
358 | { |
359 | ANNOTATION_END_USE_BLOCK_ANNOTATION; |
360 | METHOD_CANNOT_BE_FOLDED_DEBUG; |
361 | return; |
362 | } |
363 | }; |
364 | |
365 | #define SCAN_BLOCKMARKER() BlockMarker<__COUNTER__> __blockMarker_onlyOneAllowedPerScope |
366 | #define SCAN_BLOCKMARKER_MARK() __blockMarker_onlyOneAllowedPerScope.MarkBlock() |
367 | #define SCAN_BLOCKMARKER_USE() __blockMarker_onlyOneAllowedPerScope.UseMarkedBlockAnnotation() |
368 | #define SCAN_BLOCKMARKER_END_USE() __blockMarker_onlyOneAllowedPerScope.EndUseMarkedBlockAnnotation() |
369 | |
370 | #define SCAN_BLOCKMARKER_N(num) BlockMarker<__COUNTER__> __blockMarker_onlyOneAllowedPerScope##num |
371 | #define SCAN_BLOCKMARKER_MARK_N(num) __blockMarker_onlyOneAllowedPerScope##num.MarkBlock() |
372 | #define SCAN_BLOCKMARKER_USE_N(num) __blockMarker_onlyOneAllowedPerScope##num.UseMarkedBlockAnnotation() |
373 | #define SCAN_BLOCKMARKER_END_USE_N(num) __blockMarker_onlyOneAllowedPerScope##num.EndUseMarkedBlockAnnotation() |
374 | |
375 | #define SCAN_EHMARKER() BlockMarker<__COUNTER__> __marker_onlyOneAllowedPerScope |
376 | #define SCAN_EHMARKER_TRY() __annotation(W("SCOPE(BLOCK);SCAN_TRY_BEGIN")); __marker_onlyOneAllowedPerScope.MarkBlock() |
377 | #define SCAN_EHMARKER_END_TRY() __annotation(W("SCOPE(BLOCK);SCAN_TRY_END")) |
378 | #define SCAN_EHMARKER_CATCH() __marker_onlyOneAllowedPerScope.UseMarkedBlockAnnotation() |
379 | #define SCAN_EHMARKER_END_CATCH() __marker_onlyOneAllowedPerScope.EndUseMarkedBlockAnnotation() |
380 | |
381 | #else |
382 | |
383 | #define SCAN_BLOCKMARKER() |
384 | #define SCAN_BLOCKMARKER_MARK() |
385 | #define SCAN_BLOCKMARKER_USE() |
386 | #define SCAN_BLOCKMARKER_END_USE() |
387 | |
388 | #define SCAN_BLOCKMARKER_N(num) |
389 | #define SCAN_BLOCKMARKER_MARK_N(num) |
390 | #define SCAN_BLOCKMARKER_USE_N(num) |
391 | #define SCAN_BLOCKMARKER_END_USE_N(num) |
392 | |
393 | #define SCAN_EHMARKER() |
394 | #define SCAN_EHMARKER_TRY() |
395 | #define SCAN_EHMARKER_END_TRY() |
396 | #define SCAN_EHMARKER_CATCH() |
397 | #define SCAN_EHMARKER_END_CATCH() |
398 | |
399 | #endif |
400 | |
401 | |
402 | // |
403 | // @todo remove this... if there really are cases where a function just shouldn't have a contract, then perhaps |
404 | // we can add a more descriptive name for it... |
405 | // |
406 | #define CANNOT_HAVE_CONTRACT __annotation(W("NO_CONTRACT")) |
407 | |
408 | #endif // __STATIC_CONTRACT_H_ |
409 | |