Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Glib Debugging Macros

Posted on April 8, 2012

glib has a nice set of macros you can use to enforce invariants and preconditions in your code. GTK+ uses these liberally—one of the reasons it’s so stable and easy to use. They all disappear when you define G_DISABLE_CHECKS or G_DISABLE_ASSERT, so there’s no performance penalty in production code. Using these liberally is a very, very good idea. You’ll find bugs much faster if you do. You can even add assertions and checks whenever you find a bug to be sure the bug doesn’t reappear in future versions—this complements a regression suite. Checks are especially useful when the code you’re writing will be used as a black box by other programmers; users will immediately know when and how they’ve misused your code.

Of course you should be very careful to ensure your code isn’t subtly dependent on debug-only statements to function correctly. Statements that will disappear in pro- duction code should never have side effects.

[code lang=”cpp”]
#include <glib.h>

g_return_if_fail(condition);
g_return_val_if_fail(condition, retval);
[/code]
Figure 2-3. Precondition Checks

Figure 2-3 shows glib’s precondition checks. g_return_if_fail() prints a warning
and immediately returns from the current function if condition is FALSE. g_return_val_if_fail()

is similar but allows you to return some retval. These macros are incredibly useful—if
you use them liberally, especially in combination with GTK+’s runtime type check- ing, you’ll halve the time you spend looking for bad pointers and type errors.

Using these functions is simple; here’s an example from the glib hash table imple- mentation:
[code lang=”cpp”]
void
g_hash_table_foreach (GHashTable *hash_table,
GHFunc func,
gpointer user_data)
{
GHashNode *node;
gint i;

g_return_if_fail (hash_table != NULL);
g_return_if_fail (func != NULL);

for (i = 0; i < hash_table->size; i++)
for (node = hash_table->nodes[i]; node; node = node->next)
(* func) (node->key, node->value, user_data);
}
[/code]

Without the checks, passing NULL as a parameter to this function would result in a mysterious segmentation fault. The person using the library would have to figure out where the error occurred with a debugger, and maybe even dig in to the glib code to see what was wrong. With the checks, they’ll get a nice error message telling them that NULL arguments are not allowed.
[code lang=”cpp”]
#include <glib.h>

g_assert(condition);
g_assert_not_reached(void);
[/code]
Figure 2-4. Assertions

glib also has more traditional assertion macros, shown in Figure 2-4. g_assert() is basically identical to assert(), but responds to G_DISABLE_ASSERT and behaves consistently across all platforms. g_assert_not_reached() is also provided; this is

an assertion which always fails. Assertions call abort() to exit the program and (if your environment supports it) dump a core file for debugging purposes.
Fatal assertions should be used to check internal consistency of a function or library, while g_return_if_fail() is intended to ensure sane values are passed to the pub- lic interfaces of a program module. That is, if an assertion fails, you typically look for a bug in the module containing the assertion; if a g_return_if_fail() check fails, you typically look for the bug in the code which invokes the module.

This code from glib’s calendrical calculations module shows the difference:
[code lang=”cpp”]
GDate*
g_date_new_dmy (GDateDay day, GDateMonth m, GDateYear y)
{
GDate *d;
g_return_val_if_fail (g_date_valid_dmy (day, m, y), NULL);

d = g_new (GDate, 1);

d->julian = FALSE;
d->dmy = TRUE;

d->month = m;
d->day = day;
d->year = y;

g_assert (g_date_valid (d));

return d;
}
[/code]

The precondition check at the beginning ensures the user passes in reasonable values for the day, month and year; the assertion at the end ensures that glib constructed a sane object, given sane values.

g_assert_not_reached() should be used to mark “impossible” situations; a com- mon use is to detect switch statements that don’t handle all possible values of an enumeration:
[code lang=”cpp”]
switch (val)
{
case FOO_ONE:
break;
case FOO_TWO:
break;
default:
/* Invalid enumeration value */
g_assert_not_reached();
break;
}
[/code]

All of the debugging macros print a warning using glib’s g_log() facility, which means the warning includes the name of the originating application or library, and you can optionally install a replacement warning-printing routine. For example, you might send all warnings to a dialog box or log file instead of printing them on the console.

Source: Havoc Pennington. 1999. GTK Gnome Application Development. New York: New Riders Publishing

Terbaru

  • Inilah 7 HP Xiaomi NFC Termurah 2025, Dompet Aman Aktivitas Tetap Lancar!
  • Inilah 5 Rekomendasi HP Samsung dengan Fitur NFC Termurah dan Terbaik untuk Kebutuhan Harian Kalian
  • Inilah Rekomendasi HP Vivo Harga 2 Jutaan dengan Fitur Stabilizer Kamera Terbaik untuk Konten Kreator
  • Inilah 5 HP Infinix Kamera Bagus dan RAM Besar, Bikin Konten Jadi Makin Estetik!
  • Inilah Alasan Kenapa Lenovo Yoga Tab Bakal Jadi Tablet AI Paling Gahar di Tahun 2026
  • Inilah Bocoran Tecno Pova 8 dan Spark 50 Pro, HP dengan Baterai Monster Sampai 7.750mAh!
  • Inilah Alasan Kenapa Poco X8 Pro Series Ludes Terjual 30 Ribu Unit dalam Sehari, Performanya Benar-Benar Naik Kelas!
  • Inilah Rekomendasi HP Samsung dengan Kamera Terbaik 2025, Hasil Foto Dijamin Kayak Profesional!
  • Inilah Kemudahan Belanja Elektronik Lewat Kolaborasi Strategis Indodana Finance dan Sharp Indonesia
  • Inilah Rekomendasi Smartwatch Mirip Apple Watch Termurah 2026 yang Bikin Gaya Makin Maksimal
  • Inilah Cara Cek Lokasi UTBK 2026 Agar Tidak Salah Alamat dan Terlambat
  • Inilah Realme Narzo 100 Lite 5G, Smartphone Baterai 7000mAh yang Siap Meluncur dengan Spesifikasi Gahar dan Layar Super Smooth
  • Inilah Alasan Kenapa Aplikasi MOVA Berbahaya dan Bukan Cara Cepat Kaya yang Aman
  • Inilah Huawei Watch GT Runner 2, Smartwatch Keren yang Siap Bikin Lari Kalian Makin Kencang dan Presisi!
  • Inilah Panduan Lengkap Mengunduh dan Mencetak Kartu Peserta UTBK 2026 Biar Nggak Salah Langkah
  • Apa itu Satgas PKH? Tim Khusus yang Bakal Sikat Penguasaan Hutan Ilegal di Indonesia
  • Inilah REDMI Pad 2 SE, Tablet Murah dengan Layar 2K yang Siap Bikin Nyaman Mata Kalian
  • Apa itu msgstore.db.crypt14 di WhatsApp? Jangan Asal Hapus Kalau Nggak Mau Chat Hilang!
  • Inilah Fakta di Balik Kasus Siswi 15 Tahun di Langkat yang Viral Jadi Tersangka Usai Bela Ayahnya
  • Inilah 7 HP Redmi Kamera Terbaik 2026 dengan Resolusi 200 MP, Kualitas Flagship Harga Tetap Irit!
  • Inilah Bahaya dan Cara Kerja Unlock FF Beta Server Account Apk Mobilitado yang Lagi Viral
  • Inilah 5 Laptop Lenovo Paling Awet dan Tangguh Buat Investasi Jangka Panjang Kalian
  • Inilah Kronologi Tragis Mahasiswa PNP Padang Ditemukan Meninggal di Kamar Kos 11 April 2026
  • Inilah Kenapa Akun WhatsApp Kalian Sedang Ditinjau dan Cara Mengatasinya Biar Normal Lagi
  • Inilah Kronologi Gadis Lampung Nekat Menyamar Jadi Pria Demi Lamar Kekasih di Sinjai yang Berujung Urusan Polisi
  • Inilah Kronologi Kecelakaan Beruntun Jalur Purworejo-Magelang 11 April 2026: Berawal Dari Rem Mendadak Karena Kucing Melintas
  • Inilah Kabar Mengejutkan OTT KPK Bupati Tulungagung Gatut Sunu Wibowo, Begini Kronologi dan Profil Lengkapnya
  • Inilah Mod HUD Minecraft 2026 yang Bikin Tampilan Game Kalian Makin Keren dan Informatif
  • Inilah Panduan Lengkap UM-PTKIN 2026: Jadwal, Cara Daftar, dan Tips Strategis Memilih Jurusan di UIN IAIN STAIN
  • Inilah Alasan Kenapa Tiny House di Sleman Makin Populer dan Cara Bangunnya dengan Budget 100 Jutaan
  • Is it Time to Replace Nano? Discover Fresh, the Terminal Text Editor You Actually Want to Use
  • How to Design a Services Like Google Ads
  • How to Fix 0x800ccc0b Outlook Error: Step-by-Step Guide for Beginners
  • How to Fix NVIDIA App Error on Windows 11: Simple Guide
  • How to Fix Excel Formula Errors: Quick Fixes for #NAME
  • How to Use VoxCPM2: The Complete Tutorial for Professional Voice Cloning and AI Speech Generation
  • Complete tutorial for Creao AI: How to build smart AI agents that automate your daily tasks
  • How to Streamline Your Digital Workflow with TeraBox AI: A Complete Tutorial for Beginners
  • How to Run Google Gemma 4 Locally: A Beginner’s Guide to Tiny but Mighty AI Models
  • A Beginner Tutorial on Cloning Website Source Code Using ChatGPT and AI Logic Reconstruction
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme