Why are preprocessor macros evil and what are the alternatives?

前端 未结 8 2037
面向向阳花
面向向阳花 2020-11-22 02:46

I have always asked this but I have never received a really good answer; I think that almost any programmer before even writing the first \"Hello World\" had encountered a p

8条回答
  •  花落未央
    2020-11-22 03:04

    Macros are just like any other tool - a hammer used in a murder is not evil because it's a hammer. It is evil in the way the person uses it in that way. If you want to hammer in nails, a hammer is a perfect tool.

    There are a few aspects to macros that make them "bad" (I'll expand on each later, and suggest alternatives):

    1. You can not debug macros.
    2. Macro expansion can lead to strange side effects.
    3. Macros have no "namespace", so if you have a macro that clashes with a name used elsewhere, you get macro replacements where you didn't want it, and this usually leads to strange error messages.
    4. Macros may affect things you don't realize.

    So let's expand a little here:

    1) Macros can't be debugged. When you have a macro that translates to a number or a string, the source code will have the macro name, and many debuggers, you can't "see" what the macro translates to. So you don't actually know what is going on.

    Replacement: Use enum or const T

    For "function-like" macros, because the debugger works on a "per source line where you are" level, your macro will act like a single statement, no matter if it's one statement or a hundred. Makes it hard to figure out what is going on.

    Replacement: Use functions - inline if it needs to be "fast" (but beware that too much inline is not a good thing)

    2) Macro expansions can have strange side effects.

    The famous one is #define SQUARE(x) ((x) * (x)) and the use x2 = SQUARE(x++). That leads to x2 = (x++) * (x++);, which, even if it was valid code [1], would almost certainly not be what the programmer wanted. If it was a function, it would be fine to do x++, and x would only increment once.

    Another example is "if else" in macros, say we have this:

    #define safe_divide(res, x, y)   if (y != 0) res = x/y;
    

    and then

    if (something) safe_divide(b, a, x);
    else printf("Something is not set...");
    

    It actually becomes completely the wrong thing....

    Replacement: real functions.

    3) Macros have no namespace

    If we have a macro:

    #define begin() x = 0
    

    and we have some code in C++ that uses begin:

    std::vector v;
    
    ... stuff is loaded into v ... 
    
    for (std::vector::iterator it = myvector.begin() ; it != myvector.end(); ++it)
       std::cout << ' ' << *it;
    

    Now, what error message do you think you get, and where do you look for an error [assuming you have completely forgotten - or didn't even know about - the begin macro that lives in some header file that someone else wrote? [and even more fun if you included that macro before the include - you'd be drowning in strange errors that makes absolutely no sense when you look at the code itself.

    Replacement: Well there isn't so much as a replacement as a "rule" - only use uppercase names for macros, and never use all uppercase names for other things.

    4) Macros have effects you don't realize

    Take this function:

    #define begin() x = 0
    #define end() x = 17
    ... a few thousand lines of stuff here ... 
    void dostuff()
    {
        int x = 7;
    
        begin();
    
        ... more code using x ... 
    
        printf("x=%d\n", x);
    
        end();
    
    }
    

    Now, without looking at the macro, you would think that begin is a function, which shouldn't affect x.

    This sort of thing, and I've seen much more complex examples, can REALLY mess up your day!

    Replacement: Either don't use a macro to set x, or pass x in as an argument.

    There are times when using macros is definitely beneficial. One example is to wrap a function with macros to pass on file/line information:

    #define malloc(x) my_debug_malloc(x, __FILE__, __LINE__)
    #define free(x)  my_debug_free(x, __FILE__, __LINE__)
    

    Now we can use my_debug_malloc as the regular malloc in the code, but it has extra arguments, so when it comes to the end and we scan the "which memory elements hasn't been freed", we can print where the allocation was made so the programmer can track down the leak.

    [1] It is undefined behaviour to update one variable more than once "in a sequence point". A sequence point is not exactly the same as a statement, but for most intents and purposes, that's what we should consider it as. So doing x++ * x++ will update x twice, which is undefined and will probably lead to different values on different systems, and different outcome value in x as well.

提交回复
热议问题